Regulation of Unknown: Does the Humanoid Robot “PEPPER” need Red Flag Laws?

Abstract Pepper the robot, developed by SoftBank and manufactured by Foxconn, is able to socially interact with human beings based on its emotion reading and learning capabilities. It even has a biomorphic shape, just like us. However, recently a Pepper robot was attacked by a drunkard in Japan in September 2015. This incident is worth […]

Robotics and Drones

DRONES:   Drones in Domestic Surveillance Operations: Fourth Amendment Implications and Legislative Responses - Richard M. Thompson II (2013) http://www.fas.org/sgp/crs/natsec/R42701.pdf   Remotely Piloted Aircraft Systems & Journalism. Opportunities and Challenges of Drones in News Gathering. David Goldberg, Mark Corcoran, and Robert G. Picard (2013) https://reutersinstitute.politics.ox.ac.uk/fileadmin/documents/Publications/Working_Papers/Remotely_Piloted_Aircraft_and_Journalism.pdf   The Great Drone Debate - Amitai Etzioni (2013) http://icps.gwu.edu/files/2013/03/Etzioni_DroneDebate.pdf   Drones: What […]

Cybersecurity

Cybersecurity cooperation - Defending the digital frontline: http://www.enisa.europa.eu/media/key-documents/cybersecurity-cooperation-defending-the-digital-frontline Cyber Security without Cyber War Mary Ellen O’Connell (2012) http://jcsl.oxfordjournals.org/content/17/2/187.full Defence In-Depth for Cyber Security with Custom Anti-Virus Signature Definition Markson Aigbodi, Karim Ouazzane, Daniel Mitchell, Vassil Vassilev http://sdiwc.net/digital-library/web-admin/upload-pdf/00000402.pdf

Cybercrime

Cyber Crime: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2340803&download=yes Understanding cybercrime: a guide for developing countries Marco Gercke, (ITU, 2012) http://www.itu.int/ITU-D/cyb/cybersecurity/docs/Cybercrime%20legislation%20EV6.pdf

Cyberwar and Cyberterrorism

Japan attacked: can we say ‘cyber war’ now? T. Brewster (2011) Itpro.co.uk 20.09.2011 http://www.itpro.co.uk/636271/japan-attacked-can-we-say-cyber-war-now What is Cyberwar? J. Carr (2011) http://www.slate.com/articles/technology/future_tense/2011/08/what_is_cyberwar.html The Rewards (and Risks) of Cyber War Coll, S. (2012) http://www.newyorker.com/online/blogs/comment/2012/06/the-rewards-and-risks-of-cyberwar.html Deterrence doesn’t work in cyberspace: CCSA, AOL Defence. Freedberg S. (2012) http://defense.aol.com/2012/07/10/cyberspace-fundamentally-unstable-because-cyber-deterrence-doe/ Six Degrees of Desperation: When Defense Becomes Offense Hoff (2012) http://www.rationalsurvivability.com/blog/2012/07/six-degrees-of-desperation/ […]

Digital Forensics and Digital Evidence

Google Drive: Forensic Analysis of Cloud Storage Data Remnants  http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2340234 IOS Anti-Forensics: How Can We Securely Conceal, Delete and Insert Data? http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2339819   Digital Evidence on Mobile Devices Eoghan Casey and Benjamin Turnbull (Elsevier, 2009) http://www.elsevierdirect.com/companions/9780123742681/Chapter_20_Final.pdf Digital Evidence: A Guide to Forensics Readiness for Organisations, Security Advisers and Lawyers Peter Sommer (IAAC, 2012) http://www.iaac.org.uk/_media/DigitalInvestigations2012.pdf Commentary: Defining […]

Cloud Computing

The Cloud Computing Workshop Open forum Accademy (March 2012) http://openforumacademy.org/library/ofa-research/Report%20of%20the%20Cloud%20Computing%20Workshop_Final_V1.1.pdf Jurisdictional Aspects of Cloud Computing Cristos Velasco San Martin, (COE, 2009) http://www.coe.int/t/dghl/cooperation/economiccrime/cybercrime/Documents/Reports-Presentations/2079%20if09%20pres%20cristos%20cloud.pdf