Open Access. Powered by Scholars. Published by Universities.®
Articles 121 - 138 of 138
Full-Text Articles in Law
Software Lock-In And Antitrust Tying Arrangements: The Lessons Of Data General, 5 Computer L.J. 329 (1984), Charles H. Helein
Software Lock-In And Antitrust Tying Arrangements: The Lessons Of Data General, 5 Computer L.J. 329 (1984), Charles H. Helein
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Copyright Protection Of Computer Software, 5 Computer L.J. 413 (1984), James Altman
Copyright Protection Of Computer Software, 5 Computer L.J. 413 (1984), James Altman
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Use And Expression: The Scope Of Copyright Protection For Computer Programs, 5 Computer L.J. 433 (1985), Leslie Wharton
Use And Expression: The Scope Of Copyright Protection For Computer Programs, 5 Computer L.J. 433 (1985), Leslie Wharton
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Treatment Of Computer Software Works Made For Hire Under The Copyright Act Of 1976, 5 Computer L.J. 579 (1985), Carol Ann Surrel
The Treatment Of Computer Software Works Made For Hire Under The Copyright Act Of 1976, 5 Computer L.J. 579 (1985), Carol Ann Surrel
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Means-Plus-Function Claims In Computer Related Patent Applications Within The United States, 5 Computer L.J. 25 (1984), Stephen A. Becker
Means-Plus-Function Claims In Computer Related Patent Applications Within The United States, 5 Computer L.J. 25 (1984), Stephen A. Becker
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Trade Secret Protection Of Computer Software, 5 Computer L.J. 77 (1984), Vytas M. Rimas
Trade Secret Protection Of Computer Software, 5 Computer L.J. 77 (1984), Vytas M. Rimas
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Computer Copyright Law: An Emerging Form Of Protection For Object Code Software After Apple V. Franklin, 5 Computer L.J. 233 (1984), Anderson L. Baldy Iii
Computer Copyright Law: An Emerging Form Of Protection For Object Code Software After Apple V. Franklin, 5 Computer L.J. 233 (1984), Anderson L. Baldy Iii
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Software Rental, Piracy And Copyright Protection, 5 Computer L.J. 125 (1984), Debra S. Wilson
Software Rental, Piracy And Copyright Protection, 5 Computer L.J. 125 (1984), Debra S. Wilson
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Copyright Protection For Computer Flow Logic And Algorithms, 5 Computer L.J. 257 (1984), Virginia Johnson
Copyright Protection For Computer Flow Logic And Algorithms, 5 Computer L.J. 257 (1984), Virginia Johnson
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Trade Secret And Copyright Protection Of Computer Software, 4 Computer L.J. 669 (1984), Ray A. Mantle
Trade Secret And Copyright Protection Of Computer Software, 4 Computer L.J. 669 (1984), Ray A. Mantle
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Software Piracy And The Personal Computer: Is The 1980 Software Copyright Act Effective?, 4 Computer L.J. 171 (1983), Mickey T. Mihm
Software Piracy And The Personal Computer: Is The 1980 Software Copyright Act Effective?, 4 Computer L.J. 171 (1983), Mickey T. Mihm
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Ownership Of Access Information: Exploring The Application Of Copyright Law To Library Catalog Records, 4 Computer L.J. 305 (1983), Celia Delano Moore
Ownership Of Access Information: Exploring The Application Of Copyright Law To Library Catalog Records, 4 Computer L.J. 305 (1983), Celia Delano Moore
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Another Look At Copyright Protection Of Software: Did The 1980 Act Do Anything For Object Code?, 3 Computer L.J. 1 (1981), Richard H. Stern
Another Look At Copyright Protection Of Software: Did The 1980 Act Do Anything For Object Code?, 3 Computer L.J. 1 (1981), Richard H. Stern
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Supremacy Of Federal Copyright Law Over State Trade Secret Law For Copyrightable Computer Programs Marked With A Copyright Notice, 3 Computer L.J. 19 (1981), Peter A. Luccarelli Jr.
The Supremacy Of Federal Copyright Law Over State Trade Secret Law For Copyrightable Computer Programs Marked With A Copyright Notice, 3 Computer L.J. 19 (1981), Peter A. Luccarelli Jr.
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Trade Secret Protection For Software Generally And In The Mass Market, 3 Computer L.J. 211 (1981), Miles R. Gilburne, Ronald L. Johnston
Trade Secret Protection For Software Generally And In The Mass Market, 3 Computer L.J. 211 (1981), Miles R. Gilburne, Ronald L. Johnston
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Metamorphosis Of Software-Related Invention Patentability, 3 Computer L.J. 273 (1981), Nelson Moskowitz
The Metamorphosis Of Software-Related Invention Patentability, 3 Computer L.J. 273 (1981), Nelson Moskowitz
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Software Patentability Bibliography, 1 Computer L.J. 233 (1978), Michael D. Scott
Software Patentability Bibliography, 1 Computer L.J. 233 (1978), Michael D. Scott
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Business And Economic Implications Of Programme Patent Protection In Canada, 1 Computer L.J. 105 (1978), Gaylen A. Duncan
Business And Economic Implications Of Programme Patent Protection In Canada, 1 Computer L.J. 105 (1978), Gaylen A. Duncan
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.