Thirty-ninth selected bibliography on computers, technology, and the law: (January 2007 through December 2007).



Each year, the Journal provides a compilation of the most important and timely articles on computers, technology, and the law. The Bibliography, indexed by subject matter, is designed to be a research guide to assist our readers in searching for recent articles on computer and technology law. This year's annual Bibliography contains well over six hundred articles, found through the examination of over one thousand periodicals.

The Bibliography aims to include topics on every legal aspect of computers and technology. However, as new issues in this field emerge, we welcome your suggestions for additional topics and sources, as well as your commentary on the Bibliography.

INDEX 1. COMPUTERS AND TECHNOLOGY IN LAW PRACTICE 1.0 General 1.1 Computerized Legal Research 1.1.0 General 1.1.1 Online Legal Research 1.1.2 Legal Research Using CD-ROM 1.2 Law Office Management 1.2.0 General 1.2.1 Office Automation 1.2.2 Case Management 1.2.3 Case File Security 1.2.4 Internet Access 1.3 Selected Uses in the Law Practice 1.3.0 General 1.3.1 Tax Filing 1.3.2 Bankruptcy 1.3.3 Estate Planning 1.3.4 Real Estate 1.3.5 Advertising 2. COMPUTERS AND TECHNOLOGY IN LITIGATION 2.0 General 2.1 Scientific Evidence 2.1.0 General 2.1.1 Expert Testimony 2.1.2 DNA Typing 2.1.3 Fingerprint 2.1.4 Polygraph 2.1.5 Forensic Evidence 2.2 Demonstrative Evidence 2.2.0 General 2.2.1 Computer-Generated Evidence 2.2.2 Audio/Visual Evidence 2.3 Courtroom 2.4 Dispute Resolution 3. COMPUTERS AND TECHNOLOGY IN THE GOVERNMENT 3.0 General 3.1 Computers and Technology in Law Enforcement 3.1.0 General 3.1.1 Computers and Technology in Police Operation 3.1.2 Computers and Technology in Correctional Institutions 3.2 Use of Computers and Technology by Federal Departments and Agencies 3.2.0 General 3.2.1 Military Technology 3.2.2 Internal Revenue Service 3.2.3 U.S. Patent Office 3.2.4 Government Information Retrieval System 3.3 Use of Computers and Technology in Judicial Administration 3.4 Use of Computers and Technology by State and Federal Legislatures 3.5 Use of Computers and Technology in Government Elections 4. LEGAL ISSUES OF COMPUTER AND TECHNOLOGY SALES, USAGE, AND SERVICES 4.0 General 4.1 Contracting for Hardware, Software, and Computer Services 4.1.0 General 4.1.1 Purchase, Lease and License Considerations 4.1.2 Limitations of Limited Warranties 4.2 Government Regulation of Computer-Related Industry 4.2.0 General 4.2.1 First Amendment Issues 4.2.2 Antitrust 4.2.3 FCC Regulation 4.2.4 SEC Regulation 4.2.5 Tariff and Trade Control 4.3 Substantive Law Aspects 4.3.0 General 4.3.1 Computer Crime 4.3.2 Computer-Related Product Liability 4.3.3 Computer Security 4.3.4 Taxation of Software 4.3.5 Virtual Property 4.4 Problems of Privacy and Computers 4.4.0 General 4.4.1 Data Privacy 4.4.2 Governmental Invasion of Privacy 4.4.3 Credit Reference 5. COMPUTERS AND TECHNOLOGY IN EDUCATION 5.0 General 5.1 Legal Education 6. COMPUTERS AND TECHNOLOGY IN BUSINESS 6.0 General 6.1 Electronic Commerce 6.2 Computers in Banking and Finance 6.2.0 General 6.2.1 On-line Securities Trading 6.3 Computers and Technology in the Transportation Industry 6.4 Computers and Technology in the Publishing Industry 6.5 Computers and Technology in Advertising 6.6 Computers and Technology in Accounting 7. INTELLECTUAL PROPERTY PROTECTION OF COMPUTER AND TECHNOLOGY 7.0 General 7.1 Patent 7.1.0 General 7.1.1 Software Patent 7.1.2 Biotech Patent 7.2 Software Copyright 7.2.0 General 7.2.1 User Interface 7.2.2 Fair Use 7.2.3 Video Game 7.3 Digital Copyright 7.3.0 General 7.3.1 Electronic Compilation 7.3.2 Computer Database 7.3.3 Multimedia 7.3.4 Computer-Generated Works 7.4 Trademark 7.5 Trade Secret 7.6 Semiconductor Chip Protection 7.7 Licensing 7.8 Intellectual Property Issues of the Internet 7.9 International Developments 7.9.0 General 7.9.1 GATT-TRIPS 7.9.2 NAFTA 7.9.3 Developments in Canada 7.9.4 Developments in Mexico and Latin America 7.9.5 Developments in Australia and New Zealand 7.9.6 Developments in Africa 7.9.7 Developments in Asia 7.9.8 Developments in Western Europe 7.9.9 Developments in Eastern Europe and Russia 8. COMPUTERS AND LEGAL REASONING 8.0 General 8.1 Artificial Intelligence 9. LEGAL ISSUES OF THE INTERNET 9.0 General 9.1 ISP and Internet Access 9.2 Domain Names 9.3 Taxation of Electronic Commerce 9.4 Encryption and Digital Signatures 9.5 Internet Crime 9.6 Civil Procedure in Cyberspace 9.7 Internet Gambling 10. LAW AND TECHNOLOGY 10.0 General 10.1 Technology Transfer 10.2 Audio/Video Recording 10.3 Space Law 10.4 Medical Technology 10.5 Biotechnology and Pharmaceuticals 10.6 Environmental Law 10.6.0 General 10.6.1 Pollution 10.6.2 Hazardous Substances 10.6.3 Electromagnetic Fields 10.6.4 Nuclear Technology 10.6.5 Energy and the Environment 10.6.6 International Environmental Law Developments 10.7 Television 10.7.0 General 10.7.1 Satellite Television 10.7.2 Cable Television 10.8 Telecommunications 10.8.0 General 10.8.1 Telephone 10.8.2 Multimedia in Telecommunications 10.8.3 International Telecommunications Developments 10.9 Broadband 11. OTHERS 11.0 General BIBLIOGRAPHY


    1.0 General

    Judge Hebert Dixon, Computer Tips and Tricks for the Over-40 Crowd, 46 JUDGES' J. 38 (2007).

    Nick Dranias, Past the Pall of Orthodoxy: Why the First Amendment Virtually Guarantees Online Law School Graduates Will Breach the ABA Accreditation Barrier, 111 PENN ST. L. REV. 863 (2007).

    Gregory C. Sisk, Change and Continuity in Attorney-Client Confidentiality: The New Iowa Rules of Professional Conduct, 55 DRAKE L. REV. 347(2007).

    Michael J. Tonsing, Another Quick Spin Around the Cyberian Block, 54 FED. LAW. 18 (2007).

    Michael J. Tonsing, Creating or Rethinking Your Firm's Web Presence, 54 FED. LAW. 12 (2007).

    Michael J. Tonsing, Federal Court Hearings on Your MP3 Player? Dude!, 54 FED. LAW. 10 (2007).

    1.1 Computerized Legal Research

    1.1.0 General

    Richard Delgado & Jean Stefancic, Symposium, Legal Information and The Development of American Law: Further Thinking About The Thoughts of Robert C. Berring: Why Do We Ask The Same Questions? The Triple Helix Dilemma Revisited, 99 LAW LIB. J. 307 (2007).

    Ethan Katsh & Beth Noveck, Symposium, Legal Information and The Development of American Law: Further Thinking About The Thoughts of Robert C. Berring: Peer to Peer Meets the World of Legal Information: Encountering a New Paradigm, 99 LAW LIB. J. 365 (2007).

    1.1.1 Online Legal Research

    Morris L. Cohen, Symposium, Legal Information and The Development of American Law: Further Thinking About The Thoughts of Robert C. Berring: Researching Legal History in the Digital Age, 99 LAW LIB. J. 377 (2007).

    Geeta Kharkar, Comment, Googling for Help: Lawyer Referral Services and the Internet, 20 GEO. J. LEGAL ETHICS 769 (2007).

    Ellie Margolis, Surfin' Safari--Why Competent Lawyers Should Research on the Web, 10 YALE J.L. & TECH. 82 (2007).

    Shawn G. Nevers, Candy, Points, and Highlighters: Why Librarians, Not Vendors, Should Teach CALR to First-Year Students, 99 LAW LIB. J. 757 (2007).

    Guy Pessach, Symposium, The International Intellectual Property Regime Complex: The Role of Libraries In A2K: Taking Stock And Looking Ahead, 2007 MICH. ST. L. REV. 257 (2007).

    Carrie W. Teitcher, Rebooting the Approach to Teaching Research: Embracing the Computer Age, 99 LAW LIB. J. 555 (2007).

    Michael J. Tonsing, Revealing the Connection Between John Wayne Cowboy Movies and Research for Cyberian Lawyers, 54 FED. LAW. 10 (2007).

    1.1.2 Legal Research Using CD-ROM

    1.2 Law Office Management

    1.2.0 General

    Debbie Foster, When Disaster Strikes Are You Prepared?, 30 FAM. ADVOC. 39 (2007).

    Stephen J. Harhai, Conquering Computer Updates and Upgrades, 29 FAM. ADVOC. 6 (2007).

    Lee S. Rosen, Wiki World: Taking the Labor out of Collaboration, 30 FAM. ADVOC. ii (2007).

    Michael J. Tonsing, Up and Running on the Cheap, 54 FED. LAW. 12 (2007).

    Chad Breckinridge, Internal Investigation Game Plan: A 10-Step Guide to Reliable and Defensible Electronic Records Review, CHAMPION, Feb. 2007, at 26.

    Rene D. Harrod, Using Technology to Manage Complex Cases, 54 FED. LAW. 28 (2007).

    Ralph C. Losey, Hash: The New Bates Stamp, 12 J. TECH. L. & POL'Y 1 (2007).

    1.2.1 Office Automation

    1.2.2 Case Management

    1.2.3 Case File Security

    Louis L. Akin, Is Someone Eavesdropping on Your Attorney-Client Conversations?, CHAMPION, Mar. 2007, at 12.

    1.2.4 Internet Access

    1.3 Selected Uses in the Law Practice

    1.3.0 General

    Leonard Bierman & Michael A. Hitt, The Globalization of Legal Practice in the Internet Age, 14 IND. J. GLOBAL LEGAL STUD. 29 (2007).

    Lucie Cucu, Note, The Requirement for Metadata Production Under Williams v. Sprint/United Management Co.: An Unnecessary Burden for Litigants Engaged in Electronic Discovery, 93 CORNELL L. REV. 221 (2007).

    Stephen J. Harhai, Analyzing and Understanding Complex Documents, 30 FAM. ADVOC. 6 (2007).

    Sharon D. Nelson & John W. Simek, Cool Technology For Hot Lawyers, 9 LAW. J. 5 (2007).

    Kelcey Nichols, Client Confidentiality, Professional Privilege and Online Communication: Potential Implications of the Barton Decision, 3 SHIDLER J. L. COM. & TECH. 10 (2007).

    George L. Paul, Information Inflation: Can the Legal System Adapt?, 13 RICH. J.L. & TECH. 10 (2007).

    C. Scott Peters, Online Campaigning in 2006 State Supreme Court Elections, 55 DRAKE L. REV. 671 (2007).

    D. Wes Sullenger, Silencing the Blogosphere: A First Amendment Caution to Legislators Considering Using Blogs to Communicate Directly with Constituents, 13 RICH. J.L. & TECH. 15 (2007).

    1.3.1 Tax Filing

    Anne E. Moran, Electronic Notices and Consents: The IRS Issues Final Regulations, 32 EMP. REL. L.J. 99 (2007).

    1.3.2 Bankruptcy

    Laura DiBiase, Technology as a Competitive Advantage for Today's Legal Processes, 26-3 ABIJ 48 (2007).

    Laura DiBiase, Virtual Data Rooms Penetrate the Bankruptcy Virtual World, 26-9 ABIJ 46 (2007).

    James E. Raymond, Software Licenses, Source Code Escrows, and Trustee Power Under 11 U.S.C...

To continue reading