Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

3,454 Full-Text Articles 3,225 Authors 1,637,661 Downloads 109 Institutions

All Articles in Computer Law

Faceted Search

3,454 full-text articles. Page 4 of 90.

Head In The Clouds, Head In The Sand: Federal Failure To Update Guidance On Computer Transaction In An International Context, Logan S. Weaver 2018 University of Washington School of Law

Head In The Clouds, Head In The Sand: Federal Failure To Update Guidance On Computer Transaction In An International Context, Logan S. Weaver

Washington Law Review

The United States has two different rationales for taxing income of non-U.S. persons and entities. First, the income may be “sourced” to the United States, as defined in the Internal Revenue Code. Alternatively, the income may be effectively connected to a trade or business within the United States that provides income to the non-U.S. person or entity. The sourcing rules for income of non-U.S. persons and entities depend heavily on the nature of the underlying transaction and the geographical location where certain key elements of the transaction take place. So long as the non-U.S. person or ...


Revolution In Crime: How Cryptocurrencies Have Changed The Criminal Landscape, Igor Groysman 2018 City University of New York (CUNY)

Revolution In Crime: How Cryptocurrencies Have Changed The Criminal Landscape, Igor Groysman

Student Theses

This thesis will examine the ways in which various cryptocurrencies have impacted certain traditional crimes. While crime is always evolving with technology, cryptocurrencies are a game changer in that they provide anonymous and decentralized payment systems which, while they can be tracked in a reactive sense via the blockchain, are seen by criminals as having better uses for them than traditional fiat currencies, such as the ability to send money relatively fast to another party without going through an intermediary, or the ability to obscure the origin of the money for money laundering purposes. Every week there are new cryptocurrencies ...


Privacy Spaces, Bert-Jaap Koops 2018 Tilburg Insitute for Law, Technology and Society

Privacy Spaces, Bert-Jaap Koops

West Virginia Law Review

Privacy literature contains conceptualizations of privacy in relation to role-playing and identity construction, and in relation to access control and boundary-management. In this paper, I combine both strands to introduce the concept of privacy spaces: spaces in which you can play, in your own way, the relevant role(s) you have in social life. Drawing from privacy conceptions in legal scholarship, philosophy, sociology, anthropology, human geography, and psychology, a systematic overview of traditional privacy spaces is offered, including mental bubbles, the body, personal space, personal writings, the home, private conversation space, cars, stalls, intimacy bubbles, professional black boxes, coffee house ...


Better Late Than Never: Bringing The Data Security Regulatory Environment Into The Modern Era, Jacob Holden 2018 West Virginia Univeristy College of Law

Better Late Than Never: Bringing The Data Security Regulatory Environment Into The Modern Era, Jacob Holden

West Virginia Law Review

No abstract provided.


Dialing It Back: Why Courts Should Rethink Students’ Privacy And Speech Rights As Cell Phone Communications Erode The ‘Schoolhouse Gate’, Nicholas J. McGuire 2018 Duke Law

Dialing It Back: Why Courts Should Rethink Students’ Privacy And Speech Rights As Cell Phone Communications Erode The ‘Schoolhouse Gate’, Nicholas J. Mcguire

Duke Law & Technology Review

The ubiquity of cell phones in today’s society has forced courts to change or dismiss established, but inapplicable analytical frameworks. Two such frameworks in the school setting are regulations of student speech and of student searches. This Article traces the constitutional jurisprudence of both First Amendment off-campus speech protection and Fourth Amendment search standards as applied to the school setting. It then analyzes how the Supreme Court’s ruling in Riley v. California complicates both areas. Finally, it proposes a pragmatic solution: by recognizing a categorical First Amendment exception for “substantial threats” against the school community, courts could accommodate ...


Dean's Desk: Iu Maurer Programs Supporting Careers In Cybersecurity, Austen L. Parrish 2018 Indiana University Maurer School of Law

Dean's Desk: Iu Maurer Programs Supporting Careers In Cybersecurity, Austen L. Parrish

Austen Parrish (2014-)

A recent Bureau of Labor Statistics report estimated a near 30 percent growth in coming years for information security professionals, far outpacing most other job types. While Indiana University has long recognized the importance of data security and privacy, multiple new initiatives are ensuring that the next generation of chief information security officers, systems analysts, privacy professionals and others will come from our law school.

One of the ways the law school is leading the way is through the university’s new master of science in cybersecurity risk management. That degree program combines the resources of three of IU’s ...


Enhancement Of Media Splicing Detection: A General Framework, Songpon TEERAKANOK, Tetsutaro UEHARA 2018 Graduate School of Information Science and Engineering, Ritsumeikan University

Enhancement Of Media Splicing Detection: A General Framework, Songpon Teerakanok, Tetsutaro Uehara

Journal of Digital Forensics, Security and Law

Digital media (i.e., image, audio) has played an influential role in today information system. The increasing of popularity in digital media has brought forth many technological advancements. The advancements, however, also gives birth to a number of forgeries and attacks against this type of information. With the availability of easy-to-use media manipulating tools available online, the authenticity of today digital media cannot be guaranteed. In this paper, a new general framework for enhancing today media splicing detection has been proposed. By combining results from two traditional approaches, the enhanced detection results show improvement in term of clarity in which ...


A New Framework For Securing, Extracting And Analyzing Big Forensic Data, Hitesh Sachdev, hayden wimmer, Lei Chen, Carl Rebman 2018 Georgia Southern University

A New Framework For Securing, Extracting And Analyzing Big Forensic Data, Hitesh Sachdev, Hayden Wimmer, Lei Chen, Carl Rebman

Journal of Digital Forensics, Security and Law

Finding new methods to investigate criminal activities, behaviors, and responsibilities has always been a challenge for forensic research. Advances in big data, technology, and increased capabilities of smartphones has contributed to the demand for modern techniques of examination. Smartphones are ubiquitous, transformative, and have become a goldmine for forensics research. Given the right tools and research methods investigating agencies can help crack almost any illegal activity using smartphones. This paper focuses on conducting forensic analysis in exposing a terrorist or criminal network and introduces a new Big Forensic Data Framework model where different technologies of Hadoop and EnCase software are ...


A Bit Like Cash: Understanding Cash-For-Bitcoin Transactions Through Individual Vendors, Stephanie J. Robberson, Mark R. McCoy 2018 University of Central Oklahoma

A Bit Like Cash: Understanding Cash-For-Bitcoin Transactions Through Individual Vendors, Stephanie J. Robberson, Mark R. Mccoy

Journal of Digital Forensics, Security and Law

As technology improves and economies become more globalized, the concept of currency has evolved. Bitcoin, a cryptographic digital currency, has been embraced as a secure and convenient type of money. Due to its security and privacy for the user, Bitcoin is a good tool for conducting criminal trades. The Financial Crimes Enforcement Network (FinCEN) has regulations in place to make identification information of Bitcoin purchasers accessible to law enforcement, but enforcing these rules with cash-for-Bitcoin traders is difficult. This study surveyed cash-for-Bitcoin vendors in Oklahoma, Texas, Arkansas, Missouri, Kansas, Colorado, and New Mexico to determine personal demographic information, knowledge of ...


Algorithmic Challenges To Autonomous Choice, Michal S. Gal 2018 University of Haifa

Algorithmic Challenges To Autonomous Choice, Michal S. Gal

Michigan Technology Law Review

We then explore how autonomous algorithmic assistants affect the legal framework. Some issues challenge the very use of algorithmic assistants: Should the law place an age limit on the use of such algorithms? Should legal limits be placed on their use in certain spheres? Other issues arise from the construction of preferences by algorithms. To wit, in a market in which demand is driven by algorithms, can we necessarily regard the choices made as expressions of user preferences that serve our socio-political goals? Even if the answer is positive—does this new mode of user choice fit current legal assumptions ...


Emojis And The Law, Eric Goldman 2018 University of Washington School of Law

Emojis And The Law, Eric Goldman

Washington Law Review

Emojis are an increasingly important way we express ourselves. Though emojis may be cute and fun, their usage can lead to misunderstandings with significant legal stakes—such as whether someone should be obligated by contract, liable for sexual harassment, or sent to jail. Our legal system has substantial experience interpreting new forms of content, so it should be equipped to handle emojis. Nevertheless, some special attributes of emojis create extra interpretative challenges. This Article identifies those attributes and proposes how courts should handle them. One particularly troublesome interpretative challenge arises from the different ways platforms depict emojis that are nominally ...


Employing Ai, Charles A. Sullivan 2018 Villanova University Charles Widger School of Law

Employing Ai, Charles A. Sullivan

Villanova Law Review

No abstract provided.


Back Matter, 2018 Embry-Riddle Aeronautical University

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


A Forensic Enabled Data Provenance Model For Public Cloud, Shariful Haque, Travis Atkison 2018 University of Alabama

A Forensic Enabled Data Provenance Model For Public Cloud, Shariful Haque, Travis Atkison

Journal of Digital Forensics, Security and Law

Cloud computing is a newly emerging technology where storage, computation and services are extensively shared among a large number of users through virtualization and distributed computing. This technology makes the process of detecting the physical location or ownership of a particular piece of data even more complicated. As a result, improvements in data provenance techniques became necessary. Provenance refers to the record describing the origin and other historical information about a piece of data. An advanced data provenance system will give forensic investigators a transparent idea about the data's lineage, and help to resolve disputes over controversial pieces of ...


Ontologies And The Semantic Web For Digital Investigation Tool Selection, Hayden Wimmer, Lei Chen, Thomas Narock 2018 Georgia Southern University

Ontologies And The Semantic Web For Digital Investigation Tool Selection, Hayden Wimmer, Lei Chen, Thomas Narock

Journal of Digital Forensics, Security and Law

The nascent field of digital forensics is heavily influenced by practice. Much digital forensics research involves the use, evaluation, and categorization of the multitude of tools available to researchers and practitioners. As technology evolves at an increasingly rapid pace, the digital forensics field must constantly adapt by creating and evaluating new tools and techniques to perform forensic analysis on many disparate systems such as desktops, notebook computers, mobile devices, cloud, and personal wearable sensor devices, among many others. While researchers have attempted to use ontologies to classify the digital forensics domain on various dimensions, no ontology of digital forensic tools ...


Front Matter, 2018 Embry-Riddle Aeronautical University

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Sharia Law And Digital Forensics In Saudi Arabia, Fahad Alanazi, Andrew Jones, Catherine Menon 2018 De Montfort University

Sharia Law And Digital Forensics In Saudi Arabia, Fahad Alanazi, Andrew Jones, Catherine Menon

Journal of Digital Forensics, Security and Law

These days, digital crime is one of the main challenges for law enforcement and the judicial system. Many of the laws which are used to protect the users of current technologies were derived from legislation and laws that are utilized in the control of crimes that are based in the physical realm. This applies not only in Western countries, but in countries that adopt Sharia law. There is a need to establish specific legislation and accepted best practice to deal with digital crimes that is compatible with Sharia law, which affects more than one billion Muslims. This paper presents a ...


Masthead, 2018 Embry-Riddle Aeronautical University

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


Bazaar Transnational Drafting: An Analysis Of The Gnu Public License Version 3 Revision Process, Christopher M. DiLeo 2018 University of San Diego

Bazaar Transnational Drafting: An Analysis Of The Gnu Public License Version 3 Revision Process, Christopher M. Dileo

San Diego International Law Journal

This Article will step through the drafting process and compare bazaar and cathedral modes of drafting to determine if a bazaar mode can efficiently produce a legal instrument that crosses legal regimes. As the title suggests, the bazaar process analysis case will be the GNU General Public License version 3 (the GPLv3) Revision Process. A comparison of the advantages and disadvantages of the bazaar mode of drafting to the cathedral mode of drafting will hopefully demonstrate the overall value of a transnational bazaar process like the GPLv3 Revision Process.


Fool Me Once: Regulating "Fake News" And Other Online Advertising, Abby Wood, Ann M. Ravel 2018 University of Southern California

Fool Me Once: Regulating "Fake News" And Other Online Advertising, Abby Wood, Ann M. Ravel

University of Southern California Legal Studies Working Paper Series

A lack of transparency for online political advertising has long been a problem in American political campaigns. Disinformation attacks that American voters have experienced since the 2016 campaign have made the need for regulatory action more pressing.

Platforms desire self-regulation and have only recently come around to supporting transparency regulations. While government must not regulate the content of political speech, it can, and should, force transparency into the process. We propose several interventions aimed at transparency. Most importantly, campaign finance regulators should require platforms to store and make available ads run on their platforms, as well as the audience at ...


Digital Commons powered by bepress