Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (52)
- Physical Sciences and Mathematics (52)
- Information Security (51)
- Intellectual Property Law (47)
- Internet Law (47)
-
- Social and Behavioral Sciences (43)
- Computer Engineering (42)
- Engineering (42)
- Electrical and Computer Engineering (39)
- Forensic Science and Technology (39)
- Legal Studies (39)
- Science and Technology Law (31)
- Privacy Law (20)
- Consumer Protection Law (12)
- Antitrust and Trade Regulation (10)
- Law and Society (10)
- Business Organizations Law (9)
- Contracts (9)
- Communications Law (8)
- Property Law and Real Estate (8)
- Commercial Law (7)
- Criminal Law (7)
- Entertainment, Arts, and Sports Law (7)
- Legislation (7)
- State and Local Government Law (7)
- Administrative Law (5)
- Banking and Finance Law (5)
- Comparative and Foreign Law (5)
- Institution
-
- Embry-Riddle Aeronautical University (51)
- Schulich School of Law, Dalhousie University (11)
- UIC School of Law (11)
- Selected Works (9)
- BLR (7)
-
- Santa Clara Law (7)
- SelectedWorks (5)
- University of Michigan Law School (4)
- University of Richmond (4)
- Columbia Law School (3)
- Maurer School of Law: Indiana University (3)
- University of Florida Levin College of Law (3)
- Villanova University Charles Widger School of Law (3)
- University of Baltimore Law (2)
- University of New Hampshire (2)
- University of Pennsylvania Carey Law School (2)
- Campbell University School of Law (1)
- Chicago-Kent College of Law (1)
- Cornell University Law School (1)
- Northwestern Pritzker School of Law (1)
- Penn State Law (1)
- The University of Maine (1)
- University of Massachusetts Amherst (1)
- University of Washington School of Law (1)
- Vanderbilt University Law School (1)
- Keyword
-
- Computer Law (8)
- Copyright (6)
- Internet (6)
- Law and Technology (6)
- Adwords (4)
-
- Antitrust (4)
- Google (4)
- Information security (4)
- Intellectual Property Law (4)
- Software (4)
- Licenses (3)
- Network neutrality (3)
- Science and Technology (3)
- Trademark (3)
- Archiving (2)
- Commons (2)
- Communications Law (2)
- Computer crimes (2)
- Computer security (2)
- Consumer Protection Law (2)
- Copyright Law (2)
- Crime (2)
- DMCA (2)
- Derecho Civil (2)
- Digital Millennium Copyright Act (DMCA) (2)
- Disclosure (2)
- European Union (2)
- Interconnection (2)
- Law and Society (2)
- Legislation (2)
- Publication
-
- Journal of Digital Forensics, Security and Law (35)
- Annual ADFSL Conference on Digital Forensics, Security and Law (16)
- Canadian Journal of Law and Technology (11)
- ExpressO (7)
- Rosetta Stone v. Google (Joint Appendix) (7)
-
- UIC John Marshall Journal of Information Technology & Privacy Law (6)
- All Faculty Scholarship (4)
- Richmond Journal of Law & Technology (4)
- Articles by Maurer Faculty (3)
- Faculty Scholarship (3)
- Joseph P. Liu (3)
- UF Law Faculty Publications (3)
- UIC Law Review (3)
- Edward Ivan Cueva (2)
- Michigan Telecommunications & Technology Law Review (2)
- Villanova Law Review (2)
- Aaron K. Perzanowski (1)
- Articles (1)
- Books (1)
- Bruno L. Costantini García (1)
- Campbell Law Review (1)
- Cornell Law Faculty Publications (1)
- Eliza Mik (1)
- Erez Reuveni (1)
- Franck Dumortier (1)
- Harlan J Onsrud (1)
- Laura Quilter (1)
- Law Faculty Scholarship (1)
- Mark R Gillett (1)
- Matthew Rimmer (1)
- Publication Type
- File Type
Articles 121 - 136 of 136
Full-Text Articles in Computer Law
The Search Interest In Contract, Joshua Fairfield
The Search Interest In Contract, Joshua Fairfield
Articles by Maurer Faculty
Parties often do not negotiate for contract terms. Instead, parties search for the products, terms, and contractual counterparties they desire. The traditional negotiation-centered view of contract leads courts to try to determine the meaning of the parties where no meaning was negotiated and to waste time determining the benefits of bargains that were never struck. Further, while courts have ample tools to validate specifically negotiated contract terms, they lack the tools to respond to searched-for terms. Although the law and literature have long recognized that there is a disconnect between the legal fictions of negotiation and the reality of contracting …
The Disputed Quality Of Software Patents, John R. Allison, Ronald J. Mann
The Disputed Quality Of Software Patents, John R. Allison, Ronald J. Mann
Faculty Scholarship
We analyze the characteristics of the patents held by firms in the software industry. Unlike prior researchers, we rely on the examination of individual patents to determine which patents involve software inventions. This method of identifying the relevant patents is more laborious than the methods that previous scholars have used, but it produces a data set from which we can learn more about the role of patents in the software industry. In general, we find that patents the computer technology firms obtain on software inventions have more prior art references, claims, and forward citations than the patents that the same …
Comparison Between U.S. And E.U. Antitrust Treatment Of Tying Claims Against Microsoft: When Should The Bundling Of Computer Software Be Permitted, James F. Ponsoldt, Christohper D. David
Comparison Between U.S. And E.U. Antitrust Treatment Of Tying Claims Against Microsoft: When Should The Bundling Of Computer Software Be Permitted, James F. Ponsoldt, Christohper D. David
Northwestern Journal of International Law & Business
This article will analyze the recent U.S. and E.U. judicial approaches to tying charges which stem from software bundling. Part II reviews U.S. tying jurisprudence both generally and as applied to software bundling. Part III outlines the D.C. Circuit's approach to Microsoft's Windows/Internet Explorer bundle. Part IV briefly covers tying jurisprudence in the European Union. Part V describes the European Commission's ("E.C.") analysis of Microsoft's Window/Windows Media Player bundle. By comparing the two approaches, Part VI shows that neither approach is ideal: although the U.S. approach offers too little guidance to software manufacturers seeking to avoid liability and unduly discounts …
A/S/L 45/John Doe Offender/Federal Prison - The Third Circuit Takes A Hard Line Against Child Predators In United States V. Tykarsky, Elizabeth D. Tempio
A/S/L 45/John Doe Offender/Federal Prison - The Third Circuit Takes A Hard Line Against Child Predators In United States V. Tykarsky, Elizabeth D. Tempio
Villanova Law Review
No abstract provided.
Identity Theft: Plugging The Massive Data Leaks With A Stricter Nationwide Breach-Notification Law, 40 J. Marshall L. Rev. 681 (2007), Amanda Draper
Identity Theft: Plugging The Massive Data Leaks With A Stricter Nationwide Breach-Notification Law, 40 J. Marshall L. Rev. 681 (2007), Amanda Draper
UIC Law Review
No abstract provided.
Database Protection In The United States Is Alive And Well: Comments On Davison, Marshall A. Leaffer
Database Protection In The United States Is Alive And Well: Comments On Davison, Marshall A. Leaffer
Articles by Maurer Faculty
No abstract provided.
Notification Of Data Security Breaches, Paul M. Schwartz, Edward J. Janger
Notification Of Data Security Breaches, Paul M. Schwartz, Edward J. Janger
Michigan Law Review
The law increasingly requires private companies to disclose information for the benefit of consumers. The latest examples of such regulation are state and federal laws that require companies to notify individuals of data security incidents involving their personal information. These laws, proposed in the wake of highly publicized data spills, seek to punish the breached entity and to protect consumers by requiring the entity to notify its customers about the security breach. There are competing approaches, however to how the law is to mandate release of information about data leaks. This Article finds that the current statutes' focus on reputational …
"Stranger Than Fiction": Taxing Virtual Worlds, Leandra Lederman
"Stranger Than Fiction": Taxing Virtual Worlds, Leandra Lederman
Articles by Maurer Faculty
Virtual worlds, including massive multi-player on-line role-playing games (game worlds), such as City of Heroes, Everquest, and World of Warcraft, have become popular sources of entertainment. Game worlds provide scripted contexts for events such as quests. Other virtual worlds, such as Second Life, are unstructured virtual environments that lack specific goals but allow participants to socialize and engage virtually in such activities as shopping or attending a concert. Many of these worlds have become commodified, with millions of dollars of real-world trade in virtual items taking place every year. Most game worlds prohibit these real market transactions, but some worlds …
Software Patents, Incumbents, And Entry, John R. Allison, Abe Dunn, Ronald J. Mann
Software Patents, Incumbents, And Entry, John R. Allison, Abe Dunn, Ronald J. Mann
Faculty Scholarship
Software patents have been controversial since the days when "software" referred to the crude programs that came free with an IBM mainframe. Different perspectives have been presented in judicial, legislative, and administrative fora over the years, and the press has paid as much attention to this issue as it has to any other intellectual property topic during this time. Meanwhile, a software industry developed and has grown to a remarkable size, whether measured by revenues or profitability, number of firms or employees, or research expenditures. The scope of software innovation has become even broader, as an increasing number of devices …
A Marriage Of Convenience? A Comment On The Protection Of Databases, Jane C. Ginsburg
A Marriage Of Convenience? A Comment On The Protection Of Databases, Jane C. Ginsburg
Faculty Scholarship
Daniel Gervais concluded his analysis of the protection of databases with three options for the future. I would like to examine a fourth. Let us assume no future flurry of national or supranational legislative activity because the content of databases is in fact already being protected. Not through copyright or sui generis rights, but through other means. Databases are an object of economic value, and they will conveniently wed whatever legal theory or theories will achieve the practical objective of preventing unauthorized exploitation of the works' contents. To beat the marriage metaphor into the ground, I'd like to suggest that, …
The Magnificence Of The Disaster: Reconstructing The Sony Bmg Rootkit Incident, Deirdre K. Mulligan, Aaron Perzanowski
The Magnificence Of The Disaster: Reconstructing The Sony Bmg Rootkit Incident, Deirdre K. Mulligan, Aaron Perzanowski
Articles
Late in 2005, Sony BMG released millions of Compact Discs containing digital rights management technologies that threatened the security of its customers' computers and the integrity of the information infrastructure more broadly. This Article aims to identify the market, technological, and legal factors that appear to have led a presumably rational actor toward a strategy that in retrospect appears obviously and fundamentally misguided.
The Article first addresses the market-based rationales that likely influenced Sony BMG's deployment of these DRM systems and reveals that even the most charitable interpretation of Sony BMG's internal strategizing demonstrates a failure to adequately value security …
Copyright And Breathing Space, Joseph Liu
Copyright And Breathing Space, Joseph Liu
Joseph P. Liu
According to the U.S. Supreme Court, copyright law's fair use and idea/expression doctrines are "built-in free speech safeguards" that establish a "definitional balance" between copyright and the First Amendment. Yet these "built-in free speech safeguards" are among the most uncertain and ill-defined doctrines in all of copyright law. If we accept the Supreme Court's statement that these doctrines play a critical role as First Amendment safety valves, it follows that the chilling effect of uncertainty in these doctrines has a constitutional dimension. Current copyright law doctrine, however, fails to take into account the potential chilling effect of copyright liability. This …
Enabling Copyright Consumers, Joseph P. Liu
Enabling Copyright Consumers, Joseph P. Liu
Joseph P. Liu
Chapter 8 - The Contents Of On-Line Contracts, Eliza Mik
Chapter 8 - The Contents Of On-Line Contracts, Eliza Mik
Eliza Mik
No abstract provided.
Authorship In The Age Of The Conducer, Erez Reuveni
Authorship In The Age Of The Conducer, Erez Reuveni
Erez Reuveni
The age of centralized information production is over. Today, countless creative enterprises involve decentralized collaboration by hundreds of end-users. Yet, the Copyright Act's last major revision occurred over thirty years ago, when a centralized, corporate model of production was the primary means of delivering information products on a mass-market scale. This Article contends that several features of the Copyright Act, remnants of this earlier corporate-driven era, are outmoded and fail to offer optimal incentives for the decentralized, non-profit-driven model of creative production utilized by many in the software and information-production fields. Specifically, the Copyright Act assumes creativity stems from the …
Evolving Standards & The Future Of The Dmca Anticircumvention Rulemaking, Aaron K. Perzanowski
Evolving Standards & The Future Of The Dmca Anticircumvention Rulemaking, Aaron K. Perzanowski
Aaron K. Perzanowski
Every three years, the Copyright Office conducts a rulemaking to determine temporary exemptions from the Digital Millennium Copyright Act's (DMCA) anticircumvention provision. These exemptions are designed to prevent likely adverse impacts on noninfringing uses created by the prohibition on removing or bypassing technological protection measures that restrict access to copyrighted works. At the conclusion of the third and most recent rulemaking, the Librarian of Congress, acting on the advice of the Register of Copyrights, announced six classes of works exempt from the DMCA's anticircumvention provision for the three-year period ending October 27, 2009. This Article describes those exemptions and argues …