Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (2597)
- Science and Technology Law (1917)
- Privacy Law (1545)
- Intellectual Property Law (1456)
- Physical Sciences and Mathematics (824)
-
- Computer Sciences (820)
- Information Security (734)
- Social and Behavioral Sciences (702)
- Engineering (587)
- Legal Studies (498)
- Forensic Science and Technology (475)
- Computer Engineering (467)
- International Law (440)
- Constitutional Law (401)
- Electrical and Computer Engineering (398)
- Communications Law (392)
- Contracts (380)
- Criminal Law (375)
- Administrative Law (356)
- Business Organizations Law (344)
- Banking and Finance Law (341)
- Law and Economics (341)
- Legislation (335)
- Consumer Protection Law (319)
- Health Law and Policy (313)
- Law and Society (310)
- Entertainment, Arts, and Sports Law (304)
- Torts (301)
- Institution
-
- UIC School of Law (902)
- Embry-Riddle Aeronautical University (711)
- Schulich School of Law, Dalhousie University (267)
- Selected Works (244)
- SelectedWorks (176)
-
- Seattle University School of Law (157)
- Santa Clara Law (138)
- Universitas Indonesia (128)
- University of Richmond (118)
- University of Washington School of Law (116)
- DePaul University (96)
- Maurer School of Law: Indiana University (88)
- University of Michigan Law School (84)
- Southern Methodist University (78)
- BLR (58)
- Vanderbilt University Law School (55)
- University of Pennsylvania Carey Law School (53)
- Duke Law (50)
- Washington and Lee University School of Law (48)
- University of Georgia School of Law (45)
- American University Washington College of Law (39)
- Villanova University Charles Widger School of Law (39)
- Chicago-Kent College of Law (37)
- Brooklyn Law School (36)
- University of Colorado Law School (32)
- University of Maryland Francis King Carey School of Law (32)
- Boston University School of Law (30)
- Fordham Law School (29)
- The Catholic University of America, Columbus School of Law (27)
- University of Baltimore Law (27)
- Keyword
-
- Privacy (211)
- Internet (182)
- Computer Law (176)
- Copyright (138)
- Law and Technology (138)
-
- Google (127)
- Technology (126)
- Intellectual Property Law (94)
- Science and Technology (94)
- Software (87)
- Adwords (83)
- Artificial intelligence (72)
- Cybersecurity (67)
- Intellectual property (64)
- Trademark (63)
- AI (60)
- Communications Law (60)
- First Amendment (52)
- Law (52)
- Regulation (51)
- Rosetta Stone (51)
- Social media (51)
- Cyberspace (50)
- Digital forensics (46)
- Computers (44)
- Data (44)
- Intellectual Property (43)
- Antitrust (41)
- International Law (40)
- Surveillance (39)
- Publication Year
- Publication
-
- UIC John Marshall Journal of Information Technology & Privacy Law (794)
- Journal of Digital Forensics, Security and Law (526)
- Canadian Journal of Law and Technology (246)
- Annual ADFSL Conference on Digital Forensics, Security and Law (182)
- Seattle University Law Review (139)
-
- Rosetta Stone v. Google (Joint Appendix) (136)
- "Dharmasisya” Jurnal Program Magister Hukum FHUI (122)
- Richmond Journal of Law & Technology (105)
- All Faculty Scholarship (88)
- Faculty Scholarship (87)
- Articles (76)
- SMU Science and Technology Law Review (75)
- DePaul Journal of Art, Technology & Intellectual Property Law (72)
- UIC Law Review (62)
- ExpressO (57)
- Washington Journal of Law, Technology & Arts (54)
- Duke Law & Technology Review (48)
- Articles by Maurer Faculty (43)
- Villanova Law Review (34)
- Publications (32)
- Matthew Rimmer (31)
- Vanderbilt Journal of Entertainment & Technology Law (31)
- UIC Review of Intellectual Property Law (30)
- Washington and Lee Law Review (29)
- Fordham Law Review (25)
- Professor Katina Michael (25)
- Chicago-Kent Law Review (23)
- DePaul Business & Commercial Law Journal (22)
- Michigan Law Review (22)
- Catholic University Journal of Law and Technology (21)
- Publication Type
Articles 4591 - 4620 of 4623
Full-Text Articles in Computer Law
Ownership And Control Of Electronic Funds Transfer Systems In The United States, 1 Computer L.J. 501 (1978), Eric David Horodas
Ownership And Control Of Electronic Funds Transfer Systems In The United States, 1 Computer L.J. 501 (1978), Eric David Horodas
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Computer-Assisted Legal Research Bibliography, 1 Computer L.J. 441 (1978), Steven I. Smith, Barbara A. Custer
Computer-Assisted Legal Research Bibliography, 1 Computer L.J. 441 (1978), Steven I. Smith, Barbara A. Custer
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Report Of The Public Terminal Study, 1 Computer L.J. 255 (1978), Fred M. Greguras, Larry L. Carlile
Report Of The Public Terminal Study, 1 Computer L.J. 255 (1978), Fred M. Greguras, Larry L. Carlile
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Case Digest, 1 Computer L.J. 573 (1978), Robert N. Schlesinger
Case Digest, 1 Computer L.J. 573 (1978), Robert N. Schlesinger
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Manual For Complex Litigation - Sections On Computer-Related Evidence, 1 Computer L.J. 725 (1978), Federal Judicial Center
Manual For Complex Litigation - Sections On Computer-Related Evidence, 1 Computer L.J. 725 (1978), Federal Judicial Center
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
A Guide For The Proponent And Opponent Of Computer-Based Evidence, 1 Computer L.J. 667 (1980), Ronald L. Johnston
A Guide For The Proponent And Opponent Of Computer-Based Evidence, 1 Computer L.J. 667 (1980), Ronald L. Johnston
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Computer Law Bibliography - 1978, 1 Computer L.J. 611 (1978), Michael D. Scott
Computer Law Bibliography - 1978, 1 Computer L.J. 611 (1978), Michael D. Scott
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Computer Law Reading List, 1 Computer L.J. 557 (1978), Michael D. Scott
Computer Law Reading List, 1 Computer L.J. 557 (1978), Michael D. Scott
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Book Review: Computer Law: Evidence And Procedure, 1 Computer L.J. 745 (1978), Michael D. Scott
Book Review: Computer Law: Evidence And Procedure, 1 Computer L.J. 745 (1978), Michael D. Scott
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Case Digest, 1 Computer L.J. 749 (1978), Drew Pomerance
Case Digest, 1 Computer L.J. 749 (1978), Drew Pomerance
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Bibliography, 1 Computer L.J. 781 (1978), Linda A. Schulte
Bibliography, 1 Computer L.J. 781 (1978), Linda A. Schulte
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Computer Evidence Law: Scope And Structure, 1 Computer L.J. 699 (1978), David Bender
Computer Evidence Law: Scope And Structure, 1 Computer L.J. 699 (1978), David Bender
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Normalized Legal Drafting And The Query Method, Layman E. Allen, C. Rudy Engholm
Normalized Legal Drafting And The Query Method, Layman E. Allen, C. Rudy Engholm
Articles
Normalized legal drafting is a mode of expressing ideas in statutes, regulations, contracts, and other legal documents in such a way that the syntax that relates the constituent propositions is simplified and standardized. This "normalization" results in documents that are easier to understand in the dual sense that they can be read faster and more accurately than corresponding documents that are not normalized. The query method is a technique for familiarizing learners with normalized drafting and providing practice in some of the easier aspects of doing it.
Copyright Protection For Computer Programs Under The 1976 Copyright Act, Louis Peter Pataki Jr.
Copyright Protection For Computer Programs Under The 1976 Copyright Act, Louis Peter Pataki Jr.
Indiana Law Journal
No abstract provided.
Computer Software And Unfair Methods Of Competition, 10 J. Marshall J. Prac. & Proc. 447 (1977), Joseph Scafetta Jr.
Computer Software And Unfair Methods Of Competition, 10 J. Marshall J. Prac. & Proc. 447 (1977), Joseph Scafetta Jr.
UIC Law Review
No abstract provided.
Protection Of Privacy Of Computerized Records In The National Crime Information Center, Stuart R. Hemphill
Protection Of Privacy Of Computerized Records In The National Crime Information Center, Stuart R. Hemphill
University of Michigan Journal of Law Reform
The purpose of this article is to describe the social benefits and costs of the NCIC and to indicate the need for a program of operational controls to temper the system's impact on the balance between individual privacy and law enforcement needs. Various approaches which could be incorporated into a program of safeguards are introduced and briefly analyzed. Finally, the article discusses several overall design issues which should be considered in the construction of an adequate program of safeguards. Particular emphasis is placed on the NCCH file since it is the major source of the tensions underlying the issues addressed.
Formalizing Hohfeldian Analysis To Clarify The Multiple Senses Of 'Legal Right': A Powerful Lens For The Electronic Age, Layman E. Allen
Formalizing Hohfeldian Analysis To Clarify The Multiple Senses Of 'Legal Right': A Powerful Lens For The Electronic Age, Layman E. Allen
Articles
Careful communication is frequently of central importance in law. The language used to communicate even with oneself in private thought profoundly influences the quality of that effort; but when one attempts to transmit an idea to another, language assumes even greater significance because of the possibilities for enormously distorting the idea. Word skill is to be prized.
The Fcc Computer Inquiry: Interfaces Of Competitive And Regulated Markets, Michigan Law Review
The Fcc Computer Inquiry: Interfaces Of Competitive And Regulated Markets, Michigan Law Review
Michigan Law Review
Since the advent of computer technology, data processing and communication services have become increasingly interdependent. In 1966, the Federal Communications Commission launched the Computer Inquiry to explore the broad range of regulatory and policy problems generated by this technological development.2
Electronic Aids To The Drafting Of Legal Instruments, Reed Dickerson
Electronic Aids To The Drafting Of Legal Instruments, Reed Dickerson
Articles by Maurer Faculty
No abstract provided.
Personal Privacy In The Computer Age: The Challenge Of A New Technology In An Information-Oriented Society, Arthur R. Miller
Personal Privacy In The Computer Age: The Challenge Of A New Technology In An Information-Oriented Society, Arthur R. Miller
Michigan Law Review
The purpose of this Article is to survey the new technology's implications for personal privacy and to evaluate the contemporary common-law and statutory pattern relating to data-handling. In the course of this examination, it will appraise the existing framework's capacity to deal with the problems created by society's growing awareness of the primordial character of information. The Article is intended to be suggestive; any attempt at definitiveness would be premature. Avowedly, it was written with the bias of one who believes that the new information technology has enormous long-range societal implications and who is concerned about the consequences of the …
Debunking The Computer Mystique, Reed Dickerson
Debunking The Computer Mystique, Reed Dickerson
Articles by Maurer Faculty
No abstract provided.
A Language-Normalization Approach To Information Retrieval In Law, Layman E. Allen
A Language-Normalization Approach To Information Retrieval In Law, Layman E. Allen
Articles
An information retrieval system (as distinguished from a document retrieval system) is described for handling statute-oriented legal literature. The Normalized Sentence-Index Matrix (N-SIM) system suggested differs from more traditional retrieval systems for legal literature in three respects: (1) the categories used for classification are normalized versions of sentences from statutes, regulations, treaties, constitutions, case opinions, legal treatises, law review articles, and other documents in legal literature, (2) the classification system is hierarchial and open-ended to evolve with the literature through time, and (3) the organization of the file facilitates some analysis of the literature by computer. A sentence is expressed …
Computers And The Law, Robert P. Bigelow, Ed.
Computers And The Law, Robert P. Bigelow, Ed.
Washington and Lee Law Review
No abstract provided.
Science-Computers-The Use Of Data Processing In Legal Research, Michigan Law Review
Science-Computers-The Use Of Data Processing In Legal Research, Michigan Law Review
Michigan Law Review
In 1960, at the American Bar Association Annual Meeting in Washington, D.C., representatives of the University of Pittsburgh Health Law Center conducted a demonstration of the use of an electronic computer in searching statutory materials. For purposes of the search, each statutory section had been numbered consecutively and programmed into the computer which contained an alphabetical list of every word in the statutes (with the exception of articles) and their location. To locate material on a given topic, the searcher requested the machine to list the location of key words or combinations of words which he believed were present in …
Bank Statements, Cancelled Checks, And Article Four In The Electronic Age, Norman Penney
Bank Statements, Cancelled Checks, And Article Four In The Electronic Age, Norman Penney
Michigan Law Review
My task was to prepare a short article dealing in some depth with specific problems which have arisen under Article Four of the Uniform Commercial Code (Code). Unfortunately for purposes of criticism, but happily for those affected by Article Four, a canvass of recent reported cases as well as bank operations people and bank counsel has revealed very few problems of any significance to either the general practitioner or even the so-called commercial law specialist. This prompts two comments: (1) Article Four seems to be working so smoothly that to develop a "problem" would be to make a mountain out …
Legal Research--Computer Retrieval Of Statutory Law And Decisional Law, David T. Moody
Legal Research--Computer Retrieval Of Statutory Law And Decisional Law, David T. Moody
Vanderbilt Law Review
Legal research presently involves a considerable amount of any lawyer's time and efforts largely because it is a slow and tedious process. Searching for a pertinent legal point can prove to be time-consuming and often fruitless. Moreover, it is here that chance plays one of its largest roles in the law.' An important legal point may exist,yet the researcher may fail to find it although he exercises a great degree of diligence. All lawyers must recognize this problem and the fact that it is becoming more acute with the passage of time. Something needs to be done to facilitate legal …
Nociones Generales De Derecho Procesal Civil, Edward Ivan Cueva
Nociones Generales De Derecho Procesal Civil, Edward Ivan Cueva
Edward Ivan Cueva
No abstract provided.
Introduction To Second Panel Discussion: Proceedings Of The Special Committee On Electronic Data Retrieval, F. Reed Dickerson
Introduction To Second Panel Discussion: Proceedings Of The Special Committee On Electronic Data Retrieval, F. Reed Dickerson
Articles by Maurer Faculty
No abstract provided.
Introduction: Proceedings Of The Special Committee On Electronic Data Retrieval, F. Reed Dickerson
Introduction: Proceedings Of The Special Committee On Electronic Data Retrieval, F. Reed Dickerson
Articles by Maurer Faculty
No abstract provided.
Electronic Computers And The Practical Lawyer, F. Reed Dickerson
Electronic Computers And The Practical Lawyer, F. Reed Dickerson
Articles by Maurer Faculty
No abstract provided.