Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Privacy Law (25)
- Science and Technology Law (23)
- Computer Law (22)
- Internet Law (22)
- State and Local Government Law (16)
-
- Property Law and Real Estate (9)
- Intellectual Property Law (8)
- Jurisprudence (8)
- Torts (8)
- Constitutional Law (6)
- Criminal Procedure (6)
- Civil Law (5)
- Criminal Law (5)
- Courts (4)
- Fourth Amendment (4)
- Health Law and Policy (4)
- Housing Law (4)
- Medical Jurisprudence (4)
- Civil Rights and Discrimination (3)
- Contracts (3)
- Food and Drug Law (3)
- Legal Remedies (3)
- Legislation (3)
- Common Law (2)
- Consumer Protection Law (2)
- Estates and Trusts (2)
- Judges (2)
- Juvenile Law (2)
- Labor and Employment Law (2)
- Publication
- Publication Type
Articles 1 - 30 of 57
Full-Text Articles in Law
Federal Adjudication Of Facts: The New Regime, 12 Am. J. Trial Advoc. 437 (1989), Allen R. Kamp
Federal Adjudication Of Facts: The New Regime, 12 Am. J. Trial Advoc. 437 (1989), Allen R. Kamp
UIC Law Open Access Faculty Scholarship
No abstract provided.
Public Demonstrations And The Rule Of Law In The Age Of Glasnost And Perestroika, 5 Am. U. J. Int'l L. & Pol'y 13 (1989), Ralph Ruebner
Public Demonstrations And The Rule Of Law In The Age Of Glasnost And Perestroika, 5 Am. U. J. Int'l L. & Pol'y 13 (1989), Ralph Ruebner
UIC Law Open Access Faculty Scholarship
No abstract provided.
Illinois' Latest Version Of The Defense Of Voluntary Intoxication: Is It Wise? Is It Constitutional?, 39 Depaul L. Rev. 15 (1989), Timothy P. O'Neill
Illinois' Latest Version Of The Defense Of Voluntary Intoxication: Is It Wise? Is It Constitutional?, 39 Depaul L. Rev. 15 (1989), Timothy P. O'Neill
UIC Law Open Access Faculty Scholarship
No abstract provided.
Law School Academic Support Programs, 40 Hastings L.J. 771 (1989), Paul T. Wangerin
Law School Academic Support Programs, 40 Hastings L.J. 771 (1989), Paul T. Wangerin
UIC Law Open Access Faculty Scholarship
No abstract provided.
God Bless The Child?: The Use Of Religion As A Factor In Child Custody And Adoption Proceedings, 58 Fordham L. Rev. 383 (1989), Donald L. Beschle
God Bless The Child?: The Use Of Religion As A Factor In Child Custody And Adoption Proceedings, 58 Fordham L. Rev. 383 (1989), Donald L. Beschle
UIC Law Open Access Faculty Scholarship
No abstract provided.
Freedom Of Speech, Press And Assembly, And Freedom Of Religion Under The Illinois Constitution, 21 Loy. U. Chi. L.J. 91 (1989), Michael P. Seng
Freedom Of Speech, Press And Assembly, And Freedom Of Religion Under The Illinois Constitution, 21 Loy. U. Chi. L.J. 91 (1989), Michael P. Seng
UIC Law Open Access Faculty Scholarship
No abstract provided.
Voluntary Dismissals In Illinois, 9 N. Ill. U. L. Rev. 515 (1989), Robert G. Johnston, Iain D. Johnston
Voluntary Dismissals In Illinois, 9 N. Ill. U. L. Rev. 515 (1989), Robert G. Johnston, Iain D. Johnston
UIC Law Open Access Faculty Scholarship
No abstract provided.
Autonomous Decisionmaking And Social Choice: Examining The “Right To Die”, 77 Ky. L.J. 319 (1989), Donald L. Beschle
Autonomous Decisionmaking And Social Choice: Examining The “Right To Die”, 77 Ky. L.J. 319 (1989), Donald L. Beschle
UIC Law Open Access Faculty Scholarship
No abstract provided.
Criminal Procedure, 13 S. Ill. U. L.J. 511 (1989), Ralph Ruebner, Robert E. Davison
Criminal Procedure, 13 S. Ill. U. L.J. 511 (1989), Ralph Ruebner, Robert E. Davison
UIC Law Open Access Faculty Scholarship
No abstract provided.
Title Vii : Application Of Impact Analysis To Subjective Employment Criteria, 24 Harv. C.R.-C.L. L. Rev. 264 (1989), Karen H. Cross
Title Vii : Application Of Impact Analysis To Subjective Employment Criteria, 24 Harv. C.R.-C.L. L. Rev. 264 (1989), Karen H. Cross
UIC Law Open Access Faculty Scholarship
No abstract provided.
Statutory Protection Of The Algorithm In A Computer Program: A Comparison Of The Copyright And Patent Laws, 9 Computer L.J. 125 (1989), Idelle R. Abrams
Statutory Protection Of The Algorithm In A Computer Program: A Comparison Of The Copyright And Patent Laws, 9 Computer L.J. 125 (1989), Idelle R. Abrams
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Microcode - Idea Or Expression?, 9 Computer L.J. 61 (1989), Robert Steinberg
Microcode - Idea Or Expression?, 9 Computer L.J. 61 (1989), Robert Steinberg
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Determining The Scope Of Copyright Protection For Computer/User Interfaces, 9 Computer L.J. 37 (1989), Janice M. Mueller
Determining The Scope Of Copyright Protection For Computer/User Interfaces, 9 Computer L.J. 37 (1989), Janice M. Mueller
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Assuring The Competency Of Computer-Generated Evidence, 9 Computer L.J. 103 (1989), Randy Snyder
Assuring The Competency Of Computer-Generated Evidence, 9 Computer L.J. 103 (1989), Randy Snyder
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Computer Software Copyright Protection: Infringement And Eleventh Amendment Immunity, 9 Computer L.J. 163 (1989), Carl J. Franklin
Computer Software Copyright Protection: Infringement And Eleventh Amendment Immunity, 9 Computer L.J. 163 (1989), Carl J. Franklin
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
"Even If A Stranger Could Create Such A Work . . ." Software, Piracy, And Implications Of The Implied Covenant Of Good Faith: Has The Sas Court Gone Too Far?, 9 Computer L.J. 145 (1989), William W. Toole
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Computer-Ware: Protection And Evidence, An Israeli Draft Bill, 9 Computer L.J. 299 (1989), Moshe Shalgi
Computer-Ware: Protection And Evidence, An Israeli Draft Bill, 9 Computer L.J. 299 (1989), Moshe Shalgi
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Copyright, Patent, And The Virtual Machine, 9 Computer L.J. 321 (1989), Richard L. Torczon
Copyright, Patent, And The Virtual Machine, 9 Computer L.J. 321 (1989), Richard L. Torczon
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Computer-Aided Medicine: Present And Future Issues Of Liability, 9 Computer L.J. 177 (1989), Hope Mortimer
Computer-Aided Medicine: Present And Future Issues Of Liability, 9 Computer L.J. 177 (1989), Hope Mortimer
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Computerized Check Processing De Minimus Errors In Check Description On Stop Payment Orders, 9 Computer L.J. 205 (1989), Rosario Herrera
Computerized Check Processing De Minimus Errors In Check Description On Stop Payment Orders, 9 Computer L.J. 205 (1989), Rosario Herrera
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Computerized Knowledge Representation And Common Law Reasoning, 9 Computer L.J. 223 (1989), Ronald N. Weikers, David C. Shelton
Computerized Knowledge Representation And Common Law Reasoning, 9 Computer L.J. 223 (1989), Ronald N. Weikers, David C. Shelton
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Unfulfilled Promise: Use Of Computers By And For Legislatures, 9 Computer L.J. 73 (1989), Robert L. Stoyles
The Unfulfilled Promise: Use Of Computers By And For Legislatures, 9 Computer L.J. 73 (1989), Robert L. Stoyles
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Copyrighting Machine Language Computer Software - The Case Against, 9 Computer L.J. 1 (1989), Mark M. Friedman
Copyrighting Machine Language Computer Software - The Case Against, 9 Computer L.J. 1 (1989), Mark M. Friedman
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Individual Privacy And Governmental Efficiency: Technology's Effect On The Government's Ability To Gather, Store, And Distribute Information, 9 Computer L.J. 359 (1989), C. Dennis Southard Iv
Individual Privacy And Governmental Efficiency: Technology's Effect On The Government's Ability To Gather, Store, And Distribute Information, 9 Computer L.J. 359 (1989), C. Dennis Southard Iv
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Preemption Of State Law By Copyright Law, 9 Computer L.J. 375 (1989), Deborah Kemp
Preemption Of State Law By Copyright Law, 9 Computer L.J. 375 (1989), Deborah Kemp
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Meeting Educational Challenges In The Information Age: Tax Incentives To Encourage Donations Of Computer Equipment To Elementary And Secondary Schools, 9 Computer L.J. 391 (1989), Richard A. Cohn
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Rights-In-Data Policies Affecting Department Of Defense Acquisition Of Computer Software And Related Products, 9 Computer L.J. 447 (1989), I. Michael Greenberger, Michael S. Kane
Rights-In-Data Policies Affecting Department Of Defense Acquisition Of Computer Software And Related Products, 9 Computer L.J. 447 (1989), I. Michael Greenberger, Michael S. Kane
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Software Licenses As Personal Service Contracts, 9 Computer L.J. 491 (1989), Terrence W. Thompson
Software Licenses As Personal Service Contracts, 9 Computer L.J. 491 (1989), Terrence W. Thompson
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Copyright Of Computer Display Screens: Summary And Suggestions, 9 Computer L.J. 417 (1989), Gregory C. Damman
Copyright Of Computer Display Screens: Summary And Suggestions, 9 Computer L.J. 417 (1989), Gregory C. Damman
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Software Performance Standards Under Article 2 Of The Uniform Commercial Code, 9 Computer L.J. 465 (1989), James H. Salter
Software Performance Standards Under Article 2 Of The Uniform Commercial Code, 9 Computer L.J. 465 (1989), James H. Salter
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.