Rutgers Computer & Technology Law Journal
- 1997
- 1998
- 1999
- 2000
- 2001
- 2002
- 2003
- 2004
- 2005
- 2006
- 2007
- 2008
- 2009
- 2010
- 2011
- 2012
- 2013
- 2014
- 2015
- 2016
- 2017
- 2018
- 2019
- 2020
- 2021
- 2022
- 2023
- E-mail security risks: taking hacks at the attorney-client privilege.
- FIFTY-FOURTH SELECTED BIBLIOGRAPHY ON COMPUTERS, TECHNOLOGY AND THE LAW: (January 2022 through December 2022).
- Creating representations of justice in the third millennium: legal poetics in digital times.
- Forty-third selected bibliography on computers, technology and the law (January 2011 through December 2011).
- Forty-fourth selected bibliography on computers, technology, and the law.
- Teaching law with computers.
- Delivery drones: will Amazon Air see the national airspace?
- Software patent applications directed to business and mathematical processing applications highlight the tension between State Street and Benson.
- INTERNET OF INFRINGING THINGS: THE EFFECT OF COMPUTER INTERFACE COPYRIGHTS ON TECHNOLOGY STANDARDS.
- USING TECHNOLOGY TO DISCOVER MORE ABOUT THE JUSTICE SYSTEM.
- SECTION 10 Forbearance and the FCC's New Era of Internet Regulation.
- THE MEANING OF CREATION: ELECTRONIC DATABASES AND CREATING A RECORD TO FULFILL A PUBLIC RECORDS REQUEST.
- Gambling on the Internet: the states risk playing economic roulette as the Internet gambling industry spins onward.
- When public policies collide: legal "self-help" software and the unauthorized practice of law.
- From the school yard to cyberspace: a review of bullying liability.
- Dismantling the Internet mafia: RICO's applicability to cyber crime.
- PUNTING THE PRIVATE SEARCH DOCTRINE: How THE GOOD FAITH EXCEPTION IMPEDES FOURTH AMENDMENT JURISPRUDENCE.
- How to pry with maps: the Fourth Amendment privacy implications of governmental wetland Geographic Information Systems (GIS).
- Privacy in the private sector: use of the automotive industry's "event data recorder" and cable industry's "interactive television" in collecting personal data.
- Google and ye shall be found: privacy, search queries, and the recognition of a qualified privilege.
- Using distance learning to enhance cross-listed interdisciplinary law school courses.
- Reviving the world wonder: why rooftop gardens should cover urban landscapes.
- Universal health identifier: invasion of privacy or medical advancement?
- Mainstream Loudoun and the future of internet filtering for America's public libraries.
- Errata.
- Web 2.0 crashes through the courthouse door: legal and ethical issues related to the discoverability and admissibility of social networking evidence.
- Game over for childhood? Violent video games as First Amendment speech.
- Clouded computing: the foggy application of the Fourth Amendment in technology.
- Thirty-eighth selected bibliography on computers, technology and the law: (January 2005 through December 2005).
- Mobile data terminals and random license plate checks: the need for uniform guidelines and a reasonable suspicion requirement.
- Thirty-second selected bibliography on computers, technology and the law.
- Password protection and self-incrimination: applying the Fifth Amendment privilege in the technological era.
- Minnesota passes the nation's first Internet privacy law.
- Transmitting legal documents over the Internet: how to protect your client and yourself.
- Privacy in cyberspace: constructing a model of privacy for the electronic communications environment.
- FORTY- EIGHTH SELECTED BIBLIOGRAPHY ON COMPUTERS, TECHNOLOGY, AND THE LAW.
- Les Fleurs du mal: a critique of the legal transplant in Chinese Internet copyright protection.
- Thirty-sixth selected Bibliography on computers, technology and the law (January 2003 through December 2003).
- Cyberspace: a new frontier for fighting words.
- Let's keep it on the download: why the educational use factor of the fair use exception should shield rap music from infringement claims.
- Overseas outsourcing of private information & individual remedies for breach of privacy.
- Kids surfing the Net at school: what are the legal issues?
- What not to "ware": as Congress struggles against spyware, the FBI develops its own.
- THE METAVERSE: A VIRTUAL WORLD WITH REAL WORLD LEGAL CONSEQUENCES.
- Change necessary: electronic discovery under the Manual for Courts-Martial.
- Medics, markets, and Medicare.
- Development of net neutrality rules: is the third time a charm?
- ICOS, CRYPTOS, BLOCKCHAIN, OH MY! A PRIMER ON ICOs.
- Elonis v. United States: at the crossroads of First Amendment and criminal jurisprudence in the digital age.
- The realities of the MP3 madness: Are record companies simply crying wolf?
- Evidence at the electronic frontier: introducing e-mail at trial in commercial litigation.
- Forty-fifth selected bibliography on computers, technology, and the law.
- FIFTY-SECOND SELECTED BIBLIOGRAPHY ON COMPUTERS, TECHNOLOGY AND THE LAW: (January 2020 Through December 2020).
- Thirty-ninth selected bibliography on computers, technology, and the law: (January 2007 through December 2007).
- Changing the channel: the copyright fixation debate.
- Free access and the future of copyright.
- Secondary liability for third parties' copyright infringement upheld by the Supreme Court: MGM Studios, Inc. v. Grokster, Ltd.
- Upgrading the national power grid: electric companies need an economic incentive to invest in new technology.
- THE PATENT ACT AND THE CONSTITUTIONALITY OF STATE PHARMACEUTICAL REGULATION.
- DATA PORTABILITY: A GUIDE AND A ROADMAP.
- And the shirt off your back: Universal City Studios, DECSS, and the Digital Millennium Copyright Act.
- Technology due diligence: the need for and benefits of technology assessment in connection with investment in high-tech companies.
- Cybercommunity versus geographical community standard for online pornography: a technological hierarchy in judging cyberspace obscenity.
- Tinkering with students' free speech beyond the schoolhouse gate during the digital age.
- Teleradiology: images of an improved standard of medical care?
- The problem of the parody-satire distinction: fair use in Machinima and other fan created works.
- YOU WANT TO TWEET ABOUT IT BUT YOU PROBABLY CAN'T: HOW SOCIAL MEDIA PLATFORMS FLAGRANTLY VIOLATE THE FIRST AMENDMENT.
- I can do bad all by myself: a proposal for streamlining the claim construction process in patent litigation.
- A historical, economic, and legal analysis of municipal ownership of the information highway.
- Notice of errata.
- Thirty-third selected bibliography on computers, technology and the law: (January 2000 through December 2000).
- Discontinuance in the face of destruction: the future of telecommunications law after Superstorm Sandy.
- Personalized genomics: a need for a fiduciary duty remains.
- Child pornography and the Internet in Hong Kong.
- Google book search: fair use or fairly useful infringement?
- Honeypots: a sticky legal landscape?
- Notes on the United Nations Convention on the use of Electronic Communications in International Contracts and its effects on the United Nations Convention on Contracts for the International Sale of Goods.
- UNHARMONIOUS COEXISTENCE: HOW AMERICA'S MILITARY OBSESSION HAS DEMONSTRATED THE INCOMPATIBILITY OF WEAPONIZED DRONES AND SOVEREIGNTY.
- ALL EYES ON U.S.: REGULATING THE USE & DEVELOPMENT OF FACIAL RECOGNITION TECHNOLOGY.
- Privacy, the First Amendment and Hulk Hogan's $140.1 million jury verdict.
- Get ready for the return! How to make filing tax returns more efficient: applying the state of California Franchise Tax Board's ReadyReturn to the federal tax system.
- The "dirt" on digital "sanitizing": droit moral, artistic integrity and the Directors Guild of America v. CleanFlicks et al.
- Encryption, key recovery, and commercial trade secret assets: a proposed legislative model.
- Building the ethical cyber commander and the law of armed conflict.
- 'Can you see me now?' Bringing technology to the world of pro bono.
- The Digital Millennium Copyright Act: disabusing the notion of a constitutional moment.
- Aereo, the public performance right, and the future of broadcasting.
- Forty-fourth selected bibliography on computers, technology, and the law.
- TRANSPARENCY REPORTS AND THEIR RELATIONSHIP WITH THE ESPIONAGE ACT.
- Gun detector technology and the special needs exception.
- Look before you leap into predictive coding: an argument for a cautious approach to utilizing predictive coding.
- Toward true equality of educational opportunity: unlocking the potential of assistive technology through professional development.
- Not yet released and already a critical disappointment: still in committee, the proposed "Family Movie Act of 2004" garners few accolades.
- The multiple unconstitutionality of business method patents: common sense, congressional consideration, and constitutional history.
- E-Verify, a piece of the puzzle not a brick in the wall: why all U.S. employers should be made to use E-Verify, just not yet.
- Equine considerations and computer law - reflections forty years on: the story of the founding of the world's first academic law journal on the subject of computers and law.
- Computers and the patent system: the problem of the second step.
- Public performance copyrights: a guide to public place analysis.
- Cybersurgery: the cutting edge.
- E-consumer protection: a comparative analysis of EU and US consumer protection on the Internet.
- Forty-fourth selected bibliography on computers, technology, and the law.
- BIOMETRIC DATA COLLECTION AND USE IN THE AGE OF SOCIAL MEDIA: THE INCREASING NEED FOR COPPA UPDATES GIVEN THE DECREASING AGE OF INTERNET USERS.
- THE RISE OF CYBERCRIME AND THE NEED FOR STATE CYBERSECURITY REGULATIONS.
- Computerized IEP generators: the promise and the peril.
- The New Jersey Supreme Court's treatment of the wireless communications industry pursuant to New Jersey municipal land use law and the Telecommunications Act of 1996.
- Universal service and the digital revolution: beyond the Telecommunications Act of 1996.
- Taxing e-commerce: an abundance of constraints.
- Software patent developments: a programmer's perspective.
- Reforming 17 U.S.C. s. 107 for Software Creators with a Helpful Approach from the Uniform Trade Secrets Act.
- Online shareholder meetings: corporate law anomalies or the future of governance?
- Forty-sixth selected bibliography on computers, technology and the law: January 2014 through December 2014.
- Forty-fifth selected bibliography on computers, technology, and the law.
- Teleradiology: the perks, pitfalls and patients who ultimately pay.
- Must the children be sacrificed: the tension between emerging imaging technology, free speech and protecting children.
- FIFTY-FIRST SELECTED BIBLIOGRAPHY ON COMPUTERS, TECHNOLOGY AND THE LAW: January 2019 Through December 2019.
- What do pizza delivery and information services have in common? Lessons from recent judicial and regulatory struggles with convergence.
- Missing the mark in cyberspace: misapplying trademark law to invisible and attenuated uses.
- ON THE OBSOLESCENCE OF EMPIRICAL KNOWLEDGE IN DEFINING THE RISK/RIGHTS-BASED APPROACH TO AI REGULATION IN THE EUROPEAN UNION.
- Straightening your heir: on the constitutionality of regulating the use of preimplantation technologies to select preembryos or modify the genetic profile thereof based on expected sexual orientation.
- The European Union Directive on Waste Electrical and Electronic Equipment: a study in Trans-Atlantic Zealotry.
- Using the Internet to attract clients and the attorney-client privilege.
- THE LAW OF NUCLEAR POWER IN THE WARMTH OF THE ANTHROPOCENE.
- A wiki weapon solution: firearm regulation for the management of 3D printing in the American household.
- Symposium: ethical issues in e-discovery, social media, and the cloud.
- UNDERSTANDING THE COMPLEXITIES OF CIVIL DISOBEDIENCE FOR CYBERSPACE PROTESTS IN THE CASE OF AARON SWARTZ.
- Google, Inc. v. American Blind & Wallpaper Factory, Inc.: a justification for the use of trademarks as keywords to trigger paid advertising placements in Internet search engine results.
- Forty-third selected bibliography on computers, technology and the law (January 2011 through December 2011).
- Do as I say, not as I do - is Star Wars inevitable? Exploring the future of international space regime in the context of the 2006 U.S. National Space Policy.
- Clouded computing: the foggy application of the Fourth Amendment in technology.
- Beyond the neighborhood drugstore: U.S. regulation of online prescription drug sales by foreign businesses.
- The proliferation of electronic commerce patents: don't blame the PTO.
- Thirty-fourth selected biography on computers, technology and the law (January 2001 through December 2001).
- Aereo, the public performance right, and the future of broadcasting.
- The 140-character campaign: regulating social media usage in campaign advertising.
- Fan websites' use of trademarks in their domain names: fair or foul?
- VIDEOGAME STREAMING AND EMULATORS - A SLIPPI SLOPE FOR FAIR USE?
- The legal Web of wireless transactions.
- BitTorrent copyright trolls: a deficiency in the Federal Rules of Civil Procedure?
- WHO MODERATES THE MODERATORS? A LAW & ECONOMICS APPROACH TO HOLDING ONLINE PLATFORMS ACCOUNTABLE WITHOUT DESTROYING THE INTERNET.
- Adapting contract law to accommodate electronic contracts: overview and suggestions.
- Pornography, community and the Internet - freedom of speech and obscenity on the Internet.
- IT-APAs: harmonizing inconsistent transfer pricing rules in income tax - customs - VAT.
- DECENTRALIZING CREATIVITY: A TENABLE CASE FOR BLOCKCHAIN ADOPTION IN THE ENTERTAINMENT INDUSTRY.
- Forty-third selected bibliography on computers, technology and the law (January 2011 through December 2011).
- A technological trifecta: using videos, playlists, and Facebook in law school classes to reach today's students.
- FIFTY-FIRST SELECTED BIBLIOGRAPHY ON COMPUTERS, TECHNOLOGY AND THE LAW: January 2019 Through December 2019.
- When it rains, it pours: protecting student data stored in the cloud.
- A new era: integrating today's "next gen" research tools Ravel and Casetext in the law school classroom.
- Taming the Wild West: solving virtual world disputes using non-virtual law.
- Copyright in the digital age: a comparative survey.
- A STEP IN THE WRONG DIRECTION: THE CASE FOR RESTRAINING THE EXTRATERRITORIAL APPLICATION OF THE STORED COMMUNICATIONS ACT.
- Fair Use and Electronic Dance Music: Will the Availability of Music Altering Applications Cause a Shift in How Courts Assess Copyright Violations?
- Urban guerrilla & piracy surveillance: accidental casualties in fighting piracy in P2P networks in Europe.
- Korea's road toward respecting intellectual property rights.
- Cumulative index volumes 1 through 28: title indexto leading articles and features.
- FORTY- EIGHTH SELECTED BIBLIOGRAPHY ON COMPUTERS, TECHNOLOGY, AND THE LAW.
- A legislative response to Tiffany v. Ebay: in search of an Online Commerce Certification Act (OCCA).
- FROM INTERNET TROLLS TO SEASONED HACKERS: PROTECTING OUR FINANCIAL INTERESTS FROM DISTRIBUTED-DENIAL-OF-SERVICE ATTACKS.
- The Rosetta Stone for the doctrine of means-plus-function patent claims.
- Some math is hard, some not: rules for patentable subject matter of software.
- Forty-second selected bibliography on computers, technology and the law: (January 2010 through December 2010).
- Social media campaigns as an emerging alternative to litigation.
- "TEMPORARY" CONCEPTUAL ART: PROPERTY AND COPYRIGHT, HOPES AND PRAYERS.
- B2Bs, e-commerce & the all-or-nothing deal.
- One claim, one statutory class of invention: how the machine-or-transformation test impacts indefinite analysis.
- The legalization of Internet gambling: why the clock is ticking on prohibition.
- FEDERAL CIRCUIT DECISIONS CONCERNING SMARTPHONES HAVE CREATED UNCERTAINTY REGARDING THE EVIDENCE NEEDED TO PROVE IRREPARABLE HARM AND ESTABLISH ENTITLEMENT TO INJUNCTIVE RELIEF.
- WAS DIEHR A FLOOK IN THE SYSTEM? A SYSTEMS ANALYSIS FOR TWO LANDMARK PATENT ELIGIBILITY SUPREME COURT DECISIONS.
- FIFTIETH SELECTED BIBLIOGRAPHY ON COMPUTERS, TECHNOLOGY, AND THE LAW.
- The path of E-law: liberty, property, and democracy from the colonies to the Republic of Cyberia.
- The robotic arm went crazy! The problem of establishing liability in a monopolized field.
- Democracy's backlog: the Electronic Freedom of Information Act ten years later.
- Thirty-fifth selected Bibliography on computers, technology and the law (January 2002 through December 2002).
- Computer search and seizure issues in Internet crimes against children cases.
- Pop-up advertising online: slaying the hydra.
- Toward a criminal law for cyberspace: a new model of law enforcement?
- Dialing for dollars: should the FCC regulate Internet telephony?
- Cable television franchise agreements: is local, state or federal regulation preferable?
- Personal jurisdiction and the World-Wide Web: bits (and bytes) of minimum contracts.
- Balance of privacy vs. security: a historical perspective of the USA PATRIOT Act.
- Whistleblower? More like cybercriminal: the Computer Fraud and Abuse Act as applied to Sarbanes-Oxley whistleblowers.
- Authenticity of archived websites: the need to lower the evidentiary hurdle is imminent.
- DOES THE VIDEO PRIVACY PROTECTION ACT PROTECT USERS OF FREE CELL PHONE APPLICATIONS?
- Why-spy? An analysis of privacy and geolocation in the wake of the 2010 Google 'Wi-Spy' controversy.
- AUTONOMOUS DRIVING - REALITY OR WISHFUL THINKING? AN INTERDISCIPLINARY POSTCARD FROM GERMANY: AN INTERDISCIPLINARY PERSPECTIVE ON THE FUTURE OF THE AUTOMOBILE.
- Electronic discovery: 2006 amendments to the Federal Rules of Civil Procedure.
- The USA PATRIOT Act and telecommunications: privacy under attack.
- What's in the forecast? A look at the EPA's use of computer models in emissions trading.
- AN ANALOGICAL-REASONING APPROACH FOR DETERMINING EXPECTATIONS OF PRIVACY IN TEXT MESSAGE CONTENT.
- One click is enough: satisfying FDA's fair balance in the highly-regulated marketplace.
- The warrantless interception of e-mail: Fourth Amendment search or free rein for the police?
- Copyright law tackles yet another challenge: the electronic frontier of the World Wide Web.
- A case against higher tech in the law school classroom.
- Thirty-seventh selected bibliography on computers, technology and the law: (January 2004 through December 2004).
- Legal understanding and issues with electronic signatures - an empirical study of large businesses.
- "OUR IDENTITY IS OFTEN WHAT'S TRIGGERING SURVEILLANCE": HOW GOVERNMENT SURVEILLANCE OF #BLACKLIVESMATTER VIOLATES THE FIRST AMENDMENT FREEDOM OF ASSOCIATION.
- iPHONE X: UNLOCKING THE SELF INCRIMINATION CLAUSE OF THE FIFTH AMENDMENT.
- Harmonizing fair use and self-help copyright protection of digital music.
- You are here! Mapping the boundaries of the Fourth Amendment with GPS technology.
- The prodigal "son" returns: an assessment of current "son of Sam" laws and the reality of the online murderabilia marketplace.