-
1
-
-
4143049547
-
-
Anti-Cybersquatting Consumer Protection Act., Pub. L. 106-113, 17 USC 1125
-
Anti-Cybersquatting Consumer Protection Act. 1999 Pub. L. 106-113, 17 USC 1125
-
(1999)
-
-
-
3
-
-
12544249985
-
New virus can turn you into a spammer
-
January 29
-
Bank D. 2004, January 29 New virus can turn you into a spammer. Wall Street Journal, p. D1
-
(2004)
Wall Street Journal
-
-
Bank, D.1
-
4
-
-
4143077422
-
-
Web site legal issues Retrieved July 2003
-
Bitlaw 2003 Web site legal issues. Retrieved July 2003 from http://bitlaw.itnernet/webpage.html
-
(2003)
-
-
Bitlaw, A.1
-
5
-
-
4143132511
-
Protecting intellectual property assets on the web
-
PriceWaterhouseCoopers. Retrieved July 2003
-
Blonder B. Charney S. & Gold E. 2001 Protecting intellectual property assets on the web. PriceWaterhouseCoopers. Retrieved July 2003 from http://www.pwcglobal.com/extweb/newcloth.nsf/ 0/89783f8c74d692
-
(2001)
-
-
Blonder, B.1
Charney, S.2
Gold, E.3
-
6
-
-
4143071838
-
The Internet and the law: Putting your business online, not on the line
-
C. F. Haylock, L. Muscrarella, & R. Schultz (Eds.), Holbrook, MA: Adams Media Corporation
-
Burlington W. 1999 The Internet and the law: Putting your business online, not on the line. In C. F. Haylock, L. Muscrarella, & R. Schultz (Eds.), Net success. 24 leaders in web commerce show you how to put the Internet to work for your business (pp. 146-165). Holbrook, MA: Adams Media Corporation
-
(1999)
Net Success. 24 Leaders in Web Commerce Show You How to Put the Internet to Work for Your Business
, pp. 146-165
-
-
Burlington, W.1
-
7
-
-
3142689014
-
Google hacks. 100 industrial-strength tips and tools
-
Sebastopol, CA: O'Reilly
-
Calishain T. & Dornfest R. 2003 Google hacks. 100 industrial-strength tips and tools. Sebastopol, CA: O'Reilly
-
(2003)
-
-
Calishain, T.1
Dornfest, R.2
-
8
-
-
4143105045
-
-
AN-SPAM - Controlling the Assault of Non-Solicited Pornography and Marketing Act, PUB. L
-
CAN-SPAM-Controlling the Assault of Non-Solicited Pornography and Marketing Act. (2003). PUB. L. 108-187
-
(2003)
, pp. 108-187
-
-
-
9
-
-
4143080768
-
The trouble with spyware and advertising-supported software
-
Cexx.org., Retrieved April 20, 2004
-
Cexx.org. 2004 The trouble with spyware and advertising-supported software. Retrieved April 20, 2004 from http://cexx.org/problem.htm
-
(2004)
-
-
-
10
-
-
4143090843
-
-
Children's Online Privacy Protection Act., Pub. L. 105-277, 15 USC 6501-6506; 64 CFR 212
-
Children's Online Privacy Protection Act. 1998 Pub. L. 105-277; 15 USC 6501-6506; 64 CFR 212
-
(1998)
-
-
-
11
-
-
4143060697
-
-
Communications Decency Act., Pub. L.104-104, 47 USC 223
-
Communications Decency Act. 1996 Pub. L. 104-104, 47 USC 223
-
(1996)
-
-
-
12
-
-
4143074081
-
-
Computer Fraud and Abuse Act., 18 USC 1030(a)
-
Computer Fraud and Abuse Act. 1986 18 USC 1030(a)
-
(1986)
-
-
-
13
-
-
4143075144
-
-
Computer Software Copyright Act., Pub. L. 96-517, 17 USC 102, 117
-
Computer Software Copyright Act. 1980 Pub. L. 96-517, 17 USC 102, 117
-
(1980)
-
-
-
14
-
-
0032162298
-
The internet as potential equalizer
-
Coombs W.T. The internet as potential equalizer Public Relations Review 24 1998 289 304
-
(1998)
Public Relations Review
, vol.24
, pp. 289-304
-
-
Coombs, W.T.1
-
15
-
-
4143118262
-
-
Copyright Revision Act., Pub. L. 94-55, 17 USC 101
-
Copyright Revision Act. 1976 Pub. L. 94-55, 17 USC 101
-
(1976)
-
-
-
16
-
-
4143117163
-
-
Criminal Law and Procedures Technical Amendments Act., Pub. L. 99-646, 18 USC 875(c)
-
Criminal Law and Procedures Technical Amendments Act. 1986 Pub. L. 99-646, 18 USC 875(c)
-
(1986)
-
-
-
17
-
-
4143101815
-
-
Cyber-stalking.net., Web site. Retrieved July 2003
-
Cyber-stalking.net. 2003 Web site. Retrieved July 2003 from http://www.cyber-stalking.net
-
(2003)
-
-
-
18
-
-
4143051757
-
-
Dendrite International Inc. v. John Doe, No. 3, et al., 342 NJ Super. 134
-
Dendrite International Inc. v. John Doe, No. 3, et al. 2001 342 NJ Super. 134
-
(2001)
-
-
-
19
-
-
4143079642
-
-
Digital Millenium Copyright Act., Pub. L. 105-304, 17 USC 1201-1205
-
Digital Millenium Copyright Act. 1998 Pub. L 105-304, 17 USC 1201-1205
-
(1998)
-
-
-
20
-
-
4143132512
-
-
Electronic Communication Privacy Act., Pub. L. 99-508, 18 USC 2701
-
Electronic Communication Privacy Act. 1986 Pub. L. 99-508, 18 USC 2701
-
(1986)
-
-
-
21
-
-
4143099600
-
Net privacy. A guide to developing and implementing an ironclad business privacy plan
-
New York: McGraw-Hill
-
Erbschloe M. & Vacca J. 2001 Net privacy. A guide to developing and implementing an ironclad business privacy plan. New York: McGraw-Hill
-
(2001)
-
-
Erbschloe, M.1
Vacca, J.2
-
22
-
-
4143139098
-
-
Fair and Accurate Credit Transactions Act., Pub. L. 108-159 15 USC 1601
-
Fair and Accurate Credit Transactions Act. 2003 Pub. L. 108-159, 15 USC 1601
-
(2003)
-
-
-
23
-
-
4143135727
-
-
Fair Credit Reporting Act., as amended, Pub. L. 91-508, 15 USC 1681
-
Fair Credit Reporting Act. 1970 as amended Pub. L. 91-508, 15 USC 1681
-
(1970)
-
-
-
24
-
-
4143116072
-
-
Federal Trademark Act aka Lanham Act. 15 USC 1125
-
Federal Trademark Act aka Lanham Act. 1946 15 USC 1125
-
(1946)
-
-
-
25
-
-
4143112795
-
-
Federal Trademark Dilution Act., Pub. L. 104-98, 15 USC 1125(c)
-
Federal Trademark Dilution Act. 1995 Pub. L. 104-98, 15 USC 1125(c)
-
(1995)
-
-
-
26
-
-
4143057358
-
-
Financial Services Modernization Act, aka Gramm-Leach-Bliley Act., Pub. L. 106-102, 15 USC 6801-6809
-
Financial Services Modernization Act, aka Gramm-Leach-Bliley Act. 1999 Pub. L. 106-102, 15 USC 6801-6809
-
(1999)
-
-
-
27
-
-
4143132510
-
-
Freedom of Access to Clinics Entrances Act., Pub. L. 103-259, 18 USC 248
-
Freedom of Access to Clinics Entrances Act. 1994 Pub. L. 103-259, 18 USC 248
-
(1994)
-
-
-
28
-
-
0346748049
-
Hacking cyberspace
-
Boulder, CO: Westview
-
Gunkel D. J. 2001 Hacking cyberspace. Boulder, CO: Westview
-
(2001)
-
-
Gunkel D., J.1
-
29
-
-
4143050651
-
The complete idiot's guide to internet privacy and security
-
Indianapolis, IN: Pearson Alpha
-
Gralla P. 2002 The complete idiot's guide to internet privacy and security. Indianapolis, IN: Pearson Alpha
-
(2002)
-
-
Gralla, P.1
-
30
-
-
4143119338
-
Public relations must control the web site
-
Grupp R. 2000 Public relations must control the web site. Public Relations Strategist, 5(4), 32-34
-
(2000)
Public Relations Strategist
, vol.5
, Issue.4
, pp. 32-34
-
-
Grupp, R.1
-
31
-
-
0037374248
-
Perceptions of public relations web sites by computer industry journalists
-
Hachigian D. Hallahan K. Perceptions of public relations web sites by computer industry journalists Public Relations Review 29 2003 42-62
-
(2003)
Public Relations Review
, vol.29
, pp. 42-62
-
-
Hachigian, D.1
Hallahan, K.2
-
32
-
-
4143132509
-
Online public relations
-
H. Bidgoli (Ed.), Hoboken, NJ: John Wiley
-
Hallahan K. 2004 Online public relations. In H. Bidgoli (Ed.), The internet encyclopedia 2 769-783 Hoboken, NJ: John Wiley
-
(2004)
The Internet Encyclopedia
, vol.2
, pp. 769-783
-
-
Hallahan, K.1
-
33
-
-
0032164095
-
New communications technologies. An issues management point of view
-
Heath R.L. New communications technologies. An issues management point of view Public Relations Review 24 1998 273-288
-
(1998)
Public Relations Review
, vol.24
, pp. 273-288
-
-
Heath, R.L.1
-
34
-
-
4143051756
-
-
Health Insurance Portability and Accountability Act-HIPAA., Pub. L. 104-191, 42 USC 1302d 45 CFR 160, 164
-
Health Insurance Portability and Accountability Act-HIPAA. 1996 Pub. L. 104-191, 42 USC 1302d 45 CFR 160, 164
-
(1996)
-
-
-
35
-
-
4143103999
-
Spidering hacks
-
Sebastopol, CA: O'Reilly
-
Hemenway K. & Calishain T. 2003 Spidering hacks. Sebastopol, CA: O'Reilly
-
(2003)
-
-
Hemenway, K.1
Calishain, T.2
-
36
-
-
4143089716
-
Protecting visual assets. Digital output. The business guide for electronic publishers
-
May Retrieved July 2003
-
Henning T. 2001 May Protecting visual assets. Digital output. The business guide for electronic publishers. Retrieved July 2003, from http://www.digitaloutput.net/back%20edit/edittopiclul.html
-
(2001)
-
-
Henning, T.1
-
38
-
-
4143144602
-
Getting along with IT
-
March
-
Holtz S. Getting along with IT Communication World 134 1998 March 20-22
-
(1998)
Communication World
, vol.13
, Issue.4
, pp. 20-22
-
-
Holtz, S.1
-
40
-
-
4143062952
-
Anti-cybersquatting consumer protection act: A powerful remedy in domain name disputes? Or a threat to electronic commerce?
-
Retrieved July 2003
-
Hunn S.C. 2000 Anti-cybersquatting consumer protection act: A powerful remedy in domain name disputes? Or a threat to electronic commerce? Retrieved July 2003 from http://www.fmew.com/archive/ cybersquat/
-
(2000)
-
-
Hunn, S.C.1
-
41
-
-
3843077323
-
Information warfare. Corporate attack and defence in a digital world
-
Oxford: Butterworth Heinemann
-
Hutchinson B. & Warren M. 2001 Information warfare. Corporate attack and defence in a digital world. Oxford: Butterworth Heinemann
-
(2001)
-
-
Hutchinson, B.1
Warren, M.2
-
42
-
-
4143081890
-
-
ImageProtection.net., Web site. Retrieved December 2003
-
ImageProtection.net. 2003 Web site. Retrieved December 2003 from http://imageprotection.net
-
(2003)
-
-
-
43
-
-
4143125916
-
The Gigalaw guide to internet law
-
New York: Random House
-
Isenberg D. 2002 The Gigalaw guide to internet law. New York: Random House
-
(2002)
-
-
Isenberg, D.1
-
44
-
-
0011420619
-
Risky business. Protect your business from being stalked, connected or blackmailed on the web
-
New York: John Wiley
-
Janal D.S. 1998 Risky business. Protect your business from being stalked, connected or blackmailed on the web. New York: John Wiley
-
(1998)
-
-
Janal, D.S.1
-
45
-
-
4143133601
-
The legal guide to e-business
-
Westport, CT: Praeger
-
Klosek J. 2003 The legal guide to e-business. Westport, CT: Praeger
-
(2003)
-
-
Klosek, J.1
-
46
-
-
4143102913
-
The digital challenge. Are you prepared?
-
KPMG, Retrieved July 2003
-
KPMG 2002 The digital challenge. Are you prepared? Retrieved July 2003 from http://www.kpmg.com/Rut2000_prod/Documents/8/ The%20Digital%20Challenge.pdf
-
(2002)
-
-
-
47
-
-
4143094143
-
Protecting valuable commercial information in the digital age: Law, policy and practice
-
Retrieved July 2003
-
Lipton J. 2000 Protecting valuable commercial information in the digital age: Law, policy and practice. Journal of Technology Law and Policy, 6(1), 1-30. Retrieved July 2003 from http://grove.ufl.edu/~techlaw/vol6/Lipton.html
-
(2000)
Journal of Technology Law and Policy
, vol.6
, Issue.1
, pp. 1-30
-
-
Lipton, J.1
-
48
-
-
0003482562
-
Information hiding
-
Boston, MA: Kluwer Academic Publishers
-
Johnson N.F. Duric Z. & Jajodia S. 2001 Information hiding. Boston, MA: Kluwer Academic Publishers
-
(2001)
-
-
Johnson, N.F.1
Duric, Z.2
Jajodia, S.3
-
49
-
-
4143059578
-
Web site demands collaborative control
-
Margaritis W.G. 2000 Web site demands collaborative control. Public Relations Strategist, 5 4 33-35
-
(2000)
Public Relations Strategist
, vol.5
, Issue.4
, pp. 33-35
-
-
Margaritis, W.G.1
-
51
-
-
4143051754
-
-
Ohio Elections Commission. 514 U.S. 334
-
McIntyre V. Ohio Elections Commission. 1995 514 U.S. 334
-
(1995)
-
-
McIntyre, V.1
-
52
-
-
4143114991
-
Absolute PC security and privacy. Defend your computer against outside intruders
-
San Francisco: Sybex
-
Miller M. 2002 Absolute PC security and privacy. Defend your computer against outside intruders. San Francisco: Sybex
-
(2002)
-
-
Miller, M.1
-
53
-
-
0003467282
-
The digital dilemma. Intellectual property in the information age
-
National Research Council Computer Science and Telecommunications Board, Washington, DC: National Academy Press
-
National Research Council Computer Science and Telecommunications Board. 2000 The digital dilemma. Intellectual property in the information age. Washington, DC: National Academy Press
-
(2000)
-
-
-
54
-
-
4143058484
-
Protecting your host-based information assets
-
NetManage., Cupertino, CA: Author. Retrieved July 2003
-
NetManage. 2003 Protecting your host-based information assets. Cupertino, CA: Author. Retrieved July 2003 from http://www.netmanage.com
-
(2003)
-
-
-
55
-
-
4143143529
-
Defending your digital assets
-
New York: McGraw-Hill
-
Nichols R.K. Ryan D.J. & Ryan J.C.H. 2000 Defending your digital assets. New York: McGraw-Hill
-
(2000)
-
-
Nichols, R.K.1
Ryan, D.J.2
Ryan, J.C.H.3
-
56
-
-
4143085332
-
-
No Electronic Theft Act., Pub. L. 105-147; 17 USC 506, 507; 18 USC 2319-2320
-
No Electronic Theft Act. 1998 Pub. L. 105-147; 17 USC 506, 507; 18 USC 2319-2320
-
(1998)
-
-
-
57
-
-
85059048486
-
Online search engines help life cover of privacy
-
February 9, Washington Post
-
Noguchi Y. 2004 February 9 Online search engines help life cover of privacy. Washington Post, p. A01
-
(2004)
-
-
Noguchi, Y.1
-
59
-
-
4143090846
-
-
Planned Parenthood v. American Coalition of Life Activists., 290 F3d. 1058, 9th Cir
-
Planned Parenthood v. American Coalition of Life Activists. 2002 290 F3d. 1058, 9th Cir
-
(2002)
-
-
-
60
-
-
4143058483
-
-
Playboy Enterprises, Inc. v. Terri Welles., 162 F. 3rd 1169, 9th Cir
-
Playboy Enterprises, Inc. v. Terri Welles. 2002 162 F. 3rd 1169, 9th Cir
-
(2002)
-
-
-
61
-
-
4143143530
-
The secured enterprise. Protecting your information assets
-
Upper Saddle River, NJ: Pearson Education Prentice-Hall
-
Proctor P.E. & Brynes F.C. 2002 The secured enterprise. Protecting your information assets. Upper Saddle River, NJ: Pearson Education Prentice-Hall
-
(2002)
-
-
Proctor, P.E.1
Brynes, F.C.2
-
62
-
-
4143077421
-
-
Protection of Children From Sexual Predators Act., Pub. L. 105-314, 18 USC 2425
-
Protection of Children From Sexual Predators Act. 1998 Pub. L. 105-314, 18 USC 2425
-
(1998)
-
-
-
63
-
-
4143106162
-
-
Recording Industry Association of America v. Verizon Internet Services Inc., No. 03-7015, D.C. Cir
-
Recording Industry Association of America v. Verizon Internet Services Inc. 2003 No. 03-7015, D.C. Cir
-
(2003)
-
-
-
64
-
-
0008710344
-
Internet law. Text and materials
-
London: Butterworth
-
Reed C. 2000 Internet law. Text and materials. London: Butterworth
-
(2000)
-
-
Reed, C.1
-
65
-
-
4143104000
-
-
Reno v. ACLU., 117 S.Ct. 2329
-
Reno v. ACLU. 1997 117 S.Ct. 2329
-
(1997)
-
-
-
66
-
-
0038500351
-
Smart mobs. The next social revolution
-
Cambridge, MA: Perseus
-
Rheingold, H. 2002 Smart mobs. The next social revolution. Cambridge, MA: Perseus
-
(2002)
-
-
Rheingold, H.1
-
69
-
-
4143109475
-
-
Securities Act of 1934 as amended, 15 USC 78j, 17 CFR 240.10b-5 and 10b-5.1
-
Securities Act of 1934 as amended 1951 15 USC 78j, 17 CFR 240.10b-5 and 10b-5.1
-
(1951)
-
-
-
70
-
-
4143062953
-
Protecting your digital assets. Technical journal publishers lead the way using digital object identifiers
-
February 13, Boston: Patricia Seybold Group. Retrieved July 2003
-
Seybold P.B. 2003, February 13 Protecting your digital assets. Technical journal publishers lead the way using digital object identifiers. Boston: Patricia Seybold Group. Retrieved July 2003 from http://www.psgroup.com
-
(2003)
-
-
Seybold, P.B.1
-
71
-
-
4143122610
-
Cybersquatting ain't what it used to be
-
Retrieved July 2003
-
Silver J. 2001 Cybersquatting ain't what it used to be. Retrieved July 2003 from http://www.coollawyers.com
-
(2001)
-
-
Silver, J.1
-
72
-
-
54949109804
-
Angry over spam? Get set for spim
-
December 31
-
Soronow J. 2003 December 31 Angry over spam? Get set for spim. Wall Street Journal, p. D5
-
(2003)
Wall Street Journal
-
-
Soronow, J.1
-
73
-
-
34548723709
-
Regulating cyberspace. The politics and technologies of control
-
Westport, CT: Greenwood Publishing
-
Spinello R.A. 2003 Regulating cyberspace. The politics and technologies of control. Westport, CT: Greenwood Publishing
-
(2003)
-
-
Spinello, R.A.1
-
74
-
-
4143064038
-
Why is spyware?
-
Retrieved April 20
-
Spychecker.com. 2004 Why is spyware?. Retrieved April 20, 2004 from http://www.spychecker.com
-
(2004)
-
-
-
75
-
-
0013464418
-
How activist organizations are using the Internet to build relationships
-
Taylor M. Kent M.L. White W.J. How activist organizations are using the Internet to build relationships Public Relations Review 27 2001 263-284
-
(2001)
Public Relations Review
, vol.27
, pp. 263-284
-
-
Taylor, M.1
Kent, M.L.2
White, W.J.3
-
76
-
-
4143097404
-
-
Telecommunications Act of, 47 USC 223(a)(1)(C)
-
Telecommunications Act of 1934. 47 USC 223(a)(1)(C)
-
(1934)
-
-
-
77
-
-
4143086374
-
-
Telemarketing and Consumer Fraud and Abuse Protection Act., as amended, Pub. L. 103-297. 15 USC 6101-6108
-
Telemarketing and Consumer Fraud and Abuse Protection Act. 1994, as amended Pub. L. 103-297. 15 USC 6101-6108
-
(1994)
-
-
-
78
-
-
4143148928
-
-
No. CV-01-04166-MMC, 9th Cir
-
Farey-Jones T.V. 2003 No. CV-01-04166-MMC, 9th Cir
-
(2003)
-
-
Farey-Jones, T.V.1
-
79
-
-
36349004535
-
Report on cyberstalking: A new challenge for law enforcement and industry
-
U.S. Department of Justice, Washington, DC: Government Printing Office. Retrieved July 2003
-
U.S. Department of Justice. 1999 Report on cyberstalking: A new challenge for law enforcement and industry. Washington, DC: Government Printing Office. Retrieved July 2003 from http://www.usdog.gov/criminal/cybercrime/cyberstalking.htm
-
(1999)
-
-
-
80
-
-
0345325078
-
National do-not-call registry
-
U.S. Federal Trade Commission., Retrieved December 2003
-
U.S. Federal Trade Commission. 2003 National do-not-call registry. Retrieved December 2003 from http://www.donotcall.gov. 16 CFR 310
-
(2003)
-
-
-
81
-
-
4143102914
-
Report to the Congress: The impact of recent technological advances on the securities markets
-
U.S. Securities and Exchange Commission. Washington, DC: Government Printing Office. Retrieved July 2003
-
U.S. Securities and Exchange Commission. 1997 Report to the Congress: The impact of recent technological advances on the securities markets. Washington, DC: Government Printing Office. Retrieved July 2003 from http://www.sec.gov/news/studies/techrp97.htm
-
(1997)
-
-
-
82
-
-
4143061846
-
-
U.S. Securities and Exchange Commission., Regulation FD. 17 CFR 240, 243, 249
-
U.S. Securities and Exchange Commission. 1999 Regulation FD. 17 CFR 240, 243, 249
-
(1999)
-
-
-
83
-
-
4143091904
-
-
USA Patriotic Act aka Uniting and Strengthening America by Producing Appropriate Tools to Intercept and Obstruct Terrorism Act., Pub. L.107-56. 28 USC 994(p)
-
USA Patriotic Act aka Uniting and Strengthening America by Producing Appropriate Tools to Intercept and Obstruct Terrorism Act. 2001 Pub. L.107-56. 28 USC 994(p)
-
(2001)
-
-
-
84
-
-
1242314504
-
May 21 How fraudsters set traps and take the credit
-
Water R. 2003 May 21 How fraudsters set traps and take the credit. Financial Times, p. SR-1
-
Financial Times
-
-
Water, R.1
-
85
-
-
4143105043
-
Working to Halt Online Abuse
-
WHOweb site. Retrieved July 2003
-
Working to Halt Online Abuse. 2003 WHOweb site. Retrieved July 2003 from http://www.haltabuse.org
-
(2003)
-
-
-
86
-
-
0003784413
-
Managing digital assets. Options for cultural and educational organizations
-
Los Angeles: Getty Information Institute
-
Zorich D.M. 1999 Managing digital assets. Options for cultural and educational organizations. Los Angeles: Getty Information Institute
-
(1999)
-
-
Zorich, D.M.1
|