Forty-fifth selected bibliography on computers, technology, and the law.

PositionP. 256-303

(January 2013 through December 2013)

INTRODUCTION

Each year, the Journal provides a compilation of the most important and timely articles on computers, technology, and the law. The Bibliography, indexed by subject matter, is designed to be a research guide to assist our readers in searching for recent articles on computer and technology law. This year's annual Bibliography contains nearly 1000 articles, found through the examination of over 1000 periodicals.

The Bibliography aims to include topics on every legal aspect of computers and technology. However, as new issues in this field emerge, we welcome your suggestions for additional topics and sources, as well as your commentary on the Bibliography.

INDEX 1. Computers and Technology in Law Practice 1.0 General 1.1 Computerized Legal Research 1.1.0 General 1.1.1 Online Legal Research 1.2 Law Office Management 1.2.0 General 1.2.1 Office Automation 1.2.2 Case Management 1.2.3 Case File Security 1.2.4 Internet Access 1.3 Selected Uses in the Law Practice 1.3.0 General 1.3.1 Tax Filing 1.3.2 Bankruptcy 1.3.3 Estate Planning 1.3.4 Real Estate 1.3.5 Advertising 2. Computers and Technology in Litigation 2.0 General 2.1 Scientific Evidence 2.1.0 General 2.1.1 Expert Testimony 2.1.2 DNA Typing 2.1.3 Fingerprint 2.1.4 Lie Detection 2.1.5 Forensic Evidence 2.2 Demonstrative Evidence 2.2.0 General 2.2.1 Computer-Generated Evidence 2.2.2 Audio/Visual Evidence 2.3 Electronic Discovery 2.4 Courtroom and Judges 2.5 Dispute Resolution 3. Computers, Technology and the Government 3.0 General 3.1 Computers, Technology and Law Enforcement 3.2 Use of Computers and Technology by the Military 3.3 Use of Computers and Technology by State and Federal Legislatures 3.4 Regulation of Computers and Technology 3.4.0 General 3.4.1 First Amendment Concerns 3.4.2 Antitrust 3.4.3 FCC Regulation 3.4.4 SEC Regulation 4. Issues of Privacy, Security and Crime 4.0 General 4.1 Problems of Privacy 4.1.0 General 4.1.1 Data Privacy 4.1.2 Privacy in the Workplace 4.2 Security 4.2.0 General 4.2.1 Cyberwar 4.2.2 Encryption and Digital Signatures 4.3 Crime 4.3.0 General 4.3.1 Internet 5. Computers, Technology and Education 5.0 General 5.1 Legal Education 6. Computers, Technology and Business 6.0 General 6.1 Electronic Commerce 6.1.0 General 6.1.1 Taxation 6.2 Computers in Banking and Finance 6.2.0 General 6.2.1 On-line Securities Trading 6.3 Computers and Technology in the Transportation Industry 6.4 Computers and Technology in the Publishing Industry 6.5 Computers and Technology in Advertising 6.6 Computers and Technology in Accounting 7. Intellectual Property Protection of Computers and Technology 7.0 General 7.1 Patent 7.1.0 General 7.1.1 Software Patent 7.1.2 Biotech Patent 7.2 Software Copyright 7.2.0 General 7.2.1 User Interface 7.2.2 Fair Use 7.2.3 Video Game 7.3 Digital Copyright 7.3.0 General 7.3.1 Electronic Compilation 7.3.2 Computer Database 7.3.3 Multimedia 7.3.4 Computer-Generated Works 7.4 Trademark 7.5 Trade Secret 7.6 Semiconductor Chip Protection 7.7 Licensing 7.8 Intellectual Property Issues of the Internet 7.9 International Developments 7.9.0 General 7.9.1 GATT-TRIPS 7.9.2 NAFTA 7.9.3 Developments in Canada 7.9.4 Developments in Mexico and Latin America 7.9.5 Developments in Australia and New Zealand 7.9.6 Developments in Africa 7.9.7 Developments in Asia 7.9.8 Developments in Western Europe 7.9.9 Developments in Eastern Europe and Russia 8. Computers and Legal Reasoning 8.0 General 8.1 Artificial Intelligence 9. Legal Issues of the Internet 9.0 General 9.1 ISP and Internet Access 9.1.0 General 9.1.1 Net Neutrality 9.2 Domain Names 9.3 Civil Procedure in Cyberspace 9.4 Online Communities 9.4.0 General 9.4.1 Social Networking 9.4.2 Virtual Worlds 9.5 First Amendment Concerns 10. LAW AND TECHNOLOGY 10.0 General 10.1 Technology Transfer 10.2 Audio/Video Recording 10.3 Space Law 10.4 Medical Technology 10.4.0 General 10.4.1 Electronic Records 10.5 Science and Technology 10.5.0 General 10.5.1 Biotechnology 10.5.2 Pharmaceuticals 10.5.3 Stem Cells and Cloning 10.5.4 Nanotechnology 10.6 Environmental Law 10.6.0 General 10.6.1 Pollution 10.6.2 Hazardous Substances 10.6.3 Electromagnetic Fields 10.6.4 Nuclear Technology 10.6.5 Energy and the Environment 10.6.6 International Environmental Law Developments 10.7 Television 10.7.0 General 10.7.1 Satellite Television 10.7.2 Cable Television 10.8 Telecommunications 10.8.0 General 10.8.1 Telephone 10.8.2 Multimedia in Telecommunications 10.8.3 International Telecommunications Developments 10.9 Recording Industry 10.10 Broadband 11. Family law 12. Other BIBLIOGRAPHY

  1. COMPUTERS AND TECHNOLOGY IN LAW PRACTICE

    1.0 General

    Vanessa S. Browne-Barbour, A Fork in the Road: The Intersection of Virtual Law and Social Media, 52 WASHBURN L. J. 267 (2013).

    John G. Browning, Facebook, Twitter, and LinkedIn--Oh My! The ABA Ethics 20/20 Commission and Evolving Ethical Issues in the Use of Social Media, 40 N. KY. L. REV. 255 (2013).

    John G. Browning, Keep Your 'Friends" Close and Your Enemies Closer: Walking the Ethical Tightrope in the Use of Social Media, 3 ST. MARY'S J. LEGAL MAL. & ETHICS 204 (2013).

    Steven Buse, Disclaim What 1 Say, Not What I Do: Examining the Ethical Obligations Owed by LegalZoom and Other Online Legal Providers, 37 J. LEGAL PROF. 323 (2012-2013).

    Philip J. Favro, Inviting Scrutiny: How Technologies Are Eroding the Attorney-Client Privilege, 20 RICH J.L. & TECH. 2 (2013).

    Erin R. Frankrone, Free Agents: Should Crowdsourcing Lead to Agency Liability for Firms, 15 VAND. J. ENT. & TECH. L. 883 (2013).

    James Gibson, Vertical Boilerplate, 70 WASH. & LEE L. REV. 161 (Issue 1, Winter 2013).

    Louise Lark Hill, Technology--A Motivation behind Recent Model Rule Revisions, 40 N. KY. L. REV. 315 (2013).

    Jonathan Levy, Employee E-mails and the Concept of Earning the Privilege, 9 ISJLP 1 (2013).

    Joshua M. Loveall, Ethical Considerations of Court- Ordered Disclosures of Litigant-Sponsored Law Bloggers, 26 GEO. J. LEGAL ETHICS 879 (2013).

    Samantha A. Moppett, Control-Alt-Incomplete?: Using Technology to Assess "Digital Natives," 12 CHI.-KENT J. INTELL. PROP. 77 (2013).

    Ann M. Murphy, The Philip D. Reed Lecture Series Evidence Rules Committee: Symposium on Rule 502: Is It Safe? The Need For State Ethical Rules To Keep Pace With Technological Advances, 81 FORDHAM L. REV. 1651 (2013).

    Jennifer J. Riley, High-Tech Cures for the Low-Budget Case, 36 FAM. ADVOC. 42 (2013).

    David M. Schraver, Serving the Profession Through Technology, 85 N.Y. ST. B.A. J. 5 (2013).

    1.1 COMPUTERIZED LEGAL RESEARCH

    Margaret M. Krause, Date Discrepancies in Citing to Supreme Court Decisions, Legal Research Database Comparison: Fairfax Devisee v. Hunter's Lessee on its 200th Anniversary, 57 LAW LIBR. LIGHTS 1 (2013).

    Charlotte Schneider, A Better Resource for Faculty and Students: Transformation of a Law Library Website, 57 LAWLIBR. LIGHTS 1 (2013).

    Tracy Woodard, Access to Information in Your Law Library, 57LAWLIBR. LIGHTS, 1 (2013).

    1.1.0 General

    Brittany M. McIntosh, Gamecocks Spur Trouble in Jury Deliberations: What the Fourth Circuit Really Thinks about Wikipedia as a Legal Resource in United States v. Lawson, 64 S.C. L. REV. 1157 (2013).

    Jessica Thaler, Tool for Lawyers in Transition: LinkedIn, A Law Practice Management, 85 N.Y. ST. B.A. J. 47 (2013).

    1.1.1 Online Legal Research

    BJ Ard, Confidentiality and the Problem of Third Parties: Protecting Reader Privacy in the Age of Intermediaries, 16 YALE J.L.& TECH. 1 (2013).

    Tom Gaylord, What's New with Fastcase, 101 ILL. B.J. 368 (2013).

    Gerald J. Hoenig, Technology-Property, 27 PROB. & PROP. No. 01 (2013).

    Kurt Mattson, Why Do I Need Books? Isn't Everything Online?, NEV. L., Oct. 2013, at 20.

    Christina J. Oleson, Ethics and Email Discussion Groups, 101 ILL. B.J. 464 (2013).

    Kirk Charles Simoneau, Computers Can't Write: A Review of Wordrake Editing Software for Lawyers, N.H. BAR NEWS 6 (2013).

    Judith Townend, Closed Data: Defamation and Privacy Disputes in England and Wales, 5 J. MEDIA L. 31 (2013).

    1.2 Law Office Management

    1.2.0 General

    Joseph W. Booth, The iPad as Law Office Workhorse, 36 FAM. ADVOC. iii (2013-2014).

    NHBA Board of Governors, Ethics Committee Advisory Opinion #2012-13/4 The Use of Cloud Computing in the Practice of Law, 23 N.H. BAR NEWS, Mar. 2013, at 36.

    Daniel Burda & Frank Teuteberg, Why Discard When You Can Keep Them? A Case Study on the Email Retention Behaviour in Firms, 22 J.L. INFO. & SCI. 183 (2012-2013).

    James Farrell, Social Media for Social Change Lawyers: An Australian Housing Rights Lawyer's Experience, 20 INT'L J. LEGAL PROF. 209 (2013).

    Gerald J. Floenig, Technology-Property, 27 PROB. & PROP. No. 03 (2013).

    Ellie Margolis, It's Time to Embrace the New-- Untangling the Uses of Electronic Sources in Legal Writing, 23 ALB. L.J. SCI. & TECH. 191 (2013).

    Michael McNerney & Emilian Papadopoulos, Hacker's Delight: Law Firm Risk and Liability in the Cyber Age, 62 AM.U. L. REV. 1243 (2013).

    Victoria A. Mercer, Creating a Virtual Law Firm to Meet the Needs of Today's Lawyer, N.J. LAW. MAG., Aug. 2013, at 31.

    Brian R. Pfefferle, Law Office Technology Tools for Lawyers: What Makes "Cents"?, 76 SASK. L. REV. 109 (2013).

    Roger Smith, Headline Hunters, 163 NEW L.J. 8 (2013).

    1.2.1 Office Automation

    1.2.2 Case Management

    Gerald J. Hoenig, Technology-Property, 27 PROB. & PROP.NO. 05 (2013).

    1.2.3 Case File Security

    Alan W. Ezekiel, Hackers, Spies, and Stolen Secrets: Protecting Law Firms from Data Theft, 26 HARV. J. L. & TECH. 649 (2013).

    Rob Howard, Tech Talk: Backing Up in "The Cloud", 23 N.H. BAR NEWS 4 (2013).

    Meghan C. Lewallen, Note, Cloud Computing: A Lawyer's Ethical Duty To Act With Reasonable Care When Storing Client Confidences "In The Cloud," 60 CLEV. ST. L. REV. 1133 (2013).

    New Hampshire Bar Association Ethics Committee, Ethics Comer: Lawyers & Cloud Computing: Be Careful Up There, 23 N.H. BAR NEWS, Aug. 2013, at 34.

    Rachel G. Packer, The Mobile Generation: Ethical Considerations for...

To continue reading

Request your trial

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT