Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Current
Archives
Announcements
About
About the Journal
Submissions
Editorial Team
Privacy Statement
Contact
Search
Register
Login
Home
/
Archives
/
Vol. 14 No. 2 (2014)
Vol. 14 No. 2 (2014)
Published:
2014-05-23
Front Matter
Spring 2014 Table of Contents and Publication Information
i-iv
PDF
Articles
Break on Through: An Analysis of Computer Damage Cases
Ioana Vasiu, Lucian Vasiu
158-201
PDF
Mining the Final Frontier: Keeping Earth's Asteroid Mining Ventures from Becoming the Next Gold Rush
Matthew Feinman
202-235
PDF
An Argument for States to Outlaw 'Revenge Porn' and for Congress to Amend 47 U.S.C. §230: How Our Current Laws Do Little to Protect Victims
Casey Martinez
236-252
PDF
Too Much Too Soon? A Case for Hesitancy in the Passage of State and Federal Password Protection Laws
Megan Davis
253-272
PDF
Staff Article Series
Introduction: Cybersecurity in Pittsburgh
Kevin D. Ashley
273-275
PDF
Creating a Model of Cyber Proficiency: Remodeling Law Enforcement Tactics in Pittsburgh to Address the Evolving Nature of Cybersecurity
Elizabeth Orton, Chris Schlag
276-279
PDF
What Does It Take to Survive a Breach in Today’s High- Risk World? When Your Prevention Fails (and It’s Going to Fail), What Do You Do?
Scott M. Angelo
280-292
PDF
A Voluntary Cybersecurity Framework Is Unworkable- Government Must Crack the Whip
Robert Gyenes
293-314
PDF
Throwing New Flags: Should There Be Criminal Sanctions or a Better Chance of Civil Sanctions for Lawyers or Service Providers Who Breach Confidentiality?
Lea L. Lach
315-332
PDF
Cyber-Takings: The War on Crime Moves into the Cloud
Larry McIntyre
333-350
PDF
An Era of Rapid Change: The Abdication of Cash & the FTC's Unfairness Authority
Elie Freedman
351-382
PDF
Keywords