Pauline Reich | Waseda University (original) (raw)

Related Authors

Andreas Umland

Nikos Passas

Remo Caponi

Armando Marques-Guedes

Enrico Cirelli

Andrew N Liaropoulos

Tim Stevens

Guido Noto La Diega

André Bueno

André Bueno

UERJ - Universidade do Estado do Rio de Janeiro / Rio de Janeiro State University

Nicola Lupo

Uploads

Papers by Pauline Reich

Research paper thumbnail of Cambodia: An Internet-based Bibliography

The Australian Journal of Asian Law, 1999

This bibliographical article reviews select examples of the extensive information about Cambodia ... more This bibliographical article reviews select examples of the extensive information about Cambodia currently available on the Internet.

Research paper thumbnail of Case study: India - Terrorism and terrorist use of the internet/technology

The purpose of this chapter is to analyze terrorist use of technology in the Mumbai attacks of No... more The purpose of this chapter is to analyze terrorist use of technology in the Mumbai attacks of November 2008 and the use of law to prosecute terrorists availing themselves of technological measures to plan and carry out attacks. The Mumbai attacks are also placed in the context of terrorism in India, by looking at identified terrorist groups and incidents. It should be noted that India adopted amendments to its 2000 IT Act in December 2008, following the attacks, and these amendments include provisions related to cyber terrorism, which might be applied going forward if necessary. It should also be noted that Pakistan adopted similar legislation in 2007 and in 2008, and Bangladesh states that it is in the process of adopting such legislation. Both India and Pakistan have made cyber terrorism punishable by death penalties. The definitions of cyber terrorism in their legislation are provided in this chapter. The chapter also analyzes the level of technological know-how exhibited by the...

Research paper thumbnail of After \u3ci\u3eAvagliano v. Sumitomo Shoji America, Inc.\u3c/i\u3e: What Standard of Title VII Will Apply to Foreign-Owned U.S. Subsidiaries and Branches?

Research paper thumbnail of The Struggle to Pass US Cybersecurity Legislation and the President's Executive Order

Research paper thumbnail of Cloud Computing and Security

Lecture Notes in Computer Science, 2015

Research paper thumbnail of Law, Policy and Technology: Cyberterrorism, Information Warfare and Internet Immobilization

In the information society, technology has become ubiquitous, but its intrinsic vulnerabilities a... more In the information society, technology has become ubiquitous, but its intrinsic vulnerabilities and the complexity of managing mission-critical systems create an attractive target for potential attackers. Law, Policy and Technology: Cyberterorrism, Information Warfare and Internet Immobilization provides relevant frameworks and best practices as well as current empirical research findings in the area. It is aimed at professionals who want to improve their understanding of the impact of cyber-attacks on critical infrastructures and other information systems essential to the smooth running of society, how such attacks are carried out, what measures should be taken to mitigate their impact and what lessons can be learned from the attacks and simulations of the last few years.

Research paper thumbnail of Case Study

Cyberterrorism, Information Warfare, and Internet Immobilization, 2012

Research paper thumbnail of 6. Dispute Resolution in Japan and with Japanese Parties

Law and business in Japan, 2000

Research paper thumbnail of Cybercrime and Security

Page 1. Cybercrime & Security Compiled & Edited by Pauline C. Reich Volume 1 For Customer... more Page 1. Cybercrime & Security Compiled & Edited by Pauline C. Reich Volume 1 For Customer Assistance Call 1-800-328-4880 K 2012 Thomson Reuters/West, 5/2012 Mat #41260017 Page 2. © 2012 Thomson Reuters This ...

Research paper thumbnail of Women and the Law: An Annotated Internet-Based Bibliography for US and International Legal Research

Tex. J. Women & L., 1996

... at university level funded by Waseda University. She wishes to especially thank her colleague... more ... at university level funded by Waseda University. She wishes to especially thank her colleague Professor James Fegan, coordinator of the project, for his unfailing support and assistance. In addition, she wishes to thank and ...

Research paper thumbnail of After Avagliano v. Sumitomo Shoji America, Inc.: What Standard of Title VII Will Apply to Foreign-Owned US Subsidiaries and Branches

Research paper thumbnail of Recent Developments in American Affirmative Action Law and Their Implications for Japanese-Owned U.S. Companies

Waseda Bulletin of Comparative Law, Sep 1, 1996

Research paper thumbnail of Recent Developments in American Affirmative Action Law and Their Implications for Japanese-Owned US Companies

Waseda bulletin of comparative law, 1996

Research paper thumbnail of Obituary: Karl G. Li (1937-1982)

Research paper thumbnail of Cybercrime and Jurisdiction In Japan

Information Technology and Law Series, 2006

Research paper thumbnail of Japan's Literary Feminists: The "Seito" Group

Signs: Journal of Women in Culture and Society, 1976

Despite an active and productive first-wave feminist movement, which predates by two generations ... more Despite an active and productive first-wave feminist movement, which predates by two generations current international efforts to improve the status of women, present-day Japan, with its" modern" society dominated by samurai in business suits, does not reflect the ...

Research paper thumbnail of Karl G. Li (1937–1982)

The Journal of Asian Studies, 1984

Research paper thumbnail of Japanese Labor Law

The Journal of Asian Studies, 1992

Research paper thumbnail of T. Boone Pickens and Corporate Governance in Japan--A Retrospective View of Three Sides of the Story and Recent Developments

Research paper thumbnail of After Avagliano v. Sumitomo Shoji America, Inc.: What Standard of Title VII Will Apply to Foreign-Owned U.S. Subsidiaries and Branches?

Boston College Third World Law Journal, 1990

Research paper thumbnail of Cambodia: An Internet-based Bibliography

The Australian Journal of Asian Law, 1999

This bibliographical article reviews select examples of the extensive information about Cambodia ... more This bibliographical article reviews select examples of the extensive information about Cambodia currently available on the Internet.

Research paper thumbnail of Case study: India - Terrorism and terrorist use of the internet/technology

The purpose of this chapter is to analyze terrorist use of technology in the Mumbai attacks of No... more The purpose of this chapter is to analyze terrorist use of technology in the Mumbai attacks of November 2008 and the use of law to prosecute terrorists availing themselves of technological measures to plan and carry out attacks. The Mumbai attacks are also placed in the context of terrorism in India, by looking at identified terrorist groups and incidents. It should be noted that India adopted amendments to its 2000 IT Act in December 2008, following the attacks, and these amendments include provisions related to cyber terrorism, which might be applied going forward if necessary. It should also be noted that Pakistan adopted similar legislation in 2007 and in 2008, and Bangladesh states that it is in the process of adopting such legislation. Both India and Pakistan have made cyber terrorism punishable by death penalties. The definitions of cyber terrorism in their legislation are provided in this chapter. The chapter also analyzes the level of technological know-how exhibited by the...

Research paper thumbnail of After \u3ci\u3eAvagliano v. Sumitomo Shoji America, Inc.\u3c/i\u3e: What Standard of Title VII Will Apply to Foreign-Owned U.S. Subsidiaries and Branches?

Research paper thumbnail of The Struggle to Pass US Cybersecurity Legislation and the President's Executive Order

Research paper thumbnail of Cloud Computing and Security

Lecture Notes in Computer Science, 2015

Research paper thumbnail of Law, Policy and Technology: Cyberterrorism, Information Warfare and Internet Immobilization

In the information society, technology has become ubiquitous, but its intrinsic vulnerabilities a... more In the information society, technology has become ubiquitous, but its intrinsic vulnerabilities and the complexity of managing mission-critical systems create an attractive target for potential attackers. Law, Policy and Technology: Cyberterorrism, Information Warfare and Internet Immobilization provides relevant frameworks and best practices as well as current empirical research findings in the area. It is aimed at professionals who want to improve their understanding of the impact of cyber-attacks on critical infrastructures and other information systems essential to the smooth running of society, how such attacks are carried out, what measures should be taken to mitigate their impact and what lessons can be learned from the attacks and simulations of the last few years.

Research paper thumbnail of Case Study

Cyberterrorism, Information Warfare, and Internet Immobilization, 2012

Research paper thumbnail of 6. Dispute Resolution in Japan and with Japanese Parties

Law and business in Japan, 2000

Research paper thumbnail of Cybercrime and Security

Page 1. Cybercrime & Security Compiled & Edited by Pauline C. Reich Volume 1 For Customer... more Page 1. Cybercrime & Security Compiled & Edited by Pauline C. Reich Volume 1 For Customer Assistance Call 1-800-328-4880 K 2012 Thomson Reuters/West, 5/2012 Mat #41260017 Page 2. © 2012 Thomson Reuters This ...

Research paper thumbnail of Women and the Law: An Annotated Internet-Based Bibliography for US and International Legal Research

Tex. J. Women & L., 1996

... at university level funded by Waseda University. She wishes to especially thank her colleague... more ... at university level funded by Waseda University. She wishes to especially thank her colleague Professor James Fegan, coordinator of the project, for his unfailing support and assistance. In addition, she wishes to thank and ...

Research paper thumbnail of After Avagliano v. Sumitomo Shoji America, Inc.: What Standard of Title VII Will Apply to Foreign-Owned US Subsidiaries and Branches

Research paper thumbnail of Recent Developments in American Affirmative Action Law and Their Implications for Japanese-Owned U.S. Companies

Waseda Bulletin of Comparative Law, Sep 1, 1996

Research paper thumbnail of Recent Developments in American Affirmative Action Law and Their Implications for Japanese-Owned US Companies

Waseda bulletin of comparative law, 1996

Research paper thumbnail of Obituary: Karl G. Li (1937-1982)

Research paper thumbnail of Cybercrime and Jurisdiction In Japan

Information Technology and Law Series, 2006

Research paper thumbnail of Japan's Literary Feminists: The "Seito" Group

Signs: Journal of Women in Culture and Society, 1976

Despite an active and productive first-wave feminist movement, which predates by two generations ... more Despite an active and productive first-wave feminist movement, which predates by two generations current international efforts to improve the status of women, present-day Japan, with its" modern" society dominated by samurai in business suits, does not reflect the ...

Research paper thumbnail of Karl G. Li (1937–1982)

The Journal of Asian Studies, 1984

Research paper thumbnail of Japanese Labor Law

The Journal of Asian Studies, 1992

Research paper thumbnail of T. Boone Pickens and Corporate Governance in Japan--A Retrospective View of Three Sides of the Story and Recent Developments

Research paper thumbnail of After Avagliano v. Sumitomo Shoji America, Inc.: What Standard of Title VII Will Apply to Foreign-Owned U.S. Subsidiaries and Branches?

Boston College Third World Law Journal, 1990

Log In