Printer Friendly

Cumulative index volumes 1 through 28: title indexto leading articles and features.

TITLE INDEX
TO LEADING ARTICLES AND FEATURES

Access to Federally Funded Research Data Under the Freedom of
Information Act
Edward C. Walterscheid                                      15:1

Adapting Contract Law to Accommodate Electronic Contracts:
Overview and Suggestions
Donnie L. Kidd, Jr. and William H. Daughtrey              26:215

Administering the Antidote to Computer Viruses: A Comment on
United States v. Morris
Susan M. Mello                                            19:259

Administering of Scientific Evidence: Proposed Implementation
of the Guidelines of Daubert and Landrigan Under the Newly
Adopted New Jersey Rules of Evidence
Susan Scott & Lynne A. Anderson                             20:1

The Algorithm and Computer Software Patentability: A Scientific
View of a Legal Problem
Mitchell P. Novick & Helene Wallenstein                    7:313

American Implications of Sentencing by Computer
Roberta L. Jacobs                                          4:302

Analysis of Disagreement
Reed C. Lawlor                                      Fall 1970:70

Analyzing Infringement by Equivalents: A Proposal to Focus the
Scope of International Patent Protection
Allan M Soobert                                           22:189

An Anomaly in the Patent System: The Uncertain Status of
Computer Software
Linda Nell Flewellen                                       8:273

And the Shirt off Your Back: Universal City Studios, DECSS, and
the Digital Millennium Copyright Act
Brian Paul Menard                                         27:371

Anti-Dumping Policy of the European Community and the Growing
Spectre of Protectionism in Technology Related Goods
Stuart A. Christie                                        16:475

Antitrust Enforcement in Electronic B2B Marketplaces: An
Application of Oligopoly Theory and Modern Evidence Law
Gabriel Hertzberg                                         28:463

Apples & Oranges: Reverse Engineering as a Fair Use After
Atari v. Nintendo and Sega v. Accolade
Christopher W. Hager                                      20:259

Application of Article Two of the Uniform Commercial Code to
Computer System Acquisitions
Robert A. Holmes                                             9:1

Archival Backup Copying of Software: How Broad a Right?
Mary A. Meisner                                           14:391

Artificial Intelligence Techniques for Evaluating Employee
Terminations on a Personal Computer
Henry H. Perritt, Jr.                                     13:341

Arzberger Under the Microscope: A Critical Reexamination of the
Exclusion of Bacteria from Plant Patent Protection
Iver P. Cooper                                             7:367

Assaying Computer Associates v. Altai: How Will the
"Golden Nugget" Test Pan Out?
Walter A. Effross                                           19:1

Atari v. Nintendo: Super Mario Uses "Expressive" Security
Feature to "Lock" Out the Competition
Harold C. Moore                                           18:919

An Automated Approach to Scientific Codification
Cary G. DeBessonet                                          9:27

An Automated Intelligent System Based on a Model of a Legal
System
Cary G. DeBessonet                                         10:31

Automated Systems and Claim Realization in Social Security
Organizations
Jon Bing & Dag Wiese Schartum                              12:83

B2Bs, E-Commerce & The All-Or-Nothing Deal
Gail F. Levine                                            28:383

The Bank-Customer Relationship in an Electronic Credit Transfer
System
John J. Clarke                                               2:1

Beyond the Neighborhood Drugstore: U.S. Regulation of Online
Prescription Drug Sales by Foreign Businesses
Ivette P. Gomez                                           28:431

Big Brother, the Holding Company: A Review of Key-Escrow
Encryption Technology
Henry R. King                                             21:224

Biotechnology Development and Transfer: Recommendations for an
Integrated Policy
Reid G. Adler                                             11:469

Biotechnology and Patent Law: Fitting Innovation to the
Procrustean Bed
Dan L. Burk                                                 17:1

Biotechnology and the Third World: Some Social, Economic,
Political and Legal Impacts and Concerns
David Dembo, Clarence Dias & Ward Morehouse               11:431

A Brief Defense of Mass Market Software License Agreements
Robert W. Gomulkiewicz & Mary L. Williamson               22:335

Broderbund Software, Inc v. Unison World, Inc.: "Look and Feel"
Copyright Protection for the Display Screens of an Application
Microcomputer Program
J. Scott MacKay                                           13:105

Can a "Deterministic" Computer Judge Overrule Himself
Alan L.'Iyree                                              7:381

The Canadian Computer Software Copyright Law: One Small Step for
U.S. Software Vendors
Susan J. Bahr                                             17:139

Carnivore In Cyberspace: Extending The Electronic Communications
Privacy Act's Framework To Carnivore Surveillance
Geoffrey A. North                                         28:155

The Carrot and the Stick: Protecting U.S. Intellectual Property
in Developing Countries
Thomas Mesevage                                           17:421

A Case Against the Use of Public Opinion Polls as an Aid in Jury
Selection
David Silver                                               6:177

Case Comment: Monopoly-Relevant Market Telex v. IBM
Albert A. Slawsky                                          5:171

The Case for Limited Use of Polls in the Jury Selection Process
John A. Cannito & K.L. Becker                              7:111

Catching Jellyfish in the Internet: The Public-Figure Doctrine
and Defamation on Computer Bulletin Boards
Thomas D. Brooks                                          21:461

Changing Relationships in Technology Transfer to the Third
World: Case Study of Biotechnology in Agriculture
Deborah A. Rose                                           11:531

CHIPS and the Proposed Uniform New Payments Code
Deborah S. Prutzman                                         10:1

The Clipper Chip: Cryptography Technology and the
Constitution-the Government's Answer to Encryption "Chips" Away
at Constitutional Rights
Kirsten Scheurer                                          21:263

A Commentary on Proposals for Copyright Protection on the
National Information Infrastructure
James V. Mahon                                            22:233

The Commerce Clause and State Programs Aimed at Encouraging the
Development of High-Technology Industries
Michael Winston                                           11:171

Commercial Banking and the Checkless Society
James C.L. Baxendale                                Fall 1970:88

The Computational Complexity of Automated Redistricting: Is
Automation the Answer?
Micah Altman                                               23:81

Computer Arbitration: The Program of the Future
Marion J. Zinman                                          10:103

Computer Malpractice-A New Tort on the Horizon?
Sue Ganske Graziano                                       17:177

Computer Programs and Patent Law: A Comparative Study
Stanislaw J. Soltysinski                                     3:1

Computer Programs and Subject Matter Patentability
Harold L. Davis                                              6:1

Computer Related Decisions Under UCC Article 2: Lessons for the
Article 2 Revision and Software Contract Statute Drafters About
Realities of Contract
David A. Rice                                             18:499

The Computer Revolution: A Challenge to the Law Schools-And a
Dream
Milton R. Wessel                                           3:180

Computer Technology (Hardware and Software): Some Legal
Implications for Antitrust, Copyrights and Patents
Morton C. Jacobs                                    Fall 1970:50

Computer Viruses: Is There a Legal "Antibiotic?"
James Tramontana                                          16:253

Computerization of Welfare Recipients: Implications for the
Individual and the Right to Privacy
Dolores Y.P. Wilson                                        4:163

Computerized Marketing and Competition: Some Antitrust
Considerations
Sander Marc Rabin                                          4:407

Computers and Case Law
James P. Chandler                                          3:202

Computers and Communications: Public Policy at the Crossroads
Manley R. Irwin                                     Fall 1970:35

Computers and Redistricting: A Plea for Realism
Robert G. Dixon, Jr                                         2:15

Computers and the Courts-Recommendations Made to the Courts Task
Force
William S. McKee                                           3:134

Computers and The Patent System: The Problem of The Second Step
Orin S. Kerr                                               28:47

Computers, Medical Malpractice, and the Ghost of the T.J. Hooper
Dorothy D. Petras & Susan Scarpelli                         5:15

Computers: The Law and Politics of Redistricting
Stuart S. Nagel                                             2:22

The Computer's Use in Jury Selection and Management: Do We Need
to Wait for Statutory Change?
Fred M. Greguras & Ingo Keilitz                            6:155

Conceptualization and Development of a Computer Assisted
Diagnostic and Prescriptive System for Juvenile Delinquents
Fred W. Vondracek, Hugh B. Urban, William H. Parsonage      4:86

Congress: The Three-Dimensional Chessboard-The Role of
Information Technology
Robert L. Chartrand                               Spring 1970:50

Consent and Organ Donation
Steven M. Cooper                                          11:559

Content Regulation of Cable Television: "Indecency" Statutes and
the First Amendment
Jessica Sporn                                             11:141

Contracting for Computer Services: A Checklist
Lewis L. Laska                                             2:152

Controls on the Export of Militarily Sensitive Technology:
National Security Imperative for U.S. Industry Impediment
Peter S. Malloy                                           18:841

Copying, the Reconciliation of Conflicting Interests: An
Analysis of Williams & Wilkins Co. v. United States
Lilli A. Yankow                                            3:328

Copyright and Computer Databases: The Case of the Bibliographic
Utility
Richard J. Brown                                           11:17

Copyright in Computer Programming Languages
Richard H. Stern                                          17:321

Copyright, Computers and Compulsory Licensing
Richard Lorr                                               5:149

Copyright in the Digital Age: A Comparative Survey
Dr. Jacqueline Lipton                                     27:333

Copyright Infringement Problems of a Network/Home Cable Record
Selection and Playing System
David C. Lenny                                              5:51

Copyright Infringement of Protected Computer Software: An
Analytical Method to Determine Substantial Similarity
Donald F. McGahn                                           21:88

Copyright Law: A Review of the "Separability Test" and a
Proposal for New Design Protection
Christopher P. Bussert                                     10:59

Copyright Law Tackles Yet Another Challenge: The Electronic
Frontier of the World Wide Web
April M. Major                                             24:75

Copyright Protection: Computer-Related Dependent Works
Michael Gemignani                                         15:383

Copyrightability of Computer-Created Works
Evan H. Farr                                               15:63

Copyrightable Expression in the User Interface of a Computer
Program: Lotus Development Corporation v. Paperback Software
International
Keith A. Overstreet                                       18:941

Courtran: A Modular Management Information and Research System
for the Judicial Process
J.L. Ebersole & J.A. Hall, Jr.                              3:83

The Courts Establish the Rules for Videogames Under the
Copyright Act of 1976: Is It Too Hard to Play?
Grace Dreisbach                                           10:127

Creating Evidence: Ethical Concerns, Evidentiary Problems, and
the Application of Work Product Protection to Audio Recordings
of Nonparty Witnesses Secretly Made by Attorneys or Their Agents
Marguerita B. Dolatly                                     22:521

The Criminal Law Aspects of Computer Abuse: Part I: State Penal
Laws, Part II: Federal Criminal Code
Susan Hubbell Nycum                                 5:271, 5:297

A Critical Look at the New Uniform Payments Code
James V. Vergari                                           9:317

Cyberbanking: A New Frontier for Discrimination?
Cheryl R. Lee                                             26:277

Cybercommunity Versus Geographical Community Standard for Online
Pornography: A Technological Hierarchy in Judging Cyberspace
Obscenity
Gyong Ho Kim and Anna R. Paddon                            26:65

Cyberspace: A New Frontier for Fighting Words
Sanjiv N. Singh                                           25:283

Cyberspace: The Newest Challenge for Traditional Legal Doctrine
Francis A. Gilligan and Edward J. Imwinkilried            24:305

Dawson Chemical Co., Inc. v. Rohm and Haas Co.: A Clarification
of Section 271 of the Patent Act that Restricts the Doctrine of
Patent Misuse
Margaret D. Fox                                            8:321

A Decade After Divestiture: Regional Bells, Video Programming
and the First Amendment
Susan Dente Ross                                          21:143

In Defense of Monopoly Cable Television Franchising: Defining
the First Amendment Rights of the Public and the Cable Operator
Under the Public Forum Doctrine and Natural Monopoly Theory
Nicholas J. Pappas                                        13:137

Defining the Scope of Software Copyright Protection for Maximum
Public Benefit
Charles Walter                                              14:1

Designer Genes: An Ethical Perspective on Genetic Manipulation
Cynthia J. Dreeman                                        15:447

Determination of HDC-ABMT As Accepted Medical Practice for the
Treatment of Breast Cancer
Janice M. Maggio                                          22:551

The Development of the Central Market System: Revolution-One
Step at a Time
Stephen A. Blumenthal                                      3:232

Dialing for Dollars: Should the FCC Regulate Internet Telephony?
Robert M. Frieden                                          23:47

Diamond v. Diehr: A Turning Point
R.O. Nimtz                                                 8:267

Digital Communications Associates, Inc. v. Sofiklone
Distributing Corporation: Copyright Protection for the Status
Screen of a Computer Program
Lawrence D. Mandel                                        15:169

Digital Media and the Changing Face of Intellectual Property Law
Pamela Samuelson                                          16:323

The Digital Millennium Copyright Act: Disabusing the Notion of a
Constitutional Moment
Adam R. Fox                                               27:267

Doctrine of Equivalents After Hilton Davis: A Comparative Law
Analysis
Toshiko Takenaka                                          22:479

Does Computer Stored Data Constitute a Writing for the Purposes
of the Statute of Frauds and the Statute of Wills?
Houston Putnam Lowry                                        9:93

The Drug Export Amendment Act of 1986
Jeanmarie T. Sales                                        15:475

Economic Forum II-Association of Data Processing Service
Organizations                                              9:109

Economically Efficient Treatment of Computer Software: Reverse
Engineering, Protection, and Disclosure
Lawrence D. Graham & Richard O. Zerbe, Jr.                 22:61

E-Consumer Protection: A Comparative Analysis of EU and US
Consumer Protection on the Internet
Michael Cordera                                           27:231

Effective Use of Computers in Government
Paul L. Orchanian                                   Spr. 1970:98

Effects of U.S. Adherence to the Berne Convention
Carol A. Motyka                                           16:195

EFTS: The Computer Revolution in Electronic Banking
Alan S. Naar & Stanley B. Stein                            5:429

Eight Years to 1984: Privacy and Law Reform
M.D. Kirby                                                 5:487

Electronic Aids to the Drafting of Legal Instruments
Reed Dickerson                                    Spring 1970:75

The Electronic Communications Privacy Act of 1986: The Challenge
of Applying Ambiguous Statutory Language to Intricate
Telecommunication Technologies
Russell S. Burnside                                       13:451

Electronic Databases in Legal Research: Beyond LEXIS and WESTLAW
S. Blair Kauffman                                          13:73

The Electronic Freedom of Information Act Amendments: A Minor
Upgrade to Public Access Law
David MacDonald                                           23:357

Electronic Message Transmission to the Home: Potential Federal
Regulatory Conflicts: Congressional Action Needed
James Gerofsky                                             8:305

Electronic Torts and Videotex-At the Junction of Commerce and
Communication
Jay McDaniel                                              18:773

The Electronic Underground: Computer Piracy and Electronic
Bulletin Boards
Charles Cangialosi                                        15:265

Eliminating Personal Injury Backlogs
Peter J. Johnen                                   Spring 1970:94

E-Mail Security Risks: Taking Hacks at the Attorney-Client
Privilege
Jonathan Rose                                             23:179

The Empire Strikes Back in the International Satellite
Communications Industry
Paula Brillson                                            18:831

Encryption, Kev Recovery, and Commercial Trade Secrete Assets: A
Proposed Legislative Model
John T. Soma, Charles P. Henderson                         25:97

End-User Licensees of Computer Programs-Are They Allowed to
Compete with Their Licensors?
Lance Rose                                                13:297

Enforcing Copyrights in the Age of Multimedia
Carolian Saez                                             21:351

Equitable Equivalents: Weighing the Equities to Determine Patent
Infringement in Biotechnology and Other Emerging Technologies
Harold C. Wegner                                            18:1

Evidence from Computers
Colin Tapper                                               4:324

Evidential Value and Acceptability of Computer Digital-Image
Printouts
James Vergari                                              9:343

Evidentiary Problems Relevant to Checks and Computers
Patsy Abelle                                               5:323

The Evolution of Modern Bioethics: The Uncertain Nature of
Progress
Steven Goldberg                                           16:299

Evra Corp v. Swiss Bank Corp.: Consequential Damages For Bank
Negligence in Wire Transfers
Julie Wilson Jetton                                        9:369

The Exercise of Patent Rights Through Multiple Exclusive
Field-of Use Licensing
S. Leslie Misrock, Brian D. Coggio & Norman C. Dulak      11:383

The Expanded Use of Space Act Authority to Accelerate Space
Commercialization Through Advanced Joint Enterprises Between
Federal and Non-Federal Constituencies
J. Henry Glazer                                           12:339

Fair Use of the Guidelines for Classroom Copying? An Examination
of the Addison-Wesley Settlement
David Izakowitz                                           11:111

The FDA's Mail Import Policy: A Questionable Response to the
AIDS Epidemic
Audrey A. Hale                                            16:169

Fear of the Intangible: A Survey of the Accounting and Tax
Issues Confronting the Software Industry
Michael K. Barron & Kathleen M. Bildzok                    12:33

The Federal Communications/Computer Commission
Marcus Cohn                                         Fall 1970:18

The Federal Computer Systems Protection Act
John Roddy                                                 7:343

Federal Regulation of Environmental Releases of Genetically
Manipulated Microorganisms
Edward L. Korwek & Peter L. de la Cruz                    11:301

Federal Tax Treatment of Software Development Expenses: Is the
I.R.S. Position Outdated?
Michael J. Wensman                                          9:77

Federal Tax Treatment of Computer Software Under Norwest v.
Commissioner
Eric W. Castillo                                          26:157

The Feist Case: Reflections on a Pathbreaking Copyright Decision
Robert A. Gorman                                          18:731

The FFC's Pioneer's Preference Policy: An Innovative Idea Grows
Old and Weary
Kulpreet Singh                                            22:143

Financing High-Technology: Congress Invests in a Better Idea
David W. Lentz                                             9:209

Foreign Patent Filing: A Computer Approach
Donald K. Wedding & Harvey R. Maertin                       2:71

Free Access and the Future of Copyright
F. Gregory Lastowska                                      27:293

From Flour Barrel to Computer Systems: The Applicability of
Theories of Alternative Liability to Shift the Burdens of Proof
in Cases of Intermingled Causation and Damages Within A Modern
Computer Scenario
Marc S. Friedman & Andrew J. Siegel                       14:289

From the Legislature: An Overview of the Report of the National
Commission on Electronic Fund Transfer Systems
Douglas K. Wolfson                                         6:103

The Future of Toxic Risk Assessment: The Abandonment of Animal
Testing
James A. Kozachek                                         17:527

Galoob v. Nintendo: Subject Matter Fixation and Consumer Fair
Use Define the Scope of Copyright Protection for Interoperable
Works
Eric W. Olson                                             18:879

Gambling on the Internet: The States Risk Playing Economic
Roulette As the Internet Gaming Industry Spins Onward
Edward M. Yures                                           28:193

The Golden Egg: In Vitro Fertilization Produces Adjudication
Monique V. Imbert                                         17:495

Good Samaritans in Cyberspace
Keith Siver                                                 23:1

A Grandfather Clause, Due Process and GATT.- Whatever Happened
to the Grandfather Clause of the Process Patent Act of 1988?
Robert R. Deveza                                           18:65

Greyhound v. IBM: Price Increases as a Form of Predatory Pricing
Kenneth R. Cohen                                            7:77

High Technology Imports and the U.S. Countervailing Duty and
Antidumping Laws
Alice L. Mattice & Richard O. Cunningham                  10:189

A Historical, Economic, and Legal Analysis of Municipal
Ownership of the Information Highway
Steven C. Carlson                                           25:1

Impeachment of Government Systems Documentation for Taxpayers
Classified as Non-Filers
Jerome S. Horvitz & Joseph L. Sardinas, Jr.                 6:73

The Incremental Marketing of Computer Services and the
"Tie-In" Sale-A Case for Presuming Coercion
Milton R. Wessel                                           2:135

Industry Responsibility for Environmentally Caused Cancer Under
the Toxic Substances Control Act
Charles M. Caruso                                          7:213

Informatics and Administrative Decisions: The
Decentralization Issue
Thore K. Karlsen                                           4:103

An Information Feedback Model for Probation Treatment Selection
and Evaluation
Larry J. Siegel, Romine R. Deming, Ronald F. Perry &
Stewart V. Hoover                                          6:197

The Intellectual Property Bankruptcy Protection Act: The
Legislative Response to Lubrizol Enterprises, Inc. v. Richmond
Metal Finishers, Inc.
Noreen M. Wiggins                                         16:603

Intellectual Technology: The Dilemma of Environmental Law
Richard Brooks                                            15:411

Intelligent Legal Information Systems: Problems and Prospects
L. Thorne McCarty                                          9:265

International Project Financing: Contractual Guarantees in
Favor of Purchasers
Pierre Francotte                                          10:303

International Trends in New Drug Approval Regulation: The
Impact on Pharmaceutical Innovation
Rosemary Pierce Wall                                      10:317

Introducing Law Students to Computers: Swedish Experiences
Peter Seipel                                      Spring 1970:88

Introduction to Symposium on Biotechnology Law
Stanley T. Crooke                                         11:283

Introduction to Symposium on Software Licensing
Gregory E. Moore                                          18:461

Is Self-Help a Lawful Contractual Remedy?
Esther C. Roditti                                         21:431

"It's None of Your Business." Or is it? California Addresses the
Computer Age
Michael J. Plishner                                        8:235

Judges Without Chests or Rules Without Traces? The State,
Technology, and the Law of "Warrantless Searches"
Thomas Massucci                                           21:519

Koontz v. Jaffarian: The Unit Publication Doctrine
Rajat K. Gupta                                            14:261

The Law of Ideas: The Better Mousetrap Might Not Be Yours
Michael A. Epstein                                          11:1

Lawyer and Law Firm Web Pages as Advertising: Proposed
Guidelines
Vanessa S. Browne-Barbour                                 28:275

The Lawyer's Role in the Computer Age
Robert P. Bigelow                                  Spring 1970:1

The Lawyer's Role in the Computer Age
Robert P. Bigelow                                         16:289

Legal Advice for a Company Hiring Programmers from Another
Company
David C. Tunick                                           19:405

Legal Advice Given Over the Internet and Intranet: How does this
Practice Affect the Lawyer-Client Relationship?
Jorge Amieva                                              27:205

Legal Aspects of Computer Art
Jonathan C. Jackson                                       19:495

Legal Education, Information Technology, and Systems Analysis
Linda A. Schwartzstein                                     13:59

Legal Protection for Computer Programs, Public Access to
Information and Freedom of Competitive Research and
Development Activities
Stanislaw J. Soltysinski                                  16:447

Legal Protection for Computer Software: The View from '79
Michael C. Gemignani                                       7:269

Legal and Techno-Political Implications of the Use of
Nuclear Power Sources in Outer Space
Andrew J. Young                                           12:305

Legal and Technological Infrastructures for Electronic
Payment Systems
Henry H. Perritt, Jr.                                       22:1

Legislative Computer Applications: The Illinois Story
Richard M. Hull                                            3:187

Lessors of Computer Equipment: Do They Receive Fair Treatment
Under the Bankruptcy Code
H. Bradley Staggs                                          15:81

Liability for Malfunction of a Computer Program
Susan Nycum                                                  7:1

License Contracts Under Article 2 of the Uniform Commercial
Code: A Proposal
Raymond T. Nimmer, Donald A. Cohn & Ellen Kirsch          19:281

Licensing Computer-Related Exports
David A. Wormser                                          10:233

Limitations Upon the Software Producer's Rights: Vault
Corp v. Quaid Software Ltd.
Deborah Kemp                                               16:85

Limiting Liability in Electronic Data Processing Service
Contracts
William S. Moorhead                                        4:141

A Linear Programming Approach to Problems of Conflicting Legal
Values Like Free Press Versus Fair Trial
Stuart Nagel, Kathleen Reinbolt, Thomas Eimermann          4:420

Living Organisms as Chemical Substances: The EPA 's
Biotechnology Policy Under the Toxic Substances Control Act
C. Robert Manor                                           13:409

A Logic for the Analysis of Collateral Estoppel
Kevin W. Saunders                                          12:99

The Logic of the Whole Truth
Joseph S. Fulda                                           15:435

The Long Arm of the Fax: Service of Process Using Fax Machines
David A. Sokasits                                         16:531

Lost Horizons?: Tortious and Philosophical Implications of
Computer Imaging
Jon Dartley                                               19:199

Luddites at the Terminal and Other Renegades: Computer Generated
Conflict Areas
Miriam K. Mills                                           10:115

Mainstream Loudoun and the Future of Internet Filtering for
America's Public Libraries
Geraldine P. Rosales                                      26:357

Manufacturers Technologies, Inc. v. CAMS, Inc.: A False Hope for
Software Developers Seeking Copyright Protection for Their
Generated Screen Displays
Robert E. Rudnick                                         17:211

Marginal Cost and Relevant Market Determination in Information
Technology Antitrust Cases
Adolph C. Iannaccone & Linda Volonino                     18:681

Mathematical Algorithm Patentability: Understanding the
Confusion
David S. Benyacar                                         19:129

Medical Information Bureau: The Life Insurer's at a bank
Laurence C. Stern                                            4:1

Methods and Problems in Computer Security
R.T. Slivka & J. W. Darrow                                 5:127

Microcomputers and Criminal Sentencing: Michigan as a Case Study
Susan P. Fino                                             12:407

Mobile Data Terminals and Random License Plate Checks: The Need
for Uniform Guidelines and a Reasonable Suspicion Requirement
Darlene Cedres                                            23:391

The Model Software License Provisions: Precursor to a
Gap-Filling Uniform License Statute?
D.C. Toedt III                                            18:521

The Modernization of Court Functions: A Review of Court
Management and Computer Technology
Wesley LaBar                                                5:97

Moore v. Regents of University of California: The Right of
Property in Human Tissue and Its Effect on Medical Research
Christopher Heyer                                         16:629

More on the Use of Computers by Professionals
Michael C. Gemignani                                      13:317

The More Things Change, the More They Stay the Same: An
Unhurried Reflection on Software Protection over the Years
David Bender                                              16:309

Moving Business Data Is Big Business
Herbet Nolan                                         Fall 1970:2

Multimedia and Copyright
Heather J. Meeker                                         20:375

Multiple Criteria in Political Redistricting: Development of
Relative Values
Pankaj S. Sheth & Sidney W. Hess                            2:44

The Multiple Unconstitutionality of Business Method Patents:
Common Sense, Congressional Consideration, And Constitutional
History
Malla Pollack                                              28:61

The National Public Radio Satellite System: FCC durisdiction
Over a New Communications Technology
David A. Yuckman                                           8:135

Natural Resource Damage Assessment: The Exxon Valdez Oil Spill
and Its Implications
Christine Cartwright                                      17:451

The Nature of Statute Law or Parliament Speaks in a High Level
Language
Richard S. Morgan                                          3:128

NEC Electronics, Inc. v. Cal Circuit Abco, Inc., 810 F. 2d 1506
(9th Cir. 1987)
Eric P.Jewell                                             15:191

A Neural Network-Based Law Machine: Initial Steps
David R. Warner, Jr.                                       18:51

New Drug Discovery Technologies and Patents
Philippe Ducor                                            22:369

A New Framework for Software Protection: Distinguishing Between
Interactive and Non-Interactive Aspects of Computer Programs
Irwin R. Gross                                            20:107

The New Jersey Supreme Court's Treatment of the Wireless
Communications Act of 1996
John E. Gregory Jr.                                       26:185

The New "Problem" Of Business Method Patents: The Convergence of
National Patent Laws And International Internet Transactions
Larry A. DiMatteo                                           28:1

A New View Into the Truth: Impact of a Reliable Deception
Detection Technology on the Legal System
Catherine M. Polizzi                                      21:395

Nonpoint Source Water Pollution and the Imposition of Effluent
Limitations on Point Sources
Catharine Cookson Wozniak                                  8:117

NYT Cable TV v. Homestead at Mansfield, Inc.: Assessing the Role
of Cable Access Statutes
Gerard G. Brew                                            15:103

One Size Doesn't Fit All-Is A Uniform Payments Code a Good ldea?
Anne Geary                                                 9:337

Open-Source Software and the Demise of Copyright
Patrick K. Bobko                                           27:51

Operation Complex                                          2:188

Opportunities for Mexico, Canada and the United States: A
Summary of Intellectual Property Rights Under the North American
Free Trade Agreement
Kent S. Foster & Dean C. Alexander                         20:67

The Orbit/Spectrum Resource and the Technology of Satellite
Telecommunications: An Overview
Milton L. Smith III                                       12:285

An Overview of FDA Regulation of Biotechnology Derived Products:
Dealing with the Collision of Science and Society
Linda E. Hall                                             11:501

The Patent Law Equivalency Doctrine and Reduced Instruction Set
Computing Technology: If It Computes Like a Duck, Is It Still
a Duck?
Linda Susswein                                            16:571

Patent Misuse: Time for a Change
J. Dianne Brinson                                         16:357

The Patent System and the "New Biology"
Iver P. Cooper                                               8:1

Patent Systems and Their Role in the Technological Advance of
Developing Nations
Thomas C. Creel & Drew M. Wintringham                     10:255

The Patentability of Computer Programs
Robert O. Nimtz                                     Spr. 1970:38

Patenting Biotechnology: A Practical Approach
Jeffrey L. Ihnen                                          11:407

Patenting of Products of Nature
Michael D. Davis                                          21:293

Patents, Science and Innovation: Historical Linkages and
Global Technological Competitiveness
David Silverstein                                         17:261

Personal Jurisdiction and the World-Wide Web: Bits (and Bytes)
of Minimum Contacts
David Thatch                                              23:143

A Picture Is Worth a Thousand Lies: Electronic Imaging and the
Future of the Admissibility of Photographs Into Evidence
Christine A Guilshan                                      18:365

Post-Adkins Trade Secret Protection of Software
David Bender                                       Spring 1970:5

Practical and Logical Considerations in Drafting a U.S. Patent
Application.for Computer-Related Inventions
Rick D. Nydegger                                          18:109

Privacy and the Social Security Number. Section 1211 of the Tax
Reform Act of 1976
Stephen Mayer                                              6:221

Privacy in Cyberspace: Constructing a Model of Privacy for the
Electronic Communications Environment
Katrin Schatz Byford                                        24:1

Product Liability and Software
Michael C. Gemignani                                       8:173

Professional Malpractice and the Unauthorized Practice of
Professions: Some Legal and Ethical Aspects of the Use of
Computers as Decision-Aids
Marshal S. Willick                                          12:1

The Proliferation of Electronic Commerce Patents: Don't Blame
the PTO
Eugene R. Quinn, Jr.                                      28:121

A Proposal for Developing the Structural Science of Codification
Cary G. DeBessonet                                          8:47

A Proposal to Facilitate The Uniform Administration of Justice
in Korea Through Use of Mathematical Model
Kim, Yun Haeng and Kim, Seong-in                           4:284

Proposed Changes to the Federal Rules of Evidence as Applied to
Computer-Generated Evidence
Paula Noyes Singer                                         7:157

Protecting Computer Software in the '80's: Practical Guidelines
for Evolving Needs
Joseph E. Root III                                         8:205

Protection of United States Semiconductor Designs in Foreign
Countries Under the Semiconductor Chip Protection Act of 1984
James T. Carmichael                                       12:433

Public Performance Copyrights: A Guide to Public Place Analysis
John Kheit                                                  26:1

The Public Utility Status of the Computer Industry
Manley R. Irwin & William H. Barrett                       3:219

The Realities of the MP3 Madness: Are Record Companies Simply
Crying Wolf?
Karen M. Lee                                              27:131

Reality or Virtual Reality? The Use of Interactive, Three
Dimensional Computer Simulations at Trial
Regina A. Gore                                            19:459

A Re-examination of the Computer Inquiry
John R. Bonica                                              7:23

Reflections on the First National Conference on Automated Law
Research
Ejan Mackaay                                               3:310

Regulating the Multi-Media Chimera: Electronic Speech Rights
in the United States
Allen S. Hammond                                            21:1

Regulation of Amateur Radio Antenna Height, Restrictive
Covenants and Local Regulations: Is The Ham's Goose Cooked?
Frank A. Thomasello, Jr.                                  16:227

The Regulator's Dilemma: Should Best Available Technology or
Cost Benefit Analysis Be Used to Determine the Applicable
Hazardous Waste Treatment, Storage and Disposal Technology?
Thomas A. Cinti                                           16:145

Remote Sensing Satellite Regulation by National and
International Law
Hamilton De Saussure                                      15:351

Retail Wheeling: Is Competition Among Energy Utilities an
Environmental Disaster, or Can It Be Reconciled with Integrated
Resource Planning?
Douglas L. Heinold                                        22:301

Rogue Computer Programs and Computer Rogues: Tailoring the
Punishment to Fit the Crime
Anne W. Branscomb                                           16:1

The Role of Neural Networks in the Law Machine Development
David R. Warner, Jr.                                      16:129

The Rosetta Stone for the Doctrines of Means-Plus-Function
Patent Claims
Rudolph P. Hofmann, Jr. & Edward P. Heller, III           23:227

Sailor Music: Exposing The Gaps in 17 U.S.C. [section] 110(5)
Robert J. Cash                                             9:133

Satellite High Jinks: Hubbard Broadcasting, Inc. v. Southern
Satellite Systems
James H. Gambrill                                         13:519

Section 337 of the Tariff Act of 1930, As Amended: Effective
Protection for Changing Technology
Paul Plaia, Jr. & Joel D. Kaufman                         10:219

Seeking the Balance Between Government and Industry Interests in
Software Acquisitions
Kevin Deasy & Ann Crawford Martin                         14:159

The Semiconductor Chip Protection Act And Its Impact On The
International Protection Of Chip Designs
Jay A. Erstling                                           15:303

Sexual Harassment in Cyberspace: The Problem of Unwelcome EMail
David K. McGraw                                           21:491

Shared Computing: An Attorney's "Need to Know"
Charles H. White, Jr.                             Spring 1970:63

"Shared Monopoly," "Conscious Parallelism" and An Approach to
Oligopoly Under Section 5 of the FTC Act
Paul D. Connuck                                            9:165

Sharing of Research Results in a Federally Sponsored Gene
Mapping Project
Susan C. Rosenfeld                                        14:311

Shrink-Wrap Licenses of Mass Marketed Software: Enforceable
Contracts or Whistling in the Dark?
Richard H. Stern                                           11:51

Sisyphean Circles: The Communications Assistance for Law
Enforcement Act
David Ward                                                22:267

Software Interoperability and Reverse Engineering
John T. Soma, Gus Winfield & Letty Friesen                20:189

Software Patent Applications Directed to Business and
Mathematical Processing Applications Highlight the Tension
Between State Street and Benson
Michael Joel Schallop                                      26:89

Software Patent Developments: A Programmer's Perspective
John A. Gibby                                             23:293

Software Protection in "Europe 1992"
Alfred P. Meijboom                                        16:407

Software Protection in Transactions With the Soviet Union
James E. Meadows                                          12:133

Some Observations on the Protection of Semiconductor Chip Design
John M. Kernochan                                         13:287

The Sound of Silence: Why and How the FCC Should Permit Private
Property Owners to Jam Cell Phones
S. Robert Carter, III                                     28:343

Space Law: Considerations For Space Planners
F. Kenneth Schwetje                                       12:245

State and Local Taxation of Electronic Commerce: The Forging of
Cyberspace Tax Policy
David S. Prebut                                           24:345

Stop Payment in the New Uniform Payments Code
Christopher D. Pape                                        9:353

The Strength of Patent Protection for Computer Products: The
Federal Circuit and the Patent Office Refine the Test for
Determining Which Computer-Related Inventions Constitute
Patentable Subject Matter
R. Lewis Gable & J. Bradford Leaheey                       17:87

A Structural Model for Computer-Aided Legal Analysis
Jeffrey A. Meldman                                          6:27

The Substantial Similarity Test and Its Use in Determining
Copyright Infringement Through Digital Sampling
Maura Giannini                                            16:509

Summary Protection of Intellectual Property Rights at the
Border: Customs Law and Practice
Lawrence M. Friedman                                      19:429

A Survey of Computerized Information for Lawyers: Lexis, Juris,
Westlaw, and Flite
John T. Soma & Andrea R. Stern                             9:295

Synercom Technology, Inc. v. University Computing Co.: Copyright
Protection for Computer Formats and The Idea/Expression
Dichotomy
Allan E. Reznick                                            8:65

The Tax Treatment of Research and Development Expenditures: A
Comparison Between Financial Accounting Standards and Section
174 of the Internal Revenue Code
John L. Pritchard                                         10:149

Teaching Law With Computers
Richard Warner, Stephen D. Sowle & Will Sadler            24:107

Techniques For Litigation Avoidance in Contracting For Computer
Systems
Esther Roditti Schachter                                  10:109

Technological Trade with the Former Eastern Block: The Evolution
of Export Control and Its Relationship to Structural Trade
Barriers
Cecelia A. Schier                                         19:223

A Technologist's View of Privacy and Security in Automated
Information Systems
Ruth M. Davis                                              4:264

Technology Due Diligence--The Need for and Benefits of
Technology Assessment in Connection with Investment in
High-Tech Companies
Carol R. Goforth and Ronald R. Goforth, Ph.D.             27:151

Technology Overtakes Entitlements: State of New York v. Sullivan
Bonnie E. Muir                                            19:517

The Telco, the Common Carrier Model and the First Amendment--The
"Dial-A-Porn" Precedent
Jerome A. Barron                                          19:371

Telex v. IBM: Another Viewpoint
Milton R. Wessel                                             5:1

The Third Party Defense to CERCLA Liability
Geoffrey D. Eberle                                        17:189

To Be or Not To Be: The Legal Ramifications of the Cloning of
Human Embryos
Debra Feuerberg Duffy                                     21:189

Tort Liability for Defamation by Computer
George E. Stevens & Harold M. Hoffman                       6:91

Tort Theories of Recovery Against Vendors of Defective Software
John M. Conley                                              13:1

Toward an Effective Strategy for Software Copyright Litigation
Ronald Johnston                                            19:91

Toward the 1980 Census: The Reapportionment of New Jersey's
Congressional Districts
Robert G. Torricelli & John I. Porter                      7:135

Trade Secrets--The New Risks to Trade Secrets Posed By
Computerization
Andrew Beckerman-Rodau                                    28:227

Transborder Data Flow: An Overview and Critique of Recent
Concerns
I. Trotter Hardy, Jr.                                      9:247

Transborder Retransmissions of T.V. Signals: A New Copyright
Problem
Jildy Gross                                                11:93

Transmitting Legal Documents Over the Internet: How to Protect
Your Client and Yourself
John Christopher Anderson                                   27:1

The Trouble with Competitive Bidding in New Jersey for High
Technology Equipment
Robert C. Epstein                                          16:63

The Unconstitutionality of Waste Flow Control and the
Environmental Justice Movement's Impact on Incinerators
Nelson Perez                                              22:587

Understanding the Implications of Selling Rights in Software To
The Defense Department: A Journey Through The Regulatory Maze
Pamela Samuelson                                           13:33

Uniform Codification of Commercial Contract Law
Raymond T. Nimmer                                         18:465

United States v. Karo, Comment
Virginia C. Robbins                                       12:169

Universal City Studios, Inc. v. SONY Corp. of America: Betamax
Records Trial Court Victory. Should the Court of Appeals Replay
the Verdict?
Richard C. Bell                                             8:85

Universal Health Identifier: Invasion of Privacy or Medical
Advancement?
Betty Ng                                                  26:331

Universal Service and the Digital Revolution: Beyond the
Telecommunications Act of 1996
Markenzy Lapointe                                          25:61

Unraveling Copyrighted Software from a Tying Arrangement
Presumption: 3 P.M., Inc. v. Basic Four Corp., an Alternative
to Digidyne Corp. v. Data General
Kim Marie Given                                           12:447

An Update of EFTS
Maria Metzler Johnson                                      6:277

Use of Computers and Technology in Land Use Control
Jill M. Horton                                            18:403

The Use of Electronic Data Processing Equipment in Law Office
Management and Fiscal Control
Howard M. Stroger                                 Spring 1970:82

The Use of Evidence Extrinsic to a Single Source to Support
Anticipation
Kenneth R. Walton                                         20:339

The Use of the Legal Cadastre in the Maritime Provinces of
Canada
Willis F. Roberts                                          5:121

Using Trade Secret Law to Protect Computer Software
Robert C. Scheinfeld & Gary M. Butter                     17:381

Videotape in the Courts: Its Use and Potential
Alan W. Roth                                               3:279

Warranty Disclaimer in the Data Processing Contract
Richard Raysman                                            6:265

West Publishing Co. v. Mead Data Central, Inc. (LEXIS)
Robin Lee Pedersen                                        14:359

"What's Really Going On?": A Study of Lawyer and Scientist
Inter-Disciplinary Discourse
Robert J. Condlin                                         25:181

When Public Policies Collide ... Legal "Self-Help" Software and
the Unauthorized Practice of Law
Steve French                                               27:93

Whither (No Longer Whether) Software Copyright
David A. Rice                                             16:341

Worldwide Protection of Computer Programs by Copyright
Nicholas Prasinos                                           4:42

You Can Bank On It: An Analysis of Judicial Branch Bank
Characterization and an Alternate Proposal
Douglas K. Wolfson & Scott J. Stevens                      5:389

AUTHOR INDEX TO
LEADING ARTICLES AND FEATURES

Abelle, Patsy
Evidentiary Problems Relevant to Checks and Computers      5:323

Adler, Reid G.
Biotechnology, Development and Transfer: Recommendations for an
Integrated Policy                                         11:469

Altman, Micah
The Computational Complexity of Automated Redistricting: Is
Automation the Answer?                                     23:81

Amieva, Jorge
Legal Advice Given Over the Internet and Intranet: How does
this Practice Affect the Lawyer-Client Relationship?      27:205

Anderson, John Christopher
Transmitting Legal Documents Over the Internet: How to Protect
Your Client and Yourself                                    27:1

Bahr, Susan J.
The Canadian Computer Software Copyright Law: One Small Step
for U.S. Software Vendors                                 17:139

Barrett, William H. & Manley R. Irwin
The Public Utility Status of the Computer Industry         3.219

Barron, Jerome A.
The Telco, the Common Carrier Model and the First Amendment-The
"Dial-A-Porn" Precedent                                   19:371

Barron, Michael K. & Kathleen M. Bildzok
Fear of the Intangible: A Survey Of the Accounting and Tax
Issues Confronting the Software Industry                   12:33

Baxendale, James C.L.
Commercial Banking and the Checkless Society        Fall 1970:88

Becker, K.L. & John A. Cannito
The Case for Limited Use of Polls in the Jury Selection
Process                                                    7:111

Beckerman-Rodau, Andrew
Trade Secrets--The New Risks to Trade Secrets Posed By
Computerization                                           28:227

Bell, Richard C.
Universal City Studios, Inc. v. SONY Corp. of America: Betamax
Records Trial Court Victory. Should the Court of Appeals Replay
the Verdict?                                                8:85

Bender, David
The More Things Change, the More They Stay the Same:
An Unhurried Reflection on Software Protection Over the
Years                                                     16:309

Bender, David
Post-Adkins Trade Secret Protection of Software    Spring 1970:5

Benyacar, David S.
Mathematical Algorithm Patentability: Understanding the
Confusion                                                 19:129

Bigelow, Robert P.
The Lawyer's Role in the Computer Age              Spring 1970:1

Bigelow, Robert P.
The Lawyer's Role in the Computer Age                     16:289

Bildzok, Kathleen M. & Michael K. Barron
Fear of the Intangible: A Survey of the Accounting and Tax
Issues Confronting the Software Industry                   12:33

Bing, Jon & Dag Wiese Schartum
Automated Systems and Claim Realization in Social Security
Organizations                                              12:83

Blumenthal, Stephen A.
The Development of the Central Market System: Revolution-One
Step at a Time                                             3.232

Bobko, Patrick K.
Open-Source Software and the Demise of Copyright           27:51

Bonica, John R.
A Re-examination of the Computer Industry                   7:23

Branscomb, Anne W.
Rogue Computer Programs and Computer Rogues: Tailoring the
Punishment to Fit the Crime                                 16:1

Brew, Gerard G.
NYT Cable TV v. Homestead at Mansfield, Inc.: Assessing the
Role of Cable Access Statutes                             15:103

Brillson, Paula
The Empire Strikes Back in the International Satellite
Telecommunications Industry                               18:381

Brinson, J. Dianne
Patent Misuse: Time for a Change                          16:357

Brooks, Richard
Intellectual Technology: The Dilemma of Environmental Law 15:411

Brooks, Thomas D.
Catching Jellyfish in the Internet: The Public-Figure Doctrine
and Defamation on Computer Bulletin Boards                21:461

Brown, Richard L.
Copyright and Computer Databases: The Case of the Bibliographic
Utility                                                    11:17

Browne-Barbour, Vanessa S.
Lawyer and Law Firm Web Pages as Advertising: Proposed
Guideline                                                 28:275

Burk, Dan L.
Biotechnology and Patent Law: Fitting Innovation to the
Procrustean Bed                                             17:1

Burnside, Russell S.
The Electronic Communications Privacy Act of 1986: The Challenge
of Applying Ambiguous Statutory Language to Intricate
Telecommunication Technologies                            13:451

Bussert, Christopher P.
Copyright Law: A Review of the "Separability Test" and a
Proposal for New Design Protection                         10:59

Butter, Gary M. & Robert C. Scheinfeld
Using Trade Secret Law to Protect Computer Software       17:381

Byford, Katrin Schatz
Privacy in Cyberspace: Constructing a Model of Privacy for the
Electronic Communications Environment                       24:1

Cangialosi, Charles
The Electronic Underground: Computer Piracy and Electronic
Bulletin Boards                                           15:265

Cannito, John A. & K.L. Becker
The Case for Limited Use of Polls in the Jury Selection
Process                                                    7:111

Carlson, Steven C.
The Case for Limited Use of Polls in the Jury Selection
Process                                                    7:111

Carlson, Steven C.
A Historical, Economic, and Legal Analysis of Municipal
Ownership of the Information Highway                        25:1

Carmichael, James T.
Protection of United States Semiconductor Designs in Foreign
Countries Under the Semiconductor Chip Protection
Act of 1984                                               12:433

Carter, S. Robert III
The Sound of Silence: Why and How the FCC Should Permit Private
Property Owners to Jam Cell Phones                        28:343

Cartwright, Christine
Natural Resource Damage Assessment: The Exxon Valdez Oil Spill
and Its Implications                                      17:451

Caruso, Charles M.
Industry Responsibility for Environmentally Caused Cancer Under
the Toxic Substances Control Act                           7:213

Cash, Robert J.
Sailor Music: Exposing the Gaps in 17 U.S. C 110(5)        9:133

Castillo, Eric W.
Federal Tax Treatment of Computer Software Under Norwest v.
Commissioner                                              26:157

Cedres, Darlene
Mobile Data Terminals and Random License Plate Checks: The
Need for Uniform Guidelines and a Reasonable Suspicion
Requirement                                               23:391

Chandler, James P.
Computers and Case Law                                     3:202

Chartrand, Robert L.
Congress: The Three-Dimensional Chessboard-The Role of
Information Technology                            Spring 1970:50

Christie, Stuart A.
Anti-Dumping Policy of the European Community and the Growing
Spectre of Protectionism in Technology-Related Goods      16:475

Cinti, Thomas A.
The Regulator's Dilemma: Should Best Available Technology or
Cost Benefit Analysis Be Used to Determine the Applicable
Hazardous Waste Treatment, Storage and Disposal
Technology?                                               16:145

Clarke, John J.
The Bank-Customer Relationship in an Electronic Credit
Transfer System                                              2:1

Coggio, Brian D., S. Leslie Misrock, & Norman C. Dulak
The Exercise of Patent Rights Through Multiple Exclusive
Field-of-Use Licensing                                    11:383

Cohen, Kenneth R.
Greyhound v. IBM: Price Increases as a Form of Predatory
Pricing                                                     7:77

Cohn, Marcus
The Federal Communications/Computer Commission      Fall 1970:18

Condlin, Robert J.
"What's Really Going On?": A Study of Lawyer and Scientist
Inter-Disciplinary Discourse                              25:181

Conley, John M.
Tort Theories of Recovery Against Vendors of Defective
Software                                                    13:1

Connuck, Paul D.
"Shared Monopoly," "Conscious Parallelism" and an Approach to
Oligopoly Under Section 5 of the FTC Act                   9:165

Cooper, Iver P.
Arzberger Under the Microscope: A Critical Reexamination of the
Exclusion of Bacteria from Plant Patent Protection         7:367

Cooper, Iver P.
The Patent System and the "New Biology"                      8:1

Cooper, Steven M.
Consent and Organ Donation                                11:559

Cordera, Michael
E-Consumer Protection: A Comparative Analysis of EU
and US Consumer Protection on the Internet                27:231

Creel, Thomas C. & Drew M. Wintringham
Patent Systems and Their Role in the Technological Advance of
Developing Nations                                        10:255

Cunningham, Richard O. & Alice L. Mattice
High Technology Imports and the U.S. Countervailing Duty and
Antidumping Laws                                          10:189

Darrow, J.W. & R.T. Slivka
Methods and Problems in Computer Security                  5:217

Dartley, Jon
Lost Horizons?: Tortious and Philosophical Implications of
Computer Imaging                                          19:199

Davis, Harold L.
Computer Programs and Subject Matter Patentability           6:1

Davis, Michael D.
The Patenting of Products of Nature                       21:293

Davis, Ruth M.
A Technologist's View of Privacy and Security in Automated
Information Systems                                        4:264

DeBessonet, Cary G.
An Automated Approach to Scientific Codification            9:27

DeBessonet, Cary G.
An Automated Intelligent System Based on a Model of a Legal
System                                                     10:31

DeBessonet, Cary G.
A Proposal for Developing the Structural Science of
Codification                                                8:47

Deasy, Kevin & Anne Crawford Martin
Seeking the Balance Between Government and Industry Interests
in Software Acquisition                                   14:159

de la Cruz, Peter L. & Edward L. Korwek
Federal Regulation of Environmental Releases of Genetically
Manipulated Microorganisms                                11:301

Dembo, David, Clarence Dias & Ward Morehouse
Biotechnology and the Third World: Some Social, Economic,
Political and Legal Impacts and Concerns                  11:431

Deming, Romine R., Larry J. Seigel, Ronald F. Perry, &
Stewart V. Hoover
An Information Feedback Model for Probation Treatment Selection
and Evaluation                                             6:197

DeSaussure, Hamilton
Remote Sensing Satellite Regulation by National and
International Law                                         15:351

Devdza, Robert R.
A Grandfather Clause, Due Process and the GATT. Whatever
Happened to the Grandfather Clause of the Process Patent Act
of 1988?                                                   18:65

Dias, Clarence, David Dembo & Ward Morehouse
Biotechnology and the Third World: Some Social, Economic,
Political and Legal Impacts and Concerns                  11:431

Dickerson, Reed
Electronic Aids to the Drafting of Legal
Instruments                                       Spring 1970:75

DiMatteo, Larry A.
The New "Problem" Of Business Method Patents: The Convergence
of National Patent Laws And International Internet
Transactions                                                28:1

Dixon, Robert G., Jr.
Computers and Redistricting: A Plea for Realism             2:15

Dolatly, Marguerita B.
Creating Evidence: Ethical Concerns, Evidentiary Problems,
and the Application of Work Product Protection to Audio
Recordings of Nonparty Witnesses Secretly Made by Attorneys
or Their Agents                                           22:521

Dreeman, Cynthia J.
Designer Genes: An Ethical Perspective on Genetic
Manipulation                                              15:447

Dreisbach, Grace
The Courts Establish the Rules for Videogames Under the
Copyright Act of 1976: Is It Too Hard to Play?            10:127

Ducor, Philippe
New Drug Discovery Technologies and Patents               22:369

Duffy, Debra Feuerberg
To Be or Not To Be: The Legal Ramifications of the Cloning of
Human Embryos                                             21:189

Dulak, Norman C., S. Leslie Misrock & Brian D. Coggio
The Exercise of Patent Rights Through Multiple Exclusive
Field-of-Use Licensing                                    11:383

Eberle, Geoffrey D.
The Third Party Defense to CERCLA Liability               17:189

Ebersole, J.L. & J.A. Hall, Jr.
Courtran: A Modular Management Information and Research System
for the Judicial Process                                    3:83

Effross, Walter A.
Assaying Computer Associates v. Altai.--How Will the "Golden
Nuggett" Test Pan Out?                                      19:1

Eimermann, Thomas, Stuart Nagel & Kathleen Reinbolt
A Linear Programming Approach to Problems of Conflicting Legal
Values Like Free Press Versus Fair Trial                   4:420

Epstein, Michael A.
The Law of Ideas: The Better Mousetrap Might Not Be
Yours                                                       11:1

Epstein, Robert C.
The Trouble with Competitive Bidding in New Jersey for High
Technology Equipment                                       16:63

Erstling, Jay A.
The Semiconductor Chip Protection Act and Its Impact on the
International Protection Of Chip Designs                  15:303

Farr, Evan H.
Copyrightability of Computer-Created Works                 15:63

Fino, Susan P
Microcomputers and Criminal Sentencing: Michigan as a Case
Study                                                     12:407

Flewellen, Linda Nell
An Anomaly in the Patent System: The Uncertain Status of
Computer Software                                          8:273

Foster, Kent S. & Dean C. Alexander
Opportunities for Mexico, Canada and the United States: A
Summary of Intellectual Property Rights Under the North
American Free Trade Agreement                              20:67

Fox, Adam R.
The Digital Millennium Copyright Act: Disabusing the Notion
of a Constitutional Moment                                27:267

Fox, Margaret D.
Dawson Chemical Co. Inc. v. Rohm and Haas Co.: A Clarification
of Section 271 of the Patent Act that Restricts the Doctrine of
Patent Misuse                                              8:321

Francotte, Pierre
International Project Financing: Contractual Guarantees in
Favor of Purchasers                                       10:303

French, Steve
When Public Policies Collide ... Legal "Self-Help" Software and
the Unauthorized Practice of Law                           27:93

Frieden, Robert M.
Dialing for Dollars: Should the FCC Regulate Internet
Telephony?                                                 23:47

Friedman, Lawrence M.
Summary Protection of Intellectual Property Rights at the
Border: Customs Law and Practice                          19:429

Friedman, Marc S. & Andrew J. Siegel
From Flour Barrel to Computer Systems: The Applicability of
Theories of Alternative Liability to Shift the Burdens of
Proof in  Cases of Intermingled Causation and Damages
Within a Modern Computer Scenario                         14:289

Fulda, Joseph S.
The Logic of the Whole Truth                              15:435

Gable, R. Lewis & J. Bradford Leaheey
The Strength of Patent Protection for Computer Products: The
Federal Circuit and the Patent Office Refine the Test for
Determining Which Computer-Related Inventions Constitute
Patentable Subject Matter                                  17:87

Gambril, James H.
Satellite High Jinks: Hubbard Broadcasting Inc. v. Southern
Satellite Systems                                         13:519

Geary, Anne
One Size Doesn't Fit All-Is a Uniform Payments Code a Good
Idea?                                                      9:337

Gemignani, Michael C.
Copyright Protection: Computer-Related Dependent Works    15:383

Gemignani, Michael C.
Legal Protection for Computer Software: The View
from '79                                                   7:269

Gemignani, Michael C.
More on the Use of Computers by Professionals             13:317

Gemignani, Michael C.
Product Liability and Software                             8:173

Gerofsky, James
Electronic Message Transmission to the Home: Potential Federal
Regulatory Conflicts: Congressional Action Needed          8:305

Giannini, Maura
The Substantial Similarity Test and Its Use in Determining
Copyright Infringement Through Digital Sampling           16:509

Gibby, John A.
Software Patent Developments: A Programmer's Perspective  23:293

Gilligan, Francis A. and Edward J. Imwinkilried
Cyberspace: The Newest Challenge for Traditional Legal
Doctrine                                                  24:305

Given, Kim Marie
Unraveling Copyrighted Software from a Tying Arrangement
Presumption: 3 P.M., Inc. v. Basic Four Corp., an Alternative
to Digidyne Corp. v. Data General                         12:447

Glazer, J. Henry
The Expanded Use of Space Act Authority to Accelerate Space
Commercialization Through Advanced Joint Enterprises Between
Federal and Non-Federal Constituencies                    12:339

Goforth, Carol R. & Ronald L. Goforth, Ph.D.
Technology Due Diligence--The Need for and Benefits of
Technology Assessment in Connection with Investment in
High-Tech Companies                                       27:151

Goldberg, Steven
The Evolution of Modern Bioethics: The Uncertain Nature of
Progress                                                  16:299

Gomez, Ivette P.
Beyond the Neighborhood Drugstore: U.S. Regulation of Online
Prescription Drug Sales by Foreign Businesses             28:431

Gomulkiewicz, Robert W. & Mary L. Williamson
A Brief Defense of Mass Market Software License
Agreements                                                22:335

Gorman, Robert A.
The Feist Case: Reflections on a Pathbreaking Copyright
Decision                                                  18:731

Gore, Regina A.
Reality or Virtual Reality? The Use of Interactive,
Three-Dimensional Computer Simulations at Trial           19:459

Graham, Lawrence D. & Richard O. Zerbe, Jr.
Economically Efficient Treatment of Computer Software: Reverse
Engineering, Protection, and Disclosure                    22:61

Graziano, Sue Ganske
Computer Malpractice-A New Tort on the Horizon?           17:177

Gregory, John E. Jr.
The New Jersey Supreme Court's Treatment of the Wireless
Communications Act of 1996                                26:185

Greguras, Fred M. & Ingo Keilitz
The Computer's Use in Jury Selection and Management: Do We
Need to Wait for Statutory Chang?                          6:155

Gross, Irwin R.
A New Framework for Software Protection: Distinguishing Between
Interactive and Non-Interactive Aspects of Computer
Programs                                                  20:107

Gross, Jildy
Transborder Retransmissions of TV. Signals: A New Copyright
Problem                                                    11:93

Guilshan, Christine A.
A Picture Is Worth a Thousand Lies: Electronic Imaging and
the Future of the Admissibility of Photographs Into
Evidence                                                  18:365

Gupta, Rajat K.
Koontz v. Jaffarian: The Unit Publication Doctrine        14:261

Hager, Christopher W.
Apples & Oranges: Reverse Engineering as a Fair Use After
Atari v. Nintendo and Sega v. Accolade                    20:259

Hale, Audrey A.
The FDA's Mail Import Policy: A Questionable Response to the
AIDS Epidemic                                             16:169

Hall, J.A., Jr. & J.L. Ebersole
Courtran: A Modular Management Information and Research
System for the Judicial Process                             3:83

Hall, Linda E.
An Overview of FDA Regulation of Biotechnology Derived Products:
Dealing with the Collision of Science and Society         11:501

Hammond, Allen S.
Regulating the Multi-Media Chimera: Electronic Speech Rights
in the United States                                        21:1

Hardy, I. Trotter, Jr.
Transborder Data Flow: An Overview and Critique of Recent
Concerns                                                   9:247

Heinhold, Douglas L.
Retail Wheeling: Is Competition Among Energy Utilities an
Environmental Disaster, or Can It Be Reconciles with
Integrated Resource Planning?                             22:301

Heller, Edward P., III & Hofmann, Rudolph P., Jr.
The Rosetta Stone for the Doctrines of Means-Plus-Function
Patent Claims                                             23:227

Hertzberg, Gabriel
Antitrust Enforcement in Electronic B2B Marketplaces: An
Application of Oligopoly Theory and Modern Evidence Law   28:463

Hess, Sidney W. & Pankaj S. Sheth
Multiple Criteria in Political Redistricting: Development of
Relative Values                                             2:44

Heyer, Christopher
Moore v. Regents of University of California: The Right of
Property in Human Tissue and Its Effect on Medical
Research                                                  16:629

Hoffman, Harold M. & George E. Stevens
Tort Liability for Defamation by Computer                   6:91

Hofmann, Rudolph P., Jr., & Heller, Edward P., III
The Rosetta Stone for the Doctrines of Means-Plus-Function
Patent Claims                                             23:227

Holmes, Robert A.
Application of Article Two of the Uniform Commercial Code to
System Acquisitions                                          9:1

Hoover, Stewart V., Larry J. Siegel, Romine R. Deming, &
Robert F. Perry
An Information Feedback for Probation Treatment Selection and
Evaluation                                                 6:197

Horton, Jill M.
Use of Computers and Technology in Land Use Control       18:403

Horvitz, Jerome S. & Joseph L. Sardinas, Jr.
Impeachment of Government Systems Documentation for Taxpayers
Classified as Non-Filers                                    6:73

Hull, Richard M.
Legislative Computer Applications: The Illinois Story      3:187

Iannaccone, Adolph C. and Linda Volonino
Marginal Cost and Relevant Market Determination in Information
Technology Antitrust Cases                                18:681

Ihnen, Jeffrey L.
Patenting Biotechnology: A Practical Approach             11:407

Imbert, Monique V.
The Golden Egg: In Vitro Fertilization Produces
Adjudication                                              17:495

Irwin, Manley R.
Computers and Communications: Public Policy at the
Crossroads                                          Fall 1970:35

Irwin, Manley R. & William H. Barrett
The Public Utility Status of the Computer Industry         3:219

Izakowitz, David
Fair Use of the Guidelines for Classroom Copying? An
Examination of the Addison-Wesley Settlement              11:111

Jackson, Jonathan C.
Legal Aspects of Computer Art                             19:495

Jacobs, Morton C.
Computer Technology (Hardware and Software): Some Legal
Implications for Antitrust, Copyrights and Patents  Fall 1970:50

Jacobs, Roberta L.
American Implications of Sentencing by Computer            4:302

Jetton, Julie Wilson
Evra Corp. v. Swiss Bank Corp.: Consequential Damages for
Bank Negligence in Wire Transfers                          9:369

Jewell, Eric P.
NEC Electronics, Inc. v. Cal Circuit Abco, Inc.
810 F.2d 1506 (9th Cir. 1987)                             15:191

Johnen, Peter J.
Eliminating Personal Injury Backlogs              Spring 1970:94

Johnson, Andrea L.
Legal and Regulatory Issues Confronting Cities in Developing
an Interconnected Fiber Optic Network: The San Diego
Model                                                     20:489

Johnson, Maria M.
An Update on EFTS                                          6:277

Johnston, Ronald L.
Toward an Effective Strategy for Software Copyright
Litigation                                                 19:91

Karlsen, Thore K.
Informatics and Administrative Decisions: The
Decentralization Issue                                     4:103

Kauffman, S. Blair
Electronic Databases in Legal Research: Beyond LEXIS and
WESTLAW                                                    13:73

Kaufman, Joel D. and Paul Plaia, Jr.
Section 337 of the Tariff Act of 1930, as Amended: Effective
Protection for Changing Technology                        10:219

Keilitz, Ingo and Fred M. Greguras
The Computer's Use in Jury Selection and Management: Do
We Need to Wait for Statutory Change?                      6:155

Kemp, Deborah
Limitations Upon the Software Producer's Rights: Vault Corp. v.
Quaid Software Ltd.                                        16:85

Kernochan, John M.
Some Observations on the Protection of Semiconductor Chip
Design                                                    13:287

Kerr, Orin S.
Computers and The Patent System: The Problem of The Second
Step                                                       28:47

Kheit, John
Public Performance Copyrights: A Guide to Public Place
Analysis                                                    26:1

Kidd, Donnie L. Jr. & William H. Daughtrey, Jr.
Adapting Contract Law to Accommodate Electronic Contracts:
Overview and Suggestions                                  26:215

Kim, Gyong Ho and Anna R. Paddon
Cybercommunity Versus Geographical Community Standard for
Online Pornography: A Technological Hierarchy in Judging
Cyberspace Obscenity                                       26:65

Kim, Seong-in & Kim Yun Haeng
A Proposal to Facilitate the Uniform Administration of Justice
in Korea Through the Use of Mathematical Model             4:284

King, Henry R.
Big Brother, the Holding Company: A Review of Key. Escrow
Encryption Technology                                     21:224

Kirby, M.D.
Eight Years to 1984: Privacy and Law Reform                5:487

Korwek, Edward L. & Peter L. de la Cruz
Federal Regulation of Environmental Releases of Genetically
Manipulated Microorganisms                                11:301

Kozachek, James A.
The Future of Toxic Risk Assessment: The Abandonment of Animal
Testing                                                   17:527

Ku, Peter C. equal to] & William L. LaFuze
Mooting Patent Invalidity: Justiciability and the Case of
Cardinal Chemical                                         20:539

LaBar, Wesley
The Modernization of Court Functions: A Review of Court
Management and Computer Technology                          5:97

Lapointe, Markenzy
Universal Service and the Digital Revolution: Beyond the
Telecommunications Act of 1996                             25:61

Laska, Lewis L.
Contracting for Computer Services: A Checklist             2:152

Lastowska, F. Gregory
Free Access and the Future of Copyright                   27:293

Lawlor, Reed C.
Analysis of Disagreements                           Fall 1970:70

Leaheey, J. Bradford and R. Lewis Gable
The Strength of Patent Protection for Computer Products:
The Federal Circuit and the Patent Office Refine the Test
for Determining Which Computer-Related Inventions Constitute
Patentable Subject Matter                                  17:87

Lee, Cheryl R.
Cyberbanking: A New Frontier for Discrimination?          26:277

Lee, Karen M.
The Realities of the MP3 Madness: Are Record Companies Simply
Crying Wolf?.                                             27:131

Lenny, David C.
Copyright Infringement Problems of a Network/Home Cable Record
Selection and Playing System                                5:51

Lentz, David W.
Financing High-Technology: Congress Invests in a Better
Idea                                                       9:209

Levine, Gail F.
B2Bs, E-Commerce & The All-Or-Nothing Deal                28:383

Lipton, Dr. Jacqueline
Copyright in the Digital Age: A Comparative Survey        27:333

Lorr, Richard
Copyright, Computers and Compulsory Licensing              5:149

Lowry, Houston Putnam
Does Computer Stored Data Constitute a Writing for the
Purposes of the Statute of Frauds and the Statute
of Wills?                                                   9:93

MacDonald, David
The Electronic Freedom of Information Act Amendments: A Minor
Upgrade to Public Access Law                              23:357

Mackaay, Ejan
Reflections on the First National Conference on Automated Law
Research                                                   3:310

MacKay, J. Scott
Broderbund Software, Inc. v. Unison World, Inc.: "Look
and Feel" Copyright Protection for the Display Screens of
an Application Microcomputer Program                      13:105

Maertin, Harvey A. and Donald K. Wedding
Foreign Patent Filing: A Computer Approach                  2:71

Maggio, Janice M.
Determination of HDC-ABMT As Accepted Medical Practice for the
Treatment of Breast Cancer                                22:551

Mahon, James V.
A Commentary on Proposals for Copyright Protection on the
National Information Infrastructure                       22:223

Major, April M.
Copyright Law Tackles Yet Another Challenge: The Electronic
Frontier of the Worm Wide Web                              24:75

Malloy, Peter S.
Controls on the Export of Militarily Sensitive Technology:
National Security Imperative or U.S. Industry Impediment  18:841

Mandel, Lawrence D.
Digital Communications Associates, Inc. v. Softklone
Distributing Corp.: Copyright Protection for the Status
Screen of a Computer Program                              15:169

Manor, C. Robert
Living Organisms as Chemical Substances: The EPA's Biotechnology
Policy Under the Toxic Substances Control Act             13:409

Martin, Anne Crawford and Kevin Deasy
Seeking the Balance Between Government and Industry Interests in
Software Acquisition                                      14:159

Massucci, Thomas
Judges Without Chests or Rules Without Traces? The State
Technology, and the Law of "Warrantless Searches"         21:519

Mattice, Alice L. and Richard O. Cunningham
High Technology Imports and the U.S. Countervailing Duty and
Antidumping Laws                                          10:189

Mayer, Stephen
Privacy and the Social Security Number: Section 1211 of the Tax
Reform Act of 1976                                         6:221

McCarty, L. Thorne
Intelligent Legal Information Systems: Problems and
Prospects                                                  9:265

McDaniel, Jay
Electronic Torts and Videotex-At the Junction of Commerce and
Communication                                             18:773

McGahn, Donald F.
Copyright Infringement of Protected Computer Software: An
Analytical Method to Determine Substantial Similarity      21:88

McGraw, David K.
Sexual Harassment in Cyberspace: The Problem of Unwelcome
E-Mail                                                    21:491

McKee, William S.
Computers and the Courts-Recommendations Made to the Courts
Task Force                                                 3:134

Meadows, James E.
Software Protection in Transactions with the Soviet Union 12:133

Meeker, Heather J.
Multimedia and Copyright                                  20:375

Mello, Susan M.
Administering the Antidote to Computer Viruses: A Comment on
United States v. Morris                                   19:259

Meijboom, Alfred P.
Software Protection in "Europe 1992"                      16:407

Meisner, Mary M.
Archival Backup Copying of Software: How Broad a Right?   14:391

Meldman, Jeffrey A.
A Structural Model for Computer-Aided Legal Analysis        6:27

Menard, Brian Paul
And the Shirt off Your Back: Universal City Studios, DECSS, and
the Digital Millennium Copyright Act                      27:371

Mesevage, Thomas
The Carrot and the Stick: Protecting U.S. Intellectual Property
in Developing Countries                                   17:421

Mills, Miriam K.
Luddites at the Terminal and Other Renegades: Computer Generated
Conflict Areas                                            10:115

Misrock, S. Leslie, Brian D. Coggio and Norman C. Dulak
The Exercise of Patent Rights Through Multiple Exclusive
Field-of-Use Licensing                                    11:383

Moore, Gregory E.
Introduction to Symposium on Software Licensing           18:461

Moore, Harold C.
Atari v. Nintendo: Super Mario Uses "Expressive" Security
Feature to "Lock" Out the Competition                     18:919

Moorhead, William S.
Limiting Liability in Electronic Data Processing Service
Contracts                                                  4:141

Morehouse, Ward, David Dembo and Clarence Dias
Biotechnology and the Third World: Some Social, Economic,
Political and Legal Impacts and Concerns                  11:431

Morgan, Richard S.
The Nature of Statute Law or Parliament Speaks in a High Level
Language                                                   3:128

Motyka, Carol A.
Effects of U.S. Adherence to the Berne Convention         16:195

Muir, Bonnie E.
Technology Overtakes Entitlements: New York v. Sullivan   19:517

Naar, Alan S. and Stanley B. Stein
EFTS: The Computer Revolution in Electronic Banking        5:429

Nagel, Stuart S.
Computers: The Law and Politics of Redistricting            2:22

Nagel, Stuart, Kathleen Reinbolt and Thomas Eimermann
A Linear Programming Approach to Problems of Conflicting Legal
Values Like Free Press Versus Fair Trial                   4:420

Ng, Betty
Universal Health Identifier: Invasion of Privacy or Medical
Advancement?                                              26:331

Nimmer, Raymond T.
Uniform Codification of Commercial Contract Law           18:465

Nimmer, Raymond T., Donald A. Cohn & Ellen Kirsch
License Contracts Under Article 2 of the Uniform Commercial
Code: A Proposal                                          19:281

Nimtz, Robert O.
Diamond v. Diehr: A Turning Point                          8:267

Nimtz, Robert O.
The Patentability of Computer Programs            Spring 1970:38

Nolan, Herbert
Moving Business Data is Big Business                 Fall 1970:2

North, Geoffrey A.
Carnivore In Cyberspace: Extending The Electronic Communications
Privacy Act's Framework To Carnivore Surveillance         28:155

Novick, Mitchell P. and Helene Wallenstein
The Algorithm and Computer Software Patentability: A Scientific
View of a Legal Problem                                    7:313

Nycum, Susan
Liability for Malfunction of a Computer Program              7:1

Nycum, Susan Hubbell
The Criminal Law Aspects of Computer Abuse Part L State Penal
Laws, Part IL Federal Criminal Code                 5:271, 5:297

Nydegger, Rick D.
Practical and Legal Considerations in Drafting a U.S. Patent
Application for Computer-Related Inventions               18:109

Olson, Eric W.
Galoob v. Nintendo: Subject Matter Fixation and Consumer Fair
Use Define the Scope of Copyright Protection for
InteroperableWorks                                        18:879

Orchanian, Paul L.
Effective Use of Computers in Government          Spring 1970:98

Overstreet, Keith A.
Copyrightable Expression in the User Interface of a Computer
Program: Lotus Development Corporation v. Paperback Software
International                                             18:941

Pape, Christopher D.
Stop Payment in the New Uniform Payments Code              9:353

Pappas, Nicholas J.
In Defense of Monopoly Cable Television Franchising: Defining
the First Amendment Rights Of The Public and the Cable Operator
Under The Public Forum Doctrine and Natural Monopoly Theory
                                                          13:137

Parsonage, William H., Fred W. Vondracek & Hugh B. Urban
Conceptualization and Development of a Computer Assisted
Diagnostic and Prescriptive System for Juvenile Delinquents 4:86

Pedersen, Robin L.
West Publishing Co. v. Mead Data Central, Inc. (LEXIS)    14:359

Penn, Melissa
Legal Lines: Establishing a Personal Injury Case against a New
Jersey Utility for Harm Caused by Electromagnetic Fields  20:663

Perez, Nelson
The Unconstitutionality of Waste Flow Control and the
Environmental Justice Movement's Impact on Incinerators   22:587

Perritt, Henry H., Jr.
Artificial Intelligence Techniques for Evaluating Employee
Terminations on a Personal Computer                       13:341

Perritt, Henry H., Jr.
Legal and Technological Infrastructures for Electronic Payment
Systems                                                     22:1

Perry, Ronald F., Larry J. Siegel, Romine R. Deming & Stewart V.
Hoover
An Information Feedback Model for Probation Treatment Selection
and Evaluation                                             6:197

Petras, Dorothy D. and Susan Scarpelli
Computers, Medical Malpractice, and the Ghost of the T.J.
Hooper                                                      5:15

Plaia, Paul, Jr. and Joel D. Kaufman
Section 337 of the Tariff Act of 1930, As Amended: Effective
Protection for Changing Technology                        10:219

Plishner, Michael J.
"It's None of Your Business." Or Is It? California Addresses the
Computer Age                                               8:235

Polizzi, Catherine M.
A New View Into the Truth: Impact of a Reliable Deception
Detection Technology on the Legal System                  21:395

Pollack, Malla
The Multiple Unconstitutionality of Business Method Patents:
Common Sense, Congressional Consideration, And Constitutional
History                                                    28:61

Porter, John 1. and Robert G. Torricelli
Toward the 1980 Census: The Reapportionment of New Jersey's
Congressional Districts                                    7:135

Prasinos, Nicholas
Worldwide Protection of Computer Programs by Copyright      4:42

Prebut, David S.
State and Local Taxation of Electronic Commerce: The Forging of
Cyberspace Tax Policy                                     24:345

Pritchard, John L.
The Tax Treatment of Research and Development Expenditures: A
Comparison Between Financial Accounting Standards and Section
174 of the Internal Revenue Code                          10:149

Prutzman, Deborah S.
CHIPS and the Proposed Uniform New Payments Code            10:1

Quinn, Eugene R. Jr.
The Proliferation of Electronic Commerce Patents: Don't Blame
the PTO                                                   28:121

Rabin, Sander Marc
Computerized Marketing and Competition: Some Antitrust
Considerations                                             4:407

Raysman, Richard
Warranty Disclaimer in the Data Processing Contract        6:265

Reinbolt, Kathleen, Stuart Nagel and Thomas Eimermann
A Linear Programming Approach to Problems of Conflicting Legal
Values Like Free Press Versus Fair Trial                   4:420

Reynolds, Glenn H.
Legislative Comment: The Omnibus Space Commercialization
Act of 1993                                               20:581

Reznick, Allan E.
Synercom Technology, Inc. v. University Computing Co.: Copyright
Protection for Computer Formats and the Idea/Expression
Dichotomy                                                   8:65

Rice, David A.
Computer Related Decisions Under UCC Article 2: Lessons for the
Article 2 Revision and Software Contract Statute Drafters About
Realities of Contract                                     18:499

Rice, David A.
Whither (No Longer Whether) Software Copyright            16:341

Robbins, Virginia C.
United States v. Karo, Comment                            12:169

Roberts, Willis F.
The Use of the Legal Cadastre in the Maritime Provinces of
Canada                                                     5:121

Roddy, John
The Federal Computer Systems Protection Act                7:343

Roditti, Esther C.
Is Self-Help a Lawful Contractual Remedy?                 21:431

Root, Joseph E., III
Protecting Computer Software in the '80's: Practical Guidelines
for Evolving Needs                                         8:205

Rosales, Geraldine P.
Mainstream Loudoun and the Future of Internet Filtering for
America's Public Libraries                                26:357

Rose, Deborah A.
Changing Relationships in Technology Transfer to the Third
World: Case Study of Biotechnology in Agriculture         11:531

Rose, Jonathan
E-Mail Security Risks: Taking Hacks at the Attorney-Client
Privilege                                                 23:179

Rose, Lance
End-User Licensees of Computer Programs-Are They Allowed to
Compete With Their Licensors?                             13:297

Rosenfeld, Susan C.
Sharing of Research Results in a Federally Sponsored Gene
Mapping Project                                           14:311

Ross, Susan Dente
A Decade After Divestiture: Regional Bells, Video Programming
and the First Amendment                                   21:143

Roth, Alan W.
Videotape in the Courts: Its Use and Potential             3:279

Rudnick, Robert E.
Manufacturers Technologies, Inc. v. CAMS, Inc.: A False Hope for
Software Developers Seeking Copyright Protection for Their
Generated Screen Displays                                 17:211

Saez, Carolina
Enforcing Copyrights in the Age of Multimedia             21:351

Sales, Jeanmarie T.
The Drug Export Amendment Act of 1986                     15:475

Samuelson, Pamela
Digital Media and the Changing Face of Intellectual Property
Law                                                       16:323

Samuelson, Pamela
Understanding the Implications of Selling Rights in Software to
the Defense Department: A Journey Through the Regulatory
Maze                                                       13:33

Sardinas, Joseph L. and Jerome S. Horvitz
Impeachment of Government Systems Documentation for Taxpayers
Classified as Non-Filers                                    6:73

A Logic for the Analysis of Collateral Estoppel            12:99
Scarpelli, Susan, and Dorothy D. Petras
Computers, Medical Malpractice and the Ghost of the T.J.
Hooper                                                      5:15

Schachter, Esther Roditti
Techniques For Litigation Avoidance in Contracting For Computer
Systems                                                   10:109

Schallop, Michael Joel
Software Patent Applications Directed to Business and
Mathematical Processing Applications Highlight the Tension
Between State Street and Benson                            26:89

Schartum, Dag Wiese and Jon Bing
Automated Systems and Claim Realization in Social Security
Organizations                                              12:83

Scheinfeld, Robert C. and Gary M. Butter
Using Trade Secret Law to Protect Computer Software       17:381

Scheurer, Kirsten
The Clipper Chip: Cryptography Technology and the Constitution
-- The Government's Answer to Encryption "Chips" Away at
Constitutional Rights                                     21:263

Schier, Cecelia A.
Technological Trade with the Former Eastern Bloc: The Evolution
of Export Control and Its Relationship to Structural Trade
Barriers                                                  19:223

Schwartzstein, Linda A.
Legal Education, Information Technology and Systems
Analysis                                                   13:59

Schwetje, F. Kenneth
Space Law: Considerations for Space Planners              12:245

Scott, Susan & Lynne A. Anderson
Admissibility of Scientific Evidence: Proposed Implementation of
the Guidelines of Daubert and Landrigan Under the Newly Adopted
New Jersey Rules of Evidence                                20:1

Seipel, Peter
Introducing Law Students to Computers: Swedish
Experiences                                       Spring 1970:88

Sheth, Pankaj S. and Sidney W. Hess
Multiple Criteria in Political Redistricting: Development of
Relative Values                                             2:44

Siegel, Andrew J. and Marc S. Friedman
From Flour Barrel To Computer Systems: The Applicability of
Theories of Alternative Liability to Shift the Burdens of Proof
in Cases of Intermingled Causation and Damages Within a Modern
Computer Scenario                                         14:289

Siegel, Larry J., Romine R. Deming, Ronald F. Perry and Stewart
V. Hoover
An Information Feedback Model for Probation Treatment Selection
and Evaluation                                             6:197

Silver, David
A Case Against the Use of Public Opinion Polls as an Aid in Jury
Selection                                                  6:177

Silverstein, David
Patents, Science and Innovation: Historical Linkages and
Implications for Global Technological Competitiveness     17:261

Singer, Paula Noyes
Proposed Changes to the Federal Rules of Evidence as Applied to
Computer-Generated Evidence                               17:157

Singh, Kulpreet
The FCC's Pioneer's Preference Policy: An Innovative Idea Grows
Old and Weary                                             22:143

Singh, Sanjiv N.
Cyberspace: A New Frontier for Fighting Words             25:283

Siver, Keith
Good Samaritans in Cyberspace                               23:1

Slawsky, Albert A.
Case Comment: Monopoly-Relevant Market Telex v. IBM        5:171

Slivka, R.T. and J.W. Darrow
Methods and Problems in Computer Security                  5:217

Smithson, Stephen W.
The Department of the Interior Should Incorporate Current Water
Body Modeling Techniques in the Natural Resource Damage
Assessment Model for Coastal and Marine Environments      20:701

Sokasits, David A.
The Long Arm of the Fax: Service of Process Using Fax
Machines                                                  16:531

Soltysinski, Stanislaw J.
Computer Programs and Patent Law: A Comparative Study        3:1

Soltysinski, Stanislaw J.
Legal Protection for Computer Programs, Public Access to
Information and Freedom of Competitive Research and Development
Activities                                                16:447

Soma, John T. & Charles P. Henderson
Encryption, Key Recovery, and Commercial Trade Secret Assets: A
Proposed Legislative Model                                 25:97

Soma, John T. and Andrea R. Stem
A Survey of Computerized Information For Lawyers: LEXIS, JURIS,
WESTLAW and FLITE                                          9:295

Soma, John T., Gus Winfield and Letty Friesen
Software Interoperability and Reverse Engineering         20:189

Soobert, Allan M.
Analyzing Infringement by Equivalents: A Proposal to Focus the
Scope of International Patent Protection                  22:189

Smith, Milton L. III
The Orbit/Spectrum Resource and the Technology Of Satellite
Telecommunications: An Overview                           12:285

Sporn, Jessica
Content Regulation of Cable Television: "Indecency" Statutes and
the First Amendment                                       11:141

Staggs, H. Bradley
Lessors of Computer Equipment: Do They Receive Fair Treatment
Under the Bankruptcy Code                                  15:81

Stein, Stanley B. and Alan S. Naar
EFTS: The Computer Revolution in Electronic Banking        5:429

Stern, Andrea R. and John T. Soma
A Survey of Computerized Information For Lawyers: LEXIS, JURIS,
WESTLAW and FLITS                                          9:295

Stern, Laurence C.
Medical Information Bureau: The Life Insurer's Databank      4:1

Stern, Richard H.
Copyright in Computer Programming Languages               17:321

Stem, Richard H.
Shrink-Wrap Licenses of Mass Marketed Software: Enforceable
Contracts or Whistling in the Dark?                        11:51

Stevens, George E. and Harold M. Hoffman
Tort Liability for Defamation by Computer                   6:91

Stevens, Scott J. and Douglas K. Wolfson
You Can Bank On It: An Analysis of Judicial Branch Bank
Characterization and an Alternative Proposal               5:389

Stroger, Howard M.
The Use of Electronic Data Processing Equipment in Law Office
Management and Fiscal Control                     Spring 1970:82

Susswein, Linda
The Patent Law Equivalency Doctrine and Reduced Instruction Set
Computing Technology: If It Computes Like a Duck, Is It Still a
Duck?                                                     16:571

Takenaka, Toshiko
Doctrine of Equivalents After Hilton Davis: A Comparative Law
Analysis                                                  22:479

Tapper, Colin
Evidence From Computers                                    4:324

Thatch, David
Personal Jurisdiction and the World-Wide Web: Bits (and Bytes)
of Minimum Contacts                                       23:143

Toedt, D.C. III
The Model Software License Provisions: Precursor to a
Gap-Filling Uniform License Statute?                      18:521

Tomasello, Frank A., Jr.
Regulation of Amateur Radio Antenna Height, Restrictive
Covenants and Local Regulation: Is the Ham's Goose
Cooked?                                                   16:227

Torricelli, Robert G. and John I. Porter
Toward the 1980 Census: The Reapportionment of New Jersey's
Congressional Districts                                    7:135

Tramontana, James
Computer Viruses: Is There a Legal "Antibiotic"?          16:253

Tunick, David
Legal Advice for a Company Hiring Computer Programmers from
Another Company                                           19:405

Tyree, Alan L.
Can a "Deterministic" Computer Judge Overrule Himself      7:381

Urban, Hugh B., Fred W. Vondracek, and William H. Parsonage
Conceptualization and Development of a Computer Assisted
Diagnostic and Prescriptive System for Juvenile
Delinquents                                                 4:86

Vergari, James V.
A Critical Look at the New Uniform Payments Code           9:317

Vergari, James V.
Evidential Value and Acceptability of Computer Digital-Image
Printouts                                                  9:343

Volonino, Linda and Adolph C. Iannaccone
Marginal Cost and Relevant Market Determination in Information
Technology Antitrust Cases                                18:681

Vondracek, Fred W., Hugh B.Urban and William H. Parsonage
Conceptualization and Development of a Computer Assisted
Diagnostic and Prescriptive System for Juvenile Delinquents 4:86

Wall, Rosemary Pierce
International Trends in New Drug Approval Regulation: The Impact
on Pharmaceutical Innovation                              10:317

Wallenstein, Helene and Mitchell P. Novick
The Algorithm and Computer Software Patentability: A Scientific
View of a Legal Problem                                    7:313

Walter, Charles
Defining the Scope of Software Copyright Protection For Maximum
Public Benefit                                             14:01

Walterscheid, Edward C.
Access to Federally Funded Research Data Under the Freedom of
Information Act                                             15:1

Walton, Kenneth R.
The Use of Evidence Extrinsic to a Single Source to Support
Anticipation                                              20:339

Ward, David
Sisyphean Circles: The Communications Assistance for Law
Enforcement Act                                           22:267

Warner, David R., Jr.
A Neural Network-Based Law Machine: Initial Steps          18:51

Warner, David R., Jr.
The Role of Neural Networks in the Law Machine
Development                                               16:129

Warner, Richard Stephen D. Sowle & Will Sadler
Teaching Law With Computers                               24:107

Wedding, Donald K. and Harvey R. Maertin
Foreign Patent Filing: A Computer Approach                  2:71

Wegner, Harold C.
Equitable Equivalents: Weighing the Equities to Determine
Patent Infringement in Biotechnology and Other Emerging
Technologies                                                18:1

Wensman, Michael J.
Federal Tax Treatment of Software Development Expenses: Is the
I.R.S. Position Outdated?                                   9:77

Wessel, Milton R.
The Computer Revolution: A Challenge to the Law Schools-and a
Dream                                                      3:180

Wessel, Milton R.
The Incremental Marketing of Computer Services and the "Tie-In"
Sale-A Case for Presuming Coercion                         2:135

Wessel, Milton R.
Telez v. IBM: Another Viewpoint                              5:1

Whealan, David W.
Atlantic Thermoplastics v. Faytex: The Federal Circuit Debate
Over the Scope of Product-by-Process Claims               20:633

White, Charles H., Jr.
Shared Computing: An Attorney's
"Need to Know"                                    Spring 1970:63

Wiggins, Noreen M.
The Intellectual Property Bankruptcy Act: The Legislative
Response to Lubrizol Enterprises, Inc. v. Richmond Metal
Finishers, Inc                                            16:603

Willick, Marshal S.
Professional Malpractice and the Unauthorized Practice of
Professions: Some Legal and Ethical Aspects of the Use of
Computers as Decision-Aids                                  12:1

Wilson, Dolores Y.P.
Computerization of Welfare Recipients: Implications for the
Individual and the Right to Privacy                        4:163

Winston, Michael
The Commerce Clause and State Programs Aimed at Encouraging the
Development of High-Technology Industries                  11:17

Wintringham, Drew M. and Thomas C. Creel
Patent Systems and Their Role in the Technological Advance of
Developing Nations                                        10:255

Wolfson, Douglas K.
From the Legislature: An Overview of the Report of the National
Commission on Electronic Fund Transfer Systems             6:103

Wolfson, Douglas K. and Scott J. Stevens
You Can Bank On It.: An Analysis of Judicial Branch Bank
Characterization and an Alternate Proposal                 5:389

Wormser, David A.
Licensing Computer-Related Exports                        10:233

Wozniak, Catharine Cookson
Nonpoint Source Water Pollution and the Imposition of Effluent
Limitations on Point Sources                               8:117

Yanow, Lilli A.
Copying, The Reconciliation of Conflicting Interests: An
Analysis of Williams & Wilkins Co. v. United States        3:328

Young, Andrew J.
Legal and Techno-Political Implications of the Use of Nuclear
Power Sources in Outer Space                              12:305

Yuckman, David A.
The National Public Radio Satellite System: FCC Jurisdiction
Over a New Communications Technology                       8:135

Yures, Edward M.
Gambling on the Internet: The States Risk Playing Economic
Roulette As the Internet Gaming Industry Spins Onward     28:193

Zinman, Marion J.
Computer Arbitration: The Program of the Future           10:103

TITLE INDEX TO
BOOK AND ARTICLE REVIEWS

Bernacchi on Computer Law: A Guide to the Legal and Management
Aspects of Computer Technology
Richard L. Bernacchi, Peter B. Frank and Norman Statland (Jordan
M. Blanke)                                                13:237

Computer Crime: A Review of Cyberpunk
Katie Hafner and John Markoff (Robert D. Sprague)         18:439

Computer Law Cases and Materials
Seth E. Lipner and Stephen Kalman (Marc S. Friedman)      16:285

Computer Law: Drafting and Negotiating Forms and Agreements
Richard Raysman and Peter Brown (Emmette F. Hale, III)    13:243

Computer Law: Evidence and Procedure
David Bender (Chris Rillo)                                 7:247

Computer Law: Software Protection and Litigation
David Bender (John C. Connell)                            12:203

Computer Law and Tax Report
Robert P. Bigelow (Laurence C. Stern)                      5:183

Computer Research and Legal Reasoning: A Case Study of Judicial
Decision Prediction in Zoning Amendment Cases, 1977 American Bar
Foundation Research Journal 655
Haar, Sawyer and Cummings (William Manns)                  7:251

Computer Software: Contracting for Development and Distribution
Mark L. Gordon (James J. Marcellino)                      13:559

Computers in the Information Society
Nathan Weinberg (Robert D. Sprague)                        17:25

Computers for Lawyers: A Report to the Scottish Legal Computer
Research Trust
W. Aitken, C.M. Campbell and R.S. Morgan (Bonnie Daniels)  3:152

Computers and Political Campaigning
Robert L. Chartrand (Paul R. Kurland)                      3:345

Computing Law
Peter Seipel (Dan Reiss)                                   6:297

Copyright for the Eighties: Cases and Materials
A. Latman, R. Gorman and J. Ginsburg (Marshall A.
Leafier)                                                  14:285

Data Banks and Society: The First International Oslo Symposium
on Data Banks and Privacy
(James C. Baxendale)                                       2:242

Data Processing Contracts and the Law
Richard L. Bernacchi and Gerald H. Larsen (Richard McGill) 4:462

Databanks in a Free Society: Computers, Record-Keeping and
Privacy
Alan F. Westin (Colin Tapper)                              3:155

Decompilation & European Protection of Computer Programs: A
Review of Legal Protection of Computer Programs in Europe:
A Guide to the EC Directive
Bridget Czamota & Robert J. Hart (Anthony C. Clapes)      20:329

The Equity Funding Papers: The Anatomy of a Fraud
Lee J. Seidler, Frederick Andrews and Marc J. Epstein
(Frank Leanza)                                             6:300

Expert Systems In Law; A Jurisprudential Inquiry
Richard E. Susskind (Mary J. Hildebrand)                  15:505

Formalism in AI and Computer Science
Philip Leith (Louis Giansante)                            17:555

Government Regulation of the Computer Industry
Bruce Gilchrist and Milton R. Wessel (Robert K. Hood)      2:246

The Patentability of Computer Software: An International
Guide to the Protection of Computer Related Inventions
Dr. H.W.A.M. Hanneman (James R. Merritt)                  13:565

Regulation of Broadcast
Douglas H. Ginsburg (David A. Yuckman)                     7:389

Science and Conscience: Improving Socio-Scientific Dispute
Resolution Milton R. Wessel (Louis A. Novellino)           8:363

Software Protection: Practical and Legal Steps to Protect and
Market Computer Programs
G. Gervaise Davis, III (David A. Rice)                    12:471

Users' Guide to Computer Crime: Its Commission, Detection, and
Prevention
Stephen W. Liebholz and Louis D. Wilson (Robert L.
Walker)                                                    5:503

Using Computers In The Law, An Introduction and Practical
Guide Mary Ann Mason (Geoffrey McC. Johnson)              15:499

Your Computer and the Law
Robert P. Bigelow and Susan H. Nycum (Maria Metzler Johns  6:113

AUTHOR INDEX TO
BOOK AND ARTICLE REVIEWS

Aitken, W., C.M. Campbell and R.S. Morgan
Computers for Lawyers: A Report to the Scottish Legal Computer
Research Trust (Bonnie Daniels)                            3:152

Andrews, Frederick, Lee J. Seidler and Marc J. Epstein
The Equity Funding Papers: The Anatomy of a Fraud
(Frank Leanza)                                             6:300

Bender, David
Computer Law: Evidence and Procedure (Chris Rillo)         7:247

Bender, David
Computer Law.' Software Protection and Litigation
(John C. Connell)                                         12:203

Bemacchi, Richard L. and Gerald H. Larsen
Data Processing Contracts and the Law (Richard McGill)     4:462

Bernacchi, Richard L., Peter B. Frank and Norman Statland
Bernacchi on Computer Law: A Guide to the Legal and Management
Aspects of Computer Technology (Jordan M. Blanke)         13:237

Bigelow, Robert P.
Computer Law and Tax Report (Laurence C. Stern)            5:183

Bigelow, Robert P. and Susan H. Nycum
Your Computer and the Law (Maria Metzler Johnson)          6:113

Brown, Peter and Richard Raysman
Computer Law: Drafting and Negotiating Forms and Agreements
(Emmette F. Hale, 111)                                    13:243

Campbell, C.M., W. Aitken, and R.S. Morgan
Computers for Lawyers: A Report to the Scottish Legal Computer
Research Trust (Bonnie Daniels)                            3:152

Chartrand, Robert L.
Computers and Political Campaigning (Paul R. Kurland)      3:345

Cummings, Haar, & Sawyer
Computer Research and Legal Reasoning: A Case Study of Judicial
Decision Prediction in Zoning Amendment Cases, 1977 American Bar
Foundation Research Journal 655 (William Manns)            7:251

Czarnota, Bridget & Robert J. Hart
Decompilation & European Protection of Computer Programs: A
Review of Legal Protection of Computer Programs in Europe: A
Guide to the EC Directive (Anthony C. Clapes)             20:329

Davis, G. Gervaise, III
Software Protection: Practical and Legal Steps to Protect and
Market Computer Programs (David A. Rice)                  12:471

Epstein, Marc J., Lee J. Seidler and Frederick Andrews
The Equity Funding Papers: The Anatomy of a Fraud
(Frank Leanza)                                             6:300

Frank, Peter B., Richard L. Bernacchi, and Norman Statland
Bernacchi on Computer Law: A Guide to the Legal and Management
Aspects of Computer Technology (Jordan M. Blanke)         13:237

Gilchrist, Bruce and Milton R. Wessel
Government Regulation of the Computer Industry
(Robert K. Hood)                                           2:246

Ginsburg, Douglas H.
Regulation of Broadcast (David A. Yuckman)                 7:389

Ginsburg, J., A. Latman and R. Gorman
Copyright for the Eighties: Cases and Materials
(Marshall A. Leaffer)                                     14:285

Gordon, Mark L.
Computer Software: Contracting for Development and Distribution
(James J. Marcellino)                                     13:559

Haar, Sawyer and Cummings
Computer Research and Legal Reasoning: A Case Study of Judicial
Decision Prediction in Zoning Amendment Cases, 1977 American Bar
Foundation Research Journal 655 (William Manns)            7:251

Hafner, Katie and John Markoff
Computer Crime: A Review of Cyberpunk (Robert D. Sprague) 18:439

Hanneman, H.W.A.M.
The Patentability of Computer Software: An International Guide
to the Protection of Computer Related Inventions (James R.
Merritt)                                                  13:565

Kalman, Stephen and Seth E. Lipner
Computer Law Cases and Materials (Marc S. Friedman)       16:285

Larsen, Gerald H. and Richard L. Bernacchi
Data Processing Contracts and the Law (Richard McGill)     4:462

Leith, Philip
Formalism in AI and Computer Science (Louis Giansante)    17:555

Liebholz, Stephen W. and Louis D. Wilson
Users' Guide to Computer Crime: Its Commission, Detection, and
Prevention (Robert L. Walker)                              5:503

Lipner, Seth E. and Stephen Kalman
Computer Law Cases and Materials (Marc S. Friedman)       16:285

Markoff, John and Katie Hafner
Computer Crime: A Review of Cyberpunk (Robert D. Sprague) 18:439

Mason, Mary Ann
Using Computers In The Law, An Introduction and Practical Guide
(Geoffrey McC. Johnson)                                   15:499

Morgan, R.S., W. Aitken, and C.M. Campbell
Computers for Lawyers: A Report to the Scottish Legal Computer
Research Trust (Bonnie Daniels)                            3:152

Nycum, Susan H. and Robert P. Bigelow
Your Computer and the Law (Maria Metzler Johnson)          6:113

Raysman, Richard and Peter Brown
Computer Law: Drafting and Negotiating Forms and Agreements
(Emmette F. Hale, III)                                    13:243

Sawyer, Haar and Cummings
Computer Research and Legal Reasoning: A Case Study of Judicial
Decision Prediction in Zoning Amendment Cases, 1977 American Bar
Foundation Research Journal 655 (William Manns)            7:251

Seidler, Lee J., Frederick Andrews and Marc J. Epstein
The Equity Funding Papers: The Anatomy of a Fraud
(Frank Leanza)                                             6:300

Seipel, Peter
Computing Law (Dan Reiss)                                  6:297

Statland, Norman, Richard L. Bernacchi and Peter B. Frank
Bernacchi on Computer Law: A Guide to the Legal and Management
Aspects of Computer Technology (Jordan M. Blanke)         13:237

Susskind, Richard E.
Expert Systems In Law; A Jurisprudential Inquiry
(Mary J. Hildebrand)                                      15:505

Weinberg, Nathan
Computers in the Information Society (Robert D. Sprague)  17:251

Wessel, Milton R.
Science and Conscience: Improving Socio-Scientific Dispute
Resolution (Louis A. Novellino)                            8:363

Wessel, Milton R. and Bruce Gilchrist
Government Regulation of the Computer Industry
(Robert K. Hood)                                           2:246

Westin, Alan F.
Databanks in a Free Society: Computers, Record-Keeping and
Privacy (Colin Tapper)                                     3:155

Wilson, Louis D. and Stephen W Liebholz
Users' Guide to Computer Crime: Its Commission, Detection, and
Prevention (Robert L. Walker)                              5:503
COPYRIGHT 2003 Rutgers University School of Law - Newark
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 2003 Gale, Cengage Learning. All rights reserved.

Article Details
Printer friendly Cite/link Email Feedback
Publication:Rutgers Computer & Technology Law Journal
Date:Jun 22, 2003
Words:13686
Previous Article:Thirty-fifth selected Bibliography on computers, technology and the law (January 2002 through December 2002).
Next Article:Pornography, community and the Internet - freedom of speech and obscenity on the Internet.


Related Articles
Mississippi and the Publications of the State Academies of Science.
Annual review of biophysics and biomolecular structure; v.34, 2005.
Annual review of nutrition; v.25, 2005.
Annual Review of Environment and Resources: v.30, 2005.
Advances in photochemistry; v.29.
Annual review of environment and resources; v.31, 2006.
Annual review of biomedical engineering; v.9, 2007.
CARING Newsletter indexed in CINAHL.
Annual review of anthropology; v.36, 2007.
A cumulative index to volumes I-VI of Paul Oskar Kristeller's Iter italicum; accedunt alia itinera: A finding list of uncatalogued or incompletely...

Terms of use | Copyright © 2016 Farlex, Inc. | Feedback | For webmasters