Printer Friendly

Thirty-second selected bibliography on computers, technology and the law.

(January 1999 through December 1999)

INTRODUCTION

Each year, the Journal provides a compilation of the most important and timely legal articles on computers, technology, and the Internet. The Bibliography, indexed by subject matter, is designed to be a research guide to assist our readers in searching for recent articles on computer and technology law. This year's annual Bibliography contains nearly 1000 articles, found through the examination of over 800 periodicals.

The Bibliography aims to include topics on every legal aspect of computers and technology. However, as new issues in this field emerge, we welcome your suggestions for additional topics and sources, as well as your commentary on the Bibliography.

INDEX
1. COMPUTERS AND TECHNOLOGY IN LAW PRACTICE
 1.0 General
 1.1 Computerized Legal Research
 1.1.0 General
 1.1.1 Online Legal Research
 1.1.2 Legal Research Using CD-ROM
 1.2 Law Office Management
 1.2.0 General
 1.2.1 Office Automation
 1.2.2 Case Management
 1.2.3 Case File Security
 1.2.4 Internet Access
 1.3 Selected Uses in the Law Practice
 1.3.0 General
 1.3.1 Tax Filing
 1.3.2 Bankruptcy
 1.3.3 Estate Planning
 1.3.4 Real Estate

2. COMPUTERS AND TECHNOLOGY IN LITIGATION
 2.0 General
 2.1 Scientific Evidence
 2.1.0 General
 2.1.1 Expert Testimony
 2.1.2 DNA Typing
 2.1.3 Fingerprint
 2.1.4 Polygraph
 2.1.5 Forensic Evidence
 2.2 Demonstrative Evidence
 2.2.0 General
 2.2.1 Computer-Generated Evidence
 2.2.2 Audio/Visual Evidence
 2.3 Cameras in the Courtroom
 2.4 Dispute Resolution

3. COMPUTERS AND TECHNOLOGY IN THE GOVERNMENT
 3.0 General
 3.1 Computers and Technology in Law Enforcement
 3.1.0 General
 3.1.1 Computers and Technology in Police Operation
 3.1.2 Computers and Technology in Correctional Institutions
 3.2 Use of Computers and Technology by Federal Departments
 and Agencies
 3.2.0 General
 3.2.1 Military Technology
 3.2.2 Internal Revenue Service
 3.2.3 U.S. Patent Office
 3.2.4 Government Information Retrieval System
 3.3 Use of Computers and Technology in Judicial
 Administration
 3.4 Use of Computers and Technology by State and Federal
 Legislatures

4. LEGAL ISSUES OF COMPUTER AND TECHNOLOGY SALES, USAGE,
 AND SERVICES
 4.0 General
 4.1 Contracting for Hardware, Software, and Computer Services
 4.1.0 General
 4.1.1 Purchase, Lease and License Considerations
 4.1.2 Limitations of Limited Warranties
 4.2 Government Regulation of Computer-Related Industry
 4.2.0 General
 4.2.1 First Amendment Issues
 4.2.2 Antitrust
 4.2.3 FCC Regulation
 4.2.4 SEC Regulation
 4.2.5 Tariff and Trade Control
 4.3 Substantive Law Aspects
 4.3.0 General
 4.3.1 Computer Crime
 4.3.2 Computer-Related Product Liability
 4.3.3 Computer Security
 4.3.4 Taxation of Software
 4.4 Problems of Privacy and Computers
 4.4.0 General
 4.4.1 Data Privacy
 4.4.2 Governmental Invasion of Privacy
 4.4.3 Credit Reference

5. COMPUTERS AND TECHNOLOGY IN EDUCATION
 5.0 General
 5.1 Legal Education

6. COMPUTERS AND TECHNOLOGY IN BUSINESS
 6.0 General
 6.1 Electronic Commerce
 6.2 Computers in Banking and Finance
 6.2.0 General
 6.2.1 On-line Securities Trading
 6.3 Computers and Technology in the Transportation Industry
 6.4 Computers and Technology in the Publishing Industry
 6.5 Computers and Technology in Advertising

7. INTELLECTUAL PROPERTY PROTECTION OF COMPUTERS AND TECHNOLOGY
 7.0 General
 7.1 Patent
 7.1.0 General
 7.1.1 Software Patent
 7.1.2 Biotech Patent
 7.2 Software Copyright
 7.2.0 General
 7.2.1 User Interface
 7.2.2 Fair Use
 7.2.3 Video Game
 7.3 Digital Copyright
 7.3.0 General
 7.3.1 Electronic Compilation
 7.3.2 Computer Database
 7.3.3 Multimedia
 7.3.4 Computer-Generated Works
 7.4 Trademark
 7.5 Trade Secret
 7.6 Semiconductor Chip Protection
 7.7 Licensing
 7.8 Intellectual Property Issues of the Internet
 7.9 International Developments
 7.9.0 General
 7.9.1 GATT-TRIPS
 7.9.2 NAFTA
 7.9.3 Developments in Canada
 7.9.4 Developments in Mexico and Latin America
 7.9.5 Developments in Australia and New Zealand
 7.9.6 Developments in Africa
 7.9.7 Developments in Asia
 7.9.8 Developments in Western Europe
 7.9.9 Developments in Eastern Europe and Russia

8. COMPUTERS AND LEGAL REASONING
 8.0 General
 8.1 Artificial Intelligence

9. LEGAL ISSUES OF THE INTERNET
 9.0 General
 9.1 ISP and Internet Access
 9.2 Domain Names
 9.3 Taxation of Electronic Commerce
 9.4 Encryption and Digital Signatures
 9.5 Internet Crime
 9.6 Civil Procedure in Cyberspace

10. LAW AND TECHNOLOGY
 10.0 General
 10.1 Technology Transfer
 10.2 Audio/Video Recording
 10.3 Space Law
 10.4 Medical Technology
 10.5 Biotechnology and Pharmaceuticals
 10.6 Environmental Law
 10.6.0 General
 10.6.1 Pollution
 10.6.2 Hazardous Substances
 10.6.3 Electromagnetic Fields
 10.6.4 Nuclear Technology
 10.6.5 Energy and the Environment
 10.6.6 International Environmental Law Developments
 10.7 Television
 10.7.0 General
 10.7.1 Satellite Television
 10.7.2 Cable Television
 10.8 Telecommunications
 10.8.0 General
 10.8.1 Telephone
 10.8.2 Multimedia in Telecommunications
 10.8.3 International Telecommunications Developments

11. OTHERS
 11.0 General
 11.1 Y2K Issues

BIBLIOGRAPHY

1. COMPUTERS AND TECHNOLOGY IN LAW PRACTICE

 1.0 General

 Allison Standfield, Dinosaurs to Dynamos: Has the Law
 Reached its Technological Age, 21 UNSWLJ 530
 (1998).

 Graham Walker, Computers and Legal Aid Work, J.L.
 SOC'Y SCOT., Aug. 1999, at 43.

 1.1 Computerized Legal Research

 1.1.0 General

 E. Pietrosant & B. Graziadio, Advanced Techniques for
 Legal Document Processing and Retrieval, 7 ART.

 INTELL. & L. 341 (1999).

 1.1.1 Online Legal Research

 A. Darby Dickerson, Ethics on the Web: An Annotated
 Bibliography of Legal Ethics Material on the Internet,
 28 STETSON L. REV. 369 (1998).

 1.1.2 Legal Research Using CD-ROM

 1.2 Law Office Management

 1.2.0 General

 Drew L. Kershen, Professional Legal Organizations on
 the Internet: Web Sites and Ethics, 4 DRAKE J. AGRIC.
 L. 1 (1999).

 1.2.1 Office Automation
 1.2.2 Case Management

 Roger Mackenzie, The Interview: Stephen Gold, J.L.
 SOC'Y SCOT., Mar. 1999, at 34.

 1.2.3 Case File Security
 1.2.4 Interact Access

 Laurann Sage, Mainstream Louden v. Board of
 Trustees: Restricting Internet Access in Public
 Libraries, 67 UMKC L. REV. 731 (1999).

 1.3 Selected Uses in the Law Practice

 1.3.0 General
 1.3.1 Tax Filing
 1.3.2 Bankruptcy
 1.3.3 Estate Planning
 1.3.4 Real Estate

 Dale A. Whitman, Digital Recording of Real Estate
 Conveyances, 32 J. MARSHALL L. REV. 227 (1999).

2. COMPUTERS AND TECHNOLOGY IN LITIGATION

 2.0 General

 Michael J. Brady, The World Wide Web and the New
 World of Litigation: A Basic Introduction, 66 DEFENSE
 COUNSEL J. 497 (1999).

 K. Isaac de Vyver, Comment, Opening the Door But
 Keeping the Lights Off: Kuhmo Tire Co. v. Carmichael
 and the Applicability of the Daubert Test to
 Nonscientific Evidence, 50 CASE W. RES. L. REV. 177
 (1999).

 Todd H. Flaming & Benson K. Friedman, 1998 Survey
 of Legal Technology, 23 S. ILL. U. L.J. 1183 (1999).

 Samuel A. Guiberson, Technology and Advocacy in the
 New Technology Courtroom, 28 SW. U. L. REV. 405
 (1999).

 Malcom Lader, The Influence of Drugs Upon
 Testimony, 39 MED., SCI. & L. 99 (1999).

 Fredric I. Lederer, The Road to the Virtual Courtroom?
 A Consideration of Today's -- and Tomorrow's -- High
 Technology Courtrooms, 50 S.C. L. REV. 799 (1999).

 2.1 Scientific Evidence

 2.1.1 General

 Gary Edmond, Science, Law and Narrative: Helping the
 `Facts' to Speak for Themselves, 23 S. ILL. U. L.J. 555
 (1999).

 Louis A. Jacobs, Giving Life to Antiquated Notions
 About Scientific Evidence, 22 AM. J. TRIAL ADVOC. 507
 (1999).

 Randolph N. Jonckait, The Standard of Appellate
 Review for Scientific Evidence: Beyond Joiner and
 Scheffer, 32 U.C. DAVIS L. REV. 289 (1999).

 Honorable Janine M. Kern & Scott R. Swier, Daubert v.
 Merrell Dow Pharmaceuticals, Inc.: "Gatekeeping" or
 Industry "Safekeeping"?, 43 S.D.L. REV. 566 (1998).

 Thomas H. Neuckranz & Bradley C. Nahrstadt, Refuting
 Diagnostic and Neuropsychological Testing in Toxic
 Tort Cases, 23 AM. J. TRIAL ADVOC. 19 (1999).

 James E. Starrs, There's Something About Novel
 Scientific Evidence, 28 SW. U. L. REV. 417 (1999).

 2.1.2 Expert Testimony

 Liam Donaldson et al., The Medial Expert Witness:
 Time to Regulate Conflicts of Interest, 39 MED., SCI. &
 L. 11 (1999).

 Marilee M. Kapsa & Carl B. Meyer, Scientific Experts:
 Making Their Testimony More Reliable, 35 CAL. W. L.
 REV. 313 (1999).

 Brian Manarin, Assessing the Expert: A Call for
 Reciprocal Disclosure in Canada, 39 MED., SCI. & L.
 17 (1999).

 Alan A. Stone, The Forensic Psychiatrist As Expert
 Witness in Malpractice Cases, 27 AM. ACAD.
 PSYCHIATRY & L. 451 (1999).

 Richard T. Stillwell, Monitoring the Opinions of
 Biochemists and Beekeepers: The Application of
 Daubert & Robinson to Engineering Witnesses in Texas,
 BAYLOR L. REV., Winter 1999, at 95.

 2.1.2 DNA Typing

 Ilene Sherwyn Cooper, Advances in DNA Techniques
 Present Opportunity to Amend EPTL to Permit
 Paternity Testing, N.Y. ST. B.J., July/August 1999, at
 34.

 Jonathan W. Diehl, Note, Drafting a Fair DNA
 Exception to the Statute of Limitations in Sexual Assault
 Cases, 39 JURIMETRICS J. 431 (1999).

 Marcia Johnson, Genetic Technology and Its Impact on
 Culpability for Criminal Actions, 46 CLEV. ST. L. REV.
 443 (1998).

 Eric T. Juengst, I-DNA-fication, Personal Privacy, and
 Social Justice, 75 CHI.-KENT L. REV. 61 (1999).

 Trevor R. McDonald, Note, Genetic Justice: DNA
 Evidence and the Criminal Law in Canada, 26 MAN.
 L.J. 1 (1998).

 Andreas Oser, Patenting (Partial) Gene Sequences
 Taking Particular Account of the EST Issue, 30 INT'L
 REV. INDUS. PROP. & COPYRIGHT L. 1 (1999).

 Bob John Robinson, Why an Acceptable Cloning Policy
 Will be Hard to Achieve, 13 NOTRE DAME J.L. ETHICS
 & PUB. POL'Y 9 (1999).

 2.1.3 Fingerprint

 2.1.4 Polygraph

 Sheila K. Hyatt, Developments in the Law of Scientific
 Evidence: The Admissibility of Polygraph Evidence, 28
 J. NAT'L ASS'N ADMIN. L. JUDGES 171 (1998).

 2.1.5 Forensic Evidence

 Anthony Busuttil, Lockerbie and Dunblane: Disasters
 and Dilemmas, 66 MEDICO-LEGAL J. 126 (1999).

 Malcolm B. Stoney & Timothy D. Koelmeyer, Facial
 Reconstruction: A Case Report and Review of
 Development of Techniques, 39 MED., SCI. & L. 49
 (1999).

 2.2 Demonstrative Evidence

 2.2.0 General

 Lisa A. Dolak, Patents Without Paper: Proving a Date
 of Invention with Electronic Evidence, 36 HOUS. L.
 REV. 471 (1999).

 Fredric I. Lederer, Some Thoughts on the Evidentiary
 Aspects of Technologically Presented or Produced
 Evidence, 28 SW. U. L. REV. 389 (1999).

 2.2.1 Computer-Generated Evidence

 Robert B. Bennett, Jr. et al., Seeing Is Believing; Or Is
 It? An Empirical Study of Computer Simulations as
 Evidence, 34 WAKE FOREST L. REV. 257 (1999).

 Karen D. Butera, Seeing is Believing: A Practitioner's
 Guide to the Admissibility of Demonstrative Computer
 Evidence, 46 CLEV. ST. L. REV. 511 (1998).

 James E. Carbine & Lynn McLain, Proposed Model
 Rules Governing the Admission of Computer-Generated
 Evidence, 15 SANTA CLARA COMPUTER & HIGH TECH.
 L.J. 1 (1998).

 Gyong Ho Kim & Anna R. Paddon, Digital
 Manipulation As New Form of Evidence of Actual
 Malice in Libel and False Light Cases, COMM. & L.,
 Sept. 1999, at 57.

 Mary Moreland & Steward Nazzaro, Admitting Scanned
 Reproductions into Evidence, 18 REV. OF LIT. 261
 (1999).

 Linda C. Morell, New Technology: Experimental
 Research on the Influence of Computer-Animated
 Display on Jurors, 28 SW. U. L. REV. 411 (1999).

 Christopher Nicholl, Should Computers be Trusted?
 Hearsay and Authentication with Special Reference to
 Electronic Commerce, 1999 J. BUS. L., at 332.

 2.2.2 Audio/Visual Evidence

 Lori G. Baer & Christofer A. Riley, Technology in the
 Courtroom: Computerized Exhibits and How to Present
 Them, 66 DEF. COUNS. J. 176 (1999).

 Libby Bishop & David I. Levine, Computer-Mediated
 Communications as Employee Voice: A Case Study, 52
 INDUS. & LAB. REL. REV. 213 (1999).

 Ray Bull & Brian R. Clifford, Earwitness Testimony, 39
 MED., SCI. & L. 120 (1999).

 Elizabeth J.M. Strobel, Note, Play it Again, Counsel:
 The Admission of Videotaped Interviews in Prosecutions
 for Criminal Sexual Assault of a Child, 30 LOY. U. CHI.
 L.J. 305 (1999).

 Sherrie L. Wilson, A Proposal for Media Access to
 Audiotapes and Videotapes Presented During Trials,
 COMM. & L., Mar. 1999, at 45.

 2.3 Cameras in the Courtroom

 Michael Comisky, Not Guilty: The News Media in the
 Supreme Court Confirmation Process, J.L. & POL.,
 Winter 1999, at 1.

 2.4 Dispute Resolution

 Llewellyn Joseph Gibbons, Rusticum Judicium ? Private
 "Courts" Enforcing Private Law and Public Rights:
 Regulating Virtual Arbitration in Cyberspace, 24 OHIO
 N.U.L. REV. 769 (1998).

 Veijo Heiskanen, Dispute Resolution in International
 Electronic Commerce, 16 J. INT'L ARB., Sept. 1999, at
 29.

 John Arter Jackson, Managing and Resolving Legal
 Issues in Technology: A Report from the Albany Law
 School Science and Technology Law Center Project, 9
 ALB. L.J. SCI. & TECH. 317 (1999).

 Catherine Kessedjian & Sandrine Cahn, Dispute
 Resolution On-Line, 32 INT'L LAW. 977 (1998).

 Erik Wilburs, On-Line Arbitration of Electronic
 Commerce Disputes, 27 INT'L BUS. LAW. 273 (1999).

3. COMPUTERS AND TECHNOLOGY IN THE GOVERNMENT

 3.0 General

 A. Michael Froomkin, On Government and
 Governance, 14 BERKELEY TECH. L.J. 617 (1999).

 Diane E. Horvath & John S. Jung, 1999 Technology
 Legislation in Virginia, 33 U. RICH. L. REV. 1037
 (1999).

 J. Marilyn Henry, Electronic Communications: A
 Necessity for Local Agencies, 56 J. HOUSING &
 COMMUN. DEV., March/April 1999, at 15.

 Brian A. Persico, Comment, Under Siege: The
 Jurisdictional and Interagency Problems of Protecting
 the National Information Infrastructure, 7 COMM. L.
 CONSPECTUS 153 (1999).

 3.1 Computers and Technology in Law Enforcement

 3.1.0 General

 George M. Dery III, The Loss of Privacy is Just a
 Heartbeat Away: An Exploration of Government
 Heartbeat Detection Technology and Its Impact on
 Fourth Amendment Protections, 7 WM. & MARY BILL
 RTS. J. 401 (1999).

 Janet Reno, Justice and Public Safety in the Twenty-First
 Century, 30 MCGEORGE L. REV. 5 (1998).

 Martha A. Sabol, The Identity Theft and Assumption
 Deterrence Act of 1998 -- Do Individual Victims Finally
 Get Their Day in Court?, 11 LOY. CONSUMER L. REV.
 165 (1999).

 3.1.1 Computers and Technology in Police Operation

 Steven Salvador Flores, Note, Gun Detector Technology
 and the Special Needs Exception, 25 RUTGERS
 COMPUTER & TECH. L.J. 135 (1999).

 D. Honeybourne et al., A Study to Investigate the Ability
 of Subjects with Chronic Lung Diseases to Activate the
 Roadside Lion Alcolmeter SL-400, 39 MED., SCI. & L.
 337 (1999).

 3.1.2 Computers and Technology in Correctional
 Institutions

 3.2 Use of Computers and Technology by Federal Agencies
 and Departments

 3.2.0 General

 Captain Theresa A. Bruno, The Deployment Will, 47
 A.F.L. REV. 211 (1999).

 Richard M. Devens, On-Line Publishing at the Bureau
 of Labor Statistics, 38 INDUS. REL. J. OF ECON. &
 SOC'Y 446 (1999).

 Veling W. Tsai, Cheaper and Better: The
 Congressional Administrative Simplification Mandate
 Facilitates the Transition to Electronic Medical
 Records, 19 J. LEGAL MED. 549 (1998).

 3.2.1 Military Technology

 David Edward Grogan, Power Play: Theater Ballistic
 Missile Defense, National Ballistic Missile Defense and
 the ABM Treaty, 39 VA. J. INT'L L. 799 (1999).

 Vally Koubi, Military Technology Races, 53 INT'L ORG.
 537 (1999).

 D.G. Stephens & M.D. Fitzpatrick, Legal Aspects of
 Contemporary Naval Mine Warfare, 21 LOY. L.A. INT'L
 & COMP. L.J. 553 (1999).

 3.2.2 Internal Revenue Service
 3.2.3 U.S. Patent Office
 3.2.4 Government Information Retrieval System

 Martin E. Halstuck, Bits, Bytes, and the Right to Know:
 How the Electronic Freedom of Information Act Holds
 the Key to Public Access to a Wealth of Government
 Databases, 15 SANTA CLARA COMPUTER & HIGH
 TECH. L.J. 73 (1998).

 3.3 Use of Computers and Technology in Judicial
 Administration

 L. Karl Branting et al., Automating Judicial Document
 Drafting: A Discourse-Based Approach, 6 ART. INTELL.
 & L. 111 (1998).

 Paul R. Michel, The Court of Appeals for the Federal
 Circuit Must Evolve to Meet the Challenges Ahead, 48
 AM. U. L. REV. 1177 (1999).

 L.D.M. Nokes et al., Biomechanics of Judicial Hanging:
 A Case Report, 39 MED., SCI. & L. 61 (1999).

 Uri J. Schild, Criminal Sentencing and Intelligent
 Decision Support, 6 ART. INTELL. & L. 151 (1998).

 Andrew Stranieri et al., A Hybrid Rule Neural
 Approach for the Automation of Legal Reasoning in the
 Discretionary Domain of Family Law in Australia, 7
 ART. INTELL. & L. 153 (1999).

 Michele Taruffo, Comment, Judicial Decisions and
 Artificial Intelligence, 6 ART. INTELL. & L. 311 (1999).

 Cyrus Tata, The Application of Judicial Intelligence and
 `Rules' to Systems Supporting Discretionary Judicial
 Decision-Making, 6 ART. INTELL. & L. 203 (1998).

 3.4 Use of Computers and Technology by State and Federal
 Legislatures

4. LEGAL ISSUES OF COMPUTER AND TECHNOLOGY SALES, USAGE,
AND SERVICES

 4.0 General

 Steve Bickerstaff, Shackles on the Giant: How the
 Federal Government created Microsoft, Personal
 Computers, and the Internet, TEX. INTELL. PROP. L.J. 1
 (1999).

 Vickie S. Byrd, Note, "Reno v. ACLU"--A Lesson in
 Juridical Impropriety, 42 HOW. L.J. 356 (1999).

 Jane Kaufman Winn, Clash of the Titans, Regulating the
 Competition between Established and Emerging
 Electronic Payment Systems, 14 BERKELEY TECH. L.J.
 675 (1999).

 4.1 Contracting for Hardware, Software, and Computer
 Services

 4.1.0 General

 4.1.1 Purchase, Lease and License Considerations

 Michael P. Akemann, Microsoft's Licensing
 Agreements: Theory and Evidence on the Sale of MSDOS
 and Windows, 24 J. CORP. L. 553 (1999).

 4.1.2 Limitations of Limited Warranties

 4.1 Government Regulation of the Internet and
 Computer-Related Industry

 4.2.0 General

 Lisa Austin, Law & the Internet: Regulating
 Cyberspace, 49 U. TORONTO L.J. 305 (1999) (book
 review).

 Patrick Birkinshaw & Nicholas Parry, The End of the
 Beginning? The Freedom of Information Bill 1999, 26
 J.L. & SOC'Y 538 (1999).

 David Church et al., Recent Developments Regarding
 U.S. and EU Regulation of Electronic Commerce, 33
 INT'L LAW. 347 (1999).

 Timothy Coughlan, Note, Applying the U.S. Postal
 Service Statutes to E-Mail Transmissions, 25 RUTGERS
 COMPUTER & TECH. L.J. 375 (1999).

 James E. Gaylord, Note, State Regulatory Jurisdiction
 and the Internet: Letting the Dormant Commerce
 Clause Lie, 52 VAND. L. REV. 1095 (1999).

 Ronald J. Gilson, The Legal Infrastructure of High
 Technology Industrial Districts: Silicon Valley, Route
 128, And Covenants Not to Compete, 74 N.Y.U. L. REV.
 575 (1999).

 Jack L. Goldsmith, What Internet Gambling Legislation
 Teaches About Internet Regulation, 32 INT'L LAW. 1115
 (1998).

 Jennifer M. Kappel, Government Intervention on the
 Internet: Should the Federal Trade Commission
 Regulate Unsolicited E-Mail Advertising?, 51 ADMIN.
 L. REV. 1011 (1999).

 Mark A. Lemley, Standardizing Government Standard-Setting
 Policy for Electronic Commerce, 14 BERKELEY
 TECH. L.J. 746 (1999).

 Lawrence Lessig, The Limits in Open Code: Regulatory
 Standards and the Future of the Net, 14 BERKELEY
 TECH. L.J. 760 (1999).

 Paul K. Ohm, On Regulating the Internet Usenet: A
 Case Study, 46 UCLA L. REV. 1941 (1999).

 Chris Reed, Controlling World Wide Web Links:
 Property Rights, Access Rights and Unfair Competition,
 6 IND. J. GLOBAL LEGAL STUD. 167 (1998).

 Charles R. Topping, Article, The Surf Is Up, But Who
 Owns the Beach?-Who Should Regulate Commerce on
 the Internet?, 13 NOTRE DAME J.L. ETHICS & PUB.
 POL'Y 179 (1999).

 George B. Trubow, Regulating Transactions on the
 Internet, 24 OHIO N.U. L. REV. 831 (1998).

 Christian R. White, Comment, Decrypting the Politics:
 Why the Clinton Administration's National
 Cryptography Policy Will Continue to Be Dictated by
 National Economic Interest, 7 COMM. L. CONSPECTUS
 193 (1999).

 4.2.1 First Amendment Issues

 Ray August, Gratis Dictum! The Limits of Academic
 Free Speech on the Internet, 10 U. FLA. J.L. & PUB.
 POL'Y 27 (1998).

 G. Chris Bernard, The Child Online Protection Act: Can
 the COPA Cope with Constitutional Scrutiny in Light of
 Reno v. ACLU?, 45 WAYNE L. REV. 1665 (1999).

 Clay Calvert, The Voyeurism Value in First Amendment
 Jurisprudence, 17 CARDOZO ARTS & ENT. L.J. 273
 (1999).

 Clay Calvert & Robert D. Richards, New Millennium,
 Same Old Speech: Technology Changes, But the First
 Amendment Issues Don't 79 B.U. L. REV. 779 (1999).

 April Bailey Cole, Note, Indecency on the Internet: Law
 and the Communications Decency Act of 1996, 27 CAP.
 U. L. REV. 607 (1998).

 Steven M. Cordero, Damnum Absque Injuria: Zeran v.
 AOL & Cyberspace Defamation Law, 9 FORDHAM
 INTELL. PROP. MEDIA & ENT. L.J. 625 (1999).

 Kelly M. Doherty, WWW.Obscenity.com: An Analysis of
 Obscenity and Indecency Regulation on the Internet, 32
 AKRON L. REV 259 (1999).

 Walter J. Dorgan III, The Cyberworld Cannot be
 Confined to Speech that Would be Suitable for a
 Sandbox, 29 SETON HALL L. REV. 286 (1998).

 Alamdar S. Hamdani, Comment, Technological
 Convergence--"A Multiplicity of Sources," 36 HOUS. L.
 REV. 321 (1999).

 Lori Johnson, Comment, Reno v. American Civil
 Liberties Union: The First Amendment Balance of a
 Child's Morality and an Adult's Naughty Net Play, 25
 RUTGERS COMPUTER & TECH. L.J. 157 (1999).

 Natalie A. Kaniel, Loving v. Boren, 14 BERKELEY
 TECH. L.J. 371 (1999).

 Mark S. Kende, Lost in Cyberspace: The Judiciary's
 Distracted Application of Free Speech and Personal
 Jurisdiction Doctrines to the Internet, 77 OR. L. REV.
 1125 (1998).

 Matthew Thomas Kline, Mainstream Loudoun v. Board
 of Trustees of the Loudoun County Library, 14
 BERKELEY TECH. L.J. 348 (1999).

 Jason Edward Lavender, Note, "Tobacco is a Filthy
 Weed and From the Devil Doth Proceed": A Study of
 the Government's Efforts to Regulate Smoking on the
 Silver Screen, 21 HASTINGS COMM. & ENT. L.J. 205
 (1998).

 Lydia W. Lee, Child Pornography Prevention Act of
 1996: Confronting the Challenges of Virtual Reality, 8
 S. CAL. INTERDISC. L.J. 639 (1999).

 John F. McGuire, Note, When Speech Is Heard Around
 the World: Internet Content Regulation in the United
 States and Germany, 74 N.Y.U. L. REV. 750 (1999).

 Michael J. Merchant, Comment, Establishing the
 Boundaries of First Amendment Protection for Speech
 in the Cyberspace Frontier: Reno v. ACLU, 5 VILL.
 SPORTS & ENT. L.J. 429 (1998).

 Heather L. Miller, Strike Two: An Analysis of the Child
 Online Protection Act's Constitutional Failures, 52 FED.
 COMM. L.J. 155 (1999).

 Robert D. Richards & Clay Calvert, The "True Threat"
 to Cyberspace: Shredding the First Amendment for
 Faceless Fears, 7 COMM. L. CONSPECTUS 291 (1999).

 Marc Rohr, Can Congress Regulate "Indecent" Speech
 on the Internet?, 23 NOVA L. REV. 709 (1999).

 Michael L. Siegel, Hate Speech, Civil Rights, and the
 Internet: The Jurisdictional and Human Rights
 Nightmare, 9 ALB. L.J. SCI. & TECH. 375 (1999).

 Brenda M. Simon, United States v. Hilton, 14
 BERKELEY TECH. L.J. 385 (1999).

 Sanjiv N. Singh, Cyberspace: A Blew Frontier for
 Fighting Words, 25 RUTGERS COMPUTER & TECH. L.J.
 283 (1999).

 Marcy Cohen Turner, Regulating Internet Pornography:
 Should Parents or the Government Be in Control?,
 CHILDREN'S LEGAL RTS. J., Summer 1999, at 48.

 Rachel Weintraub-Reitter, Note, Hate Speech Over the
 Internet: A Traditional Constitutional Analysis or a
 New Cyber Constitution, 8 B.U. PUB. INT. L.J. 145
 (1998).

 Gretchen Witte, Comment, Internet Indecency and
 Impressionable Minds, 44 VILL. L. REV. 745 (1999).

 Noah D. Zatz, Note, Sidewalks in Cyberspace: Making
 Space for Public Forums in the Electronic Environment,
 12 HARV. J.L. & TECH. 149 (1998).

 4.2.2 Antitrust

 James C. Burling, The Antitrust Duty to Deal and
 Intellectual Property Rights, 24 J. CORP. L. 527 (1999).

 Michael Woodrow De Vries, United States v. Microsoft,
 14 BERKELEY TECH. L.J. 303 (1999).

 Albert A. Foer, The Importance of the Microsoft Case,
 31 CONN. L. REV. 1275 (1999).

 Jon M. Garon, Media & Monopoly in the Information
 Age: Slowing the Convergence at the Marketplace of
 Ideas, 17 CARDOZO ARTS & ENT. L.J. 491 (1999).

 Daniel J. Gifford, Java and Microsoft: How Does the
 Antitrust Story Unfold?, 44 VILL. L. REV. 67 (1999).

 Norman W. Hawker, Consistently Wrong: The Single
 Product Issue and the Tying Claims Against Microsoft,
 35 CAL. W. L. REV. 1 (1998).

 Norman W. Hawker, Open Windows: The Essential
 Facilities Doctrine and Microsoft, 25 OHIO N.U. L.
 REV. 115 (1999).

 William E. Kovacic, Designing Antitrust Remedies for
 Dominant Firm Misconduct, 31 CONN. L. REV. 1285
 (1999).

 Robert M. Langer, Symposium Introduction: United
 States v. Microsoft, 31 CONN. L. REV. 1245 (1999).

 Robert A. Levy, Microsoft and the Browser Wars, 31
 CONN. L. REV. 1321 (1999).

 David McGowan, Networks and Intention in Antirust
 and Intellectual Property, 24 J. CORP. L. 485 (1999).

 Wendy Milanese, Comment, The Tension Must Break:
 The Irreconcilable Interplay Between Antitrust Defenses
 to Infringement and Protection of Standardized
 Software Development Tools, 15 SANTA CLARA
 COMPUTER & HIGH TECH. L.J. 407 (1999).

 Leonard Orland, Teaching Antitrust During Microsoft,
 31 CONN. L. REV. 1375 (1999).

 William H. Page & John E. Lopatka, The Dubious
 Search for "Integration" in the Microsoft Trial, 31
 CONN. L. REV. 1251 (1999).

 Jennifer J. Stearman, Disco Vision Associates v. Disc
 Manufacturing Inc., Alleging Monopolization, Patent
 Tying and Market Allocation in the Compact Disc
 Technology Market: Surviving a Motion to Dismiss, 6
 U. BALT. INTELL. PROP. L.J. 89 (1997).

 Jonathan Zittrain, The Un-Microsoft Un-Remedy: Law
 Can Prevent the Problem that It Can't Patch Later, 31
 CONN. L. REV. 1361 (1999).

 4.2.3 FCC Regulation

 William C. Beckwith, Comment, Cutting the Cord:
 Removing the CMRS Spectrum Cap to Promote
 Wireless-Landline Convergence and Wireless
 Alternatives in the Local Loop, 7 COMM. L.
 CONSPECTUS 369 (1999).

 John Allen Hendricks, The Telecommunications Act of
 1996: Its Impact on the Electronic Media of the 21st
 Century, COMM. & L., June 1999, at 39.

 Leonard J. Kennedy & Lori A. Zallaps, If It Ain't
 Broke ... The FCC and Internet Regulation, 7 COMM.
 L. CONSPECTUS 17 (1999).

 Erwin G. Krasnow & M. Wayne Milstead, FCC
 Regulation and Other Oxymorons Revisited, MEDIA L.
 & POL'Y, Spring 1999, at 7.

 Laura Lakin McDaniels, Southwestern Bell v. FCC, 14
 BERKELEY TECH. L.J. 422 (1999).

 Stephen F. Varholy, Comment, Preserving the Public
 Interest: A Topical Analysis of Cable/DBS
 Crossownership in the Rulemaking for the Direct
 Broadcast Satellite Service, 7 COMM. L. CONSPECTUS
 173 (1999).

 4.2.4 SEC Regulation

 Paul D. Cohen, Securities Trading Via the Internet,
 1999 J. Bus. L. 299.

 Vernon J. Richardson & Susan Scholz, Corporate Web
 Site Disclosure and Rule 10B-5: An Empirical
 Evaluation, 36 AM. BUS. L.J. 531 (1999).

 Andrew R. Thompson, Note, Taming the Frontier?: An
 Evaluation of the SEC's Regulation of Internet
 Securities Trading Systems, 1999 COLUM. BUS. L. REV.
 165 (1999).

 Omri Yadlin, Should the SEC Regulate the Cyber
 Securities Market?, 73 CHI.-KENT L. REV. 1355 (1998).

 4.2.5 Tariff and Trade Control

 4.3 Substantive Law Aspects

 4.3.0 General

 Richard A. Epstein, Before Cyberspace: Legal
 Transitions in Property Rights Regimes, 73 CHI.-KENT
 L. REV. 1137 (1998).

 John C. Scheffel, Blinded By the Light: Common Law
 and the Dangers of Cyber-Lawyering, 19 PACE L. REV.
 37 (1998).

 Timothy Wu, Application-Centered Internet Analysis,
 85 VA. L. REV. 1163 (1999).

 4.3.1 Computer Crime

 Michael Hatcher et al., Computer Crimes, 36 AM.
 CRIM. L. REV. 397 (1999).

 Ellen S. Podgor, Criminal Fraud, 48 AM. U. L. REV.
 729 (1999).

 David C. Potter, Note, The Jake Baker Case: True
 Threats and New Technology, 79 B.U. L. REV. 779
 (1999).

 Michael A. Sussman, The Critical Challenges from
 International High-Tech and Computer-Related Crime
 at the Millennium, 9 DUKE J. COMP. & INT'L L. 451
 (1999).

 James P. Terry, Cyberspace and the Use of Force, 9
 DUKE J. COMP. & INT'L L. 491 (1999) (book review).

 Patrick Weston, American Civil Liberties Union of
 Georgia v. Miller, 14 BERKELEY TECH. L.J. 403 (1999).

 4.3.2 Computer-Related Product Liability

 Margaret Renee Herman, Note, Are We Learning From
 the Mistakes of Environmentalists? The Application of
 Environmental Harmonized Models to the Automotive
 Industry, 16 ARIZ. J. INDUS. & COMP. L. 543 (1999).

 Peter Jakab, Framing Technology and Link Liability, 19
 PACE L. REV. 23 (1998).

 Sarah S. Jain, Inscription Fantasies and Interface
 Erotics: A Social-Material Analysis of Keyboards,
 Repetitive Strain Injuries and Products Liability Law, 9
 HASTINGS WOMEN'S L.J. 219 (1998).

 4.3.3 Computer Security

 Renee Albersheim, The Legal Implications of Corporate
 Reverse Hacking, PREV. L. REP., Summer 1999, at 8.

 Stephanie Brown, The No Electronic Theft Act: Stop
 Internet Piracy!, 9 J. ART & ENT. L. 147 (1998).

 Lieutenant Colonel LeEllen Coacher, Permitting
 Systems Protection Monitoring: When the Government
 Can Look and What It Can See, 46 A.F. L. REV. 155
 (1999).

 J.H. Reichman & Paul F. Uhlir, Database Protection at
 the Crossroads: Recent Developments and their Impact
 on Science and Technology, 14 BERKELEY TECH. L.J.
 793 (1999).

 Michael N. Schmitt, Computer Network Attack and the
 Use of Force in International Law: Thoughts on a
 Normative Framework, 37 COLUM. J. TRANSNAT'L L.
 885 (1999).

 Mark R. Shulman, Note, Discrimination in the Laws of
 Information Warfare, 37 COLUM. J. TRANSNAT'L L. 939
 (1999).

 4.3.4 Taxation of Software

 Gary D. Sprague et al., The Final Software Revenue
 Characterization Regulations, 28 TAX MANAGEMENT
 INT'L J. 59 (1999).

 4.4 Problems of Privacy and Computers

 4.4.0 General

 Note, Privacy, Technology, and the California
 "Anti-Paparazzi" Statute, 112 HARV. L. REV. 1367 (1999).

 Parry Aftab & Nancy L. Savitt, Protecting Children's
 Privacy and Regulating Cybertot Marketing Practices
 Online, CHILDREN'S LEGAL RTS. J., Summer 1999, at 2.

 Jerry Berman & Deirdre Mulligan, Privacy in the
 Digital Age: Work in Progress, 23 NOVA L. REV. 552
 (1999).

 Jonathan P. Cody, Comment, Protecting Privacy Over
 the Internet: Has the Time Come to Abandon
 Self-Regulation?, 48 CATH. U. L. REV. 1183 (1998).

 Committee of Ministers of the Council of Europe,
 Strasbourg, Protection of Privacy on the
 Internet/Guidelines, 20 HUM. RTS. L.J. 275 (1999).

 Ira Glasser, The Struggle for a New Paradigm:
 Protecting Free Speech and Privacy in the Virtual
 World of Cyberspace, 23 NOVA L. REV. 627 (1999).

 Michael Kirby, Privacy In CyberSpace, 21 UNSWLJ
 323 (1998).

 Leslie A. Kurtz, The Invisible Becomes Manifest:
 Information Privacy in a Digital Age, 38 WASHBURN
 L.J. 151 (1998).

 Steven Miller, Washington's "Spam-Killing" Statute:
 Does It Slaughter Privacy in the Process?, 74 WASH. L.
 REV. 453 (1999).

 Karin Mika, Of Cell Phones and Electronic Mail:
 Disclosure of Confidential Information Under
 Disciplinary Rule 4-101 and Model Rule 1.6, 13 NOTRE
 DAME J.L. ETHICS & PUB. POL'Y 121 (1999).

 Major R. Ken Pippin, Consumer Privacy on the
 Internet: It's "Surfer Beware", 47 A.F. L. REV. 125
 (1999).

 Joel R. Reidenberg, Restoring Americans' Privacy in
 Electronic Commerce, 14 BERKELEY TECH. L.J. 771
 (1999).

 Paul Starr, Health and the Right to Privacy, 25 AM. J.L.
 & MED. 193 (1999).

 Robert S. Steere, Note, Keeping "Private E-Mail"
 Private: A Proposal To Modify The Electronic
 Communications Privacy Act, 33 VAL. U. L. REv. 231
 (1999).

 David M. Studdert, Direct Contacts, Data Sharing and
 Employee Risk Selection: New Stakes for Patient
 Privacy in Tomorrow's Health Insurance Markets, 25
 AM. J.L. & MED. 233 (1999).

 Domingo R. Tan, Note, Personal Privacy in the
 Information Age: Comparison of Internet Data
 Protection Regulations in the United States and
 European Union, 21 LOY. L.A. INT'L & COMP. L.J. 661
 (1999).

 Myrna L. Wigod, Privacy in Public and Private E-Mail
 and On-Line Systems, 19 PACE L. REV. 95 (1998).

 4.4.1 Data Privacy

 Joe Baladi, Building Castles Made of Glass-Security on
 the Internet, 21 U. ARK. LITTLE ROCK L.J. 251 (1999).

 Cynthia M. Bott, Protection of Information Products:
 Balancing Commercial Reality and the Public Domain,
 67 U. CIN. L. REV. 237 (1998).

 Sandra T.M. Chong, Data Privacy: The Use of
 Prisoners for Processing Personal Information, 32 U.C.
 DAVIS L. REV. 201 (1998).

 4.4.2 Governmental Invasion of Privacy
 4.4.3 Credit Reference

5. COMPUTERS AND TECHNOLOGY IN EDUCATION

 5.0 General

 John R.B. Clement, The State of Technology in U.S.
 Schools: Making Counts of Technology/Making
 Technology Count, CHILDREN'S LEGAL RTS. J., Summer
 1999, at 43.

 Michael Ferraraccio, Metal Detectors in the Public
 Schools: Fourth Amendment Concerns, 28 J.L. & EDUC.
 209 (1999).

 Neeta Ragoowansi & Lynne B. Clement, Students on
 the Internet--Rights and Education, CHILDREN'S LEGAL
 RTS. J., Summer 1999, at 14.

 Richard Florida, The Role of the University: Leveraging
 Talent, Not Technology, ISSUES SCI. & TECH., Summer
 1999, at 67.

 5.1 Legal Education

 Eric Blair, A Modest Proposal, 48 J. LEGAL EDUC. 449
 (1998).

 Maria Perez Crist, Technology in the LRW
 Curriculum -- High Tech, Low Tech, or No Tech,
 5 LEGAL WRITING 93 (1999).

6. COMPUTERS AND TECHNOLOGY IN BUSINESS

 6.0 General

 Michael E. Boersma, International Business
 Transactions, the Internet, and the Convention on the
 International Sale of Goods: Preventing Unintentional
 Pitfalls, 7 J. INT'L L. & PRAC. 107 (1998).

 Joseph F. Coughlin, Technology Needs of Aging
 Boomers, ISSUES SCI. & TECH., Fall 1999, at 53.

 Gail E. Evans and Brian F. Fitzgerald, Information
 Transactions Under UCC Article 2B: The Ascendancy
 of Freedom of Contract in the Digital Millennium, 21
 UNSWLJ 404 (1998).

 Brian Kennan, Internet Technology and Employee
 Benefits, J. PENSION PLAN. & COMPL., Summer 1999, at
 16.

 Jerry C. Liu et al., Electronic Commerce: Using
 Clickwrap Agreements, COMPUTER LAW., Dec. 1998, at
 10.

 Jonathan R. Macey & Maureen O'Hara, Regulating
 Exchanges and Alternative Trading Systems: A Law and
 Economics Perspective, 28 J. LEGAL STUD. 17 (1999).

 Fiona MacMillan, Corporate Disclosure Online: An
 Appropriate Response to Globalization, 21 UNSWLJ
 514 (1998).

 Ronald J. Mann, Secured Credit and Software
 Financing, 85 CORNELL L. REV. 134 (1999).

 John Rothchild, Protecting the Digital Consumer: The
 Limits of Cyberspace Utopanism, 74 IND. L.J. 893
 (1999).

 Nancy Toross, Note, Double-Click on This: Keeping
 Pace with On-line Market Manipulation, 32 LOY. L.A.
 L. REV. 1399 (1999).

 6.1 Electronic Commerce

 Andrea Beatty et al., E-Payments and Australian
 Regulation, 21 UNSWLJ 489 (1998).

 C. Robert Beattie, Facilitating Electronic Commerce-The
 Uniform Electronic Transactions Act, 32 UCC L.J.
 243 (2000).

 George Blair, Opportunities Not to Be Missed, J.L.
 SOC'Y OF SCOT., Jan. 1999, at 40.

 Jenny Clift, Electronic Commerce: The UNCITRAL
 Model Law and Electronic Equivalents to Traditional
 Bills of Lading, 27 INT'L BUS. LAW. 311 (1999).

 Melissa De Zwart, Electronic Commerce: Promises,
 Problems and Proposals, 21 UNSWLJ 305 (1998).

 Leif Gamertsfelder, Electronic Bills of Exchange: Will
 the Current Law Recognize Them?, 21 UNSWLJ 566
 (1998).

 George W. Gekas & James W. Harper, Early Returns
 From Government Regulation of Electronic Commerce:
 What's New is What's Old, 51 ADMIN. L. REV. 769
 (1999).

 Sarah Jane Hughes, A Case for Regulating
 Cyberpayments, 51 ADMIN. L. REV. 809 (1999).

 William F. Kroener III & Robert A. Patrick, Y2K: A
 Pothole on the Information Super Highway to
 Electronic Banking, 51 ADMIN. L. REV. 835 (1999).

 Kalama Lui-Kwan & Kurt Opsahl, Foreword: The
 Legal and Policy Framework for Global Electronic
 Commerce, 14 BERKELEY TECH. L.J. 503 (1999).

 Michael K. Lindsey, Electronic Sale and Distribution of
 Goods: Competitive Aspects, 27 INT'L BUS. LAW. 253
 (1999).

 Kerry Lynn Macintosh, The New Money, 14 BERKELEY
 TECH. L.J. 659 (1999).

 Kathryn O'Shea & Kylie Skeahan, Acceptance of Offers
 by E-mail -- How Far Should the Postal Acceptance
 Rule Extend?, 13 QUEENSL. U. TECH. L.J. 247 (1997).

 Maureen A. O'Rourke, Progressing Towards a Uniform
 Commercial Code for Electronic Commerce or Racing
 Towards Nonuniformity?, 14 BERKELEY TECH. L.J. 635
 (1999).

 Brooke Overlay, Will Cyberlaw be Uniform? An
 Introduction to the UNCITRAL Model on Electronic
 Commerce, 7 TUL. J. OF INT'L & COMP. LAW 219
 (1999).

 Shawn Pompian, Note, Is the Statute of Frauds Ready
 for Electronic Contracting?, 85 VA. L. REV. 1447
 (1999).

 Bryan S. Schultz, Electronic Money, Internet
 Commerce, and the Right to Financial Privacy: A Call
 for New Federal Guidelines, 67 U. CIN. L. REV. 779
 (1999).

 Andrew L. Shapiro, Digital Middlemen and the
 Architecture of Electronic Commerce, 24 OHIO N.U. L.
 REV. 795 (1998).

 Howard A. Shelanski, The Speed Gap: Broadband
 Infrastructure and Electronic Commerce, 14 BERKELEY
 TECH. L.J. 721 (1999).

 Carl Pacini & David Sinason, Auditor Liability for
 Electronic Commerce Transaction Assurance: The
 CPA/CA Web Trust, 36 AM. BUS. L.J. 479 (1999).

 Graham Walker, You, EU and E-commerce Too, J.L.
 SOC'Y SCOT., Apr. 1999, at 32.

 6.2 Computers and Technology in Banking and Finance

 6.2.0 General

 Olujoke E. Akindemowo, The Fading Rustle, Chink
 And Jingle: Electronic Value And The Concept of
 Money, 21 UNSWLJ 466 (1998).

 Enrique R. Carrasco & Kristen J. Berg, Praxis-Oriented
 Pedagogy: The E-Book on International Finance and
 Development, 32 LOY. L.A. L. REV. 733 (1999).

 Walter A. Effross, Logos, Links, and Lending: Towards
 Standardized Privacy and Use Policies for Banking
 Web Sites, 24 OHIO N.U. L. REV. 747 (1998).

 William C. Freund & Clive Weil, A New Approach to
 Banking the Unbanked, 116 BANKING L.J. 271 (1999).

 Joshua S. Gans & Richard Scheelings, Economic Issues
 Associated with Access to Electronic Payment Systems,
 27 AUSTL. BUS. L. REV. 373 (1999).

 Jeffrey J. Hass, Small Issue Public Offerings Conducted
 Over the Internet: Are They "Suitable" for the Retail
 Investor?, 72 S. CAL. L. REV. 67 (1998).

 David Kreltszheim, Tracing Electronic Cash: Fraud
 and the Electronic Transfer and Storage of Value, 27
 AUSTL. BUS. L. REV. 112 (1999).

 Jacqueline Marcucci, Note, The Brave New World of
 Banking on the Internet: The Revolution of Our Banking
 Practices, 23 NOVA L. REV. 739 (1999).

 B.D. McCullough & H.D. Vinod, The Numerical
 Reliability of Econometric Software, 37 J. ECON.
 LITERATURE 633 (1999).

 Christopher Rees, Electronic Payment Systems, 27 INT'L
 BUS. LAW. 269 (1999).

 Jennifer Burke Sylva, Comment, Bowie Bonds Sold For
 Far More Than a Song: The Securitization of
 Intellectual Property of J.P. as a Super-Charged
 Vehicle for High Tech Financing, 15 SANTA CLARA
 COMPUTER & HIGH TECH. L.J. 195 (1998).

 6.2.1 Online Securities Trading

 Neil Andrews, Confucius and the Regulation of
 Electronic Securities in the People's Republic of China,
 9 AUSTL. J. CORP. L. 300 (1998).

 Paul D. Cohen, Securities Trading Via the Internet, 4
 STAN. J.L. BUS. & FIN. 1 (1999).

 Daniel Everett Giddings, An Innovative Link Between
 the Internet, the Capital Markets, and the SEC: How the
 Internet Direct Public Offerings Helps Small
 Companies Looking to Raise Capital, 25 PEPP. L. REV.
 785 (1998).

 Mary Lou Peters, Avoiding Securities Litigation
 Liability on the Company Web Site, PREV. L. REP.,
 Winter/Spring 1998-99, at 19.

 Denis T. Rice, The Regulatory Response to the New
 World of Cybersecurities, 51 ADMIN. L. REV. 901
 (1999).

 Andrew R. Thompson, Note, Taming the Frontier?: An
 Evaluation of the SEC's Regulation of Internet
 Securities Trading Systems, 1999 COLUM. BUS. L. REV.
 165 (1999).

 Omri Yadlin, Should the SEC Regulate the Cyber
 Securities Market?, 73 CHI.-KENT L. REV. 1355 (1998).

 6.3 Computers and Technology in the Transportation
 Industry

 6.4 Computers and Technology in Publishing

 Thomas G. Field, Jr., Comment, Publishers Rights and
 Wrongs in the Cyber Age, 39 IDEA 429 (1999).

 6.5 Computers and Technology in Advertising

 Christopher J. Schulte, "Abracadabra International, Ltd.
 v. Abracadabra Creations Inc."--Internet Advertising
 Just Federalized the Nation's Service Mark Law!, 22
 HAMLINE L. REV. 563 (1999).

7. INTELLECTUAL PROPERTY PROTECTION OF COMPUTERS AND
TECHNOLOGY

 7.0 General

 Howard C. Anawalt, Control of Inventions in a
 Networked World, 15 SANTA CLARA COMPUTER &
 HIGH TECH. L.J. 123 (1998).

 Todd A. Borow, Copyright Ownership of Scholarly
 Works Created by University Faculty and Posted on
 School Provided Web Pages, 7 U. MIAMI BUS. L. REV.
 149 (1998).

 Dan L. Burk, Virtual Exit in the Global Information
 Economy, 73 CHI.-KENT L. REV. 943 (1998).

 Tamber Christian, Internet Caching: Something to
 Think About, 67 UMKC L. REV. 477 (1999).

 Michael Coblenz, Intellectual Property Crimes, 9 ALB.
 L.J. SCI. & TECH. 235 (1999).

 Thomas F. Cotter, Is This Conflict Really Necessary?:
 Resolving an Ostensible Conflict Between Patent Law
 and Federal Trademark Law, 3 MARQ. INTELL PROP. L.
 REV. 25 (1999).

 Joshua Allen Daub, Comment, A Premature Solution:
 Legislative Reaction to the Debate Over Internet
 Service Provider Liability for Copyright Infringement,
 103 DICK. L. REV. 1 (1998).

 Randy Gidseg et al., Intellectual Property Crimes, 36
 AM. CRIM. L. REV. 835 (1999).

 Trotter Hardy, Copyright and "New-Use" Technologies,
 23 NOVA L. REV. 659 (1999).

 Stuart K. Kauffman, Motion Pictures, Moral Rights,
 and the Incentive Theory of Copyright: The Independent
 Film Producer as "Author," 17 CARDOZO ARTS & ENT.
 L.J. 749 (1999).

 Rachel V. Leiterman, Comment, Smart Companies,
 Foolish Choices? Product Designs that Harm
 Competitions, 15 SANTA CLARA COMPUTER & HIGH
 TECH. L.J. 159 (1998).

 Raymond T. Nimmer, Images and Contract Law--What
 Law Applies to Transactions in Information, 36 HOUS.
 L. REV. 1 (1999).

 Matthew J. O'Connor, Squeezing into Traditional
 Frames: Intellectual Property Law in the Shadow of the
 Information Society, 12 INTELL. PROP. J. 285 (1998).

 Maureen A. O'Rourke, Striking a Delicate Balance:
 Intellectual Property, Antitrust, Contract, and
 Standardization in the Computer Industry, 12 HARV.
 J.L. & TECH. 1 (1998).

 Greg Weiner, Reverse Engineering as a Method of
 Achieving Compatibility in the Computer Industry, 6 U.
 BALT. INTELL. PROP. L.J. 1 (1997).

 Dana M. Wilson, Note, The Propagated Signal Claim:
 What Is It and What Are the Infringement
 Consequences?, 6 J. INTELL. PROP. L. 425 (1999).

 Leanne Wiseman, Educational Ownership and Use: An
 Opportunity to Rethink Copyright, J.L. & INFO. SCI.,
 1998, at 110.

 7.1 Patent

 7.1.0 General

 Imron T. Aly, Seller Beware: The Scope of the On Sale
 Bar After Pfaff v. Wells, 7 TEX. INTELL. PROP. L.J. 403
 (1999).

 Scott D. Anderson, Comment, A Right Without a
 Remedy: The Unenforceable Medical Procedure Patent,
 3 MARQ. INTELL. PROP. L. REV. 117 (1999).

 Sharon Appel, Copyright, Digitization of Images, and
 Art Museums: Cyberspace and Other New Frontiers, 6
 UCLA ENT. L. REV. 149 (1999).

 Shireen Irani Bacon et al., Recent Developments in
 Patent Law, 7 TEX. INTELL. PROP. L.J. 427 (1999).

 Jean-Claude Boudreau, AT&T Technologies: A
 Contribution to the Purposive Construction Approach
 for Patent Infringement Analysis in Canada, 15 CAN.
 INTELL. PROP. REV. 323 (1999).

 William T. Kryger, Note, The Doctrine of Equivalents
 into the Year 2000: The Line is Becoming Brighter for
 Some but Remains Dim for Others, 3 MARQ. INTELL.
 PROP. L. REV. 203 (1999).

 Robert P. Merges, As Many as Six Impossible Patents
 Before Breakfast: Property Rights for Business
 Concepts and Patent System Reform, 14 BERKELEY
 TECH. L.J. 577 (1999).

 Fidel D. Nwamu, Does Your Claim Conform to
 Means-Plus-Function Format Under Section 112, Paragraph
 Six?, 6 J. INTELL. PROP. L. 189 (1999).

 Max Stul Oppenheimer, In Vento Scribere: The
 Intersection of Cyberspace and Patent Law, 52 FED.
 COMM. L.J. 229 (1999).

 Jonathan Pavlovcak, The Clock Starts Running Before
 Substantial Completion- Pfaff v. Wells Electronic,
 Inc.,--U.S.--, 119 S. Ct. 304 (1998), 17 TEMP. ENVTL.
 L. & TECH. J. 177 (1999).

 John R. Thomas, On Preparatory Texts and Proprietary
 Technologies: The Place of Prosecution Histories in
 Patent Claim Interpretation, 47 UCLA L. REV. 183
 (1999).

 7.1.1 Software Patent

 Wesley L. Austin, Software Patents, 7 TEX. INTELL.
 PROP. L.J. 225 (1999).

 Erwin J. Basinski, Some Comments on Contributory and
 Induced Patent Infringement; Implications for Software
 Developers, 81 J. PAT. & TRADEMARK OFF. SOC'Y 777
 (1999).

 Alan P. Klein, Software Patenting: A New Approach, 6
 U. BALT. INTELL. PROP. L.J. 135 (1998).

 Stephen G. Kunin, Patent Eligibility in View of State
 Street and AT&T v. Excel Communications, 81 J. PAT.
 & TRADEMARK OFF. SOC'Y 671 (1999).

 Claus D. Melarti, Note, State Street Bank & Trust Co. v.
 Signature Financial Group, Inc.: Ought the
 Mathematical Algorithm and Business Method
 Exceptions Return to Business as Usual? 6 J. INTELL.
 PROP. L. 359 (1999).

 Raj Sardesai & Michael J. Ram, Protecting Intellectual
 Property Rights in Software: The Software Patent, 11
 LOY. CONSUMER L. REV. 99 (1999).

 7.1.2 Biotech Patent

 Mark J. Hanson, Biotechnology and Commodification
 Within Health Care, 24 J. MED. & PHIL. 267 (1999).

 Heidi L. Kraus & Robert C. Millonig, Biotech
 Collaborations and Maximizing Patent Protection: Two
 Hypotheticals, 27 AIPLA Q.J. 149 (1999).

 Patricia A. Lacy, Comment, Gene Patenting: Universal
 Heritage vs. Reward for Human Effort, 77 OR. L. REV.
 783 (1998).

 7.2 Software Copyright

 7.2.0 General

 Brian C. Behrens & Reuven R. Levary, Legal
 Aspects -- Software Reverse Engineering and Copyright:
 Past, Present and Future, 31 J. MARSHALL L. REV. 1 (1997).

 Mark A. Haynes, Commentary: Black Holes of
 Innovation in the Software Arts, 14 BERKELEY TECH.
 L.J. 567 (1999).

 Dennis S. Karjala, Copyright Protection of Computer
 Program Structure, 64 BROOK. L. REV. 519 (1998).

 Grace H. Lee, The Copyrightability of Computer
 Software, 6 U. BALT. INTELL. PROP. L.J. 117 (1998).

 7.2.1 User Interface

 Jane M. Rolling, Comment, No Protection, No Progress
 for Graphical User Interfaces, 2 MARQ. INTELL. PROP.
 L. REV. 157 (1998).

 7.2.2 Fair Use
 7.2.3 Video Game

 Kristine Boylan, Life After Quality King: A Proposal for
 Evaluating Gray Market Activities Under the Fair Use
 Doctrine, 27 AIPLA Q.J. 109 (1999).

 7.3 Digital Copyright

 7.3.0 General

 Note, The Criminalization of Copyright Infringement in
 the Digital Era, 112 HARV. L. REV. 1705 (1999).

 Howard C. Anawalt, Using Digital Locks in Invention
 Development, 15 SANTA CLARA COMPUTER & HIGH
 TECH. L.J. 363 (1999).

 Carolyn Andrepont, Digital Millennium Copyright Act:
 Copyright Protections for the Digital Age, 9 J. ART &
 ENT. L. 397 (1999).

 Kenneth W. Dam, Self-Help in the Digital Jungle, 28 J.
 LEGAL STUD. 393 (1999).

 Michael Fraser, Fair is Foul and Foul is Fair: From
 Analogue to Digital Fair Dealing, 9 J.L. & INFO. SCI.
 93 (1998).

 Franklin Pierce Law Center's Seventh Biennial
 Intellectual Property System Major Problems
 Conference: Digital Technology and Copyright, A
 Threat or A Promise? 39 IDEA 291 (1999).

 Jane C. Ginsburg, Copyright Legislation for the "Digital
 Millennium", 23 COLUM.-VLA J.L. & ARTS 137 (1999).

 Catherine Hawkins, Technological Measures: Saviour
 or Saboteur of the Public Domain? 9 J.L. & INFO. SCI.
 45 (1998).

 Derek M. Kroeger, Applicability of the Digital
 Performance Right in Sound Recordings Act of 1995, 6
 UCLA ENT. L. REV. 73 (1998).

 David Nimaner, Puzzles of the Digital Millennium
 Copyright Act, 46 J. COPYRIGHT SOC'Y U.S.A. 401
 (1999).

 Michelle A. Ravn, Note, Navigating Terra Incognita:
 Why the Digital Millennium Copyright Act Was Needed
 to Chart the Course of Online Service Provider Liability
 for Copyright Infringement, 60 OHIO ST. L.J. 755
 (1999).

 Warwick A. Rothnie, Idea and Expression in a Digital
 World, 9 J.L. & INFO. SCI. 59 (1998).

 Pamela Samuelson, Intellectual Property and the
 Digital Economy: Why the Anti-Circumvention
 Regulations Need to be Revised, 14 BERKELEY TECH.
 L.J. 519 (1999).

 C. Paul Spurgeon, Digital Networks and Copyright:
 Licensing and Accounting for Use -- The Role of
 Copyright Collectives: Evolution or Revolution? 12
 INTELL. PROP. J. 225 (1998).

 Peter Treyde, Simplification of the Exceptions to the
 Exclusive Rights Comprising Copyright, 9 J.L. & INFO.
 SCI. 77 (1998).

 7.3.1 Electronic Compilation

 Kenneth W. Dam, Self-Help in the Digital Jungle, 28 J.
 LEGAL STUD. 393 (1999).

 Michael A. Forhan, Note, Tasini v. New York Times:
 The Write Stuff for Copyrights Law?, 27 CAP. U. L.
 REV. 863 (1999).

 7.3.2 Computer Database
 7.3.3 Multimedia
 7.3.4 Computer-Generated Works

 Kathleen Connolly Butler, Keeping the World Safe from
 Naked-Chicks-in-Art Refrigerator Magnets: The Plot to
 Control Art Images in the Public Domain through
 Copyrights in Photographic and Digital Reproductions,
 21 HASTINGS COMM. & ENT. L.J. 55 (1998).

 7.4 Trademark

 Leslie F. Brown, Avery Dennison Corp. v. Sumpton, 14
 BERKELEY TECH. L.J. 247 (1999).

 Michael A. Cromwell et al., Recent Developments in
 Trademark Law, LOY. INTELL. PROP. & HIGH TECH.
 L.Q., Spring/Summer 1998, at 1.

 Christopher M. Dolan, Fits Over Counterfeiting:
 Legislative Accomplishments and Directions, 27 AIPLA
 Q.J. 233 (1999).

 Robin W. Foster, Note, A Seamless Web of Confusion:
 The Sixth Circuit Obfuscates the Law in Applying
 Trademark Principles to Internet Domain Name
 Conflicts in the Opinion of [Data Concepts, Inc. v.
 Digital Consulting, Inc.], 26 N. KY. L. REV. 305 (1999).

 R. Lawton Jordan III, Note, Thomas & Betts Corp. v.
 Panduit Corp. -- Toward a Coherent View of Trade
 Dress Protection for Product Configurations, 6 J.
 INTELL. PROP. L. 323 (1999).

 Tu Phan, Cybersell, Inc v. Cybersell, Inc., 14
 BERKELEY TECH. L.J. 267 (1999).

 7.5 Trade Secret

 Peter Huang, Preventing Post-PepsiCo Disaster: A
 Proposal for Refining the Inevitable Disclosure
 Doctrine, 15 SANTA CLARA COMPUTER & HIGH TECH.
 L.J. 379 (1999).

 Lorin L. Reisner, Transforming Trade Secret Theft
 Violations into Federal Crimes: The Economic
 Espionage Act, 15 TOURO L. REV. 139 (1998).

 Christopher A. Ruhl, Note, Corporate and Economic
 Espionage: A Model Penal Approach for Legal
 Deterrence to Theft of Corporate Trade Secrets and
 Proprietary Business Information, 33 VAL. U. L. REV.
 763 (1999).

 John T. Soma & Charles P. Henderson, Encryption, Key
 Recovery, and Commercial Trade Secret Assets: A
 Proposed Legislative Model, 25 RUTGERS COMPUTER &
 TECH. L.J. 97 (1999).

 7.6 Semiconductor Chip Protection

 W. Greg Papciak, Intergraph Corp. v. Intel Corp., 14
 BERKELEY TECH. L.J. 323 (1999).

 7.7 Licensing

 Lorin Brennan, The Public Policy of Information
 Licensing, 36 HOUS. L. REV. 61 (1999).

 Morris E. Fischer, Why "Shrink Wrap" Licensing
 Agreements Should Be Enforceable Against Software
 Users Knowledgeable of Their Existence, 12 J.
 SUFFOLK ACAD. L. 63 (1998).

 Garry L. Founds, Shrinkwrap and Clickwrap
 Agreements: 2B or Not 2B?, 52 FED. COMM. L.J. 99
 (1999).

 Robert W. Gomulkiewicz, How Copyleft Uses License
 Rights to Succeed in the Open Source Software
 Revolution and the Implications for Article 2B, 36
 HOUS. L. REV. 179 (1999).

 Mark D. Janis, A Tale of the Apocryphal Axe: Repair,
 Reconstruction, and the Implied License in Intellectual
 Property Law, 58 MD. L. REV. 423 (1999).

 Jerry David Monroe, Comment, ProCD, Inc. v.
 Zeindenberg: An Emerging Trend in Shrinkwrap
 Licensing? 1 MARQ. INTELL. PROP. L. REV. 143 (1997).

 Jane M. Rolling, The UCC Under Wraps: Exposing the
 Need for More Notice to Consumers of Computer
 Software with Shrinkwrapped Licenses, 104 COMM. L.J.
 197 (1999).

 Holly K. Towle, The Politics of Licensing Law, 36
 HOUS. L. REV. 121 (1999).

 7.8 Intellectual Property Issues of the Interact

 David Allweiss, Copyright Infringement on the Internet:
 Can the Wild, Wild West be Tamed?, 15 TOURO L. REV.
 1005 (1999).

 Paul D. Amrozowicz, When Law, Science and
 Technology Worlds Collide: Copyright Issues on the
 Internet, 81 J. OF PATENT & TRADEMARK OFFICE SOC.
 81 (1999).

 Jason R. Berne, All Dressed Up and No Place to Go:
 The Need for Trade Dress Protection of Internet Sites,
 27 AIPLA Q.J. 265 (1999).

 Jason R. Berne, Court Intervention But Plot in a Classic
 Form: A Survey of Remedies in Internet Trademark
 Cases, 43 ST. LOUIS U. L.J. 1157 (1999).

 Niva Elkin-Koren, Copyrights in Cyberspace--Rights
 Without Laws?, 73 CHI.-KENT L. REV. 1155 (1998).

 Jane C. Ginsburg, The Cyberian Captivity of Copyright:
 Territoriality and Authors' Rights in a Networked
 World, 15 SANTA CLARA COMPUTER & HIGH TECH.
 L.J. 347 (1999).

 Jennifer Golinveaux, What's in a Domain Name: Is
 Cybersquatting Trademark Dilution?, 33 U.S.F. L. REV.
 641 (1999).

 Ari B. Good, Trade Secrets and the New Realities of the
 Internet Age, 2 MARQ. INTELL. PROP. L. REV. 51
 (1998).

 Steven E. Halpern, New Protections for Internet Service
 Providers: An Analysis of "The Online Copyright
 Infringement Liability Limitation Act," 23 SETON HALL
 LEGIS. J. 359 (1999).

 Ryan Lambrecht, Trade Secrets and the Internet: What
 Remedies Exist for Disclosure in the Information Age,
 18 REV. OF LIT. 317 (1999).

 Jeffrey J. Look, The Virtual Wild, Wild West (WWW):
 Intellectual Property Issues in Cyberspace-Trademarks,
 Service Marks, Copyrights and Domain Names, 22 U.
 ARK. LITTLE ROCK L.J. 49 (1999).

 Jennifer E. Markiewicz, Comment, Seeking Shelter from
 the MP3 Storm: How Far Does the Digital Millennium
 Copyright Act Online Service Provider Liability
 Limitation Reach?, 7 COMM. L. CONSPECTUS 423
 (1999).

 Don W. Martens & Stacy R. Halpern, Copyright Law in
 Cyberspace, 27 INT'L BUS. LAW. 151 (1999).

 Barbara Anna McCoy, An Invisible Mark: A Meta-Tag
 Controversy, 2 J. SMALL & EMERGING BUS. L. 377
 (1998).

 Rosaleen P. Morris, Note, Be Careful to Whom You
 Link: How the Internet Practices of Hyperlinking and
 Framing Pose New Challenges to Established
 Trademark and Copyright Law, 30 RUTGERS L.J. 247
 (1998).

 Ira S. Nathenson, Internet Infoglut and Invisible Ink:
 Spamdexing Search Engines with Meta Tags, 12 HARV.
 J.L. & TECH. 43 (1998).

 James Powers, Intellectual Property Problems
 Associated with the Internet, 5 U. BALT. INTELL. PROP.
 L.J. 85 (1997).

 Michael A. Stoker, Framed Web Pages: Framing the
 Derivative Works Doctrine on the World Wide Web, 67
 U. CIN. L. REV. 1301 (1999).

 Brian D. Wassum, Note, Copyright Implication of
 Unconventional Linking on the World Wide Web:
 Framing, Deep Linking and Inlining, 49 CASE W. RES.
 L. REV. 181 (1998).

 David Weiskopf, The Risks of Copyright Infringement
 on the Internet: A Practitioner's Guide, 33 U.S.F. L.
 REV. 1 (1999).

 7.9 International Developments

 7.9.0 General

 Serge G. Avakian, Global Unfair Competition in the
 Online Commerce Era, 46 UCLA L. REV. 905 (1999).

 Michael J. Bastian, Protection of "Noncreative"
 Databases: Harmonization of United States, Foreign
 and International Law, 22 B.C. INT'L & COMP. L. REV.
 425 (1999).

 Rosemary J. Coombe, Intellectual Property, Human
 Rights & Sovereignty: New Dilemmas in International
 Law Posed by the Recognition of Indigenous Knowledge
 and the Conservation of Biodiversity, 6 IND. J. GLOBAL
 LEGAL STUD. 59 (1998).

 Alan J. Hartnick, The Defense of "Fair Use": A Primer,
 15 TOURO L. REV. 153 (1998).

 Marshall A. Leaffer, The New World of International
 Trademark Law, 2 MARQ. INTELL. PROP. L. REV. 1
 (1998).

 Stuart S. Malawer, The Digital Global Economy: WTO
 Trade Agreements and Litigation, 11 INT'L L.
 PRACTICUM 78 (1998).

 Aileen A. Pisciotta, Regulation of International
 Communications in the Age of the Internet: Lagging
 Behind the Future, 33 INT'L LAW 367 (1999).

 7.9.1 GATT-TRIPS

 T. Alana Deere, Balancing Free Trade and the
 Environment: A Proposed Interpretation of GATT
 Article XX's Preamble, 10 INT'L LEGAL PERSP. 1 (1998).

 George K. Foster, Opposing Forces in a Revolution in
 International Patent Protection: The United States and
 India in the Uruguay Round and its Aftermath, 3 UCLA
 J. INT'L L. & FOREIGN AFF. 283 (1999).

 Richard G. Frenkel, Note, Intellectual Property in the
 Balance: Proposals for Improving Industrial Design
 Protection in the Post-TRIPS Era, 32 LOY. L.A. L. REV.
 531 (1999).

 Charles R. McManis, International Intellectual
 Property Protection and Emerging Computer
 Technology: Taking TRIPS on the Information Super
 Highway, 14 NIHON U. COMP. L. 195 (1997).

 7.9.2 NAFTA

 7.9.3 Developments in Canada

 Malcolm E. McLeod, Recent Copyright Developments:
 The Canadian Perspective, 15 CAN. INTELL. PROP.
 REV. 39 (1998).

 Jonathan E. Moskin, Canada and the Future of Internet
 Governance, 15 CAN. INTELL. PROP. REV. 247 (1999).
 Raymond H. Saunders, Does Canadian Patent Practice
 Impair Technological Development?, 15 CAN. INTELL.
 PROP. REV. 265 (1999).

 David Vaver, Copyright in Canada: The New
 Millenium, 12 INTELL. PROP. J. 117 (1998).

 7.9.4 Developments in Mexico and Latin America
 7.9.5 Developments in Australia and New Zealand
 7.9.6 Developments in Africa

 Paul Kuruk, Protecting Folklore Under Modern
 Intellectual Property Regimes: A Reappraisal of the
 Tensions Between Individual and Communal Rights in
 Africa and the United States, 48 AM. U. L. REV. 769
 (1999).

 7.9.7 Developments in Asia

 Amy Choe, Note, Korea's Road Toward Respecting
 Intellectual Property Rights, 25 RUTGERS COMPUTER &
 TECH. L.J. 341 (1999).

 John D. DeFrance, Note, Sound Recordings: Copyright
 and Contractual Differences Between the United States
 and Japan, 21 LOY. L.A. INT'L & COMP. L.J. 331
 (1999).

 Michael W. Smith, Note, Bringing Developing
 Countries' Intellectual Property Law to TRIPs
 Standards: Hurdles and Pitfalls Facing Vietnam's
 Efforts to Normalize an Intellectual Property Regime,
 31 CASE W. RES. J. INT'L L. 211 (1999).

 John A. Tessensohn, Reversal of Fortune
 -- Pharmaceutical Experimental Use and Patent
 Infringement in Japan, 4 J. INT'L LEGAL STUD. 1
 (1998).

 Ako Shimada Williams, International Exhaustion of
 Patent Rights Doctrine: Is Japan's Move a Step
 Forward or Back From the Current Harmonization
 Effort?, 7 J. INT'L L. & PRAC. 327 (1998).

 7.9.8 Developments in Western Europe

 Michael Lehmann, The European Database Directive
 and Its Implementation into German Law, 29 INT'L REV.
 INDUS. PROP. & COPYRIGHT L., 776 (1998).

 John A. Tessensohn, May You Live in Interesting Times
 -- European Trademark Law in the Wake of Sabel BV v.
 Puma AGI, 6 J. INTELL. PROP. L. 217 (1999).

 7.9.9 Developments in Eastern Europe and Russia

8. COMPUTERS AND LEGAL REASONING

 8.0 General

 Istvan Borgulya, Two Examples of Decision Support in
 the Law, 7 ART. INTELL. & C. 303 (1999).

 Danielle Bourcier & Gerard Clergue, From a Rule-Based
 Conception to Dynamic Patterns: Analyzing the
 Self-Organization of Legal Systems, 7 ART. INTELL. &
 L. 211 (1999).

 Rosaria Conte et al., Comment, Introduction: Agents
 and Norms: How to Fill the Gap?, 7 ART. INTELL. & L.
 1 (1999).

 Frank Dignum, Note, Autonomous Agents with Norms, 7
 ART. INTELL. & L. 69 (1999).

 Dan Hunter, Note, Out of Their Minds: Legal Theory in
 Neural Networks, 7 ART. INTELL. & L. 128 (1999).

 Christen Krogh & Henning Herrestad, Hohfeld in
 Cyberspace and Other Applications of Normative
 Reasoning in Agent Technology, 7 ART. INTELL. & L.
 81 (1999).

 Philip Leith, Note, The Judge and the Computer: How
 Best `Decision Support'?, 6 ART. INTELL. & L. 289
 (1998).

 8.1 Artificial Intelligence

 Magnus Boman, Norms in Artificial Decision Making, 7
 ART. INTELL. & L. 17 (1999).

 Dieter Merkl et al., Exploratory Analysis of Concept
 and Document Spaces with Connectionist Networks, 7
 ART. INTELL. & L. 185 (1999).

 Lothar Philipps & Giovanni Sartor, Note, Introduction:
 From Legal Theories to Neutral Networks and Fuzzy
 Reasoning, 7 ART. INTELL. & L. 115 (1999).

 Mingqiang Xu et al., A Fuzzy Theoretical Approach to
 Case-Based Representation and Inference in CISG, 7
 ART. INTELL. & L. 259 (1999).

9. LEGAL ISSUES OF THE INTERNET

 9.0 General

 Developments in the Law, The Law of Cyberspace, 112
 HARV. L. REV. 1574 (1999).

 Rolf Auf der Maur, Internet-Enabled Distribution
 Models, 27 INT'L BUS. LAW. 264 (1999).

 Rosa Julia-Barcelo, Liability for On-Line
 Intermediaries: A European Perspective, 20 EUR.
 INTELL. PROP. REV. 453(1998).

 Jonathan D. Bick, Why Should the Internet Be Any
 Different?, 19 PACE L. REV. 41 (1998).

 Jody Storm Cale, Note, Service Over the "Net":
 Principles of Contract Law in Conflict, 49 CASE W.
 RES. J. INT'L L 567 (1999).

 Steven C. Carlson, A Historical, Economic and Legal
 Analysis of Municipal Ownership of the Information
 Highway, 25 RUTGERS COMPUTER & TECH. L.J. 1
 (1999).

 Kirsten J. Crawford, Electronic Mail: The Implications
 of Its Retention and Destruction, PREY. L. REP.,
 Winter/Spring 1998/1999, at 29.

 Lothar Determann, The New German Internet Law, 22
 HASTINGS INT'L & COMP. L. REV. 113 (1998).

 Barbara Esbin, Internet Over Cable: Defining the
 Future in Terms of the Past, 7 COMM. L. CONSPECTUS
 37 (1999).

 William W. Fisher III, Property and Contract on the
 Internet, 73 CHI.-KENT L. REV. 1203 (1998).

 Tamar Frankel, The Internet, Securities Regulation, and
 Theory of Law, 73 CHI.-KENT L. REV. 1319 (1998).

 A. Michael Froomkin, The Empire Strikes Back, 73
 CHI.-KENT L. REV. 1101 (1998).

 Nancy R. Furnari, Are Traditional Agency Principles
 Effective for Internet Transactions, Given the Lack of
 Personal Interaction?, 63 ALB. L. REV. 537 (1999).

 Alain Gardrat, Another Look at European Internet Law,
 MEDIA L. & POL'Y, Fall 1998, at 27.

 Jack Goldsmith, Regulation of the Internet: Three
 Persistent Fallacies, 73 CHI.-KENT L. REV. 1119
 (1998).

 Spencer Kass, Regulation and the Internet, 26 S.U. L.
 REV. 93 (1998).

 Roberta Katz, The Power of Chaos, 73 CHI.-KENT L.
 REV. 1133 (1998).

 Mark A. Lemley, The Law and Economics of Internet
 Norms, 73 CHI.-KENT L. REV. 1257 (1998).

 Henry H. Perritt, Jr., International Administrative Law
 for the Internet: Mechanisms of Accountability, 51
 ADMIN. L. REV. 871 (1999).

 Henry H. Perritt, Jr., The Internet is Changing
 International Law, 73 CHI.-KENT L. REV. 997 (1998).

 David G. Post & David R. Johnson, "Chaos Prevailing
 on Every Continent": Towards a New Theory of
 Decentralized Decision-Making in Complex Systems, 73
 CHI.-KENT L. REV. 1055 (1998).

 Patrick Quirk, The Future of Cyberlaw--Playing `Cheat
 the Prophet', 10 BOND L. REV. 1 (1998).

 Margaret Jane Radin & R. Polk Wagner, The Myth of
 Private Ordering: Rediscovering Legal Realism in
 Cyberspace, 73 CHI.-KENT L. REV. 1295 (1998).

 Jonathan D. Whitater & Paige S. Rutner, Web Trust: A
 Technique to Reduce Risk in Electronic Commerce, 66
 J. TRANSP. L., LOGISTICS & POL'Y 484 (1999).

 Jane Kaufman Winn, The Hedgehog and the Fox:
 Distinguishing Public and Private Sector Approaches to
 Managing Risk for Internet Transactions, 51 ADMIN. L.
 REV. 955 (1999).

 9.1 ISP and Internet Access

 Kasey A. Chappelle, Comment, The End of the
 Beginning: Theories and Practical Aspects of
 Reciprocal Compensation for Internet Traffic, 7 COMM.
 L. CONSPECTUS 393 (1999).

 Kimberly S. Keller, From Little Acorns Great Oaks
 Grow: The Constitutionality of Protecting Minors from
 Harmful Internet Material in Public Libraries, 30 ST.
 MARY'S L.J. 549 (1999).

 Lewis S. Malakoff, Are You My Mommy, or My Big
 Brother? Comparing Internet Censorship in Singapore
 and the United States, 8 PAC. RIM. L. & POL'Y J. 423
 (1999).

 Peter W. Martin, The Internet: Full and Unfettered
 Access to Law-Some Implications, 26 N. KY. L. REV.
 181 (1999).

 Jennifer A. Rupert, Tangled in the Web: Federal and
 State Efforts to Protect Children from Internet
 Pornography, 11 LOY. CONSUMER L. REP. 130 (1999).

 Brent L. Van Norman, The Library Internet Filter: On
 the Computer or in the Child, 11 REGENT U. L. REV.
 425 (1998-99).

 Bruce Watson, Why Libraries Should Filter internet
 Access, CHILDREN'S LEGAL RTS. J., Summer 1999, at
 61.

 9.2 Domain Names

 Alan I. Cyrlin, Reducing a Company's Risk Over
 Domain Name Disputes, 81 J. PAT. & TRADEMARK
 OFF. SOC'Y 42 (1999).

 Brian Fitzgerald, Marketing Your Web Site: Legal
 Issues Relating to the Allocation of Internet Domain
 Names, 21 UNSWLJ 549 (1998).

 Marshall Leafer, Domain Names, Globalization, and
 Internet Governance, 6 IND. J. GLOBAL LEGAL STUD.
 139 (1998).

 Joseph P. Liu, Legitimacy and Authority in Internet
 Coordination: A Domain Name Case Study, 74 IND. L.J.
 587 (1999).

 Todd W. Krieger, Internet Domain Names and
 Trademarks: Strategies for Protecting Brand Names in
 Cyberspace, 32 SUFFOLK U. L. REV. 47 (1998).

 Marcus Maher, Cable Internet Unbundling: Local
 Leadership in the Deployment of High Speed Access, 52
 FED. COMM. L.J. 211 (1999).

 Angela Proffitt, Drop the Government, Keep the Law:
 New International Body for Domain Name Assignment
 Can Learn from United States Trademark Experience,
 19 LOY. L.A. ENT. L.J. 601 (1999).

 Graham Walker, What's In A Name?, J.L. SOC'Y SCOT.,
 May 1999, at 29.

 9.3 Taxation of Electronic Commerce

 Reuven S. Avi-Yonah, International Taxation of
 Electronic Commerce, 52 TAX L. REV. 507 (1997).

 Michael P. Boyle et al., The Emerging International Tax
 Environment for Electronic Commerce, 28 TAX MGMT.
 INT'L J. 357 (1999).

 David F. Bradford, Electronic Commerce and
 Fundamental Tax Reform, 52 TAX L. REV. 561 (1997).

 Julie M. Buechler, Note, Virtual Reality: Quill's
 "Physical Presence" Requirement Obsolete When
 Cogitating Use Tax Collection in Cyberspace, 74 N.D.
 L. REV. 479 (1998).

 Christian Cheruy, Tax Aspects of Electronic Commerce
 Transactions, 27 INT'L BUS. LAW. 261 (1999).

 Arthur J. Cockfield, Balancing National Interests in the
 Taxation of Electronic Commerce Business Profits, 74
 TUL. L. REV. 133 (1999).

 J. Clifton Fleming Jr., U.S. Income Taxation of Profits
 from Software Sales By Australian Vendors into the U.S.
 via the Internet, INT'L TRADE & BUS. L. ANN., April
 1999, at 97.

 David L. Forst, Old and New Issues in the Taxation of
 Electronic Commerce, 14 BERKELEY TECH. L.J. 711
 (1999).

 Walter Hellerstein, Internet Tax Freedom Act Limits
 States' Power to Tax Internet Access and Electronic
 Commerce, 90 J. TAX'N 5 (1999).

 Walter Hellerstein, State Taxation of Electronic
 Commerce, 52 TAX L. REV. 425 (1997).

 James John Jurinski, Federalism and State Taxation of
 E-Commerce: Is the End in Sight for State Sales Taxes?,
 J. ST. TAX'N, Fall 1999, at 30.

 Stanley I. Katz, International Taxation of Electronic
 Commerce: Evolution Not Revolution, 52 TAX L. REV.
 655 (1997).

 Michael J. McIntyre, Taxing Electronic Commerce
 Fairly and Efficiently, 52 TAX L. REV. 625 (1997).

 Matthew G. McLaughlin, Comment, The Internet Tax
 Freedom Act: Congress Takes a Bite Out of the Net, 48
 CATH. U. L. REV. 209 (1998).

 Charles E. McLure, Jr., Taxation of Electronic
 Commerce: Economic Objectives, Technological
 Constraints, and Tax Laws, 52 TAX L. REV. 269 (1997).

 Paul Mines, Conversing With Professor Hellerstein:
 Electronic Commerce and Nexus Propel Sales and Use
 Tax Reform, 52 TAX L. REV. 581 (1997).

 David J. Shakow, Taxing Nothings: Intangibles on the
 Internet, 52 TAX L. REV. 571 (1997).

 Anna M. Vanderhoff, Comment, The Tax Man Cometh:
 A Realistic View of the Taxation of Internet Commerce,
 27 CAP. U. L. REV. 929 (1999).

 Auri Weitz, WWW.Foreign Corporation.Com: The US
 Taxation of International Business Transactions
 Conducted Over the Internet, 9 FORDHAM INTELL.
 PROP. MEDIA & ENT. L.J. 625 (1999).

 9.4 Encryption and Digital Signatures

 Stewart A. Baker, International Developments Affecting
 Digital Signatures, 32 INT'L LAW 963 (1998).

 Amelia H. Boss, Searching for Security in the Law of
 Electronic Commerce, 23 NOVA L. REV. 583 (1999).

 Jose Carlos Erdozain, Encryption Technologies and
 Digital Signatures, 27 INT'L BUS. LAW. 275 (1999).

 E. Franklin Haignere, Comment, An Overview of the
 Issues Surrounding The Encryption Exportation Debate,
 the Ramifications, and Potential Resolution, 22 MD. J.
 INT'L L. & TRADE 319 (1998/1999).

 Edward D. Kania, The ABA's Digital Signature
 Guidelines: An Imperfect Solution to Digital Signatures
 on the Internet, 7 COMM. L. CONSPECTUS 297 (1999).

 Michael Lee et al., Electronic Commerce, Hackers, and
 the Search for Legitimacy: A Regulatory Proposal, 14
 BERKELEY TECH. L.J. 837 (1999).

 Kalama M. Lui-Kwan, Recent Developments in Digital
 Signature Legislation and Electronic Commerce, 14
 BERKELEY TECH. L.J. 463 (1999).

 Lynn F. McNulty, Encryption's Importance to
 Economic and Infrastructure Security, 9 DUKE J. COMP.
 & INT'L L. 427 (1999).

 Daniel R. Rua, Comment, Cryptobabble: How
 Encryption Disputes Are Shaping Free Speech for the
 New Millennium, 24 N.C. J. INT'L L. & COM. REG. 125
 (1998).

 Brian W. Smith & Paul S. Tufaro, To Certify or Not to
 Certify? The OCC Opens the Door to Digital Signature
 Certification, 24 OHIO N.U. L. REV. 813 (1998).

 Brian W. Smith & Kimberly B. Kiefer, Recent
 Developments in Electronic Authentication: The
 Evolving Role of the Certification Authority, 116
 BANKING L.J. 341 (1999).

 Mark Sneddon, Legislating to Facilitate Electronic
 Signatures and Records: Exceptions, Standards and the
 Impact on the Statute Book, 21 UNSWLJ 334 (1998).

 9.5 Internet Crime

 Katia Bodard et al., Crime on the Internet. A Challenge
 to Criminal Law in Europe, 5 MAASTRICHT J. EUR. &
 COMP. L. 222 (1998).

 Annemarie Pantazis, Note, Zeran v. America Online,
 Inc.: Insulating Internet Service Providers From
 Defamation Liability, 34 WAKE FOREST L. REV. 531
 (1999).

 Andrew J. Slitt, Note, The Anonymous Publisher:
 Defamation on the Internet After Reno v. American
 Civil Liberties Union and Zeran v. America Online, 31
 CONN. L. REV. 389 (1999).

 9.6 Civil Procedure in Cyberspace

 Steven Betensky, Jurisdiction and the Internet, 19 PACE
 L. REV. 1 (1998).

 Christopher S.W. Blake, Note, Destination Unknown:
 Does the Internet's Lack of Physical Situs Preclude
 State and Federal Attempts to Regulate It?, 46 CLEV.
 ST. L. REV. 129 (1998).

 Kai Burmeister, Jurisdiction, Choice of Law, Copyright,
 and the Internet: Protection Against Framing in an
 International Setting, 9 FORDHAM INTELL. PROP.
 MEDIA & ENT. L.J. 625 (1999).

 Christopher E. Friel, Downloading a Defendant: Is
 Categorizing Internet Contacts a Departure from the
 Minimum Contacts Test?, 4 ROGER WILLIAMS L. REV.
 293 (1998).

 Jenine Elco Graves, Comment, Physical Presence in
 Cyberspace: As Electronic Commerce Takes Off, Does
 Quill Leave Local Merchants in the Dust?, 37 DUQ. L.
 REV. 261 (1999).

 Paul Hamilton, The Extraterritorial Reach of the United
 States Securities Laws Towards Initial Public Offerings
 Conducted Over the Internet, 13 ST. JOHN'S J. LEGAL
 COMMENTARY 343 (1998).

 Robert M. Harkins, Jr., The Legal World Wide Web:
 Electronic Personal Jurisdiction in Commercial
 Litigation, or How to Expose Yourself to Liability
 Anywhere in the World with the Press of a Button, 25
 PEPP. L. REV. 785 (1997).

 David Hodson & David Allison, Service by Email in
 Family Proceedings, 29 FAM. L.Q. 726 (1999).

 Leonard Klingbaum, Benusan Restaurant v. King: An
 Erroneous Application of Personal Jurisdiction Law to
 Internet-Based Contracts (Using the Reasonableness
 Test to Ensure Fair Assertions of Personal Jurisdiction
 Based on Cyberspace Contacts), 19 PACE L. REV. 149
 (1998).

 John A. Lowther IV, Note, Personal Jurisdiction and
 the Internet Quagmire: Amputating Judicially Created
 Long-Arms, 35 SAN DIEGO L. REV. 619 (1998).

 Matthew Oetker, Note, Personal Jurisdiction and the
 Internet, 47 DRAKE L. REV. 3 (1999).

 Shane A. Orians, Exercising Personal Jurisdiction on
 the Internet: The Misapplication of the Asahi Metal
 Decision to "Cyberspace," 24 OHIO N.U. L. REV. 843
 (1998).

 Henry H. Perritt, Jr., Will the Judgement-Proof Own
 Cyberspace?, 32 INT'L LAW. 1121 (1998).

 George M. Perry, Personal Jurisdiction in Cyberspace:
 Where Can You Be Sued, and Whose Laws Apply?,
 MEDIA L. & POL'Y, Fall 1998, at 1.

 Richard Philip Rollo, The Morass of Internet Personal
 Jurisdiction: It Is Time for a Paradigm Shift, 52 FED.
 COMM. L.J. 667 (1999).

 Scott D. Sanford, Note, Nowhere to Run ... Nowhere to
 Hide: Trademark Holders Reign Supreme in Panavision
 Int'l, L.P. v. Toeppen, 29 GOLDEN GATE U. L. REV. 1
 (1999).

 Motty Shulman, Note, Http://www.personaljurisdiction.com,
 23 NOVA L. REV. 781 (1999).

 Michael J. Sikora III, Note, Beam Me Into Your
 Jurisdiction: Establishing Personal Jurisdiction via
 Electronic Contacts in Light of the Sixth Circuit's
 Decision in Compuserve, Inc. v. Patterson, 27 CAP. U.
 L. REV. 163 (1998).

 Allan R. Stein, The Unexceptional Problem of
 Jurisdiction in Cyberspace, 32 INT'L LAW. 1167 (1998).

 Kevin N. Tharp, Federal Court Jurisdiction Over
 Private TCPA Claims: Why the Federal Courts of
 Appeals Got It Right, 52 FED. COMM. L.J. 189 (1999).

 Pierre Trudel, Jurisdiction Over the Internet: A
 Canadian Perspective, 32 INT'L LAW. 1027 (1998).

10. LAW AND TECHNOLOGY

 10.0 General

 Carl W. Chamberlin, To the Millennium: Emerging
 Issues for the Year 2000 and Cyberspace, 13 NOTRE
 DAME J.L. ETHICS & PUB. POL'Y 131 (1999).

 The Honorable Porter Goss, An Introduction to the
 Impact of Information Technology on National Security,
 9 DUKE J. COMP. & INT'L L. 391 (1999).

 Roderick Mather, Technology and the Search for
 Shipwrecks, 30 J. MAR. L. & COM. 175 (1999).

 Robert W. Rycroft & Don E. Kash, Innovation Policy
 for Complex Technologies, ISSUES SCI. & TECH., Fall
 1999, at 73.

 10.1 Technology Transfer

 Hayden R. Brainard, Survey and Study of Technology
 Development and Transfer Needs in New York, 9 ALB.
 L.J. SCI. & TECH. 423, (1999).

 Ulrich W. Lowenstein et al., Technology Transfers:
 International Tax Implications, INT'L TAX J., Spring
 1999, at 1.

 10.2 Audio/Video Recording

 Laud Deyhimy, Why Seeing is No Longer Believing:
 Misappropriations of Image and Speech, 19 LOY. L.A.
 ENT. L.J. 51 (1998).

 K.J. Greene, Copyright, Culture & Black Music: A
 Legacy of Unequal Protection, 21 HASTINGS COMM. &
 ENT. L.J. 339 (1999).

 M.J. Le Brun, Learning Interviewing with Video:
 Creating Multimedia Packages for Skills Teaching, 16
 J. PROF. LEGAL EDUC. 187 (1999).

 Jeanmarie LoVoi, Competing Interests: Anti-Piracy
 Efforts Triumph under TRIPs But New Copying
 Technology Undermines the Success, 25 BROOK. J.
 INT'L L. 445 (1999).

 Hon. Jon O. Newman, New Lyrics for an Old Melody:
 The Idea/Expression Dichotomy in the Computer Age,
 17 CARDOZO ARTS & ENT. L.J. 691 (1999).

 10.3 Space Law

 Stacy J. Ratner, Note, Establishing the Extraterrestrial:
 Criminal Jurisdiction and the International Space
 Station, 22 B.C. INT'L & COMP. L. REV. 249 (1999).

 G.S. Sachdeva, Space Tourism: Some Legal
 Implications, 39 INDIAN J. INT'L L. 47 (1999).

 Jocelyn H. Shoemaker, Note, The Patents in Space Act:
 Jedi Mind Trick or Real Protection for American
 Inventors on the International Space Station?, 6 J.
 INTELL. PROP. L. 395 (1999).

 10.4 Medical Technology

 D.S. Badkur & Arneet Arora, Trivial Injuries,
 Associated Congenital Anomaly and Medicolegal
 Interpretation of Death, 39 MED., SCI. & L. 72 (1999).

 Gloria J. Banks, Traditional Concepts and
 Nontraditional Conceptions: Social Security Survivor's
 Benefits for Posthumously Conceived Children, 32 LOY.
 L.A. L. REV. 251 (1999).

 David B. Cruz, Controlling Desires: Sexual Orientation
 Conversion and the Limits of Knowledge and Law, 72 S.
 CAL. L. REV. 1297 (1999).

 Judith F. Daar, Assisted Reproductive Technologies and
 the Pregnancy Process: Developing an Equality Model
 to Protect Reproductive Liberties, 25 AM. J.L. & MED.
 455 (1999).

 Janet L. Dolgin, An Emerging Consensus: Reproductive
 Technology and the Law, 23 VT. L. REV. 225 (1998).

 Judith D. Fischer, Misappropriations of Human Eggs
 and Embryos and the Tort of Conversion: A Relational
 View, 32 LOY. L.A. L. REV. 381 (1999).

 Barry R. Furrow, Broadcasting Clinical Guidelines on
 the Internet: Will Physicians Tune In?, 25 AM. J.L. &
 MED. 403 (1999).

 Henry D. Gabriel & Eunice B. Davis, Legal Ethics in
 Reproductive Technology, 45 LOY. L. REV. 221 (1999).

 Michelle Lynn Hibbert, Wrongful Birth: Shaping the
 Future Generation Through Negligence Actions, 46
 MED. TRIAL TECH. Q., at 103.

 Angie Godwin McEwen, Note, So You're Having
 Another Woman's Baby: Economics and Exploitation in
 Gestational Surrogacy, 32 VAND. J. TRANSNAT'L L.
 271 (1999).

 Pamela Jensen, Note, Genetic Privacy: The Potential
 for Genetic Discrimination in Insurance, 29 VICTORIA
 U. WELLINGTON L. REV. 347 (1999).

 John Bologna Krentel, The Louisiana "Human Embryo"
 Statute Revisited: Reasonable Recognition and
 Protection for the In Vitro Fertilized Ovum, 45 LOY. L.
 REV. 239 (1999).

 Patricia C. Kuszler, Telemedicine and Integrated Health
 Care Delivery: Compounding Malpractice Liability, 25
 AM. J.L. & MED. 297 (1999).

 Richard M. Kuntz, Off-Label Prescribing of
 Antidepressants and Anxiolytics: An Attorney's Guide to
 Psychoactive Drugs, 26 J. PSYCHIATRY & LAW 519
 (1998).

 Kathryn Venturatos Lorio, The Process of Regulating
 Assisted Reproductive Technologies: What We Can
 Learn from our Neighbors -- What Translates and What
 Does Not, 45 LOY. L. REV. 247 (1999).

 Richard A. McCormick, Reproductive Technologies:
 Where Are We Headed?, 45 LOY. L. REV. 269 (1999).

 John Murray, Note, Owning Genes: Disputes Involving
 DNA Sequence Patents, 75 CHI.-KENT L. REV. 231
 (1999).

 Frederick R. Parker, Jr., The Withholding or Withdrawal
 of Life-Sustaining Medical Treatment Under Louisiana
 Law, 45 LOY. L. REV. 121 (1999).

 Susan P. Pauker, Clinical Commentary: The Challenges
 of Genetic Medicine to the Patient-Physician
 Relationship, 26 J.L. MED. & ETHICS 221 (1998).

 Melissa M. Perry, Note, Fragmented Bodies, Legal
 Privilege and Commodification in Science and
 Medicine, 51 ME. L. REV. 170 (1999).

 Philip G. Peters, Jr., Harming Future Persons:
 Obligations to the Children of Reproductive
 Technology, 8 S. CAL. INTERDISC. L.J. 375 (1999).

 Arti K. Rai, Reflective Choice in Health Care: Using
 Information Technology to Present Allocation Options,
 25 AM. J.L. & MED. 387 (1999).

 John A. Robertson, Oocyte Cytoplasm Transfers and the
 Ethics of Germ-Line Intervention, 26 J.L. MED. &
 ETHICS 211 (1998).

 Arnold J. Rosoff, Informed Consent in the Electronic
 Age, 25 AM. J.L. & MED. 367 (1999).

 Helena Gail Rubinstein, If I am Only for Myself, What
 am I? A Communitarian Look at the Privacy Stalemate,
 25 AM. J.L. & MED. 203 (1999).

 Alec Samuels, Whose Body Is It Anyway?, 39 MED.,
 SCI. & L. 285 (1999).

 Karen S. Scott & John S. Oliver, Vitreous Humor as an
 Alternative Sample to Blood for the Supercritical Fluid
 Extraction of Morphine and 6-Monoacetylmorphine, 39
 MED., SCI. & L. 77 (1999).

 Robert I. Simon, The Suicide Prevention Contract:
 Clinical, Legal, and Risk Management Issues, 27 AM.
 ACAD. PSYCHIATRY & L. 445 (1999).

 Robert I. Simon & Daniel W. Shuman, Conducting
 Forensic Examinations of the Road: Are You Practicing
 Your Profession Without A License?, 27 AM. ACAD.
 PSYCHIATRY & L. 75 (1999).

 Alissa R. Spielberg, Online Without a Net:
 Physician-Patient Communication by Electronic Mail,
 25 AM. J.L. & MED. 267 (1999).

 Alison M. Sulentic, Crossing Borders: The Licensure of
 Interstate Telemedicine Practitioners, J. LEGIS., 1999,
 at 1.

 Nicolas P. Terry, Cyber-Malpractice: Legal Exposure
 for Cybermedicine, 25 AM. J.L. & MED. 327 (1999).

 Joshua S. Vinciguerra, Showing "Special
 Respect"-Permitting the Gestation of Abandoned Preembryos,
 9 ALB. L.J. SCI. & TECH. 399 (1999).

 Ranney Wiesemann, On-Line or On-Call? Legal and
 Ethical Challenges Emerging in Cybermedicine, 43 ST.
 LOUIS U. L.J. 1119 (1999).

 Jessica Lynne Wilson, Note, Technology as a Panacea:
 Why Pregnancy-Related Problems Should be Defined
 Without Regard to Mitigating Measures Under the
 ADA, 52 VAND. L. REV. 831 (1999).

 Colin J. Zick, Compensation for Telemedicine Services:
 Current Issues and the Future Prospects, 2 J. MED. &
 L. 117 (1998).

 10.5 Biotechnology and Pharmaceuticals

 Kirsten S. Beaudoin, Comment, On Tonight's Menu:
 Toasted Cornbread with Firefly Genes? Adapting Food
 Labeling Law to Consumer Protection Needs in the
 Biotech Century, 83 MARQ. L. REV. 237 (1999).

 Dean Bell, Human Cloning and International Human
 Rights Law, 21 SYDNEY L. REV. 202 (1999).

 Craig M. Borowski, Comment, Human Cloning
 Research in Japan: A Study in Science, Culture,
 Morality, and Patent Law, 9 IND. INT'L & COMP. L.
 REV. 505 (1999).

 Melissa K. Cantrell, International Response to Dolly:
 Will Scientific Freedom Get Sheared?, J.L. & HEALTH,
 1998 - 1999, at 69.

 Patricia I. Carter, Federal Regulation of
 Pharmaceuticals in the United States and Canada, 21
 LOY. L.A. INT'L & COMP. L.J. 215 (1999).

 Leslie Cataldo, A Dynasty Weaned From
 Biotechnology: The Emerging Face of China,
 SYRACUSE J. INT'L L. & COM., Fall 1998, at 151.

 Elizabeth B. Cooper, Testing for Genetic Traits: The
 Need for a New Legal Doctrine of Informed Consent, 58
 MD. L. REV. 346 (1999).

 James Gregory Cullem, Panning for Biotechnology
 Gold: Reach-Through Royalty Damage Awards for
 Infringing Uses of Patented Molecular Sieves, 39 IDEA
 553 (1999).

 Donald G. Daus, New U.S. Legislation: Biotechnology
 Process Patents - A Legislative Change and
 Administrative Expansion, 12 INTELL. PROP. J. 333
 (1998).

 Carlos F. Davalos, Software South of the Border on the
 Eve of the Millenium: The Y2K Glitch in the Mexican
 Courtroom, 11 INT'L LAW PRACTICUM 93 (1998).

 H. Tristram Engelhardt, Jr., Critical Care: Why There is
 No Global Bioethic, 23 J. MED. & PHIL. 641 (1998).

 Kathinka Evers, The Identity of Clones, 24 J. MED. &
 PHIL. 67 (1999).

 Meredith A. Jagutis, Comment, Insurer's Access to
 Genetic Information: The Call for Comprehensive
 Federal Legislation, 82 MARQ. L. REV. 429 (1999).

 Melinda B. Kaufmann, Genetic Discrimination in the
 Workplace: An Overview of Existing Protections, 30
 LOY. U. CHI. L.J. 393 (1999).

 M. Cathleen Kaveny, Cloning and Positive Liberty, 13
 NOTRE DAME J.L. ETHICS & PUB. POL'Y 15 (1999).

 Christopher M. Keefer, Comment, Bridging the Gap
 Between Life Insurer and Consumer in the Genetic
 Testing Era: The RF Proposal, 74 IND. L.J. 1375
 (1999).

 Kevin M. King, A Proposal for the Effective
 International Regulation of Biomedical Research
 Involving Human Subjects, 34 STAN. J. INT'L L. 163
 (1998).

 Eric S. Lander, Scientific Commentary: The Scientific
 Foundations and Medical and Social Prospects of the
 Human Genome Project, 26 J.L. MED. & ETHICS 184
 (1998).

 Thomas A. Magnani, The Patentability of Human-Animal
 Chimeras, 14 BERKELEY TECH. L.J 443 (1999).

 Shiela A.M. McLean, Controlling the Future? -- Human
 Rights and Biotechnology, 6 MAASTRICHT J. EUR. &
 COMP. L. 299 (1999).

 Heather S. Meingast, Cosmeceuticals: Hope in a Jar?, 2
 J. MED. & L. 129 (1998).

 Dorothy Nelkin & Lori B. Andrews, Introduction: The
 Body, Economic Power and Social Control, 75 CHI.-KENT
 L. REV. 3 (1999).

 Mary Z. Pelias, Genetic Testing: Who Decides, Who
 Informs?, CHILDREN'S LEGAL RTS. J., Spring 1999, at
 21.

 Mary Z. Pelias & Margaret M. DeAngelis, The New
 Genetic Technologies: New Options, New Hope, and
 New Challenges, 45 LOY. L. REV. 287 (1999).

 Gary Pulsinelli, The Orphan Drug Act: What's Right
 With It?, 15 SANTA CLARA COMPUTER & HIGH TECH.
 L.J. 299 (1999).

 Michael J. Reiss, What Sort of People Do We Want?
 The Ethics of Changing People Through Genetic
 Engineering, 13 NOTRE DAME J.L. ETHICS & PUB.
 POL'Y 63 (1999).

 M.A. Roberts, Cloning and Harming: Children, Future
 Persons, and the "Best Interest" Test, 13 NOTRE DAME
 J.L. ETHICS & PUB. POL'Y 37 (1999).

 Elisabeth Rosen, The Dolly-Dollar Dichotomy: Animal
 Cloning Restrictions and the Competitiveness of the
 European Biotech Industry, 67 NORDIC J. INT'L L. 423
 (1998).

 Giuseppe Sena, Directive on Biotechnological
 Inventions: Patentability of Discoveries, 30 INT'L REV.
 INDUS. PROP. & COPYRIGHT L. 731 (1999).

 George P. Smith, II, Judicial Decisionmaking in the Age
 of Biotechnology, 13 NOTRE DAME J.L. ETHICS & PUB.
 POL'Y 93 (1999).

 Vincent F. Stempel, Procreative Rights in Assisted
 Reproductive Technology: Why the Angst?, 62 ALB. L.
 REV. 1187 (1999).

 Allyn L. Taylor, Globalization and Biotechnology:
 UNESCO and an International Strategy to Advance
 Human Rights and Public Health, 25 AM. J.L. & MED.
 479 (1999).

 Amy White, Bovine Somatotropin (BST) and Dairy
 Cattle, 2 J. MED. & L. 151 (1998).

 Peter G. Wood, To What Extent Can the Law Control
 Human Cloning?, 39 MED., SCI. & L. 5 (1999).

 10.6 Environmental Law

 10.6.0 General

 Robert W. Adler, Toward Comprehensive Watershed-Based
 Restoration and Protection for Great Salt Lake,
 1999 UTAH L. REV. 99 (1999).

 Laurie Dichiara, Wireless Communication Facilities:
 Siting for Sore Eyes, 6 BUFF. ENVTL. L.J. 1 (1998).

 Ved P. Nanda, The Kyoto Protocol on Climate Change
 and the Challenges to Its Implementation: A
 Commentary, 10 COLO. J. INT'L ENVTL. L. & POL'Y 319
 (1999).

 Harry N. Scheiber & Christopher J. Carr, From
 Extended Jurisdiction to Privatization: International
 Law, Biology, and Economics in the Marine Fisheries
 Debates, 1937-1976, 16 BERKELEY J. INT'L L. 10
 (1998).

 10.6.1 Pollution

 Kristin L. Falzone, Comment, Airport Noise Pollution:
 Is There a Solution in Sight?, 26 B.C. ENVTL. AFF. L.
 REV. 769 (1999).

 Taly L. Jolish, Note, Negotiating the Smog Away, 18
 VA. ENVTL. L.J. 305 (1999).

 James Kavanaugh, Comment, To Filter or Not to Filter:
 A Discussion and Analysis of the Massachusetts
 Filtration Conflict in the Context of the Safe Water
 Drinking Act, 26 B.C. ENVTL. AFF. L. REV. 809 (1999).

 10.6.2 Hazardous Substances

 Lori May Peters, Comment, Reloading The Arsenal In
 The Informational War On Pollution-Citizens As
 Soldiers In The Fight And How A Lack Of "Actionable"
 Legs On Which To Stand Nearly Forced A Cease-Fire,
 10 VILL. ENVTL. L.J. 127 (1999).

 Craig A. Stevens, Note, Redland Soccer Club, Inc. v.
 Department of the Army: The Recovery of Medical
 Monitoring Costs Under HSCA's Citizen Suit Provision,
 10 VILL. ENVTL. L.J. 201 (1999).

 10.6.3 Electromagnetic Fields

 David R. Bolton & Kent A. Sick, Power Lines and
 Property Values: The Good, the Bad, and the Ugly, 31
 URB. LAW. 331 (1999).

 10.6.4 Nuclear Technology

 Christopher G. Barnes, Note, Commercial Power
 Reactors for Defense Purposes: Tritium Production and
 the United States' Disregard for Longstanding
 Non-Proliferation Policy and International Integrity,
 23 VT. L. REV. 201 (1998).

 David Hodgkinson, Shelter from the Storm: Succession
 and Demarcation Issues Under the ABM Treaty, 28 U.
 W. AUSTL. L. REV. 162 (1999).

 Lakshman D. Guruswamy & Jason B. Aamodt, Nuclear
 Arms Control: The Environmental Dimension, 10 COLO.
 J. INT'L ENVTL. L. & POL'Y 267 (1999).

 10.6.5 Energy and the Environment

 Shari R. DeSalvo, Note, Ozone Transport and the Clean
 Air Act: The Answers Are Blowin' in the Wind, 46
 CLEV. ST. L. REV. 355 (1998).

 Anita Margrethe Halvorssen, Climate Change
 Treaties--New Developments at the Buenos Aires
 Conference, COLO. J. INT'L ENVTL. L. & POL'Y 1998
 Y.B. 1 (1999).

 David Mallery, Comment, Clean Energy and the Kyoto
 Protocol: Applying Environmental Controls to
 Grandfathered Power Facilities, 10 COLO. J. INT'L
 ENVTL. L. & POL'Y 469 (1999).

 Markus G. Puder, Trash, Ash, and the Phoenix: A Fifth
 Anniversary Review of the Supreme Court's City of
 Chicago Waste-to-Energy Combustion Ash Decision, 26
 B.C. ENVTL. AFF. L. REV. 473 (1999).

 Jorge G. Santistevan, Mexico: Current Developments in
 Power (Electricity), 33 INT'L LAW. 737 (1999).

 Mary Katherine Strahan, Comment, Connecting
 Currents: Toward the Integration of North American
 Electricity Markets, 21 HOUS. J. INT'L L. 291 (1999).

 10.6.6 International Environmental Law Developments

 Charles Davies et al., Moving Pictures: How Satellites,
 the Internet, and International Environmental Law Can
 Help Promote Sustainable Development, 28 STETSON L.
 REV. 1091 (1999).

 10.7 Television

 10.7.0 General

 Randi M. Albert, A New "Program for Action":
 Strengthening the Standards for Noncommercial
 Educational Licensees, 21 HASTINGS COMM. & ENT.
 L.J. 129 (1998).

 Clay Calbert, Toxic Television, Editorial Discretion, &
 the Public Interest: A Rocky Mountain Low, 21
 HASTINGS COMM. & ENT. L.J. 163 (1998).

 Berend Jan Drijber, The Revised Television Without
 Frontiers Directive: Is it Fit for the Next Century?, 36
 COMMON MKT. L. REV. 87 (1999).

 Michael Furlong et al., The Effects of Media Violence
 on Youth, CHILDREN'S LEGAL RTS. J., Summer 1999, at
 33.

 Bennett Haselton, Commentary: The Effects of the V-Chip,
 CHILDREN'S LEGAL RTS. J., Summer 1999, at 65.

 Lesley Hitchens, Broadcasting Law and Fundamental
 Rights, 7 SOC. & LEGAL STUD. 599 (1998) (book
 review).

 Christopher T. Mardsen, Regulating Media Owners in
 Digital Television: Lessons from U.K. Analogue Policy
 Information, 17 CARDOZO ARTS & ENT. L.J. 659
 (1999).

 Monroe E. Price, Public Broadcasting and the Crisis of
 Corporate Governance, 17 CARDOZO ARTS & ENT. L.
 J. 417 (1999).

 Henry H. Rossbacher et al., An Invasion of Privacy: The
 Media's Involvement in Law Enforcement Activities, 19
 LOY. L.A. ENT. L.J. 313 (1999).

 Marie A. Ryan, Note, To V or Not to V - That is the
 Regulatory Question: The Role of the V-Chip in
 Government Regulation of Broadcast and Cable
 Indecency, 4 CARDOZO WOMEN'S L.J. 1 (1997).

 10.7.1 Satellite Television

 Paula Deza, Unfair and Unlawful: The Debate Over
 Receiving Network Television Signals Through
 Direct-To-Home Satellite Dishes, 7 COMM. L. CONSPECTUS
 279 (1999).

 10.7.2 Cable Television

 Ed Foley, Comment, The First Amendment as Shield
 and Sword: Content Control of PEG Access Cable
 Television, 27 CAP. U. L. REV. 961 (1999).

 Garnet M. Goins, Recognizing Congress' Interests in
 Maintaining Competition Between Cable and Broadcast
 in the Television Programming Market -- Turner
 Broadcasting System, Inc. v. Federal Communications
 Commission, 117 S. Ct. 1174 (1997), 32 SUFFOLK U. L.
 REV. 181 (1998).

 Josh C. Grushkin, Note, Signal Bleed: Congress Attacks
 When it Sounds Like Sex, 21 HASTINGS COMM. & ENT.
 L.J. 501 (1999).

 Jae-Young Kim, Empirical Testing on an Unasked
 Question in Turner v. FCC: Do Must-Carry Rules
 Enhance Diversity?, COMM. & L., June 1999, at 55.

 10.8 Telecommunications

 10.8.0 General

 Kenneth C. Baldwin, The Telecommunications Act of
 1996: Developing Caselaw of Towering Propositions,
 31 URB. LAW. 555 (1999).

 Simon Deakin & Stephen Pratten, Reinventing the
 Market? Competition and Regulatory Change in
 Broadcasting, 26 J.L. & SOC'Y 323 (1999).

 Meade Emory et al., Food Services,
 Telecommunications Provided to Tenants Were Real
 Property Rents, 91 J. TAX'N 54 (1999).

 Fatima Fofana, Comment, Creating a Diversity of
 Voices: Local Expression Through a Low Power Radio
 Service, 7 COMM. L. CONSPECTUS 409 (1999).

 John A. Fortunato & Shannon E. Martin, The Courts v.
 the FCC: Diversity and the Broadcast Provisions of the
 1996 Telecommunications Act, COMM. & L., Sept.
 1999, at 19.

 Paul W. Garnett, Forward-Looking Costing
 Methodologies and the Supreme Court's Takings Clause
 Jurisprudence, 7 COMM. L. CONSPECTUS 119 (1999).

 Hank Intven et al., Internet Telephony--The Regulatory
 Issues, 21 HASTINGS COMM. & ENT. L.J. 1 (1998).

 William E. Kennard, The Telecom Act at Three: Seeing
 the Face of the Future, MEDIA L. & POL'Y, Spring
 1999, at 1.

 Louis Klein, National Basketball Association v.
 Motorola Inc.: Future Prospects for Protecting RealTime
 Information, 64 BROOK. L. REV. 585 (1998).

 Markenzy LaPointe, Universal Service and the Digital
 Revolution: Beyond the Telecommunications Act of
 1996, 25 RUTGERS COMPUTER & TECH. L.J. 1 (1999).

 Benjamin Lipshitz, Regulatory Treatment of Network
 Convergence: Opportunities and Challenges in the
 Digital Era, MEDIA L. & POL'Y, Fall 1998, at 14.

 Matthew N. McClure, Comment, Working Through the
 Static: Is There Anything Left to Local Control in the
 Siting of Cellular and PCS Towers After the
 Telecommunications Act of 1996?, 44 VILL. L. REV.
 781 (1999).

 Gesner Oliveira et al., Regulation and Competition
 Policy: Towards an Optimal Institutional Configuration
 in the Brazilian Telecommunications Industry, 25
 BROOK. J. INT'L L. 311 (1999).

 10.8.1 Telephone

 Mark Allan Baginskis, Telemarketing Fraud Upon the
 Elderly Shows No Signs of Slowing, 11 LOY.
 CONSUMER L. REV. 4 (1999).

 Seth A. Cohen, Deregulation, Defragmenting &
 Interconnecting: Reconsidering Commercial
 Telecommunication Regulation in Relation to the Rise
 of Internet Telephony, 18 J.L. & COM. 133 (1998).

 Charles D. Cosson, You Say You Want a Revolution?
 Fact and Fiction Regarding Broadband CMRS and
 Local Competition, 7 COMM. L. CONSPECTUS 233
 (1999).

 Rex S. Heinke & Seth M.M. Stodder, Punishing
 Truthful, Newsworthy Disclosures: The
 Unconstitutional Application of the Federal Wiretap
 Statute, 19 LOY. L.A. ENT. L.J. 279 (1999).

 Michael L. Landsman, From Enemies of the Crown to
 Regional Telephone Companies: Bills of Attainder Fee
 Appraised, 15 TOURO L. REV. 759 (1999).

 Stacy L. Mills, Note, He Wouldn't Listen to Me Before,
 but Now ...: Interpersonal Wiretapping and an
 Analysis of State Wiretapping Statutes, 37 BRANDEIS
 L.J. 415 (1898-99).

 Matthew Mickle Werdegar, Lost? The Government
 Knows Where You Are: Cellular Telephone Call
 Location Technology and the Expectation of Privacy, 10
 STAN. L. & POL'Y REV. 103 (1998).

 T. Jason White, Tearing Down a Fence that is Hog
 Tight, Horse High & Bull Strong: The Supreme Court
 Reshapes Jurisdiction of Local Telephone Markets, 11
 LOY. CONSUMER L. REV. 188 (1999).

 10.8.2 Multimedia in Telecommunications

 10.8.3 International Telecommunications Developments

 Rolf Auf der Maur, Internet Distribution of Music
 Performances, 27 INT'L BUS. LAW. 165 (1999).

 Ravi Chandran, Singapore's Electronic Transactions
 Act 1998, 1999 J. BUS. L., at 80.

 Rachelle B. Chong & Wendy Chow, Financial
 Telecommunications Projects in Asia: A Promising
 Regulatory Perspective, 52 FED. COMM. L.J. 1 (1999).

 Martin C. Glass & David M. Rhodes, Catching the
 Wave: Should Canada Follow the Global Trend Toward
 Spectrum Auctions?, 44 MCGILL L.J. 141 (1999).

 Klaus W. Grelich, "Cyberspace": Sector-Specific
 Regulation and Competition Rules in European
 Telecommunications, 36 COMMON MKT. L. REV. 937
 (1999).

 Lawrence A. Sullivan, The U.S., the EU, the WTO, the
 Americas, and Telecom Competition, 6 SW. J.L. &
 TRADE AM. 63 (1999).

11. OTHERS

 11.0 General

 Robert J. Condlin, "What's Really Going On?" A Study
 of Lawyer and Scientist Inter-Disciplinary Discourse,
 25 RUTGERS COMPUTER & TECH. L.J. 181 (1999).

 Mary Eberle, Comment, March-In Rights Under the
 Bayh-Doyle Act: Public Access to Federally Funded
 Research, 3 MARQ. INTELL. PROP. L. REV. 155 (1999).

 Kara Hagen, An Essay on Women and Intellectual
 Property Law: The Challenges Faced By Female
 Attorneys Pursuing Careers in Intellectual Property, 15
 SANTA CLARA COMPUTER & HIGH TECH. L.J. 139
 (1998).

 Michelle J. Kane, Blumenthal v. Drudge, 14 BERKELEY
 TECH. L.J. 483 (1999).

 Graham Walker, Managing the E-Mail Monster, J.L.
 SOC'Y SCOT., Jun. 1999, at 39.

 Erik Jaap Molenaar, Airports at Sea: International
 Legal Implications, 14 INT'L J. MARINE & COASTAL L.
 371 (1999).

 Lieutenant Colonel Michael A. Rodgers, Preventive
 Law Programs: A Swift Approach, 47 A.F.L. REV. 111
 (1999).

 F. M. Scherer, Global Growth Through Third World
 Technological Progress, ISSUES SCI. & TECH., Fall
 1999, at 31.

 Peter P. Swire, Of Elephants, Mice, and Privacy:
 International Choice of Law and the Internet, 32 INT'L
 L. 991 (1998).

 Maureen A. Tighe & Emily Rosenblum, "What Do You
 Mean, I Filed for Bankruptcy?" -- Or How the Law
 Allows a Perfect Stranger to Purchase an Automatic
 Stay in Your Name, 32 LOY. L.A L. REV. 1009 (1999).

 11.1 Y2K Issues

 Richard L. Antognini, Fortuity, Reinsurers and Year
 2000 Problem: Will These Theories Carry the Day?, 66
 DEFENSE COUNSEL J. 253 (1999).

 Oliver J. Armas, Y2K and Product Liability in the
 United States, 11 INT'L L. PRACTICUM 88 (1998).

 Mark B. Baker, The Sky is Falling (or is it?):
 International Contracts and the Y2K Problem, 32
 VAND. J. TRANSNAT'L L. 347 (1999).

 Holly M. Barbara, The Y2K Problem and Breaks in the
 Supply Chain: Can the Wrath of the Bug Be Squashed?,
 24 DEL. J. CORP. L. 2 (1999).

 Travis C. Barton & Brian S. Engel, State & Federal
 Year 2000 Litigation, 18 REV. OF LIT. 487 (1999).

 Thomas Baxter & Stephanie Heller, Commercial Law
 Issues Arising From the Y2K Problem, 32 UCC L.J. 3
 (1999).

 Jack E. Brown, Portents of the Year 2000 Problem, 15
 SANTA CLARA COMPUTER & HIGH TECH. L.J. 109
 (1998).

 Bill Butcher et al., The Year 2000 Computer Problem:
 Tax Aspects of Compliance Costs, INT'L TAX J., Spring
 1999, at 45.

 Andrew S. Crouch, Comment, When the Millennium
 Bug Bites: Business Liability in the Wake of the Y2K
 Problem, 22 HAMLINE L. REV. 797 (1999).

 Joseph A. D'Amico, Only Months To Go: Are Your
 Clients Ready for Y2K?, 24 INT'L LEGAL PRAC. 51
 (1999).

 Dean Ellison, Year 2000 Information Disclosure Act
 1999 (Cth) Explained, 27 AUSTL. BUS. L. REV. 262
 (1999).

 Otis Felder "Y2K Bug" Dead Ahead: A Primer for
 Admiralty, 11 U.S.F. MAR. L.J. 137 (1998).

 James C. Fontana, The Millennium Bug: Digital
 Apocalypse Now? 17 TEMP. ENVTL. L. & TECH. J. 15
 (1998).

 James C. Gray III & Kathy R. Davis, Insurance
 Coverage of Potential Year 2000 Claims, 23 AM. J.
 TRIAL ADVOC. 49 (1999).

 Mark Grossman & JoAnn Nesta, Causes of Action on
 and off the Contract in Year 2000 Litigation, 18 REV.
 OF LIT. 553 (1999).

 James Blythe Hodge et al., Legal Aspects of the Year
 2000 Problem, 39 SANTA CLARA L. REV. 657 (1999).

 Marvin E. Jacob et al., Warding Off the Millenium Bug:
 A Survey of 1998's Y2K Solutions, 116 BANKING L.J.
 130 (1999).

 Carole K. Jeffery, Directors' Liability for Year 2000
 Failures, PREV. L. REP., Winter/Spring 1998/1999, at
 35.

 Jeff Jinnett, Legal Issues Concerning the Year 2000
 Computer Problem, 27 INT'L BUS. L. 101 (1999).

 Andrew Lothian, E-Commerce: Debugging Legacy
 Legislation, J.L. SOC'Y SCOT., Oct. 1999, at 26.

 Dorian S. Mazurkevich, Copyright Infringement in
 Computer Software Repair: Fixing the "Year 2000
 Problem" Without Liability, 72 TEMP. L. REV. 197
 (1999).

 John P. McMahon, Y2K: Maritime Law and Commerce
 Issues and Resources, 30 J. MAR. L. & COM. 627
 (1999).

 Cathy Moyer, Y2K: Is It Real? What Should I Be
 Doing?, PREV. L. REP., Summer 1999, at 6.

 Michael P. Murphy and Aidan M. McCormack,
 Challenging Insurance Coverage for Year 2000
 Computer Failure Claims, 34 TORT & INSUR. L.J. 883
 (1999).

 Mark A. Murtha, The Law of Y2K: An Introduction, 17
 TEMP. ENVTL. L. & TECH. J. 1 (1998).

 Howard L. Nations et al., Legal Implications of the
 Millenium Bug: The Multiple Roles of Lawyers in
 Coping With the Fallout From the Trillion-Dollar
 Computer Glitch, 18 REV. OF LIT. 417 (1999).

 Daniel W. Patterson, Advising Clients Regarding Fear
 2000 Compliance, PREV. L. REP., Winter/Spring 1998-1999,
 at 4.

 Michael K. Powell, Why F2K?: Challenges for the
 Communications Industry, 7 COMM. L. CONSPECTUS 3
 (1999).

 Michael Sean Quinn, Fortuity, Insurance, and Y2K, 18
 REV. OF LIT. 487 (1999).

 Frank C. Razzano, The Litigator's Dream Come True:
 The Year 2000, 27 SEC. REG. L.J. 247 (1999).

 John M. Redmond, A Simple Plan: How Corporate
 America Prepares for Y2K Litigation, PREV. L. REP.,
 Winter/Spring 1998-99, at 33.

 Andrew M. Reidy & Robert L. Carter, Jr., Is Insurance
 the Cure for the Millenium Bug?, PREV. L. REP.,
 Winter/Spring 1998-99, at 15.

 Clark Richards, Information Technology and Y2K
 Litigation, 18 REV. OF LIT. 621 (1999).

 Robert Rosen, Fear 2000 Risk Management: So Much
 To Do, So Little Time, 17 TEMP. ENVTL. L. & TECH. J.
 25 (1998).

 Stephen M. Rutner, Key Dates of the Y2K Problem, 66
 J. TRANSP. L., LOGISTICS & POL'Y 234 (1999).

 Stephen M. Rutner & G. Benjamin Thompson IV, Steps
 Transportation Companies Should Consider to Reduce
 Year 2000 Liability, 66 J. TRANSP. L., LOGISTICS &
 POL'Y 115 (1998).

 Martha A. Sabol & Beth Diebold, Readiness and
 Responsibility in the Year 2000: A Look at Y2K
 Legislation, 11 LOY. CONSUMER L. REV. 217 (1999).

 Hon. D. Brooks Smith, The Managerial Judge and Y2K
 Litigation, 18 REV. OF LIT. 403 (1999).

 Stephen Wallenstein, Year 2000 Compliance - Directors'
 and Officers' Year 2000 Liability, PREV. L.
 REP., Winter/Spring 1998-99, at 41.

 Kelly Ann Breuer Weist, Year 2000 Vendor Compliance
 Programs and Legal Audits, PREV. L. REP.,
 Winter/Spring 1998-99, at 11.

 Taylor C. Young, Comment, Turning Back the Clock on
 the Millenium Bug: Trigger of Coverage for "Year
 2000" Claims Under CGL Occurrence Policies, ARIZ.
 ST. L.J., Spring 1999, at 259.
COPYRIGHT 2000 Rutgers University School of Law - Newark
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 2000 Gale, Cengage Learning. All rights reserved.

Article Details
Printer friendly Cite/link Email Feedback
Publication:Rutgers Computer & Technology Law Journal
Article Type:Bibliography
Geographic Code:1USA
Date:Mar 22, 2000
Words:15996
Previous Article:Mainstream Loudoun and the future of internet filtering for America's public libraries.
Next Article:Transmitting legal documents over the Internet: how to protect your client and yourself.
Topics:


Related Articles
Thirty-first selected bibliography on computers, technology and the law.
Historical Dictionary of the Elizabethan World: Britain, Ireland, Europe, America.
A Black Canadian Bibliography. (Drama).
Patrick White: a Bibliography.
Science literacy: a collaborative approach.
Law of the Sea: A Select Bibliography, 2004.
Bibliographia Kristelleriana: A Bibliography of the Publications of Paul Oskar Kristeller 1929-1999.
Computer Forensics.
NIH highlights Significant Advances in Dietary Supplement Research.
Beyond the big firm; profiles of lawyers who want something more.

Terms of use | Privacy policy | Copyright © 2022 Farlex, Inc. | Feedback | For webmasters |