Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 221,780,359 papers from all fields of science
Search
Sign In
Create Free Account
Computer Fraud and Abuse Act
Known as:
Computer Fraud and Abuse Act of 1986
, Aaron's Law
, Computer Crime Act
Expand
The Computer Fraud and Abuse Act (CFAA) was enacted by Congress in 1986 as an amendment to existing computer fraud law (18 U.S.C. § 1030), which had…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
45 relations
Acceptable use policy
Blackshades
Cisco IOS
Computer fraud
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2016
Review
2016
Planning To Design MOOC? Think First!
Alaa A. AlDahdouh
,
A. Osório
2016
Corpus ID: 54170918
Over the last years, educators have been forced to rethink about the whole education system. In 2005, Connectivism, a new…
Expand
2014
2014
Cyberattacks on Medical Devices and Hospital Networks: Legal Gaps and Regulatory Solutions
Kate Wellington
2014
Corpus ID: 166458005
2. FDA Regulation of Mobile Medical Applications Following the proliferation of medical devices with software components and the…
Expand
2013
2013
An Examination of Sexual Orientation- and Transgender-Based Hate Crimes in the Post-Matthew Shepard Era
R. Cramer
,
A. Kehn
,
C. Pennington
,
H. Wechsler
,
John W. Clark
,
J. Nagle
2013
Corpus ID: 56451328
Recent state and federal legislation such as the Hate Crimes Prevention Act (HCPA) addresses hate crime prevention and punishment…
Expand
2012
2012
Beyond WarGames: How the Computer Fraud and Abuse Act Should be Interpreted in the Employment Context
Matthew Kapitanyan
2012
Corpus ID: 34622437
The nation’s most important computer crime statute, the Computer Fraud and Abuse Act of 1986 (“CFAA”), has made its way into the…
Expand
Review
2011
Review
2011
Neoliberal Deviants and Surveillance: Welfare Recipients under the watchful eye of Ontario Works
Krystle Maki
2011
Corpus ID: 143173978
This article examines the current practices of welfare surveillance in Ontario Works (OW). Although neoliberal policy changes to…
Expand
2011
2011
Computer Hackers on the Cul-de-Sac: MySpace Suicide Indictment Under the Computer Fraud and Abuse Act Sets Dangerous Precedent
Caroline G. Jones
2011
Corpus ID: 156019722
This student note discusses the unprecedented indictment and trial of a MySpace user under the Computer Fraud and Abuse Act. This…
Expand
2011
2011
Restraining Amazon.com's Orwellian Potential: The Computer Fraud and Abuse Act as Consumer Rights Legislation
Alicia C. Sanders
2011
Corpus ID: 150995878
I. INTRODUCTION II. THE GA WRONSKI SETTLEMENT A. The Amazon Kindle B. The Gawronski Complaint and Settlement C. Historical…
Expand
2009
2009
Vagueness Challenges to the Computer Fraud and Abuse Act
Orin S. Kerr
2009
Corpus ID: 153826396
This Article argues that the void for vagueness doctrine requires courts to adopt narrow interpretations of the Computer Fraud…
Expand
Review
2000
Review
2000
Process Evaluation of the Computer Fraud and Abuse Act of 1986
Anele Nwokoma
2000
Corpus ID: 18402688
This study is an evaluation of the Computer Fraud and Abuse Act of 1986. The study reviews existing computer crime policy…
Expand
Highly Cited
1993
Highly Cited
1993
Challenging Criminal Disenfranchisement Under the Voting Rights Act: A New Strategy
A. L. Shapiro
1993
Corpus ID: 158386470
Just a few decades after the Civil War, Southern conservatives gathered at state constitutional conventions and codified a…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE