Computer applications in U.S. law enforcement
In: Computers, Environment and Urban Systems, Band 12, Heft 1, S. 37-48
4029 Ergebnisse
Sortierung:
In: Computers, Environment and Urban Systems, Band 12, Heft 1, S. 37-48
In: International journal of information management, Band 11, Heft 4, S. 282-291
ISSN: 0268-4012
In: 14 University of North Carolina J.O.L.T. __ (2012), Forthcoming
SSRN
This article helps to clarify the reader's understanding of issues and concepts relating to UCITA in the midst of legislative drafting efforts to give "birth" to section 2B of the UCITA. Concepts such as the ability to "opt-in" or "out" of the Act, "manifestation of assent," electronic signatures, use of the electronic agent, "mass-market" are fully analyzed and discussed. This article first attempts to outline the drafting process followed by the UCITA drafting committee. Next, the author lays out the objectives of the drafters of the UCITA as it appears in the Prefatory Notes. The author further moves into the subject of "computer information transactions" and provides his own interpretation of § 103 of the UCITA. The article ends with an outline and discussion of the fundamental policies underlying UCITA.
BASE
This article helps to clarify the reader's understanding of issues and concepts relating to UCITA in the midst of legislative drafting efforts to give "birth" to section 2B of the UCITA. Concepts such as the ability to "opt-in" or "out" of the Act, "manifestation of assent," electronic signatures, use of the electronic agent, "mass-market" are fully analyzed and discussed. This article first attempts to outline the drafting process followed by the UCITA drafting committee. Next, the author lays out the objectives of the drafters of the UCITA as it appears in the Prefatory Notes. The author further moves into the subject of "computer information transactions" and provides his own interpretation of § 103 of the UCITA. The article ends with an outline and discussion of the fundamental policies underlying UCITA.
BASE
Hauptbeschreibung: Computer- und Videospiele werfen in der Praxis Fragen vor allem im Bereich des geistigen Eigentums, im Medien-, Vertriebs-, Wettbewerbs- und Markenrecht sowie im Datenschutzrecht auf. Entsprechend der Dynamik des Technologiesektors und der Geschwindigkeit, mit der sich Computer- und Videospiele gerade im Online-Bereich verbreiten, sind zahlreiche Rechtsfragen noch nicht im Einzelnen geklärt.Mit dem ersten Werk zu Computer- und Videospielen für den deutschen und europäischen Marktgreifen die Herausgeber und das internationale Autorenteam ein breites Spektrum praxisrelevanterRec
In: Computer Law and Security Review, Band 30, Heft 6
SSRN
There has been a lot of controversy about the harm caused by computer-generated child pornography. This article examines the new ways in which technological development has created new concerns about child pornography especially in the context of challenging the concept of "harm" in the existing child pornography law. The author presents and discusses the existing child pornography laws and jurisprudence as well as the relevant arguments raised against it most of which are based on the "harm" caused by child pornography. This concept of "harm" and the different ways it is conceived and understood is analyzed and empirical evidence supporting such harm is presented. However, such concept of "harm" does not necessarily cover computer-generated images but initiates a new discussion about the purpose of prohibiting computer-generated child pornography where no real child is involved, who or what such legislation seeks to protect and whether preventing harm to children and protecting free speech are mutually exclusive in this context.
BASE
There has been a lot of controversy about the harm caused by computer-generated child pornography. This article examines the new ways in which technological development has created new concerns about child pornography especially in the context of challenging the concept of "harm" in the existing child pornography law. The author presents and discusses the existing child pornography laws and jurisprudence as well as the relevant arguments raised against it most of which are based on the "harm" caused by child pornography. This concept of "harm" and the different ways it is conceived and understood is analyzed and empirical evidence supporting such harm is presented. However, such concept of "harm" does not necessarily cover computer-generated images but initiates a new discussion about the purpose of prohibiting computer-generated child pornography where no real child is involved, who or what such legislation seeks to protect and whether preventing harm to children and protecting free speech are mutually exclusive in this context.
BASE
One of the primary purposes of The John Marshall Journal of Computer Information Law is to focus on recent developments, on an international basis, in computer and information technology law. The themes that are developed in each issue of Volume Sixteen, present problems in computer and information technology law, and hopefully help answer questions in this dynamic field of law. The first issue of Volume Sixteen is a perspective issue on cyberspace governance, standards, and control. The lead articles of this issue discusses the challenge to develop international trademark law with regard to the Internet, Internet regulatory zoning of obscene content, Internet service providers' obligations under the Telecommunications Act of 1996, electronic commerce in Taiwan, and a commentary on NBA v. Motorola and STATS, Inc. The second issue of Volume Sixteen is a symposium issue on The Uniform Commercial Code ("U.C.C.") Proposed Article 2B. U.C.C. Proposed Article 2B is a legal framework for the licensing and transfer of rights in the intellectual property of computer technology. This issue is a detailed discussion of the problems facing the computer industry and the Proposed Article 2B drafting committee. The lead articles of this issue discusses generally, the law of the information age and the path of commercial law to cyberspace. Specifically, this issue discusses the treatment of consumers, express warranties and published information content, implied warranty of merchantability, and development contacts under the Proposed Article 2B. The third issue of Volume Sixteen is a perspective issue on privacy, information technology, and the Internet. The lead articles of this issue discusses issues of encryption and liberty on an international basis, legislation and decisions as to the control of the use of social security numbers as personal identifiers, and the mapping of legal metaphors in cyberspace. Additionally, this issue featured the bench memorandum, petitioner brief, and respondent brief on First Amendment and Freedom of Information Act issues associated with Internet blocking software in a public forum from the 1997 John Marshall National Moot Court Competition in Information Technology and Privacy Law. This issue, the fourth issue of Volume Sixteen, is a general issue that presents an array of topics. First, G. Peter Albert, Jr., an intellectual property practitioner and author of a treatise on intellectual property and information technology discusses the domain name registration system. Mr. Albert examines the dispute resolution policies of the leading proposals for the registration of domain names and proposes an alternative solution to "cybersquatting" and other trademark-related domain name issues. Keith Kupferschmid, an instrumental practitioner in Washington D.C. on intellectual property issues and the Internet discusses the fist-sale exception in view of copyrighted works on the Internet. Mr. Kupferschmid argues that the first-sale exception is not applicable to network transmissions and recommends that Congress take steps to limit the applicability of the first-sale exception, and that in order to receive the correct balance between the public's fair use of the work and a copyright owner's right to exploit is the grant of a rental right to the copyright owner is in order. Rinaldo Del Gallo, III, an intellectual property practitioner, discusses the dynamics associated with web site designers and the ownership of a web site under the guise of the work for hire doctrine and joint authorship doctrine. Caroline Uyttendaele, an associate research fellow at Katholieke Universiteit Leuven reviews and analyzes from a European point of view, the need for new free speech legislation regarding the Internet. Ms. Uyttendaele addresses the need for additional legislation protecting free speech and the relevance of the present restrictions on free speech. The student Comments in this issue discuss various important topics with regard to intellectual property and information technology issues. First, Laura McFarland-Taylor proposes adopting an internationally recognized standard of due diligence in reporting lost or stolen artworks utilizing the Internet. Second, Timothy Hofmeyer analyzes and examines the legal issues surrounding the patentability of cloned organisms, yet remains silent regarding the moral issues involved with the "hot topic" of cloning. Last, Steven Hanley on an international topic of Internet regulation, proposes that every country utilizing the Internet has a right when regulating the Internet to uphold its national values, and Internet Service Providers' shall work with each country's government to provide an Internet service that is in conjunction with each country's personal values and ideals. The Global Information Infrastructure is a dynamic medium that requires legal guidance and assistance in all stages of development. As information technology advances, the law must change with these advances. It is the hope of The John Marshall Journal of Computer & Information Law that the legal insights provided by our authors in this issue and all past and future issues help to mold the legal doctrine of computer and information technology law affecting the dynamics of the Global Information Infrastructure.
BASE
One of the primary purposes of The John Marshall Journal of Computer Information Law is to focus on recent developments, on an international basis, in computer and information technology law. The themes that are developed in each issue of Volume Sixteen, present problems in computer and information technology law, and hopefully help answer questions in this dynamic field of law. The first issue of Volume Sixteen is a perspective issue on cyberspace governance, standards, and control. The lead articles of this issue discusses the challenge to develop international trademark law with regard to the Internet, Internet regulatory zoning of obscene content, Internet service providers' obligations under the Telecommunications Act of 1996, electronic commerce in Taiwan, and a commentary on NBA v. Motorola and STATS, Inc. The second issue of Volume Sixteen is a symposium issue on The Uniform Commercial Code ("U.C.C.") Proposed Article 2B. U.C.C. Proposed Article 2B is a legal framework for the licensing and transfer of rights in the intellectual property of computer technology. This issue is a detailed discussion of the problems facing the computer industry and the Proposed Article 2B drafting committee. The lead articles of this issue discusses generally, the law of the information age and the path of commercial law to cyberspace. Specifically, this issue discusses the treatment of consumers, express warranties and published information content, implied warranty of merchantability, and development contacts under the Proposed Article 2B. The third issue of Volume Sixteen is a perspective issue on privacy, information technology, and the Internet. The lead articles of this issue discusses issues of encryption and liberty on an international basis, legislation and decisions as to the control of the use of social security numbers as personal identifiers, and the mapping of legal metaphors in cyberspace. Additionally, this issue featured the bench memorandum, petitioner brief, and respondent brief on First Amendment and Freedom of Information Act issues associated with Internet blocking software in a public forum from the 1997 John Marshall National Moot Court Competition in Information Technology and Privacy Law. This issue, the fourth issue of Volume Sixteen, is a general issue that presents an array of topics. First, G. Peter Albert, Jr., an intellectual property practitioner and author of a treatise on intellectual property and information technology discusses the domain name registration system. Mr. Albert examines the dispute resolution policies of the leading proposals for the registration of domain names and proposes an alternative solution to "cybersquatting" and other trademark-related domain name issues. Keith Kupferschmid, an instrumental practitioner in Washington D.C. on intellectual property issues and the Internet discusses the fist-sale exception in view of copyrighted works on the Internet. Mr. Kupferschmid argues that the first-sale exception is not applicable to network transmissions and recommends that Congress take steps to limit the applicability of the first-sale exception, and that in order to receive the correct balance between the public's fair use of the work and a copyright owner's right to exploit is the grant of a rental right to the copyright owner is in order. Rinaldo Del Gallo, III, an intellectual property practitioner, discusses the dynamics associated with web site designers and the ownership of a web site under the guise of the work for hire doctrine and joint authorship doctrine. Caroline Uyttendaele, an associate research fellow at Katholieke Universiteit Leuven reviews and analyzes from a European point of view, the need for new free speech legislation regarding the Internet. Ms. Uyttendaele addresses the need for additional legislation protecting free speech and the relevance of the present restrictions on free speech. The student Comments in this issue discuss various important topics with regard to intellectual property and information technology issues. First, Laura McFarland-Taylor proposes adopting an internationally recognized standard of due diligence in reporting lost or stolen artworks utilizing the Internet. Second, Timothy Hofmeyer analyzes and examines the legal issues surrounding the patentability of cloned organisms, yet remains silent regarding the moral issues involved with the "hot topic" of cloning. Last, Steven Hanley on an international topic of Internet regulation, proposes that every country utilizing the Internet has a right when regulating the Internet to uphold its national values, and Internet Service Providers' shall work with each country's government to provide an Internet service that is in conjunction with each country's personal values and ideals. The Global Information Infrastructure is a dynamic medium that requires legal guidance and assistance in all stages of development. As information technology advances, the law must change with these advances. It is the hope of The John Marshall Journal of Computer & Information Law that the legal insights provided by our authors in this issue and all past and future issues help to mold the legal doctrine of computer and information technology law affecting the dynamics of the Global Information Infrastructure.
BASE
This book is concerned with the nature of computer misuse and the legal and extra-legal responses to it. It explores what is meant by the term 'computer misuse' and charts its emergence as a problem as well as its expansion in parallel with the continued progression in computing power, networking, reach and accessibility. In doing so, it surveys the attempts of the domestic criminal law to deal with some early manifestations of computer misuse and the consequent legislative passage of the Computer Misuse Act 1990. Having outlined thenew criminal offences introduced by the 1990 Act, the book ex