Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication Year
- Publication
-
- Indiana Law Journal (3)
- Michigan Journal of International Law (3)
- Michigan Law Review (3)
- Dalhousie Law Journal (2)
- Pepperdine Law Review (2)
-
- Duke Law & Technology Review (1)
- Federal Communications Law Journal (1)
- Loyola of Los Angeles Law Review (1)
- Michigan Law Review First Impressions (1)
- Michigan Telecommunications & Technology Law Review (1)
- Northwestern Journal of International Law & Business (1)
- Northwestern University Law Review (1)
- Villanova Law Review (1)
- Washington and Lee Law Review (1)
Articles 1 - 22 of 22
Full-Text Articles in Law
Where To Prosecute Cybercrimes, Jacob T. Wall
Where To Prosecute Cybercrimes, Jacob T. Wall
Duke Law & Technology Review
Selecting the appropriate venue for a criminal trial has been a matter of constitutional concern since the founding of the country. The issue is thought to be essential to the fair administration of justice and thus public confidence in the criminal justice system. Constitutionally, crimes must be prosecuted in the states and districts in which they were committed. However, the rise of cybercrime has complicated the venue inquiry: cyberspace, the domain of cybercrime, and physical space have become increasingly decoupled. Consequently, under America’s primary but dated cybercrime law, the ideal location for a trial may not be a constitutionally proper …
Siri-Ously? Free Speech Rights And Artificial Intelligence, Toni M. Massaro, Helen Norton
Siri-Ously? Free Speech Rights And Artificial Intelligence, Toni M. Massaro, Helen Norton
Northwestern University Law Review
Computers with communicative artificial intelligence (AI) are pushing First Amendment theory and doctrine in profound and novel ways. They are becoming increasingly self-directed and corporal in ways that may one day make it difficult to call the communication ours versus theirs. This, in turn, invites questions about whether the First Amendment ever will (or ever should) cover AI speech or speakers even absent a locatable and accountable human creator. In this Article, we explain why current free speech theory and doctrine pose surprisingly few barriers to this counterintuitive result; their elasticity suggests that speaker humanness no longer may be …
Silencing The Call To Arms: A Shift Away From Cyber Attacks As Warfare, Ryan Patterson
Silencing The Call To Arms: A Shift Away From Cyber Attacks As Warfare, Ryan Patterson
Loyola of Los Angeles Law Review
Cyberspace has developed into an indispensable aspect of modern society, but not without risk. Cyber attacks have increased in frequency, with many states declaring cyber operations a priority in what has been called the newest domain of warfare. But what rules govern? The Tallinn Manual on the International Law Applicable to Cyber Warfare suggests existent laws of war are sufficient to govern cyber activities; however, the Tallinn Manual ignores fundamental problems and unique differences between cyber attacks and kinetic attacks. This Article argues that several crucial impediments frustrate placing cyber attacks within the current umbra of warfare, chiefly the problems …
Aftermarketfailure: Windows Xp's End Of Support, Andrew Tutt
Aftermarketfailure: Windows Xp's End Of Support, Andrew Tutt
Michigan Law Review First Impressions
After 12 years, support for Windows XP will end on April 8, 2014. So proclaims a Microsoft website with a helpful clock counting down the days. "What does this mean?" the website asks. "It means you should take action." You should "migrate to a current supported operating system - such as Windows 8.1 - so you can receive regular security updates to protect [your] computer from malicious attacks." The costs of mass migration will be immense. About 30% of all desktop PCs are running Windows XP right now. An estimated 10% of the U.S. government's computers run Windows XP, including …
Protection Of Intellectual Property Rights In Computers And Computer Programs: Recent Developments , Alan C. Rose
Protection Of Intellectual Property Rights In Computers And Computer Programs: Recent Developments , Alan C. Rose
Pepperdine Law Review
The following article examines the protection offered to computers and computer programs, under the various applicable patent, copyright and trade secret laws. Concerning patent protection; the author discusses the history and current status of the patent laws, and analyzes in detail the landmark case of Diamond v. Diehr. Discussed also is an analysis of copyright protection for computer programs, offered by the 1980 amendments to section 117 of the 1976 Copyright Act; which paved the way for the increased protection.
The Discovery And Use Of Computerized Information: An Examination Of Current Approaches, Richard M. Long
The Discovery And Use Of Computerized Information: An Examination Of Current Approaches, Richard M. Long
Pepperdine Law Review
In recent years, the legal profession has run head on into the increasing use of computers and computerized information. Discovery and evidentiary rules developed to deal with written documentation may not be flexible enough to adequately cover this relatively new method of storing information. This comment examines various methods by which courts have attempted to deal with discovery and evidentiary problems involving computerized information, and suggests certain areas that should be explored in supporting or attacking the credibility of such information.
Computer Searches And Seizures: Some Unresolved Issues, Susan W. Brenner, Barbara A. Frederiksen
Computer Searches And Seizures: Some Unresolved Issues, Susan W. Brenner, Barbara A. Frederiksen
Michigan Telecommunications & Technology Law Review
The goal of this article is to illustrate the issues that arise in the context of computer search and seizures by examining several areas in which the application of Fourth Amendment concepts to computer searches and/or seizures can be problematic. In order to illustrate this point, the article will build on a hypothetical. The hypothetical situation assumes law enforcement officers have lawfully obtained a warrant to search for and seize evidence concerning the commission of one or more crimes. It will also be assumed that computer technology played some role in the commission of these crimes, so computer equipment and …
How Far Have We Come, And Where Do We Go From Here: The Status Of Global Computer Software Protection Under The Trips Agreement, Aaron D. Charfoos
How Far Have We Come, And Where Do We Go From Here: The Status Of Global Computer Software Protection Under The Trips Agreement, Aaron D. Charfoos
Northwestern Journal of International Law & Business
The TRIPS agreement made significant advances over the pre-TRIPS international regime with respect to the protection of computer software. There are at least two significant advances. First, computer software protections have been embedded into the new dispute resolution procedures. Second, both object and source code are protected under the copyright sections of the Agreement. The dispute resolution procedures provide back-end protection (protection after offenses have occurred), while new copyright provisions provide affirmative front-end protection (protection deterring such offenses). However, the Agreement could have, and should have, gone farther to protect the software industry. By not formally deciding on the ability …
Humans, Computers, And Binding Commitment, Margaret Jane Radin
Humans, Computers, And Binding Commitment, Margaret Jane Radin
Indiana Law Journal
Addison C. Harris Lecture at the Indiana University School of Law-Bloomington on October 26, 1999.
The Computer As Advocate: An Approach To Computer-Generated Displays In The Courtroom, Mario Borelli
The Computer As Advocate: An Approach To Computer-Generated Displays In The Courtroom, Mario Borelli
Indiana Law Journal
No abstract provided.
Smart Agenting, Barry Diller
Defining Computer Program Parts Under Learned Hand's Abstractions Test In Software Copyright Infringement Cases, John W.L. Ogilive
Defining Computer Program Parts Under Learned Hand's Abstractions Test In Software Copyright Infringement Cases, John W.L. Ogilive
Michigan Law Review
This Note proposes a set of computer program part definitions that develop Learned Hand's abstractions test to make it more useful in software infringement cases. The Note takes no position on the proper scope of protection for software under copyright law, but argues that no consensus is possible on which program parts deserve copyright protection until courts recognize that computer programs are composed of components whose definition lies beyond judicial control. Program parts defined in conclusory legal terms will never provide a stable basis for reasoned debate over the conclusions presumed in the definitions.
Computer Malpractice And Other Legal Problems Posed By Computer Vaporware, Ronald N. Weikers
Computer Malpractice And Other Legal Problems Posed By Computer Vaporware, Ronald N. Weikers
Villanova Law Review
No abstract provided.
Consumer Meets Computer: An Argument For Liberal Trademark Protection Of Computer Hardware Configurations Under Section 43(A) Of The Lanham Trademark Act
Washington and Lee Law Review
No abstract provided.
Language, Communication, Computers And The Law, R. A. Samek
Language, Communication, Computers And The Law, R. A. Samek
Dalhousie Law Journal
There is an old story about a drunken man who is looking for an object under a street light. A policeman asks him what he is looking for. "It is my keys", he says. "Did you lose them here?" "No, over there.'" "Why then are you looking for them over here?" "Because I can see here", is the man's reply. The real significance of this story is very different from what it appears. It is not the man who is foolish but the policeman. We can only look for something from where we can see it. The alternative is to …
The Patentability Of Computer Programs: Merrill Lynch's Patent For A Financial Services System, Lynne B. Allen
The Patentability Of Computer Programs: Merrill Lynch's Patent For A Financial Services System, Lynne B. Allen
Indiana Law Journal
No abstract provided.
Computer Retrieval – Drawing The Line?, Paul Thomas
Computer Retrieval – Drawing The Line?, Paul Thomas
Dalhousie Law Journal
The Master of the Rolls in England, Sir John Donaldson, said recently that he feared the use of a proliferation of useless materials from computers in presentations before the Court. He was probably echoing what Lord Diplock had to say for the House of Lords in Roberts Petroleum Ltd. v. Bernard Kenny Ltd. (in liquidation).1 In a lengthy per curiam speech, Lord Diplock in that case commented on the use sought to be made in the House of Lords and the Court of Appeal of previous unreported Court of Appeal judgments. The transcripts of shorthand notes of oral judgments rendered …
Integrated Servies Digital Network: Issues And Options For The World's Future Communications Systems, A. M. Rutkowski
Integrated Servies Digital Network: Issues And Options For The World's Future Communications Systems, A. M. Rutkowski
Michigan Journal of International Law
There has been virtually no public discussion of the significant public policy issues raised because of the intimidating nature of network engineering which forms the basis for nearly all the current dialogue. This paper discusses current ISDN developments, and sets forth an analytical framework within which these issues may be discussed.
The International Application Of The Second Computer Inquiry, Robert M. Frieden
The International Application Of The Second Computer Inquiry, Robert M. Frieden
Michigan Journal of International Law
This article chronicles the FCC's attempt to confront the confluence of telecommunications and data processing technologies by fashioning a regulatory scheme designed primarily for the United States. The Commission has chosen to apply this scheme, without significant qualification, internationally. Given the different objectives and structure of United States and foreign communications industries, the FCC's system cannot be transplanted abroad without prior consultation and substantial modification. After reviewing the international problems created by the Commission's application abroad of its newly developed scheme, this article concludes with recommendations for resolving these conflicts that currently threaten the well-being of carriers, customers, and international …
Direct Television Broadcasting And The Quest For Communication Equality, Howard C. Anawalt
Direct Television Broadcasting And The Quest For Communication Equality, Howard C. Anawalt
Michigan Journal of International Law
In the immediate past modem communication means such as efficient telephone and television systems have been viewed as the luxuries of well developed economies. Rapid advances in the field of communications and computer technologies have changed this basic outlook. Now, it is possible to use these technologies as tools of economic growth in both developed and developing countries. This is primarily because cost has gone down while efficiency has gone up. A recent article concerning small computers demonstrates the point. "If the aircraft industry had developed as spectacularly as the computer industry over the past twenty-five years, a Boeing 767 …
The Fcc Computer Inquiry: Interfaces Of Competitive And Regulated Markets, Michigan Law Review
The Fcc Computer Inquiry: Interfaces Of Competitive And Regulated Markets, Michigan Law Review
Michigan Law Review
Since the advent of computer technology, data processing and communication services have become increasingly interdependent. In 1966, the Federal Communications Commission launched the Computer Inquiry to explore the broad range of regulatory and policy problems generated by this technological development.2
Personal Privacy In The Computer Age: The Challenge Of A New Technology In An Information-Oriented Society, Arthur R. Miller
Personal Privacy In The Computer Age: The Challenge Of A New Technology In An Information-Oriented Society, Arthur R. Miller
Michigan Law Review
The purpose of this Article is to survey the new technology's implications for personal privacy and to evaluate the contemporary common-law and statutory pattern relating to data-handling. In the course of this examination, it will appraise the existing framework's capacity to deal with the problems created by society's growing awareness of the primordial character of information. The Article is intended to be suggestive; any attempt at definitiveness would be premature. Avowedly, it was written with the bias of one who believes that the new information technology has enormous long-range societal implications and who is concerned about the consequences of the …