Fortieth selected bibliography on computers, technology and the law (January 2008 through December 2008).

PositionBibliography

INTRODUCTION

Each year, the Journal provides a compilation of the most important and timely articles on computers, technology, and the law. The Bibliography, indexed by subject matter, is designed to be a research guide to assist our readers in searching for recent articles on computer and technology law. This year's annual Bibliography contains nearly 1000 articles, found through the examination of over 1000 periodicals.

The Bibliography aims to include topics on every legal aspect of computers and technology. However, as new issues in this field emerge, we welcome your suggestions for additional topics and sources, as well as your commentary on the Bibliography.

INDEX 1. COMPUTERS AND TECHNOLOGY IN LAW PRACTICE 1.0 General 1.1 Computerized Legal Research 1.1.0 General 1.1.1 Online Legal Research 1.1.2 Legal Research Using CD-ROM 1.2 Law Office Management 1.2.0 General 1.2.1 Office Automation 1.2.2 Case Management 1.2.3 Case File Security 1.2.4 Internet Access 1.3 Selected Uses in the Law Practice 1.3.0 General 1.3.1 Tax Filing 1.3.2 Bankruptcy 1.3.3 Estate Planning 1.3.4 Real Estate 1.3.5 Advertising 2. COMPUTERS AND TECHNOLOGY IN LITIGATION 2.0 General 2.1 Scientific Evidence 2.1.0 General 2.1.1 Expert Testimony 2.1.2 DNA Typing 2.1.3 Fingerprint 2.1.4 Polygraph 2.1.5 Forensic Evidence 2.2 Demonstrative Evidence 2.2.0 General 2.2.1 Computer-Generated Evidence 2.2.2 Audio/Visual Evidence 2.3 Courtroom 2.4 Dispute Resolution 3. COMPUTERS AND TECHNOLOGY IN THE GOVERNMENT 3.0 General 3.1 Computers and Technology in Law Enforcement 3.1.0 General 3.1.1 Computers and Technology in Police Operation 3.1.2 Computers and Technology in Correctional Institutions 3.2 Use of Computers and Technology by Federal Departments and Agencies 3.2.0 General 3.2.1 Military Technology 3.2.2 Internal Revenue Service 3.2.3 U.S. Patent Office 3.2.4 Government Information Retrieval System 3.3 Use of Computers and Technology in Judicial Administration 3.4 Use of Computers and Technology by State and Federal Legislatures 4. LEGAL ISSUES OF COMPUTER AND TECHNOLOGY SALES, USAGE, AND SERVICES 4.0 General 4.1 Contracting for Hardware, Software, and Computer Services 4.1.0 General 4.1.1 Purchase, Lease and License Considerations 4.1.2 Limitations of Limited Warranties 4.2 Government Regulation of Computer-Related Industry 4.2.0 General 4.2.1 First Amendment Issues 4.2.2 Antitrust 4.2.3 FCC Regulation 4.2.4 SEC Regulation 4.2.5 Tariff and Trade Control 4.3 Substantive Law Aspects 4.3.0 General 4.3.1 Computer Crime 4.3.2 Computer-Related Product Liability 4.3.3 Computer Security 4.3.4 Taxation of Software 4.4 Problems of Privacy and Computers 4.4.0 General 4.4.1 Data Privacy 4.4.2 Governmental Invasion of Privacy 4.4.3 Credit Reference 5. COMPUTERS AND TECHNOLOGY IN EDUCATION 5.0 General 5.1 Legal Education 6. COMPUTERS AND TECHNOLOGY IN BUSINESS 6.0 General 6.1 Electronic Commerce 6.2 Computers in Banking and Finance 6.2.0 General 6.2.1 On-line Securities Trading 6.3 Computers and Technology in the Transportation Industry 6.4 Computers and Technology in the Publishing Industry 6.5 Computers and Technology in Advertising 6.6 Computers and Technology in Accounting 7. INTELLECTUAL PROPERTY PROTECTION OF COMPUTER AND TECHNOLOGY 7.0 General 7.1 Patent 7.1.0 General 7.1.1 Software Patent 7.1.2 Biotech Patent 7.2 Software Copyright 7.2.0 General 7.2.1 User Interface 7.2.2 Fair Use 7.2.3 Video Game 7.3 Digital Copyright 7.3.0 General 7.3.1 Electronic Compilation 7.3.2 Computer Database 7.3.3 Multimedia 7.3.4 Computer-Generated Works 7.4 Trademark 7.5 Trade Secret 7.6 Semiconductor Chip Protection 7.7 Licensing 7.8 Intellectual Property Issues of the Internet 7.9 International Developments 7.9.0 General 7.9.1 GATT-TRIPS 7.9.2 NAFTA 7.9.3 Developments in Canada 7.9.4 Developments in Mexico and Latin America 7.9.5 Developments in Australia and New Zealand 7.9.6 Developments in Africa 7.9.7 Developments in Asia 7.9.8 Developments in Western Europe 7.9.9 Developments in Eastern Europe and Russia 8. COMPUTERS AND LEGAL REASONING 8.0 General 8.1 Artificial Intelligence 9. LEGAL ISSUES OF THE INTERNET 9.0 General 9.1 ISP and Internet Access 9.2 Domain Names 9.3 Taxation of Electronic Commerce 9.4 Encryption and Digital Signatures 9.5 Internet Crime 9.6 Civil Procedure in Cyberspace 10. LAW AND TECHNOLOGY 10.0 General 10.1 Technology Transfer 10.2 Audio/Video Recording 10.3 Space Law 10.4 Medical Technology 10.5 Biotechnology and Pharmaceuticals 10.6 Environmental Law 10.6.0 General 10.6.1 Pollution 10.6.2 Hazardous Substances 10.6.3 Electromagnetic Fields 10.6.4 Nuclear Technology 10.6.5 Energy and the Environment 10.6.6 International Environmental Law Developments 10.7 Television 10.7.0 General 10.7.1 Satellite Television 10.7.2 Cable Television 10.8 Telecommunications 10.8.0 General 10.8.1 Telephone 10.8.2 Multimedia in Telecommunications 10.8.3 International Telecommunications Developments 10.9 Broadband 11. FAMILY LAW 12. OTHER BIBLIOGRAPHY

  1. COMPUTERS AND TECHNOLOGY IN LAW PRACTICE

    1.0 General

    Jeffrey Allen, Blogging for Fun, EXPERIENCE, Winter 2008, at37.

    Stephen Gillers, Lecture, Virtual Clients: An Idea in Search of a Theory (With Limits), 42 VAL. U.L. REV. 797 (2008).

    Susan Corts Hill, Current Development, Living in a Virtual World: Ethical Considerations for Attorneys Recruiting New Clients in Online Virtual Communities, 21 GEO. J. LEGAL ETHICS 753 (2008).

    Johnathan Jenkins, What Can Information Technology do for Law?, 21 HARV. J. L. & TECH. 589 (2008).

    Justin Krypel, A New Frontier or Merely a New Medium? An Analysis of the Ethics of Blawgs, 14 MICH. TELECOMM. & TECH. L. REV. 457 (2008).

    Bradley H. Leiber, Current Development, Applying Ethics Rules to Rapidly Changing Technology: The D.C. Bar's Approach to Metadata, 21 GEO. J. LEGAL ETHICS 893 (2008).

    Adam C. Losey, Note, Clicking Away Confidentiality: Workplace Waiver of Attorney-Client Privilege, 60 FLA. L. REV. 1179 (2008).

    Peter W. Martin, Lecture, Donald A. Giannella Memorial Lecture: Reconfiguring Law Reports and the Concept of Precedent for a Digital Age, 53 VILL. L. REV. 1 (2008).

    Richard L. Marcus, The Impact of Computers on the Legal Profession: Evolution or Revolution?, 102 NW. U.L. Rev. 1827 (2008).

    Zachary Wang, Ethics and Electronic Discovery: New Medium, Same Problems, 75 DEF. COUNSEL J. 328 (2008).

    1.1 Computerized Legal Research

    1.1.0 General

    Marci Hoffman & Katherine Topulos, Tyranny of the Available: Under-Represented Topics, Approaches, and Viewpoints, 35 SYRACUSE J. INT'L L. & COM. 175 (2008).

    1.1.1 Online Legal Research

    Terry Hutchinson, Developing Legal Research Skills: Expanding the Paradigm, 32 MELB. U. L. REV. 1065 (2008).

    Katrina Fischer Kuh, Electronically Manufactured Law, 22 HARV. J. L. & TECH. 223 (2008).

    Ellie Margolis, Article, Surfin' Safari--Why Competent Lawyers Should Research on the Web, 10 YALE J. L. & TECH. 82 (2008).

    Mary Rumsey, Gauging the Impact of Online Legal Information on International Law: Two Tests, 35 SYRACUSE J. INT'L L. & COM. 201 (2008).

    Lisa Smith-Butler, Cost Effective Legal Research Redux: How to Avoid Becoming the Accidental Tourist, Lost in Cyberspace, 9 FL. COASTAL L. REV. 293 (2008).

    1.1.2 Legal Research Using CD-ROM

    1.2 Law Office Management

    1.2.0 General

    1.2.1 Office Automation

    1.2.2 Case Management

    Emily Bums, Michelle Greet Galloway, & Jeffrey Gross, E-Discovery: One Year of the Amended Federal Rules of Civil Procedure, 64 N.Y.U. ANN. SURV. AM. L. 201 (2008).

    Jessica DeBono, Comment, Preventing and Reducing Costs and Burdens Associated With E-discovery: The 2006

    Amendments to the Federal Rules of Civil Procedure, 59 MERCER L. REV. 963 (2008).

    1.2.3 Case File Security

    1.2.4 Internet Access

    1.3 Selected Uses in the Law Practice

    1.3.0 General

    David Hricik & Chase Edward Scott, Metadata: The Ghosts Haunting e-Documents, LAW/TECH. Apr.-Jun. 2008, at 1.

    Jason P. Kathman, Note, Constructive Strict-Approach to Attorney-Client Privilege in Bankruptcy: Lack of Clarity in Rule 502 Makes its Application to Bankruptcy Unclear, 15 TEX. WESLEYAN L. REV. 61 (2008).

    Kristi Anne Thompson, Comment, Exposing Snitches on the Internet: The Carmichael Case and Attorney Use of New Tools in Criminal Defense, 33 J. Legal Prof. 149 (2008).

    1.3.1 Tax Filing

    1.3.2 Bankruptcy

    1.3.3 Estate Planning

    Joseph Karl Grant, Article, Shattering and Moving Beyond the Gutenberg Paradigm: The Dawn of the Electronic Will, 42 U. MICH. J.L. REFORM 105 (2008).

    Kristine S. Knaplund, Legal Issues of Maternity and Inheritance for the Biotech Child of the 21st Century, 43 REAL PROP. PROB. & TR. J. 393 (2008).

    1.3.4 Real Estate

    William J. Drummond and Steven P. French, The Future of GIS in Planning: Converging Technologies and Diverging Interests, 74 J. AM. PLAN. ASS'N 161 (2008).

    David E. Ewan and Mark Ladd, Race to the (Virtual) Courthouse, PROBATE & PROPERTY, Jan.-Feb. 2008, at 8.

    Joseph Ferreira, Jr., Comment on Drummond and French: GIS Evolution: Are We Messed Up by Mashups?, 74 J. AM. PLAN. ASS'N 177 (2008).

    Richard E. Klosterman, Comment on Drummond and French: Another View of the Future of GIS, 74 J. AM. PLAN. ASS'N 174 (2008).

    1.3.5 Advertising

  2. COMPUTERS AND TECHNOLOGY IN LITIGATION

    2.0 General

    Thomas Y. Allman, The Sedona Principles (Second Edition): Accommodating the 2006 E-Discovery Amendments, FED. CTS. L. REV., April 2008, at 2.

    Philip Beatty, Note, The Genesis of the Information Technologist-Attorney in the Era of Electronic Discovery, 13 J. TECH. L. & POL'Y 261 (2008).

    Mike Breen, Comment, Nothing to Hide: Why Metadata Should be Presumed Relevant, 56 U. KAN. L. REV. 439 (2008).

    Danielle Keats Citron, Article, Technological Due Process, 85 WASH. U. L. REV. 1249 (2008).

    Julie Cohen, Look Before You Leap: A Guide to the Law of Inadvertent Disclosure of Privileged Information in the Era of E-Discovery, 93 IOWA L. REV. 627 (2008).

    Gal Davidovitch, Comment, Why Rule 37(E) Does Not Create a New Safe Harbor for Electronic Evidence Spoliation, 38 SETON HALL L...

To continue reading

Request your trial

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT