جستجو
   
    Delicious RSS ارسال به دوستان خروجی متنی
    کد خبر : 186907
    تاریخ انتشار : 27 تیر 1395 8:54
    تعداد بازدید : 798

    Information and Communications Technology Law

    Information and Communications Technology Law

    2002, Vol.11               

    2003, Vol12                

    2004, Vol.13               

    2005, Vol.14               

    2006, Vol.15               

    2007, Vol.16

    2008, Vol.17

    2009, Vol.18
    2010, Vol.19
    2011, Vol.20
    2012, Vol.21
    2013, Vol.22
    2014, Vol.23
    2015, Vol.24
    2016, Vol.25


     

    Information and Communications Technology Law, 2000, Vol.9

    Author

    Title

    number

    Page to Page

    Peter Stone

    Internet Consumer Contracts and European Private International Law

     No.1

     pp. 5-15

    Marie-Francine Moens, Caroline Uyttendaele, Jos Dumortier

    Intelligent Information Extraction from Legal Texts

     No.1

     pp. 17-26

    John M. Conley, Mary Maureen Brown, Robert M. Bryan

    Database Protection in a Digital World: Why the United States Should Decline to Follow the European Model

     No.1

     pp. 27-60

    Alan S. Reid, Nic Ryder

    The Case of Richard Tomlinson: The Spy Who E- mailed Me

     No.1

     pp. 61-78

    Safinaz Mohd. Hussein

    The Malaysian Communications and Multimedia Act 1998- Its Implications on the Information Technology (IT) Industry

     No.1

     pp. 79-88

    Alan McKenna

    Emerging Issues Surrounding the Convergence of the Telecommunications, Broadcasting and Information Technology Sectors

     No.2

     pp. 93-127

    T.J.M. Bench-Capon, P.H. Leng

    Computer- mediated Collaborative Learning of Legal Argumentation

     No.2

     pp. 129-138

    Laurens Mommers, H. Jaap Van Den Herik

    Knowledge Criteria for the Evaluation of Legal Beliefs

     No.2

     pp. 139-148

    Stijn Debaene, Raf Van Kuyck, Bea Van Buggenhouta

    Legislative Technique as Basis of a Legislative Drafting System

     No.2

     pp. 149-159

    Dave Newman, Sathya Rao

    Recent Developments Regulatory Aspects of Privacy and Security- A View from the Advanced Communications Technologies and Services Programme

     No.2

     pp. 161-166

    Terry Palfrey

    Surveillance as a Response to Crime in Cyberspace

     No.3

     pp. 173-193

    C.C. Nicoll

    Consent- The Luddite's Lifeline

     No.3

     pp. 195-206

    A.A.O. Elhag, J.A.P.J. Breuker, P.W. Brouwerc

    On the Formal Analysis of Normative Conflicts

     No.3

     pp. 207-217

    Jaap Hage

    Consistency of Rules and Norms

     No.3

     pp. 219-240

    Information and Communications Technology Law, 2001, Vol.10

    Author

    Title

    number

    Page to Page

    T. J. M. Bench-Capon

    Truth and Consequence: Complementing Logic with Values in Legal Reasoning

     No.1

     pp. 9-20

    Ari Geiger, Ephraim Nissan, Ariel Stollman

    The Jama Legal Narrative Part I: The JAMA Model and Narrative Interpretation Patterns

     No.1

     pp. 21-37

    Ephraim Nissan

    The Jama Legal Narrative Part II: A Foray into Concepts of Improbability

     No.1

     pp. 39-52

    Aldo Franco Dragoni, Paolo Giorgini, Ephraim Nissan

    Belief Revision as Applied within a Descriptive Model of Jury Deliberations

     No.1

     pp. 53-65

    Samuel Meira Brasil

    Rules and Principles in Legal Reasoning. A Study of Vagueness and Collisions in Artificial Intelligence and Law

     No.1

     pp. 67-77

    Peter McBurney, Simon Parsons

    Intelligent Systems to Support Deliberative Democracy in Environmental Regulation

     No.1

     pp. 79-89

    Guglielmo Gulotta, Angelo Zappala

    The Conflict between Prosecution and Defense in a Child Sexual Abuse Case and in an Attempted Homicide Case

     No.1

     pp. 91-108

    Andrew Stranieri, John Zeleznikow

    Copyright Regulation with Argumentation Agents

     No.1

     pp. 109-123

    Yaakov Hacohen-Kerner, Uri J. Schild

    Case- based Sentencing Using a Tree of Legal Concepts

     No.1

     pp. 125-135

    Donald Macodrum, Hedieh Nasheri, Timothy J. O'Hearn

    Spies in Suits: New Crimes of the Information Age from the United States and Canadian Perspectives

     No.2

     pp. 139-166

    Shannon Martin, Bill F. Chamberlin, Irina Dmitrieva

    State Laws Requiring World Wide Web Dissemination of Information: A Review of State Government Mandates for Documents Online

     No.2

     pp. 167-178

    Alan S. Reid, Nicholas Ryder

    For Whose Eyes Only? A Critique of the United Kingdom's Regulation of Investigatory Powers Act 2000

     No.2

     pp. 179-201

    Assafa Endeshaw

    The Legal Significance of Trustmarks

     No.2

     pp. 203-230

    Ephraim Nissan

    Can You Measure Circumstantial Evidence? The Background of Probative Formalisms for Law

     No.2

     pp. 231-245

    Blandine Laperche

    The Hidden Face of Electronic Commerce Between Enterprises

     No.3

     pp. 273-283

    Gerald Tripp

    Interception of Communications

     No.3

     pp. 285-292

    R. Cooley, A. Jackson, R. James

    E- commerce, Location and IT Aspects of Kent Cancer Centre Network

     No.3

     pp. 293-298

    M. Bouneffa, H. Basson, L. Deruelle

    E- business: A New Challenge for Database Management Systems

     No.3

     pp. 299-308

    Nordine Melab

    Data Mining: A Key Contribution to E- business

     No.3

     pp. 309-318

    Maria Anestopoulou

    Challenging Intellectual Property Law in the Internet: An Overview of the Legal Implications of the MP3 Technology

     No.3

     pp. 319-337

    Alan McKenna

    Playing Fair with Consumer Privacy in the Global On- line Environment

     No.3

     pp. 339-354

    Information and Communications Technology Law, 2002, Vol.11

    Author

    Title

    number

    Page to Page

    Cyrus Tata

    Judicial Decision Support Systems as Tools to Transform Justice?

     No.1

     pp. 5-13

    John Zeleznikow

    Using Web- based Legal Decision Support Systems to Improve Access to Justice

     No.1

     pp. 15-33

    Sasha Ivkovic, John Yearwood, Andrew Stranieri

    Discovering Interesting Association Rules from Legal Databases

     No.1

     pp. 35-47

    David E. Woodin

    Sentencing with GungaWeb: Speculations on the Value of Rule- based Systems in a World of Badly Drafted Statutes

     No.1

     pp. 49-61

    Michael Bromby

    To be Taken at Face Value? Computerised Identification

     No.1

     pp. 63-73

    John Yearwood, Andrew Stranieri

    An Argumentation Shell for Supporting the Development and Drafting of Legal Arguments

     No.1

     pp. 75-86

    Tunde Meikle

    Towards a New MODDE of Improving Legal Decision Support Design

     No.1

     pp. 87-98

    C. C. NICOLL

    Light- handed Regulation of Telecommunications- The Unfortunate Experiment

     No.2

     pp. 109-120

    Peter Stone

    The Treatment of Electronic Contracts and Torts in Private International Law under European Community Legislation

     No.2

     pp. 121-139

    Carolyn Penfold

    The Content Control That Wasn't: Two Years of the Online Services Amendment

     No.2

     pp. 141-159

    Xiaoqing Feng

    The Protection of Copyright in Network Environment: A Review of Recent Reform of the Chinese Copyright Law

     No.2

     pp. 161-163

    Kevin Kerrigan, Philip Plowden

    Corporate Interests and the Privacy Bandwagon

     No.3

     pp. 177-192

    Irene Nemes

    Regulating Hate Speech in Cyberspace: Issues of Desirability and Efficacy

     No.3

     pp. 193-220

    Catherine Colston

    When Information is Boxed Who Should Hold the Key?

     No.3

     pp. 221-239

    Noel Cox

    The Regulation of Cyberspace and the Loss of National Sovereignty

     No.3

     pp. 241-253

    Dimitrios Delibasis

    The Right of States to Use Force in Cyberspace: Defining the Rules of Engagement

     No.3

     pp. 255-268

    C. M. Abhilash

    E- Commerce Law in Developing Countries: An Indian Perspective

     No.3

     pp. 269-281

    Information and Communications Technology Law, 2003, Vol.12

    Author

    Title

    number

    Page to Page

    Katherine S. Williams

    Controlling Internet Child Pornography and Protecting the Child

     No.1

     pp. 3-24

    Hedieh Nasheri

    The Intersection of Technology Crimes and Cyberspace in Europe: The Case of Hungary

     No.1

     pp. 25-48

    IR.A.A.P. Schudelaro

    To Be or Not to Be Electronic Money, That's the Question

     No.1

     pp. 49-55

    John M. Conley

    Strolling Down State Street: The International Law of Business Method Patents

     No.1

     pp. 57-82

    Lucia A. Reisch

    Potentials, pitfalls, and policy implications of electronic consumption

     No.2 June

     pp. 93-109

    Giusella Finocchiaro

    European law and consumer protection in the information age

     No.2 June

     pp. 111-123

    Udo Reifner, Isabel Herwig

    Consumer education and information rights in financial services

     No.2 June

     pp. 125-142

    J. E. J. PRINS

    Consumer education and information rights in financial services

     No.2 June

     pp. 143-164

    Simone Van Der Hof

    European conflict rules concerning international online consumer contracts

     No.2 June

     pp. 165-178

    Gera Van Duijvenvoorde, Ricarda Oudejans

    European competition law, the new e-communications framework, and the consumer in the information society: more than a virtual position?

     No.2 June

     pp. 179-196

    Mark O'Brien, Chris Ashford

    New Technologies, New Frontiers: Modern Challenges in the Cyber Age

     No.3

     pp. 203-213

    Steve Hedley

    Nations, markets and other imaginary places: who makes the law in cyberspace?

     No.3 October

     pp. 215-224

    Ian King

    On- line privacy in Europe- new regulation for cookies

     No.3 October

     pp. 225-236

    Catherine Russell

    Access to technology for the disabled: the forgotten legacy of innovation?

     No.3 October

     pp. 237-246

    Michael Lower, Adam Leaver

    57 channels and nothing on

     No.3 October

     pp. 247-262

    Katia Bodard

    Free access to information challenged by filtering techniques

     No.3 October

     pp. 263-279

    Information and Communications Technology Law, 2004, Vol.13

    Author

    Title

    number

    Page to Page

    John M. Conley, Roberte Makowski

    Rethinking the product of nature doctrine as a barrier to biotechnology patents in the United States- and perhaps Europe as well

     No.1

     pp. 3-40

    Assafa Endeshaw

    Internet regulation in China: the never ending cat and mouse game

     No.1

     pp. 41-57

    Christine Riefa

    Article 5 of the Rome convention on the law applicable to contractual obligations of 19 June 1980 and consumer E contracts: the need for reform

     No.1

     pp. 59-73

    Laurens Mommers

    Searching for arguments: applying a knowledge based ontology of the legal domain

     No.1

     pp. 75-91

    HUGO TER DOEST, ALFONS H. SALDEN, ERNST-JAN GOEDVOLK, ROB KERSEMAKERS, DION SLIJP, CORIEN PRINS

    Digital rights management in information publishing

     No.2

     pp. 99-116

    Stuart R. Cross

    Corporate governance, information technology and the electronic company in the United Kingdom

     No.2

     pp. 117-128

    Noel D. Uria, Paul R. Zimmerman

    Market power and the deregulation of special access service by the Federal Communications Commission1

     No.2

     pp. 129-173

    Emilie Fridenskold

    VAT and the internet: the application of consumption taxes to e commerce transactions

     No.2

     pp. 175-203

    Paolo Balboni

    Liability of certification service providers towards relying parties and the need for a clear system to enhance the level of trust in electronic communication

     No.3

     pp. 211-242

    Ian King

    Internationalising internet governance: does ICANN have a role to play?

     No.3

     pp. 243-258

    Bruce E. May, Jeng Chung V. Chen, Kuang Wei Wen

    The differences of regulatory models and internet regulation in the European Union and the United States

     No.3

     pp. 259-272

    Carolyn Penfold

    Converging content: diverging law

     No.3

     pp. 273-290

    Information and Communications Technology Law, 2005, Vol.14

    Author

    Title

    number

    Page to Page

    Joseph A Cannataci, Jeanne Pia Mifsud-Bonnici

    Data Protection Comes of Age: The Data Protection Clauses in the European Constitutional Treaty

     No.1

     pp. 5-15

    Bostjan Bercic

    Protection of Personal Data and Copyrighted Material on the Web: The Cases of Google and Internet Archive

     No.1

     pp. 17-24

    Uta Kohl

    Ignorance is no Defence, but is Inaccessibility? On the Accessibility of National Laws to Foreign Online Publishers

     No.1

     pp. 25-41

    Naomi Salmon

    The Internet and the Human Right to Food: The European Rapid Alert System for Food and Feed

     No.1

     pp. 43-57

    Akalemwa Ngenda

    The Nature of the International Intellectual Property System: Universal Norms and Values or Western Chauvinism?

     No.1

     pp. 59-79

    MARK O BRIEN, CHRIS ASHFORD

    Editorial: Rights, Identity and Regulation in Cyberspace

     No.2 June

     pp. 81-88

    ALAN S. REID

    The Rise of Third Generation Phones: The Implications for Child Protection

     No.2 June

     pp. 89-113

    BRIAN SIMPSON

    Identity Manipulation in Cyberspace as a Leisure Option: Play and the Exploration of Self

     No.2 June

     pp. 115-131

    J.P. MIFSUD BONNICI, C.N.J. DE VEY MESTDAGH

    Right Vision, Wrong Expectations: The European Union and Self-regulation of Harmful Internet Content

     No.2 June

     pp. 133-149

    MARK O BRIEN

    Clear and Present Danger? Law and the Regulation of the Internet

     No.2 June

     pp. 151-164

    NANCY S. MARDER

    Clear and Present Danger? Law and the Regulation

     No.2 June

     pp. 165-198

    Assafa Endeshaw

    Rethinking the law and information interface: Towards information law, an introduction

     No.3 October

     pp. 199-206

    Thomas Dreier

    Law and information technology- An uneasy marriage, or getting along with each other?

     No.3 October

     pp. 207-216

    Anthony McCann

    Enclosure without and within the information commons

     No.3 October

     pp. 217-240

    Michael D. Pendletona

    Balancing competing interests in information products: A conceptual rethink

     No.3 October

     pp. 241-254

    Assafa Endeshaw

    Building a model for an information property framework

     No.3 October

     pp. 255-265

    James G. H. Griffin

    The need for a new paradigm in IP law: A focus on authorship

     No.3 October

     pp. 267-278

    JACQUELINE LIPTON

    Facilitating fair use in the digital age

     No.3 October

     pp. 279-298

    VIRGINIA BROWN KEYDER

    From information to property and back again

     No.3 October

     pp. 299-312

    Information and Communications Technology Law, 2006, Vol.15

    Author

    Title

    number

    Page to Page

    Andre Sirois, Shannon E. Martina

    United States copyright law and digital sampling: Adding color to a grey area

     No.1 March

     pp. 1-32

    Andreas Mitrakas

    Information security and law in Europe: Risks checked?

     No.1 March

     pp. 33-53

    Bob Rietjens

    Trust and reputation on eBay: Towards a legal framework for feedback intermediaries

     No.1 March

     pp. 55-78

    Margaret Wallace

    An investigation into copyright concerns as a barrier to the widespread development of e-learning practice within scottish further education colleges

     No.1 March

     pp. 79-119

    Gergely Laszlo Szokea

    The possibility of online mediation under the Hungarian Mediation Act In comparison with a number of international, including European, documents on mediation

     No.2 June

     pp. 129-142

    Arno R. Lodder

    The Third Party and Beyond. An analysis of the different parties, in particular The Fifth, involved in online dispute resolution

     No.2 June

     pp. 143-155

    Dimitris Protopsaltou, Thomas Schultz, Nadia Magnenat- Thalmann

    Taking the Fourth Party further? Considering a shared virtual workspace for arbitration

     No.2 June

     pp. 157-173

    Laurens Mommers

    Virtualization of dispute resolution. Establishing trust by recycling reputation

     No.2 June

     pp. 175-187

    Dory Reiling

    Doing justice with information technology

     No.2 June

     pp. 189-200

    D. Struiksma, A. W. Jongbloed

    Bailiffs on the e- highway

     No.2 June

     pp. 201-206

    James G. H. Griffin

    The rise of the digital technology "Meritocracy": Legal rules and their impact

     No.3 October

     pp. 211-221

    Steve Hedley

    A brief history of spam

     No.3 October

     pp. 223-238

    Brian Simpson

    From Family First to the FBI: Children, ideology and Cyberspace

     No.3 October

     pp. 239-257

    Mark O'brien

    The Witchfinder- General and the Will- o'- the- Wisp: The myth and reality of Internet control

     No.3 October

     pp. 259-273

    Chris Ashford

    The only gay in the village: Sexuality and the net

     No.3 October

     pp. 275-289

    Information and Communications Technology Law, 2007, Vol.16

    Author

    Title

    number

    Page to Page

    Christine Cooper

    Television on the Internet: Regulating new ways of viewing

     No.1 March

     pp. 1-15

    Guido Schryen

    Anti- spam legislation: An analysis of laws and their effectiveness

     No.1 March

     pp. 17-32

    Claudio Feijoo, Jose Luis Gomez-Barroso, Sergio Ramos, David Rojo-Alonso

    VoIP at the crossroads: A critical overview of feasible European regulatory models

     No.1 March

     pp. 33-46

    Stephen E. Blythe

    Hungary's Electronic Signature Act: Enhancing economic development with Secure Electronic Commerce transactions

     No.1 March

     pp. 47-71

    Timothy Webb

    Electronic case management in New South Wales, Australia

     No.1 March

     pp. 73-86

    Mireille M. Caruana, Joseph A. Cannataci

    European Union privacy and data protection principles: Compatibility with culture and legal frameworks in Islamic states

     No.2 June

     pp. 99-124

    IDA MADIEHA AZMI

    Personal data protection law: The Malaysian experience

     No.2 June

     pp. 125-135

    Muhammad Aslam Hayat

    Privacy and Islam: From the Quran to data protection in Pakistan

     No.2 June

     pp. 137-148

    Ayo Kusamotu

    Privacy law and technology in Nigeria: The legal framework will not meet the test of adequacy as mandated by article 25 of European union directive 95/ 46

     No.2 June

     pp. 149-159

    Jeanne Pia Mifsud Bonnici

    Recent European Union developments on data protection in the name of Islam or "Combating Terrorism"

     No.2 June

     pp. 161-175

    Bert-Jaap Koops, Merel M. Prinsen

    Houses of Glass, Transparent Bodies: How New Technologies Affect Inviolability of the Home and Bodily Integrity in the Dutch Constitution

     No.3 October

     pp. 177-190

    Jane C. Ginsburg

    The Pros and Cons of Strengthening Intellectual Property Protection: Technological Protection Measures and Section 1201 of the United States Copyright Act

     No.3 October

     pp. 191-216

    Maya Gadzheva

    Getting Chipped: To Ban or Not to Ban

     No.3 October

     pp. 217-231

    Alfred C. Yen

    Third- party Copyright Liability after Grokster

     No.3 October

     pp. 233-272

    Information and Communications Technology Law, 2008, Vol.17

    Author

    Title

    number

    Page to Page

    Karen McCullagh

    Blogging: self presentation and privacy

     No.1 March

     pp. 3-23

    Mark O Brien

    Law, privacy and information technology: a sleepwalk through the surveillance society?

     No.1 March

     pp. 25-35

    Chris Ashford

    Sex work in cyberspace: who pays the price?

     No.1 March

     pp. 37-49

    Kanchana Kariyawasam

    The growth and development of e- commerce: an analysis of the electronic signature law of Sri Lanka

     No.1 March

     pp. 51-64

    Wilfred Dolfsma

    Appropriability, communication and social welfare in a knowledge economy

     No.2 June

     pp. 65-77

    Daithi Mac Sithigh

    The mass age of internet law

     No.2 June

     pp. 79-94

    Ronan Kennedy

    Virtual rights? Property in online game objects and characters

     No.2 June

     pp. 95-106

    Anne-Kathrin Kuehnel

    Microsoft, Open Source and the software ecosystem: of predators and prey- the leopard can change its spots

     No.2 June

     pp. 107-124

    Miriam Goldby

    Electronic bills of lading and central registries: what is holding back progress?

     No.2 June

     pp. 125-149

    Brian Simpson

    New Labor, new censorship? Politics, religion and internet filtering in Australia

     No.3 October

     pp. 167-183

    Judith Rauhofer

    Privacy is dead, get over it! Information privacy and the dream of a risk- free society

     No.3 October

     pp. 185-197

    Ray Corrigan

    Back to the future: digital decision making

     No.3 October

     pp. 199-220

    Pablo Cortes

    Accredited online dispute resolution services: creating European legal standards for ensuring fair and effective processes

     No.3 October

     pp. 221-237

    Information and Communications Technology Law, 2009, Vol.18

    Author

    Title

    number

    Page to Page

    Paul Arnella, Alan Reid

    Hackers beware: the cautionary story of Gary McKinnon

     No.1 March

     pp. 1-12

    Shannon Martina, Debbie Rabina

    National security, individual privacy and public access to government- held information: the need for changing perspectives in a global environment

     No.1 March

     pp. 13-18

    Maeve McDonagh

    The protection of personal information in public registers: the case of urban planning information in Ireland

     No.1 March

     pp. 19-38

    Sarah Rhodesa, Dana Neacsu

    Preserving and ensuring long- term access to digitally born legal information

     No.1 March

     pp. 39-74

    Chris Reed

    The challenge of hate speech online

     No.2 June

     pp. 79-82

    Mike Suttona, Barbara Perry

    Politicking the personal: examining academic literature and British National Party beliefs and wishes about intimate interracial relationships and mixed heritage

     No.2 June

     pp. 83-98

    Michael Saltera, Chris Bryden

    I can see you: harassment and stalking on the Internet

     No.2 June

     pp. 99-122

    Fernne Brennan

    Legislating against Internet race hate

     No.2 June

     pp. 123-153

    Candida Harrisa, Judith Rowbothamb, Kim Stevenson

    Truth, law and hate in the virtual marketplace of ideas: perspectives on the regulation of Internet content

     No.2 June

     pp. 155-184

    Barbara Perry, Patrik Olsson

    Cyberhate: the globalization of hate

     No.2 June

     pp. 185-199

    Audrey Guichard

    Hate crime in cyberspace: the challenges of substantive criminal law

     No.2 June

     pp. 201-234

    Jessica S. Henry

    Beyond free speech: novel approaches to hate on the Internet in the United States

     No.2 June

     pp. 235-251

    Brian Simpson

    Controlling fantasy in cyberspace: cartoons, imagination and child pornography

     No.3 October

     pp. 255-271

    Margaret Devaney

    Online gambling and international regulation: an outside bet

     No.3 October

     pp. 273-283

    Mark O Brien

    Still on the road? Technology and historical perspectives on counter- cultural policing

     No.3 October

     pp. 285-296

    Chris Ashford

    Queer theory, cyber- ethnographies and researching online sex environments

     No.3 October

     pp. 297-314

    Information and Communications Technology Law, 2010, Vol.19

    Author

    Title

    number

    Page to Page

    Eugenia Georgiades

    Copyright liability for users and distributors of content sharing and communication technologies: a crossroads between past and present

     No.1 March

     pp. 1-26

    Farooq Ahmad Mira, Mohamad Tariq Banday

    Control of spam: a comparative approach with special reference to India

     No.1 March

     pp. 27-59

    Sharon Christensen, William J. Caelli, William D. Duncan, Eugenia Georgiades

    An Achilles heel: denial of service attacks on Australian critical information infrastructures

     No.1 March

     pp. 61-85

    Marian K. Riedy, Joseph H. Wen

    Electronic surveillance of Internet access in the American workplace: implications for management

     No.1 March

     pp. 87-99

    Haim Sandberg

    Real estate e- conveyancing: vision and risks

     No.2 June

     pp. 101-114

    Rajnish Kumar Rai

    Does India need to harmonize the law of patent exhaustion and parallel imports?

     No.2 June

     pp. 115-146

    Terry Hart

    Copyright reform step zero

     No.2 June

     pp. 147-163

    Eugenia Georgiades

    When secret use is not so secret

     No.2 June

     pp. 165-188

    Michael Lwin

    Privacy issues with DNA databases and retention of individuals' DNA information by law enforcement agencies: the holding of the European Court of Human Rights case S and Marper v. United Kingdom should be adapted to American Fourth Amendment jurisprudence

     No.2 June

     pp. 189-222

    Uzodima F. Aba-Onu, Nekima Levy-Pounds, Joanna Salmen, Artika Tyner

    Evaluation of gang databases in Minnesota and recommendations for change

     No.3 October

     pp. 223-254

    Nicola Haralambous

    Educating jurors: technology, the Internet and the jury system

     No.3 October

     pp. 255-266

    Hafiz Aziz ur Rehman

    India, TRIPS- plus free trade agreements and the future of access to essential medicines

     No.3 October

     pp. 267-300

    Information and Communications Technology Law, 2011, Vol.20

    Author

    Title

    number

    Page to Page

    Brian Simpson

    What happens online stays online? Virtual punishment in the real world

     No.1 March

     pp. 3-17

    Jackie Jones

    Trafficking Internet brides

     No.1 March

     pp. 19-33

    Ana Carolina Blanco Hache, Nicholas Ryder

    Tis the season to (be jolly?) wise- up to online fraudsters. Criminals on the Web lurking to scam shoppers this Christmas: a critical analysis of the United Kingdom's legislative provisions and policies to tackle online fraud

     No.1 March

     pp. 35-56

    Omair Uthmania, Prof William Buchanana, Alistair Lawsona, Russell Scottb, Burkhard Schaferc, Lu Fana, Sohaib Uthmani

    Crime risk evaluation within information sharing between the police and community partners

     No.2 June

     pp. 57-81

    David Erdos

    Systematically handicapped? Social research in the data protection framework

     No.2 June

     pp. 83-101

    Chris Monaghan

    The status of the seller in the age of eBay

     No.2 June

     pp. 103-114

    Soren Frederiksen

    Brain fingerprint or lie detector: does Canada's polygraph jurisprudence apply to emerging forensic neuroscience technologies?

     No.2 June

     pp. 115-132

    John Hunt

    The new frontier of money laundering: how terrorist organizations use cyberlaundering to fund their activities, and how governments are trying to stop them

     No.2 June

     pp. 133-152

    Ahmad A. Alshorbagy

    Orascom Telecom versus France Telecom: a case study on Egyptian Takeover Law

     No.3 October

     pp. 157-183

    Yianna Danidou, Burkhard Schafer

    "Trust me, I'm a computer"- Trusted Computing and the law between liability and responsibility

     No.3 October

     pp. 185-199

    Nathaniel Minott

    The Economic Espionage Act: is the law all bark and no bite?

     No.3 October

     pp. 201-224

    Eugenia Georgiades

    Resolving conflicting interests: software patents versus open source

     No.3 October

     pp. 225-252

    Amanda Watson

    Does TRIPS increase technology transfer to the developing world? The empirical evidence

     No.3 October

     pp. 253-278

    Information and Communications Technology Law, 2012, Vol.21

    Author

    Title

    number

    Page to Page

    Assafa Endeshawa, Pauline Sadler

    A critical evaluation of government- sponsored reviews of intellectual property in Australia

     No.1 March

     pp. 1-18

    Vitaly Kalyatin

    Problems of database protection in the Russian Federation

     No.1 March

     pp. 19-31

    Galina I. Fomenkova

    For your eyes only? A "Do Not Track" proposal

     No.1 March

     pp. 33-52

    Rajnish Kumar Raia, Srinath Jagannathana

    Parallel imports and unparallel laws: an examination of the exhaustion doctrine through the lens of pharmaceutical products

     No.1 March

     pp. 53-89

    Chris Schaffer

    Prohibiting discriminatory cross- licensing

     No.1 March

     pp. 91-106

    F.E. Guerra-Pujol

    The Turing Test and the legal process

     No.2 June

     pp. 113-126

    Rebecca Ong

    Online vigilante justice Chinese style and privacy in China

     No.2 June

     pp. 127-145

    Nada Mohamed

    The Do Not Track Me Online laws: creating a ceiling when the sky's the limit and we are halfway to heaven

     No.2 June

     pp. 147-154

    Jason Goldstein

    Autonomy in information: pre- trial publicity, commercial media, and user generated content

     No.2 June

     pp. 155-178

    Leonhard Dobusch

    The digital public domain: relevance and regulation

     No.2 June

     pp. 179-202

    Majid Yar

    E- Crime 2.0: the criminological landscape of new social media

     No.3 October

     pp. 207-219

    Robert Stokesa

    Virtual money laundering: the case of Bitcoin and the Linden dollar

     No.3 October

     pp. 221-236

    Georgina Bensteda

    Hi terrorist financing and the Internet: dot com danger

     No.3 October

     pp. 237-256

    K.F. McCartana, R. McAlisterb

    Mobile phone technology and sexual abuse

     No.3 October

     pp. 257-268

    Sally Ramage

    Information technology facilitating money laundering

     No.3 October

     pp. 269-282

    Information and Communications Technology Law, 2013, Vol.22

    Author

    Title

    number

    Page to Page

    Robin Elizabeth Herr

    Can human rights law support access to communication technology? A case study under Article 10 of the right to receive information

     No.1

     pp. 1-13

    Peter Stone

    Territorial targeting in EU private law

     No.1

     pp. 14-26

    Alexander Savelyev

    Open source: the Russian experience (legislation and practice)

     No.1

     pp. 27-44

    Eugenia Georgiades

    Closing the gap between copyright and designs: an age of enlightenment or state of confusion?

     No.1

     pp. 45-59

    Sarah Hodges

    Examining the Gramm- Leach- Bliley Act's opt-out method for protecting consumer data privacy rights on the Internet

     No.1

     pp. 60-85

    Richard Sanvenero

    Social media and our misconceptions of the realities

     No.2

     pp. 89-108

    Robin Stevenson Burroughs

    When Colossus and Xactimate are not exact: how computerized claims adjusting software has not changed the landscape of insurance litigation

     No.2

     pp. 109-131

    Nehaluddin Ahmada, Saurabh Chaturvedib

    Originality requirement and copyright regime of music: a comparative overview of Indian perspective

     No.2

     pp. 132-145

    Ibrahim Al Swelmiyeena, Ahmed Al-Nuematb, Andy Koka

    Online arbitration in the social network world; mobile justice on iPhones

     No.2

     pp. 146-164

    Paolo Balbonia, Enrico Pelinoa

    Law Enforcement Agencies' activities in the cloud environment a European legal perspective

     No.2

     pp. 165-190

    Ephraim Nissan

    Ontologies on trial the lesson of Maurice v. Judd (New York, 1818)

     No.2

     pp. 191-211

    Ephraim Nissan

    Legal evidence and advanced computing techniques for combatting crime an overview

     No.3

     pp. 213-250

    Scott Zimmera

    The right to print arms the effect on civil liberties of government restrictions on computer-aided design files shared on the Internet

     No.3

     pp. 251-263

    Arno R. Lodder

    Ten Commandments of Internet Law revisited basic principles for Internet Lawyers

     No.3

     pp. 264-276

    Morgan Vasigh

    Smile, you are under arrest the misappropriation and misuse of mug shots online

     No.3

     pp. 277-298

    Niloufer Selvadurai

    Protecting online information privacy in a converged digital environment the merits of the new Australian privacy principles

     No.3

     pp. 299-314

    Chris Ellis

    Referring or linking to liability does the Digital Millennium Copyright Act really mean what it says

     No.3

     pp. 315-330

    Information and Communications Technology Law, 2014, Vol.23

    Author

    Title

    number

    Page to Page

    Jae Sundaram

    India's trade-related aspects of Intellectual Property Rights compliant pharmaceutical patent laws: what lessons for India and other developing countries?

    No.1

    pp. 1-30

    Litska Strikwerda

    Should virtual cybercrime be regulated by means of criminal law? A philosophical, legal-economic, pragmatic and constitutional dimension

    No.1

    pp. 31-60

    Peter Holm

    Piracy on the simulated seas: the computer games industry's non-legal approaches to fighting illegal downloads of games

    No.1

    pp. 61-76

    Vikram Iyengar

    Maryland v. King: the case for uniform, nationwide DNA collection and DNA database laws in the United States

    No.1

    pp. 77-80

    Jae Sundaram

    Brazil's implementation of TRIPS flexibilities: ambitious missions, early implementation, and the plans for reform

    No.2

    pp. 81-116

    Marcella Favale

    Death and resurrection of copyright between law and technology

    No.2

    pp. 117-135

    Adela M. Mao

    How to apportion a copyright in joint work by co-authors

    No.2

    pp. 136-158

    Philip Liu

    An open shield: antitrust arguments against extending copyright protection to fashion designs

    No.2

    pp. 159-171

    Allison Tungate

    Bare necessities: the argument for a revenge porn exception in Section 230 immunity

    No.2

    pp. 172-188

    Brian Simpson, Maria Murphy

    Cyber-privacy or cyber-surveillance? Legal responses to fear in cyberspace

    No.3

    pp. 189-191

    Maria Helen Murphy

    The pendulum effect: comparisons between the Snowden revelations and the Church Committee. What are the potential implications for Europe?

    No.3

    pp. 192-219

    Jens Kremer

    Policing cybercrime or militarizing cybersecurity? Security mindsets and the regulation of threats from cyberspace

    No.3

    pp. 220-237

    Mark O Brien

    The Internet, child pornography and cloud computing: the dark side of the web?

    No.3

    pp. 238-255

    Claire Bessant

    Data protection, safeguarding and the protection of children's privacy: exploring local authority guidance on parental photography at school events

    No.3

    pp. 256-272

    Brian Simpson

    Tracking children, constructing fear: GPS and the manufacture of family safety

    No.3

    pp. 273-285

    Information and Communications Technology Law, 2015, Vol.24

    Author

    Title

    number

    Page to Page

    Christopher Harding, Simon Garrett, Shisheng Wang

    Game-playing and understanding decision-making within legal frameworks: the use of computerised simulation

    No.1

    pp. 1-15

    Peter Coe

    The social media paradox: an intersection with freedom of expression and the criminal law

    No.1

    pp. 16-40

    Meghan A. Wong, Richard Frank, Russell Allsup

    The supremacy of online white supremacists - an analysis of online discussions by white supremacists

    No.1

    pp. 41-73

    Bart van der Sloot

    How to assess privacy violations in the age of Big Data? Analysing the three different tests developed by the ECtHR and adding for a fourth one

    No.1

    pp. 74-103

    Aleksey Pavlovich Anisimov, Anatoly Jakovlevich Ryzhenkov, Dmitriy Vladimirovich Kozhemyakin

    Theory and practice of protection of personal names in the domain space or renewed cybersquatting (in terms of the states of Eastern Europe)

    No.1

    pp. 104-117

    Jae Sundaram

    Analysis of TRIPS Agreement and the justification of international IP rights protection in the WTO's multilateral trading system, with particular reference to pharmaceutical patents

    No.2

    pp. 121-163

    Angela Goodrum

    How to maneuver in the world of negative online reviews, the important ethical considerations for attorneys, and changes needed to protect the legal profession

    No.2

    pp. 164-182

    Matthew Slaughter

    The barriers of Facebook's terms of service agreement: hardships placed on fiduciaries access to digital assets

    No.2

    pp. 183-204

    Umar A. Oseni, Sodiq O. Omoola

    Banking on ICT: The relevance of online dispute resolution in the Islamic banking industry in Malaysia

    No.2

    pp. 205-223

    Calum Liddle, David McMenemy

    A Scottish freedom of information regime for a denationalised environment: rhetorical or authentically practical?

    No.3

    pp. 225-241

    Jae Sundaram

    Access to medicines and the TRIPS Agreement: what next for sub-Saharan Africa?

    No.3

    pp. 242-261

    Jenna Makinen

    Data quality, sensitive data and joint controllership as examples of grey areas in the existing data protection framework for the Internet of Things

    No.3

    pp. 262-277

    Garry A. Gabison

    Lessons that Europe can learn from the US patent assertion entity phenomenon

    No.3

    pp. 278-302

    Information and Communications Technology Law, 2016, Vol.25

    Author

    Title

    number

    Page to Page

    Maria Helen Murphy

    Technological solutions to privacy questions: what is the role of law?

    No.1

    pp. 4-31

    Julia J.A. Shaw, Hillary J. Shaw

    Mapping the technologies of spatial (in)justice in the Anthropocene

    No.1

    pp. 32-49

    Brian Simpson

    Algorithms or advocacy: does the legal profession have a future in a digital world?

    No.1

    pp. 50-61

    Kim Barker

    Virtual spaces and virtual layers - governing the ungovernable?

    No.1

    pp. 62-70