Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2008

PDF

Discipline
Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 118

Full-Text Articles in Computer Law

Front Matter Dec 2008

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Masthead Dec 2008

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


Back Matter Dec 2008

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Vol. Vi, Tab 38 - Ex. 24 - Email From Christopher Klipple, Christopher Klipple Dec 2008

Vol. Vi, Tab 38 - Ex. 24 - Email From Christopher Klipple, Christopher Klipple

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


The Software Licensing Dilemma, Nancy S. Kim Nov 2008

The Software Licensing Dilemma, Nancy S. Kim

BYU Law Review

No abstract provided.


Vol. Ix, Tab 46 - Ex. 29 - Email From Christina Aguilar (Google Account Strategist), Christina Aguilar Oct 2008

Vol. Ix, Tab 46 - Ex. 29 - Email From Christina Aguilar (Google Account Strategist), Christina Aguilar

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Vol. Vi, Tab 38 - Ex. 23 - Email From Christopher Klipple, Christopher Klipple Oct 2008

Vol. Vi, Tab 38 - Ex. 23 - Email From Christopher Klipple, Christopher Klipple

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


The Clear And Present Internet: Terrorism, Cyberspace, And The First Amendment, Peter Margulies Oct 2008

The Clear And Present Internet: Terrorism, Cyberspace, And The First Amendment, Peter Margulies

Law Faculty Scholarship

No abstract provided.


Front Matter Sep 2008

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Masthead Sep 2008

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


Back Matter Sep 2008

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Vol. Vi, Tab 38 - Ex. 21 - Email From Christina Aguilar, Christina Aguilar Sep 2008

Vol. Vi, Tab 38 - Ex. 21 - Email From Christina Aguilar, Christina Aguilar

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Is Europe Unfairly Attacking Another U.S. High Technology Company?, Robert H. Lande Sep 2008

Is Europe Unfairly Attacking Another U.S. High Technology Company?, Robert H. Lande

All Faculty Scholarship

This short piece considers whether the EU antitrust action against Intel constitutes an example of European regulators attacking a successful US company in order to protect a European competitor, or whether it instead is an example of legitimate law enforcement.


World War 4.0: The Intel Antitrust Wars, Robert H. Lande Jul 2008

World War 4.0: The Intel Antitrust Wars, Robert H. Lande

All Faculty Scholarship

This short piece gives an overview of antitrust actions filed around the world against Intel for allegedly undertaking anticompetitive actions in the market for X 86 PC chips.


Vol. Vi, Tab 38 - Ex. 39 - Email From Michael Wu, Michael Wu Jul 2008

Vol. Vi, Tab 38 - Ex. 39 - Email From Michael Wu, Michael Wu

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Network Neutrality: Laissez Faire Approach Or Not?, Rebecca Wong Dr Jul 2008

Network Neutrality: Laissez Faire Approach Or Not?, Rebecca Wong Dr

Dr Rebecca Wong

The paper discusses the topical subject of network neutrality, from a US and European legal perspective. Whilst acknowledging the plethora of literature on network neutrality, it argues that regulation in favour of network neutrality should not be confined with the US/European borders but that network neutrality should be addressed from a global perspective through the OECD/WTO. The article will begin by defining network neutrality, before discussing the technology underpinning network neutrality. It will compare the different legal approaches adopted by Europe and the US to the regulation of network neutrality. In Europe, there is an existing electronic communications regulatory framework, …


Maintaining Government Accountability: Calls For A "Public Use" Beyond Eminent Domain, Gregory S. Knapp Jul 2008

Maintaining Government Accountability: Calls For A "Public Use" Beyond Eminent Domain, Gregory S. Knapp

Indiana Law Journal

No abstract provided.


Front Matter Jun 2008

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Back Matter Jun 2008

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Masthead Jun 2008

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


Vol. Vi, Tab 38 - Ex. 38 - Email From Michael Wu, Michael Wu Jun 2008

Vol. Vi, Tab 38 - Ex. 38 - Email From Michael Wu, Michael Wu

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Vol. Vi, Tab 38 - Ex. 37 - Email From Michael Wu, Michael Wu Jun 2008

Vol. Vi, Tab 38 - Ex. 37 - Email From Michael Wu, Michael Wu

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Rethinking Broadband Internet Access, Daniel F. Spulber, Christopher S. Yoo Jun 2008

Rethinking Broadband Internet Access, Daniel F. Spulber, Christopher S. Yoo

All Faculty Scholarship

The emergence of broadband Internet technologies, such as cable modem and digital subscriber line (DSL) systems, has reopened debates over how the Internet should be regulated. Advocates of network neutrality and open access to cable modem systems have proposed extending the regulatory regime developed to govern conventional telephone and narrowband Internet service to broadband. A critical analysis of the rationales traditionally invoked to justify the regulation of telecommunications networks--such as natural monopoly, network economic effects, vertical exclusion, and the dangers of ruinous competition--reveals that those rationales depend on empirical and theoretical preconditions that do not apply to broadband. In addition, …


Tercer Congreso Nacional De Organismos Públicos Autónomos, Bruno L. Costantini García Jun 2008

Tercer Congreso Nacional De Organismos Públicos Autónomos, Bruno L. Costantini García

Bruno L. Costantini García

Tercer Congreso Nacional de Organismos Públicos Autónomos

"Autonomía, Reforma Legislativa y Gasto Público"


The Power Of Simple Hands-On Cyberforensics Exercises: A Guide For Faculty, Gary C. Kessler, Jim Hoag May 2008

The Power Of Simple Hands-On Cyberforensics Exercises: A Guide For Faculty, Gary C. Kessler, Jim Hoag

Gary C. Kessler

"Computer forensics is a hands-on discipline. Introductory skills, however, can be taught using simple exercises that require neither expensive laboratory facilities nor even face-to-face courses. This paper describes a simple floppy disk analysis project that allows an instructor to address issues ranging from the computer forensics process and basics of file systems to long file names, file signatures, and hashing. Projects are essential to teaching this discipline as they support active learning, constructivism, and active learning. These hands-on projects also offer an opportunity for courses to be taught online and for students to build their own toolkits using open source …


To Mine Or Not To Mine: Recent Developments In The Legal Ethics Debate Regarding Metadata, Boris Reznikov May 2008

To Mine Or Not To Mine: Recent Developments In The Legal Ethics Debate Regarding Metadata, Boris Reznikov

Washington Journal of Law, Technology & Arts

The American Bar Association recently decided that attorneys are not violating the Model Rules of Professional Conduct by reviewing opposing parties’ electronic documents for metadata. The stance taken by the American Bar Association contradicts views from ethics committees in other jurisdictions that have determined that lawyers who examine metadata are acting unethically. This Article summarizes the American Bar Association’s decision, as well as the other opinions on metadata, to help practicing attorneys understand the proper ethical considerations they must make when determining whether to look into an electronic document’s metadata.


The Cyber-Workplace – Identifying Liability Issues In The Information Age And Managing E-Risk, Nigel Wilson Apr 2008

The Cyber-Workplace – Identifying Liability Issues In The Information Age And Managing E-Risk, Nigel Wilson

Annual ADFSL Conference on Digital Forensics, Security and Law

The information age provides numerous opportunities for modern society but also presents significant challenges in identifying liability issues and in managing risk. Technological change has occurred rapidly and is continuing at the same time as other major trends and changes are taking place in society and, in particular, in the workplace. The prospect of global liability and the complexity of jurisdictional differences present a considerable hurdle to the uniform regulation of liability issues. General legislation and legal principles have been readily applied to the cyber-world and to modern business practices and the workplace. Where necessary, legislatures have introduced specific legislation …


Data Mining Techniques For Fraud Detection, Rekha Bhowmik Apr 2008

Data Mining Techniques For Fraud Detection, Rekha Bhowmik

Annual ADFSL Conference on Digital Forensics, Security and Law

The paper presents application of data mining techniques to fraud analysis. We present some classification and prediction data mining techniques which we consider important to handle fraud detection. There exist a number of data mining algorithms and we present statistics-based algorithm, decision tree-based algorithm and rule-based algorithm. We present Bayesian classification model to detect fraud in automobile insurance. Naïve Bayesian visualization is selected to analyze and interpret the classifier predictions. We illustrate how ROC curves can be deployed for model assessment in order to provide a more intuitive analysis of the models.

Keywords: Data Mining, Decision Tree, Bayesian Network, ROC …


Simple - Rethinking The Monolithic Approach To Digital Forensic Software, Craig Valli Apr 2008

Simple - Rethinking The Monolithic Approach To Digital Forensic Software, Craig Valli

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper outlines a collaborative project nearing completion between the sec.au Security Research Group at Edith Cowan University and Western Australian Police Computer Crime Squad. The primary goal of this project is to create a software tool for use by non-technical law enforcement officers during the initial investigation and assessment of an electronic crime scene. This tool will be designed as an initial response tool, to quickly and easily find, view and export any relevant files stored on a computer, establishing if further expert investigation of that computer is warranted. When fully developed, the tool will allow investigators unprecedented real …


How Virtualized Environments Affect Computer Forensics, Diane Barrett Apr 2008

How Virtualized Environments Affect Computer Forensics, Diane Barrett

Annual ADFSL Conference on Digital Forensics, Security and Law

Virtualized environments can make forensics investigation more difficult. Technological advances in virtualization tools essentially make removable media a PC that can be carried around in a pocket or around a neck. Running operating systems and applications this way leaves very little trace on the host system. This paper will explore all the newest methods for virtualized environments and the implications they have on the world of forensics. It will begin by describing and differentiating between software and hardware virtualization. It will then move on to explain the various methods used for server and desktop virtualization. Next, it will describe the …