JLCW Volume 7, Fall 2018, Issue 1


  • Cyber-World War III: Origins
    Jon M. Garon
  • The Standard for Biometric Data Protection
    Fiona Q. Nguyen
  • Legal Ethics and Cybersecurity: Managing Client Confidentiality in the Digital Age
    Natasha Babazadeh


  • A Call to Congress: The Urgent Need for Cyberattack Amendments to the Foreign Sovereign Immunities Act
    Matthew A. Powell
  • An International Cyber Warfare Treaty: Historical Analogies and Future Prospects
    Alexi Franklin

Purchase on Amazon


JLCW Volume 6, Winter 2018, Issue 2

Special Comment

  • Resilience, Perseverance and Fortitude:  Lessons from My Parents
    Rhea Siers


  • Responding to the Call for a Digital Geneva Convention: An Open Letter to Brad Smith and the Technology Community
    David Wallace & Mark Visger
  • Does the Cryptographic Hashing of Passwords Qualify for Statutory Breach Notification Safe Harbor?
    Jason R. Wool
  • “Playing With Fire” An Inter-Agency Working Group Proposal for Connected Vehicle Technology and the DSRC Mandate
    Christopher Kolezynski


  • The Ransomware Assault on the Healthcare Sector
    Malcolm Harkins & Anthony M. Freed
  • German IT Security Law
    John A. Foulks

Purchase on Amazon