Search Results
Cybersecurity, Data Privacy & eDiscovery Law & Policy eJournal

Sponsored by...

Cleveland-Marshall College of Law logo Center for Cybersecurity & Privacy Protection Cleveland-Marshall College of Law Center Home Subscribe
595,774 Total downloads | Link to this page | Subscribe to this eJournal (requires login)

Viewing: 1 - 50 of 2,290 papers

1.

Understanding Privacy

Daniel J. Solove, UNDERSTANDING PRIVACY, Harvard University Press, May 2008, GWU Legal Studies Research Paper No. 420, GWU Law School Public Law Research Paper No. 420
Number of pages: 24 Posted: 05 May 2008 Last Revised: 13 Jul 2014
Accepted Paper Series
George Washington University Law School
Downloads 11,439
2.

A User's Guide to the Stored Communications Act, and a Legislator's Guide to Amending it

72 George Washington Law Review 1208 (2004).
Number of pages: 36 Posted: 05 Aug 2003 Last Revised: 06 Jul 2016
Accepted Paper Series
University of Southern California Gould School of Law
Downloads 9,900
3.

FinTech, RegTech and the Reconceptualization of Financial Regulation

Northwestern Journal of International Law & Business, Forthcoming, University of Hong Kong Faculty of Law Research Paper No. 2016/035
Number of pages: 51 Posted: 05 Oct 2016 Last Revised: 26 Oct 2016
Accepted Paper Series
The University of Hong Kong - Faculty of Law, The University of Hong Kong - Faculty of Law and University of New South Wales (UNSW) - Faculty of Law
Downloads 9,185
4.

A Brief History of Information Privacy Law

PROSKAUER ON PRIVACY, PLI, 2016, GWU Law School Public Law Research Paper No. 215
Number of pages: 53 Posted: 10 Jul 2006 Last Revised: 09 Feb 2017
Accepted Paper Series
George Washington University Law School
Downloads 7,926
5.

Encryption Workarounds

106 Georgetown Law Journal 989 (2018).
Number of pages: 31 Posted: 22 Mar 2017 Last Revised: 13 May 2018
Accepted Paper Series
University of Southern California Gould School of Law and Harvard University - Berkman Klein Center for Internet & Society
Downloads 7,792
6.

Chilling Effects: Online Surveillance and Wikipedia Use

Berkeley Technology Law Journal, Vol. 31, No. 1, p. 117, 2016
Number of pages: 66 Posted: 27 Apr 2016 Last Revised: 08 Sep 2016
Accepted Paper Series
University of Oxford - Oxford Internet Institute
Downloads 5,699
7.

Is Disruptive Blockchain Technology the Future of Financial Services?

69 The Consumer Finance Law Quarterly Report 232 (2016)
Number of pages: 11 Posted: 31 May 2016 Last Revised: 24 Dec 2017
Accepted Paper Series
Western Carolina University - College of Business
Downloads 5,459
8.

Deep Fakes: A Looming Challenge for Privacy, Democracy, and National Security

107 California Law Review (2019, Forthcoming), U of Texas Law, Public Law Research Paper No. 692, U of Maryland Legal Studies Research Paper No. 2018-21
Number of pages: 59 Posted: 21 Jul 2018 Last Revised: 23 Aug 2018
Accepted Paper Series
University of Texas School of Law and University of Maryland Francis King Carey School of Law
Downloads 5,424
9.

Why a Right to Explanation of Automated Decision-Making Does Not Exist in the General Data Protection Regulation

International Data Privacy Law, 2017
Number of pages: 47 Posted: 24 Jan 2017 Last Revised: 20 Sep 2017
Accepted Paper Series
University of Oxford - Oxford Internet Institute, University of Oxford - Oxford Internet Institute and University of Oxford - Oxford Internet Institute
Downloads 5,211
10.

The Internet as a Conduit for Criminal Activity

INFORMATION TECHNOLOGY AND THE CRIMINAL JUSTICE SYSTEM, Pattavina, A., ed., pp. 77-98, Sage Publications, Inc., 2005 (revised 2010, 2015)
Number of pages: 19 Posted: 13 Jun 2005 Last Revised: 23 Oct 2015
Accepted Paper Series
University of Leeds, Centre for Criminal Justice Studies
Downloads 5,128
11.

Your Secret Stingray's No Secret Anymore: The Vanishing Government Monopoly over Cell Phone Surveillance and Its Impact on National Security and Consumer Privacy

Harvard Journal of Law and Technology, Volume 28, Number 1 Fall 2014
Number of pages: 76 Posted: 17 May 2014 Last Revised: 29 Dec 2014
Accepted Paper Series
West Point--Army Cyber Institute and Yale University - Yale Information Society Project
Downloads 4,648
12.

Blockchains and Data Protection in the European Union

Max Planck Institute for Innovation & Competition Research Paper No. 18-01
Number of pages: 32 Posted: 06 Dec 2017 Last Revised: 07 Feb 2018
Working Paper Series
Max Planck Institute for Innovation and Competition
Downloads 4,524
13.

Privacy and Power: Computer Databases and Metaphors for Information Privacy

Stanford Law Review, Vol. 53, p. 1393, July 2001
Number of pages: 70 Posted: 14 Dec 2000 Last Revised: 27 Feb 2014
Accepted Paper Series
George Washington University Law School

Multiple version iconThere are 2 versions of this paper

Downloads 4,483
14.

Cyber-Attacks and the Use of Force: Back to the Future of Article 2(4)

Yale Journal of International Law, Vol. 36, 2011
Number of pages: 39 Posted: 11 Sep 2010 Last Revised: 10 Aug 2014
Working Paper Series
Columbia Law School
Downloads 3,871
15.

The Distributed Liability of Distributed Ledgers: Legal Risks of Blockchain

University of Illinois Law Review, 2017-2018, Forthcoming, University of Luxembourg Law Working Paper No. 007/2017, Center for Business & Corporate Law (CBC) Working Paper 002/2017, University of Hong Kong Faculty of Law Research Paper No. 2017/020, UNSW Law Research Paper No. 17-52, European Banking Institute Working Paper Series 14
Number of pages: 49 Posted: 15 Aug 2017 Last Revised: 13 Jul 2018
Accepted Paper Series
Universite du Luxembourg - Faculty of Law, Economics and Finance, University of New South Wales (UNSW) - Faculty of Law and The University of Hong Kong - Faculty of Law
Downloads 3,566
16.

Crypto-Securities Regulation: ICOs, Token Sales and Cryptocurrencies under EU Financial Law

European Company and Financial Law Review Forthcoming
Number of pages: 45 Posted: 30 Nov 2017 Last Revised: 21 Jul 2018
Accepted Paper Series
Humboldt University of Berlin and Ruprecht-Karls Universität Heidelberg
Downloads 3,545
17.

The Biggest Lie on the Internet: Ignoring the Privacy Policies and Terms of Service Policies of Social Networking Services

Information, Communication & Society, pp. 1-20, 2018., TPRC 44: The 44th Research Conference on Communication, Information and Internet Policy, 2016.
Number of pages: 37 Posted: 02 Apr 2016 Last Revised: 18 Aug 2018
Accepted Paper Series
York University and University of Connecticut
Downloads 3,443
18.

The Digital Person: Technology and Privacy in the Information Age

GWU Law School Public Law Research Paper No. 121, Daniel J. Solove, THE DIGITAL PERSON: TECHNOLOGY AND PRIVACY IN THE INFORMATION AGE, NYU Press, 2004
Number of pages: 17 Posted: 26 Oct 2004 Last Revised: 19 Jan 2017
Accepted Paper Series
George Washington University Law School
Downloads 3,379
19.

Caught in the Cloud: Privacy, Encryption, and Government Back Doors in the Web 2.0 Era

8 J. on Telecomm. and High Tech. L. 359, Berkman Center Research Publication No. 2009-07
Number of pages: 66 Posted: 18 Jun 2009 Last Revised: 27 Oct 2012
Accepted Paper Series
Yale University - Yale Information Society Project
Downloads 3,370
20.

The Rise and Fall of Invasive ISP Surveillance

University of Illinois Law Review, 2009, U of Colorado Law Legal Studies Research Paper No. 08-22
Number of pages: 83 Posted: 31 Aug 2008 Last Revised: 23 Dec 2013
Accepted Paper Series
Georgetown University Law Center
Downloads 3,354
21.

Accountable Algorithms

University of Pennsylvania Law Review, Vol. 165, 2017 Forthcoming, Fordham Law Legal Studies Research Paper No. 2765268
Number of pages: 66 Posted: 16 Apr 2016 Last Revised: 20 Nov 2016
Accepted Paper Series
University of California, Berkeley - School of Information, Princeton University - Center for Information Technology Policy, Cornell University, Princeton University - Center for Information Technology Policy, Fordham University School of Law, Georgetown University Law Center and Princeton University - Center for Information Technology Policy
Downloads 3,353
22.

What Google Knows: Privacy and Internet Search Engines

Utah Law Review, Forthcoming
Number of pages: 72 Posted: 19 Oct 2007 Last Revised: 01 Feb 2014
Working Paper Series
International Association of Privacy Professionals (IAPP)
Downloads 3,264
23.

The Ultimate Unifying Approach to Complying with All Laws and Regulations

19 Green Bag 2d 223 (2016), GWU Law School Public Law Research Paper No. 2016-16, GWU Legal Studies Research Paper No. 2016-16
Number of pages: 4 Posted: 09 Feb 2016 Last Revised: 08 Jun 2016
Accepted Paper Series
George Washington University Law School and Northeastern University School of Law and College of Computer and Information Science
Downloads 3,234
24.

Cyberwarfare: Law & Policy Proposals for U.S. & Global Governance

Virginia Lawyer, Vol. 58, p. 28, February 2010, GMU School of Public Policy Research Paper No. 2009-11
Number of pages: 5 Posted: 21 Jul 2009 Last Revised: 05 Apr 2015
Accepted Paper Series
George Mason University (Schar School of Policy & Government)
Downloads 2,793
25.

A Model for When Disclosure Helps Security: What Is Different About Computer and Network Security?

3 Journal on Telecommunications and High Technology Law 163 (2004)
Number of pages: 46 Posted: 18 Aug 2004 Last Revised: 16 Aug 2017
Accepted Paper Series
Georgia Institute of Technology - Scheller College of Business
Downloads 2,784
26.

Slave to the Algorithm? Why a 'Right to an Explanation' Is Probably Not the Remedy You Are Looking For

16 Duke Law & Technology Review 18 (2017)
Number of pages: 67 Posted: 24 May 2017 Last Revised: 06 Dec 2017
Accepted Paper Series
affiliation not provided to SSRN and University College London, Department of Science, Technology, Engineering and Public Policy (STEaPP)
Downloads 2,739
27.

Algorithmic Entities

95 Washington University Law Review (Forthcoming)., UCLA School of Law, Law-Econ Research Paper No. 17-09
Number of pages: 69 Posted: 18 Apr 2017 Last Revised: 23 Feb 2018
Accepted Paper Series
University of California, Los Angeles (UCLA) - School of Law
Downloads 2,728
28.

From Nuclear War to Net War: Analogizing Cyber Attacks in International Law

Berkley Journal of International Law (BJIL), Vol. 25, No. 3, 2009
Number of pages: 60 Posted: 04 May 2009
Accepted Paper Series
Indiana University - Kelley School of Business - Department of Business Law
Downloads 2,687
29.

Initial Coin Offerings: The Top 25 Jurisdictions and Their Comparative Regulatory Responses

CodeX Stanford Journal of Blockchain Law & Policy (2018), U of St. Thomas (Minnesota) Legal Studies Research Paper No. 18-07
Number of pages: 29 Posted: 15 Feb 2018 Last Revised: 18 May 2018
Working Paper Series
University of St. Thomas, Minnesota - School of Law
Downloads 2,644
30.

Right to Be Forgotten: Much Ado About Nothing

15(2) Colorado Technology Law Journal 307 (2017)
Number of pages: 30 Posted: 02 Feb 2017 Last Revised: 04 Nov 2018
Accepted Paper Series
Université de Strasbourg - CEIPI

Multiple version iconThere are 2 versions of this paper

Downloads 2,641
31.

Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework

Columbia Journal of Transnational Law, Vol. 37, 1998-99
Number of pages: 54 Posted: 19 May 2010
Accepted Paper Series
Naval War College - Stockton Center for the Study of International Law
Downloads 2,626
32.

Law, Virtual Reality, and Augmented Reality

University of Pennsylvania Law Review, Vol. 166, 2018, Forthcoming, Stanford Public Law Working Paper No. 2933867, UCLA School of Law, Public Law Research Paper No. 17-13
Number of pages: 227 Posted: 17 Mar 2017 Last Revised: 01 Mar 2018
Accepted Paper Series
Stanford Law School and University of California, Los Angeles (UCLA) - School of Law
Downloads 2,595
33.

Identity Theft, Privacy, and the Architecture of Vulnerability

Hastings Law Journal, Vol. 54, p. 1227, 2003
Number of pages: 46 Posted: 30 Jul 2003 Last Revised: 27 Feb 2014
Accepted Paper Series
George Washington University Law School
Downloads 2,492
34.

Reality and Illusion in EU Data Transfer Regulation Post Schrems

18 German Law Journal 881 (2017)
Number of pages: 38 Posted: 06 Mar 2016 Last Revised: 08 Jul 2017
Accepted Paper Series
Vrije Universiteit Brussel (VUB) - Law, Science, Technology & Society Research Group
Downloads 2,462
35.

The Leaky Leviathan: Why the Government Condemns and Condones Unlawful Disclosures of Information

Harvard Law Review, Vol. 127, pp. 512-635, 2013
Number of pages: 124 Posted: 25 Feb 2013 Last Revised: 24 Sep 2015
Accepted Paper Series
Columbia University - Law School
Downloads 2,308
36.

A Model Regime of Privacy Protection (Version 2.0)

GWU Law School Public Law Research Paper No. 132; GWU Legal Studies Research Paper No. 132
Number of pages: 36 Posted: 06 Apr 2005
Working Paper Series
George Washington University Law School and University of California, Berkeley - School of Information
Downloads 2,244
37.

Information Security and Cybercrime

LAW AND THE INTERNET, 3rd Ed., L. Edwards, C. Waelde, eds., Oxford: Hart, 2009
Number of pages: 20 Posted: 04 Jul 2009 Last Revised: 28 Feb 2014
Accepted Paper Series
affiliation not provided to SSRN, affiliation not provided to SSRN and University of Sussex Law School
Downloads 2,214
38.

A Typology of Privacy

University of Pennsylvania Journal of International Law 38(2): 483-575 (2017), Tilburg Law School Research Paper No. 09/2016
Number of pages: 93 Posted: 24 Mar 2016 Last Revised: 12 Apr 2017
Accepted Paper Series
Tilburg University - Tilburg Institute for Law, Technology, and Society (TILT), University of Kentucky, Tilburg University - Tilburg Institute for Law, Technology, and Society (TILT), Tilburg University - Tilburg Institute for Law, Technology, and Society (TILT), Tilburg University - Tilburg Institute for Law, Technology, and Society (TILT) and Tilburg University - Tilburg Institute for Law, Technology, and Society
Downloads 2,200
39.

Counterfactual Explanations Without Opening the Black Box: Automated Decisions and the GDPR

Harvard Journal of Law & Technology, 31 (2), 2018
Number of pages: 52 Posted: 02 Nov 2017 Last Revised: 03 Oct 2018
Accepted Paper Series
University of Oxford - Oxford Internet Institute, University of Oxford - Oxford Internet Institute and University of Surrey
Downloads 2,200
40.

Reconstructing Electronic Surveillance Law

George Washington Law Review, Vol. 72, 2004
Number of pages: 47 Posted: 21 Oct 2003 Last Revised: 27 Feb 2014
Accepted Paper Series
George Washington University Law School
Downloads 2,157
41.

The Law of Cyber-Attack

California Law Review, Vol. 100, No. 4, 2012, Yale Law & Economics Research Paper No. 453, Yale Law School, Public Law Working Paper No. 258
Number of pages: 70 Posted: 23 Aug 2012 Last Revised: 07 Sep 2012
Accepted Paper Series
Yale University - Law School, Yale University - Yale Information Society Project, Yale Law School, U.S. Court of Appeals for the D.C. Circuit, Yale University - Law School, Independent and Independent
Downloads 2,049
42.

Information Privacy/Information Property

Stanford Law Review, Vol. 52, No. 5, May 2000
Number of pages: 31 Posted: 09 Apr 2000
Accepted Paper Series
University of Michigan Law School
Downloads 1,972
43.

Policing Cybercrimes: Situating the Public Police in Networks of Security Within Cyberspace (Revised Feb 2011)

Police Practice and Research: An International Journal, Vol. 8, No. 2, pp. 183-205, May 2007
Number of pages: 36 Posted: 23 Nov 2005 Last Revised: 04 Apr 2015
Accepted Paper Series
University of Leeds, Centre for Criminal Justice Studies
Downloads 1,965
44.

The Three Laws of Robotics in the Age of Big Data

Ohio State Law Journal, Vol. 78, (2017), Forthcoming, Yale Law School, Public Law Research Paper No. 592
Number of pages: 45 Posted: 29 Dec 2016 Last Revised: 10 Sep 2017
Accepted Paper Series
Yale University - Law School
Downloads 1,965
45.

Internet Law in a Nutshell

Michael L. Rustad, INTERNET LAW IN A NUTSHELL, 2009, Suffolk University Law School Research Paper No. 09-05
Number of pages: 53 Posted: 17 Jan 2009 Last Revised: 13 Aug 2014
Accepted Paper Series
Suffolk University Law School
Downloads 1,962
46.

The New Vulnerability: Data Security and Personal Information

SECURING PRIVACY IN THE INTERNET AGE, Radin & Chander, eds., Stanford University Press, 2008, GWU Law School Public Law Research Paper No. 102
Number of pages: 27 Posted: 30 Aug 2004 Last Revised: 27 Feb 2014
Accepted Paper Series
George Washington University Law School
Downloads 1,960
47.

Risk and Anxiety: A Theory of Data Breach Harms

96 Texas Law Review 737 (2018), GWU Law School Public Law Research Paper No. 2017-2, GWU Legal Studies Research Paper No. 2017-2, U of Maryland Legal Studies Research Paper No. 2017-3
Number of pages: 50 Posted: 15 Dec 2016 Last Revised: 18 Mar 2018
Accepted Paper Series
George Washington University Law School and University of Maryland Francis King Carey School of Law
Downloads 1,941
48.

Amicus Brief of Professor Orin S. Kerr in Carpenter v. United States, 16-402

GWU Law School Public Law Research Paper No. 2017-81, GWU Legal Studies Research Paper No. 2017-81
Number of pages: 37 Posted: 04 Oct 2017 Last Revised: 15 Nov 2017
Working Paper Series
University of Southern California Gould School of Law
Downloads 1,921
49.

An Overview of Privacy Law

Chapter 2 of PRIVACY LAW FUNDAMENTALS (published by IAPP, 2015), GWU Law School Public Law Research Paper No. 2015-45, GWU Legal Studies Research Paper No. 2015-45
Number of pages: 39 Posted: 06 Oct 2015 Last Revised: 01 Nov 2015
Accepted Paper Series
George Washington University Law School and University of California, Berkeley - School of Law
Downloads 1,903
50.

E-Commerce, Cyber, and Electronic Payment System Risks: Lessons from PayPal

16 U.C. Davis Business Law Journal 261 (Spring 2016)
Number of pages: 47 Posted: 23 Aug 2013 Last Revised: 24 Dec 2017
Accepted Paper Series
Western Carolina University - College of Business
Downloads 1,853