Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Privacy Law (33)
- Computer Law (20)
- Internet Law (20)
- Science and Technology Law (20)
- Constitutional Law (14)
-
- State and Local Government Law (10)
- Intellectual Property Law (9)
- Supreme Court of the United States (9)
- Torts (9)
- Criminal Law (8)
- Civil Rights and Discrimination (4)
- Family Law (4)
- First Amendment (4)
- Fourth Amendment (4)
- Law and Society (4)
- Legal Education (4)
- Legal Writing and Research (4)
- Medical Jurisprudence (4)
- Bankruptcy Law (3)
- Civil Procedure (3)
- Communications Law (3)
- Comparative and Foreign Law (3)
- Contracts (3)
- Criminal Procedure (3)
- Juvenile Law (3)
- Labor and Employment Law (3)
- Legal History (3)
- Legislation (3)
- Litigation (3)
- Publication
- Publication Type
Articles 1 - 30 of 80
Full-Text Articles in Law
Reconsidering The Second Amendment: Constitutional Protection For A Right Of Security, 9 Hamline L. Rev. 69 (1986), Donald L. Beschle
Reconsidering The Second Amendment: Constitutional Protection For A Right Of Security, 9 Hamline L. Rev. 69 (1986), Donald L. Beschle
UIC Law Open Access Faculty Scholarship
No abstract provided.
The Press And Politics In Nigeria: A Case Study Of Developmental Journalism, 6 B.C. Third World L.J. 85 (1986), Michael P. Seng, Gary T. Hunt
The Press And Politics In Nigeria: A Case Study Of Developmental Journalism, 6 B.C. Third World L.J. 85 (1986), Michael P. Seng, Gary T. Hunt
UIC Law Open Access Faculty Scholarship
No abstract provided.
Civil Procedure, 18 Loy. U. Chi. L.J. 317 (1986), Kenneth Kandaras, Catherine Wozniak
Civil Procedure, 18 Loy. U. Chi. L.J. 317 (1986), Kenneth Kandaras, Catherine Wozniak
UIC Law Open Access Faculty Scholarship
No abstract provided.
The Demise Of The Praecipe, 11 S. Ill. U. L.J. 29 (1986), Diane S. Kaplan
The Demise Of The Praecipe, 11 S. Ill. U. L.J. 29 (1986), Diane S. Kaplan
UIC Law Open Access Faculty Scholarship
No abstract provided.
Cumulation Of Import Statistics In Injury Investigations Before The International Trade Commission, 7 Nw. J. Int'l L. & Bus. 433 (1986), William B.T. Mock
Cumulation Of Import Statistics In Injury Investigations Before The International Trade Commission, 7 Nw. J. Int'l L. & Bus. 433 (1986), William B.T. Mock
UIC Law Open Access Faculty Scholarship
No abstract provided.
Doing Well, Doing Good And Doing Both: A Framework For The Analysis Of Noncommercial Boycotts Under The Antitrust Laws, 30 St. Louis U. L.J. 385 (1986), Donald L. Beschle
Doing Well, Doing Good And Doing Both: A Framework For The Analysis Of Noncommercial Boycotts Under The Antitrust Laws, 30 St. Louis U. L.J. 385 (1986), Donald L. Beschle
UIC Law Open Access Faculty Scholarship
No abstract provided.
Skills Training In “Legal Analysis”: A Systematic Approach, 40 U. Miami L. Rev. 409 (1986), Paul T. Wangerin
Skills Training In “Legal Analysis”: A Systematic Approach, 40 U. Miami L. Rev. 409 (1986), Paul T. Wangerin
UIC Law Open Access Faculty Scholarship
No abstract provided.
System Operator Liability For Defamtory Statements Appearing On An Electronic Bulletin Board, 19 J. Marshall L. Rev. 1107 (1986), George B. Trubow
System Operator Liability For Defamtory Statements Appearing On An Electronic Bulletin Board, 19 J. Marshall L. Rev. 1107 (1986), George B. Trubow
UIC Law Review
No abstract provided.
A New Means Of International Protection Of Computer Programs Through The Paris Convention - A New Concept Of Utility Model, 7 Computer L.J. 1 (1986), Takaharu Higashima, Kenji Ushiku
A New Means Of International Protection Of Computer Programs Through The Paris Convention - A New Concept Of Utility Model, 7 Computer L.J. 1 (1986), Takaharu Higashima, Kenji Ushiku
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Computers: The Link To Missing Children, 7 Computer L.J. 73 (1986), Michelle M. Fujimoto
Computers: The Link To Missing Children, 7 Computer L.J. 73 (1986), Michelle M. Fujimoto
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Computer Data And Reliability: A Call For Authentication Of Business Records Under The Federal Rules Of Evidence, 7 Computer L.J. 23 (1986), Rudolph J. Peritz
Computer Data And Reliability: A Call For Authentication Of Business Records Under The Federal Rules Of Evidence, 7 Computer L.J. 23 (1986), Rudolph J. Peritz
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Flagler Dog Track Case, 7 Computer L.J. 117 (1986), Marilyn Hochman
The Flagler Dog Track Case, 7 Computer L.J. 117 (1986), Marilyn Hochman
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Threat From Within: Cable Television And The Invasion Of Privacy, 7 Computer L.J. 89 (1986), Glen R. Segal
The Threat From Within: Cable Television And The Invasion Of Privacy, 7 Computer L.J. 89 (1986), Glen R. Segal
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Operation Exodus: The United States Government's Program To Intercept Illegal Exports Of High Technology, 7 Computer L.J. 203 (1986), Bruce B. Weyhrauch
Operation Exodus: The United States Government's Program To Intercept Illegal Exports Of High Technology, 7 Computer L.J. 203 (1986), Bruce B. Weyhrauch
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
17 U.S.C. § 117: Is The Amendment To The Copyright Act Adequate To Regulate The Computer Software Market?, 7 Computer L.J. 227 (1986), Robin Michael
17 U.S.C. § 117: Is The Amendment To The Copyright Act Adequate To Regulate The Computer Software Market?, 7 Computer L.J. 227 (1986), Robin Michael
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
A Chip Off The Old Block: Copyright Law And The Semiconductor Chip Protection Act, 7 Computer L.J. 245 (1986), Frederic M. Wilf
A Chip Off The Old Block: Copyright Law And The Semiconductor Chip Protection Act, 7 Computer L.J. 245 (1986), Frederic M. Wilf
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Semiconductor Chip Protection Act Of 1984: Is Copyright Protection For Utilitarian Articles Desirable?, 7 Computer L.J. 129 (1986), Theodore Shih
The Semiconductor Chip Protection Act Of 1984: Is Copyright Protection For Utilitarian Articles Desirable?, 7 Computer L.J. 129 (1986), Theodore Shih
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Tear-Me-Open Software License Agreements: A Uniform Commercial Code Perspective On An Innovative Contract Of Adhesion, 7 Computer L.J. 261 (1986), Michael Schwarz
Tear-Me-Open Software License Agreements: A Uniform Commercial Code Perspective On An Innovative Contract Of Adhesion, 7 Computer L.J. 261 (1986), Michael Schwarz
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The 1984 Federal Computer Crime Statute: A Partial Answer To A Pervasive Problem, 6 Computer L.J. 459 (1986), Joseph B. Tompkins Jr., Linda A. Mar
The 1984 Federal Computer Crime Statute: A Partial Answer To A Pervasive Problem, 6 Computer L.J. 459 (1986), Joseph B. Tompkins Jr., Linda A. Mar
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Copyrightability Of Object Code And Rom In Japan, Australia, And Germany: Surpassing Traditional Copyright Limits, 6 Computer L.J. 513 (1985), Noah J. Gordon
Copyrightability Of Object Code And Rom In Japan, Australia, And Germany: Surpassing Traditional Copyright Limits, 6 Computer L.J. 513 (1985), Noah J. Gordon
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Third-Party Computer Leases: The Effect Of The Lessor's Bankruptcy, 6 Computer L.J. 573 (1986), Charles S. Cohen
Third-Party Computer Leases: The Effect Of The Lessor's Bankruptcy, 6 Computer L.J. 573 (1986), Charles S. Cohen
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Litigating Computer Trade Secrets In California, 6 Computer L.J. 485 (1985), George S. Burns
Litigating Computer Trade Secrets In California, 6 Computer L.J. 485 (1985), George S. Burns
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Venture Capital Financing In The Computer Industry, 6 Computer L.J. 387 (1986), Duncan M. Davidson, Jean A. Davidson
Venture Capital Financing In The Computer Industry, 6 Computer L.J. 387 (1986), Duncan M. Davidson, Jean A. Davidson
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Copyright Law And Integrated Circuit Protection: When The Chips Are Down, 6 Computer L.J. 543 (1985), Michael D. Stokes
Copyright Law And Integrated Circuit Protection: When The Chips Are Down, 6 Computer L.J. 543 (1985), Michael D. Stokes
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Defamation And The Public Official: The Big Chill, 6 Computer L.J. 725 (1985), Ronit Mandelbaum
Defamation And The Public Official: The Big Chill, 6 Computer L.J. 725 (1985), Ronit Mandelbaum
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Legal Protection Of Semiconductor Mask Works In The United States, 6 Computer L.J. 589 (1986), Stephen A. Becker
Legal Protection Of Semiconductor Mask Works In The United States, 6 Computer L.J. 589 (1986), Stephen A. Becker
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Data Accuracy In Criminal Justice Information Systems: The Need For Legislation To Minimize Constitutional Harm, 6 Computer L.J. 677 (1985), Mark A. Beskind
Data Accuracy In Criminal Justice Information Systems: The Need For Legislation To Minimize Constitutional Harm, 6 Computer L.J. 677 (1985), Mark A. Beskind
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Requiring An Election Of Protection For Patentable/Copyrightable Computer Programs, 6 Computer L.J. 607 (1985), Michael J. Kline
Requiring An Election Of Protection For Patentable/Copyrightable Computer Programs, 6 Computer L.J. 607 (1985), Michael J. Kline
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
In What Vision Of The Constitution Must The Law Be Color-Blind, 20 J. Marshall L. Rev. 201 (1986), Laurence H. Tribe
In What Vision Of The Constitution Must The Law Be Color-Blind, 20 J. Marshall L. Rev. 201 (1986), Laurence H. Tribe
UIC Law Review
No abstract provided.
Tortious Interference With Visitation Rights: A New And Important Remedy For Non-Custodial Parents, 20 J. Marshall L. Rev. 307 (1986), Lawrence A. Goldman
Tortious Interference With Visitation Rights: A New And Important Remedy For Non-Custodial Parents, 20 J. Marshall L. Rev. 307 (1986), Lawrence A. Goldman
UIC Law Review
No abstract provided.