Forty-third selected bibliography on computers, technology and the law (January 2011 through December 2011).

Position::Introduction through 4. Issues of Privacy, Security and Crime, p. 277-325 - Bibliography
 
FREE EXCERPT

INTRODUCTION

Each year, the Journal provides a compilation of the most important and timely articles on computers, technology, and the law. The Bibliography, indexed by subject matter, is designed to be a research guide to assist our readers in searching for recent articles on computer and technology law. This year's annual Bibliography contains nearly 1000 articles, found through the examination of over 1000 periodicals.

The Bibliography aims to include topics on every legal aspect of computers and technology. However, as new issues in this field emerge, we welcome your suggestions for additional topics and sources, as well as your commentary on the Bibliography.

INDEX 1. COMPUTERS AND TECHNOLOGY IN LAW PRACTICE 1.0 General 1.1 Computerized Legal Research 1.1.0 General 1.1.1 Online Legal Research 1.2 Law Office Management 1.2.0 General 1.2.1 Office Automation 1.2.2 Case Management 1.2.3 Case File Security 1.2.4 Internet Access 1.3 Selected Uses in the Law Practice 1.3.0 General 1.3.1 Tax Filing 1.3.2 Bankruptcy 1.3.3 Estate Planning 1.3.4 Real Estate 1.3.5 Advertising 2. COMPUTERS AND TECHNOLOGY IN LITIGATION 2.0 General 2.1 Scientific Evidence 2.1.0 General 2.1.1 Expert Testimony 2.1.2 DNA Typing 2.1.3 Fingerprint 2.1.4 Lie Detection 2.1.5 Forensic Evidence 2.2 Demonstrative Evidence 2.2.0 General 2.2.1 Computer-Generated Evidence 2.2.2 Audio/Visual Evidence 2.3 Electronic Discovery 2.4 Courtroom and Judges 2.5 Dispute Resolution 3. COMPUTERS, TECHNOLOGY AND THE GOVERNMENT 3.0 General 3.1 Computers, Technology and Law Enforcement 3.2 Use of Computers and Technology by the Military 3.2.0 General 3.2.1 First Amendment Concerns 3.2.2 Antitrust 3.2.3 FCC Regulation 3.3 Use of Computers and Technology by State and Federal Legislatures 3.4 Regulation of Computers and Technology 4. ISSUES OF PRIVACY, SECURITY AND CRIME 4.0 General 4.1 Problems of Privacy 4.1.0 General 4.1.1 Data Privacy 4.1.2 Privacy in the Workplace 4.2 Security 4.2.1 Cyberwar 4.2.2 Encryption and Digital Signatures 4.3 Crime 4.3.0 General 4.3.1 Internet 5. COMPUTERS, TECHNOLOGY AND EDUCATION 5.0 General 5.1 Legal Education 6. COMPUTERS, TECHNOLOGY AND BUSINESS 6.0 General 6.1 Electronic Commerce 6.1.0 General 6.1.1 Taxation 6.2 Computers in Banking and Finance 6.2.0 General 6.2.1 On-line Securities Trading 6.3 Computers and Technology in the Transportation Industry 6.4 Computers and Technology in the Publishing Industry 6.5 Computers and Technology in Advertising 6.6 Computers and Technology in Accounting 7. INTELLECTUAL PROPERTY PROTECTION OF COMPUTERS AND TECHNOLOGY 7.0 General 7.1 Patent 7.1.0 General 7.1.1 Software Patent 7.1.2 Biotech Patent 7.2 Software Copyright 7.2.0 General 7.2.1 User Interface 7.2.2 Fair Use 7.2.3 Video Game 7.3 Digital Copyright 7.3.0 General 7.3.1 Electronic Compilation 7.3.2 Computer Database 7.3.3 Multimedia 7.3.4 Computer-Generated Works 7.4 Trademark 7.5 Trade Secret 7.6 Semiconductor Chip Protection 7.7 Licensing 7.8 Intellectual Property Issues of the Internet 7.9 International Developments 7.9.0 General 7.9.1 GATT-TRIPS 7.9.2 NAFTA 7.9.3 Developments in Canada 7.9.4 Developments in Mexico and Latin America 7.9.5 Developments in Australia and New Zealand 7.9.6 Developments in Africa 7.9.7 Developments in Asia 7.9.8 Developments in Western Europe 7.9.9 Developments in Eastern Europe and Russia 8. COMPUTERS AND LEGAL REASONING 8.0 General 8.1 Artificial Intelligence 9. LEGAL ISSUES OF THE 1NTERNET 9.0 General 9.1 ISP and Internet Access 9.1.0 General 9.1.1 Net Neutrality 9.2 Domain Names 9.3 Civil Procedure in Cyberspace 9.4 Online Communities 9.4.0 General 9.4.1 Social Networking 9.4.2 Virtual Worlds 9.5 First Amendment Concerns 10. LAW AND TECHNOLOGY 10.0 General 10.1 Technology Transfer 10.2 Audio/Video Recording 10.3 Space Law 10.4 Medical Technology 10.4.0 General 10.4.1 Electronic Records 10.5 Science and Technology 10.5.0 General 10.5.1 Biotechnology 10.5.2 Pharmaceuticals 10.5.3 Stem Cells and Cloning 10.5.4 Nanotechnology 10.6 Environmental Law 10.6.0 General 10.6.1 Pollution 10.6.2 Hazardous Substances 10.6.3 Electromagnetic Fields 10.6.4 Nuclear Technology 10.6.5 Energy and the Environment 10.6.6 International Environmental Law Developments 10.7 Television 10.7.0 General 10.7.1 Satellite Television 10.7.2 Cable Television 10.8 Telecommunications 10.8.0 General 10.8.1 Telephone 10.8.2 Multimedia in Telecommunications 10.8.3 International Telecommunications Developments 10.9 Recording Industry 10.10 Broadband 11. FAMILY LAW 12. OTHER BIBLIOGRAPHY

  1. COMPUTERS AND TECHNOLOGY IN LAW PRACTICE

    1.0 General

    Jeffrey Allen, Techno-Ethics and the Practice of Law, 24 AM. J. OF FAM. L. 211 (2011).

    John R. Forbush, Regulating the Use and Sharing of Energy Consumption Data." Assessing California's SB 1476 Smart Meter Privacy Statute, 75 ALB. L. REV. 341 (2011).

    Jennifer Hammitt, Ethical Representation in a Database Age: HMIS Database Systems and Homeless Client Confidentiality, 13 T.M. COOLEY J. PRAC. & CLINICAL L.

    285 (2011). Helia Garrido Hull, Legal Ethics for the Millennials."

    Avoiding the Compromise of Integrity, 80 UMKC L. REV. 271 (2011).

    Bruce H. Kobayashi and Larry E. Ribstein, Law's Information Revolution, 5 ARIZ. L. REV. 1169 (2011).

    Tian Luo and Amar Mann, Survival and Growth of Silicon Valley High- Tech Businesses Born in 2000, 134 MONTHLY LAB. REV. 16 (2011).

    Roberta Cooper Ramo, Ethics for American Lawyers in the Age of Twitter and the Cloud, 72 MONT. L. REV. 227 (2011).

    Jennifer Shkabatur, Cities @ Crossroads: Digital Technology and Local Democracy in America, 76 BROOKLYN L. REV. 1413 (2011).

    John F. Stanton, Breaking the Sound Barriers: How the Americans with Disabilities Act and Technology Have Enabled Deaf Lawyers to Succeed, 45 VAL. U. L. REV. 1185 (2011).

    Harry Surden, Article, The Variable Determinacy Thesis, 12 Colum. SCI. & TECH. L. REV. 1 (2011).

    1.1 Computerized Legal Research

    1.1.0 General

    Jessica Bozarth, Note, Copyright and Creditors: What Will be left of the King of Pop's Legacy?, 29 CARDOZO ARTS & ENT. L. J. 85 (2011).

    Caroline Hart, Sustainable Regional Legal Practice: The Importance of Alliances and the Use of Innovative Information Technology by Legal Practices in Regional, Rural and Remote Queensland, 16 DEAKIN L. REV. 225 (2011).

    Amanda Kennedy & Stephen Winn, Using Technology to Increase Support for Rural and Regional Legal Professionals, 16 DEAKIN L. REV. 209 (2011).

    Ellie Margolis, Authority Without Borders: The Worm Wide Web and the Delegalization of Law, 41 SETON HALL L. REV. 909 (2011).

    Peter W. Martin, Abandoning Law Reporters for Official Digital Case Law, 12 J. APP. PRAC. & PROCESS 25 (Spring 2011).

    1.1.1 Online Legal Research

    Kirsten K. Davis, Legal Forms As Rhetorical Transaction: Competency in the Context of Information and Efficiency, 79 UMKC L. REV. 667 (2011).

    Susan Falk, Introduction to Researching Alaska Legislative History Materials, 28 ALASKA L. REV. 279 (December 2011).

    Anne Klinefelter, When to Research is to Reveal: The Growing Threat to Attorney and Client Confidentiality from Online Tracking, 60 DEF. L.J. 71 (2011).

    1.2 Law Office Management

    1.2.0 General

    Bridget C. E. Dooling, Legal Issues in E-Rulemaking, 63 ADMIN. L. REV. 893 (2011).

    1.2.1 Office Automation

    1.2.2 Case Management

    1.2.3 Case File Security

    Roland L. Trope & Sarah Jane Hughes, Red Skies in the Morning--Professional Ethics at the Dawn of Cloud Computing, 38 WM. MITCHELL L. REV. 111 (2011).

    1.2.4 Internet Access

    Louise L. Hill, Gone but Not Forgotten: When Privacy, Policy and Privilege Collide, 9 NW. J. TECH. & INTELL. PROP. 565 (2011).

    Kathleen M. Porter, Going Mobile: Are Your Company's Electronic Communications Policies Ready to Travel? 2011-DEC BUS. L. TODAY 1 (2011).

    Phillip F. Weiss, Protecting a Right to Access Internet Content: The Feasibility o f Judicial Enforcement in a Non-neutral Network, 76 BROOKLYN L. REV. 383 (2011).

    1.3 Selected Uses in the Law Practice

    1.3.0 General

    Michael R. Baumrind, Protecting Online Anonymity and Preserving Reputation Through Due Process, 27 GA. ST. U.L. REV. 757 (2011).

    Amy Puliafico, Offshore Wind: What Steps Need to Be Taken to Ensure It Has A Future in America, 12 J. HIGH TECH. L. 330 (2011).

    1.3.1 Tax Filing

    1.3.2 Bankruptcy

    1.3.3 Estate Planning

    Michael D. Roy, Note, Beyond The Digital Asset Dilemma: Will Online Services Revolutionize Estate Planning? 24 QUINN. PROB. LAW JOUR. 376 (2011).

    1.3.4 Real Estate

    1.3.5 Advertising

    Robert C. Bird, Law, Strategy, and Competitive Advantage, 44 CONN. L. REV. 61 (2011).

    Lucille A. Jewel, The Bramble Bush of Forking Paths: Digital Narrative, Procedural Rhetoric, and the Law, 14 YALE J. L. & TECH. 66 (2011).

    David Kirk, Glorious Summer of 2011: Leaking, Tweeting, Blogging, Hacking and Rioting, 75 J. CRIM. L. 444 (2011).

    Erin F. Norris, Note. Why the Internet Isn't Special: Restoring Predictability to Personal Jurisdiction, 53 ARIZ. L. REV. 1013 (2011).

    Christina R. Weatherford, Judicial Sentencing Discretion Post-Booker: Are Judges Getting A Distorted View Through the Lens of Social Networking Sites?, 27 GA. ST. U.L. REV. 673 (2011).

  2. COMPUTERS AND TECHNOLOGY IN LITIGATION

    2.0 General

    Ralph Artigliere, Sequestration for the Twenty-First Century: Disconnecting Jurors from the Internet During Trial, 59 DRAKE L. REV. 621 (2011).

    Jennifer Lee Case, Extra! Read All About It: Why Notice By Newspaper Publication Fails to Meet Mullane's Desire-to-Inform Standard and How Modern Technology Provides a Viable Alternative, 45 GA. L. REV. 1095 (2011).

    Russell D. Covey, Pervasive Surveillance and the Future of the Fourth Amendment, 80 MISS. L.J. 1289 (2011).

    Jeff DeMot & Ben Depoorter, Technology and Torts: Memory costs, Nondurable Precautions and Interference Effects, 31 INT'L REV. OF L. AND ECON. 284 (2011).

    Kristine F. Dorrain & Jonathan T. Rubens, Survey of the Law of Cyberspace: Introduction, 67 Bus. LAW. 255 (2011).

    Holly Forsberg, Article, Diminishing the Attractiveness of Trolling: The Impacts of Recent...

To continue reading

FREE SIGN UP