507 research outputs found

    Coddling Spies: Why the Law Doesn’t Adequately Address Computer Spyware

    Get PDF
    Consumers and businesses have attempted to use the common law of torts as well as federal statutes like the Computer Fraud and Abuse Act, the Stored Wire and Electronic Communications and Transactional Records Act, and the Wiretap Act to address the expanding problem of spyware. Spyware, which consists of software applications inserted into another\u27s computer to report a user\u27s activity to an outsider, is as innocuous as tracking purchases or as sinister as stealing trade secrets or an individual\u27s identity. Existing law does not address spyware adequately because authorization language, buried in click-through boilerplate, renders much of current law useless. Congress must act to make spyware companies disclose their intentions with conspicuous and clearly-stated warnings

    The Legal Status of Spyware

    Get PDF
    This Article examines the legal status of Spyware under federal and common law in the United States of America. The Authors begin with a technical overview of Spyware technology, which covers Spyware\u27s functionality, methods of dispersion, and classification. The Authors then analyze the treatment of Spyware under the Computer Fraud and Abuse Act, the Stored Communications Act, the Wiretap Act, and under general tort claims of trespass to chattels, invasion of privacy, and intrusion upon seclusion. The Authors conclude that none of the aformentioned causes of action provide an adequate remedy at law for Spyware victims. Moreover, the Authors note that even if an adequate cause of action were to exist, Spyware developers could avoid civil litigation by operating solely within Spyware friendly jurisdictions. The Authors speculate that an appropriate solution would be for the legislature to require all Spyware programs to contain multi-click End User License Agreements. Not only would this approach protect consumers by enabling them to make informed decisions and creating an effective cause of action against Spyware distributors, it would also help the Spyware industry as a whole by legitimizing commercially viable Spyware programs

    The Legal Status of Spyware

    Get PDF
    This Article examines the legal status of Spyware under federal and common law in the United States of America. The Authors begin with a technical overview of Spyware technology, which covers Spyware\u27s functionality, methods of dispersion, and classification. The Authors then analyze the treatment of Spyware under the Computer Fraud and Abuse Act, the Stored Communications Act, the Wiretap Act, and under general tort claims of trespass to chattels, invasion of privacy, and intrusion upon seclusion. The Authors conclude that none of the aformentioned causes of action provide an adequate remedy at law for Spyware victims. Moreover, the Authors note that even if an adequate cause of action were to exist, Spyware developers could avoid civil litigation by operating solely within Spyware friendly jurisdictions. The Authors speculate that an appropriate solution would be for the legislature to require all Spyware programs to contain multi-click End User License Agreements. Not only would this approach protect consumers by enabling them to make informed decisions and creating an effective cause of action against Spyware distributors, it would also help the Spyware industry as a whole by legitimizing commercially viable Spyware programs

    Interpretations of Presburger Arithmetic in Itself

    Full text link
    Presburger arithmetic PrA is the true theory of natural numbers with addition. We study interpretations of PrA in itself. We prove that all one-dimensional self-interpretations are definably isomorphic to the identity self-interpretation. In order to prove the results we show that all linear orders that are interpretable in (N,+) are scattered orders with the finite Hausdorff rank and that the ranks are bounded in terms of the dimension of the respective interpretations. From our result about self-interpretations of PrA it follows that PrA isn't one-dimensionally interpretable in any of its finite subtheories. We note that the latter was conjectured by A. Visser.Comment: Published in proceedings of LFCS 201

    Sediment management for Horseshoe Lake and its watershed, Alexander County, Illinois

    Get PDF
    Illinois Department of Conservation Contract No. 1-5-39782published or submitted for publicationis peer reviewedOpe

    Circular quantum secret sharing

    Full text link
    A circular quantum secret sharing protocol is proposed, which is useful and efficient when one of the parties of secret sharing is remote to the others who are in adjacent, especially the parties are more than three. We describe the process of this protocol and discuss its security when the quantum information carrying is polarized single photons running circularly. It will be shown that entanglement is not necessary for quantum secret sharing. Moreover, the theoretic efficiency is improved to approach 100% as almost all the instances can be used for generating the private key, and each photon can carry one bit of information without quantum storage. It is straightforwardly to utilize this topological structure to complete quantum secret sharing with multi-level two-particle entanglement in high capacity securely.Comment: 7 pages, 2 figure

    Structure and reactivity of Trypanosoma brucei pteridine reductase: inhibition by the archetypal antifolate methotrexate

    Get PDF
    The protozoan Trypanosoma brucei has a functional pteridine reductase (TbPTR1), an NADPH-dependent short-chain reductase that participates in the salvage of pterins, which are essential for parasite growth. PTR1 displays broad-spectrum activity with pterins and folates, provides a metabolic bypass for inhibition of the trypanosomatid dihydrofolate reductase and therefore compromises the use of antifolates for treatment of trypanosomiasis. Catalytic properties of recombinant TbPTR1 and inhibition by the archetypal antifolate methotrexate have been characterized and the crystal structure of the ternary complex with cofactor NADP(+) and the inhibitor determined at 2.2 Å resolution. This enzyme shares 50% amino acid sequence identity with Leishmania major PTR1 (LmPTR1) and comparisons show that the architecture of the cofactor binding site, and the catalytic centre are highly conserved, as are most interactions with the inhibitor. However, specific amino acid differences, in particular the placement of Trp221 at the side of the active site, and adjustment of the β6-α6 loop and α6 helix at one side of the substrate-binding cleft significantly reduce the size of the substrate binding site of TbPTR1 and alter the chemical properties compared with LmPTR1. A reactive Cys168, within the active site cleft, in conjunction with the C-terminus carboxyl group and His267 of a partner subunit forms a triad similar to the catalytic component of cysteine proteases. TbPTR1 therefore offers novel structural features to exploit in the search for inhibitors of therapeutic value against African trypanosomiasis

    A simple combinatorial treatment of constructions and threshold gaps of ramp schemes

    Get PDF
    We give easy proofs of some recent results concerning threshold gaps in ramp schemes. We then generalise a construction method for ramp schemes employing error-correcting codes so that it can be applied using nonlinear (as well as linear) codes. Finally, as an immediate consequence of these results, we provide a new explicit bound on the minimum length of a code having a specified distance and dual distance

    Cancer risks from arsenic in drinking water.

    Get PDF
    Ingestion of arsenic, both from water supplies and medicinal preparations, is known to cause skin cancer. The evidence assessed here indicates that arsenic can also cause liver, lung, kidney, and bladder cancer and that the population cancer risks due to arsenic in U.S. water supplies may be comparable to those from environmental tobacco smoke and radon in homes. Large population studies in an area of Taiwan with high arsenic levels in well water (170-800 micrograms/L) were used to establish dose-response relationships between cancer risks and the concentration of inorganic arsenic naturally present in water supplies. It was estimated that at the current EPA standard of 50 micrograms/L, the lifetime risk of dying from cancer of the liver, lung, kidney, or bladder from drinking 1 L/day of water could be as high as 13 per 1000 persons. It has been estimated that more than 350,000 people in the United States may be supplied with water containing more than 50 micrograms/L arsenic, and more than 2.5 million people may be supplied with water with levels above 25 micrograms/L. For average arsenic levels and water consumption patterns in the United States, the risk estimate was around 1/1000. Although further research is needed to validate these findings, measures to reduce arsenic levels in water supplies should be considered
    corecore