-
1
-
-
64849086218
-
-
IP and business: Second life - brand promotion and unauthorized trademark use in virtual worlds. WIPO Magzine, Nov. 2007. http://www.wipo.int/wipo- magazine/en/2007/06/article-0004.html.
-
IP and business: Second life - brand promotion and unauthorized trademark use in virtual worlds. WIPO Magzine, Nov. 2007. http://www.wipo.int/wipo- magazine/en/2007/06/article-0004.html.
-
-
-
-
2
-
-
34547332566
-
A roadmap for comprehensive online privacy policy management
-
July
-
A. I. Antón, E. Bertino, N. Li, and T. Yu. A roadmap for comprehensive online privacy policy management. Communications of the ACM, 50(7):109-116, July 2007.
-
(2007)
Communications of the ACM
, vol.50
, Issue.7
, pp. 109-116
-
-
Antón, A.I.1
Bertino, E.2
Li, N.3
Yu, T.4
-
3
-
-
33847749523
-
HIPAA's effect on web site privacy policies
-
Jan./Feb
-
A. I. Antón, J. B. Earp, M. W. Vail, N. Jain, C. M. Gheen, and J. M. Frink. HIPAA's effect on web site privacy policies. IEEE Security & Privacy, 5(1):45-52, Jan./Feb. 2007.
-
(2007)
IEEE Security & Privacy
, vol.5
, Issue.1
, pp. 45-52
-
-
Antón, A.I.1
Earp, J.B.2
Vail, M.W.3
Jain, N.4
Gheen, C.M.5
Frink, J.M.6
-
4
-
-
64849100850
-
A taxonomy for the design and evaluation of networked virtual environments: Its application to collaborative design
-
Feb
-
M. Baladi, H. Vitali, G. Fadel, J. Summers, and A. Duchowski. A taxonomy for the design and evaluation of networked virtual environments: its application to collaborative design. International Journal on Interactive Design and Manufacturing, 2(1):17-32, Feb. 2008.
-
(2008)
International Journal on Interactive Design and Manufacturing
, vol.2
, Issue.1
, pp. 17-32
-
-
Baladi, M.1
Vitali, H.2
Fadel, G.3
Summers, J.4
Duchowski, A.5
-
6
-
-
37249053884
-
Social network sites: Definition, history, and scholarship
-
Oct
-
D. M. Boyd and N. B. Ellison. Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication, 13(1):210-230, Oct. 2008.
-
(2008)
Journal of Computer-Mediated Communication
, vol.13
, Issue.1
, pp. 210-230
-
-
Boyd, D.M.1
Ellison, N.B.2
-
7
-
-
45949085917
-
Key differences between web 1.0 and web 2.0
-
June
-
G. Cormode and B. Krishnamurthy. Key differences between web 1.0 and web 2.0. First Monday, 13(6), June 2008. http://www.uic.edu/htbin/cgiwrap/bin/ojs/ index.php/fm/article/viewArticle/2125/1972.
-
(2008)
First Monday
, vol.13
, Issue.6
-
-
Cormode, G.1
Krishnamurthy, B.2
-
8
-
-
64849086720
-
Virtual trademarks
-
C. Dougherty and G. Lastowka. Virtual trademarks. SSRN, 2008. http://ssrn.com/abstract=1093982.
-
(2008)
SSRN
-
-
Dougherty, C.1
Lastowka, G.2
-
9
-
-
56749183956
-
Facebook bug dishes out notes designated private
-
Oct. 2007
-
D. Goodin. Facebook bug dishes out notes designated private. The Register, Oct. 2007. http://www.theregister.co.uk/2007/10/23/facebook-privacy- bug/.
-
The Register
-
-
Goodin, D.1
-
10
-
-
64849109254
-
Virtual worlds as comparative law
-
J. Grimmelmann. Virtual worlds as comparative law. New York Law School Law Review, 47(1):147-184, 2004. http://ssrn.com/abstract=707184.
-
(2004)
New York Law School Law Review
, vol.47
, Issue.1
, pp. 147-184
-
-
Grimmelmann, J.1
-
11
-
-
64849097453
-
Profiling: From data to knowledge
-
M. Hildebrandt. Profiling: From data to knowledge. Datenschutz und Datensicherheit, 30(9):548-552, 2006. http://www.fidis.net/fileadmin/fidis/ publications/2006/DuD09-2006-548.pdf.
-
(2006)
Datenschutz und Datensicherheit
, vol.30
, Issue.9
, pp. 548-552
-
-
Hildebrandt, M.1
-
12
-
-
64849089684
-
Recent developments in shrinkwrap, clickwrap and browsewrap licenses in the United States
-
Sept
-
R. G. Kunkel. Recent developments in shrinkwrap, clickwrap and browsewrap licenses in the United States. Murdoch University Electronic Journal of Law, 9(3), Sept. 2002. http://www.murdoch.edu.au/elaw/issues/v9n3/ kunkel93nf.html.
-
(2002)
Murdoch University Electronic Journal of Law
, vol.9
, Issue.3
-
-
Kunkel, R.G.1
-
13
-
-
64849103833
-
-
F. G. Lastowka and D. Hunter. The laws of the virtual worlds. Public Law and Legal Theory Research Paper Series Research Paper No. 26, University of Pennsylvania Law School, May 2003. http://papers.ssrn.com/abstract=402860.
-
F. G. Lastowka and D. Hunter. The laws of the virtual worlds. Public Law and Legal Theory Research Paper Series Research Paper No. 26, University of Pennsylvania Law School, May 2003. http://papers.ssrn.com/abstract=402860.
-
-
-
-
18
-
-
33645769997
-
The great debate - law in the virtual world
-
Feb
-
D. G. Post and D. R. Johnson. The great debate - law in the virtual world. First Monday, 11(2), Feb. 2006. http://firstmonday.org/issues/ issue11-2/post/.
-
(2006)
First Monday
, vol.11
, Issue.2
-
-
Post, D.G.1
Johnson, D.R.2
-
20
-
-
37249004244
-
Data protection and privacy laws in the light of RFID and emerging technologies
-
C. Lambrinoudakis, G. Pernul, and A. M. Tjoa, editors, TrustBus 2007, of, Springer-Verlag
-
G. Quirchmayr and C. C. Wills. Data protection and privacy laws in the light of RFID and emerging technologies. In C. Lambrinoudakis, G. Pernul, and A. M. Tjoa, editors, TrustBus 2007, volume 4657 of Lecture Notes in Computer Science, pages 155-164. Springer-Verlag, 2007.
-
(2007)
Lecture Notes in Computer Science
, vol.4657
, pp. 155-164
-
-
Quirchmayr, G.1
Wills, C.C.2
-
21
-
-
64849088369
-
Authorship in the age of the conducer
-
E. Reuveni. Authorship in the age of the conducer. SSRN, 2008. http://ssrn.com/abstract=1113491.
-
(2008)
SSRN
-
-
Reuveni, E.1
-
22
-
-
27344448355
-
Technology, security and privacy: The fear of frankenstein, the mythology of privacy and the lessons of king Ludd
-
7(Fall):123-221, Dec, http
-
K. A. Taipale. Technology, security and privacy: The fear of frankenstein, the mythology of privacy and the lessons of king Ludd. Yale Journal of Law and Technology, 7(Fall):123-221, Dec. 2004. http://www.yjolt.org/7/fall/taipale-123.
-
(2004)
Yale Journal of Law and Technology
-
-
Taipale, K.A.1
-
23
-
-
0035001147
-
Evaluating the reverse engineering capabilities of Web tools for understanding site content and structure: A case study
-
May
-
S. Tilley and S. Huang. Evaluating the reverse engineering capabilities of Web tools for understanding site content and structure: A case study. 23rd ACM/IEEE International Conference on Software Engineering (ICSE'01), pages 514-523, May 2001.
-
(2001)
23rd ACM/IEEE International Conference on Software Engineering (ICSE'01)
, pp. 514-523
-
-
Tilley, S.1
Huang, S.2
|