Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (2576)
- Science and Technology Law (1902)
- Privacy Law (1531)
- Intellectual Property Law (1429)
- Physical Sciences and Mathematics (823)
-
- Computer Sciences (819)
- Information Security (734)
- Social and Behavioral Sciences (696)
- Engineering (583)
- Legal Studies (493)
- Forensic Science and Technology (475)
- Computer Engineering (463)
- International Law (420)
- Electrical and Computer Engineering (398)
- Constitutional Law (383)
- Communications Law (379)
- Contracts (360)
- Criminal Law (359)
- Administrative Law (337)
- Law and Economics (327)
- Business Organizations Law (325)
- Banking and Finance Law (323)
- Legislation (322)
- Consumer Protection Law (300)
- Health Law and Policy (300)
- Law and Society (297)
- Entertainment, Arts, and Sports Law (289)
- Torts (288)
- Institution
-
- UIC School of Law (902)
- Embry-Riddle Aeronautical University (711)
- Schulich School of Law, Dalhousie University (267)
- Selected Works (245)
- SelectedWorks (176)
-
- Seattle University School of Law (143)
- Santa Clara Law (138)
- Universitas Indonesia (129)
- University of Richmond (118)
- University of Washington School of Law (116)
- DePaul University (90)
- Maurer School of Law: Indiana University (88)
- University of Michigan Law School (84)
- Southern Methodist University (78)
- BLR (58)
- University of Pennsylvania Carey Law School (58)
- Vanderbilt University Law School (55)
- Duke Law (50)
- Washington and Lee University School of Law (47)
- University of Georgia School of Law (44)
- American University Washington College of Law (39)
- Villanova University Charles Widger School of Law (39)
- Chicago-Kent College of Law (37)
- Brooklyn Law School (36)
- University of Colorado Law School (32)
- University of Maryland Francis King Carey School of Law (32)
- Boston University School of Law (30)
- Fordham Law School (29)
- University of Baltimore Law (27)
- Cleveland State University (26)
- Keyword
-
- Privacy (211)
- Internet (181)
- Computer Law (176)
- Copyright (138)
- Law and Technology (138)
-
- Google (127)
- Technology (126)
- Intellectual Property Law (94)
- Science and Technology (94)
- Software (87)
- Adwords (83)
- Artificial intelligence (70)
- Cybersecurity (65)
- Intellectual property (64)
- Trademark (63)
- Communications Law (60)
- AI (56)
- First Amendment (52)
- Regulation (51)
- Rosetta Stone (51)
- Social media (51)
- Cyberspace (50)
- Digital forensics (46)
- Data (44)
- Computers (43)
- Law (43)
- Intellectual Property (42)
- Antitrust (41)
- Surveillance (40)
- International Law (39)
- Publication Year
- Publication
-
- UIC John Marshall Journal of Information Technology & Privacy Law (794)
- Journal of Digital Forensics, Security and Law (526)
- Canadian Journal of Law and Technology (246)
- Annual ADFSL Conference on Digital Forensics, Security and Law (182)
- Rosetta Stone v. Google (Joint Appendix) (136)
-
- Seattle University Law Review (125)
- "Dharmasisya” Jurnal Program Magister Hukum FHUI (123)
- Richmond Journal of Law & Technology (105)
- All Faculty Scholarship (93)
- Faculty Scholarship (86)
- Articles (76)
- SMU Science and Technology Law Review (75)
- DePaul Journal of Art, Technology & Intellectual Property Law (72)
- UIC Law Review (62)
- ExpressO (57)
- Washington Journal of Law, Technology & Arts (54)
- Duke Law & Technology Review (48)
- Articles by Maurer Faculty (43)
- Villanova Law Review (34)
- Publications (32)
- Matthew Rimmer (31)
- Vanderbilt Journal of Entertainment & Technology Law (31)
- UIC Review of Intellectual Property Law (30)
- Washington and Lee Law Review (29)
- Fordham Law Review (25)
- Professor Katina Michael (25)
- Chicago-Kent Law Review (23)
- Michigan Law Review (22)
- Michigan Telecommunications & Technology Law Review (21)
- Articles in Law Reviews & Other Academic Journals (20)
- Publication Type
Articles 3331 - 3360 of 4589
Full-Text Articles in Computer Law
Carousel Fraud In The Eu: A Digital Vat Solution, Richard Thompson Ainsworth
Carousel Fraud In The Eu: A Digital Vat Solution, Richard Thompson Ainsworth
Faculty Scholarship
Recent reports from the UK's Office for National Statistics estimate (as of May 11, 2006) that Missing Trader Intra-community Fraud (MTIC) may exceed 10 billion pounds this year.
Carousel fraud, a variant of MTIC where the same goods are sold over and over again, exploits the lingering non-certified, non-digital attributes of the EU VAT. The UK believes that carousel fraud cost the Exchequer between 1.12 and 1.9 billion pounds in the 2004-05 financial year. This article proposes that carousel fraud be eliminated in the EU through selective insertion of Digital VAT functionality into the present system. In other words, it …
Privacy And Access To Public Records In The Information Age, Sol Bermann
Privacy And Access To Public Records In The Information Age, Sol Bermann
ExpressO
Online public record access brings a wealth of benefits ranging from greater government access and accountability to increased cost-savings and efficiencies. However, due to the presence of highly sensitive, personal data, an increase in public records access also brings potential dangers, including heightened risk of identity theft and frivolous snooping into the affairs of others.
Historically, public records have had some measure of public accessibility in order to empower citizens with the ability to observe the goings-on of government, leading to greater government accountability. Until the rise of the internet, citizens have had their privacy protected through practical obscurity (the …
Paper Session V: Forensic Software Tools For Cell Phone Subscriber Identity Modules, Wayne Jansen, Rick Ayers
Paper Session V: Forensic Software Tools For Cell Phone Subscriber Identity Modules, Wayne Jansen, Rick Ayers
Annual ADFSL Conference on Digital Forensics, Security and Law
Cell phones and other handheld devices incorporating cell phone capabilities (e.g., smart phones) are ubiquitous. Besides placing calls, cell phones allow users to perform other tasks such as text messaging and phonebook entry management. When cell phones and cellular devices are involved in a crime or other incident, forensic specialists require tools that allow the proper retrieval and speedy examination of data present on the device. For devices conforming to the Global System for Mobile Communications (GSM) standards, certain data such as dialed numbers, text messages, and phonebook entries are maintained on a Subscriber Identity Module (SIM). This paper gives …
Paper Session V: Steganography And Terrorist Communications - Current Information And Trends - Tools, Analysis And Future Directions In Steganalysis In Context With Terrorists And Other Criminals, William Eyre, Marcus Rogers
Paper Session V: Steganography And Terrorist Communications - Current Information And Trends - Tools, Analysis And Future Directions In Steganalysis In Context With Terrorists And Other Criminals, William Eyre, Marcus Rogers
Annual ADFSL Conference on Digital Forensics, Security and Law
In ancient times, users communicated using steganography, “…derived from the Greek words steganos, meaning ‘covered’, and graphein, meaning ‘to write.’” (Singh, 1999, p.5) Steganography facilitates secret, undetected communication. In modern times, in the context of the Global War on Terror, national intelligence and law enforcement agencies need tools to detect hidden information (steganography) in various types of media, most specifically to uncover the placement of hidden information in images. This paper will look at steganography in general terms, presenting the theory of some common steganographic techniques and touching on some theoretical work in steganography. Then a discussion of how to …
Paper Session Iv: Toward Understanding Digital Forensics As A Profession: Defining Curricular Needs (***Research In Process ***), Michelle Wolf, Alan Shafer, Michael Gendron
Paper Session Iv: Toward Understanding Digital Forensics As A Profession: Defining Curricular Needs (***Research In Process ***), Michelle Wolf, Alan Shafer, Michael Gendron
Annual ADFSL Conference on Digital Forensics, Security and Law
This research paper presents research in process which attempts to define the common body of knowledge (CBK) of digital forensics. Digital forensics is not well defined not does it have a generally accepted CBK. The first three phases of completed research, in a four-phase research process are discussed. The early results have created a preliminary CBK, and final validation is underway.
Paper Session Iv: Development And Delivery Of Coursework - The Legal/Regulatory/Policy Environment Of Cyberforensics, John W. Bagby, John C. Ruhnka
Paper Session Iv: Development And Delivery Of Coursework - The Legal/Regulatory/Policy Environment Of Cyberforensics, John W. Bagby, John C. Ruhnka
Annual ADFSL Conference on Digital Forensics, Security and Law
This paper describes a cyber-forensics course that integrates important public policy and legal issues as well as relevant forensic techniques. Cyber-forensics refers to the amalgam of multi-disciplinary activities involved in the identification, gathering, handling, custody, use and security of electronic files and records, involving expertise from the forensic domain, and which produces evidence useful in the proof of facts for both commercial and legal activities. The legal and regulatory environment in which electronic discovery takes place is of critical importance to cyber-forensics experts because the legal process imposes both constraints and opportunities for the effective use of evidence gathered through …
Paper Session Iii: Research Brief: A Curriculum For Teaching Information Technology Investigative Techniques For Auditors, Grover S. Kearns, Elizabeth V. Mulig
Paper Session Iii: Research Brief: A Curriculum For Teaching Information Technology Investigative Techniques For Auditors, Grover S. Kearns, Elizabeth V. Mulig
Annual ADFSL Conference on Digital Forensics, Security and Law
Recent prosecutions of highly publicized white-collar crimes combined with public outrage have resulted in heightened regulation and greater emphasis on systems of internal control. Because both white-collar and cybercrimes are usually perpetrated through computers, auditors’ knowledge of information technology (IT) is now more vital than ever. However, preserving digital evidence and investigative techniques, which can be essential to fraud examinations, are not skills frequently taught in accounting programs. Furthermore, many students are not instructed in the use of computer assisted auditing tools and techniques – applications that might uncover fraudulent activity. Only a limited number of university-level accounting classes provide …
Paper Session Ii: Forensic Scene Documentation Using Mobile Technology, Ibrahim Baggili
Paper Session Ii: Forensic Scene Documentation Using Mobile Technology, Ibrahim Baggili
Annual ADFSL Conference on Digital Forensics, Security and Law
This paper outlines a framework for integrating forensic scene documentation with mobile technology. Currently there are no set standards for documenting a forensic scene. Nonetheless, there is a conceptual framework that forensic scientists and engineers use that includes note taking, scene sketches, photographs, video, and voice interview recordings. This conceptual framework will be the basis that a mobile forensic scene documentation software system is built on. A mobile software system for documenting a forensic scene may help in standardizing forensic scene documentation by regulating the data collection and documentation processes for various forensic disciplines.
Identity Theft And Consumer Protection: Finding Sensible Approaches To Safeguard Personal Data In The United States And Canada, Kamaal Zaidi
Identity Theft And Consumer Protection: Finding Sensible Approaches To Safeguard Personal Data In The United States And Canada, Kamaal Zaidi
ExpressO
This paper examines identity theft in both the United States and Canada. Various examples of commercial fraud and scams are discussed in the context of a growing trend of identity thieves assuming identities of innocent consumers. As such, various pieces of legislation and consumer initiatives (involving online consumer complaint mechanisms)in U.S. and Canadian jurisdictions are highlighted to demonstrate the pursuit towards broader consumer protection of personal data used in daily commercial transactions. The author argues that these modern efforts to safeguard consumers from identity theft is a progressive measure that will continue to afford increasing protections for consumer personal data, …
Opening Bottlenecks: On Behalf Of Mandated Network Neutrality, Bill D. Herman
Opening Bottlenecks: On Behalf Of Mandated Network Neutrality, Bill D. Herman
ExpressO
This paper calls for mandated “network neutrality,” the principle that broadband service providers (BSPs) should generally treat all nondestructive data equally. Without such a mandate, BSPs will likely begin charging content providers for the right to send data at the fastest speeds available. The present frequency with which BSPs block some data entirely will also likely increase.
Neutral networks are preferable for two key reasons. First, they spawn innovation, as illustrated by the explosive online innovation to date. Second, neutral networks better distribute communication power, promoting First Amendment values. Extant and likely future acts of discrimination erode both goals. The …
The Spy Act: Ditching Damages As An Element Of Liability For On-Line Conduct Between Private Parties?, Andrew T. Braff
The Spy Act: Ditching Damages As An Element Of Liability For On-Line Conduct Between Private Parties?, Andrew T. Braff
Washington Journal of Law, Technology & Arts
The question of how to stymie the proliferation of spyware on computers has been a recurring topic of debate in Congress and in the technology industry. With the passage of the SPY ACT (H.R. 29) a high probability, this article highlights its prohibitions, with particular emphasis on how they change current legal regimes. Most federal computer statutes—insofar as they address actions victimizing private citizens—require damage to the computer. In addition, one of the elements of common law trespass to chattel is damage. Whether intended or not, the SPY ACT subtly introduces a strict liability component into federal computer and Internet …
Ests Under Canadian Patent Law: Useful Or Not?, Natalie C. Bellefeuille
Ests Under Canadian Patent Law: Useful Or Not?, Natalie C. Bellefeuille
Canadian Journal of Law and Technology
The following discussion will examine the utility requirement for patentability in the context of EST patents. Part I will provide background information regarding the utility requirement under patent law and will explain why it has been difficult to apply to ESTs. Part II will briefly examine how other jurisdictions, in particular the United States, have addressed the difficul- ties associated with applying the current utility require- ment to biological materials, in particular ESTs. Part III will look at how Canadian courts have interpreted and applied the utility requirement for patentability, and will suggest that ESTs have sufficient value to the …
E-Commerce Legislation And Materials In Canada: Lois Sur Le Commerce Électronique Au Canada Et Documents Connexes By Sunny Handa, Claude Marseille & Martin Sheehan (Markham, Ont.: Lexisnexis Butterworths, 2005), John D. Gregory
Canadian Journal of Law and Technology
This hefty volume is a useful compendium of the basic source materials for the law of electronic commerce in Canada. It offers the text of all the general-purpose legislation that removes legal barriers to the use of electronic communications, for all jurisdictions in the country. It then takes a dozen related areas of law, from domain names to taxation, from competition law to consumer protection, from security to standards, and offers a quick overview and the key documents applicable to each. In each case the commentary is in English then in French, and where the texts are available in both …
It Waste Management In Canada: From Cost Recovery To Resource Conservation?, Meinhard Doelle
It Waste Management In Canada: From Cost Recovery To Resource Conservation?, Meinhard Doelle
Canadian Journal of Law and Technology
The volume, composition and management of solid waste generated by households, governments, the commercial sector, and industry have all changed dramatically over the past century. Household waste contained mainly organic material a hundred years ago. Today, both residential and commercial waste is a complex mix of organics, plastics, paper products, metals and a variety of toxic material. Historically, individual households looked after their own waste, through efforts such as composting and burning. Over the past century, with significant increases in volume of waste generated, municipalities have taken over primary responsibility for solid waste management, initially mainly for aesthetic and sanitary …
Personal Medical Information: Privacy Or Personal Data Protection?, Wilhelm Peekhaus
Personal Medical Information: Privacy Or Personal Data Protection?, Wilhelm Peekhaus
Canadian Journal of Law and Technology
Some of the existing literature concerning the privacy of health information seems to suggest that medical information has a particularly special nature; either through its oft-cited association with dignity or the need for its ‘‘unobstructed’’ use by health care practitioners for a variety of reasons. It is against such a backdrop that this paper will review and compare a number of legislative mechanisms that have been designed to meet the challenge of safeguarding the privacy of personal information without completely hindering the continued flow of information required by economic and health care systems. An attempt will be made to situate …
Common Law Property Metaphors On The Internet: The Real Problem With The Doctrine Of Cybertrespass, Shyamkrishna Balganesh
Common Law Property Metaphors On The Internet: The Real Problem With The Doctrine Of Cybertrespass, Shyamkrishna Balganesh
All Faculty Scholarship
The doctrine of cybertrespass represents one of the most recent attempts by courts to apply concepts and principles from the real world to the virtual world of the Internet. A creation of state common law, the doctrine essentially involved extending the tort of trespass to chattels to the electronic world. Consequently, unauthorized electronic interferences are deemed trespassory intrusions and rendered actionable. The present paper aims to undertake a conceptual study of the evolution of the doctrine, examining the doctrinal modifications courts were required to make to mould the doctrine to meet the specificities of cyberspace. It then uses cybertrespass to …
Producers And Consumers In Eu E-Commerce Law, Banu Sit
Producers And Consumers In Eu E-Commerce Law, Banu Sit
Canadian Journal of Law and Technology
Rapid growth of technology in the last decades has given rise to electronic commerce (e-commerce) as a new mode of commerce. This new commerce environment has many characteristics that affect commercial relationships and parties. Of these characteristics, global and borderless commercial activity and the intangible nature of communication can be singled out.
From a legal perspective, e-commerce has developed new modes, of contract formation, performance of contracts for intangible goods, as well as payment. In this new borderless and transient sphere, certain interests of parties involved in commercial activities as buyers or sellers are in need of protection. In particular, …
How Much Spam Can Can-Spam Can? – Evaluating The Effectiveness Of The Can-Spam Act In The Wake Of White Buffalo Ventures V. University Of Texas, Fay Katayama
ExpressO
No abstract provided.
Vol. Ix, Tab 46 - Ex. 8 - Email From Emily White, Emily White
Vol. Ix, Tab 46 - Ex. 8 - Email From Emily White, Emily White
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
Buried Online: State Laws That Limit E-Commerce In Caskets, Jerry Ellig, Asheesh Agarwal
Buried Online: State Laws That Limit E-Commerce In Caskets, Jerry Ellig, Asheesh Agarwal
ExpressO
Consumers seeking to purchase caskets online could benefit from the Supreme Court’s 2005 decision that states cannot discriminate against interstate direct wine shipment. Federal courts have reached conflicting conclusions when asked whether state laws requiring casket sellers to be licensed funeral directors violate the U.S. Constitution’s Due Process Clause. In Powers v. Harris, the 10th Circuit even offered an unprecedented ruling that economic protectionism is a legitimate state interest that can justify otherwise unconstitutional policies. In Granholm v. Heald, however, the Supreme Court declared that discriminatory barriers to interstate wine shipment must be justified by a legitimate state interest, and …
Criminalizing Internet Gambling: Should The Federal Government Keep Bluffing Or Fold?, Wesley S. Ashton
Criminalizing Internet Gambling: Should The Federal Government Keep Bluffing Or Fold?, Wesley S. Ashton
ExpressO
This paper first describes the various mechanical aspects of Internet gambling, and then reviews the U.S. criminal laws that apply to gambling conducted online. As part of this review, several criminal and civil cases involving Internet gambling activities are discussed. Lastly, how the rapidly changing gambling landscape in the United States and the world may effect future federal lawmaking efforts for controlling Internet gambling is considered.
Opting Out: Procedural Fair Use, Michael R. Mattioli
Opting Out: Procedural Fair Use, Michael R. Mattioli
ExpressO
This article explores the advantages of opt-out plans, and identifies a critical shortcoming in Copyright’s doctrine of Fair Use. The discussion is fueled by a current controversy: In December of 2004, Google, Inc. announced its plan to digitally scan thousands of copyrighted books as part of a massive new digital indexing service. Hedging against possible litigation, Google provided a free and easy opt-out procedure for authors who didn’t want their books scanned. Despite this measure, two major authors’ groups have sued Google, claiming the opt-out plan imposes an unfair burden. This article explores the fairness of established opt-outs in contract …
Vol. Vi, Tab 38 - Ex. 32 - Language Learning In The United States Of America, Rosetta Stone
Vol. Vi, Tab 38 - Ex. 32 - Language Learning In The United States Of America, Rosetta Stone
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
Online Boilerplate: Would Mandatory Website Disclosure Of E-Standard Terms Backfire?, Robert A. Hillman
Online Boilerplate: Would Mandatory Website Disclosure Of E-Standard Terms Backfire?, Robert A. Hillman
Cornell Law Faculty Publications
No abstract provided.
The Secret Is Out: Patent Law Preempts Mass Market License Terms Barring Reverse Engineering For Interoperability Purposes, Daniel Laster
The Secret Is Out: Patent Law Preempts Mass Market License Terms Barring Reverse Engineering For Interoperability Purposes, Daniel Laster
ExpressO
As patent protection has emerged to protect software, courts and commentators have mistakenly focused on copyright law and overlooked the centrality of patent preemption to limit contract law where a mass market license which prohibits reverse engineering (RE) for purposes of developing interoperable products leads to patent-like protection. Review of copyright fair use cases on RE and Congress’s policy favoring RE for interoperability purposes in the Digital Millennium Copyright Act reinforce the case for patent preemption. Also, the fundamental freedom to RE embodied in state trade secret law, coupled with federal patent and copyright law and policies, cumulatively should override …
Choice In Government Software Procurement: A Winning Combination, Mclean Sieverding
Choice In Government Software Procurement: A Winning Combination, Mclean Sieverding
ExpressO
Governments are such significant purchasers of IT products and services that their purchasing decisions have a substantial impact on the world’s IT marketplace. This fact calls into question the wisdom of decisions by a few policymakers (on national, state, and local levels) around the world that have sought to require that governmental procurement officials give varying degrees of preference to open source software (OSS) when evaluating competing software solutions, claiming, among other things, that such preferences are justified because OSS is cheaper and more interoperable than proprietary software and needs government handicapping in order to enter the market to compete …
Book Review: Digital Crime And Forensic Science In Cyberspace, Gary C. Kessler
Book Review: Digital Crime And Forensic Science In Cyberspace, Gary C. Kessler
Journal of Digital Forensics, Security and Law
This issue presents the first Book Review column for the JDFSL. It is an experiment to broaden the services that the journal provides to readers, so we are anxious to get your reaction. Is the column useful and interesting? Should we include more than one review per issue? Should we also review products? Do you have suggested books/products for review and/or do you want to write a review? All of this type of feedback -- and more -- is appreciated. Please feel free to send comments to Gary Kessler (gary.kessler@champlain.edu) or Glenn Dardick (gdardick@dardick.net).