Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Embry-Riddle Aeronautical University (50)
- UIC School of Law (32)
- University of Richmond (11)
- Schulich School of Law, Dalhousie University (10)
- University of Oklahoma College of Law (7)
-
- University of Maryland Francis King Carey School of Law (4)
- University of Georgia School of Law (3)
- Seattle University School of Law (2)
- University of Michigan Law School (2)
- Vanderbilt University Law School (2)
- Cleveland State University (1)
- Georgia State University College of Law (1)
- Hamline University (1)
- Notre Dame Law School (1)
- Pace University (1)
- Pepperdine University (1)
- Southern Methodist University (1)
- Touro University Jacob D. Fuchsberg Law Center (1)
- University of Baltimore Law (1)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (1)
- Keyword
-
- Digital forensics (8)
- American Bar Association (6)
- Privacy (6)
- ESI (5)
- Electronically stored information (5)
-
- Searches and seizures (5)
- Digital evidence (4)
- Forensics (4)
- Cybercrime (3)
- Internet (3)
- Mobile device forensics (3)
- Patent law (3)
- Social media (3)
- Software (3)
- Third parties (3)
- Antitrust (2)
- Approximate matching (2)
- Behavioral analysis (2)
- Big data (2)
- Bitcoin (2)
- Bloom filter (2)
- Cloud forensics (2)
- Computer forensics (2)
- Cyber security (2)
- Cyberspace (2)
- E-discovery (2)
- ECPA (2)
- Electronic Communications Privacy Act (2)
- Electronic evidence (2)
- Electronic records (2)
- Publication
-
- Journal of Digital Forensics, Security and Law (50)
- UIC John Marshall Journal of Information Technology & Privacy Law (29)
- Richmond Journal of Law & Technology (11)
- Canadian Journal of Law and Technology (10)
- Oklahoma Law Review (7)
-
- Journal of Business & Technology Law (4)
- Georgia Journal of International & Comparative Law (3)
- UIC Review of Intellectual Property Law (3)
- Seattle University Law Review (2)
- Georgia State University Law Review (1)
- Journal of Law and Health (1)
- Journal of Public Law and Policy (1)
- Michigan Law Review First Impressions (1)
- Michigan Telecommunications & Technology Law Review (1)
- Notre Dame Law Review (1)
- Pace Law Review (1)
- Pepperdine Dispute Resolution Law Journal (1)
- SMU Science and Technology Law Review (1)
- Touro Law Review (1)
- UNLV Gaming Law Journal (1)
- University of Baltimore Law Forum (1)
- Vanderbilt Journal of Entertainment & Technology Law (1)
- Vanderbilt Journal of Transnational Law (1)
Articles 1 - 30 of 133
Full-Text Articles in Law
E-Books, Collusion, And Antitrust Policy: Protecting A Dominant Firm At The Cost Of Innovation, Nicholas Timchalk
E-Books, Collusion, And Antitrust Policy: Protecting A Dominant Firm At The Cost Of Innovation, Nicholas Timchalk
Seattle University Law Review
Amazon’s main rival, Apple, went to great lengths and took major risks to enter the e-book market. Why did Apple simply choose not to compete on the merits of its product and brand equity (the iPad and iBookstore) as it does with its other products? Why did Apple decide not to continue to rely on its earlier success of situating its products differently in the market than other electronics and working hard to be different and cutting-edge with its e-book delivery? This Note argues that the combination of Amazon’s 90% market share, network externalities, and an innovative technology market creates …
International Cyberspace: From Borderless To Balkanized???, Beverley Earle, Gerald A. Madek
International Cyberspace: From Borderless To Balkanized???, Beverley Earle, Gerald A. Madek
Georgia Journal of International & Comparative Law
No abstract provided.
Digital Music Sampling And Copyright Policy - A Bittersweet Symphony? Assessing The Continued Legality Of Music Sampling In The United Kingdom, The Netherlands, And The United States, Melissa Hahn
Georgia Journal of International & Comparative Law
No abstract provided.
Voice Over Internet Protocol: An International Approach To Regulation, Jimar Sanders
Voice Over Internet Protocol: An International Approach To Regulation, Jimar Sanders
Georgia Journal of International & Comparative Law
No abstract provided.
Global Cyber Intermediary Liability: A Legal & Cultural Strategy, Jason H. Peterson, Lydia Segal, Anthony Eonas
Global Cyber Intermediary Liability: A Legal & Cultural Strategy, Jason H. Peterson, Lydia Segal, Anthony Eonas
Pace Law Review
This Article fills the gap in the debate on fighting cybercrime. It considers the role of intermediaries and the legal and cultural strategies that countries may adopt. Part II.A of this Article examines the critical role of intermediaries in cybercrime. It shows that the intermediaries’ active participation by facilitating the transmission of cybercrime traffic removes a significant barrier for individual perpetrators. Part II.B offers a brief overview of legal efforts to combat cybercrime, and examines the legal liability of intermediaries in both the civil and criminal context and in varying legal regimes with an emphasis on ISPs. Aside from some …
From The Editor-In-Chief, Ibrahim A. Baggili
From The Editor-In-Chief, Ibrahim A. Baggili
Journal of Digital Forensics, Security and Law
We are proud to share with you this special edition issue of the JDFSL. This year, JDFSL partnered with both the 6th International Conference on Digital Forensics and Cyber Crime (ICDF2C) and Systematic Approaches to Digital Forensic Engineering (SADFE)–two prominent conferences in our field that were co-hosted. Fifty-three papers were submitted, and the Technical Program Committee accepted only 17 after a rigorous review process.
With Great Power Comes Little Responsibility: The Role Of Online Payment Service Providers With Regards To Websites Selling Counterfeit Goods, J. Bruce Richardson
With Great Power Comes Little Responsibility: The Role Of Online Payment Service Providers With Regards To Websites Selling Counterfeit Goods, J. Bruce Richardson
Canadian Journal of Law and Technology
This article will explain the current avenues for intellectual property rights holders to make use of existing anti-counterfeiting policies made available by financial companies dealing in electronic payments, and argue that current policies, while helpful, are not sufficient. The article will conclude by demonstrating that policy makers have options to intervene and regulate the use of online payment services, either directly through legislation or indirectly through facilitating “best practices.”
Rethinking Online Privacy In Canada: Commentary On Voltage Pictures V. John And Jane Doe, Ngozi Okidegbe
Rethinking Online Privacy In Canada: Commentary On Voltage Pictures V. John And Jane Doe, Ngozi Okidegbe
Canadian Journal of Law and Technology
This article examines the Voltage decision, with the view that the bona fide standard safeguards intellectual property rights at the cost of online privacy rights and will proceed in three parts. Part I provides a brief contextualization of the issues. Part II is an analysis of the Voltage decision. Part III examines how the bona fide standard is a relatively low threshold. This article concludes by considering the possibility of shifting to a higher standard for disclosure, as well as a possible solution for the effect that a higher standard could have on copyright owners.
Access Of Evil? Legislating Online Youth Privacy In The Information Age, Agathon Fric
Access Of Evil? Legislating Online Youth Privacy In The Information Age, Agathon Fric
Canadian Journal of Law and Technology
This article seeks to address what constitutes youth online privacy, how youth conceive of their privacy, whether their privacy needs protecting, and, if so, how youth privacy should be regulated online. First, the article begins by rooting the issue of online youth privacy in the current social, technological, economic, political, and legal context, drawing on social science research to demonstrate both the threats and opportunities created by technology for youth privacy.
Second, the analysis focuses on the relative strengths and weaknesses of current federal legislation as the primary law governing the collection, use, and disclosure of youth’s personal information through …
The Song Remains The Same: Preserving The First Sale Doctrine For A Secondary Market Of Digital Music, Marco Figliomeni
The Song Remains The Same: Preserving The First Sale Doctrine For A Secondary Market Of Digital Music, Marco Figliomeni
Canadian Journal of Law and Technology
This article will explore the origins and rationale for the first sale doctrine. A review of the most recent American case law shows the court rejecting the doctrine’s applicability in a digital sphere. I suggest that in spite of the court’s rigid interpretation of the U.S. Copyright Act, formulating a digital first sale doctrine is a matter better left to lawmakers. A flourishing digital secondary market can promote competition and innovation while making content more accessible to the public, but its endorsement requires an appreciation of its adverse effect on the primary market for copyright owners. The article fast-forwards to …
Combining Familial Searching And Abandoned Dna: Potential Privacy Outcomes And The Future Of Canada's National Dna Data Bank, Amy Conroy
Canadian Journal of Law and Technology
This article aims to respond to the government’s request by explaining the nature of that relationship and by arguing that the combined use of familial searching and analysis of abandoned DNA would present a serious risk for genetic privacy. The risk is particularly acute given that it would effectively circumvent the existing justification for the NDDB, leading to inclusion of individuals whose DNA profiles have not been uploaded directly onto the data bank. To substantiate this main argument, this article proceeds in three parts. The first describes the current Canadian law on familial searching and the ongoing interest in amending …
Software Patentability After Prometheus, Joseph Holland King
Software Patentability After Prometheus, Joseph Holland King
Georgia State University Law Review
This Note examines the history of patentability of abstract ideas and the tests that courts have used to make the determination of whether an invention incorporating an abstract idea is patentable. Part I provides a history of the four seminal cases related to patentable subject matter, as well as some more recent on point decisions. Part II changes focus to the various tests and factors that have been used by the courts, exploring the history of each, discussing the treatment by the Supreme Court, and determining the strengths and weaknesses of each. Based on the discussion in Part II, Part …
Webmail At Work: The Case For Protection Against Employer Monitoring, Marc A. Sherman
Webmail At Work: The Case For Protection Against Employer Monitoring, Marc A. Sherman
Touro Law Review
No abstract provided.
Aftermarketfailure: Windows Xp's End Of Support, Andrew Tutt
Aftermarketfailure: Windows Xp's End Of Support, Andrew Tutt
Michigan Law Review First Impressions
After 12 years, support for Windows XP will end on April 8, 2014. So proclaims a Microsoft website with a helpful clock counting down the days. "What does this mean?" the website asks. "It means you should take action." You should "migrate to a current supported operating system - such as Windows 8.1 - so you can receive regular security updates to protect [your] computer from malicious attacks." The costs of mass migration will be immense. About 30% of all desktop PCs are running Windows XP right now. An estimated 10% of the U.S. government's computers run Windows XP, including …
How Should The Past Inform The Future? Reviewing Regulating Internet Gaming: Challenges And Opportunities, Keith C. Miller
How Should The Past Inform The Future? Reviewing Regulating Internet Gaming: Challenges And Opportunities, Keith C. Miller
UNLV Gaming Law Journal
No abstract provided.
The Communication Decency Act Gone Wild: A Case For Renewing The Presumption Against Preemption, Ryan J.P. Dyer
The Communication Decency Act Gone Wild: A Case For Renewing The Presumption Against Preemption, Ryan J.P. Dyer
Seattle University Law Review
Since its inception, the Internet has disseminated the most vital commodity known to man—information. But not all information is societally desirable. In fact, much of what the Internet serves to disseminate is demonstrably criminal. Nevertheless, in the effort to unbind the “vibrant and competitive free market” of ideas on the Internet, Congress enacted section 230 of the Communications Decency Act, which essentially grants immunity to interactive computer service providers from liability for information provided by a third party. This Comment suggests that, in certain contexts, courts applying section 230 immunity should reexamine the preemptive effect Congress intended section 230 to …
Snopa And The Ppa: Do You Know What It Means For You? If Snopa (Social Networking Online Protection Act) Or Ppa (Password Protection Act) Do Not Pass, The Snooping Could Cause You Trouble, Angela Goodrum
Journal of Public Law and Policy
This article discusses the importance of passing the Social Networking Online Protection Act and the Password Protection Act to afford vital protection against discrimination in hiring and admission decisions. Existing laws fail to adequately provide protection against discrimination after the advent of social media. Furthermore, failure to provide to provide protection via federal laws will create a disparity in the protection afforded individuals across the United States.
Social media has introduced a new world of opportunities for sharing, networking, but it has also created ample opportunities for others to snoop around, discriminate, and base their hiring or admission decisions, in …
How To Avoid The Death Of Your Case By Two Billion Paper Cuts: Encouraging Arbitration As An Alternative Way To Resolve Costly Discovery Disputes, Tzipora Goodfriend-Gelernter
How To Avoid The Death Of Your Case By Two Billion Paper Cuts: Encouraging Arbitration As An Alternative Way To Resolve Costly Discovery Disputes, Tzipora Goodfriend-Gelernter
Pepperdine Dispute Resolution Law Journal
This article analyzes the costly effect of electronic information on discovery practice and advocates for the arbitration of discovery disputes. Part II discusses the background of electronic discovery, the evolution of our reliance on ESI (electronically stored information) as part of our modern day discovery practice, and the benefits and detriments of electronic discovery. Part III discusses the effects of our reliance on electronic discovery and the implications of those effects on litigating parties. It examines how the increasingly computer-based world of discovery has increased the cost of litigation disputes significantly and proposes using the patent arbitration model as a …