Part of the Internet Law Commons

Works in Internet Law

2023

Opaque Notification: A Country-by-Country Review, Lauren Mantel
Joint PIJIP/TLS Research Paper Series

PDF

Data Localization and Government Access to Data Stored Abroad: Discussion Paper 2, Shanzay Pervaiz, Alex Joel
Joint PIJIP/TLS Research Paper Series

PDF

Content Governance in the Shadows: How Telcos & Other Internet Infrastructure Companies "Moderate" Online Content, Prem M. Trivedi
Joint PIJIP/TLS Research Paper Series

PDF

2022

Chinese Technology Platforms Operating in the United States: Assessing the Threat (Originally Published as a Joint Report of the National Security, Technology, and Law Working Group at the Hoover Institution at Stanford University and the Tech, Law & Security Program at American University Washington College of Law), Gary Corn, Jennifer Daskal, Jack Goldsmith, Chris Inglis, Paul Rosenzweig, Samm Sacks, Bruce Schneier, Alex Stamos, Vincent Stewart
Jennifer Daskal

Good Health and Good Privacy Go Hand-in-Hand (Originally published by JNSLP), Jennifer Daskal
Jennifer Daskal

Police Are Seeking More Digital Evidence From Tech Companies, Naomi Nix, Jennifer C. Daskal
Jennifer Daskal

Rules of Engagement: Copyright and Automated Gatekeepers' Influence on Creative Expression, Michael W. Carroll
Michael W. Carroll

Rules of Engagement: Copyright and Automated Gatekeepers' Influence on Creative Expression, Michael W. Carroll
Articles in Law Reviews & Other Academic Journals

PDF

Protecting Children in the Age of End-to-End Encryption, Laura Draper
Joint PIJIP/TLS Research Paper Series

PDF

Game Theory Optimized Fraud: How the Unlawful Internet Gambling Enforcement Act Created a Virtually Riskless Environment for White Collar Crime in Online Poker, Jeffrey Woolf
Upper Level Writing Requirement Research Papers

PDF

2021

Widening the Lens on Content Moderation, Jenna Ruddock, Justin Sherman
Joint PIJIP/TLS Research Paper Series

PDF

Many dating apps ban people convicted of felonies. Does that make anyone safer?, Jenny M. Roberts, Keri Blakinger
Popular Media

Does Banning People With Felonies From Dating Apps Actually Make Anyone Safer?, Jenny M. Roberts, Keri Blakinger
Popular Media

Regulating the Digital Resonance, Hassan Salman
Upper Level Writing Requirement Research Papers

PDF

Chinese Technology Platforms Operating in the United States: Assessing the Threat (Originally Published as a Joint Report of the National Security, Technology, and Law Working Group at the Hoover Institution at Stanford University and the Tech, Law & Security Program at American University Washington College of Law), Gary Corn, Jennifer Daskal, Jack Goldsmith, Chris Inglis, Paul Rosenzweig, Samm Sacks, Bruce Schneier, Alex Stamos, Vincent Stewart
Joint PIJIP/TLS Research Paper Series

PDF

A Tale of Two Interoperabilities; or, How Google v. Oracle Could Become Social Media Legislation, Charles Duan
Articles in Law Reviews & Other Academic Journals

PDF

“Hey Siri, I’m Being Pulled Over.”, Charlene Collazo Goldfield, Gabriela Chambi, Amanda Torres
Joint PIJIP/TLS Research Paper Series

PDF

Self-Defense to Cyber Force: Combatting the Notion of ‘Scale And Effect', Thomas Eaton
American University International Law Review

PDF

TRIPing on Trade Secrets: How China’s Cybertheft of U.S. Trade Secrets Violated TRIPS, Kassidy Schmitz
American University International Law Review

PDF

Era of Accelerating Digital Convergence: Security, Surveillance, Data, Privacy, Big Tech, and Politics, John Taschner
American University International Law Review

PDF

Leveraging Domestic Law Against Cyberattacks, Justin Malzac
American University National Security Law Brief

PDF

Shifting Contour of Data Sharing in Financial Market and Regulatory Responses: The UK and Australian Models, Han-Wei Liu
American University Business Law Review

PDF

2020

Who's Afraid of Section 1498? A Case for Government Patent Use in Pandemics and Other National Crisis, Charles Duan, Christopher J. Morten
Articles in Law Reviews & Other Academic Journals

PDF

Good Health and Good Privacy Go Hand-in-Hand (Originally published by JNSLP), Jennifer Daskal
Joint PIJIP/TLS Research Paper Series

PDF

Covert Deception, Strategic Fraud, and the Rule of Prohibited Intervention (Originally published as part of the Hoover Institution’s Aegis Series), Gary Corn
Joint PIJIP/TLS Research Paper Series

PDF

Government Information Crackdowns in the Covid-19 Pandemic, Justin Sherman
Joint PIJIP/TLS Research Paper Series

PDF

Congressional Internet Caucus Advisory Committee discussion on data warrants - Advisory Committee to the Congressional Internet Caucus Advisory Committee 'Data Warrants From Across the Pond: Fighting Crime While Preserving Privacy' discussion, Jennifer Daskal
Jennifer Daskal

Hearing on "21st Century Trade Barriers: Protectionist Cross Border Data Flow Policies Impact on U.S. Jobs," Subcommittee on Digital Commerce and Consumer Protection, Jennifer Daskal
Jennifer Daskal

Automated Copyright Enforcement Online: From Blocking to Monetization of User-Generated Content, Henning Grosse Ruse-Khan
Joint PIJIP/TLS Research Paper Series

PDF

Think of an Elephant? Tweeting as "Framing" Executive Power, Fernando R. Laguarda
Fernando Laguarda

Microsoft Ireland, the CLOUD Act, and Access to Data Across Borders, Jennifer C. Daskal
Jennifer Daskal

Elusiveness and Evolution: Mass-Market Licenses Under Proposed U.C.C. Article 2B, Walter Effross
Walter Effross

Statute of Frauds, Notice, and the Parol Evidence Rules, Walter Effross
Walter Effross

Garbage In: Emerging Media and Regulation of Unsolicited Commercial Solicitiations, Michael W. Carroll
Michael W. Carroll

The Overlapping Web of Data, Territoriality and Sovereignty, Jennifer Daskal
Jennifer Daskal

Logos, Links, and Lending: Towards Standardized Privacy and Use Policies for Banking Web Sites, Walter Effross
Walter Effross

Resolving Tensions between Copyright and the Internet, Walter Effross
Walter Effross

The Legal Architecture of Virtual Stores: World Wide Web Sites and the Uniform Commercial Code, Walter Effross
Walter Effross

Thwarting Ethical Violations with Web Site Disclaimers, Walter Effross
Walter Effross

Withdrawal of the Reference: Rights, Rules, and Remedies for Unwelcomed Web-Linking, Walter Effross
Walter Effross

A Puzzle Even the Codebreakers Have Trouble Solving: A Clash of Interests over the Electronic Encryption Standard, Sean Flynn
Sean Flynn

A Survey of Federal Agency Rulemakers' Attitudes About E-Rulemaking, Jeffrey Lubbers
Jeffrey Lubbers

Speech Across Borders, Jennifer Daskal
Jennifer Daskal

Borders and Bits, Jennifer Daskal
Jennifer Daskal

Access to Data Across Borders: The Critical Role for Congress to Play Now, Jennifer Daskal
Jennifer Daskal

Reining In a 'Renegade' Court: TC Heartland and the Eastern District of Texas, Jonas Anderson
J. Jonas Anderson

Cartel Ringmaster or Competition Creator? The Ebooks Case Against Apple (2013), Jonathan Baker
Jonathan B. Baker

Liability for Mobile Health and Wearable Technologies, Lindsay Wiley, Nicolas Terry
Lindsay Wiley

Pinterest and Copyright's Safe Harbors for Internet Providers, Michael W. Carroll
Michael W. Carroll

Safe Harbors from Intermediary Liability and Social Media, Michael W. Carroll
Michael W. Carroll

Whose Music is it Anyway? How We Came to View Musical Expression as a Form of Property, Michael W. Carroll
Michael W. Carroll

The Statute of Anne: Today and Tomorrow, Peter Jaszi, Craig Joyce, Marshall A. Leaffer, Tyler Trent Ochoa
Peter Jaszi

Supreme Court Amicus Brief of AARP and the National Legislative Association on Petition Drug Prices in Support of Petitioners, William H. Sorrell v. IMS Health, Inc., No. 10-779 (Filed March 1, 2011), Sean Flynn, Meredith Jacob, Stacy Canan
Sean Flynn

Of Monopolies and Monocultures: The Intersection of Patents and National Security, Charles Duan
Articles in Law Reviews & Other Academic Journals

PDF

Convergence and Incongruence: Trademark Law and ICANN's Introduction of New Generic Top-Level Domains, Christine Haight Farley
Christine Haight Farley

The Rise of Big Data Policing: Surveillance, Race, and the Future of Law Enforcement, Andrew Ferguson
Andrew Ferguson

Crash Goes ICANN's Multistakeholder Model, Kathryn Kleiman
Articles in Law Reviews & Other Academic Journals

PDF

Crash Goes ICANN's Multistakeholder Model, Kathryn Kleiman
Kathryn Kleiman

What's all the Hype About Hyperlinking?: Connections in Copyright, Dawn Leung
Intellectual Property Brief

PDF

Technology, the Internet and the Evolution of Webcasters...Amazon Revisited, Jessica Michelle Ciminero
Intellectual Property Brief

PDF

How the Digital Millennium Copyright Act Affects Cybersecurity, Katherine Weigle
Intellectual Property Brief

PDF

U.S. Regulation of Blockchain Currencies: A Policy Overview, Averie Brookes
Intellectual Property Brief

PDF

Cybersecurity and Patent Law - Let's Work Together, Vignesh Ramachandran
Intellectual Property Brief

PDF

The Overlapping Web of Data, Territoriality and Sovereignty, Jennifer Daskal
Contributions to Books

PDF

Facebook's Speech Code and Policies: How They Suppress Speech and Distort Democratic Deliberation, Joseph T. Thai
American University Law Review

PDF

Brief fof the R Street Institutte, Public Knowledge, and the Niskanen Center as Amici Curiae in Support of Petitioner, Charles Duan, Meredith F. Rose
Amicus Briefs

PDF

2019

Brief of the R Street Institute as Amicus Curiae in Support of Petitioner, Charles Duan
Amicus Briefs

PDF

Speech Across Borders, Jennifer Daskal
Articles in Law Reviews & Other Academic Journals

PDF

Atrocity Prevention in the New Media Landscape, Rebecca Hamilton
Articles in Law Reviews & Other Academic Journals

PDF

The Dark Data Quandary, Daniel J. Grimm
American University Law Review

PDF

The Decline of Online Piracy: How Markets - Not Enforcement - Drive Down Copyright Infringement, João Pedro Quintais, Joost Poort
American University International Law Review

PDF

Violencia de Género, Internet y el Derecho a la Libertad de Expresón: Un Nuevo DesafÍo Para el Derecho Internacional de los Derechos Humanos, Andrea Pietrafesa
American University International Law Review

PDF

Beyond Takedown: Expanding the Toolkit for Responding to Online Hate, Rebecca Hamilton, Molly K. Land
Contributions to Books

Carpenter v. United States and the Emerging Expectations of Privacy in Data Comprehensiveness Applied to Browsing History, Daniel de Zayas
American University Law Review

PDF

Brief for the R Street Institute as Amicus Curiae in Support of Respondents, Charles Duan
Amicus Briefs

PDF

Microsoft Ireland, the CLOUD Act, and Access to Data Across Borders, Jennifer C. Daskal
Contributions to Books

Two-Sided Internet Markets and the Need to Assess Both Upstream and Downstream Impacts, Rob Frieden
American University Law Review

PDF

2018

Brief for the R Street Institute and Engine Advocacy as Amici Curiae in Support of Respondents, Charles Duan
Amicus Briefs

PDF

Police Are Seeking More Digital Evidence From Tech Companies, Naomi Nix, Jennifer C. Daskal
Popular Media

Symposium on Microsoft v. U.S.: Justices can, and should write nuanced ruling to balance competing interests, Jennifer Daskal
Jennifer Daskal

SCOTUS Series: United States v. Microsoft Corp., Jennifer Daskal
Jennifer Daskal

Reining In a 'Renegade' Court: TC Heartland and the Eastern District of Texas, Jonas Anderson
Articles in Law Reviews & Other Academic Journals

PDF

Borders and Bits, Jennifer Daskal
Articles in Law Reviews & Other Academic Journals

PDF

Think of an Elephant? Tweeting as "Framing" Executive Power, Fernando R. Laguarda
Articles in Law Reviews & Other Academic Journals

PDF

Defamation and Privacy in the Social Media Age: What Would Justice Brennan Think?, Stephen Wermiel
Articles in Law Reviews & Other Academic Journals

PDF

User-Generated Evidence, Rebecca Hamilton
Articles in Law Reviews & Other Academic Journals

PDF

Cartel Ringmaster or Competition Creator? The Ebooks Case Against Apple (2013), Jonathan Baker
Contributions to Books

PDF

A Search by Any Other Name: Google, Genericism, and Primary Significance, Erica C. Hughes
American University Business Law Review

PDF

Crypto Securities: On the Risks of Investments in Blockchain-Based Assets and the Dilemmas of Securities Regulation, Schlomit Azgad-Tromer
American University Law Review

PDF

Insta-Famous: Challenges and Obstacles Facing Bloggers and Social Media Personalities in Defamation Cases, Maureen T. DeSimone
The Modern American

PDF

Apple hat einen Plan, der die Strafverfolgung erleichtern soll,
Jennifer Daskal

The Cybersecurity 202: How Trump's Supreme Court pick could influence digital privacy, Derek Hawkins
Jennifer Daskal

FBI Over-Counted Encrypted Phones Connected to Crimes - By A Lot,
Jennifer Daskal

2017

Why Jury Duty Matters: A Citizen’s Guide to Constitutional Action, Andrew Guthrie Ferguson
Books

Hearing on "21st Century Trade Barriers: Protectionist Cross Border Data Flow Policies Impact on U.S. Jobs," Subcommittee on Digital Commerce and Consumer Protection, Jennifer Daskal
Congressional and Other Testimony

There's No Good Decision in the Next Big Data Privacy Case, Jennifer Daskal
Popular Media

Congressional Internet Caucus Advisory Committee discussion on data warrants - Advisory Committee to the Congressional Internet Caucus Advisory Committee 'Data Warrants From Across the Pond: Fighting Crime While Preserving Privacy' discussion, Jennifer Daskal
Congressional and Other Testimony

Constitutional Scholars Offer New 'Framework' for Agreement on Protecting Data, Rick Weber, Jennifer C. Daskal
Popular Media

Tech Will Require Continued Adjustment and Definition Within the Law, Experts Say, Eyragon Eidam, Jennifer C. Daskal
Popular Media

Fulbright Scholar to Lecture CSU Journalism Students, Charles Sturt University, Peter Jaszi, Patricia Aufderheide
Popular Media

The 'Smart' Fourth Amendment, Andrew Ferguson
Articles in Law Reviews & Other Academic Journals

PDF

Access to Data Across Borders: The Critical Role for Congress to Play Now, Jennifer Daskal
Articles in Law Reviews & Other Academic Journals

PDF

Data Transmission and Energy Efficient Internet Data Centers, Joseph R. Briscar
American University Law Review

PDF

Corporate Directors' and Officers' Cybersecurity Standard of Care: The Yahoo Data Breach, Lawrence J. Trautman, Peter C. Ormerod
American University Law Review

PDF

Cybersecurity, Identity Theft, and Standing Law: A Framework for Data Breaches Using Substantial Risk in a Post-Clapper World, James C. Chou
American University National Security Law Brief

PDF

Cloudy with a Chance of Abused Privacy Rights: Modifying Third-Party Fourth Amendment Standing Doctrine Post-Spokeo, Sarah E. Pugh
American University Law Review

PDF

Microsoft, Trump administration clash over email searches, Mark Sherman
Jennifer Daskal

Holding the FBI Accountable for Hacking Apple's Software Under the Takings Clause, Mark S. Levy
American University Law Review

PDF

Little Things and Big Challenges: Information Privacy and the Internet of Things, Hillary Brill, Scott Jones
American University Law Review

PDF

2016

The Internet of Things and the Fourth Amendment of Effects, Andrew Ferguson
Articles in Law Reviews & Other Academic Journals

PDF

Liability for Mobile Health and Wearable Technologies, Lindsay Wiley, Nicolas Terry
Articles in Law Reviews & Other Academic Journals

PDF

Known Unknowns: State Cyber Operations, Cyber Warfare, and the Jus Ad Bellum, Peter Z. Stockburger
American University International Law Review

PDF

Safe Harbors from Intermediary Liability and Social Media, Michael W. Carroll
Contributions to Books

The Law of Armed Conflict, Unconventional Warfare, and Cyber Attacks, Thomas P. Jordan
American University National Security Law Brief

PDF

The Intersection of "Internet Terrorism" and "Individual Privacy" in the Context of the First Amendment, Amanda Leonard
American University National Security Law Brief

PDF

Applying the Law of Neutrality While Transitioning the Seas of Cyberspace, Danielle Higson
American University National Security Law Brief

PDF

2015

The Fourth Amendment in the Digital Age Symposium, Braxton Marcela
Criminal Law Practitioner

PDF

Looking for Love in the Online Age - Convicted Felons Need Not Apply: Why Bans on Felons Using Internet Dating Sites are Problematic and Could Lead to Violations of the Computer Fraud & Abuse Act, Amy Tenney
Criminal Law Practitioner

PDF

2014

One Hundred Nos: An Empirical Analysis of the First 100 Denials of Institution for Inter Partes and Covered Business Method Patent Reviews, Jonathan R. K. Stroud, Jarrad Wood
Jonathan R. K. Stroud

PDF

Pinterest and Copyright's Safe Harbors for Internet Providers, Michael W. Carroll
Articles in Law Reviews & Other Academic Journals

PDF

Trial by Google: Judicial Notice in the Information Age, Andrew Ferguson
Articles in Law Reviews & Other Academic Journals

PDF

Avenging Revenge Porn, Samantha Kopf
The Modern American

PDF

2013

The NSA'S Prism Program And The New EU Privacy Regulation: Why U.S. Companies With A Presence In The EU Could Be In Trouble, Juhi Tariq
American University Business Law Review

PDF

2012

The Development and Practice of Law in the Age of the Internet, Nabil R. Adam, Mark H. Hellmann, Peter Martin, James B. Altman, Ethan Katsh, Cantwell F. Muckenfuss, Clifford L. Brody, Eleanor Kerlow, Daniel Nyhart, Thomas R. Bruce, Jon E. Klemens, Ira H. Parker, Mary J. Culnan, John M. Kuttler, Ronald Plesser, Robert Gellman, Ronald D. Lee, Randy V. Sabett, Claudio Grossman, Rosemary Shiels
Claudio M. Grossman

PDF

Piracy,Privacy, and Privatization: Fictional and Legal Approaches to the Electronic Future of Cash , Walter A. Effross
Walter Effross

PDF

Civil Liability Theories for Insufficient Security Authentication in Online Banking, Paul Rice
Articles in Law Reviews & Other Academic Journals

PDF

A Vague Law in a Smartphone World: Limiting the Scope of Unauthorized Access under the Computer Fraud and Abuse Act, Andrew Hernacki
American University Law Review

PDF

2011

Attention All Internet Users: How Proposed Amendments to the Communications Decency Act Could Save Your Reputation, Niki Blumentritt
Legislation and Policy Brief

PDF

Supreme Court Amicus Brief of AARP and the National Legislative Association on Petition Drug Prices in Support of Petitioners, William H. Sorrell v. IMS Health, Inc., No. 10-779 (Filed March 1, 2011), Sean Flynn, Meredith Jacob, Stacy Canan
Amicus Briefs

PDF

A Survey of Federal Agency Rulemakers' Attitudes About E-Rulemaking, Jeffrey Lubbers
Contributions to Books

2010

Disincentives to Data Breach: Problems with Notification and Future Legislative Possibilities, Ross Schulman
Legislation and Policy Brief

PDF

Convergence and Incongruence: Trademark Law and ICANN’s Introduction of New Generic Top-Level Domains, Christine Haight Farley
Christine Haight Farley

PDF

The Statute of Anne: Today and Tomorrow, Peter Jaszi, Craig Joyce, Marshall A. Leaffer, Tyler Trent Ochoa
Articles in Law Reviews & Other Academic Journals

PDF

2009

Breathing New Life into Old Technological Infrastructure: Broadband Internet as a Means of Jump-Starting the Economy and Connecting the Country, Elizabeth Chernow
Articles in Law Reviews & Journals

PDF

Convergence and Incongruence: Trademark Law and ICANN's Introduction of New Generic Top-Level Domains, Christine Haight Farley
Articles in Law Reviews & Other Academic Journals

PDF

2005

Thwarting Ethical Violations with Web Site Disclaimers, Walter Effross
Articles in Law Reviews & Other Academic Journals

PDF

From St. Ives to Cyberspace: The Modern Distortion of the Medieval 'Law Merchant', Stephen E. Sachs
American University International Law Review

PDF

Statute of Frauds, Notice, and the Parol Evidence Rules, Walter Effross
Contributions to Books

2004

MGM v. Grokster, Brief Amici Curiae of the Computer & Communications Industry Association and Internet Archive, In Opposition to the Writ of Certiorari, to the United States Supreme Court, Laura Quilter, Peter Jaszi
Peter Jaszi

PDF

MGM v. Grokster, Brief Amici Curiae of the Computer & Communications Industry Association and Internet Archive, In Opposition to the Writ of Certiorari, to the United States Supreme Court, Laura Quilter, Peter Jaszi
Amicus Briefs

PDF

Whose Music is it Anyway? How We Came to View Musical Expression as a Form of Property, Michael W. Carroll
Articles in Law Reviews & Other Academic Journals

PDF

2000

Should It Be A Free for All? The Challenge of Extending Trade Dress Protection to the Look and Feel of Web Sites in the Evolving Internet , Xuan-Thao N. Nguyen
American University Law Review

PDF

The Uses of New Capital Markets: Electronic Commerce and the Rules of the Game in an International Marketplace , Andrea M. Corcoran
American University Law Review

PDF

Resolving Tensions between Copyright and the Internet, Walter Effross
Articles in Law Reviews & Other Academic Journals

PDF

1998

Logos, Links, and Lending: Towards Standardized Privacy and Use Policies for Banking Web Sites, Walter Effross
Articles in Law Reviews & Other Academic Journals

PDF

Withdrawal of the Reference: Rights, Rules, and Remedies for Unwelcomed Web-Linking, Walter Effross
Articles in Law Reviews & Other Academic Journals

PDF

The Legal Architecture of Virtual Stores, Walter Effross
Articles in Law Reviews & Other Academic Journals

PDF

Elusiveness and Evolution: Mass-Market Licenses Under Proposed U.C.C. Article 2B, Walter Effross
Contributions to Books

1997

The Legal Architecture of Virtual Stores, Walter Effross
Walter Effross

PDF

Renov. ACLU: Insulating the Internet, the First Amendment, and the Marketplaceof Ideas , Stephen C. Jacques
American University Law Review

PDF

1996: Survey of the Year's Developments in Electronic Cash Law and the Laws Affecting Electronic Banking in the United States, Richard L. Field
American University Law Review

PDF

Why Regulate Cybermoney? , David G. Oedel
American University Law Review

PDF

Piracy,Privacy, and Privatization: Fictional and Legal Approaches to the Electronic Future of Cash , Walter A. Effross
American University Law Review

PDF

Electronic Stored Value Payment Systems, Market Position, and Regulatory Issues , Gary W. Lorenz
American University Law Review

PDF

How to Regulate Electronic Cash: An Overview of Regulatory Issues and Strategies , Simon L. Lelieveldt
American University Law Review

PDF

How Best to Guide the Evolution of Electronic Currency Law , Brian W. Smith, Ramsey J. Wilson
American University Law Review

PDF

How to Make a Mint: The Cryptography of Anonymous Electronic Cash , Laurie Law, Susan Sabett, Jerry Solinas
American University Law Review

PDF

The Legal Architecture of Virtual Stores: World Wide Web Sites and the Uniform Commercial Code, Walter Effross
Articles in Law Reviews & Other Academic Journals

PDF

1996

Technology Update: Attorneys' Use of Computers in the Nation's 500 Largest Law Firms, Rosemary Shiels
American University Law Review

PDF

International Harmonization in Electronic Commerce and Electronic Data Interchange: A Proposed First Step Toward Signing on the Digital Dotted Line , Randy V. Sabett
American University Law Review

PDF

The Development and Practice of Law in the Age of the Internet, Nabil R. Adam, Mark H. Hellmann, Peter Martin, James B. Altman, Ethan Katsh, Cantwell F. Muckenfuss, Clifford L. Brody, Eleanor Kerlow, Daniel Nyhart, Thomas R. Bruce, Jon E. Klemens, Ira H. Parker, Mary J. Culnan, John M. Kuttler, Ronald Plesser, Robert Gellman, Ronald D. Lee, Randy V. Sabett, Claudio Grossman, Rosemary Shiels
American University Law Review

PDF

Garbage In: Emerging Media and Regulation of Unsolicited Commercial Solicitiations, Michael W. Carroll
Articles in Law Reviews & Other Academic Journals

PDF

1995

A Puzzle Even the Codebreakers Have Trouble Solving: A Clash of Interests over the Electronic Encryption Standard, Sean Flynn
Articles in Law Reviews & Other Academic Journals

PDF