Academic journal article Rutgers Computer & Technology Law Journal

Forty-Fourth Selected Bibliography on Computers, Technology, and the Law

Academic journal article Rutgers Computer & Technology Law Journal

Forty-Fourth Selected Bibliography on Computers, Technology, and the Law

Article excerpt

4.3 Crime

4.3.0 General

Timothy L. Allsup, United States V. Cassidy: The Federal Interstate Stalking Statute And Freedom Of Speech, 13 N.C. J.L. & TECH. ONLINE 227 (June 2012).

Ronald Bacigal, The Future of Seizure Analysis: A Unified Theory For Seizures Of The Person, 81 MISS. L.J. 915 (2012).

Peggy E. Chaudry, Curbing Consumer Complicity for Counterfeits in a Digital Environment, 7 J. BUS. & TECH. L. 23 (2012).

Michael J. Crook, Sacrificing Liberty for Security: North Carolina's Unconstitutional Search and Seizure of Arrestee DNA, 34 CAMPBELL L. REV. 473 (Spring 2012).

Giulia M. Di Marzo, Why Can't We Be Friends--The Banning of Teacher-Student Communication Via Social Media and the Freedom of Speech, 62 Am. U. L. REV. 123 (2012).

Laura K. Donohue & Timothy R. Holbrook, Technological Leap, Statutory Gap, and Constitutional Abyss: Remote Biometric Identification Comes of Age, 97 MINN. L. REV. 407 (DEC. 2012).

Frank Douma & Sarah Aue Palodichuk, Criminal Liability Issues Created by Autonomous Vehicles, 52 SANTA CLARA L. REV. 1157 (2012).

Daniel B. Garrie, Limiting the Affirmative Defense in the Digital Workplace, 19 MICH. J. GENDER & L. 229 (2012).

Chris Kim, Barrie Newberger & Brian Shack, Computer Crimes, 49 Am. CRIM. L. Rev. 443 (2012)

Marty Koresawa, Note, Pay Phone Protections in a Smartphone Society: The Need to Restrict Searches of Modern Technology Incident to Arrest, 45 LOY. L.A. L. Rev. 1351 (Summer 2012).

Emily Long, Note, "Let's Talk about Sex[ting], Baby": A Mens Rea-Centered Approach to the Sexting Issue in Tennessee, 42 U. MEM. L. REV. 1139 (Summer 2012).

Natalie Fox Malone, Note, GPS Monitoring of Domestic Violence Offenders in Tennessee: Generating Problems Surreptitiously, 43 U. MEM. L. REV. 171 (Fall 2012).

Ryan McClure, Current Development, International Adjudication Options in Response to State-Sponsored Cyber-Attacks Against Outer-Space Satellites, 18 NEW ENG. J. INT'L & COMP. L. 431 (2012).

William D. Mercer, At the Intersection of Sovereignty and Contract: Traffic Cameras and the Privatization of Law Enforcement Power, 43 U. MEM. L. REV. 379 (Winter 2012).

Richard E. Myers II, The Future of Seizure Analysis: Challenges To Terry For The Twenty-First Century, 81 MISS. L.J. 937 (2012).

4.3.1 Internet

Susan W. Brenner, Law, Dissonance, and Remote Computer Searches, 14 N.C. J.L. & TECH. 43 (Fall, 2012).

Raj at Dosi & Piyush Khanna, E-Jurisprudence in the Indian Criminal System: Challenging Cyber Crimes in Every Aspect, 45 LAW/TECH J.., Quarter 1, at 1 (2012).

Michal Gilad, Virtual or Reality: Prosecutorial Practices in Cyber Child Pornography Ring Cases, 18 Rich. J.L. & Tech. 5 (2012).

Michael Greenberger & Mathew Swinburne, The Maryland Personal Information Protection Act: Strengthening Maryland's Security Breach Notification Law, 42 U. BALT. L. F. 129, 129-63 (Spring 2012).

Edward J. Mikolinski, Cybercrime: The Investigation, Prosecution and Defense of a Computer-Related Crime (3d ed.), 11 J. High Tech. L. 1 (2011-2012).

Swathi Padmanabhan, Note, Hacking for Lulz: Employing Expert Hackers to Combat Cyber Terrorism, 15 VAND. J. ENT. & TECH. L. 191 (Fall 2012).

Mary-Rose Papandrea, Publication of National Security Information in the Digital Age, 5 J. NAT'L SEC. L. & POL'Y 119 (2011-2012).

Geoffrey R. Stone, WikiLeaks, the Proposed SHIELD Act, and the First Amendment, 5 J. Nat'L SEC. L. & POL'Y 105 (2011-2012).

Kendall Vitale, Barricading the Information Superhighway to Stop the Flow of Traffic: Why International Regulation of the Internet Is Necessary to Prevent Sex Trafficking, 27 AM. U. INT'L L. REV. 91 (2011-2012).

Brian Yamada, Pornoshopped: Why California Should Adopt the Federal Standard for Child Pornography, 32 LOY. …

Search by... Author
Show... All Results Primary Sources Peer-reviewed

Oops!

An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.