Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Internet (6)
- Book reviews (3)
- Computer forensics (3)
- E-commerce (3)
- Propertization (3)
-
- Computers & privacy (2)
- Cybercrime (2)
- Electronic documents (2)
- Federal Rules of Civil Procedure (2)
- Forensic computing (2)
- Fraud (2)
- Intellectual Property (2)
- Intellectual property (2)
- Medical records (2)
- Property (2)
- Right of privacy (2)
- Telecommunications (2)
- AOL (1)
- Abuse Act (1)
- Accounting curriculum development (1)
- Administration publique (1)
- Anti-Phishing Act of 2005 (1)
- Audit (1)
- Auditors (1)
- Bargaining power (1)
- Barrett (1)
- Baudrillard (1)
- Biopiracy (1)
- Broadband Competition (1)
- Broadcasting legislation (1)
Articles 31 - 60 of 91
Full-Text Articles in Law
The Protection Of Maps And Spatial Databases In Europe And The United States By Copyright And The Sui Generis Right, 24 J. Marshall J. Computer & Info. L. 195 (2006), Katleen Janssen, Jos Dumortier
The Protection Of Maps And Spatial Databases In Europe And The United States By Copyright And The Sui Generis Right, 24 J. Marshall J. Computer & Info. L. 195 (2006), Katleen Janssen, Jos Dumortier
UIC John Marshall Journal of Information Technology & Privacy Law
Spatial data and applications play an ever-increasing part in our economy and in our society in general, but the protection of spatial databases by intellectual property rights seems to be a challenge because the Internet and information technology have caused a considerable increase in the copying of data, maps, route descriptions, hiking trails, etc. The illegal copying of spatial data, however, has caused the data producers to turn to several means of protection, such as intellectual property legislation, unfair competition, confidentiality and privacy. This paper begins by determining what is meant by spatial data. Thereafter, the paper reflects on the …
Voip Goes The Bad Guy: Understanding The Legal Impact Of The Use Of Voice Over Ip Communications In Cases Of Nsa Warrantless Eavesdropping, 24 J. Marshall J. Computer & Info. L. 227 (2006), Eric Koester
UIC John Marshall Journal of Information Technology & Privacy Law
For purposes of national security, the Bush administration delegated authority to the National Security Administration (“NSA”) to conduct warrantless surveillance of Americans; and such surveillance defies tradition. At the same time, emerging communications technology, like Voice over Internet Protocol (“VoIP”), complicates the already controversial issue by generating uncertainty about how courts will analyze warrantless surveillance of such forums. The problem lies in outdated communications and surveillance regulations, which effectively address older communications forums, like the telephone, but encounter stifling ambiguity vis-à-vis VoIP and other new forums. VoIP is a relatively new technology, but it encompasses the large and ever-growing use …
The Federal Election Commission & Political Blogging: A Perfect Balance Or Just Not Enough?, 24 J. Marshall J. Computer & Info. L. 611 (2006), Niki Vlachos
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Cleaning Metadata On The World Wide Web: Suggestions For A Regulatory Approach, 24 J. Marshall J. Computer & Info. L. 531 (2006), Marcel Gordon
Cleaning Metadata On The World Wide Web: Suggestions For A Regulatory Approach, 24 J. Marshall J. Computer & Info. L. 531 (2006), Marcel Gordon
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Copyright Misuse Doctrine On Computer Software: A Redundant Doctrine Of U.S. Copyright Law Or A Necessary Addition To E.U. Copyright Law?, 24 J. Marshall J. Computer & Info. L. 571 (2006), Haris Apostolopoulos
The Copyright Misuse Doctrine On Computer Software: A Redundant Doctrine Of U.S. Copyright Law Or A Necessary Addition To E.U. Copyright Law?, 24 J. Marshall J. Computer & Info. L. 571 (2006), Haris Apostolopoulos
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Provisional Relief In Transnational Litigation In The Internet Era: What Is In The Us Best Interest?, 24 J. Marshall J. Computer & Info. L. 263 (2006), Panagiota Kelali
Provisional Relief In Transnational Litigation In The Internet Era: What Is In The Us Best Interest?, 24 J. Marshall J. Computer & Info. L. 263 (2006), Panagiota Kelali
UIC John Marshall Journal of Information Technology & Privacy Law
Using the hypothetical of a college student victimized by a fraudulent website, this comment addresses the issue of Internet fraud. In the example presented, the perpetrators are Greek nationals located in Greece. Focusing on the intangible and international nature of the Internet, the comment addresses the complications surrounding litigating an Internet fraud case. The issues discussed include a determination of the forum where the suit should be brought, preservation of the status quo pending determination of the dispute, and the status of a transnational cooperation on the issue of recognition and enforcement of judgments. The comment presents the options available …
Transsexuals And The Family Medical Leave Act, 24 J. Marshall J. Computer & Info. L. 315 (2006), Charles Thomas Little
Transsexuals And The Family Medical Leave Act, 24 J. Marshall J. Computer & Info. L. 315 (2006), Charles Thomas Little
UIC John Marshall Journal of Information Technology & Privacy Law
This article examines the implications for transsexuals seeking sexual reassignment surgery (“SRS”) under the Family Medical Leave Act (“FMLA”). Currently, the scant case law pertaining to the FMLA suggests that the statutes and regulations will likely fail to provide even minimal protection to transsexuals. If applied literally, the FMLA may present barriers to transsexuals seeking SRS in opposition to the true purpose behind the Act, which is to allow employees the opportunity to take reasonable leave from work by mandating more medical leave than the employers might otherwise be willing to grant for things such as the adoption or birth …
Borders Online, Llc V. State Board Of Equalization: It's Time For Congress To Weigh The Possibilities Of This California Decision, 24 J. Marshall J. Computer & Info. L. 641 (2006), Ronnie E. Webb
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Twenty-Fifth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 24 J. Marshall J. Computer & Info. L. 673 (2006), David E. Sorkin, Larisa V. Benitez-Morgan, J. Preston Carter, William P. Greubel Iii, Matthew Hector, Kellen Keaty, Lisa Rodriguez
The Twenty-Fifth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 24 J. Marshall J. Computer & Info. L. 673 (2006), David E. Sorkin, Larisa V. Benitez-Morgan, J. Preston Carter, William P. Greubel Iii, Matthew Hector, Kellen Keaty, Lisa Rodriguez
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Twenty-Fifth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 24 J. Marshall J. Computer & Info. L. 699 (2006), Chris Norris, Justin Sisemore, Anndi Queenan
The Twenty-Fifth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Brief For The Petitioner, 24 J. Marshall J. Computer & Info. L. 699 (2006), Chris Norris, Justin Sisemore, Anndi Queenan
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Twenty-Fifth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 24 J. Marshall J. Computer & Info. L. 733 (2006), Timothy T. Hsieh, Jennifer Simmen Lewin, Jerome C. Pandell
The Twenty-Fifth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Brief For The Respondent, 24 J. Marshall J. Computer & Info. L. 733 (2006), Timothy T. Hsieh, Jennifer Simmen Lewin, Jerome C. Pandell
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Intellectual Property Rights At The Crossroad Between Monopolization And Abuse Of Dominant Position: American And European Approaches Compared, 24 J. Marshall J. Computer & Info. L. 455 (2006), Emanuela Arezzo
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Gathering Twilight? Information Privacy On The Internet In The Post-Enlightenment Era, 24 J. Marshall J. Computer & Info. L. 353 (2006), Mark F. Kightlinger
The Gathering Twilight? Information Privacy On The Internet In The Post-Enlightenment Era, 24 J. Marshall J. Computer & Info. L. 353 (2006), Mark F. Kightlinger
UIC John Marshall Journal of Information Technology & Privacy Law
This Article provides a timely examination of U.S. law and policy concerning information privacy on the Internet, a subject that receives almost daily attention in the press. This Article constructs a new theoretical framework from the writings of Alasdair MacIntyre, a major contemporary philosopher and social theorist. Over the past 30 years, MacIntyre has examined the roots and continuing impact of the failure of post-Enlightenment thinkers to produce an account of human nature and action that could replace an older Aristotelian account and command the assent of all rational persons. In addition to extending MacIntyre’s examination of our post-Enlightenment situation, …
Contribution To The Understanding Of The Public Domain, 24 J. Marshall J. Computer & Info. L. 411 (2006), Vincenzo Vinciguerra
Contribution To The Understanding Of The Public Domain, 24 J. Marshall J. Computer & Info. L. 411 (2006), Vincenzo Vinciguerra
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
A Comedy Of Errors: Defining "Component" In A Global Information Technology Market - Accounting For Innovation By Penalizing The Innovators, 24 J. Marshall J. Computer & Info. L. 507 (2006), William Greubel
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
A Duty Everlasting: The Perils Of Applying Traditional Doctrines Of Spoliation To Electronic Discovery, Michael R. Nelson, Mark H. Rosenberg
A Duty Everlasting: The Perils Of Applying Traditional Doctrines Of Spoliation To Electronic Discovery, Michael R. Nelson, Mark H. Rosenberg
Richmond Journal of Law & Technology
Amendments to the Federal Rules of Civil Procedure regarding electronic discovery are expected to take effect on December 1, 2006. These amendments are designed to alleviate the burden, expense and uncertainty that has resulted from the application of traditional discovery principles in the electronic age. These principles worked well in an era where discovery was primarily limited to the production of paper documentation, but have proved unworkable when applied to the discovery of electronic data, particularly in the “corporate world,” where even the most routine business discussions are captured in electronic format.5
Virtual Espionage: Spyware And The Common Law Privacy Torts, Don Corbett
Virtual Espionage: Spyware And The Common Law Privacy Torts, Don Corbett
University of Baltimore Law Review
No abstract provided.
Bigger Phish To Fry: Californias Anti- Phishing Statute And Its Potential Imposition Of Secondary Liability On Internet Service Providers, Camille Calman
Bigger Phish To Fry: Californias Anti- Phishing Statute And Its Potential Imposition Of Secondary Liability On Internet Service Providers, Camille Calman
Richmond Journal of Law & Technology
The incidence of phishing, a form of internet fraud, has increased dramatically since 2003. Identity thieves searching for vulnerabilities in internet security have realized that customers are the weak link. Using mass e-mailings and websites purporting to be those of well-known and trusted corporations, “phishers” trick customers into revealing personal and financial information.
Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Jon S. Player
Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Jon S. Player
Richmond Journal of Law & Technology
The Richmond Journal of Law and Technology is proud to present its second issue of the 2006–2007 academic school year. The Journal staff has worked diligently during the first half of the year to produce an exceptional issue.
Waiving The Privilege In A Storm Of Data: An Argument For Uniformity And Rationality In Dealing With The Inadvertent Production Of Privileged Materials In The Age Of Electronically Stored Information, Dennis R. Kiker
Richmond Journal of Law & Technology
At the point where one of the most venerable principles of common law and the reality of modern information management collide, even the most diligent attorneys may become victims of the resulting fallout.
Teaching A Man To Fish: Why National Legislation Anchored In Notice And Consent Provisions Is The Most Effective Solution To The Spyware Problem, M. Angela Buenaventura
Teaching A Man To Fish: Why National Legislation Anchored In Notice And Consent Provisions Is The Most Effective Solution To The Spyware Problem, M. Angela Buenaventura
Richmond Journal of Law & Technology
The term “spyware” encompasses a wide range of software designed to intercept or take partial control of a computer. Spyware slows down computers and forces computer users to expend resources on repair and installation of protective software. Consumers also face the danger that personal information gathered through spyware will be misused. Thus, most people agree that spyware is an annoying and costly problem. However, there is no consensus on the best way to solve the spyware problem. This article examines the methods currently being used to battle spyware, as well as proposed national spyware legislation. The article outlines the various …
Shifting Burdens And Concealing Electronic Evidence: Discovery In The Digital Era, Rebecca Rockwood
Shifting Burdens And Concealing Electronic Evidence: Discovery In The Digital Era, Rebecca Rockwood
Richmond Journal of Law & Technology
In the twenty-first century, persons involved in the legal profession will be forced to confront technological issues. Computers and technology have pervaded every aspect of society, and the legal system is no exception. The discovery process is a dramatic example of how lawyers and courts strain to keep up with technological advances. Traditional discovery practices have been severely overhauled as electronic information becomes increasingly prevalent. What was once a simple discovery request can now become an overwhelming task, as defendants must wade through a plethora of electronic documents in an attempt to comply with the court’s discovery orders.
The Design Of An Undergraduate Degree Program In Computer & Digital Forensics, Gary C. Kessler, Michael E. Schirling
The Design Of An Undergraduate Degree Program In Computer & Digital Forensics, Gary C. Kessler, Michael E. Schirling
Journal of Digital Forensics, Security and Law
Champlain College formally started an undergraduate degree program in Computer & Digital Forensics in 2003. The underlying goals were that the program be multidisciplinary, bringing together the law, computer technology, and the basics of digital investigations; would be available as on online and oncampus offering; and would have a process-oriented focus. Success of this program has largely been due to working closely with practitioners, maintaining activity in events related to both industry and academia, and flexibility to respond to ever-changing needs. This paper provides an overview of how this program was conceived, developed, and implemented; its evolution over time; and …
Propertization, Contract, Competition, And Communication: Law's Struggle To Adapt To The Transformative Powers Of The Internet, David Barnhizer
Propertization, Contract, Competition, And Communication: Law's Struggle To Adapt To The Transformative Powers Of The Internet, David Barnhizer
Cleveland State Law Review
This Symposium focuses in part on the ideas of Margaret Jane Radin as a point of departure for the various contributions. A key part of the analysis includes the process she calls propertization in the context of intellectual property rules and the Internet. The approach taken in this introductory essay is twofold. The first part presents some key points raised by the Symposium contributors. Of course, that overview is necessarily incomplete, because the contributions represent a rich group of analyses about vital concerns relating to how our legal system should respond to the challenge of the Internet and information systems …
Propertization Metaphors For Bargaining Power And Control Of The Self In The Information Age, Daniel D. Barnhizer
Propertization Metaphors For Bargaining Power And Control Of The Self In The Information Age, Daniel D. Barnhizer
Cleveland State Law Review
This Article argues that the threatening consequences of this commodification and propertization of consumers' electronic selves represent only part of the picture. Information era technological developments provide more tools than ever available before by which consumers can place boundaries around their right to consent and exclude others from that arena. Thus, Internet-based contracting allows consumers to access a broad range of bargaining power inputs to protect their power to withhold consent. Instead of an amorphous, indefinable quality of contracting parties, bargaining power may now be characterized as a series of discrete inputs that can be identified, evaluated, exchanged and owned. …
Metaphor, Objects, And Commodities, George H. Taylor, Michael J. Madison
Metaphor, Objects, And Commodities, George H. Taylor, Michael J. Madison
Cleveland State Law Review
As its two main Parts will evidence, this Comment remains the product of two distinct if overlapping voices. Part II returns to the conceptual origins of Radin's theory in her general critique of objectification and commodification. It asks whether a more positive concept of objectification can be recovered that is distinguishable from reification, the latter seeming to be the more appropriate locus of Radin's criticism. Part III's response to Radin is similar, but it tries to exemplify both our appreciation of and our differences from her work through more detailed analysis of intellectual property law and theory.
Diverging Perspectives On Electronic Contracting In The U.S. And Eu, Jane K. Winn, Brian H. Bix
Diverging Perspectives On Electronic Contracting In The U.S. And Eu, Jane K. Winn, Brian H. Bix
Cleveland State Law Review
Margaret Jane Radin's paper discusses the ways modern technologies have prompted new thinking within and about property, and the way the legal response has failed to take sufficiently into account the countervailing considerations that have shaped earlier Property Law developments. Some new technologies have also caused intellectual and practical struggles within Contract Law. This paper will consider some of the developments of Contract Law related to these changes, in particular the transactions relating to the sale, leasing or free use of computer software and the purchase of computers. Part I of this paper introduces the topic and offers an overview …
Monism, Nominalism, And Public-Private In The Work Of Margaret Jane Radin, Christopher L. Sagers
Monism, Nominalism, And Public-Private In The Work Of Margaret Jane Radin, Christopher L. Sagers
Cleveland State Law Review
This essay begins by situating the distinction in history generally and in American legal thought. Its historical aspect seems important because it suggests that the distinction is not predetermined—it is historically and culturally contingent. That fact has been largely ignored in the American legal academy, and among most of the judiciary it is all but outright socialist treachery to suggest it.
The essay moves on to consider Radin's work itself. The prominence of the distinction is relatively obvious in some of her work on technological marketing and design issues, but I will suggest that in fact it runs quietly just …
The Growth Of Cost-Shifting In Response To The Rising Cost And Importance Of Computerized Data In Litigation, Ross Chaffin
The Growth Of Cost-Shifting In Response To The Rising Cost And Importance Of Computerized Data In Litigation, Ross Chaffin
Oklahoma Law Review
No abstract provided.
Can Systems Analysis Help Us To Understand C.O.B.R.A.?: A Challenge To Employment-Based Health Insurance, 39 J. Marshall L. Rev. 753 (2006), Alison Mcmorran Sulentic
Can Systems Analysis Help Us To Understand C.O.B.R.A.?: A Challenge To Employment-Based Health Insurance, 39 J. Marshall L. Rev. 753 (2006), Alison Mcmorran Sulentic
UIC Law Review
No abstract provided.