Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (48)
- Computer Sciences (40)
- Information Security (40)
- Physical Sciences and Mathematics (40)
- Science and Technology Law (39)
-
- Intellectual Property Law (34)
- Social and Behavioral Sciences (31)
- Computer Engineering (28)
- Engineering (28)
- Electrical and Computer Engineering (27)
- Forensic Science and Technology (27)
- Legal Studies (27)
- Privacy Law (18)
- Legal Writing and Research (8)
- Antitrust and Trade Regulation (5)
- Communications Law (5)
- Law and Economics (5)
- Administrative Law (4)
- Banking and Finance Law (3)
- Business (3)
- Business Organizations Law (3)
- Constitutional Law (3)
- Consumer Protection Law (3)
- Contracts (3)
- First Amendment (3)
- International Law (3)
- Public Law and Legal Theory (3)
- Accounting Law (2)
- Institution
-
- Embry-Riddle Aeronautical University (40)
- UIC School of Law (33)
- Santa Clara Law (16)
- Selected Works (3)
- SelectedWorks (3)
-
- University of Michigan Law School (3)
- Maurer School of Law: Indiana University (2)
- University of Baltimore Law (2)
- University of Pennsylvania Carey Law School (2)
- University of Richmond (2)
- University of Washington School of Law (2)
- Vanderbilt University Law School (2)
- American University Washington College of Law (1)
- Boston University School of Law (1)
- Brigham Young University Law School (1)
- Chicago-Kent College of Law (1)
- Roger Williams University (1)
- University of Florida Levin College of Law (1)
- University of Maryland Francis King Carey School of Law (1)
- University of Miami Law School (1)
- Keyword
-
- Adwords (11)
- Google (10)
- Trademark (8)
- Rosetta Stone (7)
- Privacy (6)
-
- Coalition (4)
- Lobby (4)
- Rosetta (4)
- Copyright (3)
- Adword (2)
- Analysis (2)
- Antitrust (2)
- Complaint (2)
- Computer Forensics (2)
- Computers (2)
- Data disposal (2)
- Data recovery (2)
- Data security (2)
- Digital Forensics (2)
- Digital forensics (2)
- Electronic data destruction (2)
- Fair use (2)
- Intel (2)
- Intellectual Property Law (2)
- Licenses (2)
- Network neutrality (2)
- Policy change (2)
- Software (2)
- Technology (2)
- 2008 (1)
- Publication
-
- Journal of Digital Forensics, Security and Law (34)
- UIC John Marshall Journal of Information Technology & Privacy Law (30)
- Rosetta Stone v. Google (Joint Appendix) (16)
- Annual ADFSL Conference on Digital Forensics, Security and Law (6)
- All Faculty Scholarship (5)
-
- Articles (2)
- Richmond Journal of Law & Technology (2)
- UIC Law Review (2)
- Vanderbilt Journal of Entertainment & Technology Law (2)
- Articles by Maurer Faculty (1)
- Articles in Law Reviews & Other Academic Journals (1)
- BYU Law Review (1)
- Bruno L. Costantini García (1)
- Dr Rebecca Wong (1)
- Faculty Scholarship (1)
- Gary C. Kessler (1)
- Harlan J Onsrud (1)
- Indiana Law Journal (1)
- Joseph P. Liu (1)
- Karen McCullagh (1)
- Law Faculty Scholarship (1)
- Law Librarian Scholarship (1)
- Maryland Law Review (1)
- Michigan Law Review (1)
- Michigan Telecommunications & Technology Law Review (1)
- UF Law Faculty Publications (1)
- UIC Law Open Access Faculty Scholarship (1)
- Washington Journal of Law, Technology & Arts (1)
- Publication Type
Articles 1 - 30 of 118
Full-Text Articles in Computer Law
Vol. Vi, Tab 38 - Ex. 24 - Email From Christopher Klipple, Christopher Klipple
Vol. Vi, Tab 38 - Ex. 24 - Email From Christopher Klipple, Christopher Klipple
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
The Software Licensing Dilemma, Nancy S. Kim
Vol. Ix, Tab 46 - Ex. 29 - Email From Christina Aguilar (Google Account Strategist), Christina Aguilar
Vol. Ix, Tab 46 - Ex. 29 - Email From Christina Aguilar (Google Account Strategist), Christina Aguilar
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
Vol. Vi, Tab 38 - Ex. 23 - Email From Christopher Klipple, Christopher Klipple
Vol. Vi, Tab 38 - Ex. 23 - Email From Christopher Klipple, Christopher Klipple
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
The Clear And Present Internet: Terrorism, Cyberspace, And The First Amendment, Peter Margulies
The Clear And Present Internet: Terrorism, Cyberspace, And The First Amendment, Peter Margulies
Law Faculty Scholarship
No abstract provided.
Vol. Vi, Tab 38 - Ex. 21 - Email From Christina Aguilar, Christina Aguilar
Vol. Vi, Tab 38 - Ex. 21 - Email From Christina Aguilar, Christina Aguilar
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
Is Europe Unfairly Attacking Another U.S. High Technology Company?, Robert H. Lande
Is Europe Unfairly Attacking Another U.S. High Technology Company?, Robert H. Lande
All Faculty Scholarship
This short piece considers whether the EU antitrust action against Intel constitutes an example of European regulators attacking a successful US company in order to protect a European competitor, or whether it instead is an example of legitimate law enforcement.
World War 4.0: The Intel Antitrust Wars, Robert H. Lande
World War 4.0: The Intel Antitrust Wars, Robert H. Lande
All Faculty Scholarship
This short piece gives an overview of antitrust actions filed around the world against Intel for allegedly undertaking anticompetitive actions in the market for X 86 PC chips.
Vol. Vi, Tab 38 - Ex. 39 - Email From Michael Wu, Michael Wu
Vol. Vi, Tab 38 - Ex. 39 - Email From Michael Wu, Michael Wu
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
Network Neutrality: Laissez Faire Approach Or Not?, Rebecca Wong Dr
Network Neutrality: Laissez Faire Approach Or Not?, Rebecca Wong Dr
Dr Rebecca Wong
The paper discusses the topical subject of network neutrality, from a US and European legal perspective. Whilst acknowledging the plethora of literature on network neutrality, it argues that regulation in favour of network neutrality should not be confined with the US/European borders but that network neutrality should be addressed from a global perspective through the OECD/WTO. The article will begin by defining network neutrality, before discussing the technology underpinning network neutrality. It will compare the different legal approaches adopted by Europe and the US to the regulation of network neutrality. In Europe, there is an existing electronic communications regulatory framework, …
Maintaining Government Accountability: Calls For A "Public Use" Beyond Eminent Domain, Gregory S. Knapp
Maintaining Government Accountability: Calls For A "Public Use" Beyond Eminent Domain, Gregory S. Knapp
Indiana Law Journal
No abstract provided.
Vol. Vi, Tab 38 - Ex. 38 - Email From Michael Wu, Michael Wu
Vol. Vi, Tab 38 - Ex. 38 - Email From Michael Wu, Michael Wu
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
Vol. Vi, Tab 38 - Ex. 37 - Email From Michael Wu, Michael Wu
Vol. Vi, Tab 38 - Ex. 37 - Email From Michael Wu, Michael Wu
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
Rethinking Broadband Internet Access, Daniel F. Spulber, Christopher S. Yoo
Rethinking Broadband Internet Access, Daniel F. Spulber, Christopher S. Yoo
All Faculty Scholarship
The emergence of broadband Internet technologies, such as cable modem and digital subscriber line (DSL) systems, has reopened debates over how the Internet should be regulated. Advocates of network neutrality and open access to cable modem systems have proposed extending the regulatory regime developed to govern conventional telephone and narrowband Internet service to broadband. A critical analysis of the rationales traditionally invoked to justify the regulation of telecommunications networks--such as natural monopoly, network economic effects, vertical exclusion, and the dangers of ruinous competition--reveals that those rationales depend on empirical and theoretical preconditions that do not apply to broadband. In addition, …
Tercer Congreso Nacional De Organismos Públicos Autónomos, Bruno L. Costantini García
Tercer Congreso Nacional De Organismos Públicos Autónomos, Bruno L. Costantini García
Bruno L. Costantini García
Tercer Congreso Nacional de Organismos Públicos Autónomos
"Autonomía, Reforma Legislativa y Gasto Público"
The Power Of Simple Hands-On Cyberforensics Exercises: A Guide For Faculty, Gary C. Kessler, Jim Hoag
The Power Of Simple Hands-On Cyberforensics Exercises: A Guide For Faculty, Gary C. Kessler, Jim Hoag
Gary C. Kessler
To Mine Or Not To Mine: Recent Developments In The Legal Ethics Debate Regarding Metadata, Boris Reznikov
To Mine Or Not To Mine: Recent Developments In The Legal Ethics Debate Regarding Metadata, Boris Reznikov
Washington Journal of Law, Technology & Arts
The American Bar Association recently decided that attorneys are not violating the Model Rules of Professional Conduct by reviewing opposing parties’ electronic documents for metadata. The stance taken by the American Bar Association contradicts views from ethics committees in other jurisdictions that have determined that lawyers who examine metadata are acting unethically. This Article summarizes the American Bar Association’s decision, as well as the other opinions on metadata, to help practicing attorneys understand the proper ethical considerations they must make when determining whether to look into an electronic document’s metadata.
The Cyber-Workplace – Identifying Liability Issues In The Information Age And Managing E-Risk, Nigel Wilson
The Cyber-Workplace – Identifying Liability Issues In The Information Age And Managing E-Risk, Nigel Wilson
Annual ADFSL Conference on Digital Forensics, Security and Law
The information age provides numerous opportunities for modern society but also presents significant challenges in identifying liability issues and in managing risk. Technological change has occurred rapidly and is continuing at the same time as other major trends and changes are taking place in society and, in particular, in the workplace. The prospect of global liability and the complexity of jurisdictional differences present a considerable hurdle to the uniform regulation of liability issues. General legislation and legal principles have been readily applied to the cyber-world and to modern business practices and the workplace. Where necessary, legislatures have introduced specific legislation …
Data Mining Techniques For Fraud Detection, Rekha Bhowmik
Data Mining Techniques For Fraud Detection, Rekha Bhowmik
Annual ADFSL Conference on Digital Forensics, Security and Law
The paper presents application of data mining techniques to fraud analysis. We present some classification and prediction data mining techniques which we consider important to handle fraud detection. There exist a number of data mining algorithms and we present statistics-based algorithm, decision tree-based algorithm and rule-based algorithm. We present Bayesian classification model to detect fraud in automobile insurance. Naïve Bayesian visualization is selected to analyze and interpret the classifier predictions. We illustrate how ROC curves can be deployed for model assessment in order to provide a more intuitive analysis of the models.
Keywords: Data Mining, Decision Tree, Bayesian Network, ROC …
Simple - Rethinking The Monolithic Approach To Digital Forensic Software, Craig Valli
Simple - Rethinking The Monolithic Approach To Digital Forensic Software, Craig Valli
Annual ADFSL Conference on Digital Forensics, Security and Law
This paper outlines a collaborative project nearing completion between the sec.au Security Research Group at Edith Cowan University and Western Australian Police Computer Crime Squad. The primary goal of this project is to create a software tool for use by non-technical law enforcement officers during the initial investigation and assessment of an electronic crime scene. This tool will be designed as an initial response tool, to quickly and easily find, view and export any relevant files stored on a computer, establishing if further expert investigation of that computer is warranted. When fully developed, the tool will allow investigators unprecedented real …
How Virtualized Environments Affect Computer Forensics, Diane Barrett
How Virtualized Environments Affect Computer Forensics, Diane Barrett
Annual ADFSL Conference on Digital Forensics, Security and Law
Virtualized environments can make forensics investigation more difficult. Technological advances in virtualization tools essentially make removable media a PC that can be carried around in a pocket or around a neck. Running operating systems and applications this way leaves very little trace on the host system. This paper will explore all the newest methods for virtualized environments and the implications they have on the world of forensics. It will begin by describing and differentiating between software and hardware virtualization. It will then move on to explain the various methods used for server and desktop virtualization. Next, it will describe the …