Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Embry-Riddle Aeronautical University (56)
- Selected Works (35)
- Seattle University School of Law (25)
- UIC School of Law (22)
- Schulich School of Law, Dalhousie University (11)
-
- University of Richmond (10)
- SelectedWorks (8)
- University of Georgia School of Law (7)
- Maurer School of Law: Indiana University (6)
- The University of Akron (5)
- University of Washington School of Law (5)
- University of Pennsylvania Carey Law School (4)
- American University Washington College of Law (3)
- Pace University (3)
- The Catholic University of America, Columbus School of Law (3)
- William & Mary Law School (3)
- Chicago-Kent College of Law (2)
- Cornell University Law School (2)
- Northwestern Pritzker School of Law (2)
- University of Baltimore Law (2)
- University of Maryland Francis King Carey School of Law (2)
- University of Pittsburgh School of Law (2)
- Brigham Young University Law School (1)
- City University of New York (CUNY) (1)
- Cleveland State University (1)
- Fordham Law School (1)
- Loyola Marymount University and Loyola Law School (1)
- Pepperdine University (1)
- Purdue University (1)
- Roger Williams University (1)
- Keyword
-
- Corporate (13)
- Blair (11)
- Privacy (11)
- Stout (11)
- Corporation (10)
-
- Cybersecurity (10)
- Team production (10)
- Computer Law (9)
- Copyright (8)
- Internet (8)
- Science and Technology (8)
- Shareholder (8)
- Governance (7)
- Law and Technology (7)
- Board (5)
- Digital Forensics (5)
- Intellectual Property Law (5)
- NSA (5)
- Social media (5)
- Technology (5)
- Communications Law (4)
- Policy (4)
- Software (4)
- Stakeholder (4)
- Surveillance (4)
- Telecommunications (4)
- BYOD (3)
- Corporate governance (3)
- Corporations (3)
- Cyber (3)
- Publication
-
- Journal of Digital Forensics, Security and Law (39)
- Seattle University Law Review (25)
- Annual ADFSL Conference on Digital Forensics, Security and Law (16)
- UIC John Marshall Journal of Information Technology & Privacy Law (15)
- David E. Sorkin (11)
-
- Richmond Journal of Law & Technology (10)
- Canadian Journal of Law and Technology (9)
- All Faculty Scholarship (6)
- Akron Law Review (5)
- Articles by Maurer Faculty (4)
- UIC Review of Intellectual Property Law (4)
- Articles (3)
- Georgia Law Review (3)
- Journal of Intellectual Property Law (3)
- Lawrence J. Trautman Sr. (3)
- Pace Law Review (3)
- UIC Law Review (3)
- Ulf Maunsbach (3)
- William K. Ford (3)
- Ann M. Lousin (2)
- Articles, Book Chapters, & Popular Press (2)
- Catholic University Journal of Law and Technology (2)
- Cornell Law School J.D. Student Research Papers (2)
- Criminal Law Practitioner (2)
- Faculty Publications (2)
- Faculty Scholarship (2)
- Indiana Law Journal (2)
- Mark E. Wojcik (2)
- Northwestern University Law Review (2)
- Scholarly Articles (2)
- Publication Type
Articles 1 - 30 of 235
Full-Text Articles in Law
Oracle America, Inc. V. Google, Inc.,750 F.3d 1339 (Fed. Cir. 2014), Cert. Denied: Ideas, Methods, And Expression - Whose Innovation Is Protected?, Christopher J. Geissler
Oracle America, Inc. V. Google, Inc.,750 F.3d 1339 (Fed. Cir. 2014), Cert. Denied: Ideas, Methods, And Expression - Whose Innovation Is Protected?, Christopher J. Geissler
Catholic University Journal of Law and Technology
No abstract provided.
Implications For The Future Of Global Data Security And Privacy: The Territorial Application Of The Stored Communications Act And The Microsoft Case, Russell Hsiao
Catholic University Journal of Law and Technology
No abstract provided.
Web Based Cyber Forensics Training For Law Enforcement, Nick Sturgeon
Web Based Cyber Forensics Training For Law Enforcement, Nick Sturgeon
Purdue Polytechnic Masters Theses
Training and education are two of the most important aspects within cyber forensics. These topics have been of concern since the inception of the field. Training law enforcement is particularly important to ensure proper execution of the digital forensics process. It is also important because the proliferation of technology in to society continues to grow at an exponential rate. Just as technology is used for good there are those that will choose to use it for criminal gains. It is critical that Law Enforcement have the tools and training in cyber forensics. This research looked to determine if web based …
The Integrated Approach: A Solution To Patent Subject Matter Eligibility Standards In The Software Context, Carrie Moss
The Integrated Approach: A Solution To Patent Subject Matter Eligibility Standards In The Software Context, Carrie Moss
Journal of Intellectual Property Law
No abstract provided.
Gray Works: How The Failure Of Copyright Law To Keep Pace With Technological Advancement In The Digital Age Has Created A Class Of Works Whose Protection Is Uncertain… And What Can Be Done About It, Kenneth R.L. Parker
Journal of Intellectual Property Law
No abstract provided.
Fighting Piracy With Censorship: The Operation In Our Sites Domain Seizures V. Free Speech, Michael Joseph Harrell
Fighting Piracy With Censorship: The Operation In Our Sites Domain Seizures V. Free Speech, Michael Joseph Harrell
Journal of Intellectual Property Law
No abstract provided.
Session Ii: Historical Perspectives On Privacy In American Law, 29 J. Marshall J. Computer & Info. L. 319 (2012), Steven D. Schwinn, Alberto Bernabe, Kathryn Kolbert, Adam D. Moore, Marc Rotenberg
Session Ii: Historical Perspectives On Privacy In American Law, 29 J. Marshall J. Computer & Info. L. 319 (2012), Steven D. Schwinn, Alberto Bernabe, Kathryn Kolbert, Adam D. Moore, Marc Rotenberg
Alberto Bernabe
No abstract provided.
Taxonomy Of The Snowden Disclosures, Margaret Hu
Taxonomy Of The Snowden Disclosures, Margaret Hu
Faculty Publications
This brief Essay offers a proposed taxonomy of the Snowden Disclosures. An informed discussion on the legality and constitutionality of the emerging cybersurveillance and mass dataveillance programs revealed by former NSA contractor Edward Snowden necessitates the furtherance of cybersurveillance aptitude. This Essay contends, therefore, that a detailed examination of the Snowden disclosures requires not just a careful inquiry into the legal and constitutional framework that guides the oversight of these programs. A close interrogation also requires a careful inquiry into the big data architecture that guides them. This inquiry includes examining the underlying theories of data science and the rationales …
Why Education In The Law And Policy Of Cybersecurity Is A Must, Markus Rauschecker
Why Education In The Law And Policy Of Cybersecurity Is A Must, Markus Rauschecker
Homeland Security Publications
No abstract provided.
Newsroom: Fcc's Sohn On Consumer Protection, Roger Williams University School Of Law
Newsroom: Fcc's Sohn On Consumer Protection, Roger Williams University School Of Law
Life of the Law School (1993- )
No abstract provided.
Do Free Mobile Apps Harm Consumers?, J. Gregory Sidak
Do Free Mobile Apps Harm Consumers?, J. Gregory Sidak
San Diego Law Review
Google distributes proprietary applications for its open-source Android mobile operating system (OS) free of charge. Some of those applications (apps) are offered together as a suite of apps known as Google Mobile Services (GMS). Manufacturers of mobile devices can agree, pursuant to Google's Mobile Application Distribution Agreement (MADA), to install the suite of apps on their devices at a price of zero. Some theorize that Google's policy of offering some applications together as a suite of apps harms competitors or menaces consumer welfare. In April 2015, the European Commission expressed such concerns when it initiated a formal antitrust investigation that …
"Globalization And Legal Culture. The Influence Of Law & Economics’ Blogs In Developing Countries,", Críspulo Marmolejo
"Globalization And Legal Culture. The Influence Of Law & Economics’ Blogs In Developing Countries,", Críspulo Marmolejo
Críspulo Marmolejo
This paper considers the relationship between blogs and Law and Economics from two perspectives: some aspects of the law and economics approach to blogging, and the influence of blogs in the diffusion of Law and Economics. The article explores how blogs are a modern way of low cost domestic journalism, in a context in which the increasingsize of the blogosphere is a current challenge in terms of free speech and quality of the information. At the same time, blogs such as “The Volokh Conspiracy” are playing an interesting role in the American legal academia as areal instrument to analyze the …
E-Commerce, Cyber, And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman
E-Commerce, Cyber, And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman
Lawrence J. Trautman Sr.
By now, almost without exception, every business has an internet presence, and is likely engaged in e-commerce. What are the major risks perceived by those engaged in e-commerce and electronic payment systems? What potential risks, if they become reality, may cause substantial increases in operating costs or threaten the very survival of the enterprise? This article utilizes the relevant annual report disclosures from eBay (parent of PayPal), along with other eBay and PayPal documents, as a potentially powerful teaching device. Most of the descriptive language to follow is excerpted directly from eBay’s regulatory filings. My additions include weaving these materials …
On The Centrality Of Information Law: A Rational Choice Discussion Of Information Law And Transparency, 17 J. Marshall J. Computer & Info. L. 1069 (1999), William B.T. Mock
On The Centrality Of Information Law: A Rational Choice Discussion Of Information Law And Transparency, 17 J. Marshall J. Computer & Info. L. 1069 (1999), William B.T. Mock
William B.T. Mock
The purpose of this Article is to establish the importance of information law and to encourage its further study. By applying information technology theory, economic theory and, and political theory insights, the Article examines the centrality of information law in open societies. Information law rests upon two premises. The first of which is that information is a legally cognizable concept- that it can be framed in legal terms and has legal significance. The second premise is that there exists a rationale for government regulation and provision of information, either explicitly or implicitly. Transparency is a flexible concept used in a …
Data Privacy Regulation In The Age Of Smartphones, Matthew Hettrich
Data Privacy Regulation In The Age Of Smartphones, Matthew Hettrich
Touro Law Review
No abstract provided.
Second Annual Report, University Of Washington School Of Law
Second Annual Report, University Of Washington School Of Law
Tech Policy Lab
The Tech Policy Lab at the University of Washington continues to pick up steam in our second year. We have hosted national policy discussions, collaborated directly with policymakers on open data and other issues, and continue to develop strong, method-based interdisciplinary research.
Big Data, Bigger Dilemmas: A Critical Review, Hamid Ekbia, Michael Mattioli, Inna Koupe, G. Arave, Ali Ghazinejad, Timothy Bowman, Venkatq R. Suri, Tsou Andrew, Scott Weingart, Cassidy R. Sugimoto
Big Data, Bigger Dilemmas: A Critical Review, Hamid Ekbia, Michael Mattioli, Inna Koupe, G. Arave, Ali Ghazinejad, Timothy Bowman, Venkatq R. Suri, Tsou Andrew, Scott Weingart, Cassidy R. Sugimoto
Articles by Maurer Faculty
The recent interest in Big Data has generated a broad range of new academic, corporate, and policy practices along with an evolving debate among its proponents, detractors, and skeptics. While the practices draw on a common set of tools, techniques, and technologies, most contributions to the debate come either from a particular disciplinary perspective or with a focus on a domain-specific issue. A close examination of these contributions reveals a set of common problematics that arise in various guises and in different places. It also demonstrates the need for a critical synthesis of the conceptual and practical dilemmas surrounding Big …
Establishing Russia's Responsibility For Cyber-Crime Based On Its Hacker Culture, Trevor Mcdougal
Establishing Russia's Responsibility For Cyber-Crime Based On Its Hacker Culture, Trevor Mcdougal
Brigham Young University International Law & Management Review
No abstract provided.
The Protection Of Property Rights In Computer Software, Edward W. Rilee
The Protection Of Property Rights In Computer Software, Edward W. Rilee
Akron Law Review
During the last decade a number of attempts have been made by the courts in the realm of patent and copyright law to settle the issue of the protection of property rights in computer software. These traditional methods of protection, however, have not been able to assimilate this relatively new technological invention. Likewise, at the start of a new decade, little or no progress towards a comprehensive form of software protection can be detected. This paper will examine the problems associated with using federal patent or copyright law to provide computer software protection and discuss why state trade secret protection …
Lawgical: Jurisprudential And Logical Considerations, John P. Finan
Lawgical: Jurisprudential And Logical Considerations, John P. Finan
Akron Law Review
Such "creative" statutory construction is familiar to anyone who reads appellate decisions. Whatever one's views on so-called strict construction, one must recognize that in the actual working of law, this type of creative interpretation is prevalent. One who designs a computer system to do some aspects of legal analysis must take into consideration the creative dimension of the judge's role. Otherwise the computer will "calculate legal results" which are literally correct but faithless to the law as it is actually interpreted. It would be easy to design a system to draw legal inferences if one accepted a mechanical, slot machine …
Lawgical An Approach To Computer-Aided Legal Analysis, John T. Welch
Lawgical An Approach To Computer-Aided Legal Analysis, John T. Welch
Akron Law Review
L AWGICAL is a system for computer-based information management designed to aid in legal analysis. The phrase "computer-aided legal analysis" used in the title of this article should not be interpreted here to imply to any degree the takeover of the legal analyst's task. LAWGICAL is intended, rather, as a practical tool of limited scope which enhances, but does not change, existing analysis technique. It is not an application of artificial intelligence. It is an application of computer technology on the same order as legal retrieval services or word processing equipment.
1997 John Marshall National Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 16 J. Marshall J. Computer & Info. L. 685 (1998), David E. Sorkin, Steven A. Mcauley, David B. Nash Iii
1997 John Marshall National Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 16 J. Marshall J. Computer & Info. L. 685 (1998), David E. Sorkin, Steven A. Mcauley, David B. Nash Iii
David E. Sorkin
Many public libraries provide patrons with free public-access Internet terminals, largely for accessing information available on the World Wide Web. However, public concern exists over the ability of children who browse the Web without adult supervision to view sexually explicit materials and other inappropriate items. This concern has led to the development of various Internet filtering software programs. Some filtering programs operate by blocking access to documents containing certain words or phrases or combinations thereof. However, more common programs permit access only to documents or sites that appear in a pre-selected, "safe" database or that block access to documents that …
The Twenty-Fifth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 24 J. Marshall J. Computer & Info. L. 673 (2006), David E. Sorkin, Larisa V. Benitez-Morgan, J. Preston Carter, William P. Greubel Iii, Matthew Hector, Kellen Keaty, Lisa Rodriguez
The Twenty-Fifth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 24 J. Marshall J. Computer & Info. L. 673 (2006), David E. Sorkin, Larisa V. Benitez-Morgan, J. Preston Carter, William P. Greubel Iii, Matthew Hector, Kellen Keaty, Lisa Rodriguez
David E. Sorkin
No abstract provided.
Session Iv: Technology And The Future Of Privacy, 29 J. Marshall J. Computer & Info. L. 379 (2012), David E. Sorkin, Ann Bartow, Robert S. Gurwin, Doris E. Long
Session Iv: Technology And The Future Of Privacy, 29 J. Marshall J. Computer & Info. L. 379 (2012), David E. Sorkin, Ann Bartow, Robert S. Gurwin, Doris E. Long
David E. Sorkin
No abstract provided.