Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Law (87)
- Computer Law (35)
- Physical Sciences and Mathematics (25)
- Computer Sciences (24)
- Social and Behavioral Sciences (24)
-
- Information Security (23)
- Engineering (18)
- Computer Engineering (17)
- Electrical and Computer Engineering (17)
- Forensic Science and Technology (16)
- Legal Studies (16)
- Internet Law (12)
- Intellectual Property Law (10)
- Communications Law (7)
- International Law (7)
- Privacy Law (7)
- Science and Technology Law (7)
- Communication (5)
- First Amendment (5)
- Legislation (5)
- Antitrust and Trade Regulation (4)
- Arts and Humanities (4)
- Administrative Law (3)
- Consumer Protection Law (3)
- Education (3)
- Journalism Studies (3)
- Law and Society (3)
- Mass Communication (3)
- Banking and Finance Law (2)
- Business (2)
- Institution
-
- Embry-Riddle Aeronautical University (23)
- Penn State Dickinson Law (9)
- The Catholic University of America, Columbus School of Law (5)
- US Army War College (5)
- New York Law School (4)
-
- Nova Southeastern University (4)
- Schulich School of Law, Dalhousie University (4)
- University of Michigan Law School (4)
- University of North Carolina School of Law (4)
- Case Western Reserve University School of Law (3)
- Duquesne University (3)
- Kansas State University Libraries (3)
- Maurer School of Law: Indiana University (3)
- San Jose State University (3)
- Santa Clara Law (3)
- UIC School of Law (3)
- Vanderbilt University Law School (3)
- Brooklyn Law School (2)
- California Polytechnic State University, San Luis Obispo (2)
- California State University, San Bernardino (2)
- Duke Law (2)
- Fordham Law School (2)
- Kennesaw State University (2)
- Syracuse University (2)
- U.S. Naval War College (2)
- UC Law SF (2)
- University of Miami Law School (2)
- University of Nebraska - Lincoln (2)
- University of Richmond (2)
- University of Washington School of Law (2)
- Keyword
-
- Internet (4)
- Computer forensics (3)
- Cyber (3)
- Fraud (3)
- Newspaper (3)
-
- Security (3)
- Spartan Daily (3)
- Technology (3)
- C4ISR (2)
- Computer (2)
- Cyber Law (2)
- Cybercrime (2)
- Defamation (2)
- FCC (2)
- Federal Communications Commission (2)
- First Amendment (2)
- Free Speech (2)
- Free speech (2)
- Geneva (2)
- IHL (2)
- Information (2)
- LOAC (2)
- Law of Armed Conflict (2)
- Lesbian (2)
- Neocolonialism (2)
- Network (2)
- Operational Law (2)
- Copyright infringement (1)
- Fair use doctrine (1)
- Peer-to-peer computing (1)
- Publication
-
- Journal of Digital Forensics, Security and Law (23)
- Dickinson Law Review (1908-2003) (9)
- CommLaw Conspectus: Journal of Communications Law and Technology Policy (1993-2015) (5)
- The US Army War College Quarterly: Parameters (5)
- Canadian Journal of Law and Technology (4)
-
- NYLS Law Review (4)
- Federal Communications Law Journal (3)
- Innovate: Journal of Online Education (3)
- Santa Clara High Technology Law Journal (3)
- Spartan Daily (School of Journalism and Mass Communications) (3)
- Studies in 20th & 21st Century Literature (3)
- Vanderbilt Journal of Entertainment & Technology Law (3)
- Asia Pacific Media Educator (2)
- Cal Poly Magazine (2)
- Fordham Law Review (2)
- International Law Studies (2)
- Journal of International Technology and Information Management (2)
- Nebraska Law Review (2)
- North Carolina Journal of International Law (2)
- Richmond Journal of Law & Technology (2)
- Spiritan Magazine (2)
- UC Law SF Communications and Entertainment Journal (2)
- UIC Review of Intellectual Property Law (2)
- University of Miami Inter-American Law Review (2)
- Washington Journal of Law, Technology & Arts (2)
- African Journal of Criminology and Justice Studies (1)
- African Social Science Review (1)
- Animal Law Review (1)
- Brooklyn Journal of International Law (1)
- Buffalo Human Rights Law Review (1)
Articles 1 - 30 of 146
Full-Text Articles in Entire DC Network
Deviant Dreams: Extreme Associates And The Case For Porn, Sienna Baskin
Deviant Dreams: Extreme Associates And The Case For Porn, Sienna Baskin
City University of New York Law Review
No abstract provided.
War, Technology, And The Law Of Armed Conflict, Michael N. Schmitt
War, Technology, And The Law Of Armed Conflict, Michael N. Schmitt
International Law Studies
No abstract provided.
The Legal Status Of Spyware, Daniel B. Garrie, Alan F. Blakley, Mathew J. Armstrong
The Legal Status Of Spyware, Daniel B. Garrie, Alan F. Blakley, Mathew J. Armstrong
Federal Communications Law Journal
This Article examines the legal status of Spyware under federal and common law in the United States of America. The Authors begin with a technical overview of Spyware technology, which covers Spyware's functionality, methods of dispersion, and classification. The Authors then analyze the treatment of Spyware under the Computer Fraud and Abuse Act, the Stored Communications Act, the Wiretap Act, and under general tort claims of trespass to chattels, invasion of privacy, and intrusion upon seclusion. The Authors conclude that none of the aformentioned causes of action provide an adequate remedy at law for Spyware victims. Moreover, the Authors note …
Safer (Cyber)Sex With .Xxx: The Case For First Amendment Zoning Of The Internet, Patty Chan
Safer (Cyber)Sex With .Xxx: The Case For First Amendment Zoning Of The Internet, Patty Chan
Loyola of Los Angeles Law Review
No abstract provided.
Editor's Note: Contextualising The Teaching Of Journalism, Eric Loo
Editor's Note: Contextualising The Teaching Of Journalism, Eric Loo
Asia Pacific Media Educator
Three years ago in Toronto at the AEJMC pre-convention workshop I met with a group of journalism educators. We explored how we could better contextualise the delivery of journalism programmes to stay in tune with an internet-wired world. One of the imperatives we noted was to expose journalism students to learning opportunities where they could look at issues and affairs beyond the boundaries of their immediate community; and to develop in students the journalistic aptitude for interpreting and contextualising issues from a cross-cultural, ‘global’ perspective.
Blogging As Pedagogic Practice: Artefact And Ecology, Marcus O'Donnell
Blogging As Pedagogic Practice: Artefact And Ecology, Marcus O'Donnell
Asia Pacific Media Educator
Much of the published discussion and research on blogs and teaching and learning in higher education focuses on evaluation of blogging as a communicative technique. This type of discussion largely assumes that successful integration of blogging into course delivery should be judged against a pre-existing and unchallenged pedagogical model. This paper argues that to leverage its full educational potential blogging must be understood not just as an isolated phenomena, but as part of a broad palette of cybercultural practices which provide us with new ways of doing and thinking. The paper looks at the ways broader theoretical models associated with …
The Five Indicia Of Virtual Property, Charles Blazer
The Five Indicia Of Virtual Property, Charles Blazer
The University of New Hampshire Law Review
[Excerpt] “Many Americans use “it” every day. Although it is intangible, it may be worth thousands of dollars. Because we can both control it and prevent other people from controlling it, we assume, without much thought, that we own it. Sometimes we pay someone a monthly fee to hold it for us. Sometimes, simply by using it, we increase its value. When we finish using it, we often sell it.
“It” is virtual property, and it may take the form of an email address, a website, a bidding agent, a video game character, or any number of other intangible, digital …
Setting Software Defaults: Perspectives From Law, Computer Science And Behavioral Economics, Jay P. Kesan, Rajiv C. Shah
Setting Software Defaults: Perspectives From Law, Computer Science And Behavioral Economics, Jay P. Kesan, Rajiv C. Shah
Notre Dame Law Review
No abstract provided.
Whose Tube? A Contributory Copyright Infringement Analysis Of The Pending Lawsuit, Robert Tur V. Youtube Inc., Philip Kunz
Whose Tube? A Contributory Copyright Infringement Analysis Of The Pending Lawsuit, Robert Tur V. Youtube Inc., Philip Kunz
DePaul Journal of Art, Technology & Intellectual Property Law
No abstract provided.
Article Index, Vol. Xxxvi, 2006, Parameters Editors
Article Index, Vol. Xxxvi, 2006, Parameters Editors
The US Army War College Quarterly: Parameters
No abstract provided.
Spartan Daily, October 10, 2006, San Jose State University, School Of Journalism And Mass Communications
Spartan Daily, October 10, 2006, San Jose State University, School Of Journalism And Mass Communications
Spartan Daily (School of Journalism and Mass Communications)
Volume 127, Issue 25
When Is Employee Blogging Protected By Section 7 Of The Nlra?, Katherine M. Scott
When Is Employee Blogging Protected By Section 7 Of The Nlra?, Katherine M. Scott
Duke Law & Technology Review
The National Labor Relations Act forbids employers from retaliating against certain types of employee speech or intimidating those who engage in it. This iBrief examines how blogging fits into the current statutory framework and recommends how the National Labor Relations Board and the courts should address the unique features of employee blogs.
Spartan Daily, October 2, 2006, San Jose State University, School Of Journalism And Mass Communications
Spartan Daily, October 2, 2006, San Jose State University, School Of Journalism And Mass Communications
Spartan Daily (School of Journalism and Mass Communications)
Volume 127, Issue 20
Common Law Property Metaphors On The Internet: The Real Problem With The Doctrine Of Cybertrespass, Shyamkrishna Balganesh
Common Law Property Metaphors On The Internet: The Real Problem With The Doctrine Of Cybertrespass, Shyamkrishna Balganesh
Michigan Telecommunications & Technology Law Review
The doctrine of cybertrespass represents one of the most recent attempts by courts to apply concepts and principles from the real world to the virtual world of the Internet. A creation of state common law, the doctrine essentially involved extending the tort of trespass to chattels to the electronic world. Consequently, unauthorized electronic interferences are deemed trespassory intrusions and rendered actionable. The present paper aims to undertake a conceptual study of the evolution of the doctrine, examining the doctrinal modifications courts were required to make to mould the doctrine to meet the specificities of cyberspace. It then uses cybertrespass to …
Preserve Or Perish; Destroy Or Drown - Ediscovery Morphs Into Electronic Information Management, Robert D. Brownstone
Preserve Or Perish; Destroy Or Drown - Ediscovery Morphs Into Electronic Information Management, Robert D. Brownstone
North Carolina Journal of Law & Technology
No abstract provided.
Solid Waste Management And Environmental Quality Provision In Unplanned Settlements Of Kampala, Uganda, Lwasa Shuaib
Solid Waste Management And Environmental Quality Provision In Unplanned Settlements Of Kampala, Uganda, Lwasa Shuaib
African Social Science Review
Popular modes of provisioning for solid waste management in urban areas are increasingly becoming a common feature in urban management as it replaces the formal modes of utility provision. This is in response to the inadequate provision of the basic utilities including waste collection and disposal. The poor environment created has compelled popular masses to cooperate with the intention of reducing the problems of poor environmental sanitation. The quality of the environment in a given place will influence the quality of life and reproduction processes for its residents, and in this respect, the built environment is important in ensuring a …
A Time To Act Anew: A Historical Perspective On The Energy Policy Act Of 2005 And The Changing Electrical Energy Market, Brad Sherman
A Time To Act Anew: A Historical Perspective On The Energy Policy Act Of 2005 And The Changing Electrical Energy Market, Brad Sherman
William & Mary Environmental Law and Policy Review
No abstract provided.
Dystopia And Civilizations: Comparison Of Social Movements In The Network Society, Adán Stevens-Díaz
Dystopia And Civilizations: Comparison Of Social Movements In The Network Society, Adán Stevens-Díaz
Comparative Civilizations Review
No abstract provided.
Human Rights Realization In An Era Of Globalization: The Indian Experience, Surya Deva
Human Rights Realization In An Era Of Globalization: The Indian Experience, Surya Deva
Buffalo Human Rights Law Review
No abstract provided.
Repeat Infringement In The Digital Millennium Copyright Act, Andres Sawicki
Repeat Infringement In The Digital Millennium Copyright Act, Andres Sawicki
University of Chicago Law Review
No abstract provided.
Spartan Daily, August 29, 2006, San Jose State University, School Of Journalism And Mass Communications
Spartan Daily, August 29, 2006, San Jose State University, School Of Journalism And Mass Communications
Spartan Daily (School of Journalism and Mass Communications)
Volume 127, Issue 3
The Union Workplace Meets Big Brother: Advising Clients On Employer Conduct With Regard To Hidden Surveillance, Jamila Asha Johnson
The Union Workplace Meets Big Brother: Advising Clients On Employer Conduct With Regard To Hidden Surveillance, Jamila Asha Johnson
Washington Journal of Law, Technology & Arts
Hidden cameras may guide a union employer to find employee misconduct, but at what cost? Since the late 1990s, two federal appeals courts and the National Labor Relations Board (NLRB) have required employers to bargain with unions before using hidden video surveillance to observe employees. Until more recently, however, it was less apparent how lawyers should advise clients when an employer wished to use hidden cameras or had already installed non-disclosed video surveillance. In August 2005, the D.C. Circuit Court of Appeals decided a case surrounding surveillance at an Anheuser-Busch facility, which provided further guidance on these issues. This Article …
Spiritan Magazine Vol. 30 No. 3
There's Just Something About Fondwa, Brian Mcelroy
There's Just Something About Fondwa, Brian Mcelroy
Spiritan Magazine
No abstract provided.
Privacy Issues Affecting Employers, Employees, And Labor Organizations, Charles B. Craver
Privacy Issues Affecting Employers, Employees, And Labor Organizations, Charles B. Craver
Louisiana Law Review
No abstract provided.
Electronic Trespass In Canada: The Protection Of Private Property On The Internet, James Macdonald
Electronic Trespass In Canada: The Protection Of Private Property On The Internet, James Macdonald
Canadian Journal of Law and Technology
This paper argues that Canadian courts can, and should, adopt electronic trespass as a viable cause of action for the protection of property rights on the Internet. Of course, this conclusion presupposes that property rights in fact exist on the Internet. While American courts have accepted the existence of property rights on the Internet without any real controversy, a significant body of criticism has developed around American jurisprudence. Part III examines the critiques levelled against the assumption of property rights inherent in electronic trespass, and argues that there are property rights that need to be protected on the Internet. Part …
Primacy Without A Plan?, Nathan Freier
Primacy Without A Plan?, Nathan Freier
The US Army War College Quarterly: Parameters
No abstract provided.