Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Institution
- Keyword
- Publication
- Publication Type
Articles 1 - 30 of 38
Full-Text Articles in Computer Law
The Creator And The Benefits Of Creation: Protection Of Software In The Information Revolution, Martin Kratz
The Creator And The Benefits Of Creation: Protection Of Software In The Information Revolution, Martin Kratz
Dalhousie Law Journal
Mankind is presently passing through a technological revolution unlike anything seen in any prior era. In a world where the total mass of man's knowledge doubles in less than two years' information has become an increasingly valuable commodity. Similarly, the means by which information is manipulated has become evermore important. The development of the computer 2 has been the catalyst of this information revolution as it has freed man from many time consuming and monotonous tasks. The development of the computer industry has been phenomenal. 3 It has gone from its infancy in the late 1940's to a stage where …
The Protection Of Computer Software Through Shrink-Wrap License Agreements
The Protection Of Computer Software Through Shrink-Wrap License Agreements
Washington and Lee Law Review
No abstract provided.
Language, Communication, Computers And The Law, R. A. Samek
Language, Communication, Computers And The Law, R. A. Samek
Dalhousie Law Journal
There is an old story about a drunken man who is looking for an object under a street light. A policeman asks him what he is looking for. "It is my keys", he says. "Did you lose them here?" "No, over there.'" "Why then are you looking for them over here?" "Because I can see here", is the man's reply. The real significance of this story is very different from what it appears. It is not the man who is foolish but the policeman. We can only look for something from where we can see it. The alternative is to …
Remedies In Software Copyright Cases, 6 Computer L.J. 1 (1985), Dexter L. Kenfield
Remedies In Software Copyright Cases, 6 Computer L.J. 1 (1985), Dexter L. Kenfield
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Emerging Issues In Computer Procurements, 6 Computer L.J. 119 (1985), Mark L. Gordon, Steven B. Starr
Emerging Issues In Computer Procurements, 6 Computer L.J. 119 (1985), Mark L. Gordon, Steven B. Starr
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Legislative Control Of Data Processing - The British Approach, 6 Computer L.J. 143 (1985), Nigel Savage, Chris Edwards
The Legislative Control Of Data Processing - The British Approach, 6 Computer L.J. 143 (1985), Nigel Savage, Chris Edwards
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Expert Witnesses In Software Copyright Infringement Actions, 6 Computer L.J. 35 (1985), James J. Marcellino
Expert Witnesses In Software Copyright Infringement Actions, 6 Computer L.J. 35 (1985), James J. Marcellino
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
A Unifying Theory For The Litigation Of Computer Software Copyright Cases, 6 Computer L.J. 55 (1985), John M. Conley
A Unifying Theory For The Litigation Of Computer Software Copyright Cases, 6 Computer L.J. 55 (1985), John M. Conley
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Television Newscasters And The Bona Fide Occupational Qualification: A Justified Exception To Title Vii, 6 Computer L.J. 157 (1985), Sari Stabler
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Unauthorized Access To Eft Information: Who Should Be Responsible?, 6 Computer L.J. 171 (1985), Leslie Susan Norman
Unauthorized Access To Eft Information: Who Should Be Responsible?, 6 Computer L.J. 171 (1985), Leslie Susan Norman
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Proceedings Of Landtronics Conference Held February 15 And 16, 1985 At The Anneberg School Of Communication, University Of Southern California: Introduction, 6 Computer L.J. 245 (1985), Karen L. Elburn
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Legal Protection For Microcode And Beyond: A Discussion Of The Applicability Of The Semiconductor Chip Protection Act And The Copyright Laws To Microcode, 6 Computer L.J. 187 (1985), John R. Harris
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Computer In A Finite World, 6 Computer L.J. 349 (1985), Jay David Bolter
The Computer In A Finite World, 6 Computer L.J. 349 (1985), Jay David Bolter
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Technology And The Future Of Central Business Districts, 6 Computer L.J. 313 (1985), Gail Garfield Schwartz Ph.D.
Technology And The Future Of Central Business Districts, 6 Computer L.J. 313 (1985), Gail Garfield Schwartz Ph.D.
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The New Urban Telecommunications Infrastructure, 6 Computer L.J. 323 (1985), Mitchell L. Moss
The New Urban Telecommunications Infrastructure, 6 Computer L.J. 323 (1985), Mitchell L. Moss
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Federal, State, And Local Regulation Of Video And Telecommunications Information Systems - The Actual And The Ideal, 6 Computer L.J. 283 (1985), Frank W. Lloyd
Federal, State, And Local Regulation Of Video And Telecommunications Information Systems - The Actual And The Ideal, 6 Computer L.J. 283 (1985), Frank W. Lloyd
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The "New" Local Communications: Office Networks And Private Cable, 6 Computer L.J. 247 (1985), Eli M. Noam
The "New" Local Communications: Office Networks And Private Cable, 6 Computer L.J. 247 (1985), Eli M. Noam
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
In The Public Interest: An Argument Calling For An Amendment To The Federal Communications Act Requiring More Public Service Announcements In The Broadcast Media, 6 Computer L.J. 223 (1985), Ellen G. Roth
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
The Prospects For Telecommuting, 6 Computer L.J. 333 (1985), Herbert S. Dordick
The Prospects For Telecommuting, 6 Computer L.J. 333 (1985), Herbert S. Dordick
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Architects' Encounters With Computers, 6 Computer L.J. 357 (1985), William J. Mitchell
Architects' Encounters With Computers, 6 Computer L.J. 357 (1985), William J. Mitchell
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Some Planning And Design Considerations For The Home Office, 6 Computer L.J. 361 (1985), Michael E. Durkin
Some Planning And Design Considerations For The Home Office, 6 Computer L.J. 361 (1985), Michael E. Durkin
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Electronic Village: Information Technology Creates New Space, 6 Computer L.J. 365 (1985), Josh L. Wilson Jr.
Electronic Village: Information Technology Creates New Space, 6 Computer L.J. 365 (1985), Josh L. Wilson Jr.
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Software Lock-In And Antitrust Tying Arrangements: The Lessons Of Data General, 5 Computer L.J. 329 (1984), Charles H. Helein
Software Lock-In And Antitrust Tying Arrangements: The Lessons Of Data General, 5 Computer L.J. 329 (1984), Charles H. Helein
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Computer Software And The Investment Tax Credit, 5 Computer L.J. 347 (1984), Robert W. Mcgee
Computer Software And The Investment Tax Credit, 5 Computer L.J. 347 (1984), Robert W. Mcgee
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Computer Contract Challenges, 5 Computer L.J. 379 (1984), Jonathan Joseph
Computer Contract Challenges, 5 Computer L.J. 379 (1984), Jonathan Joseph
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Computer Software And The Research Credit, 5 Computer L.J. 363 (1984), Robert W. Mcgee
Computer Software And The Research Credit, 5 Computer L.J. 363 (1984), Robert W. Mcgee
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Copyright Protection Of Computer Software, 5 Computer L.J. 413 (1984), James Altman
Copyright Protection Of Computer Software, 5 Computer L.J. 413 (1984), James Altman
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Mainframe Computer Conversions: Buyer & Seller Beware, 5 Computer L.J. 469 (1985), Arthur Fakes
Mainframe Computer Conversions: Buyer & Seller Beware, 5 Computer L.J. 469 (1985), Arthur Fakes
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Use And Expression: The Scope Of Copyright Protection For Computer Programs, 5 Computer L.J. 433 (1985), Leslie Wharton
Use And Expression: The Scope Of Copyright Protection For Computer Programs, 5 Computer L.J. 433 (1985), Leslie Wharton
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.
Regulation Of Unsolicited Telephone Calls: An Argument For A Liability Rule, 5 Computer L.J. 393 (1984), Henry Darmstadter
Regulation Of Unsolicited Telephone Calls: An Argument For A Liability Rule, 5 Computer L.J. 393 (1984), Henry Darmstadter
UIC John Marshall Journal of Information Technology & Privacy Law
No abstract provided.