Most Recent Additions
El Salvador at the Crossroads: Crimes against Humanity under the Public Security Policy
Susana L. SaCouto, Claudia Martin, Gino Costa, Santiago Canton, and Jose Antonio Guevara
The Best Disinfectant: The Value of Transparency in Information Operations
Major Ian W. Stamme
Sept. 20-24, 1993, D. Bradlow, Greater Public Accountability Will Improve Efficacy of MDBs
Daniel Bradlow
Kidfluencer Protection: Illinois’ Attempt at Expanding its Version of the Coogan Law.
Genevieve Sloan
Reporting Materiality Under the SEC Cybersecurity Disclosure Rules: How Corporate Boards Balance Duty and Risk for Cyber Threats and Incidents
Deborah Slattery-Pereira
Corporate Cybersecurity Governance: Director Liability Under Europe’s NIS2 Directive and the Emerging Fiduciary Duty of Proactive Cybersecurity Oversight
Stacey B. Barrack
The Social Promise of Hybrid Entities
Frederick M. Spight Jr.
Serendipity and Self-Regulation: The Evolution of Cryptocurrency-Based Exchange-Traded Products
Onnig H. Dombalagian
Framing Harmonization: Illusion and Reality in the Riyadh Design Law Treaty
Christine Farley and Margo Bagley
Where Does A Hack Happen? Computer Intrusion Crimes and Constitutional Venue
Harrison Parker Blanchard Grant
Letter from the Editor
Davis Hayman
*Updated as of 04/12/26.