SSRN eLibrary Search Results
Cyberspace Law - Student Authors eJournal

80,395 Total downloads | Link to this page | Subscribe to this eJournal (requires login)
Search Within

Viewing: 1 - 50 of 495 papers

1.

Big Data's Disparate Impact

104 California Law Review 671 (2016)
Number of pages: 62 Posted: 11 Aug 2014 Last Revised: 30 Sep 2016
Accepted Paper Series
Cornell University and Data & Society Research Institute
Downloads 6,800
2.

Caught in the Cloud: Privacy, Encryption, and Government Back Doors in the Web 2.0 Era

8 J. on Telecomm. and High Tech. L. 359, Berkman Center Research Publication No. 2009-07
Number of pages: 66 Posted: 18 Jun 2009 Last Revised: 27 Oct 2012
Accepted Paper Series
Yale University - Yale Information Society Project
Downloads 3,263
3.

From Nuclear War to Net War: Analogizing Cyber Attacks in International Law

Berkley Journal of International Law (BJIL), Vol. 25, No. 3, 2009
Number of pages: 60 Posted: 04 May 2009
Accepted Paper Series
Indiana University - Kelley School of Business - Department of Business Law
Downloads 2,345
4.

Constitutional Malware

Number of pages: 79 Posted: 21 Jul 2015 Last Revised: 15 Nov 2016
Working Paper Series
Stanford University, School of Engineering, Computer Science
Downloads 1,348
5.

Bitcoin and Money Laundering: Mining for an Effective Solution

89 Ind. L.J. 441 (2014)
Number of pages: 32 Posted: 29 Aug 2013 Last Revised: 11 Apr 2015
Accepted Paper Series
Indiana University Maurer School of Law
Downloads 1,277
6.

Using Copyright to Combat Revenge Porn

NYU Journal of Intellectual Property & Entertainment Law, Vol. 3, 2014
Number of pages: 25 Posted: 04 Jan 2014 Last Revised: 30 Aug 2017
Accepted Paper Series
New York University School of Law
Downloads 1,194
7.

Online Harassment, Defamation, and Hateful Speech: A Primer of the Legal Landscape

Fordham Center on Law and Information Policy Report No. 2
Number of pages: 74 Posted: 10 Jun 2014
Accepted Paper Series
Data & Society Research Institute and Fordham University School of Law
Downloads 1,189
8.

The Problem of Anonymous Vanity Searches

Number of pages: 10 Posted: 26 Dec 2006
Working Paper Series
Yale University - Yale Information Society Project
Downloads 1,076
9.

An End to Privacy Theater: Exposing and Discouraging Corporate Disclosure of User Data to the Government

Minnesota Journal of Law, Science & Technology, Forthcoming
Number of pages: 43 Posted: 11 Aug 2010 Last Revised: 10 Aug 2014
Accepted Paper Series
Yale University - Yale Information Society Project

Multiple version iconThere are 2 versions of this paper

Downloads 963
10.

The Right to Be Forgotten: A Comparative Analysis

Number of pages: 24 Posted: 11 Mar 2013 Last Revised: 29 Mar 2013
Working Paper Series
Fordham University School of Law
Downloads 829
11.

The Block Is Hot: A Survey of the State of Bitcoin Regulation and Suggestions for the Future

Berkeley Technology Law Journal, Vol. 30, July 2015
Number of pages: 44 Posted: 03 Apr 2015 Last Revised: 03 Dec 2015
Accepted Paper Series
University of California, Berkeley - School of Law
Downloads 811
12.

Internet Jurisdiction: A Survey of Legal Scholarship Published in English and United States Case Law

Fordham Law Legal Studies Research Paper No. 2309526
Number of pages: 88 Posted: 16 Aug 2013
Working Paper Series
Fordham University School of Law, Fordham CLIP, Fordham CLIP, Fordham CLIP, Fordham Center on Law and Information Policy (CLIP), Fordham University School of Law, Fordham CLIP and Fordham CLIP
Downloads 799
13.

Zero Rating: Do Hard Rules Protect or Harm Consumers and Competition? Evidence from Chile, Netherlands and Slovenia

Number of pages: 37 Posted: 01 Apr 2015 Last Revised: 15 Oct 2015
Working Paper Series
Aalborg University, Center for Communication, Media and Information Studies and Florida International University (FIU) - College of Business Administration
Downloads 746
14.

Harmonizing Essential Facilities

Antitrust Law Journal, Vol. 76, No. 3, 2010, Loyola University Chicago School of Law Public Law and Legal Theory Research Paper Series No. 2009-006
Number of pages: 28 Posted: 12 Jun 2009 Last Revised: 18 Jul 2015
Accepted Paper Series
Loyola University of Chicago, School of Law - Institute for Consumer Antitrust Studies and Loyola University Chicago, School of Law, Students
Downloads 740
15.

Making Democracy Harder to Hack: Should Elections Be Classified as ‘Critical Infrastructure?’

University of Michigan Journal of Law Reform, 2017, Kelley School of Business Research Paper No. 16-75
Number of pages: 40 Posted: 19 Oct 2016 Last Revised: 17 Nov 2016
Accepted Paper Series
Indiana University - Kelley School of Business - Department of Business Law, Harvard University - Berkman Klein Center for Internet & Society, Harvard University - Belfer Center for Science and International Affairs, University of Arizona - School of Government and Public Policy, Harvard University - Belfer Center for Science and International Affairs, Indiana University Maurer School of Law, Harvard Kennedy School (HKS), Belfer Center for Science and International Affairs (BCSIA) and Kings College London, Department of War Studies, Students
Downloads 735
16.

Beyond the New 'Digital Divide': Analyzing the Evolving Role of National Governments in Internet Governance and Enhancing Cybersecurity

Stanford Journal of International Law, Vol. 50, p. 119, Winter 2014, Indiana Legal Studies Research Paper No. 290
Number of pages: 66 Posted: 07 Jun 2014 Last Revised: 15 Jul 2014
Accepted Paper Series
Indiana University - Kelley School of Business - Department of Business Law and Indiana University Maurer School of Law
Downloads 691
17.

Being Social: Why the NCAA Has Forced Universities to Monitor Student-Athletes’ Social Media

University of Pittsburgh Journal of Technology Law and Policy, Vol. 13, 1, Spring 2013
Number of pages: 46 Posted: 31 May 2013
Accepted Paper Series
The American College, Carnegie Mellon University - David A. Tepper School of Business and Independent
Downloads 659
18.

Fake News: A Legal Perspective

Journal of Internet Law (Apr. 2017)
Number of pages: 9 Posted: 26 Apr 2017
Accepted Paper Series
Klein Moynihan Turco LLP and Klein Moynihan Turco LLP
Downloads 646
19.

Timing the Right to Be Forgotten: A Study into 'Time' as a Factor in Deciding About Retention or Erasure of Data

Number of pages: 30 Posted: 15 May 2014
Working Paper Series
Tilburg University - Tilburg Institute for Law, Technology, and Society (TILT), KU Leuven, Centre for IT & IP Law (CiTiP), OSA Archivum, Georgetown University - Communication, Culture, and Technology, European University Institute Law Department and Tilburg Institute for Law, Technology, and Society
Downloads 633
20.

Injunctions Against Innocent Third Parties: Case of Website Blocking

4 JIPITEC, 2, pp. 116-129, Max Planck Institute for Intellectual Property & Competition Law Research Paper No. 13-14
Number of pages: 15 Posted: 28 Apr 2013 Last Revised: 15 Nov 2013
Accepted Paper Series
Tilburg Law and Economics Center (TILEC)
Downloads 632
21.

Taking the Sting Out of Revenge Porn: Using Criminal Statutes to Safeguard Sexual Autonomy in the Digital Age

Georgetown Journal of Gender and the Law, Forthcoming
Number of pages: 50 Posted: 18 Apr 2014 Last Revised: 23 Aug 2014
Accepted Paper Series
Emory University School of Law
Downloads 607
22.

The Brave New World of Cell-Site Simulators

Number of pages: 27 Posted: 24 May 2014
Working Paper Series
Albany Law School
Downloads 595
23.

Estonia Two-and-A-Half Years Later: A Progress Report on Combating Cyber Attacks

Journal of Internet Law, Forthcoming
Number of pages: 12 Posted: 10 Feb 2010
Accepted Paper Series
Indiana University - Kelley School of Business - Department of Business Law
Downloads 569
24.

Toward a Global Cybersecurity Standard of Care? Exploring the Implications of the 2014 NIST Cybersecurity Framework on Shaping Reasonable National and International Cybersecurity Practices

Texas International Law Journal, 2015, Indiana Legal Studies Research Paper No. 291
Number of pages: 59 Posted: 07 Jun 2014 Last Revised: 15 Jul 2014
Accepted Paper Series
Indiana University - Kelley School of Business - Department of Business Law, Indiana University Bloomington - Center for Applied Cybersecurity Research, Indiana University Bloomington and Indiana University Maurer School of Law
Downloads 569
25.

The Never-Was-Neutral Net and Why Informed End Users Can End the Net Neutrality Debates

22 Berkeley Tech. L.J. 1563 (2007), Indiana Legal Studies Research Paper No. 82
Number of pages: 72 Posted: 18 Jan 2007 Last Revised: 29 Jun 2013
Accepted Paper Series
Lifeway Foods, Inc.
Downloads 568
26.

Exploring the Regulatory Conditions of Internet Interconnection – A Survey Among Internet Interconnection Professionals

HIIG Discussion Paper Series No. 2016-03
Number of pages: 26 Posted: 02 Mar 2016
Working Paper Series
Alexander von Humboldt Institute for Internet and Society
Downloads 567
27.

Privacy and Security in the Cloud: Some Realism About Technical Solutions to Transnational Surveillance in the Post-Snowden Era

66 Maine Law Review 488 (2014), NYU School of Law, Public Law Research Paper No. 14-46
Number of pages: 48 Posted: 01 Jun 2014 Last Revised: 05 Sep 2014
Accepted Paper Series
New York University (NYU) - Information Law Institut and NYU Law School - Information Law Institute
Downloads 564
28.

Push, Pull, and Spill: A Transdisciplinary Case Study in Municipal Open Government

Berkeley Technology Law Journal, Forthcoming, University of Washington School of Law Research Paper No. 2015-23
Number of pages: 51 Posted: 13 Aug 2015 Last Revised: 06 Nov 2015
Accepted Paper Series
University of Washington - Department of Urban Design and Planning, University of Washington - School of Law, Creation Logic, LLC, Georgia Institute of Technology, University of Washington Information School and University of Washington - College of Built Environments - Department of Urban Design and Planning
Downloads 560
30.

Bitcoin in Singapore: A Light-Touch Approach to Regulation

Number of pages: 72 Posted: 23 Apr 2014 Last Revised: 23 Aug 2014
Working Paper Series
National University of Singapore (NUS) - Faculty of Law
Downloads 525
31.

Privacy, Freedom of Expression, and the Right to Be Forgotten in Europe

Cambridge Handbook of Consumer Privacy, eds. Jules Polonetsky, Omer Tene, and Evan Selinger (Cambridge University Press, 2017)
Number of pages: 33 Posted: 01 Mar 2017 Last Revised: 08 Sep 2017
Working Paper Series
Utrecht University - Centre for Intellectual Property Law and University of Amsterdam - IViR Institute for Information Law (IViR)
Downloads 514
32.

Re-Shaming the Debate: Social Norms, Shame, and Regulation in an Internet Age

Maryland Law Review, Vol. 75, No. 4 (2016).
Number of pages: 37 Posted: 03 Aug 2015 Last Revised: 18 May 2016
Accepted Paper Series
Yale University, Law School, Students
Downloads 508
33.

Profiling the European Citizen in the Internet of Things: How Will the General Data Protection Regulation Apply to this Form of Personal Data Processing, and How Should It?

Number of pages: 73 Posted: 22 Mar 2016
Working Paper Series
University of Amsterdam - Institute for Information Law (IViR)
Downloads 482
34.

Unpacking Blockchains

Prpić, J. (2017). Unpacking Blockchains. Collective Intelligence 2017. NYU, Tandon School of Engineering. June 15-16, 2017. ,
Number of pages: 7 Posted: 19 Mar 2017
Accepted Paper Series
Thompson Rivers University
Downloads 471
35.

NSA Metadata Collection and the Fourth Amendment

Berkeley Technology Law Journal, Vol. 29, 2014
Number of pages: 22 Posted: 27 Jul 2014
Accepted Paper Series
University of California, Berkeley - School of Law
Downloads 465
36.

Real Taxation of Virtual Commerce

Virginia Tax Review, Vol. 28, No. 3, 2008
Number of pages: 47 Posted: 26 Feb 2008 Last Revised: 18 Jul 2015
Accepted Paper Series
Loyola Law School Los Angeles, Students
Downloads 452
37.

When Artificial Intelligence Systems Produce Inventions: The 3A Era and an Alternative Model for Patent Law

Cardozo Law Review, Forthcoming
Number of pages: 58 Posted: 13 Mar 2017 Last Revised: 11 May 2017
Accepted Paper Series
Yale Law School and Fordham University School of Law
Downloads 436
38.

Open Data Policies and Practice: An International Comparison

Number of pages: 26 Posted: 07 Sep 2014 Last Revised: 08 Sep 2014
Working Paper Series
Harvard University - Berkman Klein Center for Internet & Society
Downloads 422
39.

Certified Lies: Detecting and Defeating Government Interception Attacks Against SSL

Number of pages: 20 Posted: 18 Apr 2010
Working Paper Series
Yale University - Yale Information Society Project and affiliation not provided to SSRN
Downloads 421
40.

'The Rise of Non-State Actors in Cyberwarfare'

In: Jens David Ohlin, Kevin Govern, and Clair Finkelstein (eds), Cyber War: Law and Ethics for Virtual Conflicts, (Oxford University Press, 2015) p. 102-126.
Number of pages: 23 Posted: 14 Apr 2016
Accepted Paper Series
University of Amsterdam - Amsterdam Center for International Law
Downloads 418
41.

Social Media and Freedom of Speech and Expression: Challenges Before the Indian Law

Number of pages: 15 Posted: 04 Jan 2017
Working Paper Series
North Eastern Hill University and National Law School of India University, Students
Downloads 412
42.

Should Your Firm Invest in Cyber Risk Insurance?

Business Horizons, 2012
Number of pages: 20 Posted: 15 Dec 2011
Accepted Paper Series
Indiana University - Kelley School of Business - Department of Business Law
Downloads 392
43.

Should Virtual Currency Be Subject to Income Tax?

Number of pages: 18 Posted: 19 May 2014
Working Paper Series
International Bureau for Fiscal Documentation (IBFD)
Downloads 390
44.

Legal Risks for Phishing Researchers

The Third Anti-Phishing Working Group eCrime Researchers Summit
Number of pages: 11 Posted: 12 Sep 2008 Last Revised: 18 Jul 2015
Working Paper Series
Yale University - Yale Information Society Project
Downloads 372
45.

On the Applicability of the Common European Sales Law to Some Models of Cloud Computing Services

Number of pages: 14 Posted: 23 Apr 2013
Working Paper Series
Universidade Federal de Pernambuco, Queen Mary University of London, School of Law and Centro de Informática - Univ Federal de Pernambuco
Downloads 366
46.

Intermediary Liability & Freedom of Expression: Recent Developments in the EU Notice & Action Initiative

Published in Computer Law and Security Review, Vol 31. Issue 1 2015, pages 46-56., CiTiP Working Paper 21/2015
Number of pages: 18 Posted: 06 Feb 2015 Last Revised: 13 Jul 2016
Accepted Paper Series
KU Leuven, Centre for IT & IP Law (CiTiP)
Downloads 365
47.

Behavioral Targeting, A European Legal Perspective

Frederik Zuiderveen Borgesius, "Behavioral Targeting: A European Legal Perspective," IEEE Security & Privacy, Vol. 11, No. 1, pp. 82-85
Number of pages: 6 Posted: 03 Jul 2013
Accepted Paper Series
University of Amsterdam - IViR Institute for Information Law (IViR)
Downloads 353
48.

The Legal Nature of Cryptocurrencies in the US and the Applicable Rules

Number of pages: 5 Posted: 01 Jul 2017
Working Paper Series
Queen Mary University of London - Centre for Commercial Law Studies and Queen Mary University of London, Students
Downloads 351
49.

Designing Successful Governance Groups: Lessons for Leaders from Real-World Examples

Berkman Center Research Publication No. 2015-11
Number of pages: 17 Posted: 05 Aug 2015
Working Paper Series
Harvard University - Berkman Klein Center for Internet & Society, University of Southern California - Annenberg School for Communication and Journalism and Harvard University - Berkman Klein Center for Internet & Society
Downloads 343
50.

Private Copying and Downloading from Unlawful Sources

Forthcoming International Review of Intellectual Property and Competition Law (IIC), 2015, Institute for Information Law Research Paper No. 2014-03, Amsterdam Law School Research Paper No. 2014-55
Number of pages: 33 Posted: 23 Oct 2014
Accepted Paper Series
University of Amsterdam, Institute for Information Law (IViR)
Downloads 343