Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Law

PDF

2006

Institution
Keyword
Publication
Publication Type

Articles 91 - 120 of 152

Full-Text Articles in Law

A Comedy Of Errors: Defining "Component" In A Global Information Technology Market - Accounting For Innovation By Penalizing The Innovators, 24 J. Marshall J. Computer & Info. L. 507 (2006), William Greubel Jan 2006

A Comedy Of Errors: Defining "Component" In A Global Information Technology Market - Accounting For Innovation By Penalizing The Innovators, 24 J. Marshall J. Computer & Info. L. 507 (2006), William Greubel

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


A Duty Everlasting: The Perils Of Applying Traditional Doctrines Of Spoliation To Electronic Discovery, Michael R. Nelson, Mark H. Rosenberg Jan 2006

A Duty Everlasting: The Perils Of Applying Traditional Doctrines Of Spoliation To Electronic Discovery, Michael R. Nelson, Mark H. Rosenberg

Richmond Journal of Law & Technology

Amendments to the Federal Rules of Civil Procedure regarding electronic discovery are expected to take effect on December 1, 2006. These amendments are designed to alleviate the burden, expense and uncertainty that has resulted from the application of traditional discovery principles in the electronic age. These principles worked well in an era where discovery was primarily limited to the production of paper documentation, but have proved unworkable when applied to the discovery of electronic data, particularly in the “corporate world,” where even the most routine business discussions are captured in electronic format.5


A Dispatch From The Crypto Wars, A. Michael Froomkin Jan 2006

A Dispatch From The Crypto Wars, A. Michael Froomkin

Articles

Matt Curtin's Brute Force is a primarily personal account of one early effort to harness the power of distributed computing. In 1997, Mr. Curtin and other members of the DESCHALL (DES Challenge) project built, distributed, and managed software that united thousands of computers, many of them ordinary personal computers, in the search for a single decryption key among 72 quadrillion possibilities. The DESCHALL project sought to demonstrate that DES, then the U.S. national standard encryption algorithm, was no longer as secure as advertised. While Brute Force also offers some background on encryption regulation, export control policy, and other aspect of …


Virtual Espionage: Spyware And The Common Law Privacy Torts, Don Corbett Jan 2006

Virtual Espionage: Spyware And The Common Law Privacy Torts, Don Corbett

University of Baltimore Law Review

No abstract provided.


Search Engine Bias And The Demise Of Search Engine Utopianism, Eric Goldman Jan 2006

Search Engine Bias And The Demise Of Search Engine Utopianism, Eric Goldman

Faculty Publications

Due to search engines' automated operations, people often assume that search engines display search results neutrally and without bias. However, this perception is mistaken. Like any other media company, search engines affirmatively control their users' experiences, which has the consequence of skewing search results (a phenomenon called "search engine bias"). Some commentators believe that search engine bias is a defect requiring legislative correction. Instead, this Essay argues that search engine bias is the beneficial consequence of search engines optimizing content for their users. The Essay further argues that the most problematic aspect of search engine bias, the "winner-take all" effect …


Bigger Phish To Fry: Californias Anti- Phishing Statute And Its Potential Imposition Of Secondary Liability On Internet Service Providers, Camille Calman Jan 2006

Bigger Phish To Fry: Californias Anti- Phishing Statute And Its Potential Imposition Of Secondary Liability On Internet Service Providers, Camille Calman

Richmond Journal of Law & Technology

The incidence of phishing, a form of internet fraud, has increased dramatically since 2003. Identity thieves searching for vulnerabilities in internet security have realized that customers are the weak link. Using mass e-mailings and websites purporting to be those of well-known and trusted corporations, “phishers” trick customers into revealing personal and financial information.


Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Jon S. Player Jan 2006

Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Jon S. Player

Richmond Journal of Law & Technology

The Richmond Journal of Law and Technology is proud to present its second issue of the 2006–2007 academic school year. The Journal staff has worked diligently during the first half of the year to produce an exceptional issue.


Waiving The Privilege In A Storm Of Data: An Argument For Uniformity And Rationality In Dealing With The Inadvertent Production Of Privileged Materials In The Age Of Electronically Stored Information, Dennis R. Kiker Jan 2006

Waiving The Privilege In A Storm Of Data: An Argument For Uniformity And Rationality In Dealing With The Inadvertent Production Of Privileged Materials In The Age Of Electronically Stored Information, Dennis R. Kiker

Richmond Journal of Law & Technology

At the point where one of the most venerable principles of common law and the reality of modern information management collide, even the most diligent attorneys may become victims of the resulting fallout.


Teaching A Man To Fish: Why National Legislation Anchored In Notice And Consent Provisions Is The Most Effective Solution To The Spyware Problem, M. Angela Buenaventura Jan 2006

Teaching A Man To Fish: Why National Legislation Anchored In Notice And Consent Provisions Is The Most Effective Solution To The Spyware Problem, M. Angela Buenaventura

Richmond Journal of Law & Technology

The term “spyware” encompasses a wide range of software designed to intercept or take partial control of a computer. Spyware slows down computers and forces computer users to expend resources on repair and installation of protective software. Consumers also face the danger that personal information gathered through spyware will be misused. Thus, most people agree that spyware is an annoying and costly problem. However, there is no consensus on the best way to solve the spyware problem. This article examines the methods currently being used to battle spyware, as well as proposed national spyware legislation. The article outlines the various …


Shifting Burdens And Concealing Electronic Evidence: Discovery In The Digital Era, Rebecca Rockwood Jan 2006

Shifting Burdens And Concealing Electronic Evidence: Discovery In The Digital Era, Rebecca Rockwood

Richmond Journal of Law & Technology

In the twenty-first century, persons involved in the legal profession will be forced to confront technological issues. Computers and technology have pervaded every aspect of society, and the legal system is no exception. The discovery process is a dramatic example of how lawyers and courts strain to keep up with technological advances. Traditional discovery practices have been severely overhauled as electronic information becomes increasingly prevalent. What was once a simple discovery request can now become an overwhelming task, as defendants must wade through a plethora of electronic documents in an attempt to comply with the court’s discovery orders.


The Design Of An Undergraduate Degree Program In Computer & Digital Forensics, Gary C. Kessler, Michael E. Schirling Jan 2006

The Design Of An Undergraduate Degree Program In Computer & Digital Forensics, Gary C. Kessler, Michael E. Schirling

Journal of Digital Forensics, Security and Law

Champlain College formally started an undergraduate degree program in Computer & Digital Forensics in 2003. The underlying goals were that the program be multidisciplinary, bringing together the law, computer technology, and the basics of digital investigations; would be available as on online and oncampus offering; and would have a process-oriented focus. Success of this program has largely been due to working closely with practitioners, maintaining activity in events related to both industry and academia, and flexibility to respond to ever-changing needs. This paper provides an overview of how this program was conceived, developed, and implemented; its evolution over time; and …


Digital Copyright, Jessica D. Litman Jan 2006

Digital Copyright, Jessica D. Litman

Books

In 1998, copyright lobbyists succeeded in persuading Congress to enact laws greatly expanding copyright owners' control over individuals' private uses of their works. The efforts to enforce these new rights have resulted in highly publicized legal battles between established media and new upstarts.

In this book, law professor Jessica Litman questions whether copyright laws crafted by lawyers and their lobbyists really make sense for the vast majority of us. Should every interaction between ordinary consumers and copyright-protected works be restricted by law? Is it practical to enforce such laws, or expect consumers to obey them? What are the effects of …


Propertization, Contract, Competition, And Communication: Law's Struggle To Adapt To The Transformative Powers Of The Internet, David Barnhizer Jan 2006

Propertization, Contract, Competition, And Communication: Law's Struggle To Adapt To The Transformative Powers Of The Internet, David Barnhizer

Cleveland State Law Review

This Symposium focuses in part on the ideas of Margaret Jane Radin as a point of departure for the various contributions. A key part of the analysis includes the process she calls propertization in the context of intellectual property rules and the Internet. The approach taken in this introductory essay is twofold. The first part presents some key points raised by the Symposium contributors. Of course, that overview is necessarily incomplete, because the contributions represent a rich group of analyses about vital concerns relating to how our legal system should respond to the challenge of the Internet and information systems …


Propertization Metaphors For Bargaining Power And Control Of The Self In The Information Age, Daniel D. Barnhizer Jan 2006

Propertization Metaphors For Bargaining Power And Control Of The Self In The Information Age, Daniel D. Barnhizer

Cleveland State Law Review

This Article argues that the threatening consequences of this commodification and propertization of consumers' electronic selves represent only part of the picture. Information era technological developments provide more tools than ever available before by which consumers can place boundaries around their right to consent and exclude others from that arena. Thus, Internet-based contracting allows consumers to access a broad range of bargaining power inputs to protect their power to withhold consent. Instead of an amorphous, indefinable quality of contracting parties, bargaining power may now be characterized as a series of discrete inputs that can be identified, evaluated, exchanged and owned. …


Rankings, Reductionism, And Responsibility , Frank Pasquale Jan 2006

Rankings, Reductionism, And Responsibility , Frank Pasquale

Cleveland State Law Review

After discussing how search engines operate in Part I below, and setting forth a normative basis for regulation of their results in Part II, this piece proposes (in Part III) some minor, non-intrusive legal remedies for those who claim that they are harmed by search engine results. Such harms include unwanted high-ranking results relating to them, or exclusion from a page they claim it is their “due” to appear on. In the first case (deemed “inclusion harm”), I propose a right not to suppress the results, but merely to add an asterisk to the hyperlink directing web users to them, …


Metaphor, Objects, And Commodities, George H. Taylor, Michael J. Madison Jan 2006

Metaphor, Objects, And Commodities, George H. Taylor, Michael J. Madison

Cleveland State Law Review

As its two main Parts will evidence, this Comment remains the product of two distinct if overlapping voices. Part II returns to the conceptual origins of Radin's theory in her general critique of objectification and commodification. It asks whether a more positive concept of objectification can be recovered that is distinguishable from reification, the latter seeming to be the more appropriate locus of Radin's criticism. Part III's response to Radin is similar, but it tries to exemplify both our appreciation of and our differences from her work through more detailed analysis of intellectual property law and theory.


Diverging Perspectives On Electronic Contracting In The U.S. And Eu, Jane K. Winn, Brian H. Bix Jan 2006

Diverging Perspectives On Electronic Contracting In The U.S. And Eu, Jane K. Winn, Brian H. Bix

Cleveland State Law Review

Margaret Jane Radin's paper discusses the ways modern technologies have prompted new thinking within and about property, and the way the legal response has failed to take sufficiently into account the countervailing considerations that have shaped earlier Property Law developments. Some new technologies have also caused intellectual and practical struggles within Contract Law. This paper will consider some of the developments of Contract Law related to these changes, in particular the transactions relating to the sale, leasing or free use of computer software and the purchase of computers. Part I of this paper introduces the topic and offers an overview …


Capturing Ideas: Copyright And The Law Of First Possession, Abraham Drassinower Jan 2006

Capturing Ideas: Copyright And The Law Of First Possession, Abraham Drassinower

Cleveland State Law Review

Part II of this paper, entitled “Wish and Deed,” sets forth an account of the law of first possession through an analysis of the classic case of Pierson v. Post. Part III, entitled “Idea and Expression,” briefly sets forth an account of the idea/expression dichotomy in copyright law through discussion of the classic case of Nichols v. Universal Pictures Corporation. On that basis, Part III unfolds a correspondence between animus and factum in property law and idea and expression in copyright law. Part IV, entitled “Things and Speech,” suggests through discussion of the classic case of Feist that central doctrines …


Monism, Nominalism, And Public-Private In The Work Of Margaret Jane Radin, Christopher L. Sagers Jan 2006

Monism, Nominalism, And Public-Private In The Work Of Margaret Jane Radin, Christopher L. Sagers

Cleveland State Law Review

This essay begins by situating the distinction in history generally and in American legal thought. Its historical aspect seems important because it suggests that the distinction is not predetermined—it is historically and culturally contingent. That fact has been largely ignored in the American legal academy, and among most of the judiciary it is all but outright socialist treachery to suggest it.

The essay moves on to consider Radin's work itself. The prominence of the distinction is relatively obvious in some of her work on technological marketing and design issues, but I will suggest that in fact it runs quietly just …


The Growth Of Cost-Shifting In Response To The Rising Cost And Importance Of Computerized Data In Litigation, Ross Chaffin Jan 2006

The Growth Of Cost-Shifting In Response To The Rising Cost And Importance Of Computerized Data In Litigation, Ross Chaffin

Oklahoma Law Review

No abstract provided.


Can Systems Analysis Help Us To Understand C.O.B.R.A.?: A Challenge To Employment-Based Health Insurance, 39 J. Marshall L. Rev. 753 (2006), Alison Mcmorran Sulentic Jan 2006

Can Systems Analysis Help Us To Understand C.O.B.R.A.?: A Challenge To Employment-Based Health Insurance, 39 J. Marshall L. Rev. 753 (2006), Alison Mcmorran Sulentic

UIC Law Review

No abstract provided.


Cybertrespass And Trespass To Documents, Kevin Emerson Collins Jan 2006

Cybertrespass And Trespass To Documents, Kevin Emerson Collins

Articles by Maurer Faculty

No abstract provided.


Book Review: Digital Crime And Forensic Science In Cyberspace, Gary C. Kessler Jan 2006

Book Review: Digital Crime And Forensic Science In Cyberspace, Gary C. Kessler

Publications

This document is Dr. Kessler's review of Digital Crime and Forensic Science in Cyberspace, by P. Kanellis, E. Kiountouzis, N. Kolokotronis, and D. Martakos. Idea Group Publishing, 2006. ISBN: 1-59140-873-3.


When New Technologies Are Still New: Windows Of Opportunity For Privacy Protection, Gaia Bernstein Jan 2006

When New Technologies Are Still New: Windows Of Opportunity For Privacy Protection, Gaia Bernstein

Villanova Law Review

No abstract provided.


Exporting Dmca Lockouts, Anupam Chander Jan 2006

Exporting Dmca Lockouts, Anupam Chander

Cleveland State Law Review

My goal here is limited. I do not attack the anti-circumvention provisions of the DMCA as wholly misguided; the desire to prevent widespread piracy of copyrighted works is understandable. At the same time, I do not mean to suggest that the critique I offer here is the sum of the adverse consequences of that statute, including for speech and education. My argument is limited to the threat posed by the export of the DMCA anti-circumvention rules, which do not explicitly guard against the anti-competitive use of those rules.Part I briefly sketches the difficulties created domestically by a DMCA inattentive to …


Beyond Patents: The Cultural Life Of Native Healing And The Limitations Of The Patent System As A Protective Mechanism For Indigenous Knowledge On The Medicinal Uses Of Plants, Ikechi Mgbeoji Jan 2006

Beyond Patents: The Cultural Life Of Native Healing And The Limitations Of The Patent System As A Protective Mechanism For Indigenous Knowledge On The Medicinal Uses Of Plants, Ikechi Mgbeoji

Canadian Journal of Law and Technology

The question that this paper seeks to tackle is whether in the contest of allegations of biopiracy and in the search for effective mechanisms for the protection of indigenous knowledge of the medicinal uses of plants possessed by traditional healers of southern Nigeria, there is any role for the patent regime. Given the popularity of alternative forms of health care, this question is of importance in contemporary discourse.


Liability For Botnet Attacks, Jennifer A. Chandler Jan 2006

Liability For Botnet Attacks, Jennifer A. Chandler

Canadian Journal of Law and Technology

This paper will consider the possibility of using tort liability to address cyber insecurity. In previous work, I have proposed a hypothetical lawsuit by the victim of a DDoS attack against the vendor of unreasonably insecure software, the flaws of which are exploited to create the DDoS attack army. Indeed, software vendors are facing increasing public disapproval for their contributions to cyber insecurity. However, not all DDoS attack armies are assembled by exploiting flaws in software. Computers are also infected when users voluntarily open infected email attachments or download infected files from file-sharing networks. Accordingly, the cyber insecurity resulting from …


Rfid Et Administration Publique: Le Citoyen Sous Surveillance?, Anthony Hémond Jan 2006

Rfid Et Administration Publique: Le Citoyen Sous Surveillance?, Anthony Hémond

Canadian Journal of Law and Technology

Lorsque les gouvernements et l’Administration se lancent dans la mise en place d’une nouvelle technologie, il leur faut, au préalable, analyser les enjeux et les risques de ce déploiement.

Tel sera l’essentiel de nos développements. Nous verrons comment, notamment à travers la mise en place du e-passeport, la technologie RFID peut être intégrée au sein de l’Administration. Le choix de cette nouvelle génération de passeports n’est pas anodin: si dans certains domaines les donne ́es qu’ils contiennent sont précieuses, dans d’autres, notamment celui de la santé, les informations sur les personnes sont très sensibles. Il faut donc maîtriser les risques …


Review Of Legal Issues In Electronic Commerce, 2nd Edition (Concord, Ontario: Captus Press, 2005), Chidi Oguamanam Jan 2006

Review Of Legal Issues In Electronic Commerce, 2nd Edition (Concord, Ontario: Captus Press, 2005), Chidi Oguamanam

Canadian Journal of Law and Technology

This collection of materials is part of the Canadian Legal Studies Series. According to the publishers, the objective of the Series is to offer ‘‘a wealth of carefully selected, and up-to-date examinations of Canadian legal issues’’. The first of such collections under the same title appeared in 2002. According to Takach, one of the dynamics of computer, and indeed information technology, law is rapid change in technology trends. Thus, after two years, technological developments and corresponding legal responses on the subject of electronic commerce warrant a new edition of materials of this nature.


The Privacy Gambit: Toward A Game Theoretic Approach To International Data Protection, Horace E. Anderson Jan 2006

The Privacy Gambit: Toward A Game Theoretic Approach To International Data Protection, Horace E. Anderson

Elisabeth Haub School of Law Faculty Publications

This article briefly explores several scenarios in which economic actors compete and cooperate in order to capture the value in personal information. The focus then shifts to one particular scenario: the ongoing interaction between the United States and the European Union in attempting to construct data protection regimes that serve the philosophies and citizens of each jurisdiction as well as provide a strategic economic advantage. A game theoretic model is presented to explain the course of dealings between the two actors, including both unilateral and bilateral actions. Part I ends with an exploration of opportunities for seizing competitive advantage, and …