Printer Friendly

Cumulative index volumes 1 through 28: title indexto leading articles and features.

TITLE INDEX
TO LEADING ARTICLES AND FEATURES

Access to Federally Funded Research Data Under the Freedom of
Information Act
Edward C. Walterscheid                                      15:1

Adapting Contract Law to Accommodate Electronic Contracts:
Overview and Suggestions
Donnie L. Kidd, Jr. and William H. Daughtrey              26:215

Administering the Antidote to Computer Viruses: A Comment on
United States v. Morris
Susan M. Mello                                            19:259

Administering of Scientific Evidence: Proposed Implementation
of the Guidelines of Daubert and Landrigan Under the Newly
Adopted New Jersey Rules of Evidence
Susan Scott & Lynne A. Anderson                             20:1

The Algorithm and Computer Software Patentability: A Scientific
View of a Legal Problem
Mitchell P. Novick & Helene Wallenstein                    7:313

American Implications of Sentencing by Computer
Roberta L. Jacobs                                          4:302

Analysis of Disagreement
Reed C. Lawlor                                      Fall 1970:70

Analyzing Infringement by Equivalents: A Proposal to Focus the
Scope of International Patent Protection
Allan M Soobert                                           22:189

An Anomaly in the Patent System: The Uncertain Status of
Computer Software
Linda Nell Flewellen                                       8:273

And the Shirt off Your Back: Universal City Studios, DECSS, and
the Digital Millennium Copyright Act
Brian Paul Menard                                         27:371

Anti-Dumping Policy of the European Community and the Growing
Spectre of Protectionism in Technology Related Goods
Stuart A. Christie                                        16:475

Antitrust Enforcement in Electronic B2B Marketplaces: An
Application of Oligopoly Theory and Modern Evidence Law
Gabriel Hertzberg                                         28:463

Apples & Oranges: Reverse Engineering as a Fair Use After
Atari v. Nintendo and Sega v. Accolade
Christopher W. Hager                                      20:259

Application of Article Two of the Uniform Commercial Code to
Computer System Acquisitions
Robert A. Holmes                                             9:1

Archival Backup Copying of Software: How Broad a Right?
Mary A. Meisner                                           14:391

Artificial Intelligence Techniques for Evaluating Employee
Terminations on a Personal Computer
Henry H. Perritt, Jr.                                     13:341

Arzberger Under the Microscope: A Critical Reexamination of the
Exclusion of Bacteria from Plant Patent Protection
Iver P. Cooper                                             7:367

Assaying Computer Associates v. Altai: How Will the
"Golden Nugget" Test Pan Out?
Walter A. Effross                                           19:1

Atari v. Nintendo: Super Mario Uses "Expressive" Security
Feature to "Lock" Out the Competition
Harold C. Moore                                           18:919

An Automated Approach to Scientific Codification
Cary G. DeBessonet                                          9:27

An Automated Intelligent System Based on a Model of a Legal
System
Cary G. DeBessonet                                         10:31

Automated Systems and Claim Realization in Social Security
Organizations
Jon Bing & Dag Wiese Schartum                              12:83

B2Bs, E-Commerce & The All-Or-Nothing Deal
Gail F. Levine                                            28:383

The Bank-Customer Relationship in an Electronic Credit Transfer
System
John J. Clarke                                               2:1

Beyond the Neighborhood Drugstore: U.S. Regulation of Online
Prescription Drug Sales by Foreign Businesses
Ivette P. Gomez                                           28:431

Big Brother, the Holding Company: A Review of Key-Escrow
Encryption Technology
Henry R. King                                             21:224

Biotechnology Development and Transfer: Recommendations for an
Integrated Policy
Reid G. Adler                                             11:469

Biotechnology and Patent Law: Fitting Innovation to the
Procrustean Bed
Dan L. Burk                                                 17:1

Biotechnology and the Third World: Some Social, Economic,
Political and Legal Impacts and Concerns
David Dembo, Clarence Dias & Ward Morehouse               11:431

A Brief Defense of Mass Market Software License Agreements
Robert W. Gomulkiewicz & Mary L. Williamson               22:335

Broderbund Software, Inc v. Unison World, Inc.: "Look and Feel"
Copyright Protection for the Display Screens of an Application
Microcomputer Program
J. Scott MacKay                                           13:105

Can a "Deterministic" Computer Judge Overrule Himself
Alan L.'Iyree                                              7:381

The Canadian Computer Software Copyright Law: One Small Step for
U.S. Software Vendors
Susan J. Bahr                                             17:139

Carnivore In Cyberspace: Extending The Electronic Communications
Privacy Act's Framework To Carnivore Surveillance
Geoffrey A. North                                         28:155

The Carrot and the Stick: Protecting U.S. Intellectual Property
in Developing Countries
Thomas Mesevage                                           17:421

A Case Against the Use of Public Opinion Polls as an Aid in Jury
Selection
David Silver                                               6:177

Case Comment: Monopoly-Relevant Market Telex v. IBM
Albert A. Slawsky                                          5:171

The Case for Limited Use of Polls in the Jury Selection Process
John A. Cannito & K.L. Becker                              7:111

Catching Jellyfish in the Internet: The Public-Figure Doctrine
and Defamation on Computer Bulletin Boards
Thomas D. Brooks                                          21:461

Changing Relationships in Technology Transfer to the Third
World: Case Study of Biotechnology in Agriculture
Deborah A. Rose                                           11:531

CHIPS and the Proposed Uniform New Payments Code
Deborah S. Prutzman                                         10:1

The Clipper Chip: Cryptography Technology and the
Constitution-the Government's Answer to Encryption "Chips" Away
at Constitutional Rights
Kirsten Scheurer                                          21:263

A Commentary on Proposals for Copyright Protection on the
National Information Infrastructure
James V. Mahon                                            22:233

The Commerce Clause and State Programs Aimed at Encouraging the
Development of High-Technology Industries
Michael Winston                                           11:171

Commercial Banking and the Checkless Society
James C.L. Baxendale                                Fall 1970:88

The Computational Complexity of Automated Redistricting: Is
Automation the Answer?
Micah Altman                                               23:81

Computer Arbitration: The Program of the Future
Marion J. Zinman                                          10:103

Computer Malpractice-A New Tort on the Horizon?
Sue Ganske Graziano                                       17:177

Computer Programs and Patent Law: A Comparative Study
Stanislaw J. Soltysinski                                     3:1

Computer Programs and Subject Matter Patentability
Harold L. Davis                                              6:1

Computer Related Decisions Under UCC Article 2: Lessons for the
Article 2 Revision and Software Contract Statute Drafters About
Realities of Contract
David A. Rice                                             18:499

The Computer Revolution: A Challenge to the Law Schools-And a
Dream
Milton R. Wessel                                           3:180

Computer Technology (Hardware and Software): Some Legal
Implications for Antitrust, Copyrights and Patents
Morton C. Jacobs                                    Fall 1970:50

Computer Viruses: Is There a Legal "Antibiotic?"
James Tramontana                                          16:253

Computerization of Welfare Recipients: Implications for the
Individual and the Right to Privacy
Dolores Y.P. Wilson                                        4:163

Computerized Marketing and Competition: Some Antitrust
Considerations
Sander Marc Rabin                                          4:407

Computers and Case Law
James P. Chandler                                          3:202

Computers and Communications: Public Policy at the Crossroads
Manley R. Irwin                                     Fall 1970:35

Computers and Redistricting: A Plea for Realism
Robert G. Dixon, Jr                                         2:15

Computers and the Courts-Recommendations Made to the Courts Task
Force
William S. McKee                                           3:134

Computers and The Patent System: The Problem of The Second Step
Orin S. Kerr                                               28:47

Computers, Medical Malpractice, and the Ghost of the T.J. Hooper
Dorothy D. Petras & Susan Scarpelli                         5:15

Computers: The Law and Politics of Redistricting
Stuart S. Nagel                                             2:22

The Computer's Use in Jury Selection and Management: Do We Need
to Wait for Statutory Change?
Fred M. Greguras & Ingo Keilitz                            6:155

Conceptualization and Development of a Computer Assisted
Diagnostic and Prescriptive System for Juvenile Delinquents
Fred W. Vondracek, Hugh B. Urban, William H. Parsonage      4:86

Congress: The Three-Dimensional Chessboard-The Role of
Information Technology
Robert L. Chartrand                               Spring 1970:50

Consent and Organ Donation
Steven M. Cooper                                          11:559

Content Regulation of Cable Television: "Indecency" Statutes and
the First Amendment
Jessica Sporn                                             11:141

Contracting for Computer Services: A Checklist
Lewis L. Laska                                             2:152

Controls on the Export of Militarily Sensitive Technology:
National Security Imperative for U.S. Industry Impediment
Peter S. Malloy                                           18:841

Copying, the Reconciliation of Conflicting Interests: An
Analysis of Williams & Wilkins Co. v. United States
Lilli A. Yankow                                            3:328

Copyright and Computer Databases: The Case of the Bibliographic
Utility
Richard J. Brown                                           11:17

Copyright in Computer Programming Languages
Richard H. Stern                                          17:321

Copyright, Computers and Compulsory Licensing
Richard Lorr                                               5:149

Copyright in the Digital Age: A Comparative Survey
Dr. Jacqueline Lipton                                     27:333

Copyright Infringement Problems of a Network/Home Cable Record
Selection and Playing System
David C. Lenny                                              5:51

Copyright Infringement of Protected Computer Software: An
Analytical Method to Determine Substantial Similarity
Donald F. McGahn                                           21:88

Copyright Law: A Review of the "Separability Test" and a
Proposal for New Design Protection
Christopher P. Bussert                                     10:59

Copyright Law Tackles Yet Another Challenge: The Electronic
Frontier of the World Wide Web
April M. Major                                             24:75

Copyright Protection: Computer-Related Dependent Works
Michael Gemignani                                         15:383

Copyrightability of Computer-Created Works
Evan H. Farr                                               15:63

Copyrightable Expression in the User Interface of a Computer
Program: Lotus Development Corporation v. Paperback Software
International
Keith A. Overstreet                                       18:941

Courtran: A Modular Management Information and Research System
for the Judicial Process
J.L. Ebersole & J.A. Hall, Jr.                              3:83

The Courts Establish the Rules for Videogames Under the
Copyright Act of 1976: Is It Too Hard to Play?
Grace Dreisbach                                           10:127

Creating Evidence: Ethical Concerns, Evidentiary Problems, and
the Application of Work Product Protection to Audio Recordings
of Nonparty Witnesses Secretly Made by Attorneys or Their Agents
Marguerita B. Dolatly                                     22:521

The Criminal Law Aspects of Computer Abuse: Part I: State Penal
Laws, Part II: Federal Criminal Code
Susan Hubbell Nycum                                 5:271, 5:297

A Critical Look at the New Uniform Payments Code
James V. Vergari                                           9:317

Cyberbanking: A New Frontier for Discrimination?
Cheryl R. Lee                                             26:277

Cybercommunity Versus Geographical Community Standard for Online
Pornography: A Technological Hierarchy in Judging Cyberspace
Obscenity
Gyong Ho Kim and Anna R. Paddon                            26:65

Cyberspace: A New Frontier for Fighting Words
Sanjiv N. Singh                                           25:283

Cyberspace: The Newest Challenge for Traditional Legal Doctrine
Francis A. Gilligan and Edward J. Imwinkilried            24:305

Dawson Chemical Co., Inc. v. Rohm and Haas Co.: A Clarification
of Section 271 of the Patent Act that Restricts the Doctrine of
Patent Misuse
Margaret D. Fox                                            8:321

A Decade After Divestiture: Regional Bells, Video Programming
and the First Amendment
Susan Dente Ross                                          21:143

In Defense of Monopoly Cable Television Franchising: Defining
the First Amendment Rights of the Public and the Cable Operator
Under the Public Forum Doctrine and Natural Monopoly Theory
Nicholas J. Pappas                                        13:137

Defining the Scope of Software Copyright Protection for Maximum
Public Benefit
Charles Walter                                              14:1

Designer Genes: An Ethical Perspective on Genetic Manipulation
Cynthia J. Dreeman                                        15:447

Determination of HDC-ABMT As Accepted Medical Practice for the
Treatment of Breast Cancer
Janice M. Maggio                                          22:551

The Development of the Central Market System: Revolution-One
Step at a Time
Stephen A. Blumenthal                                      3:232

Dialing for Dollars: Should the FCC Regulate Internet Telephony?
Robert M. Frieden                                          23:47

Diamond v. Diehr: A Turning Point
R.O. Nimtz                                                 8:267

Digital Communications Associates, Inc. v. Sofiklone
Distributing Corporation: Copyright Protection for the Status
Screen of a Computer Program
Lawrence D. Mandel                                        15:169

Digital Media and the Changing Face of Intellectual Property Law
Pamela Samuelson                                          16:323

The Digital Millennium Copyright Act: Disabusing the Notion of a
Constitutional Moment
Adam R. Fox                                               27:267

Doctrine of Equivalents After Hilton Davis: A Comparative Law
Analysis
Toshiko Takenaka                                          22:479

Does Computer Stored Data Constitute a Writing for the Purposes
of the Statute of Frauds and the Statute of Wills?
Houston Putnam Lowry                                        9:93

The Drug Export Amendment Act of 1986
Jeanmarie T. Sales                                        15:475

Economic Forum II-Association of Data Processing Service
Organizations                                              9:109

Economically Efficient Treatment of Computer Software: Reverse
Engineering, Protection, and Disclosure
Lawrence D. Graham & Richard O. Zerbe, Jr.                 22:61

E-Consumer Protection: A Comparative Analysis of EU and US
Consumer Protection on the Internet
Michael Cordera                                           27:231

Effective Use of Computers in Government
Paul L. Orchanian                                   Spr. 1970:98

Effects of U.S. Adherence to the Berne Convention
Carol A. Motyka                                           16:195

EFTS: The Computer Revolution in Electronic Banking
Alan S. Naar & Stanley B. Stein                            5:429

Eight Years to 1984: Privacy and Law Reform
M.D. Kirby                                                 5:487

Electronic Aids to the Drafting of Legal Instruments
Reed Dickerson                                    Spring 1970:75

The Electronic Communications Privacy Act of 1986: The Challenge
of Applying Ambiguous Statutory Language to Intricate
Telecommunication Technologies
Russell S. Burnside                                       13:451

Electronic Databases in Legal Research: Beyond LEXIS and WESTLAW
S. Blair Kauffman                                          13:73

The Electronic Freedom of Information Act Amendments: A Minor
Upgrade to Public Access Law
David MacDonald                                           23:357

Electronic Message Transmission to the Home: Potential Federal
Regulatory Conflicts: Congressional Action Needed
James Gerofsky                                             8:305

Electronic Torts and Videotex-At the Junction of Commerce and
Communication
Jay McDaniel                                              18:773

The Electronic Underground: Computer Piracy and Electronic
Bulletin Boards
Charles Cangialosi                                        15:265

Eliminating Personal Injury Backlogs
Peter J. Johnen                                   Spring 1970:94

E-Mail Security Risks: Taking Hacks at the Attorney-Client
Privilege
Jonathan Rose                                             23:179

The Empire Strikes Back in the International Satellite
Communications Industry
Paula Brillson                                            18:831

Encryption, Kev Recovery, and Commercial Trade Secrete Assets: A
Proposed Legislative Model
John T. Soma, Charles P. Henderson                         25:97

End-User Licensees of Computer Programs-Are They Allowed to
Compete with Their Licensors?
Lance Rose                                                13:297

Enforcing Copyrights in the Age of Multimedia
Carolian Saez                                             21:351

Equitable Equivalents: Weighing the Equities to Determine Patent
Infringement in Biotechnology and Other Emerging Technologies
Harold C. Wegner                                            18:1

Evidence from Computers
Colin Tapper                                               4:324

Evidential Value and Acceptability of Computer Digital-Image
Printouts
James Vergari                                              9:343

Evidentiary Problems Relevant to Checks and Computers
Patsy Abelle                                               5:323

The Evolution of Modern Bioethics: The Uncertain Nature of
Progress
Steven Goldberg                                           16:299

Evra Corp v. Swiss Bank Corp.: Consequential Damages For Bank
Negligence in Wire Transfers
Julie Wilson Jetton                                        9:369

The Exercise of Patent Rights Through Multiple Exclusive
Field-of Use Licensing
S. Leslie Misrock, Brian D. Coggio & Norman C. Dulak      11:383

The Expanded Use of Space Act Authority to Accelerate Space
Commercialization Through Advanced Joint Enterprises Between
Federal and Non-Federal Constituencies
J. Henry Glazer                                           12:339

Fair Use of the Guidelines for Classroom Copying? An Examination
of the Addison-Wesley Settlement
David Izakowitz                                           11:111

The FDA's Mail Import Policy: A Questionable Response to the
AIDS Epidemic
Audrey A. Hale                                            16:169

Fear of the Intangible: A Survey of the Accounting and Tax
Issues Confronting the Software Industry
Michael K. Barron & Kathleen M. Bildzok                    12:33

The Federal Communications/Computer Commission
Marcus Cohn                                         Fall 1970:18

The Federal Computer Systems Protection Act
John Roddy                                                 7:343

Federal Regulation of Environmental Releases of Genetically
Manipulated Microorganisms
Edward L. Korwek & Peter L. de la Cruz                    11:301

Federal Tax Treatment of Software Development Expenses: Is the
I.R.S. Position Outdated?
Michael J. Wensman                                          9:77

Federal Tax Treatment of Computer Software Under Norwest v.
Commissioner
Eric W. Castillo                                          26:157

The Feist Case: Reflections on a Pathbreaking Copyright Decision
Robert A. Gorman                                          18:731

The FFC's Pioneer's Preference Policy: An Innovative Idea Grows
Old and Weary
Kulpreet Singh                                            22:143

Financing High-Technology: Congress Invests in a Better Idea
David W. Lentz                                             9:209

Foreign Patent Filing: A Computer Approach
Donald K. Wedding & Harvey R. Maertin                       2:71

Free Access and the Future of Copyright
F. Gregory Lastowska                                      27:293

From Flour Barrel to Computer Systems: The Applicability of
Theories of Alternative Liability to Shift the Burdens of Proof
in Cases of Intermingled Causation and Damages Within A Modern
Computer Scenario
Marc S. Friedman & Andrew J. Siegel                       14:289

From the Legislature: An Overview of the Report of the National
Commission on Electronic Fund Transfer Systems
Douglas K. Wolfson                                         6:103

The Future of Toxic Risk Assessment: The Abandonment of Animal
Testing
James A. Kozachek                                         17:527

Galoob v. Nintendo: Subject Matter Fixation and Consumer Fair
Use Define the Scope of Copyright Protection for Interoperable
Works
Eric W. Olson                                             18:879

Gambling on the Internet: The States Risk Playing Economic
Roulette As the Internet Gaming Industry Spins Onward
Edward M. Yures                                           28:193

The Golden Egg: In Vitro Fertilization Produces Adjudication
Monique V. Imbert                                         17:495

Good Samaritans in Cyberspace
Keith Siver                                                 23:1

A Grandfather Clause, Due Process and GATT.- Whatever Happened
to the Grandfather Clause of the Process Patent Act of 1988?
Robert R. Deveza                                           18:65

Greyhound v. IBM: Price Increases as a Form of Predatory Pricing
Kenneth R. Cohen                                            7:77

High Technology Imports and the U.S. Countervailing Duty and
Antidumping Laws
Alice L. Mattice & Richard O. Cunningham                  10:189

A Historical, Economic, and Legal Analysis of Municipal
Ownership of the Information Highway
Steven C. Carlson                                           25:1

Impeachment of Government Systems Documentation for Taxpayers
Classified as Non-Filers
Jerome S. Horvitz & Joseph L. Sardinas, Jr.                 6:73

The Incremental Marketing of Computer Services and the
"Tie-In" Sale-A Case for Presuming Coercion
Milton R. Wessel                                           2:135

Industry Responsibility for Environmentally Caused Cancer Under
the Toxic Substances Control Act
Charles M. Caruso                                          7:213

Informatics and Administrative Decisions: The
Decentralization Issue
Thore K. Karlsen                                           4:103

An Information Feedback Model for Probation Treatment Selection
and Evaluation
Larry J. Siegel, Romine R. Deming, Ronald F. Perry &
Stewart V. Hoover                                          6:197

The Intellectual Property Bankruptcy Protection Act: The
Legislative Response to Lubrizol Enterprises, Inc. v. Richmond
Metal Finishers, Inc.
Noreen M. Wiggins                                         16:603

Intellectual Technology: The Dilemma of Environmental Law
Richard Brooks                                            15:411

Intelligent Legal Information Systems: Problems and Prospects
L. Thorne McCarty                                          9:265

International Project Financing: Contractual Guarantees in
Favor of Purchasers
Pierre Francotte                                          10:303

International Trends in New Drug Approval Regulation: The
Impact on Pharmaceutical Innovation
Rosemary Pierce Wall                                      10:317

Introducing Law Students to Computers: Swedish Experiences
Peter Seipel                                      Spring 1970:88

Introduction to Symposium on Biotechnology Law
Stanley T. Crooke                                         11:283

Introduction to Symposium on Software Licensing
Gregory E. Moore                                          18:461

Is Self-Help a Lawful Contractual Remedy?
Esther C. Roditti                                         21:431

"It's None of Your Business." Or is it? California Addresses the
Computer Age
Michael J. Plishner                                        8:235

Judges Without Chests or Rules Without Traces? The State,
Technology, and the Law of "Warrantless Searches"
Thomas Massucci                                           21:519

Koontz v. Jaffarian: The Unit Publication Doctrine
Rajat K. Gupta                                            14:261

The Law of Ideas: The Better Mousetrap Might Not Be Yours
Michael A. Epstein                                          11:1

Lawyer and Law Firm Web Pages as Advertising: Proposed
Guidelines
Vanessa S. Browne-Barbour                                 28:275

The Lawyer's Role in the Computer Age
Robert P. Bigelow                                  Spring 1970:1

The Lawyer's Role in the Computer Age
Robert P. Bigelow                                         16:289

Legal Advice for a Company Hiring Programmers from Another
Company
David C. Tunick                                           19:405

Legal Advice Given Over the Internet and Intranet: How does this
Practice Affect the Lawyer-Client Relationship?
Jorge Amieva                                              27:205

Legal Aspects of Computer Art
Jonathan C. Jackson                                       19:495

Legal Education, Information Technology, and Systems Analysis
Linda A. Schwartzstein                                     13:59

Legal Protection for Computer Programs, Public Access to
Information and Freedom of Competitive Research and
Development Activities
Stanislaw J. Soltysinski                                  16:447

Legal Protection for Computer Software: The View from '79
Michael C. Gemignani                                       7:269

Legal and Techno-Political Implications of the Use of
Nuclear Power Sources in Outer Space
Andrew J. Young                                           12:305

Legal and Technological Infrastructures for Electronic
Payment Systems
Henry H. Perritt, Jr.                                       22:1

Legislative Computer Applications: The Illinois Story
Richard M. Hull                                            3:187

Lessors of Computer Equipment: Do They Receive Fair Treatment
Under the Bankruptcy Code
H. Bradley Staggs                                          15:81

Liability for Malfunction of a Computer Program
Susan Nycum                                                  7:1

License Contracts Under Article 2 of the Uniform Commercial
Code: A Proposal
Raymond T. Nimmer, Donald A. Cohn & Ellen Kirsch          19:281

Licensing Computer-Related Exports
David A. Wormser                                          10:233

Limitations Upon the Software Producer's Rights: Vault
Corp v. Quaid Software Ltd.
Deborah Kemp                                               16:85

Limiting Liability in Electronic Data Processing Service
Contracts
William S. Moorhead                                        4:141

A Linear Programming Approach to Problems of Conflicting Legal
Values Like Free Press Versus Fair Trial
Stuart Nagel, Kathleen Reinbolt, Thomas Eimermann          4:420

Living Organisms as Chemical Substances: The EPA 's
Biotechnology Policy Under the Toxic Substances Control Act
C. Robert Manor                                           13:409

A Logic for the Analysis of Collateral Estoppel
Kevin W. Saunders                                          12:99

The Logic of the Whole Truth
Joseph S. Fulda                                           15:435

The Long Arm of the Fax: Service of Process Using Fax Machines
David A. Sokasits                                         16:531

Lost Horizons?: Tortious and Philosophical Implications of
Computer Imaging
Jon Dartley                                               19:199

Luddites at the Terminal and Other Renegades: Computer Generated
Conflict Areas
Miriam K. Mills                                           10:115

Mainstream Loudoun and the Future of Internet Filtering for
America's Public Libraries
Geraldine P. Rosales                                      26:357

Manufacturers Technologies, Inc. v. CAMS, Inc.: A False Hope for
Software Developers Seeking Copyright Protection for Their
Generated Screen Displays
Robert E. Rudnick                                         17:211

Marginal Cost and Relevant Market Determination in Information
Technology Antitrust Cases
Adolph C. Iannaccone & Linda Volonino                     18:681

Mathematical Algorithm Patentability: Understanding the
Confusion
David S. Benyacar                                         19:129

Medical Information Bureau: The Life Insurer's at a bank
Laurence C. Stern                                            4:1

Methods and Problems in Computer Security
R.T. Slivka & J. W. Darrow                                 5:127

Microcomputers and Criminal Sentencing: Michigan as a Case Study
Susan P. Fino                                             12:407

Mobile Data Terminals and Random License Plate Checks: The Need
for Uniform Guidelines and a Reasonable Suspicion Requirement
Darlene Cedres                                            23:391

The Model Software License Provisions: Precursor to a
Gap-Filling Uniform License Statute?
D.C. Toedt III                                            18:521

The Modernization of Court Functions: A Review of Court
Management and Computer Technology
Wesley LaBar                                                5:97

Moore v. Regents of University of California: The Right of
Property in Human Tissue and Its Effect on Medical Research
Christopher Heyer                                         16:629

More on the Use of Computers by Professionals
Michael C. Gemignani                                      13:317

The More Things Change, the More They Stay the Same: An
Unhurried Reflection on Software Protection over the Years
David Bender                                              16:309

Moving Business Data Is Big Business
Herbet Nolan                                         Fall 1970:2

Multimedia and Copyright
Heather J. Meeker                                         20:375

Multiple Criteria in Political Redistricting: Development of
Relative Values
Pankaj S. Sheth & Sidney W. Hess                            2:44

The Multiple Unconstitutionality of Business Method Patents:
Common Sense, Congressional Consideration, And Constitutional
History
Malla Pollack                                              28:61

The National Public Radio Satellite System: FCC durisdiction
Over a New Communications Technology
David A. Yuckman                                           8:135

Natural Resource Damage Assessment: The Exxon Valdez Oil Spill
and Its Implications
Christine Cartwright                                      17:451

The Nature of Statute Law or Parliament Speaks in a High Level
Language
Richard S. Morgan                                          3:128

NEC Electronics, Inc. v. Cal Circuit Abco, Inc., 810 F. 2d 1506
(9th Cir. 1987)
Eric P.Jewell                                             15:191

A Neural Network-Based Law Machine: Initial Steps
David R. Warner, Jr.                                       18:51

New Drug Discovery Technologies and Patents
Philippe Ducor                                            22:369

A New Framework for Software Protection: Distinguishing Between
Interactive and Non-Interactive Aspects of Computer Programs
Irwin R. Gross                                            20:107

The New Jersey Supreme Court's Treatment of the Wireless
Communications Act of 1996
John E. Gregory Jr.                                       26:185

The New "Problem" Of Business Method Patents: The Convergence of
National Patent Laws And International Internet Transactions
Larry A. DiMatteo                                           28:1

A New View Into the Truth: Impact of a Reliable Deception
Detection Technology on the Legal System
Catherine M. Polizzi                                      21:395

Nonpoint Source Water Pollution and the Imposition of Effluent
Limitations on Point Sources
Catharine Cookson Wozniak                                  8:117

NYT Cable TV v. Homestead at Mansfield, Inc.: Assessing the Role
of Cable Access Statutes
Gerard G. Brew                                            15:103

One Size Doesn't Fit All-Is A Uniform Payments Code a Good ldea?
Anne Geary                                                 9:337

Open-Source Software and the Demise of Copyright
Patrick K. Bobko                                           27:51

Operation Complex                                          2:188

Opportunities for Mexico, Canada and the United States: A
Summary of Intellectual Property Rights Under the North American
Free Trade Agreement
Kent S. Foster & Dean C. Alexander                         20:67

The Orbit/Spectrum Resource and the Technology of Satellite
Telecommunications: An Overview
Milton L. Smith III                                       12:285

An Overview of FDA Regulation of Biotechnology Derived Products:
Dealing with the Collision of Science and Society
Linda E. Hall                                             11:501

The Patent Law Equivalency Doctrine and Reduced Instruction Set
Computing Technology: If It Computes Like a Duck, Is It Still
a Duck?
Linda Susswein                                            16:571

Patent Misuse: Time for a Change
J. Dianne Brinson                                         16:357

The Patent System and the "New Biology"
Iver P. Cooper                                               8:1

Patent Systems and Their Role in the Technological Advance of
Developing Nations
Thomas C. Creel & Drew M. Wintringham                     10:255

The Patentability of Computer Programs
Robert O. Nimtz                                     Spr. 1970:38

Patenting Biotechnology: A Practical Approach
Jeffrey L. Ihnen                                          11:407

Patenting of Products of Nature
Michael D. Davis                                          21:293

Patents, Science and Innovation: Historical Linkages and
Global Technological Competitiveness
David Silverstein                                         17:261

Personal Jurisdiction and the World-Wide Web: Bits (and Bytes)
of Minimum Contacts
David Thatch                                              23:143

A Picture Is Worth a Thousand Lies: Electronic Imaging and the
Future of the Admissibility of Photographs Into Evidence
Christine A Guilshan                                      18:365

Post-Adkins Trade Secret Protection of Software
David Bender                                       Spring 1970:5

Practical and Logical Considerations in Drafting a U.S. Patent
Application.for Computer-Related Inventions
Rick D. Nydegger                                          18:109

Privacy and the Social Security Number. Section 1211 of the Tax
Reform Act of 1976
Stephen Mayer                                              6:221

Privacy in Cyberspace: Constructing a Model of Privacy for the
Electronic Communications Environment
Katrin Schatz Byford                                        24:1

Product Liability and Software
Michael C. Gemignani                                       8:173

Professional Malpractice and the Unauthorized Practice of
Professions: Some Legal and Ethical Aspects of the Use of
Computers as Decision-Aids
Marshal S. Willick                                          12:1

The Proliferation of Electronic Commerce Patents: Don't Blame
the PTO
Eugene R. Quinn, Jr.                                      28:121

A Proposal for Developing the Structural Science of Codification
Cary G. DeBessonet                                          8:47

A Proposal to Facilitate The Uniform Administration of Justice
in Korea Through Use of Mathematical Model
Kim, Yun Haeng and Kim, Seong-in                           4:284

Proposed Changes to the Federal Rules of Evidence as Applied to
Computer-Generated Evidence
Paula Noyes Singer                                         7:157

Protecting Computer Software in the '80's: Practical Guidelines
for Evolving Needs
Joseph E. Root III                                         8:205

Protection of United States Semiconductor Designs in Foreign
Countries Under the Semiconductor Chip Protection Act of 1984
James T. Carmichael                                       12:433

Public Performance Copyrights: A Guide to Public Place Analysis
John Kheit                                                  26:1

The Public Utility Status of the Computer Industry
Manley R. Irwin & William H. Barrett                       3:219

The Realities of the MP3 Madness: Are Record Companies Simply
Crying Wolf?
Karen M. Lee                                              27:131

Reality or Virtual Reality? The Use of Interactive, Three
Dimensional Computer Simulations at Trial
Regina A. Gore                                            19:459

A Re-examination of the Computer Inquiry
John R. Bonica                                              7:23

Reflections on the First National Conference on Automated Law
Research
Ejan Mackaay                                               3:310

Regulating the Multi-Media Chimera: Electronic Speech Rights
in the United States
Allen S. Hammond                                            21:1

Regulation of Amateur Radio Antenna Height, Restrictive
Covenants and Local Regulations: Is The Ham's Goose Cooked?
Frank A. Thomasello, Jr.                                  16:227

The Regulator's Dilemma: Should Best Available Technology or
Cost Benefit Analysis Be Used to Determine the Applicable
Hazardous Waste Treatment, Storage and Disposal Technology?
Thomas A. Cinti                                           16:145

Remote Sensing Satellite Regulation by National and
International Law
Hamilton De Saussure                                      15:351

Retail Wheeling: Is Competition Among Energy Utilities an
Environmental Disaster, or Can It Be Reconciled with Integrated
Resource Planning?
Douglas L. Heinold                                        22:301

Rogue Computer Programs and Computer Rogues: Tailoring the
Punishment to Fit the Crime
Anne W. Branscomb                                           16:1

The Role of Neural Networks in the Law Machine Development
David R. Warner, Jr.                                      16:129

The Rosetta Stone for the Doctrines of Means-Plus-Function
Patent Claims
Rudolph P. Hofmann, Jr. & Edward P. Heller, III           23:227

Sailor Music: Exposing The Gaps in 17 U.S.C. [section] 110(5)
Robert J. Cash                                             9:133

Satellite High Jinks: Hubbard Broadcasting, Inc. v. Southern
Satellite Systems
James H. Gambrill                                         13:519

Section 337 of the Tariff Act of 1930, As Amended: Effective
Protection for Changing Technology
Paul Plaia, Jr. & Joel D. Kaufman                         10:219

Seeking the Balance Between Government and Industry Interests in
Software Acquisitions
Kevin Deasy & Ann Crawford Martin                         14:159

The Semiconductor Chip Protection Act And Its Impact On The
International Protection Of Chip Designs
Jay A. Erstling                                           15:303

Sexual Harassment in Cyberspace: The Problem of Unwelcome EMail
David K. McGraw                                           21:491

Shared Computing: An Attorney's "Need to Know"
Charles H. White, Jr.                             Spring 1970:63

"Shared Monopoly," "Conscious Parallelism" and An Approach to
Oligopoly Under Section 5 of the FTC Act
Paul D. Connuck                                            9:165

Sharing of Research Results in a Federally Sponsored Gene
Mapping Project
Susan C. Rosenfeld                                        14:311

Shrink-Wrap Licenses of Mass Marketed Software: Enforceable
Contracts or Whistling in the Dark?
Richard H. Stern                                           11:51

Sisyphean Circles: The Communications Assistance for Law
Enforcement Act
David Ward                                                22:267

Software Interoperability and Reverse Engineering
John T. Soma, Gus Winfield & Letty Friesen                20:189

Software Patent Applications Directed to Business and
Mathematical Processing Applications Highlight the Tension
Between State Street and Benson
Michael Joel Schallop                                      26:89

Software Patent Developments: A Programmer's Perspective
John A. Gibby                                             23:293

Software Protection in "Europe 1992"
Alfred P. Meijboom                                        16:407

Software Protection in Transactions With the Soviet Union
James E. Meadows                                          12:133

Some Observations on the Protection of Semiconductor Chip Design
John M. Kernochan                                         13:287

The Sound of Silence: Why and How the FCC Should Permit Private
Property Owners to Jam Cell Phones
S. Robert Carter, III                                     28:343

Space Law: Considerations For Space Planners
F. Kenneth Schwetje                                       12:245

State and Local Taxation of Electronic Commerce: The Forging of
Cyberspace Tax Policy
David S. Prebut                                           24:345

Stop Payment in the New Uniform Payments Code
Christopher D. Pape                                        9:353

The Strength of Patent Protection for Computer Products: The
Federal Circuit and the Patent Office Refine the Test for
Determining Which Computer-Related Inventions Constitute
Patentable Subject Matter
R. Lewis Gable & J. Bradford Leaheey                       17:87

A Structural Model for Computer-Aided Legal Analysis
Jeffrey A. Meldman                                          6:27

The Substantial Similarity Test and Its Use in Determining
Copyright Infringement Through Digital Sampling
Maura Giannini                                            16:509

Summary Protection of Intellectual Property Rights at the
Border: Customs Law and Practice
Lawrence M. Friedman                                      19:429

A Survey of Computerized Information for Lawyers: Lexis, Juris,
Westlaw, and Flite
John T. Soma & Andrea R. Stern                             9:295

Synercom Technology, Inc. v. University Computing Co.: Copyright
Protection for Computer Formats and The Idea/Expression
Dichotomy
Allan E. Reznick                                            8:65

The Tax Treatment of Research and Development Expenditures: A
Comparison Between Financial Accounting Standards and Section
174 of the Internal Revenue Code
John L. Pritchard                                         10:149

Teaching Law With Computers
Richard Warner, Stephen D. Sowle & Will Sadler            24:107

Techniques For Litigation Avoidance in Contracting For Computer
Systems
Esther Roditti Schachter                                  10:109

Technological Trade with the Former Eastern Block: The Evolution
of Export Control and Its Relationship to Structural Trade
Barriers
Cecelia A. Schier                                         19:223

A Technologist's View of Privacy and Security in Automated
Information Systems
Ruth M. Davis                                              4:264

Technology Due Diligence--The Need for and Benefits of
Technology Assessment in Connection with Investment in
High-Tech Companies
Carol R. Goforth and Ronald R. Goforth, Ph.D.             27:151

Technology Overtakes Entitlements: State of New York v. Sullivan
Bonnie E. Muir                                            19:517

The Telco, the Common Carrier Model and the First Amendment--The
"Dial-A-Porn" Precedent
Jerome A. Barron                                          19:371

Telex v. IBM: Another Viewpoint
Milton R. Wessel                                             5:1

The Third Party Defense to CERCLA Liability
Geoffrey D. Eberle                                        17:189

To Be or Not To Be: The Legal Ramifications of the Cloning of
Human Embryos
Debra Feuerberg Duffy                                     21:189

Tort Liability for Defamation by Computer
George E. Stevens & Harold M. Hoffman                       6:91

Tort Theories of Recovery Against Vendors of Defective Software
John M. Conley                                              13:1

Toward an Effective Strategy for Software Copyright Litigation
Ronald Johnston                                            19:91

Toward the 1980 Census: The Reapportionment of New Jersey's
Congressional Districts
Robert G. Torricelli & John I. Porter                      7:135

Trade Secrets--The New Risks to Trade Secrets Posed By
Computerization
Andrew Beckerman-Rodau                                    28:227

Transborder Data Flow: An Overview and Critique of Recent
Concerns
I. Trotter Hardy, Jr.                                      9:247

Transborder Retransmissions of T.V. Signals: A New Copyright
Problem
Jildy Gross                                                11:93

Transmitting Legal Documents Over the Internet: How to Protect
Your Client and Yourself
John Christopher Anderson                                   27:1

The Trouble with Competitive Bidding in New Jersey for High
Technology Equipment
Robert C. Epstein                                          16:63

The Unconstitutionality of Waste Flow Control and the
Environmental Justice Movement's Impact on Incinerators
Nelson Perez                                              22:587

Understanding the Implications of Selling Rights in Software To
The Defense Department: A Journey Through The Regulatory Maze
Pamela Samuelson                                           13:33

Uniform Codification of Commercial Contract Law
Raymond T. Nimmer                                         18:465

United States v. Karo, Comment
Virginia C. Robbins                                       12:169

Universal City Studios, Inc. v. SONY Corp. of America: Betamax
Records Trial Court Victory. Should the Court of Appeals Replay
the Verdict?
Richard C. Bell                                             8:85

Universal Health Identifier: Invasion of Privacy or Medical
Advancement?
Betty Ng                                                  26:331

Universal Service and the Digital Revolution: Beyond the
Telecommunications Act of 1996
Markenzy Lapointe                                          25:61

Unraveling Copyrighted Software from a Tying Arrangement
Presumption: 3 P.M., Inc. v. Basic Four Corp., an Alternative
to Digidyne Corp. v. Data General
Kim Marie Given                                           12:447

An Update of EFTS
Maria Metzler Johnson                                      6:277

Use of Computers and Technology in Land Use Control
Jill M. Horton                                            18:403

The Use of Electronic Data Processing Equipment in Law Office
Management and Fiscal Control
Howard M. Stroger                                 Spring 1970:82

The Use of Evidence Extrinsic to a Single Source to Support
Anticipation
Kenneth R. Walton                                         20:339

The Use of the Legal Cadastre in the Maritime Provinces of
Canada
Willis F. Roberts                                          5:121

Using Trade Secret Law to Protect Computer Software
Robert C. Scheinfeld & Gary M. Butter                     17:381

Videotape in the Courts: Its Use and Potential
Alan W. Roth                                               3:279

Warranty Disclaimer in the Data Processing Contract
Richard Raysman                                            6:265

West Publishing Co. v. Mead Data Central, Inc. (LEXIS)
Robin Lee Pedersen                                        14:359

"What's Really Going On?": A Study of Lawyer and Scientist
Inter-Disciplinary Discourse
Robert J. Condlin                                         25:181

When Public Policies Collide ... Legal "Self-Help" Software and
the Unauthorized Practice of Law
Steve French                                               27:93

Whither (No Longer Whether) Software Copyright
David A. Rice                                             16:341

Worldwide Protection of Computer Programs by Copyright
Nicholas Prasinos                                           4:42

You Can Bank On It: An Analysis of Judicial Branch Bank
Characterization and an Alternate Proposal
Douglas K. Wolfson & Scott J. Stevens                      5:389

AUTHOR INDEX TO
LEADING ARTICLES AND FEATURES

Abelle, Patsy
Evidentiary Problems Relevant to Checks and Computers      5:323

Adler, Reid G.
Biotechnology, Development and Transfer: Recommendations for an
Integrated Policy                                         11:469

Altman, Micah
The Computational Complexity of Automated Redistricting: Is
Automation the Answer?                                     23:81

Amieva, Jorge
Legal Advice Given Over the Internet and Intranet: How does
this Practice Affect the Lawyer-Client Relationship?      27:205

Anderson, John Christopher
Transmitting Legal Documents Over the Internet: How to Protect
Your Client and Yourself                                    27:1

Bahr, Susan J.
The Canadian Computer Software Copyright Law: One Small Step
for U.S. Software Vendors                                 17:139

Barrett, William H. & Manley R. Irwin
The Public Utility Status of the Computer Industry         3.219

Barron, Jerome A.
The Telco, the Common Carrier Model and the First Amendment-The
"Dial-A-Porn" Precedent                                   19:371

Barron, Michael K. & Kathleen M. Bildzok
Fear of the Intangible: A Survey Of the Accounting and Tax
Issues Confronting the Software Industry                   12:33

Baxendale, James C.L.
Commercial Banking and the Checkless Society        Fall 1970:88

Becker, K.L. & John A. Cannito
The Case for Limited Use of Polls in the Jury Selection
Process                                                    7:111

Beckerman-Rodau, Andrew
Trade Secrets--The New Risks to Trade Secrets Posed By
Computerization                                           28:227

Bell, Richard C.
Universal City Studios, Inc. v. SONY Corp. of America: Betamax
Records Trial Court Victory. Should the Court of Appeals Replay
the Verdict?                                                8:85

Bender, David
The More Things Change, the More They Stay the Same:
An Unhurried Reflection on Software Protection Over the
Years                                                     16:309

Bender, David
Post-Adkins Trade Secret Protection of Software    Spring 1970:5

Benyacar, David S.
Mathematical Algorithm Patentability: Understanding the
Confusion                                                 19:129

Bigelow, Robert P.
The Lawyer's Role in the Computer Age              Spring 1970:1

Bigelow, Robert P.
The Lawyer's Role in the Computer Age                     16:289

Bildzok, Kathleen M. & Michael K. Barron
Fear of the Intangible: A Survey of the Accounting and Tax
Issues Confronting the Software Industry                   12:33

Bing, Jon & Dag Wiese Schartum
Automated Systems and Claim Realization in Social Security
Organizations                                              12:83

Blumenthal, Stephen A.
The Development of the Central Market System: Revolution-One
Step at a Time                                             3.232

Bobko, Patrick K.
Open-Source Software and the Demise of Copyright           27:51

Bonica, John R.
A Re-examination of the Computer Industry                   7:23

Branscomb, Anne W.
Rogue Computer Programs and Computer Rogues: Tailoring the
Punishment to Fit the Crime                                 16:1

Brew, Gerard G.
NYT Cable TV v. Homestead at Mansfield, Inc.: Assessing the
Role of Cable Access Statutes                             15:103

Brillson, Paula
The Empire Strikes Back in the International Satellite
Telecommunications Industry                               18:381

Brinson, J. Dianne
Patent Misuse: Time for a Change                          16:357

Brooks, Richard
Intellectual Technology: The Dilemma of Environmental Law 15:411

Brooks, Thomas D.
Catching Jellyfish in the Internet: The Public-Figure Doctrine
and Defamation on Computer Bulletin Boards                21:461

Brown, Richard L.
Copyright and Computer Databases: The Case of the Bibliographic
Utility                                                    11:17

Browne-Barbour, Vanessa S.
Lawyer and Law Firm Web Pages as Advertising: Proposed
Guideline                                                 28:275

Burk, Dan L.
Biotechnology and Patent Law: Fitting Innovation to the
Procrustean Bed                                             17:1

Burnside, Russell S.
The Electronic Communications Privacy Act of 1986: The Challenge
of Applying Ambiguous Statutory Language to Intricate
Telecommunication Technologies                            13:451

Bussert, Christopher P.
Copyright Law: A Review of the "Separability Test" and a
Proposal for New Design Protection                         10:59

Butter, Gary M. & Robert C. Scheinfeld
Using Trade Secret Law to Protect Computer Software       17:381

Byford, Katrin Schatz
Privacy in Cyberspace: Constructing a Model of Privacy for the
Electronic Communications Environment                       24:1

Cangialosi, Charles
The Electronic Underground: Computer Piracy and Electronic
Bulletin Boards                                           15:265

Cannito, John A. & K.L. Becker
The Case for Limited Use of Polls in the Jury Selection
Process                                                    7:111

Carlson, Steven C.
The Case for Limited Use of Polls in the Jury Selection
Process                                                    7:111

Carlson, Steven C.
A Historical, Economic, and Legal Analysis of Municipal
Ownership of the Information Highway                        25:1

Carmichael, James T.
Protection of United States Semiconductor Designs in Foreign
Countries Under the Semiconductor Chip Protection
Act of 1984                                               12:433

Carter, S. Robert III
The Sound of Silence: Why and How the FCC Should Permit Private
Property Owners to Jam Cell Phones                        28:343

Cartwright, Christine
Natural Resource Damage Assessment: The Exxon Valdez Oil Spill
and Its Implications                                      17:451

Caruso, Charles M.
Industry Responsibility for Environmentally Caused Cancer Under
the Toxic Substances Control Act                           7:213

Cash, Robert J.
Sailor Music: Exposing the Gaps in 17 U.S. C 110(5)        9:133

Castillo, Eric W.
Federal Tax Treatment of Computer Software Under Norwest v.
Commissioner                                              26:157

Cedres, Darlene
Mobile Data Terminals and Random License Plate Checks: The
Need for Uniform Guidelines and a Reasonable Suspicion
Requirement                                               23:391

Chandler, James P.
Computers and Case Law                                     3:202

Chartrand, Robert L.
Congress: The Three-Dimensional Chessboard-The Role of
Information Technology                            Spring 1970:50

Christie, Stuart A.
Anti-Dumping Policy of the European Community and the Growing
Spectre of Protectionism in Technology-Related Goods      16:475

Cinti, Thomas A.
The Regulator's Dilemma: Should Best Available Technology or
Cost Benefit Analysis Be Used to Determine the Applicable
Hazardous Waste Treatment, Storage and Disposal
Technology?                                               16:145

Clarke, John J.
The Bank-Customer Relationship in an Electronic Credit
Transfer System                                              2:1

Coggio, Brian D., S. Leslie Misrock, & Norman C. Dulak
The Exercise of Patent Rights Through Multiple Exclusive
Field-of-Use Licensing                                    11:383

Cohen, Kenneth R.
Greyhound v. IBM: Price Increases as a Form of Predatory
Pricing                                                     7:77

Cohn, Marcus
The Federal Communications/Computer Commission      Fall 1970:18

Condlin, Robert J.
"What's Really Going On?": A Study of Lawyer and Scientist
Inter-Disciplinary Discourse                              25:181

Conley, John M.
Tort Theories of Recovery Against Vendors of Defective
Software                                                    13:1

Connuck, Paul D.
"Shared Monopoly," "Conscious Parallelism" and an Approach to
Oligopoly Under Section 5 of the FTC Act                   9:165

Cooper, Iver P.
Arzberger Under the Microscope: A Critical Reexamination of the
Exclusion of Bacteria from Plant Patent Protection         7:367

Cooper, Iver P.
The Patent System and the "New Biology"                      8:1

Cooper, Steven M.
Consent and Organ Donation                                11:559

Cordera, Michael
E-Consumer Protection: A Comparative Analysis of EU
and US Consumer Protection on the Internet                27:231

Creel, Thomas C. & Drew M. Wintringham
Patent Systems and Their Role in the Technological Advance of
Developing Nations                                        10:255

Cunningham, Richard O. & Alice L. Mattice
High Technology Imports and the U.S. Countervailing Duty and
Antidumping Laws                                          10:189

Darrow, J.W. & R.T. Slivka
Methods and Problems in Computer Security                  5:217

Dartley, Jon
Lost Horizons?: Tortious and Philosophical Implications of
Computer Imaging                                          19:199

Davis, Harold L.
Computer Programs and Subject Matter Patentability           6:1

Davis, Michael D.
The Patenting of Products of Nature                       21:293

Davis, Ruth M.
A Technologist's View of Privacy and Security in Automated
Information Systems                                        4:264

DeBessonet, Cary G.
An Automated Approach to Scientific Codification            9:27

DeBessonet, Cary G.
An Automated Intelligent System Based on a Model of a Legal
System                                                     10:31

DeBessonet, Cary G.
A Proposal for Developing the Structural Science of
Codification                                                8:47

Deasy, Kevin & Anne Crawford Martin
Seeking the Balance Between Government and Industry Interests
in Software Acquisition                                   14:159

de la Cruz, Peter L. & Edward L. Korwek
Federal Regulation of Environmental Releases of Genetically
Manipulated Microorganisms                                11:301

Dembo, David, Clarence Dias & Ward Morehouse
Biotechnology and the Third World: Some Social, Economic,
Political and Legal Impacts and Concerns                  11:431

Deming, Romine R., Larry J. Seigel, Ronald F. Perry, &
Stewart V. Hoover
An Information Feedback Model for Probation Treatment Selection
and Evaluation                                             6:197

DeSaussure, Hamilton
Remote Sensing Satellite Regulation by National and
International Law                                         15:351

Devdza, Robert R.
A Grandfather Clause, Due Process and the GATT. Whatever
Happened to the Grandfather Clause of the Process Patent Act
of 1988?                                                   18:65

Dias, Clarence, David Dembo & Ward Morehouse
Biotechnology and the Third World: Some Social, Economic,
Political and Legal Impacts and Concerns                  11:431

Dickerson, Reed
Electronic Aids to the Drafting of Legal
Instruments                                       Spring 1970:75

DiMatteo, Larry A.
The New "Problem" Of Business Method Patents: The Convergence
of National Patent Laws And International Internet
Transactions                                                28:1

Dixon, Robert G., Jr.
Computers and Redistricting: A Plea for Realism             2:15

Dolatly, Marguerita B.
Creating Evidence: Ethical Concerns, Evidentiary Problems,
and the Application of Work Product Protection to Audio
Recordings of Nonparty Witnesses Secretly Made by Attorneys
or Their Agents                                           22:521

Dreeman, Cynthia J.
Designer Genes: An Ethical Perspective on Genetic
Manipulation                                              15:447

Dreisbach, Grace
The Courts Establish the Rules for Videogames Under the
Copyright Act of 1976: Is It Too Hard to Play?            10:127

Ducor, Philippe
New Drug Discovery Technologies and Patents               22:369

Duffy, Debra Feuerberg
To Be or Not To Be: The Legal Ramifications of the Cloning of
Human Embryos                                             21:189

Dulak, Norman C., S. Leslie Misrock & Brian D. Coggio
The Exercise of Patent Rights Through Multiple Exclusive
Field-of-Use Licensing                                    11:383

Eberle, Geoffrey D.
The Third Party Defense to CERCLA Liability               17:189

Ebersole, J.L. & J.A. Hall, Jr.
Courtran: A Modular Management Information and Research System
for the Judicial Process                                    3:83

Effross, Walter A.
Assaying Computer Associates v. Altai.--How Will the "Golden
Nuggett" Test Pan Out?                                      19:1

Eimermann, Thomas, Stuart Nagel & Kathleen Reinbolt
A Linear Programming Approach to Problems of Conflicting Legal
Values Like Free Press Versus Fair Trial                   4:420

Epstein, Michael A.
The Law of Ideas: The Better Mousetrap Might Not Be
Yours                                                       11:1

Epstein, Robert C.
The Trouble with Competitive Bidding in New Jersey for High
Technology Equipment                                       16:63

Erstling, Jay A.
The Semiconductor Chip Protection Act and Its Impact on the
International Protection Of Chip Designs                  15:303

Farr, Evan H.
Copyrightability of Computer-Created Works                 15:63

Fino, Susan P
Microcomputers and Criminal Sentencing: Michigan as a Case
Study                                                     12:407

Flewellen, Linda Nell
An Anomaly in the Patent System: The Uncertain Status of
Computer Software                                          8:273

Foster, Kent S. & Dean C. Alexander
Opportunities for Mexico, Canada and the United States: A
Summary of Intellectual Property Rights Under the North
American Free Trade Agreement                              20:67

Fox, Adam R.
The Digital Millennium Copyright Act: Disabusing the Notion
of a Constitutional Moment                                27:267

Fox, Margaret D.
Dawson Chemical Co. Inc. v. Rohm and Haas Co.: A Clarification
of Section 271 of the Patent Act that Restricts the Doctrine of
Patent Misuse                                              8:321

Francotte, Pierre
International Project Financing: Contractual Guarantees in
Favor of Purchasers                                       10:303

French, Steve
When Public Policies Collide ... Legal "Self-Help" Software and
the Unauthorized Practice of Law                           27:93

Frieden, Robert M.
Dialing for Dollars: Should the FCC Regulate Internet
Telephony?                                                 23:47

Friedman, Lawrence M.
Summary Protection of Intellectual Property Rights at the
Border: Customs Law and Practice                          19:429

Friedman, Marc S. & Andrew J. Siegel
From Flour Barrel to Computer Systems: The Applicability of
Theories of Alternative Liability to Shift the Burdens of
Proof in  Cases of Intermingled Causation and Damages
Within a Modern Computer Scenario                         14:289

Fulda, Joseph S.
The Logic of the Whole Truth                              15:435

Gable, R. Lewis & J. Bradford Leaheey
The Strength of Patent Protection for Computer Products: The
Federal Circuit and the Patent Office Refine the Test for
Determining Which Computer-Related Inventions Constitute
Patentable Subject Matter                                  17:87

Gambril, James H.
Satellite High Jinks: Hubbard Broadcasting Inc. v. Southern
Satellite Systems                                         13:519

Geary, Anne
One Size Doesn't Fit All-Is a Uniform Payments Code a Good
Idea?                                                      9:337

Gemignani, Michael C.
Copyright Protection: Computer-Related Dependent Works    15:383

Gemignani, Michael C.
Legal Protection for Computer Software: The View
from '79                                                   7:269

Gemignani, Michael C.
More on the Use of Computers by Professionals             13:317

Gemignani, Michael C.
Product Liability and Software                             8:173

Gerofsky, James
Electronic Message Transmission to the Home: Potential Federal
Regulatory Conflicts: Congressional Action Needed          8:305

Giannini, Maura
The Substantial Similarity Test and Its Use in Determining
Copyright Infringement Through Digital Sampling           16:509

Gibby, John A.
Software Patent Developments: A Programmer's Perspective  23:293

Gilligan, Francis A. and Edward J. Imwinkilried
Cyberspace: The Newest Challenge for Traditional Legal
Doctrine                                                  24:305

Given, Kim Marie
Unraveling Copyrighted Software from a Tying Arrangement
Presumption: 3 P.M., Inc. v. Basic Four Corp., an Alternative
to Digidyne Corp. v. Data General                         12:447

Glazer, J. Henry
The Expanded Use of Space Act Authority to Accelerate Space
Commercialization Through Advanced Joint Enterprises Between
Federal and Non-Federal Constituencies                    12:339

Goforth, Carol R. & Ronald L. Goforth, Ph.D.
Technology Due Diligence--The Need for and Benefits of
Technology Assessment in Connection with Investment in
High-Tech Companies                                       27:151

Goldberg, Steven
The Evolution of Modern Bioethics: The Uncertain Nature of
Progress                                                  16:299

Gomez, Ivette P.
Beyond the Neighborhood Drugstore: U.S. Regulation of Online
Prescription Drug Sales by Foreign Businesses             28:431

Gomulkiewicz, Robert W. & Mary L. Williamson
A Brief Defense of Mass Market Software License
Agreements                                                22:335

Gorman, Robert A.
The Feist Case: Reflections on a Pathbreaking Copyright
Decision                                                  18:731

Gore, Regina A.
Reality or Virtual Reality? The Use of Interactive,
Three-Dimensional Computer Simulations at Trial           19:459

Graham, Lawrence D. & Richard O. Zerbe, Jr.
Economically Efficient Treatment of Computer Software: Reverse
Engineering, Protection, and Disclosure                    22:61

Graziano, Sue Ganske
Computer Malpractice-A New Tort on the Horizon?           17:177

Gregory, John E. Jr.
The New Jersey Supreme Court's Treatment of the Wireless
Communications Act of 1996                                26:185

Greguras, Fred M. & Ingo Keilitz
The Computer's Use in Jury Selection and Management: Do We
Need to Wait for Statutory Chang?                          6:155

Gross, Irwin R.
A New Framework for Software Protection: Distinguishing Between
Interactive and Non-Interactive Aspects of Computer
Programs                                                  20:107

Gross, Jildy
Transborder Retransmissions of TV. Signals: A New Copyright
Problem                                                    11:93

Guilshan, Christine A.
A Picture Is Worth a Thousand Lies: Electronic Imaging and
the Future of the Admissibility of Photographs Into
Evidence                                                  18:365

Gupta, Rajat K.
Koontz v. Jaffarian: The Unit Publication Doctrine        14:261

Hager, Christopher W.
Apples & Oranges: Reverse Engineering as a Fair Use After
Atari v. Nintendo and Sega v. Accolade                    20:259

Hale, Audrey A.
The FDA's Mail Import Policy: A Questionable Response to the
AIDS Epidemic                                             16:169

Hall, J.A., Jr. & J.L. Ebersole
Courtran: A Modular Management Information and Research
System for the Judicial Process                             3:83

Hall, Linda E.
An Overview of FDA Regulation of Biotechnology Derived Products:
Dealing with the Collision of Science and Society         11:501

Hammond, Allen S.
Regulating the Multi-Media Chimera: Electronic Speech Rights
in the United States                                        21:1

Hardy, I. Trotter, Jr.
Transborder Data Flow: An Overview and Critique of Recent
Concerns                                                   9:247

Heinhold, Douglas L.
Retail Wheeling: Is Competition Among Energy Utilities an
Environmental Disaster, or Can It Be Reconciles with
Integrated Resource Planning?                             22:301

Heller, Edward P., III & Hofmann, Rudolph P., Jr.
The Rosetta Stone for the Doctrines of Means-Plus-Function
Patent Claims                                             23:227

Hertzberg, Gabriel
Antitrust Enforcement in Electronic B2B Marketplaces: An
Application of Oligopoly Theory and Modern Evidence Law   28:463

Hess, Sidney W. & Pankaj S. Sheth
Multiple Criteria in Political Redistricting: Development of
Relative Values                                             2:44

Heyer, Christopher
Moore v. Regents of University of California: The Right of
Property in Human Tissue and Its Effect on Medical
Research                                                  16:629

Hoffman, Harold M. & George E. Stevens
Tort Liability for Defamation by Computer                   6:91

Hofmann, Rudolph P., Jr., & Heller, Edward P., III
The Rosetta Stone for the Doctrines of Means-Plus-Function
Patent Claims                                             23:227

Holmes, Robert A.
Application of Article Two of the Uniform Commercial Code to
System Acquisitions                                          9:1

Hoover, Stewart V., Larry J. Siegel, Romine R. Deming, &
Robert F. Perry
An Information Feedback for Probation Treatment Selection and
Evaluation                                                 6:197

Horton, Jill M.
Use of Computers and Technology in Land Use Control       18:403

Horvitz, Jerome S. & Joseph L. Sardinas, Jr.
Impeachment of Government Systems Documentation for Taxpayers
Classified as Non-Filers                                    6:73

Hull, Richard M.
Legislative Computer Applications: The Illinois Story      3:187

Iannaccone, Adolph C. and Linda Volonino
Marginal Cost and Relevant Market Determination in Information
Technology Antitrust Cases                                18:681

Ihnen, Jeffrey L.
Patenting Biotechnology: A Practical Approach             11:407

Imbert, Monique V.
The Golden Egg: In Vitro Fertilization Produces
Adjudication                                              17:495

Irwin, Manley R.
Computers and Communications: Public Policy at the
Crossroads                                          Fall 1970:35

Irwin, Manley R. & William H. Barrett
The Public Utility Status of the Computer Industry         3:219

Izakowitz, David
Fair Use of the Guidelines for Classroom Copying? An
Examination of the Addison-Wesley Settlement              11:111

Jackson, Jonathan C.
Legal Aspects of Computer Art                             19:495

Jacobs, Morton C.
Computer Technology (Hardware and Software): Some Legal
Implications for Antitrust, Copyrights and Patents  Fall 1970:50

Jacobs, Roberta L.
American Implications of Sentencing by Computer            4:302

Jetton, Julie Wilson
Evra Corp. v. Swiss Bank Corp.: Consequential Damages for
Bank Negligence in Wire Transfers                          9:369

Jewell, Eric P.
NEC Electronics, Inc. v. Cal Circuit Abco, Inc.
810 F.2d 1506 (9th Cir. 1987)                             15:191

Johnen, Peter J.
Eliminating Personal Injury Backlogs              Spring 1970:94

Johnson, Andrea L.
Legal and Regulatory Issues Confronting Cities in Developing
an Interconnected Fiber Optic Network: The San Diego
Model                                                     20:489

Johnson, Maria M.
An Update on EFTS                                          6:277

Johnston, Ronald L.
Toward an Effective Strategy for Software Copyright
Litigation                                                 19:91

Karlsen, Thore K.
Informatics and Administrative Decisions: The
Decentralization Issue                                     4:103

Kauffman, S. Blair
Electronic Databases in Legal Research: Beyond LEXIS and
WESTLAW                                                    13:73

Kaufman, Joel D. and Paul Plaia, Jr.
Section 337 of the Tariff Act of 1930, as Amended: Effective
Protection for Changing Technology                        10:219

Keilitz, Ingo and Fred M. Greguras
The Computer's Use in Jury Selection and Management: Do
We Need to Wait for Statutory Change?                      6:155

Kemp, Deborah
Limitations Upon the Software Producer's Rights: Vault Corp. v.
Quaid Software Ltd.                                        16:85

Kernochan, John M.
Some Observations on the Protection of Semiconductor Chip
Design                                                    13:287

Kerr, Orin S.
Computers and The Patent System: The Problem of The Second
Step                                                       28:47

Kheit, John
Public Performance Copyrights: A Guide to Public Place
Analysis                                                    26:1

Kidd, Donnie L. Jr. & William H. Daughtrey, Jr.
Adapting Contract Law to Accommodate Electronic Contracts:
Overview and Suggestions                                  26:215

Kim, Gyong Ho and Anna R. Paddon
Cybercommunity Versus Geographical Community Standard for
Online Pornography: A Technological Hierarchy in Judging
Cyberspace Obscenity                                       26:65

Kim, Seong-in & Kim Yun Haeng
A Proposal to Facilitate the Uniform Administration of Justice
in Korea Through the Use of Mathematical Model             4:284

King, Henry R.
Big Brother, the Holding Company: A Review of Key. Escrow
Encryption Technology                                     21:224

Kirby, M.D.
Eight Years to 1984: Privacy and Law Reform                5:487

Korwek, Edward L. & Peter L. de la Cruz
Federal Regulation of Environmental Releases of Genetically
Manipulated Microorganisms                                11:301

Kozachek, James A.
The Future of Toxic Risk Assessment: The Abandonment of Animal
Testing                                                   17:527

Ku, Peter C. equal to] & William L. LaFuze
Mooting Patent Invalidity: Justiciability and the Case of
Cardinal Chemical                                         20:539

LaBar, Wesley
The Modernization of Court Functions: A Review of Court
Management and Computer Technology                          5:97

Lapointe, Markenzy
Universal Service and the Digital Revolution: Beyond the
Telecommunications Act of 1996                             25:61

Laska, Lewis L.
Contracting for Computer Services: A Checklist             2:152

Lastowska, F. Gregory
Free Access and the Future of Copyright                   27:293

Lawlor, Reed C.
Analysis of Disagreements                           Fall 1970:70

Leaheey, J. Bradford and R. Lewis Gable
The Strength of Patent Protection for Computer Products:
The Federal Circuit and the Patent Office Refine the Test
for Determining Which Computer-Related Inventions Constitute
Patentable Subject Matter                                  17:87

Lee, Cheryl R.
Cyberbanking: A New Frontier for Discrimination?          26:277

Lee, Karen M.
The Realities of the MP3 Madness: Are Record Companies Simply
Crying Wolf?.                                             27:131

Lenny, David C.
Copyright Infringement Problems of a Network/Home Cable Record
Selection and Playing System                                5:51

Lentz, David W.
Financing High-Technology: Congress Invests in a Better
Idea                                                       9:209

Levine, Gail F.
B2Bs, E-Commerce & The All-Or-Nothing Deal                28:383

Lipton, Dr. Jacqueline
Copyright in the Digital Age: A Comparative Survey        27:333

Lorr, Richard
Copyright, Computers and Compulsory Licensing              5:149

Lowry, Houston Putnam
Does Computer Stored Data Constitute a Writing for the
Purposes of the Statute of Frauds and the Statute
of Wills?                                                   9:93

MacDonald, David
The Electronic Freedom of Information Act Amendments: A Minor
Upgrade to Public Access Law                              23:357

Mackaay, Ejan
Reflections on the First National Conference on Automated Law
Research                                                   3:310

MacKay, J. Scott
Broderbund Software, Inc. v. Unison World, Inc.: "Look
and Feel" Copyright Protection for the Display Screens of
an Application Microcomputer Program                      13:105

Maertin, Harvey A. and Donald K. Wedding
Foreign Patent Filing: A Computer Approach                  2:71

Maggio, Janice M.
Determination of HDC-ABMT As Accepted Medical Practice for the
Treatment of Breast Cancer                                22:551

Mahon, James V.
A Commentary on Proposals for Copyright Protection on the
National Information Infrastructure                       22:223

Major, April M.
Copyright Law Tackles Yet Another Challenge: The Electronic
Frontier of the Worm Wide Web                              24:75

Malloy, Peter S.
Controls on the Export of Militarily Sensitive Technology:
National Security Imperative or U.S. Industry Impediment  18:841

Mandel, Lawrence D.
Digital Communications Associates, Inc. v. Softklone
Distributing Corp.: Copyright Protection for the Status
Screen of a Computer Program                              15:169

Manor, C. Robert
Living Organisms as Chemical Substances: The EPA's Biotechnology
Policy Under the Toxic Substances Control Act             13:409

Martin, Anne Crawford and Kevin Deasy
Seeking the Balance Between Government and Industry Interests in
Software Acquisition                                      14:159

Massucci, Thomas
Judges Without Chests or Rules Without Traces? The State
Technology, and the Law of "Warrantless Searches"         21:519

Mattice, Alice L. and Richard O. Cunningham
High Technology Imports and the U.S. Countervailing Duty and
Antidumping Laws                                          10:189

Mayer, Stephen
Privacy and the Social Security Number: Section 1211 of the Tax
Reform Act of 1976                                         6:221

McCarty, L. Thorne
Intelligent Legal Information Systems: Problems and
Prospects                                                  9:265

McDaniel, Jay
Electronic Torts and Videotex-At the Junction of Commerce and
Communication                                             18:773

McGahn, Donald F.
Copyright Infringement of Protected Computer Software: An
Analytical Method to Determine Substantial Similarity      21:88

McGraw, David K.
Sexual Harassment in Cyberspace: The Problem of Unwelcome
E-Mail                                                    21:491

McKee, William S.
Computers and the Courts-Recommendations Made to the Courts
Task Force                                                 3:134

Meadows, James E.
Software Protection in Transactions with the Soviet Union 12:133

Meeker, Heather J.
Multimedia and Copyright                                  20:375

Mello, Susan M.
Administering the Antidote to Computer Viruses: A Comment on
United States v. Morris                                   19:259

Meijboom, Alfred P.
Software Protection in "Europe 1992"                      16:407

Meisner, Mary M.
Archival Backup Copying of Software: How Broad a Right?   14:391

Meldman, Jeffrey A.
A Structural Model for Computer-Aided Legal Analysis        6:27

Menard, Brian Paul
And the Shirt off Your Back: Universal City Studios, DECSS, and
the Digital Millennium Copyright Act                      27:371

Mesevage, Thomas
The Carrot and the Stick: Protecting U.S. Intellectual Property
in Developing Countries                                   17:421

Mills, Miriam K.
Luddites at the Terminal and Other Renegades: Computer Generated
Conflict Areas                                            10:115

Misrock, S. Leslie, Brian D. Coggio and Norman C. Dulak
The Exercise of Patent Rights Through Multiple Exclusive
Field-of-Use Licensing                                    11:383

Moore, Gregory E.
Introduction to Symposium on Software Licensing           18:461

Moore, Harold C.
Atari v. Nintendo: Super Mario Uses "Expressive" Security
Feature to "Lock" Out the Competition                     18:919

Moorhead, William S.
Limiting Liability in Electronic Data Processing Service
Contracts                                                  4:141

Morehouse, Ward, David Dembo and Clarence Dias
Biotechnology and the Third World: Some Social, Economic,
Political and Legal Impacts and Concerns                  11:431

Morgan, Richard S.
The Nature of Statute Law or Parliament Speaks in a High Level
Language                                                   3:128

Motyka, Carol A.
Effects of U.S. Adherence to the Berne Convention         16:195

Muir, Bonnie E.
Technology Overtakes Entitlements: New York v. Sullivan   19:517

Naar, Alan S. and Stanley B. Stein
EFTS: The Computer Revolution in Electronic Banking        5:429

Nagel, Stuart S.
Computers: The Law and Politics of Redistricting            2:22

Nagel, Stuart, Kathleen Reinbolt and Thomas Eimermann
A Linear Programming Approach to Problems of Conflicting Legal
Values Like Free Press Versus Fair Trial                   4:420

Ng, Betty
Universal Health Identifier: Invasion of Privacy or Medical
Advancement?                                              26:331

Nimmer, Raymond T.
Uniform Codification of Commercial Contract Law           18:465

Nimmer, Raymond T., Donald A. Cohn & Ellen Kirsch
License Contracts Under Article 2 of the Uniform Commercial
Code: A Proposal                                          19:281

Nimtz, Robert O.
Diamond v. Diehr: A Turning Point                          8:267

Nimtz, Robert O.
The Patentability of Computer Programs            Spring 1970:38

Nolan, Herbert
Moving Business Data is Big Business                 Fall 1970:2

North, Geoffrey A.
Carnivore In Cyberspace: Extending The Electronic Communications
Privacy Act's Framework To Carnivore Surveillance         28:155

Novick, Mitchell P. and Helene Wallenstein
The Algorithm and Computer Software Patentability: A Scientific
View of a Legal Problem                                    7:313

Nycum, Susan
Liability for Malfunction of a Computer Program              7:1

Nycum, Susan Hubbell
The Criminal Law Aspects of Computer Abuse Part L State Penal
Laws, Part IL Federal Criminal Code                 5:271, 5:297

Nydegger, Rick D.
Practical and Legal Considerations in Drafting a U.S. Patent
Application for Computer-Related Inventions               18:109

Olson, Eric W.
Galoob v. Nintendo: Subject Matter Fixation and Consumer Fair
Use Define the Scope of Copyright Protection for
InteroperableWorks                                        18:879

Orchanian, Paul L.
Effective Use of Computers in Government          Spring 1970:98

Overstreet, Keith A.
Copyrightable Expression in the User Interface of a Computer
Program: Lotus Development Corporation v. Paperback Software
International                                             18:941

Pape, Christopher D.
Stop Payment in the New Uniform Payments Code              9:353

Pappas, Nicholas J.
In Defense of Monopoly Cable Television Franchising: Defining
the First Amendment Rights Of The Public and the Cable Operator
Under The Public Forum Doctrine and Natural Monopoly Theory
                                                          13:137

Parsonage, William H., Fred W. Vondracek & Hugh B. Urban
Conceptualization and Development of a Computer Assisted
Diagnostic and Prescriptive System for Juvenile Delinquents 4:86

Pedersen, Robin L.
West Publishing Co. v. Mead Data Central, Inc. (LEXIS)    14:359

Penn, Melissa
Legal Lines: Establishing a Personal Injury Case against a New
Jersey Utility for Harm Caused by Electromagnetic Fields  20:663

Perez, Nelson
The Unconstitutionality of Waste Flow Control and the
Environmental Justice Movement's Impact on Incinerators   22:587

Perritt, Henry H., Jr.
Artificial Intelligence Techniques for Evaluating Employee
Terminations on a Personal Computer                       13:341

Perritt, Henry H., Jr.
Legal and Technological Infrastructures for Electronic Payment
Systems                                                     22:1

Perry, Ronald F., Larry J. Siegel, Romine R. Deming & Stewart V.
Hoover
An Information Feedback Model for Probation Treatment Selection
and Evaluation                                             6:197

Petras, Dorothy D. and Susan Scarpelli
Computers, Medical Malpractice, and the Ghost of the T.J.
Hooper                                                      5:15

Plaia, Paul, Jr. and Joel D. Kaufman
Section 337 of the Tariff Act of 1930, As Amended: Effective
Protection for Changing Technology                        10:219

Plishner, Michael J.
"It's None of Your Business." Or Is It? California Addresses the
Computer Age                                               8:235

Polizzi, Catherine M.
A New View Into the Truth: Impact of a Reliable Deception
Detection Technology on the Legal System                  21:395

Pollack, Malla
The Multiple Unconstitutionality of Business Method Patents:
Common Sense, Congressional Consideration, And Constitutional
History                                                    28:61

Porter, John 1. and Robert G. Torricelli
Toward the 1980 Census: The Reapportionment of New Jersey's
Congressional Districts                                    7:135

Prasinos, Nicholas
Worldwide Protection of Computer Programs by Copyright      4:42

Prebut, David S.
State and Local Taxation of Electronic Commerce: The Forging of
Cyberspace Tax Policy                                     24:345

Pritchard, John L.
The Tax Treatment of Research and Development Expenditures: A
Comparison Between Financial Accounting Standards and Section
174 of the Internal Revenue Code                          10:149

Prutzman, Deborah S.
CHIPS and the Proposed Uniform New Payments Code            10:1

Quinn, Eugene R. Jr.
The Proliferation of Electronic Commerce Patents: Don't Blame
the PTO                                                   28:121

Rabin, Sander Marc
Computerized Marketing and Competition: Some Antitrust
Considerations                                             4:407

Raysman, Richard
Warranty Disclaimer in the Data Processing Contract        6:265

Reinbolt, Kathleen, Stuart Nagel and Thomas Eimermann
A Linear Programming Approach to Problems of Conflicting Legal
Values Like Free Press Versus Fair Trial                   4:420

Reynolds, Glenn H.
Legislative Comment: The Omnibus Space Commercialization
Act of 1993                                               20:581

Reznick, Allan E.
Synercom Technology, Inc. v. University Computing Co.: Copyright
Protection for Computer Formats and the Idea/Expression
Dichotomy                                                   8:65

Rice, David A.
Computer Related Decisions Under UCC Article 2: Lessons for the
Article 2 Revision and Software Contract Statute Drafters About
Realities of Contract                                     18:499

Rice, David A.
Whither (No Longer Whether) Software Copyright            16:341

Robbins, Virginia C.
United States v. Karo, Comment                            12:169

Roberts, Willis F.
The Use of the Legal Cadastre in the Maritime Provinces of
Canada                                                     5:121

Roddy, John
The Federal Computer Systems Protection Act                7:343

Roditti, Esther C.
Is Self-Help a Lawful Contractual Remedy?                 21:431

Root, Joseph E., III
Protecting Computer Software in the '80's: Practical Guidelines
for Evolving Needs                                         8:205

Rosales, Geraldine P.
Mainstream Loudoun and the Future of Internet Filtering for
America's Public Libraries                                26:357

Rose, Deborah A.
Changing Relationships in Technology Transfer to the Third
World: Case Study of Biotechnology in Agriculture         11:531

Rose, Jonathan
E-Mail Security Risks: Taking Hacks at the Attorney-Client
Privilege                                                 23:179

Rose, Lance
End-User Licensees of Computer Programs-Are They Allowed to
Compete With Their Licensors?                             13:297

Rosenfeld, Susan C.
Sharing of Research Results in a Federally Sponsored Gene
Mapping Project                                           14:311

Ross, Susan Dente
A Decade After Divestiture: Regional Bells, Video Programming
and the First Amendment                                   21:143

Roth, Alan W.
Videotape in the Courts: Its Use and Potential             3:279

Rudnick, Robert E.
Manufacturers Technologies, Inc. v. CAMS, Inc.: A False Hope for
Software Developers Seeking Copyright Protection for Their
Generated Screen Displays                                 17:211

Saez, Carolina
Enforcing Copyrights in the Age of Multimedia             21:351

Sales, Jeanmarie T.
The Drug Export Amendment Act of 1986                     15:475

Samuelson, Pamela
Digital Media and the Changing Face of Intellectual Property
Law                                                       16:323

Samuelson, Pamela
Understanding the Implications of Selling Rights in Software to
the Defense Department: A Journey Through the Regulatory
Maze                                                       13:33

Sardinas, Joseph L. and Jerome S. Horvitz
Impeachment of Government Systems Documentation for Taxpayers
Classified as Non-Filers                                    6:73

A Logic for the Analysis of Collateral Estoppel            12:99
Scarpelli, Susan, and Dorothy D. Petras
Computers, Medical Malpractice and the Ghost of the T.J.
Hooper                                                      5:15

Schachter, Esther Roditti
Techniques For Litigation Avoidance in Contracting For Computer
Systems                                                   10:109

Schallop, Michael Joel
Software Patent Applications Directed to Business and
Mathematical Processing Applications Highlight the Tension
Between State Street and Benson                            26:89

Schartum, Dag Wiese and Jon Bing
Automated Systems and Claim Realization in Social Security
Organizations                                              12:83

Scheinfeld, Robert C. and Gary M. Butter
Using Trade Secret Law to Protect Computer Software       17:381

Scheurer, Kirsten
The Clipper Chip: Cryptography Technology and the Constitution
-- The Government's Answer to Encryption "Chips" Away at
Constitutional Rights                                     21:263

Schier, Cecelia A.
Technological Trade with the Former Eastern Bloc: The Evolution
of Export Control and Its Relationship to Structural Trade
Barriers                                                  19:223

Schwartzstein, Linda A.
Legal Education, Information Technology and Systems
Analysis                                                   13:59

Schwetje, F. Kenneth
Space Law: Considerations for Space Planners              12:245

Scott, Susan & Lynne A. Anderson
Admissibility of Scientific Evidence: Proposed Implementation of
the Guidelines of Daubert and Landrigan Under the Newly Adopted
New Jersey Rules of Evidence                                20:1

Seipel, Peter
Introducing Law Students to Computers: Swedish
Experiences                                       Spring 1970:88

Sheth, Pankaj S. and Sidney W. Hess
Multiple Criteria in Political Redistricting: Development of
Relative Values                                             2:44

Siegel, Andrew J. and Marc S. Friedman
From Flour Barrel To Computer Systems: The Applicability of
Theories of Alternative Liability to Shift the Burdens of Proof
in Cases of Intermingled Causation and Damages Within a Modern
Computer Scenario                                         14:289

Siegel, Larry J., Romine R. Deming, Ronald F. Perry and Stewart
V. Hoover
An Information Feedback Model for Probation Treatment Selection
and Evaluation                                             6:197

Silver, David
A Case Against the Use of Public Opinion Polls as an Aid in Jury
Selection                                                  6:177

Silverstein, David
Patents, Science and Innovation: Historical Linkages and
Implications for Global Technological Competitiveness     17:261

Singer, Paula Noyes
Proposed Changes to the Federal Rules of Evidence as Applied to
Computer-Generated Evidence                               17:157

Singh, Kulpreet
The FCC's Pioneer's Preference Policy: An Innovative Idea Grows
Old and Weary                                             22:143

Singh, Sanjiv N.
Cyberspace: A New Frontier for Fighting Words             25:283

Siver, Keith
Good Samaritans in Cyberspace                               23:1

Slawsky, Albert A.
Case Comment: Monopoly-Relevant Market Telex v. IBM        5:171

Slivka, R.T. and J.W. Darrow
Methods and Problems in Computer Security                  5:217

Smithson, Stephen W.
The Department of the Interior Should Incorporate Current Water
Body Modeling Techniques in the Natural Resource Damage
Assessment Model for Coastal and Marine Environments      20:701

Sokasits, David A.
The Long Arm of the Fax: Service of Process Using Fax
Machines                                                  16:531

Soltysinski, Stanislaw J.
Computer Programs and Patent Law: A Comparative Study        3:1

Soltysinski, Stanislaw J.
Legal Protection for Computer Programs, Public Access to
Information and Freedom of Competitive Research and Development
Activities                                                16:447

Soma, John T. & Charles P. Henderson
Encryption, Key Recovery, and Commercial Trade Secret Assets: A
Proposed Legislative Model                                 25:97

Soma, John T. and Andrea R. Stem
A Survey of Computerized Information For Lawyers: LEXIS, JURIS,
WESTLAW and FLITE                                          9:295

Soma, John T., Gus Winfield and Letty Friesen
Software Interoperability and Reverse Engineering         20:189

Soobert, Allan M.
Analyzing Infringement by Equivalents: A Proposal to Focus the
Scope of International Patent Protection                  22:189

Smith, Milton L. III
The Orbit/Spectrum Resource and the Technology Of Satellite
Telecommunications: An Overview                           12:285

Sporn, Jessica
Content Regulation of Cable Television: "Indecency" Statutes and
the First Amendment                                       11:141

Staggs, H. Bradley
Lessors of Computer Equipment: Do They Receive Fair Treatment
Under the Bankruptcy Code                                  15:81

Stein, Stanley B. and Alan S. Naar
EFTS: The Computer Revolution in Electronic Banking        5:429

Stern, Andrea R. and John T. Soma
A Survey of Computerized Information For Lawyers: LEXIS, JURIS,
WESTLAW and FLITS                                          9:295

Stern, Laurence C.
Medical Information Bureau: The Life Insurer's Databank      4:1

Stern, Richard H.
Copyright in Computer Programming Languages               17:321

Stem, Richard H.
Shrink-Wrap Licenses of Mass Marketed Software: Enforceable
Contracts or Whistling in the Dark?                        11:51

Stevens, George E. and Harold M. Hoffman
Tort Liability for Defamation by Computer                   6:91

Stevens, Scott J. and Douglas K. Wolfson
You Can Bank On It: An Analysis of Judicial Branch Bank
Characterization and an Alternative Proposal               5:389

Stroger, Howard M.
The Use of Electronic Data Processing Equipment in Law Office
Management and Fiscal Control                     Spring 1970:82

Susswein, Linda
The Patent Law Equivalency Doctrine and Reduced Instruction Set
Computing Technology: If It Computes Like a Duck, Is It Still a
Duck?                                                     16:571

Takenaka, Toshiko
Doctrine of Equivalents After Hilton Davis: A Comparative Law
Analysis                                                  22:479

Tapper, Colin
Evidence From Computers                                    4:324

Thatch, David
Personal Jurisdiction and the World-Wide Web: Bits (and Bytes)
of Minimum Contacts                                       23:143

Toedt, D.C. III
The Model Software License Provisions: Precursor to a
Gap-Filling Uniform License Statute?                      18:521

Tomasello, Frank A., Jr.
Regulation of Amateur Radio Antenna Height, Restrictive
Covenants and Local Regulation: Is the Ham's Goose
Cooked?                                                   16:227

Torricelli, Robert G. and John I. Porter
Toward the 1980 Census: The Reapportionment of New Jersey's
Congressional Districts                                    7:135

Tramontana, James
Computer Viruses: Is There a Legal "Antibiotic"?          16:253

Tunick, David
Legal Advice for a Company Hiring Computer Programmers from
Another Company                                           19:405

Tyree, Alan L.
Can a "Deterministic" Computer Judge Overrule Himself      7:381

Urban, Hugh B., Fred W. Vondracek, and William H. Parsonage
Conceptualization and Development of a Computer Assisted
Diagnostic and Prescriptive System for Juvenile
Delinquents                                                 4:86

Vergari, James V.
A Critical Look at the New Uniform Payments Code           9:317

Vergari, James V.
Evidential Value and Acceptability of Computer Digital-Image
Printouts                                                  9:343

Volonino, Linda and Adolph C. Iannaccone
Marginal Cost and Relevant Market Determination in Information
Technology Antitrust Cases                                18:681

Vondracek, Fred W., Hugh B.Urban and William H. Parsonage
Conceptualization and Development of a Computer Assisted
Diagnostic and Prescriptive System for Juvenile Delinquents 4:86

Wall, Rosemary Pierce
International Trends in New Drug Approval Regulation: The Impact
on Pharmaceutical Innovation                              10:317

Wallenstein, Helene and Mitchell P. Novick
The Algorithm and Computer Software Patentability: A Scientific
View of a Legal Problem                                    7:313

Walter, Charles
Defining the Scope of Software Copyright Protection For Maximum
Public Benefit                                             14:01

Walterscheid, Edward C.
Access to Federally Funded Research Data Under the Freedom of
Information Act                                             15:1

Walton, Kenneth R.
The Use of Evidence Extrinsic to a Single Source to Support
Anticipation                                              20:339

Ward, David
Sisyphean Circles: The Communications Assistance for Law
Enforcement Act                                           22:267

Warner, David R., Jr.
A Neural Network-Based Law Machine: Initial Steps          18:51

Warner, David R., Jr.
The Role of Neural Networks in the Law Machine
Development                                               16:129

Warner, Richard Stephen D. Sowle & Will Sadler
Teaching Law With Computers                               24:107

Wedding, Donald K. and Harvey R. Maertin
Foreign Patent Filing: A Computer Approach                  2:71

Wegner, Harold C.
Equitable Equivalents: Weighing the Equities to Determine
Patent Infringement in Biotechnology and Other Emerging
Technologies                                                18:1

Wensman, Michael J.
Federal Tax Treatment of Software Development Expenses: Is the
I.R.S. Position Outdated?                                   9:77

Wessel, Milton R.
The Computer Revolution: A Challenge to the Law Schools-and a
Dream                                                      3:180

Wessel, Milton R.
The Incremental Marketing of Computer Services and the "Tie-In"
Sale-A Case for Presuming Coercion                         2:135

Wessel, Milton R.
Telez v. IBM: Another Viewpoint                              5:1

Whealan, David W.
Atlantic Thermoplastics v. Faytex: The Federal Circuit Debate
Over the Scope of Product-by-Process Claims               20:633

White, Charles H., Jr.
Shared Computing: An Attorney's
"Need to Know"                                    Spring 1970:63

Wiggins, Noreen M.
The Intellectual Property Bankruptcy Act: The Legislative
Response to Lubrizol Enterprises, Inc. v. Richmond Metal
Finishers, Inc                                            16:603

Willick, Marshal S.
Professional Malpractice and the Unauthorized Practice of
Professions: Some Legal and Ethical Aspects of the Use of
Computers as Decision-Aids                                  12:1

Wilson, Dolores Y.P.
Computerization of Welfare Recipients: Implications for the
Individual and the Right to Privacy                        4:163

Winston, Michael
The Commerce Clause and State Programs Aimed at Encouraging the
Development of High-Technology Industries                  11:17

Wintringham, Drew M. and Thomas C. Creel
Patent Systems and Their Role in the Technological Advance of
Developing Nations                                        10:255

Wolfson, Douglas K.
From the Legislature: An Overview of the Report of the National
Commission on Electronic Fund Transfer Systems             6:103

Wolfson, Douglas K. and Scott J. Stevens
You Can Bank On It.: An Analysis of Judicial Branch Bank
Characterization and an Alternate Proposal                 5:389

Wormser, David A.
Licensing Computer-Related Exports                        10:233

Wozniak, Catharine Cookson
Nonpoint Source Water Pollution and the Imposition of Effluent
Limitations on Point Sources                               8:117

Yanow, Lilli A.
Copying, The Reconciliation of Conflicting Interests: An
Analysis of Williams & Wilkins Co. v. United States        3:328

Young, Andrew J.
Legal and Techno-Political Implications of the Use of Nuclear
Power Sources in Outer Space                              12:305

Yuckman, David A.
The National Public Radio Satellite System: FCC Jurisdiction
Over a New Communications Technology                       8:135

Yures, Edward M.
Gambling on the Internet: The States Risk Playing Economic
Roulette As the Internet Gaming Industry Spins Onward     28:193

Zinman, Marion J.
Computer Arbitration: The Program of the Future           10:103

TITLE INDEX TO
BOOK AND ARTICLE REVIEWS

Bernacchi on Computer Law: A Guide to the Legal and Management
Aspects of Computer Technology
Richard L. Bernacchi, Peter B. Frank and Norman Statland (Jordan
M. Blanke)                                                13:237

Computer Crime: A Review of Cyberpunk
Katie Hafner and John Markoff (Robert D. Sprague)         18:439

Computer Law Cases and Materials
Seth E. Lipner and Stephen Kalman (Marc S. Friedman)      16:285

Computer Law: Drafting and Negotiating Forms and Agreements
Richard Raysman and Peter Brown (Emmette F. Hale, III)    13:243

Computer Law: Evidence and Procedure
David Bender (Chris Rillo)                                 7:247

Computer Law: Software Protection and Litigation
David Bender (John C. Connell)                            12:203

Computer Law and Tax Report
Robert P. Bigelow (Laurence C. Stern)                      5:183

Computer Research and Legal Reasoning: A Case Study of Judicial
Decision Prediction in Zoning Amendment Cases, 1977 American Bar
Foundation Research Journal 655
Haar, Sawyer and Cummings (William Manns)                  7:251

Computer Software: Contracting for Development and Distribution
Mark L. Gordon (James J. Marcellino)                      13:559

Computers in the Information Society
Nathan Weinberg (Robert D. Sprague)                        17:25

Computers for Lawyers: A Report to the Scottish Legal Computer
Research Trust
W. Aitken, C.M. Campbell and R.S. Morgan (Bonnie Daniels)  3:152

Computers and Political Campaigning
Robert L. Chartrand (Paul R. Kurland)                      3:345

Computing Law
Peter Seipel (Dan Reiss)                                   6:297

Copyright for the Eighties: Cases and Materials
A. Latman, R. Gorman and J. Ginsburg (Marshall A.
Leafier)                                                  14:285

Data Banks and Society: The First International Oslo Symposium
on Data Banks and Privacy
(James C. Baxendale)                                       2:242

Data Processing Contracts and the Law
Richard L. Bernacchi and Gerald H. Larsen (Richard McGill) 4:462

Databanks in a Free Society: Computers, Record-Keeping and
Privacy
Alan F. Westin (Colin Tapper)                              3:155

Decompilation & European Protection of Computer Programs: A
Review of Legal Protection of Computer Programs in Europe:
A Guide to the EC Directive
Bridget Czamota & Robert J. Hart (Anthony C. Clapes)      20:329

The Equity Funding Papers: The Anatomy of a Fraud
Lee J. Seidler, Frederick Andrews and Marc J. Epstein
(Frank Leanza)                                             6:300

Expert Systems In Law; A Jurisprudential Inquiry
Richard E. Susskind (Mary J. Hildebrand)                  15:505

Formalism in AI and Computer Science
Philip Leith (Louis Giansante)                            17:555

Government Regulation of the Computer Industry
Bruce Gilchrist and Milton R. Wessel (Robert K. Hood)      2:246

The Patentability of Computer Software: An International
Guide to the Protection of Computer Related Inventions
Dr. H.W.A.M. Hanneman (James R. Merritt)                  13:565

Regulation of Broadcast
Douglas H. Ginsburg (David A. Yuckman)                     7:389

Science and Conscience: Improving Socio-Scientific Dispute
Resolution Milton R. Wessel (Louis A. Novellino)           8:363

Software Protection: Practical and Legal Steps to Protect and
Market Computer Programs
G. Gervaise Davis, III (David A. Rice)                    12:471

Users' Guide to Computer Crime: Its Commission, Detection, and
Prevention
Stephen W. Liebholz and Louis D. Wilson (Robert L.
Walker)                                                    5:503

Using Computers In The Law, An Introduction and Practical
Guide Mary Ann Mason (Geoffrey McC. Johnson)              15:499

Your Computer and the Law
Robert P. Bigelow and Susan H. Nycum (Maria Metzler Johns  6:113

AUTHOR INDEX TO
BOOK AND ARTICLE REVIEWS

Aitken, W., C.M. Campbell and R.S. Morgan
Computers for Lawyers: A Report to the Scottish Legal Computer
Research Trust (Bonnie Daniels)                            3:152

Andrews, Frederick, Lee J. Seidler and Marc J. Epstein
The Equity Funding Papers: The Anatomy of a Fraud
(Frank Leanza)                                             6:300

Bender, David
Computer Law: Evidence and Procedure (Chris Rillo)         7:247

Bender, David
Computer Law.' Software Protection and Litigation
(John C. Connell)                                         12:203

Bemacchi, Richard L. and Gerald H. Larsen
Data Processing Contracts and the Law (Richard McGill)     4:462

Bernacchi, Richard L., Peter B. Frank and Norman Statland
Bernacchi on Computer Law: A Guide to the Legal and Management
Aspects of Computer Technology (Jordan M. Blanke)         13:237

Bigelow, Robert P.
Computer Law and Tax Report (Laurence C. Stern)            5:183

Bigelow, Robert P. and Susan H. Nycum
Your Computer and the Law (Maria Metzler Johnson)          6:113

Brown, Peter and Richard Raysman
Computer Law: Drafting and Negotiating Forms and Agreements
(Emmette F. Hale, 111)                                    13:243

Campbell, C.M., W. Aitken, and R.S. Morgan
Computers for Lawyers: A Report to the Scottish Legal Computer
Research Trust (Bonnie Daniels)                            3:152

Chartrand, Robert L.
Computers and Political Campaigning (Paul R. Kurland)      3:345

Cummings, Haar, & Sawyer
Computer Research and Legal Reasoning: A Case Study of Judicial
Decision Prediction in Zoning Amendment Cases, 1977 American Bar
Foundation Research Journal 655 (William Manns)            7:251

Czarnota, Bridget & Robert J. Hart
Decompilation & European Protection of Computer Programs: A
Review of Legal Protection of Computer Programs in Europe: A
Guide to the EC Directive (Anthony C. Clapes)             20:329

Davis, G. Gervaise, III
Software Protection: Practical and Legal Steps to Protect and
Market Computer Programs (David A. Rice)                  12:471

Epstein, Marc J., Lee J. Seidler and Frederick Andrews
The Equity Funding Papers: The Anatomy of a Fraud
(Frank Leanza)                                             6:300

Frank, Peter B., Richard L. Bernacchi, and Norman Statland
Bernacchi on Computer Law: A Guide to the Legal and Management
Aspects of Computer Technology (Jordan M. Blanke)         13:237

Gilchrist, Bruce and Milton R. Wessel
Government Regulation of the Computer Industry
(Robert K. Hood)                                           2:246

Ginsburg, Douglas H.
Regulation of Broadcast (David A. Yuckman)                 7:389

Ginsburg, J., A. Latman and R. Gorman
Copyright for the Eighties: Cases and Materials
(Marshall A. Leaffer)                                     14:285

Gordon, Mark L.
Computer Software: Contracting for Development and Distribution
(James J. Marcellino)                                     13:559

Haar, Sawyer and Cummings
Computer Research and Legal Reasoning: A Case Study of Judicial
Decision Prediction in Zoning Amendment Cases, 1977 American Bar
Foundation Research Journal 655 (William Manns)            7:251

Hafner, Katie and John Markoff
Computer Crime: A Review of Cyberpunk (Robert D. Sprague) 18:439

Hanneman, H.W.A.M.
The Patentability of Computer Software: An International Guide
to the Protection of Computer Related Inventions (James R.
Merritt)                                                  13:565

Kalman, Stephen and Seth E. Lipner
Computer Law Cases and Materials (Marc S. Friedman)       16:285

Larsen, Gerald H. and Richard L. Bernacchi
Data Processing Contracts and the Law (Richard McGill)     4:462

Leith, Philip
Formalism in AI and Computer Science (Louis Giansante)    17:555

Liebholz, Stephen W. and Louis D. Wilson
Users' Guide to Computer Crime: Its Commission, Detection, and
Prevention (Robert L. Walker)                              5:503

Lipner, Seth E. and Stephen Kalman
Computer Law Cases and Materials (Marc S. Friedman)       16:285

Markoff, John and Katie Hafner
Computer Crime: A Review of Cyberpunk (Robert D. Sprague) 18:439

Mason, Mary Ann
Using Computers In The Law, An Introduction and Practical Guide
(Geoffrey McC. Johnson)                                   15:499

Morgan, R.S., W. Aitken, and C.M. Campbell
Computers for Lawyers: A Report to the Scottish Legal Computer
Research Trust (Bonnie Daniels)                            3:152

Nycum, Susan H. and Robert P. Bigelow
Your Computer and the Law (Maria Metzler Johnson)          6:113

Raysman, Richard and Peter Brown
Computer Law: Drafting and Negotiating Forms and Agreements
(Emmette F. Hale, III)                                    13:243

Sawyer, Haar and Cummings
Computer Research and Legal Reasoning: A Case Study of Judicial
Decision Prediction in Zoning Amendment Cases, 1977 American Bar
Foundation Research Journal 655 (William Manns)            7:251

Seidler, Lee J., Frederick Andrews and Marc J. Epstein
The Equity Funding Papers: The Anatomy of a Fraud
(Frank Leanza)                                             6:300

Seipel, Peter
Computing Law (Dan Reiss)                                  6:297

Statland, Norman, Richard L. Bernacchi and Peter B. Frank
Bernacchi on Computer Law: A Guide to the Legal and Management
Aspects of Computer Technology (Jordan M. Blanke)         13:237

Susskind, Richard E.
Expert Systems In Law; A Jurisprudential Inquiry
(Mary J. Hildebrand)                                      15:505

Weinberg, Nathan
Computers in the Information Society (Robert D. Sprague)  17:251

Wessel, Milton R.
Science and Conscience: Improving Socio-Scientific Dispute
Resolution (Louis A. Novellino)                            8:363

Wessel, Milton R. and Bruce Gilchrist
Government Regulation of the Computer Industry
(Robert K. Hood)                                           2:246

Westin, Alan F.
Databanks in a Free Society: Computers, Record-Keeping and
Privacy (Colin Tapper)                                     3:155

Wilson, Louis D. and Stephen W Liebholz
Users' Guide to Computer Crime: Its Commission, Detection, and
Prevention (Robert L. Walker)                              5:503
COPYRIGHT 2003 Rutgers University School of Law - Newark
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 2003 Gale, Cengage Learning. All rights reserved.

 Reader Opinion

Title:

Comment:



 

Article Details
Printer friendly Cite/link Email Feedback
Publication:Rutgers Computer & Technology Law Journal
Date:Jun 22, 2003
Words:13686
Previous Article:Thirty-fifth selected Bibliography on computers, technology and the law (January 2002 through December 2002).
Next Article:Pornography, community and the Internet - freedom of speech and obscenity on the Internet.


Related Articles
Mississippi and the Publications of the State Academies of Science.
Annual review of biophysics and biomolecular structure; v.34, 2005.
Annual review of nutrition; v.25, 2005.
Annual Review of Environment and Resources: v.30, 2005.
Advances in photochemistry; v.29.
Annual review of environment and resources; v.31, 2006.
Annual review of biomedical engineering; v.9, 2007.
CARING Newsletter indexed in CINAHL.
Annual review of anthropology; v.36, 2007.
A cumulative index to volumes I-VI of Paul Oskar Kristeller's Iter italicum; accedunt alia itinera: A finding list of uncatalogued or incompletely...

Terms of use | Copyright © 2014 Farlex, Inc. | Feedback | For webmasters