Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Computer Law

2015

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 235

Full-Text Articles in Law

Front Matter Dec 2015

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Back Matter Dec 2015

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Oracle America, Inc. V. Google, Inc.,750 F.3d 1339 (Fed. Cir. 2014), Cert. Denied: Ideas, Methods, And Expression - Whose Innovation Is Protected?, Christopher J. Geissler Dec 2015

Oracle America, Inc. V. Google, Inc.,750 F.3d 1339 (Fed. Cir. 2014), Cert. Denied: Ideas, Methods, And Expression - Whose Innovation Is Protected?, Christopher J. Geissler

Catholic University Journal of Law and Technology

No abstract provided.


Implications For The Future Of Global Data Security And Privacy: The Territorial Application Of The Stored Communications Act And The Microsoft Case, Russell Hsiao Dec 2015

Implications For The Future Of Global Data Security And Privacy: The Territorial Application Of The Stored Communications Act And The Microsoft Case, Russell Hsiao

Catholic University Journal of Law and Technology

No abstract provided.


Masthead Dec 2015

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


Web Based Cyber Forensics Training For Law Enforcement, Nick Sturgeon Dec 2015

Web Based Cyber Forensics Training For Law Enforcement, Nick Sturgeon

Purdue Polytechnic Masters Theses

Training and education are two of the most important aspects within cyber forensics. These topics have been of concern since the inception of the field. Training law enforcement is particularly important to ensure proper execution of the digital forensics process. It is also important because the proliferation of technology in to society continues to grow at an exponential rate. Just as technology is used for good there are those that will choose to use it for criminal gains. It is critical that Law Enforcement have the tools and training in cyber forensics. This research looked to determine if web based …


The Integrated Approach: A Solution To Patent Subject Matter Eligibility Standards In The Software Context, Carrie Moss Dec 2015

The Integrated Approach: A Solution To Patent Subject Matter Eligibility Standards In The Software Context, Carrie Moss

Journal of Intellectual Property Law

No abstract provided.


Gray Works: How The Failure Of Copyright Law To Keep Pace With Technological Advancement In The Digital Age Has Created A Class Of Works Whose Protection Is Uncertain… And What Can Be Done About It, Kenneth R.L. Parker Dec 2015

Gray Works: How The Failure Of Copyright Law To Keep Pace With Technological Advancement In The Digital Age Has Created A Class Of Works Whose Protection Is Uncertain… And What Can Be Done About It, Kenneth R.L. Parker

Journal of Intellectual Property Law

No abstract provided.


Fighting Piracy With Censorship: The Operation In Our Sites Domain Seizures V. Free Speech, Michael Joseph Harrell Dec 2015

Fighting Piracy With Censorship: The Operation In Our Sites Domain Seizures V. Free Speech, Michael Joseph Harrell

Journal of Intellectual Property Law

No abstract provided.


Session Ii: Historical Perspectives On Privacy In American Law, 29 J. Marshall J. Computer & Info. L. 319 (2012), Steven D. Schwinn, Alberto Bernabe, Kathryn Kolbert, Adam D. Moore, Marc Rotenberg Oct 2015

Session Ii: Historical Perspectives On Privacy In American Law, 29 J. Marshall J. Computer & Info. L. 319 (2012), Steven D. Schwinn, Alberto Bernabe, Kathryn Kolbert, Adam D. Moore, Marc Rotenberg

Alberto Bernabe

No abstract provided.


Taxonomy Of The Snowden Disclosures, Margaret Hu Oct 2015

Taxonomy Of The Snowden Disclosures, Margaret Hu

Faculty Publications

This brief Essay offers a proposed taxonomy of the Snowden Disclosures. An informed discussion on the legality and constitutionality of the emerging cybersurveillance and mass dataveillance programs revealed by former NSA contractor Edward Snowden necessitates the furtherance of cybersurveillance aptitude. This Essay contends, therefore, that a detailed examination of the Snowden disclosures requires not just a careful inquiry into the legal and constitutional framework that guides the oversight of these programs. A close interrogation also requires a careful inquiry into the big data architecture that guides them. This inquiry includes examining the underlying theories of data science and the rationales …


Why Education In The Law And Policy Of Cybersecurity Is A Must, Markus Rauschecker Oct 2015

Why Education In The Law And Policy Of Cybersecurity Is A Must, Markus Rauschecker

Homeland Security Publications

No abstract provided.


Front Matter Sep 2015

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Back Matter Sep 2015

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Masthead Sep 2015

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


Newsroom: Fcc's Sohn On Consumer Protection, Roger Williams University School Of Law Sep 2015

Newsroom: Fcc's Sohn On Consumer Protection, Roger Williams University School Of Law

Life of the Law School (1993- )

No abstract provided.


Do Free Mobile Apps Harm Consumers?, J. Gregory Sidak Sep 2015

Do Free Mobile Apps Harm Consumers?, J. Gregory Sidak

San Diego Law Review

Google distributes proprietary applications for its open-source Android mobile operating system (OS) free of charge. Some of those applications (apps) are offered together as a suite of apps known as Google Mobile Services (GMS). Manufacturers of mobile devices can agree, pursuant to Google's Mobile Application Distribution Agreement (MADA), to install the suite of apps on their devices at a price of zero. Some theorize that Google's policy of offering some applications together as a suite of apps harms competitors or menaces consumer welfare. In April 2015, the European Commission expressed such concerns when it initiated a formal antitrust investigation that …


"Globalization And Legal Culture. The Influence Of Law & Economics’ Blogs In Developing Countries,", Críspulo Marmolejo Aug 2015

"Globalization And Legal Culture. The Influence Of Law & Economics’ Blogs In Developing Countries,", Críspulo Marmolejo

Críspulo Marmolejo

This paper considers the relationship between blogs and Law and Economics from two perspectives: some aspects of the law and economics approach to blogging, and the influence of blogs in the diffusion of Law and Economics. The article explores how blogs are a modern way of low cost domestic journalism, in a context in which the increasingsize of the blogosphere is a current challenge in terms of free speech and quality of the information. At the same time, blogs such as “The Volokh Conspiracy” are playing an interesting role in the American legal academia as areal instrument to analyze the …


E-Commerce, Cyber, And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman Aug 2015

E-Commerce, Cyber, And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman

Lawrence J. Trautman Sr.

By now, almost without exception, every business has an internet presence, and is likely engaged in e-commerce. What are the major risks perceived by those engaged in e-commerce and electronic payment systems? What potential risks, if they become reality, may cause substantial increases in operating costs or threaten the very survival of the enterprise? This article utilizes the relevant annual report disclosures from eBay (parent of PayPal), along with other eBay and PayPal documents, as a potentially powerful teaching device. Most of the descriptive language to follow is excerpted directly from eBay’s regulatory filings. My additions include weaving these materials …


On The Centrality Of Information Law: A Rational Choice Discussion Of Information Law And Transparency, 17 J. Marshall J. Computer & Info. L. 1069 (1999), William B.T. Mock Aug 2015

On The Centrality Of Information Law: A Rational Choice Discussion Of Information Law And Transparency, 17 J. Marshall J. Computer & Info. L. 1069 (1999), William B.T. Mock

William B.T. Mock

The purpose of this Article is to establish the importance of information law and to encourage its further study. By applying information technology theory, economic theory and, and political theory insights, the Article examines the centrality of information law in open societies. Information law rests upon two premises. The first of which is that information is a legally cognizable concept- that it can be framed in legal terms and has legal significance. The second premise is that there exists a rationale for government regulation and provision of information, either explicitly or implicitly. Transparency is a flexible concept used in a …


Data Privacy Regulation In The Age Of Smartphones, Matthew Hettrich Aug 2015

Data Privacy Regulation In The Age Of Smartphones, Matthew Hettrich

Touro Law Review

No abstract provided.


Second Annual Report, University Of Washington School Of Law Aug 2015

Second Annual Report, University Of Washington School Of Law

Tech Policy Lab

The Tech Policy Lab at the University of Washington continues to pick up steam in our second year. We have hosted national policy discussions, collaborated directly with policymakers on open data and other issues, and continue to develop strong, method-based interdisciplinary research.


Big Data, Bigger Dilemmas: A Critical Review, Hamid Ekbia, Michael Mattioli, Inna Koupe, G. Arave, Ali Ghazinejad, Timothy Bowman, Venkatq R. Suri, Tsou Andrew, Scott Weingart, Cassidy R. Sugimoto Aug 2015

Big Data, Bigger Dilemmas: A Critical Review, Hamid Ekbia, Michael Mattioli, Inna Koupe, G. Arave, Ali Ghazinejad, Timothy Bowman, Venkatq R. Suri, Tsou Andrew, Scott Weingart, Cassidy R. Sugimoto

Articles by Maurer Faculty

The recent interest in Big Data has generated a broad range of new academic, corporate, and policy practices along with an evolving debate among its proponents, detractors, and skeptics. While the practices draw on a common set of tools, techniques, and technologies, most contributions to the debate come either from a particular disciplinary perspective or with a focus on a domain-specific issue. A close examination of these contributions reveals a set of common problematics that arise in various guises and in different places. It also demonstrates the need for a critical synthesis of the conceptual and practical dilemmas surrounding Big …


Establishing Russia's Responsibility For Cyber-Crime Based On Its Hacker Culture, Trevor Mcdougal Aug 2015

Establishing Russia's Responsibility For Cyber-Crime Based On Its Hacker Culture, Trevor Mcdougal

Brigham Young University International Law & Management Review

No abstract provided.


The Protection Of Property Rights In Computer Software, Edward W. Rilee Jul 2015

The Protection Of Property Rights In Computer Software, Edward W. Rilee

Akron Law Review

During the last decade a number of attempts have been made by the courts in the realm of patent and copyright law to settle the issue of the protection of property rights in computer software. These traditional methods of protection, however, have not been able to assimilate this relatively new technological invention. Likewise, at the start of a new decade, little or no progress towards a comprehensive form of software protection can be detected. This paper will examine the problems associated with using federal patent or copyright law to provide computer software protection and discuss why state trade secret protection …


Lawgical: Jurisprudential And Logical Considerations, John P. Finan Jul 2015

Lawgical: Jurisprudential And Logical Considerations, John P. Finan

Akron Law Review

Such "creative" statutory construction is familiar to anyone who reads appellate decisions. Whatever one's views on so-called strict construction, one must recognize that in the actual working of law, this type of creative interpretation is prevalent. One who designs a computer system to do some aspects of legal analysis must take into consideration the creative dimension of the judge's role. Otherwise the computer will "calculate legal results" which are literally correct but faithless to the law as it is actually interpreted. It would be easy to design a system to draw legal inferences if one accepted a mechanical, slot machine …


Lawgical An Approach To Computer-Aided Legal Analysis, John T. Welch Jul 2015

Lawgical An Approach To Computer-Aided Legal Analysis, John T. Welch

Akron Law Review

L AWGICAL is a system for computer-based information management designed to aid in legal analysis. The phrase "computer-aided legal analysis" used in the title of this article should not be interpreted here to imply to any degree the takeover of the legal analyst's task. LAWGICAL is intended, rather, as a practical tool of limited scope which enhances, but does not change, existing analysis technique. It is not an application of artificial intelligence. It is an application of computer technology on the same order as legal retrieval services or word processing equipment.


1997 John Marshall National Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 16 J. Marshall J. Computer & Info. L. 685 (1998), David E. Sorkin, Steven A. Mcauley, David B. Nash Iii Jul 2015

1997 John Marshall National Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 16 J. Marshall J. Computer & Info. L. 685 (1998), David E. Sorkin, Steven A. Mcauley, David B. Nash Iii

David E. Sorkin

Many public libraries provide patrons with free public-access Internet terminals, largely for accessing information available on the World Wide Web. However, public concern exists over the ability of children who browse the Web without adult supervision to view sexually explicit materials and other inappropriate items. This concern has led to the development of various Internet filtering software programs. Some filtering programs operate by blocking access to documents containing certain words or phrases or combinations thereof. However, more common programs permit access only to documents or sites that appear in a pre-selected, "safe" database or that block access to documents that …


The Twenty-Fifth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 24 J. Marshall J. Computer & Info. L. 673 (2006), David E. Sorkin, Larisa V. Benitez-Morgan, J. Preston Carter, William P. Greubel Iii, Matthew Hector, Kellen Keaty, Lisa Rodriguez Jul 2015

The Twenty-Fifth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 24 J. Marshall J. Computer & Info. L. 673 (2006), David E. Sorkin, Larisa V. Benitez-Morgan, J. Preston Carter, William P. Greubel Iii, Matthew Hector, Kellen Keaty, Lisa Rodriguez

David E. Sorkin

No abstract provided.


Session Iv: Technology And The Future Of Privacy, 29 J. Marshall J. Computer & Info. L. 379 (2012), David E. Sorkin, Ann Bartow, Robert S. Gurwin, Doris E. Long Jul 2015

Session Iv: Technology And The Future Of Privacy, 29 J. Marshall J. Computer & Info. L. 379 (2012), David E. Sorkin, Ann Bartow, Robert S. Gurwin, Doris E. Long

David E. Sorkin

No abstract provided.