Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Law

Letter From The Editor, John Joseph Meadows Jan 2003

Letter From The Editor, John Joseph Meadows

Richmond Journal of Law & Technology

On behalf of the Editorial Board and the entire staff, welcome to this second issue of our Ninth Volume for the Richmond Journal of Law & Technology. This issue consists of four pieces and we are excited to present such a wide range of topics.


California's Database Breach Notification Security Act: The First State Breah Notification Law Is Is Not Yet A Suitable Template For National Identity Theft Legislation, Timothy H. Skinner Jan 2003

California's Database Breach Notification Security Act: The First State Breah Notification Law Is Is Not Yet A Suitable Template For National Identity Theft Legislation, Timothy H. Skinner

Richmond Journal of Law & Technology

Attacks on poorly-secured information systems containing personal information are nearing epidemic proportion. Hardly a month passes without a news story regarding a security breach that exposed hundreds or thousands of data subjects’ personal information. As dependence on e-Commerce continues to expand, personal information stolen from poorly secured systems is becoming a multi-billion-dollar industry.


Patterson V. Commonwealth: An Illustration Of The Legal Complexity Of Dna Databases, Audrey J. Burges Jan 2003

Patterson V. Commonwealth: An Illustration Of The Legal Complexity Of Dna Databases, Audrey J. Burges

Richmond Journal of Law & Technology

In the old-fashioned drawing-room murder mysteries, the villain usually eliminated his target in some Victorian manner - asphyxiation in bed with a pillow, drowning in a clawed-foot tub, stabbing in the back with a letter opener - and then skulked away, convinced he had committed the perfect crime. In the plot of these mysteries, the foil to the crime always proved to be the experienced detection of a meticulous sleuth. AgathaChristie would use the skills of Hercule Poirot or Miss Marple within the plot of her novels to detect the one flaw in the murderer's technique. Perhaps there was some …


Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Edwin E. Wallis Iii Jan 2003

Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Edwin E. Wallis Iii

Richmond Journal of Law & Technology

No abstract provided.


Smoke And Mirrors Or Science? Teaching Law With Computers - A Reply To Cass Sunstein On Artificial Intelligence And Legal Science, Eric Engle Jan 2003

Smoke And Mirrors Or Science? Teaching Law With Computers - A Reply To Cass Sunstein On Artificial Intelligence And Legal Science, Eric Engle

Richmond Journal of Law & Technology

The application of computer science in the law has largely, and productively, centered on educational programs and programs generating and managing databases and data management. Some limited work, however, has been done in the use of artificial intelligence (“AI”) to present models of legal decision-making. The majority of the work involving AI in the law, as the majority of work in AI generally, has focused on developing expert systems. An expert system attempts to solve one problem, or one class of problems well and should be distinguished from general systems, which seek to solve any problem. While databases and didactic …