Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (6065)
- Computer Law (2577)
- Science and Technology Law (2134)
- Intellectual Property Law (1877)
- Privacy Law (1847)
-
- Communications Law (788)
- International Law (623)
- First Amendment (583)
- Law and Society (560)
- Constitutional Law (558)
- Administrative Law (531)
- Law and Economics (475)
- Contracts (461)
- Criminal Law (450)
- Legislation (449)
- Commercial Law (440)
- Entertainment, Arts, and Sports Law (405)
- Business Organizations Law (391)
- Social and Behavioral Sciences (385)
- Consumer Protection Law (372)
- Banking and Finance Law (366)
- International Trade Law (348)
- Torts (347)
- Law and Politics (346)
- Comparative and Foreign Law (342)
- Health Law and Policy (339)
- Antitrust and Trade Regulation (337)
- Other Law (332)
- Tax Law (330)
- Institution
-
- UIC School of Law (900)
- Selected Works (505)
- SelectedWorks (312)
- Schulich School of Law, Dalhousie University (291)
- University of Richmond (228)
-
- Maurer School of Law: Indiana University (205)
- University of Michigan Law School (186)
- Seattle University School of Law (164)
- Universitas Indonesia (145)
- Santa Clara Law (125)
- Duke Law (124)
- The Catholic University of America, Columbus School of Law (117)
- University of Washington School of Law (110)
- BLR (109)
- Vanderbilt University Law School (109)
- American University Washington College of Law (106)
- University of Maryland Francis King Carey School of Law (99)
- DePaul University (91)
- Brooklyn Law School (90)
- Southern Methodist University (86)
- New York Law School (77)
- University of Pennsylvania Carey Law School (77)
- University of Pittsburgh School of Law (74)
- Brigham Young University Law School (69)
- Fordham Law School (67)
- University of Colorado Law School (67)
- Columbia Law School (64)
- Pepperdine University (63)
- University of Georgia School of Law (62)
- Singapore Management University (59)
- Keyword
-
- Internet (601)
- Privacy (344)
- Law and Technology (319)
- Copyright (262)
- Technology (211)
-
- First Amendment (172)
- Google (164)
- Science and Technology (151)
- Intellectual Property Law (147)
- Social media (140)
- Computer Law (126)
- Regulation (115)
- Intellectual property (106)
- Cyberspace (100)
- Law and Society (99)
- Communications Law (94)
- Facebook (81)
- Adwords (78)
- Cybersecurity (77)
- Surveillance (77)
- Cyberlaw (75)
- Internet Law (71)
- Information (70)
- Trademark (70)
- Constitutional Law (63)
- Free speech (63)
- Intellectual Property (63)
- Copyright law (60)
- DMCA (60)
- Data (59)
- Publication Year
- Publication
-
- UIC John Marshall Journal of Information Technology & Privacy Law (794)
- Canadian Journal of Law and Technology (249)
- Faculty Scholarship (247)
- Richmond Journal of Law & Technology (191)
- Seattle University Law Review (137)
-
- All Faculty Scholarship (131)
- "Dharmasisya” Jurnal Program Magister Hukum FHUI (124)
- Duke Law & Technology Review (118)
- Rosetta Stone v. Google (Joint Appendix) (116)
- Articles (113)
- Federal Communications Law Journal (112)
- ExpressO (107)
- Catholic University Journal of Law and Technology (104)
- SMU Science and Technology Law Review (77)
- Vanderbilt Journal of Entertainment & Technology Law (76)
- DePaul Journal of Art, Technology & Intellectual Property Law (71)
- Michigan Telecommunications & Technology Law Review (71)
- Publications (66)
- Washington Journal of Law, Technology & Arts (64)
- Daniel Lyons (62)
- UIC Law Review (57)
- Faculty Publications (52)
- Research Collection Yong Pung How School Of Law (48)
- Indiana Law Journal (47)
- NYLS Law Review (46)
- Articles, Book Chapters, & Popular Press (38)
- BYU Law Review (38)
- Michigan Law Review (35)
- UIC Review of Intellectual Property Law (34)
- Fordham Law Review (32)
- Publication Type
Articles 6001 - 6030 of 6066
Full-Text Articles in Internet Law
Architects, Engineers, Computer Product And The Law: A Matter Of Anticipation, 3 Computer L.J. 337 (1981), Paul A. Mathew
Architects, Engineers, Computer Product And The Law: A Matter Of Anticipation, 3 Computer L.J. 337 (1981), Paul A. Mathew
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Quebec After Ten Years Of Revolution In Legal Documentation - A Summary Of Survey Results, 3 Computer L.J. 529 (1981), Ejan Mackaay
Quebec After Ten Years Of Revolution In Legal Documentation - A Summary Of Survey Results, 3 Computer L.J. 529 (1981), Ejan Mackaay
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Computers, The Disclosure Of Medical Information, And The Fair Credit Reporting Act, 3 Computer L.J. 619 (1981), John Morihara
Computers, The Disclosure Of Medical Information, And The Fair Credit Reporting Act, 3 Computer L.J. 619 (1981), John Morihara
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Family Educational Rights And Privacy Act Of 1974 And College Record Systems Of The Future, 3 Computer L.J. 563 (1981), Ursula Hyman
The Family Educational Rights And Privacy Act Of 1974 And College Record Systems Of The Future, 3 Computer L.J. 563 (1981), Ursula Hyman
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Due Process Versus Data Processing: An Analysis Of Computerized Criminal History Information Systems, Donald Doernberg, Donald H. Zeigler
Due Process Versus Data Processing: An Analysis Of Computerized Criminal History Information Systems, Donald Doernberg, Donald H. Zeigler
Articles & Chapters
This article, based on a comprehensive empirical study of New York's computerized criminal history information system and on national surveys of similar systems, concludes that current regulations governing the dispersion of criminal history information are grossly inadequate. Although information drawn from computerized criminal history files is often inaccurate, incomplete, ambiguous or inappropriate, criminal justice officials and judges routinely use such information in making decisions affecting defendants' liberty. This practice is unconstitutional, and the article suggests ways to regulate criminal history information systems that would protect a defendant's right not to be deprived of liberty without due process of law.
Introduction: Electronic Funds Transfer Systems, 2 Computer L.J. 1 (1980), George W. Mitchell
Introduction: Electronic Funds Transfer Systems, 2 Computer L.J. 1 (1980), George W. Mitchell
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The 348 Committee - An Interim Report, 2 Computer L.J. 27 (1980), Robert Haydock Jr.
The 348 Committee - An Interim Report, 2 Computer L.J. 27 (1980), Robert Haydock Jr.
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
An Overview Of The Legal Issues Confronting The Establishment Of Electronic Fund Transfer Services, 2 Computer L.J. 7 (1980), Melvin R. Katskee, Ann L. Wright
An Overview Of The Legal Issues Confronting The Establishment Of Electronic Fund Transfer Services, 2 Computer L.J. 7 (1980), Melvin R. Katskee, Ann L. Wright
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Terminal-Based Eft Services: The Need For Uniform Federal Legislation, 2 Computer L.J. 31 (1980), Theresa A. Einhorn
Terminal-Based Eft Services: The Need For Uniform Federal Legislation, 2 Computer L.J. 31 (1980), Theresa A. Einhorn
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Authentication In Eft: The Legal Standard And The Operational Reality, 2 Computer L.J. 67 (1980), Fred M. Greguras, David J. Sykes
Authentication In Eft: The Legal Standard And The Operational Reality, 2 Computer L.J. 67 (1980), Fred M. Greguras, David J. Sykes
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Book Review: The Law Of Electronic Funds Transfer, 2 Computer L.J. 167 (1980), Howard D. Neal
Book Review: The Law Of Electronic Funds Transfer, 2 Computer L.J. 167 (1980), Howard D. Neal
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Case Digest, 2 Computer L.J. 171 (1980), Michael D. Scott
Case Digest, 2 Computer L.J. 171 (1980), Michael D. Scott
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Problems Of Proof When There's A Computer Goof: Consumers Versus Atms, 2 Computer L.J. 49 (1980), Mark Budnitz
Problems Of Proof When There's A Computer Goof: Consumers Versus Atms, 2 Computer L.J. 49 (1980), Mark Budnitz
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Legal Guidelines For Check Truncation, 2 Computer L.J. 115 (1980), George C. White Jr.
Legal Guidelines For Check Truncation, 2 Computer L.J. 115 (1980), George C. White Jr.
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Competitive Implications Of Eft, 2 Computer L.J. 133 (1980), James L. Pierce
The Competitive Implications Of Eft, 2 Computer L.J. 133 (1980), James L. Pierce
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Is Corporate Eft Coming Of Age?, 2 Computer L.J. 87 (1980), James W. Trotter
Is Corporate Eft Coming Of Age?, 2 Computer L.J. 87 (1980), James W. Trotter
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Electronic Giro For The United States, 2 Computer L.J. 101 (1980), James V. Vergari
Electronic Giro For The United States, 2 Computer L.J. 101 (1980), James V. Vergari
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Implications Of The Informational Nature Of Payments, 2 Computer L.J. 153 (1980), James L. Brown
Implications Of The Informational Nature Of Payments, 2 Computer L.J. 153 (1980), James L. Brown
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Electronic Funds Transfer Systems Bibliography, 2 Computer L.J. 183 (1980), Michael D. Scott
Electronic Funds Transfer Systems Bibliography, 2 Computer L.J. 183 (1980), Michael D. Scott
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
On Charging Computer Crime, 2 Computer L.J. 429 (1980), Donald G. Ingraham
On Charging Computer Crime, 2 Computer L.J. 429 (1980), Donald G. Ingraham
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
A Survey Of Computer Crime Studies, 2 Computer L.J. 275 (1980), John K. Taber
A Survey Of Computer Crime Studies, 2 Computer L.J. 275 (1980), John K. Taber
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Investigation, Prosecution, And Prevention Of Computer Crime: A State-Of-The-Art Review, 2 Computer L.J. 385 (1980), Mary R. Volgyes
The Investigation, Prosecution, And Prevention Of Computer Crime: A State-Of-The-Art Review, 2 Computer L.J. 385 (1980), Mary R. Volgyes
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Computer Abuse Research Update, 2 Computer L.J. 329 (1980), Donn B. Parker
Computer Abuse Research Update, 2 Computer L.J. 329 (1980), Donn B. Parker
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Computer Abuse And Computer Crime As Organizational Activities, 2 Computer L.J. 403 (1980), Rob Kling
Computer Abuse And Computer Crime As Organizational Activities, 2 Computer L.J. 403 (1980), Rob Kling
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Book Reviews, 2 Computer L.J. 773 (1980), Steven I. Smith, Michael D. Scott
Book Reviews, 2 Computer L.J. 773 (1980), Steven I. Smith, Michael D. Scott
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Computer Crime - The Need For Deterrent Legislation, 2 Computer L.J. 353 (1980), Stanley L. Sokolik
Computer Crime - The Need For Deterrent Legislation, 2 Computer L.J. 353 (1980), Stanley L. Sokolik
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Trial Of A Computer Crime, 2 Computer L.J. 441 (1980), Jay Becker
The Trial Of A Computer Crime, 2 Computer L.J. 441 (1980), Jay Becker
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Computer-Assisted Crime In Scandinavia, 2 Computer L.J. 457 (1980), Stein Schjølberg
Computer-Assisted Crime In Scandinavia, 2 Computer L.J. 457 (1980), Stein Schjølberg
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Current And Proposed Computer Crime Legislation, 2 Computer L.J. 721 (1980), Michael M. Krieger
Current And Proposed Computer Crime Legislation, 2 Computer L.J. 721 (1980), Michael M. Krieger
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Case Digest, 2 Computer L.J. 777 (1980), Drew Pomerance
Case Digest, 2 Computer L.J. 777 (1980), Drew Pomerance
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.