Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Law

PDF

Journal

2014

Institution
Keyword
Publication

Articles 1 - 30 of 133

Full-Text Articles in Law

Front Matter Dec 2014

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Masthead Dec 2014

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


Back Matter Dec 2014

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


E-Books, Collusion, And Antitrust Policy: Protecting A Dominant Firm At The Cost Of Innovation, Nicholas Timchalk Oct 2014

E-Books, Collusion, And Antitrust Policy: Protecting A Dominant Firm At The Cost Of Innovation, Nicholas Timchalk

Seattle University Law Review

Amazon’s main rival, Apple, went to great lengths and took major risks to enter the e-book market. Why did Apple simply choose not to compete on the merits of its product and brand equity (the iPad and iBookstore) as it does with its other products? Why did Apple decide not to continue to rely on its earlier success of situating its products differently in the market than other electronics and working hard to be different and cutting-edge with its e-book delivery? This Note argues that the combination of Amazon’s 90% market share, network externalities, and an innovative technology market creates …


Front Matter Sep 2014

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Masthead Sep 2014

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


Back Matter Sep 2014

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


International Cyberspace: From Borderless To Balkanized???, Beverley Earle, Gerald A. Madek Sep 2014

International Cyberspace: From Borderless To Balkanized???, Beverley Earle, Gerald A. Madek

Georgia Journal of International & Comparative Law

No abstract provided.


Digital Music Sampling And Copyright Policy - A Bittersweet Symphony? Assessing The Continued Legality Of Music Sampling In The United Kingdom, The Netherlands, And The United States, Melissa Hahn Sep 2014

Digital Music Sampling And Copyright Policy - A Bittersweet Symphony? Assessing The Continued Legality Of Music Sampling In The United Kingdom, The Netherlands, And The United States, Melissa Hahn

Georgia Journal of International & Comparative Law

No abstract provided.


Voice Over Internet Protocol: An International Approach To Regulation, Jimar Sanders Sep 2014

Voice Over Internet Protocol: An International Approach To Regulation, Jimar Sanders

Georgia Journal of International & Comparative Law

No abstract provided.


Global Cyber Intermediary Liability: A Legal & Cultural Strategy, Jason H. Peterson, Lydia Segal, Anthony Eonas Sep 2014

Global Cyber Intermediary Liability: A Legal & Cultural Strategy, Jason H. Peterson, Lydia Segal, Anthony Eonas

Pace Law Review

This Article fills the gap in the debate on fighting cybercrime. It considers the role of intermediaries and the legal and cultural strategies that countries may adopt. Part II.A of this Article examines the critical role of intermediaries in cybercrime. It shows that the intermediaries’ active participation by facilitating the transmission of cybercrime traffic removes a significant barrier for individual perpetrators. Part II.B offers a brief overview of legal efforts to combat cybercrime, and examines the legal liability of intermediaries in both the civil and criminal context and in varying legal regimes with an emphasis on ISPs. Aside from some …


Masthead Jun 2014

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


From The Editor-In-Chief, Ibrahim A. Baggili Jun 2014

From The Editor-In-Chief, Ibrahim A. Baggili

Journal of Digital Forensics, Security and Law

We are proud to share with you this special edition issue of the JDFSL. This year, JDFSL partnered with both the 6th International Conference on Digital Forensics and Cyber Crime (ICDF2C) and Systematic Approaches to Digital Forensic Engineering (SADFE)–two prominent conferences in our field that were co-hosted. Fifty-three papers were submitted, and the Technical Program Committee accepted only 17 after a rigorous review process.


Front Matter Jun 2014

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Back Matter Jun 2014

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


With Great Power Comes Little Responsibility: The Role Of Online Payment Service Providers With Regards To Websites Selling Counterfeit Goods, J. Bruce Richardson Jun 2014

With Great Power Comes Little Responsibility: The Role Of Online Payment Service Providers With Regards To Websites Selling Counterfeit Goods, J. Bruce Richardson

Canadian Journal of Law and Technology

This article will explain the current avenues for intellectual property rights holders to make use of existing anti-counterfeiting policies made available by financial companies dealing in electronic payments, and argue that current policies, while helpful, are not sufficient. The article will conclude by demonstrating that policy makers have options to intervene and regulate the use of online payment services, either directly through legislation or indirectly through facilitating “best practices.”


Rethinking Online Privacy In Canada: Commentary On Voltage Pictures V. John And Jane Doe, Ngozi Okidegbe Jun 2014

Rethinking Online Privacy In Canada: Commentary On Voltage Pictures V. John And Jane Doe, Ngozi Okidegbe

Canadian Journal of Law and Technology

This article examines the Voltage decision, with the view that the bona fide standard safeguards intellectual property rights at the cost of online privacy rights and will proceed in three parts. Part I provides a brief contextualization of the issues. Part II is an analysis of the Voltage decision. Part III examines how the bona fide standard is a relatively low threshold. This article concludes by considering the possibility of shifting to a higher standard for disclosure, as well as a possible solution for the effect that a higher standard could have on copyright owners.


Access Of Evil? Legislating Online Youth Privacy In The Information Age, Agathon Fric Jun 2014

Access Of Evil? Legislating Online Youth Privacy In The Information Age, Agathon Fric

Canadian Journal of Law and Technology

This article seeks to address what constitutes youth online privacy, how youth conceive of their privacy, whether their privacy needs protecting, and, if so, how youth privacy should be regulated online. First, the article begins by rooting the issue of online youth privacy in the current social, technological, economic, political, and legal context, drawing on social science research to demonstrate both the threats and opportunities created by technology for youth privacy.

Second, the analysis focuses on the relative strengths and weaknesses of current federal legislation as the primary law governing the collection, use, and disclosure of youth’s personal information through …


The Song Remains The Same: Preserving The First Sale Doctrine For A Secondary Market Of Digital Music, Marco Figliomeni Jun 2014

The Song Remains The Same: Preserving The First Sale Doctrine For A Secondary Market Of Digital Music, Marco Figliomeni

Canadian Journal of Law and Technology

This article will explore the origins and rationale for the first sale doctrine. A review of the most recent American case law shows the court rejecting the doctrine’s applicability in a digital sphere. I suggest that in spite of the court’s rigid interpretation of the U.S. Copyright Act, formulating a digital first sale doctrine is a matter better left to lawmakers. A flourishing digital secondary market can promote competition and innovation while making content more accessible to the public, but its endorsement requires an appreciation of its adverse effect on the primary market for copyright owners. The article fast-forwards to …


Combining Familial Searching And Abandoned Dna: Potential Privacy Outcomes And The Future Of Canada's National Dna Data Bank, Amy Conroy Jun 2014

Combining Familial Searching And Abandoned Dna: Potential Privacy Outcomes And The Future Of Canada's National Dna Data Bank, Amy Conroy

Canadian Journal of Law and Technology

This article aims to respond to the government’s request by explaining the nature of that relationship and by arguing that the combined use of familial searching and analysis of abandoned DNA would present a serious risk for genetic privacy. The risk is particularly acute given that it would effectively circumvent the existing justification for the NDDB, leading to inclusion of individuals whose DNA profiles have not been uploaded directly onto the data bank. To substantiate this main argument, this article proceeds in three parts. The first describes the current Canadian law on familial searching and the ongoing interest in amending …


Software Patentability After Prometheus, Joseph Holland King Jun 2014

Software Patentability After Prometheus, Joseph Holland King

Georgia State University Law Review

This Note examines the history of patentability of abstract ideas and the tests that courts have used to make the determination of whether an invention incorporating an abstract idea is patentable. Part I provides a history of the four seminal cases related to patentable subject matter, as well as some more recent on point decisions. Part II changes focus to the various tests and factors that have been used by the courts, exploring the history of each, discussing the treatment by the Supreme Court, and determining the strengths and weaknesses of each. Based on the discussion in Part II, Part …


Webmail At Work: The Case For Protection Against Employer Monitoring, Marc A. Sherman May 2014

Webmail At Work: The Case For Protection Against Employer Monitoring, Marc A. Sherman

Touro Law Review

No abstract provided.


Aftermarketfailure: Windows Xp's End Of Support, Andrew Tutt Apr 2014

Aftermarketfailure: Windows Xp's End Of Support, Andrew Tutt

Michigan Law Review First Impressions

After 12 years, support for Windows XP will end on April 8, 2014. So proclaims a Microsoft website with a helpful clock counting down the days. "What does this mean?" the website asks. "It means you should take action." You should "migrate to a current supported operating system - such as Windows 8.1 - so you can receive regular security updates to protect [your] computer from malicious attacks." The costs of mass migration will be immense. About 30% of all desktop PCs are running Windows XP right now. An estimated 10% of the U.S. government's computers run Windows XP, including …


How Should The Past Inform The Future? Reviewing Regulating Internet Gaming: Challenges And Opportunities, Keith C. Miller Apr 2014

How Should The Past Inform The Future? Reviewing Regulating Internet Gaming: Challenges And Opportunities, Keith C. Miller

UNLV Gaming Law Journal

No abstract provided.


Front Matter Mar 2014

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Masthead Mar 2014

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


Back Matter Mar 2014

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


The Communication Decency Act Gone Wild: A Case For Renewing The Presumption Against Preemption, Ryan J.P. Dyer Mar 2014

The Communication Decency Act Gone Wild: A Case For Renewing The Presumption Against Preemption, Ryan J.P. Dyer

Seattle University Law Review

Since its inception, the Internet has disseminated the most vital commodity known to man—information. But not all information is societally desirable. In fact, much of what the Internet serves to disseminate is demonstrably criminal. Nevertheless, in the effort to unbind the “vibrant and competitive free market” of ideas on the Internet, Congress enacted section 230 of the Communications Decency Act, which essentially grants immunity to interactive computer service providers from liability for information provided by a third party. This Comment suggests that, in certain contexts, courts applying section 230 immunity should reexamine the preemptive effect Congress intended section 230 to …


Snopa And The Ppa: Do You Know What It Means For You? If Snopa (Social Networking Online Protection Act) Or Ppa (Password Protection Act) Do Not Pass, The Snooping Could Cause You Trouble, Angela Goodrum Feb 2014

Snopa And The Ppa: Do You Know What It Means For You? If Snopa (Social Networking Online Protection Act) Or Ppa (Password Protection Act) Do Not Pass, The Snooping Could Cause You Trouble, Angela Goodrum

Journal of Public Law and Policy

This article discusses the importance of passing the Social Networking Online Protection Act and the Password Protection Act to afford vital protection against discrimination in hiring and admission decisions. Existing laws fail to adequately provide protection against discrimination after the advent of social media. Furthermore, failure to provide to provide protection via federal laws will create a disparity in the protection afforded individuals across the United States.

Social media has introduced a new world of opportunities for sharing, networking, but it has also created ample opportunities for others to snoop around, discriminate, and base their hiring or admission decisions, in …


How To Avoid The Death Of Your Case By Two Billion Paper Cuts: Encouraging Arbitration As An Alternative Way To Resolve Costly Discovery Disputes, Tzipora Goodfriend-Gelernter Feb 2014

How To Avoid The Death Of Your Case By Two Billion Paper Cuts: Encouraging Arbitration As An Alternative Way To Resolve Costly Discovery Disputes, Tzipora Goodfriend-Gelernter

Pepperdine Dispute Resolution Law Journal

This article analyzes the costly effect of electronic information on discovery practice and advocates for the arbitration of discovery disputes. Part II discusses the background of electronic discovery, the evolution of our reliance on ESI (electronically stored information) as part of our modern day discovery practice, and the benefits and detriments of electronic discovery. Part III discusses the effects of our reliance on electronic discovery and the implications of those effects on litigating parties. It examines how the increasingly computer-based world of discovery has increased the cost of litigation disputes significantly and proposes using the patent arbitration model as a …