Amending the ECPA to Enable a Culture of Cybersecurity Research (Electronic Communications Privacy Act) Amending the ECPA to Enable a Culture of Cybersecurity Research (Electronic Communications Privacy Act)

Amending the ECPA to Enable a Culture of Cybersecurity Research (Electronic Communications Privacy Act‪)‬

Harvard Journal of Law & Technology 2008, Fall, 22, 1

    • $5.99
    • $5.99

Publisher Description

I. INTRODUCTION Computer and network security (together, "cybersecurity") have become matters of major economic, social, and national security importance. Computer networks have joined other systems like transportation, energy, defense, and health care that are critical to the functioning of the national economy. (1) Indeed, computer networks are the "nervous system" that ties together and controls these other components of our national infrastructure. (2) Increasingly sophisticated network attacks, however, constantly threaten this infrastructure and the activities that rely on it. These attacks do not simply damage an isolated machine, or disrupt an individual's or single enterprise's access to the Internet. Instead, modern attacks threaten to target infrastructure that is integral to the economy, national defense, and daily life. (3) Although society has benefited from innovative applications that connect people and devices via the Internet, (4) malicious parties have taken advantage of the Internet's connectivity by exploiting technological and human vulnerabilities to perpetrate attacks for personal, financial, and political gain. (5) The FBI estimated in 2005 that cybercrime costs the United States $67.2 billion annually. (6)

GENRE
Professional & Technical
RELEASED
2008
September 22
LANGUAGE
EN
English
LENGTH
112
Pages
PUBLISHER
Harvard Law School, Harvard Journal of Law & Technology
SELLER
The Gale Group, Inc., a Delaware corporation and an affiliate of Cengage Learning, Inc.
SIZE
357.9
KB
Embryonic Stem Cell Research and the Theory of Medical Self-Defense. Embryonic Stem Cell Research and the Theory of Medical Self-Defense.
2008
Tragedy of the Data Commons (Privacy Risks of Research Data) Tragedy of the Data Commons (Privacy Risks of Research Data)
2011
A Knot in the Eternal Golden Braid: Searching for Coherence in the Relationship Between Enablement, Anticipation, And Obviousness. A Knot in the Eternal Golden Braid: Searching for Coherence in the Relationship Between Enablement, Anticipation, And Obviousness.
2010
The Wealth of Networks: How Social Production Transforms Markets and Freedom (Book Review) The Wealth of Networks: How Social Production Transforms Markets and Freedom (Book Review)
2006
Privacy and the Modern Grid. Privacy and the Modern Grid.
2011
Stream Capture: Returning Control of Digital Music to the Users. Stream Capture: Returning Control of Digital Music to the Users.
2011