Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

UIC School of Law

Journal

UIC John Marshall Journal of Information Technology & Privacy Law

1980

Articles 1 - 30 of 33

Full-Text Articles in Law

Introduction: Electronic Funds Transfer Systems, 2 Computer L.J. 1 (1980), George W. Mitchell Jan 1980

Introduction: Electronic Funds Transfer Systems, 2 Computer L.J. 1 (1980), George W. Mitchell

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The 348 Committee - An Interim Report, 2 Computer L.J. 27 (1980), Robert Haydock Jr. Jan 1980

The 348 Committee - An Interim Report, 2 Computer L.J. 27 (1980), Robert Haydock Jr.

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


An Overview Of The Legal Issues Confronting The Establishment Of Electronic Fund Transfer Services, 2 Computer L.J. 7 (1980), Melvin R. Katskee, Ann L. Wright Jan 1980

An Overview Of The Legal Issues Confronting The Establishment Of Electronic Fund Transfer Services, 2 Computer L.J. 7 (1980), Melvin R. Katskee, Ann L. Wright

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Terminal-Based Eft Services: The Need For Uniform Federal Legislation, 2 Computer L.J. 31 (1980), Theresa A. Einhorn Jan 1980

Terminal-Based Eft Services: The Need For Uniform Federal Legislation, 2 Computer L.J. 31 (1980), Theresa A. Einhorn

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Authentication In Eft: The Legal Standard And The Operational Reality, 2 Computer L.J. 67 (1980), Fred M. Greguras, David J. Sykes Jan 1980

Authentication In Eft: The Legal Standard And The Operational Reality, 2 Computer L.J. 67 (1980), Fred M. Greguras, David J. Sykes

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Book Review: The Law Of Electronic Funds Transfer, 2 Computer L.J. 167 (1980), Howard D. Neal Jan 1980

Book Review: The Law Of Electronic Funds Transfer, 2 Computer L.J. 167 (1980), Howard D. Neal

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Case Digest, 2 Computer L.J. 171 (1980), Michael D. Scott Jan 1980

Case Digest, 2 Computer L.J. 171 (1980), Michael D. Scott

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Problems Of Proof When There's A Computer Goof: Consumers Versus Atms, 2 Computer L.J. 49 (1980), Mark Budnitz Jan 1980

Problems Of Proof When There's A Computer Goof: Consumers Versus Atms, 2 Computer L.J. 49 (1980), Mark Budnitz

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Legal Guidelines For Check Truncation, 2 Computer L.J. 115 (1980), George C. White Jr. Jan 1980

Legal Guidelines For Check Truncation, 2 Computer L.J. 115 (1980), George C. White Jr.

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Competitive Implications Of Eft, 2 Computer L.J. 133 (1980), James L. Pierce Jan 1980

The Competitive Implications Of Eft, 2 Computer L.J. 133 (1980), James L. Pierce

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Is Corporate Eft Coming Of Age?, 2 Computer L.J. 87 (1980), James W. Trotter Jan 1980

Is Corporate Eft Coming Of Age?, 2 Computer L.J. 87 (1980), James W. Trotter

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Electronic Giro For The United States, 2 Computer L.J. 101 (1980), James V. Vergari Jan 1980

Electronic Giro For The United States, 2 Computer L.J. 101 (1980), James V. Vergari

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Implications Of The Informational Nature Of Payments, 2 Computer L.J. 153 (1980), James L. Brown Jan 1980

Implications Of The Informational Nature Of Payments, 2 Computer L.J. 153 (1980), James L. Brown

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Electronic Funds Transfer Systems Bibliography, 2 Computer L.J. 183 (1980), Michael D. Scott Jan 1980

Electronic Funds Transfer Systems Bibliography, 2 Computer L.J. 183 (1980), Michael D. Scott

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


On Charging Computer Crime, 2 Computer L.J. 429 (1980), Donald G. Ingraham Jan 1980

On Charging Computer Crime, 2 Computer L.J. 429 (1980), Donald G. Ingraham

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


A Survey Of Computer Crime Studies, 2 Computer L.J. 275 (1980), John K. Taber Jan 1980

A Survey Of Computer Crime Studies, 2 Computer L.J. 275 (1980), John K. Taber

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Investigation, Prosecution, And Prevention Of Computer Crime: A State-Of-The-Art Review, 2 Computer L.J. 385 (1980), Mary R. Volgyes Jan 1980

The Investigation, Prosecution, And Prevention Of Computer Crime: A State-Of-The-Art Review, 2 Computer L.J. 385 (1980), Mary R. Volgyes

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Computer Abuse Research Update, 2 Computer L.J. 329 (1980), Donn B. Parker Jan 1980

Computer Abuse Research Update, 2 Computer L.J. 329 (1980), Donn B. Parker

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Computer Abuse And Computer Crime As Organizational Activities, 2 Computer L.J. 403 (1980), Rob Kling Jan 1980

Computer Abuse And Computer Crime As Organizational Activities, 2 Computer L.J. 403 (1980), Rob Kling

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Book Reviews, 2 Computer L.J. 773 (1980), Steven I. Smith, Michael D. Scott Jan 1980

Book Reviews, 2 Computer L.J. 773 (1980), Steven I. Smith, Michael D. Scott

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Computer Crime - The Need For Deterrent Legislation, 2 Computer L.J. 353 (1980), Stanley L. Sokolik Jan 1980

Computer Crime - The Need For Deterrent Legislation, 2 Computer L.J. 353 (1980), Stanley L. Sokolik

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


The Trial Of A Computer Crime, 2 Computer L.J. 441 (1980), Jay Becker Jan 1980

The Trial Of A Computer Crime, 2 Computer L.J. 441 (1980), Jay Becker

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Computer-Assisted Crime In Scandinavia, 2 Computer L.J. 457 (1980), Stein Schjølberg Jan 1980

Computer-Assisted Crime In Scandinavia, 2 Computer L.J. 457 (1980), Stein Schjølberg

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Current And Proposed Computer Crime Legislation, 2 Computer L.J. 721 (1980), Michael M. Krieger Jan 1980

Current And Proposed Computer Crime Legislation, 2 Computer L.J. 721 (1980), Michael M. Krieger

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Case Digest, 2 Computer L.J. 777 (1980), Drew Pomerance Jan 1980

Case Digest, 2 Computer L.J. 777 (1980), Drew Pomerance

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Computer Crimes Bibliography, 2 Computer L.J. 787 (1980), Linda A. Schulte Jan 1980

Computer Crimes Bibliography, 2 Computer L.J. 787 (1980), Linda A. Schulte

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Tax-Exempt Bond Financing Of Computer Telecommunications And Other High Technology Facilities, 2 Computer L.J. 805 (1980), Fred M. Greguras Jan 1980

Tax-Exempt Bond Financing Of Computer Telecommunications And Other High Technology Facilities, 2 Computer L.J. 805 (1980), Fred M. Greguras

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Mathematical Models For Legal Prediction, 2 Computer L.J. 829 (1980), R. Keown Jan 1980

Mathematical Models For Legal Prediction, 2 Computer L.J. 829 (1980), R. Keown

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Rifkin, A Documentary History, 2 Computer L.J. 471 (1980), Jay Becker Jan 1980

Rifkin, A Documentary History, 2 Computer L.J. 471 (1980), Jay Becker

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Book Review: Computer Networks And Data Protection Law, 2 Computer L.J. 903 (1980), Fred M. Greguras Jan 1980

Book Review: Computer Networks And Data Protection Law, 2 Computer L.J. 903 (1980), Fred M. Greguras

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.