Timothy L. Allsup, United States V. Cassidy: The Federal Interstate Stalking Statute And Freedom Of Speech, 13 N.C. J.L. & TECH. ONLINE 227 (June 2012).
Ronald Bacigal, The Future of Seizure Analysis: A Unified Theory For Seizures Of The Person, 81 MISS. L.J. 915 (2012).
Peggy E. Chaudry, Curbing Consumer Complicity for Counterfeits in a Digital Environment, 7 J. BUS. & TECH. L. 23 (2012).
Michael J. Crook, Sacrificing Liberty for Security: North Carolina's Unconstitutional Search and Seizure of Arrestee DNA, 34 CAMPBELL L. REV. 473 (Spring 2012).
Giulia M. Di Marzo, Why Can't We Be Friends--The Banning of Teacher-Student Communication Via Social Media and the Freedom of Speech, 62 Am. U. L. REV. 123 (2012).
Laura K. Donohue & Timothy R. Holbrook, Technological Leap, Statutory Gap, and Constitutional Abyss: Remote Biometric Identification Comes of Age, 97 MINN. L. REV. 407 (DEC. 2012).
Frank Douma & Sarah Aue Palodichuk, Criminal Liability Issues Created by Autonomous Vehicles, 52 SANTA CLARA L. REV. 1157 (2012).
Daniel B. Garrie, Limiting the Affirmative Defense in the Digital Workplace, 19 MICH. J. GENDER & L. 229 (2012).
Chris Kim, Barrie Newberger & Brian Shack, Computer Crimes, 49 Am. CRIM. L. Rev. 443 (2012)
Marty Koresawa, Note, Pay Phone Protections in a Smartphone Society: The Need to Restrict Searches of Modern Technology Incident to Arrest, 45 LOY. L.A. L. Rev. 1351 (Summer 2012).
Emily Long, Note, "Let's Talk about Sex[ting], Baby": A Mens Rea-Centered Approach to the Sexting Issue in Tennessee, 42 U. MEM. L. REV. 1139 (Summer 2012).
Natalie Fox Malone, Note, GPS Monitoring of Domestic Violence Offenders in Tennessee: Generating Problems Surreptitiously, 43 U. MEM. L. REV. 171 (Fall 2012).
Ryan McClure, Current Development, International Adjudication Options in Response to State-Sponsored Cyber-Attacks Against Outer-Space Satellites, 18 NEW ENG. J. INT'L & COMP. L. 431 (2012).
William D. Mercer, At the Intersection of Sovereignty and Contract: Traffic Cameras and the Privatization of Law Enforcement Power, 43 U. MEM. L. REV. 379 (Winter 2012).
Richard E. Myers II, The Future of Seizure Analysis: Challenges To Terry For The Twenty-First Century, 81 MISS. L.J. 937 (2012).
Susan W. Brenner, Law, Dissonance, and Remote Computer Searches, 14 N.C. J.L. & TECH. 43 (Fall, 2012).
Raj at Dosi & Piyush Khanna, E-Jurisprudence in the Indian Criminal System: Challenging Cyber Crimes in Every Aspect, 45 LAW/TECH J.., Quarter 1, at 1 (2012).
Michal Gilad, Virtual or Reality: Prosecutorial Practices in Cyber Child Pornography Ring Cases, 18 Rich. J.L. & Tech. 5 (2012).
Michael Greenberger & Mathew Swinburne, The Maryland Personal Information Protection Act: Strengthening Maryland's Security Breach Notification Law, 42 U. BALT. L. F. 129, 129-63 (Spring 2012).
Edward J. Mikolinski, Cybercrime: The Investigation, Prosecution and Defense of a Computer-Related Crime (3d ed.), 11 J. High Tech. L. 1 (2011-2012).
Swathi Padmanabhan, Note, Hacking for Lulz: Employing Expert Hackers to Combat Cyber Terrorism, 15 VAND. J. ENT. & TECH. L. 191 (Fall 2012).
Mary-Rose Papandrea, Publication of National Security Information in the Digital Age, 5 J. NAT'L SEC. L. & POL'Y 119 (2011-2012).
Geoffrey R. Stone, WikiLeaks, the Proposed SHIELD Act, and the First Amendment, 5 J. Nat'L SEC. L. & POL'Y 105 (2011-2012).
Kendall Vitale, Barricading the Information Superhighway to Stop the Flow of Traffic: Why International Regulation of the Internet Is Necessary to Prevent Sex Trafficking, 27 AM. U. INT'L L. REV. 91 (2011-2012).
Brian Yamada, Pornoshopped: Why California Should Adopt the Federal Standard for Child Pornography, 32 LOY. L.A. ENT. L. REV. 229 (2012).
COMPUTERS, TECHNOLOGY AND EDUCATION
Samuel Butler, IV, The Summer of Clarity: What the Summer of 2011 Says About Student Speech Rights, 22 KAN. J.L. & PUB. POL'Y 83 (2012).
Margaret A. Hazel, Fourth Circuit Survey: Student CyberSpeech After Kowalski v. Berkeley County Schools, 63 S.C. L. REV. 1081 (Summer 2012).
Amy Musgrove & Vicky Thirlaway, Are We Using Technology for Technology's Sake? An Evaluation of a Simulated Employment Exercise at Undergraduate Level, 46 LAW TCHR. 65 (2012).
Aaron J. Saiger, Changing the Conversation in Education Law: Political Geography and Virtual Schooling, 4 1 J.L. & EDUC. 337 (2012).
5.1 Legal Education
Anneka Ferguson & Elizabeth Lee, Desperately Seeking ... Relevant Assessment? A Case Study on the Potential for Using Online Simulated Group Based Learning to Create Sustainable Assessment Practices, 22 LEGAL EDUC. REV. 121 (2012).
Kristoffer Greaves & Juliane Lynch, Is the Lecturer in the Room? A Study of Student Satisfaction with Online Discussions in Practical Legal Training, 22 LEGAL EDUC. REV. 147 (2012).
Darla W. Jackson, Steve Jobs Was Right About HTML5, but Was He Right About Digital Publishing?, 104 LAW LIBR. J. 461 (Summer 2012).
Nancy McCormack, Cancellation of Print Primary Sources in Canadian Academic Law Libraries, 104 LAW LIBR. J. 263 (Spring 2012).
Ira Steven Nathenson, Navigating the Unchartered Waters of Teaching Law with Online Simulations, 38 OHIO N.U.L. REV. 535 (2012).
Christine L. Sellers & Phillip Gragg, Back and Forth ... Westlaw Next and Lexis Advance, 104 LAW LIBR. J. 341 (Spring 2012).
Larissa Van Den Herik, LJIL in the Age of Cyberspace, 25 LEIDEN J. INT'L L. 1 (2012).
COMPUTERS, TECHNOLOGY AND BUSINESS
Darlene Bedley, A Look at the Proposed Electronic Communications Privacy Act Amendments Act of 2011: Where is Smart Grid Technology, and How Does Inevitable Discovery Apply?, 36 NOVAL. REV. 521 (Summer 2012).
Natasha T. Martin, Diversity and the Virtual Workplace: Performance Identity and Shifting Boundaries of Workplace Engagement, 16 LEWIS & CLARK L. REV. 605 (Summer 2012).
Matthew Vincent H. Noller, Darkness on the Edge of Town: How Entitlements Theory can Shine a Light on Termination of Transfers in Sound Recordings, 46 GA. L. REV. 763 (Spring 2012).
Armando A. Ortiz, Old Lessons Die Hard: Why the Essential Facilities Doctrine Provides Courts the Ability to Effectuate Competitive Balance in High Technology Markets, 13 J. HIGH TECH. L. 170 (2012).
Karina Sigar, Fret No More: Inapplicability of Crowdfunding Concerns in the Internet Age and The Job's Act's Safeguards, 64 ADMIN. L. REV. 467 (2012).
Henry C. Su, Thinking, Fast, Free, and Fashionable: Competition and Consumer Protection in a Mobile Internet World, 27 ANTITRUST 82 (2012).
Symposium, A New Wavelength? Carbon Tax, Cap & Trade, and Market Adaptation, 36 CAN.-U.S. L.J. 179 (2012).
Symposium, From Blackout to Shock and Awe: Renewable Energy and the Shared Canada-United States Electricity Grid, 36 CAN.-U.S. L.J. 135 (2012).
6.1 Electronic Commerce
Rifat Azam, Global Taxation of Cross-Border E-Commerce Income, 31 Va. Tax Rev. 639 (Spring 2012).
G.S. Hans, Note, Privacy Policies, Terms of Service, And FTC Enforcement: Broadening Unfairness Regulation for a New Era, 19 MICH. TELECOMM. TECH. L. REV. 163 (Fall 2012).
Angela Jackson & Rick Juckniess, The Game of All Fours: Internet Commerce, the Rules, MICH. B.J., Feb. 2012, at 20.
Milana Karayanidi, Effectiveness and Desirability of Technology Neutrality of Regulation in Online Contracting, 45 LAW/TECH. J., Quarter 4, at 1 (2012).
Tolu Odumosu & Ven Katesh Narayanamurti, Toward a Common Wireless Market, ISSUES SCI. & TECH. 23 (Winter 2012).
Andrew J. Haile, Affiliate Nexus in E-Commerce, 33 CARDOZO L. REV. 1803 (Apr. 2012).
Anne Letterio, The State's Way of Circumventing the Constitution: The Unconstitutional Taxation of out-of-State Corporations That do Instate Business over the Internet, 22 ALB. L.J. SCI. & TECH. 411 (2012).
6.2 Computers in Banking and Finance
C. Steven Bradford, Crowdfunding and the Federal Securities Laws, 2012 COLUM. BUS. L. REV. 1 (2012).
Christopher L. Peterson, Losing Our Homes, Losing Our Way, or Both? Foreclosure, County Property Records, and the Mortgage Electronic Registration System, 40 CAP. U. L. REV. 821 (Fall 2012).
Christina Parajon Skinner, Cyber crime in the Securities Market: Is U. C. C. Article 8 Prepared?, 90 N.C.L. REV. 132A (2012).
Andrew Yu, Note, Regulatory Financial Reform: Impact of Dodd-Frank Act on IT Compliance?, 38 RUTGERS COMPUTER & TECH. L.J. 254 (2012).
6.2.1 On-line Securities Trading
6.3 Computers and Technology in the Transportation Industry Noel Barnard, Recent Development, Throw Me a Bone Marrow Transplant: Peripheral Blood Stem Cells and the National Organ Transplant Act, 13 N.C. J.L. & Tech. 387 (Spring 2012).
Jennifer S. Ellison & Marc Pilcher, Advanced Imaging Technology (AIT) Deployment: Legal Challenges and Responses, 24 Air & Space Law. 4 (2012).
Sabena Hashmi, The Rotterdam Rules: A Blessing?, 10 LOY. Mar. L.J. 227 (Spring 2012).
Darren A. Prum & Sarah L. Catz, High-Speed Rail in America: An Evaluation of the Regulatory, Real Property, and Environmental Obstacles a Project Will Encounter, 13 N.C. J.L. & Tech. 247 (Spring 2012).
6.4 Computers and Technology in the Publishing Industry John J. Dougherty, Obsidian Financial Group, Lie V. Cox And Reformulating Shield Laws To Protect Digital Journalism In An Evolving Media World, 13 N.C. J.L. & Tech. Online 287 (June 2012).
Rachel Ann Geist, A "License to Read": The Effect of E-Books on Publishers, Libraries, and the First Sale Doctrine, 52 IDEA 31 (2012).
6.5 Computers and Technology in Advertising
Alex Aferiat, Note, It's Google's World and We're Just Clicking in It: Why the Growth of Sponsored Link Advertising Necessitates a Shift of Trademark Regulation on the Internet, 47 NEW Eng. L. Rev. 157 (Fall 2012).
Todd Redden & Thomas N. Doty, Pitfalls, Illegalities, and Potential Traps of Radio and New Media Contents and Promotions: What Attorneys Should Know when Counseling Their Clients, Mich. B.J., Sept. 2012, at 36.
Matt Sober, Pittsburgh Lawyer Finder Provides a Solution for Attorneys...