Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- AI (1)
- Alfaro v. Terhune (1)
- Artificial intelligence (1)
- Biennial Writing Competition (1)
- CODIS (1)
-
- COPPA (1)
- CPUs (1)
- Children’s Online Privacy Protection Act (1)
- Combined DNA Index System (1)
- DNA (1)
- Database Breach Notification Security Act (1)
- ERISA (1)
- Early Retirement Income Security Act (1)
- NORPDA (1)
- Noti cation of Risk to Personal Data Act (1)
- Patterson v. Commonwealth (1)
- SB 1386 (1)
- SIIA (1)
- SSL (1)
- STR (1)
- Secure Socket Layer (1)
- Short Term Repeat (1)
- Software and Information Industry Association (1)
- Stephen P. Teale Data Center (1)
- Sunstein (1)
- Symposium on Food Biotechnology (1)
Articles 1 - 5 of 5
Full-Text Articles in Law
Letter From The Editor, John Joseph Meadows
Letter From The Editor, John Joseph Meadows
Richmond Journal of Law & Technology
On behalf of the Editorial Board and the entire staff, welcome to this second issue of our Ninth Volume for the Richmond Journal of Law & Technology. This issue consists of four pieces and we are excited to present such a wide range of topics.
California's Database Breach Notification Security Act: The First State Breah Notification Law Is Is Not Yet A Suitable Template For National Identity Theft Legislation, Timothy H. Skinner
California's Database Breach Notification Security Act: The First State Breah Notification Law Is Is Not Yet A Suitable Template For National Identity Theft Legislation, Timothy H. Skinner
Richmond Journal of Law & Technology
Attacks on poorly-secured information systems containing personal information are nearing epidemic proportion. Hardly a month passes without a news story regarding a security breach that exposed hundreds or thousands of data subjects’ personal information. As dependence on e-Commerce continues to expand, personal information stolen from poorly secured systems is becoming a multi-billion-dollar industry.
Patterson V. Commonwealth: An Illustration Of The Legal Complexity Of Dna Databases, Audrey J. Burges
Patterson V. Commonwealth: An Illustration Of The Legal Complexity Of Dna Databases, Audrey J. Burges
Richmond Journal of Law & Technology
In the old-fashioned drawing-room murder mysteries, the villain usually eliminated his target in some Victorian manner - asphyxiation in bed with a pillow, drowning in a clawed-foot tub, stabbing in the back with a letter opener - and then skulked away, convinced he had committed the perfect crime. In the plot of these mysteries, the foil to the crime always proved to be the experienced detection of a meticulous sleuth. AgathaChristie would use the skills of Hercule Poirot or Miss Marple within the plot of her novels to detect the one flaw in the murderer's technique. Perhaps there was some …
Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Edwin E. Wallis Iii
Introduction: Contains Cover, Table Of Contents, Letter From The Editor, And Masthead, Edwin E. Wallis Iii
Richmond Journal of Law & Technology
No abstract provided.
Smoke And Mirrors Or Science? Teaching Law With Computers - A Reply To Cass Sunstein On Artificial Intelligence And Legal Science, Eric Engle
Richmond Journal of Law & Technology
The application of computer science in the law has largely, and productively, centered on educational programs and programs generating and managing databases and data management. Some limited work, however, has been done in the use of artificial intelligence (“AI”) to present models of legal decision-making. The majority of the work involving AI in the law, as the majority of work in AI generally, has focused on developing expert systems. An expert system attempts to solve one problem, or one class of problems well and should be distinguished from general systems, which seek to solve any problem. While databases and didactic …