Printer Friendly

Forty-fifth selected bibliography on computers, technology, and the law.

(January 2013 through December 2013)

INTRODUCTION

Each year, the Journal provides a compilation of the most important and timely articles on computers, technology, and the law. The Bibliography, indexed by subject matter, is designed to be a research guide to assist our readers in searching for recent articles on computer and technology law. This year's annual Bibliography contains nearly 1000 articles, found through the examination of over 1000 periodicals.

The Bibliography aims to include topics on every legal aspect of computers and technology. However, as new issues in this field emerge, we welcome your suggestions for additional topics and sources, as well as your commentary on the Bibliography.
INDEX

1. Computers and Technology in Law Practice
   1.0 General
   1.1 Computerized Legal Research
       1.1.0 General
       1.1.1 Online Legal Research
   1.2 Law Office Management
       1.2.0 General
       1.2.1 Office Automation
       1.2.2 Case Management
       1.2.3 Case File Security
       1.2.4 Internet Access
   1.3 Selected Uses in the Law Practice
       1.3.0 General
       1.3.1 Tax Filing
       1.3.2 Bankruptcy
       1.3.3 Estate Planning
       1.3.4 Real Estate
       1.3.5 Advertising

2. Computers and Technology in Litigation
   2.0 General
   2.1 Scientific Evidence
       2.1.0 General
       2.1.1 Expert Testimony
       2.1.2 DNA Typing
       2.1.3 Fingerprint
       2.1.4 Lie Detection
       2.1.5 Forensic Evidence
   2.2 Demonstrative Evidence
       2.2.0 General
       2.2.1 Computer-Generated Evidence
       2.2.2 Audio/Visual Evidence
   2.3 Electronic Discovery
   2.4 Courtroom and Judges
   2.5 Dispute Resolution

3. Computers, Technology and the Government
  3.0 General
  3.1 Computers, Technology and Law Enforcement
  3.2 Use of Computers and Technology by the Military
  3.3 Use of Computers and Technology by State and Federal Legislatures
  3.4 Regulation of Computers and Technology
       3.4.0 General
       3.4.1 First Amendment Concerns
       3.4.2 Antitrust
       3.4.3 FCC Regulation
       3.4.4 SEC Regulation

4. Issues of Privacy, Security and Crime
  4.0 General
  4.1 Problems of Privacy

       4.1.0 General
       4.1.1 Data Privacy
       4.1.2 Privacy in the Workplace
  4.2 Security
       4.2.0 General
       4.2.1 Cyberwar
       4.2.2 Encryption and Digital Signatures
  4.3 Crime
       4.3.0 General
       4.3.1 Internet

5. Computers, Technology and Education
  5.0 General
  5.1 Legal Education

6. Computers, Technology and Business
  6.0 General
  6.1 Electronic Commerce
       6.1.0 General
       6.1.1 Taxation
  6.2 Computers in Banking and Finance
       6.2.0 General
       6.2.1 On-line Securities Trading
  6.3 Computers and Technology in the Transportation Industry
  6.4 Computers and Technology in the Publishing Industry
  6.5 Computers and Technology in Advertising
  6.6 Computers and Technology in Accounting

7. Intellectual Property Protection of Computers and Technology
  7.0 General
  7.1 Patent

       7.1.0 General
       7.1.1 Software Patent
       7.1.2 Biotech Patent
  7.2 Software Copyright
       7.2.0 General
       7.2.1 User Interface
       7.2.2 Fair Use
       7.2.3 Video Game
  7.3 Digital Copyright
       7.3.0 General
       7.3.1 Electronic Compilation
       7.3.2 Computer Database
       7.3.3 Multimedia
       7.3.4 Computer-Generated Works
  7.4 Trademark
  7.5 Trade Secret
  7.6 Semiconductor Chip Protection
  7.7 Licensing
  7.8 Intellectual Property Issues of the Internet
  7.9 International Developments
       7.9.0 General
       7.9.1 GATT-TRIPS
       7.9.2 NAFTA
       7.9.3 Developments in Canada
       7.9.4 Developments in Mexico and Latin America
       7.9.5 Developments in Australia and New Zealand
       7.9.6 Developments in Africa
       7.9.7 Developments in Asia
       7.9.8 Developments in Western Europe
       7.9.9 Developments in Eastern Europe and Russia

8. Computers and Legal Reasoning
  8.0 General
  8.1 Artificial Intelligence

9. Legal Issues of the Internet
  9.0 General
  9.1 ISP and Internet Access
      9.1.0 General
      9.1.1 Net Neutrality
  9.2 Domain Names
  9.3 Civil Procedure in Cyberspace
  9.4 Online Communities
      9.4.0 General
      9.4.1 Social Networking
      9.4.2 Virtual Worlds
  9.5 First Amendment Concerns

10. LAW AND TECHNOLOGY
  10.0 General
  10.1 Technology Transfer
  10.2 Audio/Video Recording
  10.3 Space Law
  10.4 Medical Technology

      10.4.0 General
      10.4.1 Electronic Records
  10.5 Science and Technology
     10.5.0 General
     10.5.1 Biotechnology
     10.5.2 Pharmaceuticals
     10.5.3 Stem Cells and Cloning
     10.5.4 Nanotechnology
  10.6 Environmental Law
     10.6.0 General
     10.6.1 Pollution
     10.6.2 Hazardous Substances
     10.6.3 Electromagnetic Fields
     10.6.4 Nuclear Technology
     10.6.5 Energy and the Environment
     10.6.6 International Environmental Law Developments
  10.7 Television
     10.7.0 General
     10.7.1 Satellite Television
     10.7.2 Cable Television
  10.8 Telecommunications
     10.8.0 General
     10.8.1 Telephone
     10.8.2 Multimedia in Telecommunications
     10.8.3 International Telecommunications Developments
  10.9 Recording Industry
  10.10 Broadband

11. Family law

12. Other


BIBLIOGRAPHY

1. COMPUTERS AND TECHNOLOGY IN LAW PRACTICE

1.0 General

Vanessa S. Browne-Barbour, A Fork in the Road: The Intersection of Virtual Law and Social Media, 52 WASHBURN L. J. 267 (2013).

John G. Browning, Facebook, Twitter, and LinkedIn--Oh My! The ABA Ethics 20/20 Commission and Evolving Ethical Issues in the Use of Social Media, 40 N. KY. L. REV. 255 (2013).

John G. Browning, Keep Your 'Friends" Close and Your Enemies Closer: Walking the Ethical Tightrope in the Use of Social Media, 3 ST. MARY'S J. LEGAL MAL. & ETHICS 204 (2013).

Steven Buse, Disclaim What 1 Say, Not What I Do: Examining the Ethical Obligations Owed by LegalZoom and Other Online Legal Providers, 37 J. LEGAL PROF. 323 (2012-2013).

Philip J. Favro, Inviting Scrutiny: How Technologies Are Eroding the Attorney-Client Privilege, 20 RICH J.L. & TECH. 2 (2013).

Erin R. Frankrone, Free Agents: Should Crowdsourcing Lead to Agency Liability for Firms, 15 VAND. J. ENT. & TECH. L. 883 (2013).

James Gibson, Vertical Boilerplate, 70 WASH. & LEE L. REV. 161 (Issue 1, Winter 2013).

Louise Lark Hill, Technology--A Motivation behind Recent Model Rule Revisions, 40 N. KY. L. REV. 315 (2013).

Jonathan Levy, Employee E-mails and the Concept of Earning the Privilege, 9 ISJLP 1 (2013).

Joshua M. Loveall, Ethical Considerations of Court- Ordered Disclosures of Litigant-Sponsored Law Bloggers, 26 GEO. J. LEGAL ETHICS 879 (2013).

Samantha A. Moppett, Control-Alt-Incomplete?: Using Technology to Assess "Digital Natives," 12 CHI.-KENT J. INTELL. PROP. 77 (2013).

Ann M. Murphy, The Philip D. Reed Lecture Series Evidence Rules Committee: Symposium on Rule 502: Is It Safe? The Need For State Ethical Rules To Keep Pace With Technological Advances, 81 FORDHAM L. REV. 1651 (2013).

Jennifer J. Riley, High-Tech Cures for the Low-Budget Case, 36 FAM. ADVOC. 42 (2013).

David M. Schraver, Serving the Profession Through Technology, 85 N.Y. ST. B.A. J. 5 (2013).

1.1 COMPUTERIZED LEGAL RESEARCH

Margaret M. Krause, Date Discrepancies in Citing to Supreme Court Decisions, Legal Research Database Comparison: Fairfax Devisee v. Hunter's Lessee on its 200th Anniversary, 57 LAW LIBR. LIGHTS 1 (2013).

Charlotte Schneider, A Better Resource for Faculty and Students: Transformation of a Law Library Website, 57 LAWLIBR. LIGHTS 1 (2013).

Tracy Woodard, Access to Information in Your Law Library, 57LAWLIBR. LIGHTS, 1 (2013).

1.1.0 General

Brittany M. McIntosh, Gamecocks Spur Trouble in Jury Deliberations: What the Fourth Circuit Really Thinks about Wikipedia as a Legal Resource in United States v. Lawson, 64 S.C. L. REV. 1157 (2013).

Jessica Thaler, Tool for Lawyers in Transition: LinkedIn, A Law Practice Management, 85 N.Y. ST. B.A. J. 47 (2013).

1.1.1 Online Legal Research

BJ Ard, Confidentiality and the Problem of Third Parties: Protecting Reader Privacy in the Age of Intermediaries, 16 YALE J.L.& TECH. 1 (2013).

Tom Gaylord, What's New with Fastcase, 101 ILL. B.J. 368 (2013).

Gerald J. Hoenig, Technology-Property, 27 PROB. & PROP. No. 01 (2013).

Kurt Mattson, Why Do I Need Books? Isn't Everything Online?, NEV. L., Oct. 2013, at 20.

Christina J. Oleson, Ethics and Email Discussion Groups, 101 ILL. B.J. 464 (2013).

Kirk Charles Simoneau, Computers Can't Write: A Review of Wordrake Editing Software for Lawyers, N.H. BAR NEWS 6 (2013).

Judith Townend, Closed Data: Defamation and Privacy Disputes in England and Wales, 5 J. MEDIA L. 31 (2013).

1.2 Law Office Management

1.2.0 General

Joseph W. Booth, The iPad as Law Office Workhorse, 36 FAM. ADVOC. iii (2013-2014).

NHBA Board of Governors, Ethics Committee Advisory Opinion #2012-13/4 The Use of Cloud Computing in the Practice of Law, 23 N.H. BAR NEWS, Mar. 2013, at 36.

Daniel Burda & Frank Teuteberg, Why Discard When You Can Keep Them? A Case Study on the Email Retention Behaviour in Firms, 22 J.L. INFO. & SCI. 183 (2012-2013).

James Farrell, Social Media for Social Change Lawyers: An Australian Housing Rights Lawyer's Experience, 20 INT'L J. LEGAL PROF. 209 (2013).

Gerald J. Floenig, Technology-Property, 27 PROB. & PROP. No. 03 (2013).

Ellie Margolis, It's Time to Embrace the New-- Untangling the Uses of Electronic Sources in Legal Writing, 23 ALB. L.J. SCI. & TECH. 191 (2013).

Michael McNerney & Emilian Papadopoulos, Hacker's Delight: Law Firm Risk and Liability in the Cyber Age, 62 AM.U. L. REV. 1243 (2013).

Victoria A. Mercer, Creating a Virtual Law Firm to Meet the Needs of Today's Lawyer, N.J. LAW. MAG., Aug. 2013, at 31.

Brian R. Pfefferle, Law Office Technology Tools for Lawyers: What Makes "Cents"?, 76 SASK. L. REV. 109 (2013).

Roger Smith, Headline Hunters, 163 NEW L.J. 8 (2013).

1.2.1 Office Automation

1.2.2 Case Management

Gerald J. Hoenig, Technology-Property, 27 PROB. & PROP.NO. 05 (2013).

1.2.3 Case File Security

Alan W. Ezekiel, Hackers, Spies, and Stolen Secrets: Protecting Law Firms from Data Theft, 26 HARV. J. L. & TECH. 649 (2013).

Rob Howard, Tech Talk: Backing Up in "The Cloud", 23 N.H. BAR NEWS 4 (2013).

Meghan C. Lewallen, Note, Cloud Computing: A Lawyer's Ethical Duty To Act With Reasonable Care When Storing Client Confidences "In The Cloud," 60 CLEV. ST. L. REV. 1133 (2013).

New Hampshire Bar Association Ethics Committee, Ethics Comer: Lawyers & Cloud Computing: Be Careful Up There, 23 N.H. BAR NEWS, Aug. 2013, at 34.

Rachel G. Packer, The Mobile Generation: Ethical Considerations for Practicing in the Cloud, N.J. LAW. MAG., Aug. 2013, at 49.

1.2.4 Internet Access

Maria Kantzavelos, The Lawyer's iPad: Using Tablets in Your Practice, 101 ILL. B.J. 232 (2013).

Maria Kantzavelos, Marketing Your Practice via Social Media, 101 ILL. B.J. 180(2013).

1.3 Selected Uses in the Law Practice

1.3.0 General

Jeffrey M. Allen, Technology to Keep Your Mind Active and Expand Your Horizons, 23 EXPERIENCE 45 (2013).

Stephanie Curry, Washington's Electronic Signature Act: An Anachronism in the New Milennium, 88 WASH. L. REV. 559 (2013).

Isaac Figueras, Comment, The LegalZoom Identity Crisis: Legal Form Provider or Lawyer in Sheep's Clothing, 63 Case W. Res. L. Rev. 1419 (2013).

Jon M. Garon, Legal Education in Disruption: The Headwinds and Tailwinds of Technology, 45 CONN. L. REV. 1165 (2013).

Tom Gaylord, Using Twitter to Keep Up with the Law, 101 ILL. B.J. 590(2013).

Woodrow Hartzog & Frederic Stutzman, Obscurity by Design, 88 WASH. L. REV. 385 (2013).

Michelle Hughes, Internet Promises, Scares, and Surprises: New Realities Of Adoption, 41 Cap. U. L. REV. 279(2013).

Stephen M. Johnson, Teaching for Tomorrow: Utilizing Technology to Implement the Reforms of MacCrate, Carnegie, and Best Practices, 92 NEB. L. REV. 46 (2013).

Maria Kantzavelos, E-Filing gets the Green Light, 101 ILL. B.J. 20 (2013).

Katherine Lee Klapsa, Comment, Lawyers Bring Big Screen Drama to the Courtroom: How Popular Cinematic's Influence on the Law has Created the Need for Professional Witnesses, 18 BARRY L. REV. 355 (2013).

Sarah Knapp, Can LegalZoom be the Answer to the Justice Gap?, 26 GEO. J. LEGAL ETHICS 821 (2013).

Charles J. Northrup, Blogging, Marketing, and the Rules of Professional Conduct, 101 ILL. B.J. 536(2013).

Charles J. Northrup, Ethics and the Unsolicited Email, 101 ILL. B.J. 370 (2013).

Adam L. Rosman, Visualizing the Law: Using Charts, Diagrams, and Other Images to Improve Legal Briefs, 63 J. LEGAL EDUC. 70 (2013-2014).

1.3.1 Tax Filing

Larry R. Garrison, Going "Green State Tax Incentives and Alternative Energy - An Update, 31 J. ST. TAX 27 (2013).

Roberta F. Mann, Smart Incentives for the Smart Grid, 43 N.M.L. REV. 127 (2013).

Mark A. Oates & James M. O'Brien, Transfer Pricing: IRA Economists Say the Darndest Things!, 39(6) INT'L TAX J. 5 (2013).

Lowell D. Yoder, Subpart F: Gain from the Sale of Intangible Property, 39 INT'L TAX J. 3 (2013).

1.3.2 Bankruptcy

Danny Kelly et al., Lien on Me, What's in a Domain Name? Considerations for Perfecting Liens on Cyber Assets, 32-8 AM. BANKR. INST. J. 22 (2013).

1.3.4 Estate Planning

Greg Lastowka & Trisha Hall, Living and Dying in a Virtual World: Estate Planning for Digital Assets, N.J. LAW. MAG., Oct. 2013, at 47.

Chelsea Ray, Til Death Do Us Party: A Proposal for Handling Digital Assets after Death, 47 REAL PROP. TR. & EST. L.J. 583 (2013).

1.3.5 Real Estate

Seamus Keating, Digital Signatures and the Electronic Transfer of Land, 7 MASARYKU. J. L. & TECH. (2013).

1.3.6 Advertising

Jason Beahm, iWitness: Winning the Internet, 39 Litigation 56 (2013).

Eli Beracha & M. Babajide Wintoki, Forecasting Residential Real Estate Price Changes from Online Search Activity, 35(3) J. REAL ESTATE TAX'N 283 (2013).

Natasha T. Brison, Thomas A. Baker III, & Kevin K. Byon, Tweets and Crumpets: Examining U.K. and U.S. Regulation of Athlete Endorsements and Social Media Marketing, 23 J. LEGAL ASPECTS OF SPORT 55 (2013).

Thomas Roe Frazer, Social Media: From Discovery to Marketing--A Primer for Lawyers, 36 AM. J. TRIAL ADVOC. 539 (2013).

2. COMPUTERS AND TECHNOLOGY IN LITIGATION

2.0 General

John M. Barkett, Evidence Rule 502: The Solution To The Privilege-Protection Puzzle in the Digital Era, 81 FORDHAM L. REV. 1589 (2013).

Nicholas Barry, Man Versus Machine Review: The Showdown between Hordes of Discovery Lawyers and a Computer-Utilizing Predictive-Coding Technology, 15 VAND. J. ENT. & TECH. L. 343 (2013).

Steven C. Bennett, Ethical Limitations on InformalDiscovery of Social Media Information, 36 AM. J. TRIAL ADVOC. 473 (2013).

Eric D. Block, The Seedy Underbelly of Joinder and Reverse Class Action: The Porn Industry's Crusade against Digital Piracy and Its Interplay with Rule 11 Sanctions, 37 S. ILL. U. L.J. 419 (2013).

John G. Browning, With "Friends" Like These, Who Needs Enemies? Passwords, Privacy, and the Discovery of Social Media Content, 36 Am. J. TRIAL ADVOC. 505 (2013).

Kevin Davis, Intimidated: Witness Harassment Has Gone Digital, and the Justice System is Playing Catch-Up, 99 A.B.A. J. 55 (2013).

Herbert B. Dixon Jr., Information Technology Disaster Recovery Planning for Court Institutions, 52 JUDGES J. 36 (2013). '

Herbert B. Dixon Jr., Technology and the Courts: A Futurist View, 52 JUDGES J. 36 (2013).

Herbert B. Dixon Jr., iPad Wizardry for Beginners, 52 Judges J. 36(2013).

Elizabeth Friedler, Note, "Protecting The Innocent--The Need to Adapt Federal Asset Forfeiture Laws to Protect the Interests of Third Parties in Digital Asset Seizures," 32 CARDOZO ARTS & ENT. L.J. 283 (2013).

Dylan Charles Edwards, Admissions Online: Statements of a Party Opponent in the Internet Age, 65 OKLA. L. Rev. 533 (2013).

Hon. Paul W. Grimm, et al., Authentication of Social Media Evidence, 36 AM. J. TRIAL ADVOC. 433 (2013).

Joshua Gordon, A Closer Look at Proposed E-Service Rule, 23 N.H. BAR NEWS, Jan. 2013, at 31.

James G. Hodge, Jr., The Intersection of Law, Science, and Policy to Protect the Public's Health, 53 JURIMETRICS J. 249 (2013).

Sharon R. Klein, Angelo A. Stio III, & Brian Zurich, Ethical Issues that Arise from Social Media Use in Courtrooms, N.J. L. MAG., Oct. 2013, at 65.

William H. Knight, Can Victims' Rights Go Wrong? Prosecuting Digital Child Pornography Crimes in Arizona, 45 ARIZ. St. L.J. 891 (2013).

W. Scott O'Connell, Business Law & Business Litigation: Social Media and Commercial Litigation: Dealing with Crisis, N.H. BAR NEWS, Dec. 2013, at 15.

Erika L. Oliver, Researching Jurors on the Internet: The Ills of Putting Jurors on Trial and the Need to Shift the Focus Back to the Defendant, 34 U. LA VERNE L. REV. 251 (2012-2013).

Cathy Packer, Should Courtroom Observers Be Allowed to Use Their Smartphones and Computers in Court? An Examination of the Arguments, 36 Am. J. TRIAL ADVOC. 573 (2013).

Jeffrey A. Pamess, Technology and the Trial Process: The 2013 Allerton Conference, 101 ILL. B.J. 638 (2013). Eric P. Robinson, Virtual Voir Dire: The Law and Ethics of Investigating Jurors Online, 36 AM. J. TRIAL ADVOC. 597 (2013).

Niloufer Selvadurai, The Proper Basis for Exercising Jurisdiction in Internet Disputes: Strengthening State Boundaries or Moving Towards Unification?, 13 Pittsburgh. J. TECH. L. & POL'Y (2013).

Richard K. Sherwin, Visualizing Law in the Digital Age: Visual Jurisprudence, 57 N.Y.L. SCH. L. REV. 11 (2012-2013).

Jennifer Skeem, Risk Technology in Sentencing: Testing the Promises and Perils (Commentary on Hannah-Mojfat, 2011), 30 JUST. Q. 297 (2013).

James C. Smith, Online Communities as Territorial Units: Personal Jurisdiction over Cyberspace after J. McIntyre Machinery, LTD. v. Nicastro, 57 St. LOUIS U. L.J. 839 (2013).

Kirk Charles Simoneau, Lfuror App is Handy and Visual, N.H. BAR NEWS, June 2013, at 38.

Rob Tricchinelli, State Courts Continue Move toward Electronic Filing, Docketing: Developments in Kan. Minn. N.H. and Texas Highlight Trend, NEWS MEDIA & L., Spring 2013, at 27.

Hans Van Horn, Evolutionary Pull, Practical Difficulties, and Ethical Boundaries: Using Facebook to Serve Process on International Defendants, 26 PAC. MCGEORGE GLOBAL BUS. & DEV. L.J. 555 (2013).

2.1 Scientific Evidence

2.1.0 General

Molly Barker Gilligan, Creating Digital Paper with PDP Manipulation Software, Me. B.J., Fall 2013, at 184.

Blaine M. Hackman, Patent Licensing and Document Destruction: Recent Case Law regarding Spoliation, LES NOUVELLES, Sept. 2013, at 170.

Cassandra Ann Jenecke, Shaken Baby Syndrome, Wrongful Convictions, and Dangers of Aversion to Changing Science in Criminal Law, 48 U.S.F. L. REV. 147 (2013).

Ken Matejka, Search Engine Optimization for the Solo Practitioner and Small Law Firms, Me. B.J., Fall 2013, at 190.

Justin P. Murphy and Adrian Fontecilla, Social Media Evidence in Government Investigations and Criminal Proceedings: A Frontier of New Legal Rules, 19 RICH J.L. & TECH. 11 (2013).

Frank F. Sommers, Representing the Anonymous Client, LITIG., Summer 2013, at 24.

Brett Walker, When the Facts and the Law are against You, Argue the Genes?: A Pragmatic Analysis of Genotyping Mitigation Defenses for Psychopathic Defendants in Death Penalty Cases, 90 WASH. U. L. REV. 1779 (2013).

Douglas Walton & Nanning Zhang, The Epistemology of Scientific Evidence, 21 ARTIFICIAL INTELLIGENCE L. 173 (2013).

2.1.1 Expert Testimony

Judge David J. Waxse & Brenda Yoakum-Kritz, Experts on Computer- Assisted Review: Why Federal Rule of Evidence 702 Should Apply to Their Use, 52 WASHBURN L.J. 207(2013).

2.1.2 DNA Typing

Jodena Carbone, Selective Testing of DNA and its Impact on Post-Conviction Requests for Testing, 10 RUTGERS J. L. & PUB. POL'Y 339 (2013).

Kelly Ferrell, Twenty-First Century Surveillance: DNA "Data-Mining" and the Erosion of the Fourth Amendment, 51 HOUS.. L. REV. 229 (2013).

Elizabeth E. Joh, Maryland v. King: Policing and Genetic Privacy, 11 OHIO ST. J. CRIM. L. 281 (2013).

David H. Kaye, Response: Maryland v. King; Per Se Unreasonableness, the Golden Rule, and the Future of DNA Databases, 127 HARV. L. REV. 39 (2013).

Erin Murphy, License, Registration, Cheek Swab: DNA Testing and a Divided Court, 127 HARV. L. REV. 161 (2013).

Angelique Romero, Implications (9/United States v. Jones On DNA Collection From Arrestees: A Trespass Prohibited By The Fourth Amendment?, 25 St. THOMAS L. REV. 244 (2013).

Andrea Roth, Maryland v. King and the Wonderful, Horrible DNA Revolution in Law Enforcement, 11 OHIO ST. J. CRIM. L. 295 (2013).

Kathryn Schleckser, Physician Participation in Direct-to-Consumer Genetic Testing: Pragmatism or Paternalism, 26 HARV. J. L. & TECH. 695 (2013).

Ayman Shaban, Negation of Paternity in Islamic Law between Lian and DNA Fingerprinting, 20 ISLAMIC L. & SOC'Y 157 (2013).

Ahmad R. Smith, Too Much of a Good Thing?: Questioning the Constitutionality of a Legislative Body Requiring DNA Testing for All Felony Arrestees, 7 S. REGION BLACK STUDENTS ASS'N L. J. 75 (2013).

Sarah F. Sunderman, The Need for Regulation of Direct-to-Consumer Genetic Test in The United States: Assessing and Applying the German Policy Model, 12 WASH. U. GLOBAL STUD. L. REV. 357 (2013).

Jesika S. Wehunt, Drawing the Line: DNA Databasing at Arrest and Sample Expungement, 29 Ga. St. U. L. REV. 1063 (2013).

2.1.3 Fingerprint

Wayne G. Plumtree, A Perspective on the Appropriate Weight to Be Given to the National Academy of Sciences' Report on Forensics in Evidentiary Hearings: The Significance of Continued Court Acceptance of Fingerprint Evidence, 42 SW. L. REV. 605 (2013).

2.1.4 Lie Detection

Jason Scheff, Disproving the "Just Pictures" Defense: Interrogative Use of the Polygraph to Investigate Contact Sexual Offenses Committed by Child Pornography Suspects, 68 N.Y.U. ANN. SURV. AM. L. 603 (2013).

2.1.5 Forensic Evidence

Gwen Adshead & Jessica Yakeley, Locks, Keys, and Security of Mind Psychodynamic Approaches to Forensic Psychiatry, 41 J. AM. ACAD. PSYCHIATRY L. 38 (2013).

Joseph G. Barabe, Book Review: The Digital Print: Identification and Preservation, 23 J. FORENSIC DOCUMENT EXAMINATION (2013).

Sarah Lucy Cooper, The Collision of Law and Science: American Court Reponses to Developments in Forensic Science, 33 PACE L. REV. 234 (2013).

Henry T. Greely and David H. Kaye, A Brief of Genetics, Genomics and Forensic Science Researchers in Maryland v. King, 54 JURIMETRICS J. 43 (2013).

Tim Grant, TXT 4N6: Method, Consistency, and Distinctiveness in the Analysis of SMS Text Messages, 21 J.L. & POL'Y 467 (2013).

William A. Tobin & Peter J. Blau, Hypothesis Testing of the Critical Underlying Premise of Discernible Uniqueness in Firearms-Toolmarks Forensic Practice, 53 JURIMETRICS J. 121 (2013).

Emily J. Will, Book Review: Developments in Handwriting and Signature Identification in the Digital Age, 23 J. FORENSIC DOCUMENT EXAMINATION (2013).

Tim J. Wilson & Angela M.C. Gallop, Criminal Justice, Science, and the Marketplace: The Closure of the Forensic Science Service in Perspective, 77 J. CRIM. L. 56 (2013).

Szde Yu, Dr. Marie-Helen Maras' Computer Forensics: Cyber criminals, Laws, and Evidence, 23 INT'L CRIM. Just. Rev. 103 (2013).

2.2 Demonstrative Evidence

2.2.0 General

Janis Prewitt Auner & Steve Mullins, Have We Underestimated Economic Damages?, 69 J. Mo. B. 22 (2013).

Jennifer K. Gregory, #BewareOfOvershare: Social Media Discovery and Importance in Intellectual Property Litigation, 12 J. MARSHALL REV. INTELL. PROP. L. 449 (2013).

Brett Walker, When the Facts and the Law Are against You, Argue the Genes?: A Pragmatic Analysis of Genotyping Mitigation Defenses for Psychopathic Defendants in Death Penalty Cases, 90 WASH. U. L. REV. 1779 (2013).

Anna Vamialis, Online Defamation: Confronting Anonymity, 21 INT'L J. L. INFO. TECH. 31 (2013).

2.2.1 Computer-Generated Evidence

Holly Andersen, A Website Owner's Practical Guide to the Wayback Machine, 11 J. TELECOMM. & HIGH TECH. L. 251 (2013).

Laura E. Diss, Whether You "Like" It or Not: The Inclusion of Social Media Evidence in Sexual Harassment Cases and How Courts Can Effectively Control It, 54 B.C. L. REV 1841 (2013).

Josh Gilliland, iWitness: The Admissibility of Social Media Evidence, 39 LITIG., Winter 2013, at 20.

New Hampshire Bar Association Board of Governors, Ethics Committee Advisory Opinion #2012-13/05 Social Media Contact with Witnesses in the Course of Litigation, 23 N.H. BAR NEWS, July 2013, at 4.

Ann Moss Joyner & Allan M. Parnell, Article: Maximizing the Power of Geographic Information Systems in Racial Justice, 47 CLEARINGHOUSE REV. 185 (2013).

Molly D. McPartland, An Analysis of Facebook "Likes" and Other Nonverbal Internet Communication under the Federal Rules of Evidence, 99 IOWA L. REV. 225 (2013).

George L. Paul, Electronic Evidence (third edition) Canvassing the Emerging Law of Digital Information: Stephen Mason's Electronic Evidence, 53 JURIMETRICS J. 467 (2013).

Kimberly D. Phillips, Empathy for Psychopaths: Using fMRI Brain Scans to Plea for Leniency in Death Penalty Cases, 37 L. & PSYCHOL. REV. 1 (2013).

Bruce S. Rosen, With Friends Like These..., N.J. LAW. Mag., Oct. 2013, at 61.

2.2.2 Audio/Visual Evidence

Jim Cruess, Cost of Admission: One Rubber Stamp--Evaluating the Significance of Investigative Necessity in Wiretap Authorizations after R. V. Araujo, 22 DALHOUSIE J. LEGAL STUD. 59 (2013).

Anne Wallace, Using Video Link to Take Forensic Evidence - Lessons from and Australian Case Study, 17 INT'L J. EVIDENCE & PROOF 221 (2013).

2.3 Electronic Discovery

Symposium: Ethical Issues in E-Discovery, Social Media, and the Cloud, 39 RUTGERS COMPUTER & TECH. L.J. 125 (2013).

Athul K. Acharya, Semantic Searches, 63 DUKE L.J. 393 (2013).

Thomas Y. Allman, Local Rules, Standing Orders, and Model Protocols: Where the Rubber Meets the (E-Discovery) Road, 19 RICH J.L. & TECH. 5 (2013).

Alberto G. Araiza, Electronic Discovery in the Cloud, 2011 DUKE L. & TECH. REV. 8 (Dec. 2013).

Craig Ball, Appendix 1: Ask and Answer the Right Questions in EDD, 26 REGENT U. L. REV. 140 (2013-2014).

John G. Browning, Burn After Reading: Preservation and Spoliation of Evidence in the Age of Facebook, 16 SMU SCI. & TECH. L. REV. 273 (Fall 2013).

Elle Byram, The Collision of the Courts and Predictive Coding: Defining Best Practices and Guidelines in Predictive Coding for Electronic Discovery, 29 SANTA CLARA COMPUTER & HIGH TECH. L.J. 675 (2013).

Kathleen P. Dapper, Nothing is Certain except Death and Taxes: But in the District Courts, Not Even Taxes are Certain for E-Discovery Costs, 80 DEF. COUNS. J. 74 (2013).

Jeffrey Paul Desousa, Self-Storage Units and Cloud Computing: Conceptual and Practical Problems with the Stored Communications Act and Its Bar on ISP Disclosures to Private Litigants, 102 GEO. L.J. 248 (2013).

Oliver Forster & Osama Almughrabi, Managing the Conflict between U.S. E-Discovery and the German Data Protection Act, 36 HASTINGS INT'L & COMP. L. REV. 111 (2013).

Daniel B. Garrie, Anna S. Park, & Yoav M. Griver, Social Networks and Electronic Discovery, N.J. L. MAG., Oct. 2013, at 54.

Miles L. Galbraith, Identity Crisis: Seeking a Unified Approach to Plaintiff Standing for Data Security Breaches of Sensitive Personal Information, 62 AM. U. L. REV. 1365 (2013).

Robert H. Gardner, J.S.C., David Marck, Esq., & Steven Strauss, Esq., Electronically Stored Information and the New Jersey Court Rules, 39 RUTGERS COMPUTER & TECH. L. J. 1 (2013).

Daniel B. Garrie, Esq. & Yoav M. Griver, Esq., Unchaining E-Discovery in the Patent Courts, 8 WASH. J. L. TECH & ARTS 487 (2013).

Frank Goldman, E-Discovery between Closely-Held Corporation, 6 J. MARSHALL L. J. 533 (2013).

Tzipora Goodfriend-Gelernter, How to Avoid the Death of Your Case by Two Billion Paper Cuts: Encouraging Arbitration as an Alternative Way to Resolve Costly Discovery Disputes, 13 PEPP. DISP. RESOL. L. J. 257 (2013).

Hon. Shiva V. Hodges, A Measured Approach to E-Discovery: A Federal Practitioner's Guide to The Civil and Ethical Rules Governing E-Discovery, 64 S.C. L. REV. 755(2013).

Jacqueline Hoelting, Skin In The Game: Litigation Incentives Changing as Courts Embrace a "Loser Pays" Rule for E-Discovery Costs, 60 CLEV. ST. L. REV. 1103 (2013).

Conrad Jacoby et al., Databases Lie! Successfully Managing Structured Data, The Oft-Overlooked ESI, 19 RICH J.L.& TECH. 9 (2013).

Jason Krause, Prying Eyes: Unlikely Allies Are Collaborating in a Push to Require Warrants for Law Enforcement Access to Digital Communications, A.B.A. J., Apr. 2013, at 44.

Wm. Grayson Lambert, Keeping The Inference in the Adverse Inference Instruction: Ensuring the Instruction is an Effective Sanction in Electronic Discovery Cases, 64 S.C.L. REV. 681 (2013).

Ralph C. Losey, Predictive Coding and the Proportionality Doctrine: A Marriage Made in Big Data, 26 REGENT U. L. REV. 7 (2013-2014).

Monica McCarroll, Discovery and the Duty of Competence, 26 REGENT U. L. REV. 81 (2013-2014).

Peter A. Mclauchlan, Marine Electronic Evidence Discovery and Admission, 21 CURRENTS: INT'L TRADE L.J. 21 (2013).

Tonia Hap Murphy, Mandating Use of Predictive Coding in Electronic Discovery: An Ill-Advised Judicial Intrusion, 50 AM. BUS. L. J. 609 (2013).

Judge Henry Coke Morgan, Jr., Predictive Coding: A Trial Court Judge's Perspective, 26 REGENT U. L. REV. 71 (2013-2014).

Emily Overfield, Shifting the E-Discovery Solution: Why Taniguchi Necessitates a Decline in E-Discovery Court Costs, 118 PENN. ST. L. REV 217 (2013).

Jeffrey A. Pamess, Managing Discovery of Electronically Stored Information in Illinois, 101 ILL. B. J. 316 (2013).

Melissa S. Penson-Mesa, Book Review, Zubulake's e-Discovery: The Untold Story of My Quest for Justice (Laura A. Zubulake), 23 N.H. BAR NEWS 33 (2013).

Timothy C. Quinn, Comment, The Discoverability of Private Social Media Content: Are Pennsylvania Trial Courts Going Too Far by Granting Litigants Unfettered Access to Their Opponents' Social Media Accounts, 51 DUQ.L.REV. 787 (2013).

Lauren Ann Ross, A Comparative Critique to U.S. Courts ' Approach to E-Discovery in Foreign Trials, 11 DUKE L. & TECH. REV. 313 (2013).

Ronald D. Rotunda, The Ethical Infrastructure and Culture of Law Firms: Article: Applying the Revised ABA Model Rules in the Age of the Internet: The Problem of Metadata, 42 HOFSTRA L. REV. 175 (2013).

Karl Schieneman & Thomas C. Gricks III, The Implications of Rule 26(g) on the Use of Technology-Assisted Review, 2013 FED. CTS. L. REV. 239 (2013).

Emma W. Sholl, Exhibit Face book: The Discoverability and Admissibility of Social Media Evidence, 16 TUL. J. TECH. & INTELL. PROP. 207 (2013).

David J. Waxse, Advancing the Goals of a Just, Speedy, and Inexpensive Determine of Every Action: The Recent Changes to the District of Kansas Guidelines for Cases Involving Electronically Stored Information, 26 REGENT U.L.REV. 111 (2013-2014).

Kenneth J. Withers, Risk Aversion, Risk Management, and the "Overpreservation" Problem in Electronic Discovery, 64 S.C. L. REV. 537 (2013).

Derek S. Witte, Bleeding Data in a Pool of Sharks: The Anathema of Privacy in a World of Digital Sharing and Electronic Discovery, 64 S.C. L. REV. 717 (2013).

Lisa C. Wood & Matthew E. Miller, What You and Your Client Can and Should Do to Avoid Spoliation of Electronic Evidence, 28 ANTITRUST, No. 3, Summer 2013, at 85-88.

Charles Yablon, Predictive Coding: Emerging Questions and Concerns, 64 S.C. L. REV. 633 (2013).

Michael Yager, E-Discovery as Quantum Law: Clash of Cultures-What the Future Portends, 19 RICH J. L. & TECH. 10 (2013).

2.4 Courtroom and Judges

David E. Aaronson & Sydney M. Patterson, Modernizing Jury Instructions in the Age of Social Media, 27 CRIM. Just. 26 (2013).

Jeff Aresty, et al., State Courts and the Transformation to Virtual Courts, 39 LITIG. 45, (2013).

Coleen M. Barger, Challenging Judicial Notice of Facts on the Internet under Federal Rule of Evidence 201, 48 U.S.F. L. REV. 43 (2013).

Laurence A. Benner, Rober Bird, & Donald F. Smythe, Social-Network Theory and theDiffusion of the Search-and-Seizure Exclusionary Rule among State Courts between Weeks and Wolf, 27 BYU J. PUB. L. 97 (2012-2013).

Julio Cesar Betancourt & Elina Zlatanska, Online Dispute Resolution (ODR): What Is It, and Is It the Way forward?, 79 ARBITRATION 256 (2013).

Simon A. Cole, Book Review, Tracing Technologies: Prisoners' Views in the Era of CSI, 22 SOC. & LEGAL Stud. 441 (2013).

Paul Coppock, Doors to Remain Open during Business Hours: Maintaining the Media's (and Public's) First Amendment Right of Access in the Face of Changing Technology, 58 S.D. L. REV. 319 (2013).

Christina Locke Faubel, Cameras in the Courtroom 2.0: How Technology is Changing the Way Journalists Cover the Courts, 3 REYNOLDS CTS. & MEDIA L. J. 3 (2013-2014).

Adrian Fontecilla, Department, Technology, the Ascendance of Social Media as Evidence, 28 CRIM. JUST. 55 (2013).

John R. Higgitt, The Emergence of E-Service Under CPLR 308(5), 85 N.Y. St. B.A. J. 18 (2013).

D. R. Jones, Protecting the Treasure: An Assessment of State Court Rules and Policies for Access to Online Civil Court Records, 61 DRAKE L. Rev. (2013).

Tamara Rice Lave, Protecting Elites: An Alternative Take on how United States v. Jones Fits into the Court's Technology Jurisprudence, 14 N.C. J. L. & TECH. 461 (2013).

Samuel J. Morley, Unmasking Anonymous Internet Posters: Can Civil Procedure Rules Adequately Protect Online Speech?, 30 COMM. LAWYER 4 (2013).

Hon. Raymond Rossi, Researching Jurors Online: Voir Dire in the Digital Age, 101 ILL. B.J. 514 (2013).

Esther Seitz, #Oyez, #Oyez: Why Judges Should Let Reporters Tweet from the Courtroom, 101 ILL. B.J. 38 (2013).

Robert E. Shapiro, iWit ness: How to Conduct a Paperless Trial, 39 LITIG. 52 (2013).

Rebecca Shieh, Book Annotation, 45 N.Y.U.J. INT'L L. & POL. 699 (2013) (reviewing Laura Henderson, Tortured Reality: How Media Framing of Waterboarding Affects Judicial Independence (2012)).

Amy J. St. Eve & Michael A. Zuckerman, Ensuring an Impartial Jury in the Age of Social Media, 11 DUKE L. & TECH. REV. 1 (2013).

Heather E. Stem, Computer Counselor: How to Use an iPad to Manage and Present Trial Exhibits, 36 LOS ANGELES LAWYER 64 (2013).

Rob Tricchinelli, Update: Cameras in the Courtroom: Illinois and Utah Welcome Cameras to State Courts, THE NEWS MEDIA & THE LAW, Spring 2013, at 27.

Dan Wise, Digital Court to Launch in Four Months, 23 N.H. BAR NEWS 1 (2013).

2.5 Dispute Resolution

3. COMPUTERS, TECHNOLOGY AND GOVERNMENT

3.0 General

Anonymous, Social Networks and the Judiciary, 96 AM. JUDICATURE SOC'Y J. 201 (2013).

Alissa Ardito, Social Media, Administrative Agencies, and the First Amendment, 65 ADMIN. L. REV. 301 (2013).

Hilal Atasoy, The Effects of Broadband Internet Expansion on Labor Market Outcomes, 66 INDUS. & LAB. REL. REV. 315 (2013).

Cynthia L. Bauerly, The Revolution Will Be Tweeted and Tumbl'd and Txtd: New Technology and the Challenge for Campaign-Finance Regulation, 44 TOL. L. REV. 525 (2013).

Marc Jonathan Blitz, The Fourth Amendment Future of Public Surveillance: Remote Recording and Other Searches in Public Space, 63 AM. U. L. REV. 21 (2013).

Adam Bonica & Jenny Shcn, The Biennial Limit: Why the FEC has Failed to Enforce Aggregate Hard-Money Limits and How Record Linkage Technology Can Help, 49 WILLAMETTE L. REV. 563 (2013).

Christopher D. Brown, Ill-Suited to the Digitial Age: Problems with Emerging Judicial Perspectives on Warrantless Searches of Cell Site Location Information, 6 NW. INTERDISC. L. REV. 57 (2013).

Christy, The ACLU's Hollow FOIA Victory over Drone Strikes, 21 GEO. MASON L. REV. 1 (2013).

Louise Doswald-Beck, Confronting Complexity and New Technologies: A Need to Return to First Principles of International Law, 107 AM. SOC'Y INT'L L. PROC. 107 (2013).

Catherine Ferth et al., Capturing NATO Knowledge through Information Management: Policy, Process, and Procedure, 30 THE NATO LEGAL GAZETTE 1 (2013).

Roland M. Frye, Jr., The United States Nuclear Regulatory Commission's Use of Scientific and Technical Advisory Committees, 23 ALB. L. J. SCI. & TECH. 1 (2013).

Daniel S. Harawa, The Post-TSA Airport: A Constitution Free Zone?, 41 PEPP. L. REV. 1 (2013).

Anil Kalhan, Symposium: The Second Wave of Global Privacy Protection: Immigration Policing and Federalism through the Lens of Technology, Surveillance, and Privacy, 14 OHIO ST. L.J. 1105 (2013).

Adam W. Lasker, Aldermen's Texts, Tweets during Council Meetings Are 'Public Records', 101 ILL. B.J. 606 (2013).

W. Cagney McCormick, The Computer Fraud & Abuse Act: Failing to Evolve with the Digital Age, 16 SMU SCI. & TECH. L. REV. 481 (2013).

Ebony Morris, Always Eyes Watching You: United States v. Jones and Congress's Attempts To Stop Warrantless Government Surveillance, 40 S.U. L. REV. 489 (Spring 2013).

Tobias Mahler, Governance Models for Interoperable Electronic Identities, 8 J. INT'L COM. L. & TECH. 148 (2013).

Przemyslaw Maj, Internet, the Right to Be Informed and the Rule of Openness of the State's Actions in Democracy, 7 MASARYK U.J.L. & TECH. (2013).

Christopher R. Meltzer, More than Just Ones and Zeros: The Reproducibility of Metadata under the Freedom of Information Act, 9 ES: J. L. POL'Y INFO. SOC'Y. 327 (2013).

Michael Ian Morrison, The Acquisition Supply Chain and the Security of Government Information Technology Purchases, 42 PUB. CONT. L.J. 749 (2013).

Eric Null, Municipal Broadband: History's Guide, 9 ES: J. L. POL'Y INFO. SOC'Y. 21 (2013).

Oren Perez, Open Government, Technological Innovation, and the Politics of Democratic Disillusionment: (E-) Democracy from Socrates to Obama, 9 ES: J. L. POL'Y INFO. SOC'Y. 21 (2013).

Allende Plumed Prado, CLOVIS Operational Tool For Sharing Legal Knowledge, 30 THE NATO LEGAL GAZETTE 4 (2013).

Allende Plumed Prado, CLOVIS: What are TOPIC PAGES?, 31 THE NATO LEGAL GAZETTE 4 (2013).

Douglas Roberts, ISA F Operational Records: Preserving Information Critical to History, Analysis, and the Law, 30 THE NATO LEGAL GAZETTE 27 (2013).

Adam Schwartz, Chicago's Video Surveillance Cameras: A Pervasive and Poorly Regulated Threat to Our Privacy, 11 NW. J. TECH. & INTELL. PROP. 47 (2013).

Michael L. Snyder, Katz-ing up and (Not) Losing Place: Tracking the Fourth Amendment Implications of United States v. Jones And Prolonged GPS Monitoring, 58 S.D. L.REV. 158(2013).

Philip E. Tetlock, et al., Detecting and Punishing Unconscious Bias, 42 J. LEGAL STUD. 83 (2013).

Adam Thierer, The Perils of Classifying Social Media Platforms as Public Utilities, 21 COMMLAW CONSPECTUS. 249 (2013).

Hon. Gordon S. Wyant, Q.C., Governments, Technology and the Practice of Law, 76 SASK. L. REV. 141 (2013).

3.1 Computers, Technology and Law Enforcement

Andrew Askland, Photo Radar Enforcement: A Brief Stall On A Slippery Slope?, 19 B.U. J. SCI. & TECH. L. 1 (2013).

Andrew P. Atkins, New Methods of Financial White-Collar Criminal Investigation and Prosecution: The Spillover of Wiretaps to Civil Enforcement Proceedings, 33 PACE L. REV. 716 (2013).

Sunil Bhave, Warrantless Cell Phone Searches in the Age of Flash Mobs, 12 CONN. PUB. INT. L.J. 263 (2013).

Brittany Boatman, United States v. Jones: The Foolish Revival of the Trespass Doctrine in Addressing GPS Technology and the Fourth Amendment, 47 VAL. U. L. REV. 677(2013).

Irus Braverman, Passing the Sniff Test: Police Dogs as Surveillance Technology, 61 BUFF. L. REV. 81 (2013). Alexa Briscoe, Mail and Wire Fraud, 50 AM. CRIM. L. REV. 1245 (Summer 2013).

J. Tyler Black, Over Your Plead, Under the Radar: An Examination of Changing Legislation, Aging Case Law, and Possible Solutions to the Domestic Police Drone Puzzle, 70 WASH. & LEE L. REV. 1829 (2013).

I. Bennett Capers, Cooper-Walsh Colloquium Legitimacy and Order: Analyzing Police-Citizen Interactions in the Urban Landscape: Article: Crime, Surveillance, and Communities, 40 FORDHAM URB. L.J. 959 (2013).

Paul A. Clark, The Right to Challenge the Accuracy of Breath Test Results under Alaska Law, 30 ALASKA L. REV. 1 (2013).

Sara M. Corradi, Comment, Be Reasonable! Limit Warrantless Smart Phone Searches to Gant's Justification for Searches Incident to Arrest, 63 CASE W. RES. L. REV. 943 (2013).

Jamie Kay Dahlstedt, Notification and Risk Management for Victims of Domestic Violence, 28 WIS. J. L. GENDER & SOC'Y 1 (2013).

Geoffrey J. Derrick, Qualified Immunity and the First Amendment Right to Record Police, 22 B.U. PUB. INT. L.J. 243 (2013).

Donald A. Dripps, "Dearest Property": Digital Evidence and the History of Private "Papers" as Special Objects of Search and Seizure, 103 J. CRIM. L. & CRIMINOLOGY 49 (2013).

Clifford S. Fishman, Searching Cell Phones after Arrest: Exceptions to the Warrant and Probable Cause Requirements, 65 RUTGERS L. REV. 995 (2013).

Susan Freiwald, The Davis Good Faith Rule and Getting Answers to the Questions Jones Left Open, 14 N.C. J.L. & TECH. 341 (2013).

Jace C. Gatewood, It's Raining Katz and Jones: The Implications of United States v. Jones--A Case of Sound and Fury, 33 PACE L. REV. 683 (2013).

Adam M. Gershowitz, Seizing a Cell Phone Incident to Arrest: Data Extraction Devices, Faraday Bags, or Aluminum Foil as a Solution to the Warrantless Cell Phone Search Problem, 22 WM. & MARY BILL OF RTS. J. 601 (2013).

John Gibeaut, Call Ahead: Officers Use Cellphone Towers to Spot Offenders, 99 ABA J. 19 (2013).

Keith Guzik, Taking Hold of the Wheel: Automobility, Social Order, and the Law in Mexico's Public Registry of Vehicles (REPUVE), 47 LAW & SOC. REV. 523 (Sept. 2013).

Stephen E. Henderson, Real-Time and Historic Location Surveillance After United States v. Jones: An Administrable, Mildly Mosaic Approach, 103 J. CRIM. L. & CRIMINOLOGY 803 (2013).

Jef Hinninger, Defending Child Pornography Distribution Cases, N.J. LAW. MAG., Feb. 2013, at 66.

Alexander Kalim, Addressing the Gap in International Instruments Governing Internet Child Pornography, 21 COMMLAW CONSPECTUS. 428 (2013).

David H. Kaye, The Genealogy Detectives: A Constitutional Analysis of "Familial Searching", 50 AM. CRIM. L. REV. 109 (2013).

Jack Komperda, U.S. Supreme Court Decision Keeps Coalition Group from Challenging New International Surveillance Law, NEWS MEDIA & L., Spring 2013, at 22.

Brad Leneis, Note, Mapping A Way Out: Protecting Cellphone Location Information without Starting over on the Fourth Amendment, 50 AM. CRIM. L. REV. 499 (2013).

Sheng Li, When Does Internet Denial Trigger the Right of Armed Self-Defense, 38 YALE J. INTL'L L. 179 (2013).

Laura Link, Employers Beware: A New Social Media Sheriff is in Town, N.J. LAW. MAG., Oct. 2013, at 39.

R. Gregory Israelsen, The D.C. Circuit's Epic Failure in Electronic Privacy Information Center v. United States Department of Homeland Security, 78 J. AIR L. & COM. 711 (2013).

Catherine W. Kimel, DNA Profiles, Computer Searches, and the Fourth Amendment, 62 DUKE L.J. 933 (2013). Matthew S. Maisel, Slave to the Traffic Light: A Road Map to Red Light Camera Legal Issues, 10 RUTGERS J. L. & PUB. POL'Y 401 (2013).

Anjali Manivannan, Book Annotation, 45 N.Y.U.J. INT'L L. & POL. 901 (2013) (reviewing Tarlach McGonagle, Minority Rights, Freedom of Expression and of the Media: Dynamics and Dilemmas (2011)).

Vincent Marinaccio, The Hidden Cost of Automatic Traffic Enforcement Systems, 34 WHITTIER L. REV. 393 (Issue 3, Spring 2013).

Louisa K. Marion, Department, Technology, Borderline Privacy: Electronic Border Searches after Cotterman, 28 CRIM. JUST. 36(2013).

Monica Mark, GPS Tracking, Smartphones, and the Inadequacy of Jones and Katz, 27 CRIM. JUST. 36 (2013).

Bethany Lipman, Prescribing Medicine for Online Pharmacies: An Assessment of the Law and a Proposal to Combat Illegal Drug Outlets, 50 AM. CRIM. L. REV. 545 (2013).

Sabrina A. Lochner, Saving Face: Regulating Law Enforcement's Use of Mobile Facial Recognition Technology & Iris Scans, 55 ARIZ. L. REV. 201 (2013).

Beth Rattigan, Labor & Employment Law: Social media Policies Scrutinized by the NLRB, 23 N.H. BAR NEWS 14 (2013).

James Romoser, Unstacking the Deck: The Legalization of Online Poker, 50 AM. CRIM. L. REV. 109 (2013).

Rachael Roseman, When Autonomous Vehicles Take over the Road: Rethinking the Expansion of the Fourth Amendment in a Technology-Driven World, 20 RICH. J.L. & TECH. 3 (2013).

Maria Scheid, Shutting Down Dissent: Global Responses to Mobile-Fueled "Flash Mobs" and Political Protests, 9 I/S: J.L. POL'Y INFO. SOC'Y. 173 (2013).

Khizar A. Sheikh, I Always Feel like Somebody's Watching Me: Warrantless Searches of Computer Hard Drives by the Government, N.J. LAW. MAG., Feb. 2013, at 11.

Christopher Slobogin, Cooper-Walsh Colloquium Legitimacy and Order: Analyzing Police-Citizen Interactions in the Urban Landscape: Article: Community Control over Camera Surveillance: A Response to Bennett Caper's Crime, Surveillance, and Communities, 40 FORDHAM URB. L.J. 993 (2013).

Kristen Senz, Court's Corner: e-Court for Everyone, 23 N.H. BAR NEWS 36 (2013).

Kristen Senz, Court Creates Registration Process for Electronic Media, 23 N.H. BAR NEWS 31 (2013).

Kristen Senz, Use of Video Hearings in NH Courts Poised to Expand, 23 N.H. BAR NEWS 38 (2013).

Alex Sugzda, You 're Under Arrest-Say Ah: Suggestions for Legislatures Drafting Statutes Allowing DNA Extraction from Arrestees, 70 Wash. & Lee L. Rev. 1443 (2013).

Christopher Swift, Privacy Protections and the Surveillance State: Bridging the Transatlantic Divide, 19 INT'L TRADE L.75 (2013)

H. Morely Swingle & Lane P. Thomasson, Beam Me Up: Upgrading Search Warrants With Technology, 69 J. Mo. B. 16(2013).

David J. Twombly, The Good-Faith Exception and Unsettled Law: A Study of GPS Tracking Cases After United States v. Jones, 74 OHIO ST. L.J. 807 (2013).

Rebecca G. Van Tassell, Walking a Thin Blue Line: Balancing the Citizen's Right to Record Police Officers Against Officer Privacy, 2013 B.Y.U.L. Rev. 183 (2013).

Kevin Wempe, United States v. Flores-Lopex: Protecting Privacy Rights in Cell Phone Searches Incident to Arrest, 62 U. KAN. L. REV. 195 (2013).

Alan L. Zegas, Commentary: Social Media, the Police, and the Dystopian Vision of George Orwell, N.J. LAW. MAG., Oct. 2013, at 79.

3.2 Use of Computers and Technology by the Military

Graham Arnold, Extra-Judicial Targeted Killing, 27 INT'L R. L. COMP. TECH. 319 (2013).

Amanda Beshears Cook, Copyright and Freedom of Expression: Saving Free Speech from Advancing Legislation, 12 CHI.-KENT J. INTELL. PROP. 1 (2013).

Laurie Blank, International Law and Cyber Threats from Non-State Actors, 89 INT'L L. STUD. SERIES U.S. NAVAL WARC. 157(2013).

William Boothby, Methods and Means of Cyber Warfare, 89 INT'L L. STUD. SERIES U.S. NAVAL WAR C. 387 (2013).

Alexander Chanock, Fixing the War Powers Resolution in the Age of Predator Drones and Cyber-Warfare, 78 J. AIR L. & COM. 453 (2013).

Alexander Chanock, The Problems and Potential Solutions Related to the Emergence of Space Weapons in the 21st Century, 78 J. AIR L. & COM. 691 (2013).

George Cho, Unmanned Aerial Vehicles: Emerging Policy and Regulatory Issues, 22 J.L. INFO. & SCI. 201 (2012-2013).

Emily Crawford, Virtual Battlegrounds: Direct Participation in Cyber Warfare, 9 I/S: J. L. POL'Y INFO. SOC'Y. 1 (2013).

Audrey Kurth Cronin, How Global Communications Are Changing the Character of War, 14 WHITEHEAD J. DIPL. & INT'L REL. 25 (2013).

Audra A. Dial & John M. Moye, Special Issue on Circuit Splits: The Computer Fraud and Abuse Act and Disloyal Employees: How Far Should the Statute Go to Protect Employers from Trade Secret Theft?, 64 HASTINGS L.J. 1447 (2013).

Dieter Fleck, Searching for International Rides Applicable to Cyber Warfare--A Critical First Assessment of the New Tallinn Manual, 18 J. CONFLICT & SECURITY L. 331 (2013).

William Funk, Professor Charles H. Kock, Jr. Memorial Symposium on Administrative Law: Deadly Drones, Due Process, and the Fourth Amendment, 22 WM. & MARY BILL OF RTS. J. 311 (2013).

William Funk, Deadly Drones, Due Process, and the Fourth Amendment, 22 WM. & MARY BILL OF RTS. J. 311 (2013).

Terry Gill & Paul Ducheine, Anticipatory Self-Defense in the Cyber Context, 89 INT'L L. STUD. SERIES U.S. NAVAL WAR C. 438 (2013).

Chantal Grut, The Challenge of Autonomous Lethal Robotics to International Humanitarian Law, 18 J. CONFLICT & SECURITY L. 5 (2013).

Philip J. Hiltner, The Drones are Coming: Use of Unmanned Aerial Vehicles for Police Surveillance and its Fourth Amendment Implications, 3 WAKE FOREST J. L. & POL'Y 397 (June 2013).

Rob Howard, Tech Talk: Big Brother is Reading Your Email. Seriously., 23 N.H. BAR NEWS, 4 (2013).

Uta Kohl, Google: the rise and rise of online intermediaries in the governance of the Internet and beyond (Part 2), 21 INT'L J. L. INFO. TECH. 187 (2013).

Alex Leitch, Book Annotation, 45 N.Y.U.J. INT'L L. & POL. 1287 (2013) (reviewing Georg Kerschischnig, Cyberthreats and International Law (2012)).

Nicole Lozare, Bloggers Fight for Status as Journalists: With Buzz about a Federal Shield Law, Bloggers Want Protection, Too, NEWS MEDIA & L., Spring 2013, at 6.

Noam Lubell, Lawful Targets in Cyber Operations: Does the Principle of Distinction Apply, 89 INT'L L. STUD. SERIES U.S. NAVAL WAR C. 252 (2013).

Daithi Mac Sithigh, App Law within: Rights and Regulation in the Smartphone Age, 21 INT'L J. L. INFO. TECH. 269 (2013).

Jonathan Olivito, Beyond the Fourth Amendment: Limiting Drone Surveillance Through the Constitutional Right to Informational Privacy, 74 OHIO ST. L.J. 669 (2013).

Vijay Padmanabhan, Cyber Warriors and the Jus in Bello, 89 INT'L L. STUD. SERIES U.S. NAVAL WAR C. 288 (2013).

Robert D. Richards & David J. Weinert, Punting in the First Amendment's Red Zone: The Supreme Court's "Indecision" on the FCC's Indecency Regulations Leaves Broadcasters Still Searching for Answers, 76 ALB. L. REV. 631 (2013).

Ross Rinehart, "Friending" and "Following" the Government: How the Public Forum and Government Speech Doctrines Discourage the Government's Social Media Presence, 22 S. Cal. INTERDISC. L.J. 781 (2013).

Mark D. Robins, First Amendment Protection for Use of Trademarks in Videogames, 25 INTELL. PROP. & TECH. L. J. 14, no. 9, 2013.

Chris Schlag, The New Privacy Battle: How the Expanding Use of Drones Continues to Erode Our Concept of Privacy and Privacy Rights, 13 PGH. J. TECH. L. & Pol'y (2013).

Cristina Siserman, A Global Perspective on the Protection of Privacy and Related Human Rights in Countering the Use of Internet for Terrorist Purposes, 7 MASARYK U. J.L. & TECH. (2013).

Kimberly Strosnider et al, Aerospace and Defense Industries, 47 INT'L Law. 279 (2013).

Dan Terzian, The Right to Bear (Robotic) Arms, 117 Penn. St. L. Rev. 755 (Winter 2013).

Lieutenant Colonol Jeremy S. Weber, Political Speech, The Military, and the Age of Viral Communication, 69 A.F. L. Rev. 91 (2013).

Paul Walker, Organizing for Cyberspace Operations: Selected Issues, 89 INT'L L. STUD. SERIES U.S. NAVAL WarC. 341 (2013).

Markus Wagner, Beyond the Drone Debate: Autonomy in Tomorrow's Battlespace, 107 Am. SOC'Y INT'L L. PROC. 80 (2013).

Amy Zhang, Whistleblowers to Journalists: Protect Your Data, NEWS MEDIA & L., Summer 2013, at 6.

3.3 Use of Computers and Technology by State and Federal Legislatures

Michael Bimhack, Reverse Engineering Informational Privacy Law, 16 YALE J.L. & TECH. 24 (2013).

Matthew L. Burow, Comment, The Sentinel Clouds above the Nameless Crowd: Protecting Anonymity from Domestic Drones, 39 NEW. ENG. J. ON CRIM. & Civ. Confinement 427 (2013).

Robert Chesney, Computer Network Operations and U.S. Domestic Law: An Overview, 89 INT'L L. STUD. SERIES U.S. Naval War C. 218 (2013).

K.K. Duvivier, E-Legislating, 92 OR. L. REV. 9 (2013).

Robin Geiss, Cyber Warfare: Implications for Non-International Armed Conflicts, 89 INT'L L. STUD. SERIES U.S. Naval War C. 627 (2013).

Hayley Gorenberg, Commentary, Student Cyber Speech-Examining Today's School-related First Amendment

Questions through an LGBT Advocacy Lens, N.J. Law. Mag., Oct. 2013, at 71.

Johnathan R. Gray, United States v. Schaefer and United States v. Sturm: Why the Federal Government Should Regulate All Internet Use as Interstate Commerce, 90 DENY. U. L. REV. 691 (2013).

Lixian Hantover, Creating Sustainable Regulations of the Open Internet, 20 UCLA ENT. L. REV. 107 (2013).

Paul de Hert and Vagelis Papakonstantinou, Three Scenarios for International Governance of Data Privacy: Towards an International Data Privacy Organization, Preferably a UN Agency?, 9 I/S: J. L. POL'Y INFO. SOC'Y. 271 (2013).

Gus Hosein & Caroline Wilson Palow, Modern Safeguards for Modern Surveillance: An Analysis of Innovations in Communications Surveillance Techniques, 1A Ohio St. L.J. 1071 (2013).

Katrin Nyman-Metcalf and Ermo Taks, Simplifying the law-can ICT help us?, 21 INT'L J. L. INFO. TECH. 239 (2013).

Jennifer Parent, Labor & Employment Law: Employment Law 2013: It's All About Technology, 23 N.EI. BAR NEWS 13(2013).

Jeff Strieker, Casting a Wider 'Net: How and Why State Laws Restricting Municipal Broadband Networks Must Be Modified, 81 Geo. Wash. L. Rev. 589 (2013).

Chris J. Thompson, Internet Gambling: A Road to Strengthening Tribal Self-Government and Increasing Tribal Self-Sufficiency while Protecting American Consumers, 37 Am. INDIAN L. Rev. 229 (2012-2013).

3.4 Regulation of Computers and Technology

3.4.0 General

Daniel Brenner, Explaining Yourself: Thirty Years after "A Marketplace Approach to Broadcast Regulation ", 65 Admin. L. Rev.743 (Issue 3, Summer 2013).

Eva Conner, Why Don't You Take a Seat away from That Computer: Why Louisiana Revised Statute 14:91.5 is Unconstitutional, 73 La. L. Rev. 883 (2013).

Mark S. Fowler, Lessons from Broadcast Regulation for the Twenty-First Century: A Symposium, 65 ADMIN. L. REV.735 (Issue 3, Summer 2013).

Dinusha Mendis, Digital Economy Act 2010: Fighting a Losing Battle? Why the 'Three Strikes' Law is not the Answer to Copyright Law's Latest Challenge, 27 INT'L R. L. Comp. Tech. 60 (2013).

Abhilash Nair, The Regulation of Online Extreme Pornography: Purposive Teleology (in)action, 21 INT'L J. L. INFO. TECH. 329(2013)

Robert L. Rogers III, The "Dirt" on Revocation of Immunity for Websites that "Encourage" Defamatory Posts, 29 Comm. Law. 1 (2013).

Tania Voon, Discrimination in International Mobile Roaming Regulation: Implications of WTO Law, 16 J. INT'L ECON.L. 91 (2013).

3.4.1 First Amendment Concerns

Andrew Crocker, Trackers That Make Phone Calls: Considering First Amendment Protection for Location Data, 26 Harv. J. LAW & 619(2013).

Dennis A. DeMarco, The Price of Porn & Pugilism: Reconciling Brown v. Entertainment Merchants Association with Ginsberg v. New York through a Media-Specific Approach, 19 WM. & MARY J. OF WOMEN & LAW 609 (2013).

Jessica Fisher, Brown v. Entertainment Merchants Association: "Modern Warfare" on First Amendment Protection of Violent Video Games, 8 J. BUS. & TECH. L. 525 (2013).

Renee Hobbs, The Blurring of Art, Journalism, and Advocacy: Confronting 21st Century Propaganda in a World of Online Journalism, 8 I/S: J. L. POL'Y INFO. SOC'Y. 625 (2013).

W. Dudley McCarter, Constitution Does Not Protect Speech That Threatens Physical Harm, 69 J. Mo. B. 64 (2013).

Jean-Yves Meyer, Basin of the Danaides: How 3-D Printing Will Push the Limits of International Gun Control and Digital Freedom of Speech in the Twenty-First Century, "41 DENV. J. INT'L L. & POL'Y 555 (Summer 2013).

Reesa Miles, Defamation Is More than Just A Tort: A New Constitutional Standard For Internet Student Speech, 2013 B.Y.U. EDUC. & L. J. 357 (2013).

Conor M. Reardon, Note, Cell Phones, Police Recording, and the Intersection of the First and Fourth Amendments, 63 DUKEL.J. 735 (2013).

Megan Richardson, Honour in a Time of Twitter, 5 J. MEDIAL. 45 (2013).

Jason M. Shepard & Genelle Belmas, Anonymity, Disclosure, and First Amendment Balancing in the Internet Era: Developments in Libel, Copyright, and Election Speech, 16 YALE J. L. & TECH. 92 (2013).

Lieutenant Colonol Jeremy S. Weber, Political Speech, the Military, and the Age of Viral Communication, 69 A.F. L. Rev. 91 (2013).

3.4.2 Antitrust

Aaron S. Edlin & Robert G. Harris, The Role of Switching Costs in Antitrust Analysis: A Comparison of Microsoft and Google, 16 YALE J. L. & TECH. 169 (2013).

Thomas J. Horton & Robert H. Lande, Should the Internet Exempt the Media Sector from the Antitrust Laws?, 65 FLA. L. REV. 1521 (2013).

Ioannis Lianos & Eugenia Motchenkova, Market Dominance and Search Quality in the Search Engine Market, 9 J. COMPETITION L. & ECON. 419 (2013).

Andrew Metcalf, Concert or Solo Gig; Where the NLRB Went Wrong when It Linked in to Social Networks, 90 U. L. REV. 1543 (2013).

Nadia Oviedo, Note, Preserving Cross-Media Ownership Limits: Localism, the NBCO Rule, and Lessons from Canada and the UK, 28 CONN. J. INT'L L. 343 (2013).

Russell Pittman & Yan Li, AT&T and T-Mobile: Economies as an Antitrust Defense Applied, 9 J. COMPETITION L. & ECON. 49 (2013).

Daniel A. Rascher & Andrew D. Schwarz, The Antitrust Implications of Paperless Ticketing on Secondary Markets, 9(3) J. COMPETITION L. & ECON. 655 (2013).

John Soma, Lessons from AT&T's Flop: How to Grow in the Technology Industry while Avoiding Section 7

Antitrust Obstacles, 6 J. BUS. ENTREPRENEURSHIP & L. 195 (2012-2013).

Peter Swire & Yianni Lagos, Why the Right to Data Portability Likely Reduces Consumer Welfare: Antitrust and Privacy Critique, 72 MD. L. REV. 335 (2013).

3.4.3 FCC Regulation

Alison Nemeth, Comment, The FCC's Broadcast Indecency Policy on "Fleeting Expletives" after the Supreme Court's Latest Decision in F.C.C. V. Fox Television Stations: Sustainable or Also "Fleeting?", 21 COMMLAW CONSPECTUS 394 (2013).

David L. Newman, Going Once ... Going Twice ... License under the Most Reasonable and Non-Discriminatory Bidding Terms, 11 NW. J. TECH. & Intell. Prop. 139(2013).

Jan Oster, Theory and Doctrine of 'Media Freedom ' as a Legal Concept, 5 J. MEDIA L. 57 (2013).

3.4.4 SEC Regulation

Heather Traeger & Kris Easter, Use of Social Media in Private Fund Offerings: Perks, Perils, and Privacy, 13 J. BUS. & SEC. L. 143 (2013).
COPYRIGHT 2014 Rutgers University School of Law - Newark
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 2014 Gale, Cengage Learning. All rights reserved.

Article Details
Printer friendly Cite/link Email Feedback
Title Annotation:p. 256-303
Publication:Rutgers Computer & Technology Law Journal
Date:Sep 22, 2014
Words:9349
Previous Article:Let's get physical: loss of use of tangible property as coverage in cyber insurance.
Next Article:Forty-fifth selected bibliography on computers, technology, and the law.
Topics:

Terms of use | Privacy policy | Copyright © 2018 Farlex, Inc. | Feedback | For webmasters