Pittsburgh Journal of Technology Law & Policy最新文献

筛选
英文 中文
A Voluntary Cybersecurity Framework Is Unworkable- Government Must Crack the Whip 一个自愿的网络安全框架是行不通的——政府必须鞭策
Pittsburgh Journal of Technology Law & Policy Pub Date : 2014-05-23 DOI: 10.5195/TLP.2014.146
Robert Gyenes
{"title":"A Voluntary Cybersecurity Framework Is Unworkable- Government Must Crack the Whip","authors":"Robert Gyenes","doi":"10.5195/TLP.2014.146","DOIUrl":"https://doi.org/10.5195/TLP.2014.146","url":null,"abstract":"","PeriodicalId":185385,"journal":{"name":"Pittsburgh Journal of Technology Law & Policy","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115862052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
An Era of Rapid Change: The Abdication of Cash & the FTC's Unfairness Authority 快速变化的时代:现金的退位与联邦贸易委员会的不公平权力
Pittsburgh Journal of Technology Law & Policy Pub Date : 2014-05-23 DOI: 10.5195/TLP.2014.149
E. Freedman
{"title":"An Era of Rapid Change: The Abdication of Cash & the FTC's Unfairness Authority","authors":"E. Freedman","doi":"10.5195/TLP.2014.149","DOIUrl":"https://doi.org/10.5195/TLP.2014.149","url":null,"abstract":"","PeriodicalId":185385,"journal":{"name":"Pittsburgh Journal of Technology Law & Policy","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127397931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
What Does It Take to Survive a Breach in Today’s High- Risk World? When Your Prevention Fails (and It’s Going to Fail), What Do You Do? 在今天这个高风险的世界里,怎样才能在漏洞中生存?当你的预防失败时(它将会失败),你该怎么办?
Pittsburgh Journal of Technology Law & Policy Pub Date : 2014-05-23 DOI: 10.5195/TLP.2014.145
S. M. Angelo
{"title":"What Does It Take to Survive a Breach in Today’s High- Risk World? When Your Prevention Fails (and It’s Going to Fail), What Do You Do?","authors":"S. M. Angelo","doi":"10.5195/TLP.2014.145","DOIUrl":"https://doi.org/10.5195/TLP.2014.145","url":null,"abstract":"In this article, Scott Angelo provides a thoughtful analysis of cybersecurity issues companies currently face and discusses the steps companies can take to effectively minimize the risk of a breach and protect against breach liability.","PeriodicalId":185385,"journal":{"name":"Pittsburgh Journal of Technology Law & Policy","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133994135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber-Takings: The War on Crime Moves into the Cloud 网络征收:打击犯罪的战争进入云端
Pittsburgh Journal of Technology Law & Policy Pub Date : 2014-05-23 DOI: 10.5195/TLP.2014.148
L. McIntyre
{"title":"Cyber-Takings: The War on Crime Moves into the Cloud","authors":"L. McIntyre","doi":"10.5195/TLP.2014.148","DOIUrl":"https://doi.org/10.5195/TLP.2014.148","url":null,"abstract":"","PeriodicalId":185385,"journal":{"name":"Pittsburgh Journal of Technology Law & Policy","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134055511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Introduction: Cybersecurity in Pittsburgh 简介:匹兹堡的网络安全
Pittsburgh Journal of Technology Law & Policy Pub Date : 2014-05-23 DOI: 10.5195/TLP.2014.143
Kevin D. Ashley
{"title":"Introduction: Cybersecurity in Pittsburgh","authors":"Kevin D. Ashley","doi":"10.5195/TLP.2014.143","DOIUrl":"https://doi.org/10.5195/TLP.2014.143","url":null,"abstract":"This article provides a brief introduction to cybersecurity issues in the Pittsburgh region and introduces the student article series.","PeriodicalId":185385,"journal":{"name":"Pittsburgh Journal of Technology Law & Policy","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123123554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spring 2014 Table of Contents and Publication Information 2014春季目录及出版信息
Pittsburgh Journal of Technology Law & Policy Pub Date : 2014-05-23 DOI: 10.5195/TLP.2014.150
Chris Schlag
{"title":"Spring 2014 Table of Contents and Publication Information","authors":"Chris Schlag","doi":"10.5195/TLP.2014.150","DOIUrl":"https://doi.org/10.5195/TLP.2014.150","url":null,"abstract":"","PeriodicalId":185385,"journal":{"name":"Pittsburgh Journal of Technology Law & Policy","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123408214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Too Much Too Soon? A Case for Hesitancy in the Passage of State and Federal Password Protection Laws 太多太快?州和联邦密码保护法通过的犹豫案例
Pittsburgh Journal of Technology Law & Policy Pub Date : 2014-05-23 DOI: 10.5195/TLP.2014.142
Megan Davis
{"title":"Too Much Too Soon? A Case for Hesitancy in the Passage of State and Federal Password Protection Laws","authors":"Megan Davis","doi":"10.5195/TLP.2014.142","DOIUrl":"https://doi.org/10.5195/TLP.2014.142","url":null,"abstract":"Recently, significant attention has been given to employers’ concern and involvement over employees’ use of social media. The amount of attention given to social media has resulted in a number of proposed federal laws and multiple state laws discussing employers’ involvement and participation in employees’ social media use. The purpose of this note is to advocate for a more hesitant legislative stance toward social media password protection laws in an effort to avoid unnecessarily over-legislating in an area of privacy law that is still developing. While the author does not make an outright rejection of such legislation, the author argues that the speed and political vigor with which lawmakers are moving forward with such statutes raises the risk of statutory ambiguity, confusion amongst affected parties, and unnecessary burdens on employers. The note provides a thorough review of current trends in employers asking for social media login information, current legislation protecting employees’ social media use, and proposed legislation meant to combat an employer’s ability to obtain social media information.","PeriodicalId":185385,"journal":{"name":"Pittsburgh Journal of Technology Law & Policy","volume":"80 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126022678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Argument for States to Outlaw 'Revenge Porn' and for Congress to Amend 47 U.S.C. §230: How Our Current Laws Do Little to Protect Victims 各州取缔“复仇色情”和国会修改《美国法典》第47编第230条的理由:我们现行的法律在保护受害者方面做得很少
Pittsburgh Journal of Technology Law & Policy Pub Date : 2014-05-23 DOI: 10.5195/TLP.2014.141
C. Martinez
{"title":"An Argument for States to Outlaw 'Revenge Porn' and for Congress to Amend 47 U.S.C. §230: How Our Current Laws Do Little to Protect Victims","authors":"C. Martinez","doi":"10.5195/TLP.2014.141","DOIUrl":"https://doi.org/10.5195/TLP.2014.141","url":null,"abstract":"This note examines the intersection of law and technology as it relates to the issue of revenge porn.  Revenge porn comes in many forms but most commonly refers to the online posting of sexually explicit photos or videos of past lovers, without their consent, after the relationship has ended.  The author explains how the current legal framework has left many victims without legal recourse to punish those who have posted their intimate photos or videos without consent, and few options to have their images removed from the internet once they have been posted.  The note argues that in order to protect victims, states should make laws to criminalize the posting of revenge porn and the Communications Decency Act should be amended to give victims the power to have their images removed from websites.","PeriodicalId":185385,"journal":{"name":"Pittsburgh Journal of Technology Law & Policy","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114407564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
From Gray to Green-Using Algal Biofuels to Change the Energy Landscape of Southwestern Pennsylvania 从灰色到绿色——使用藻类生物燃料改变宾夕法尼亚州西南部的能源格局
Pittsburgh Journal of Technology Law & Policy Pub Date : 2014-02-12 DOI: 10.5195/TLP.2013.134
R. Hammond
{"title":"From Gray to Green-Using Algal Biofuels to Change the Energy Landscape of Southwestern Pennsylvania","authors":"R. Hammond","doi":"10.5195/TLP.2013.134","DOIUrl":"https://doi.org/10.5195/TLP.2013.134","url":null,"abstract":"","PeriodicalId":185385,"journal":{"name":"Pittsburgh Journal of Technology Law & Policy","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122187569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Internet Control or Internet Censorship? Comparing the Control Models of China, Singapore, and the United States to Guide Taiwan’s Choice 互联网控制还是互联网审查?比较中国、新加坡、美国的管制模式,以指导台湾的选择
Pittsburgh Journal of Technology Law & Policy Pub Date : 2014-02-12 DOI: 10.5195/TLP.2013.131
Jeffrey Li
{"title":"Internet Control or Internet Censorship? Comparing the Control Models of China, Singapore, and the United States to Guide Taiwan’s Choice","authors":"Jeffrey Li","doi":"10.5195/TLP.2013.131","DOIUrl":"https://doi.org/10.5195/TLP.2013.131","url":null,"abstract":"Internet censorship refers to a government’s unjustified scrutiny and control of online speech or government-approved control measures. The danger of Internet censorship is its chilling effect and substantial harm on free speech, a cornerstone of democracy, in cyberspace. This article compares China’s blocking and filtering system, Singapore’s class license system, and the United States’ government-private partnership model and identifies the features of each model. This article also explores the pros and cons of each model under international human rights standards. By finding lessons from each of the models, this article contends that Taiwan should retain its current minimal Internet control model. Further, Taiwan should fix flaws in its current Internet control system, including the private partnership model adopted by the Copyright Act, to be consistent with Article19.3 of the ICCPR.","PeriodicalId":185385,"journal":{"name":"Pittsburgh Journal of Technology Law & Policy","volume":"6 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128011779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信