Access to algorithms

H Bloch-Wehba - Fordham L. Rev., 2019 - HeinOnline
ARTICLES ACCESS TO ALGORITHMS Page 1 ARTICLES ACCESS TO ALGORITHMS Hannah
Bloch-Wehba* Federal, state, and local governments increasingly depend on automated …

Surveillance intermediaries

AZ Rozenshtein - Stan. L. Rev., 2018 - HeinOnline
Apple's high-profile 2016 fight with the FBI, in which the company challenged a court order
commanding it to help unlock the iPhone of one of the San Bernardino terrorists, exemplifies …

Artificial intelligence, finance, and the law

TCW Lin - Fordham L. Rev., 2019 - HeinOnline
Artificial intelligence is an existential component of modernfinance. The progress and
promise realized and presented by artificial intelligence in finance has been thus far …

Automation in moderation

H Bloch-Wehba - Cornell Int'l LJ, 2020 - HeinOnline
In March 2019, a shooter posted a white nationalist manifesto on" 8chan," an online
message board, and then livestreamed on Facebook as he murdered fifty-one people at two …

The law and politics of cyberattack attribution

KE Eichensehr - UCLA L. Rev., 2020 - HeinOnline
Attribution of cyberattacks requires identifying those responsible for bad acts, prominently
including states, and accurate attribution is a crucial predicate in contexts as diverse as …

Cyber threat information sharing: Perceived benefits and barriers

A Zibak, A Simpson - Proceedings of the 14th international conference …, 2019 - dl.acm.org
The literature on cyber security information sharing enumerates an extensive list of potential
benefits for organisations in both the public and private sectors. However, despite the …

Digital Switzerlands

KE Eichensehr - U. Pa. L. Rev., 2018 - HeinOnline
In a recent speech, Microsoft President Brad Smith argued that technology companies
collectively need to become a" Digital Switzerland." 1 This striking claim put a label on the …

Toward a human-centric approach to cybersecurity

RJ Deibert - Ethics & International Affairs, 2018 - cambridge.org
A “national security–centric” approach currently dominates cybersecurity policies and
practices. Derived from a realist theory of world politics in which states compete with each …

National Security by Platform

E Chachko - Stan. Tech. L. Rev., 2021 - HeinOnline
ABSTRACT Since 2016, platforms like Facebook, Google and Twitter have scaled up their
efforts to meet a plethora of security and geopolitical challenges. They have gradually …

Hacking into China's cybersecurity law

JA Lee - Wake Forest L. Rev., 2018 - HeinOnline
HACKING INTO CHINA'S CYBERSECURITY LAW Page 1 HACKING INTO CHINA'S
CYBERSECURITY LAW Jyh-An Lee* China's Cybersecurity Law, which is thus far the most …