Friday, September 20, 2013

Current issue of American University Law Review focuses on cybersecurity landscape


Volume 62, Issue 5 of the American University Law Review features a variety of works tackling the challenging and often complex issues surrounding cybersecurty. The Forward, written by Jorge L. Contreras, Laura DeNards and Melanie Teplinsky, states that this special issues

represents the culmination of a concerted effort to bring together scholars, legal practitioners, industry representatives, and government officials to discuss and debate the pressing issues surrounding cybersecurity in today’s increasingly interconnected environment.
As is the is case with cybersecurity policy, the topics vary greatly. While the article by appellate advocacy counsel for the Electronic Privacy Information Center, Alan Butler, addresses "the novel approach to cybersecurity policy by considering the implications of the Third Amendment of the U.S. Constitution,"  the piece by Professor Scott Shackelford, assistant professor of business law and ethics at the Indiana University Kelley School of Business, "searches for alternative avenues to foster cyberpeace by applying a novel conceptual framework termed polycentric governance."

The lasted issue of the American University Law Review is a great read for those interested in anything cybersecurity. Here are the links to the articles

Jorge L. Contreras, Laura DeNards, & Melanie Teplinsky, Foreward, Mapping Today's Cybersecurity Landscape, 62 Am. U.L. Rev. 1113 (2013)

Ivan K. Fong & David G. Delaney, Transcript, America the Virtual: Security, Privacy, and Interoperability in an Interconnected World, 62 Am. U.L. Rev. 1131 (2013)

Keir X. Bancroft, Regulating Information Security in the Government Contracting Industry: Will the Rising Tide Lift all the Boats?, 62 Am. U.L. Rev. 1145 (2013)

Alan Butler, When Cyberweapons End Up on Private Networks: Third Amendment Implications for Cybersecurity Polity, 62 Am. U.L. Rev. 1203 (2013)

Michael McNerney & Emilian Papadopoulos, Hacker's Delight: Law Firm Risk and Liability in the Cyber Age, 62 Am. U.L. Rev. 1243 (2013)

Scott J. Shackelford, Toward Cyberpeace: Managing Cyberattacks Through Polycentric Governance,  62 Am. U.L. Rev. 1273 (2013)

Miles L. Galbraith, Comment, Identity Crisis: Seeking a Unified Approach to Plaintiff Standing for Data Security Breaches of Sensitive Personal Information, 62 Am. U.L. Rev. 1365 (2013)

Peter S. Frecehette, Note, FTC v. LabMD: FTC Jurisdiction over Information Privacy is "Plausible," But How Far Can it Go?, 62 Am. U.L. Rev. 1401 (2013)

Danielle E. Sunberg, Note, Reining in the Rogue Employee: The Fourth Circuit Limits Employee Liability Under the CFAA,  62 Am. U.L. Rev. 1417 (2013)






Author's Note: In addition to being an author at Cybercrime Review, Andrew Proia is a postdoctoral fellow in information security law & policy at the Indiana University Center for Applied Cybersecurity Research. David G. Delaney serves as a Senior Fellow at CACR, while Scott Shackelford also serves as an affiliated Fellow. Both have contributed to the recent law review issue described in this post. All opinions expressed by the author of this post are solely in his individual capacity.

0 comments:

Post a Comment