selected bibliography - ucsb · 2015. 10. 21. · selected bibliography on law, information policy,...

30

Upload: others

Post on 29-Aug-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Selected Bibliography - UCSB · 2015. 10. 21. · Selected Bibliography on Law, Information Policy, and Spatial Databases Compiled by: Harlan J. Onsrud Jeffrey Johnson Xavier Lopez
Page 2: Selected Bibliography - UCSB · 2015. 10. 21. · Selected Bibliography on Law, Information Policy, and Spatial Databases Compiled by: Harlan J. Onsrud Jeffrey Johnson Xavier Lopez

Selected Bibliographyon

Law, Information Policy, andSpatial Databases

Compiled by:

Harlan J. OnsrudJeffrey JohnsonXavier Lopez

Department of Surveying EngineeringUniversity of Maine

Orono, Maine 04469-5711

National Center for Geographic Information and AnalysisReport 94-2

Page 3: Selected Bibliography - UCSB · 2015. 10. 21. · Selected Bibliography on Law, Information Policy, and Spatial Databases Compiled by: Harlan J. Onsrud Jeffrey Johnson Xavier Lopez

ii

Preface

This selected bibliography has been prepared as part of the preparation for an NCGIA Initiativeon Law, Information Policy, and Spatial Databases. Articles have been placed within one of thefollowing categories:

1. Freedom of Information, Open Records, and Government Charges for Information2. Privacy3. Copyright, Patent, and Trade Secrets4. Computer Contracts, Licensing, Electronic Document Interchange, and Encryption5. Liability and Admissibility6. General Books, Articles, and Bibliographies

In order to avoid duplication, articles that address issues under more than one of the categorieshave been included in the bibliography under their primary theme.

Although numerous articles in some of the categories covered by this bibliography are containedin the popular and general academic literature, this bibliography has focused on inclusion ofarticles contained in the law literature and GIS literature. We have also avoided references tospecific court cases and legislation in the bibliography.

The electronic form of the bibliography is available in formats appropriate for use with mostdesk top bibliographic software programs. Copies may be obtained by anonymous FTP atgrouse.umesve.maine.edu under the directory \pub\NCGIA\I16-Legal. Gopher users shouldpoint to the above address, but look under the folders "National Center for GeographicInformation and Analysis" and "I16-Legal."

Page 4: Selected Bibliography - UCSB · 2015. 10. 21. · Selected Bibliography on Law, Information Policy, and Spatial Databases Compiled by: Harlan J. Onsrud Jeffrey Johnson Xavier Lopez

iii

Table of Contents

Chapter Page

1. Freedom of Information, Open Records, and Government Charges for Information 1

2. Privacy 7

3. Copyright, Patents, and Trade Secrets 13

4. Computer Contracts, Licensing, Electronic Document Interchange, and Encryption 17

5. Liability and Admissibility of Computer Evidence 19

6. General Books, Articles, and Bibliographies 23

Page 5: Selected Bibliography - UCSB · 2015. 10. 21. · Selected Bibliography on Law, Information Policy, and Spatial Databases Compiled by: Harlan J. Onsrud Jeffrey Johnson Xavier Lopez

1

Freedom of Information, Open Records, and Government Charges for Information

Allen, Kenneth B. (1992). “Access to GovernmentInformation.” Government Information Quarterly 9.1: 67.

Allen, Kathleen M. S., Stanton W. Green, and Ezra B. W. Zubrow (1990). “Chapter 5: GIS,Archaeology and Freedom of Information.” Interpreting Space: GIS and Archaeology . NewYork: Taylor & Francis. 54-63.

American Library Association (1986). Freedom and Equality of Access to Information: A Report to the American Library Association . ALA.

Archer, Hugh (1988). Providing and Selling Access to AM/FM Data. AM/FM Annual Convention . Snowmass, CO: 1: 12 -20.

Archer, Hugh, and Peter L. Croswell (1989). “Public Access to Geographic InformationSystems: An Emerging Legal Issue.” Photogrammetric Engineering and Remote Sensing November 1989: 1575-1581.

Australian Land Information Council (1990). Access to Government Land Information. Issues in Land Information Management-Paper Number 4 . Belconnen ACT, Australia: AustralianLand Information Council.

Australian Land Information Council (1990). Commercialization or Public Benefit. Issues in Land Information Management-Paper Number 3 . Belconnen ACT, Australia: Australian LandInformation Council.

Barlow, John Perry (1993). “Electronic Frontier: Bill 'O Rights.” Communications of the ACM 36.3: 21.

Bass, G. , and D. Plocher (1989). “Strengthening Federal Information Policy: Opportunities andRealities at OMB.” Software Law Journal .3: 413-450.

Berman, J.J. (1989). “The Right to Know: Public Access to Electronic Public Information.” Software Law Journal .3 : 491-524.

Page 6: Selected Bibliography - UCSB · 2015. 10. 21. · Selected Bibliography on Law, Information Policy, and Spatial Databases Compiled by: Harlan J. Onsrud Jeffrey Johnson Xavier Lopez

2

Blakemore, M. (1991). “Access and security issues in the provision of geographic information.” Metadata in the Geosciences . Ed. D. Medyckyj-Scott. Loughborough, U.K.: Group DPublications Ltd.

Blumberg, D.F. (1992). “Assessment of the Legal issues and Conflicts in the InformationTechnology Service Market.” Computer Law 9: 14-23.

Braverman, Burt A. , and Wesley R. Heppler (1981). “ A Practical Review of State OpenRecords Laws.” George Washington Law Review 49.4: 720 - 760.

Brown, Kay (1992). “In My Opinion: A Response to Earl Epstein.” URISA Journal 4.1: 6-8.

Carome, Patrick, and Thomas Susman (1992). “American Bar Association Symposium of FOIA25th Anniversary.” Government Information Quarterly 9.3: 223.

Castle, Gilbert H., ed. (1993). Profiting From a Geographic Information System . Fort Collins,CO: GIS World, Inc. 394.Chapman, Bert (1992). “Willing to Provide But Unable to Support: The Dilemma of SmallerDepositories in an Electronic Era.” Government Information Quarterly 9.1: 81.

Clapp, James L (1990). “Approaching LIS as a Public Service Facility.” ACSM Bulletin .127:43-45.

Cleveland, H. (1985). “The Twilight of Hierarchy: Speculations on the Global InformationSociety.” Public Administration Review Jan/Feb 1985: 185-195.

Dale, Peter (ed.) (1989). “Access to Data.” International Federation of Surveyors Commission Newsletter 3.2:

Dando, Lori Peterson (1991). Open Records Law, GIS, and Copyright Protection; Life AfterFEIST. Annual Conference of the URISA . San Francisco, CA: URISA. 4: 1-17.

Dando, Lori Peterson (1992). A Survey of State Open Records Laws in Relation to Recovery ofData Base Development Costs: An Ends in Search of a Means. Annual Conference of the URISA . Washington D.C.: URISA. 4: 85-110.

Dando, Lori Petersen (1993). “Balancing Cost Recovery, State Open Records Laws.” URISA News .133: 1-4.

Dansby, Bishop, Harlan Onsrud, and Louis Milrad (1992). “GIS Legal Issues.” ACSM Bulletin .140: 40.

Dansby, H. Bishop (1991). A Survey and Analysis of State GIS Legislation. GIS/LIS '91 .Atlanta, GA: 1: 441-450.

Davis, Bruce (1993). “Opportunities in the Commercial Use of Remote Sensing and GISTechnologies: An Overview of NASA's Visiting Investigator Program at Stennis Space Center.” Photogrammetric Engineering and Remote Sensing 59.6: 935.

Department of Trade and Industry (1990). Government-held Tradeable Information: Guidelines for government departments in dealing with the private sector . HMSO.

Page 7: Selected Bibliography - UCSB · 2015. 10. 21. · Selected Bibliography on Law, Information Policy, and Spatial Databases Compiled by: Harlan J. Onsrud Jeffrey Johnson Xavier Lopez

3

DeSanti, Vincent (1991). “On Public Access to Electronic Information: Will the "Public" StepForward Please?” Government Information Quarterly 8.1: 101.

Dillehay, Bette (1993). “Access, Privacy and Electronic Information- Time For New Laws?” GIS Law 1.4: 1-7.

Dugan, Robert E., and Joan F. Cheverie (1992). “Electronic Government Information and theDepository Library Program: Paradise Lost?” Government Information Quarterly 9.3: 269.

Epstein, E. F. (1991). “In My Opinion.” URISA Journal 3.1: 2-4.

Epstein, Earl F. , and John D. McLaughlin. (1990). “A Discussion on Public Information: Whoowns it? Who uses it? Should we limit access?” ACSM Bulletin .128: 33-38.

Fricker, Richard L. (1990). “Information, Please: Is the FOIA a Myth?” ABA Journal June: 57-61.

Friedley, Dale, and Larry Colbert (1991). Reaching for Consensus in Public Information AccessPolicies. Annual Conference of the URISA . San Francisco, CA: URISA. 4: 50-64.Furness, Lee, and Donald Bowie (1992). Organisational Structuring and Charging forGeographic Information System Services. Annual Conference of the AURISA . Queensland,Australia: AURISA. 1: 173-182.

Gandhi, S. (1991). Public and Private Access to Geographic Information Systems - Economicand Legal Policy Implications. GIS/LIS '91 . Atlanta, GA: 2: 945-953.

Gey, Fredric C. (1993). “Information Distribution Practices of Federal Statistical Agencies: TheCensus Bureau Example.” Government Information Quarterly 10.3: 319.

Goldman, Patti A (1990). “The Freedom of Information Act Needs No Amendment to EnsureAccess to Electronic Records.” Government Information Quarterly 7.4: 398.

Graham, J. M (1984). “Note: Fair Administration of the Freedom of Information Act after theComputer Revolution.” Computer/Law Journal 5: 51 - 76.

Grodsky, Jamie A. (1990). “The Freedom of Information Act in the Electronic Age: The Statuteis Not User Friendly.” Jurimetrics Journal 31.17: 17-51.

Guthrie, Katharine Kendall (1991). “The politics of citizen access technology: The developmentof community communication and information utilities in four cities.” Ph.D. University ofSouthern California.

Hane, Paula (1992). “The Linear File- Access to Government Information.” Database 15.5: 8.

Hernon, Peter (1991). “Government Information Policy Principles.” Government Information Quarterly 8.4: 393.

Hernon, Peter (1993). “Equity in Public Access to Government Information.” Government Information Quarterly 10.3: 301.

Hill, Christopher T. (1989). “Federal Technical Information and U.S. Competitiveness: Needs,Opportunities, and Issues.” Government Information Quarterly 6.1: 31-38.

Page 8: Selected Bibliography - UCSB · 2015. 10. 21. · Selected Bibliography on Law, Information Policy, and Spatial Databases Compiled by: Harlan J. Onsrud Jeffrey Johnson Xavier Lopez

4

Hiller, Steve, and Jenny Marie Johnson (1989). “Public Access Computer-Assisted Mappingand the Instructional Program.” Reference Services Review 17.4: 87.

Hull, Elizabeth (1992). “Taking Liberties: National Barriers to the Free Flow of Ideas.” Government Information Quarterly 9.2: 216.

Iannaccone, A.C., and L. Volonino (1992). “Marginal Cost and Relevant Market Determinationin Information Technology Antitrust Cases.” Rutgers Computer and Technology Law Journal 18: 681-729.

Jaspin, E., and M. Sableman (1991). “News Media Access to Computer Records: UpdatingInformation Laws in the Electronic Age.” St. Louis University Law Journal 36: 349-407.

King, J.L. (1993). “Problems in Public Access Policy for GIS Databases: An EconomicPerspective.” Sharing Geographic Information . Ed. H.J. Onsrud and G. Rushton. Rutgers:CUPR Press.

Kirtley, Jane E (1989). “From File Drawer to Floppy Disk: FOIA Implications of ElectronicData Collection Raised in Two Recent Supreme Court Cases.” Government Information Quarterly 6.4: 335.Kozub, Natalie (1992). Communications and Marketing Government Data: The Good CorporateCitizen. Annual Conference of the URISA . Washington, D.C.: URISA. 4: 111-120.

Kozub, Natalie E. (1991). An Exercise in Strategic Planning: Development of Data Policy forthe Information Age. Annual Conference of the URISA . San Francisco, CA: URISA. 4: 39-49.

Krippaehne, T. (1992). “Hidden Costs of Automation.” Washington State Bar News 46: 23-24.

Lacy, Dan Mabry (1986). Freedom and Equality of Access to Information: a report to the American Library Association . Chicago: ALA. 124.

Laska, Richard M. (1990). “Feasibility of Instituting User Charges for EPA's Office of Researchand Development Reports.” Government Information Quarterly 7.1: 25.

Lauer, Donald T (1991). “Institutional Issues Affecting the Integration and Use of RemotelySensed Data and Geographic Information Systems.” Photogrammetric Engineering and Remote Sensing 57.6:

Lawrence, Jeff (1990). The Economics of Pricing GIS Products. Annual Conference of URISA .Edmonton, Alberta: 2 : 81-87.

Lerner, Nancy B. (1992). Developing a Successful Information Access Policy. Annual Conference of the URISA . Washington, D.C.: URISA. 4: 79-85.

Lousma, Jack R (1993). “Rising to the Challenge: The Role of Information Sciences.” Photogrammetric Engineering and Remote Sensing 59.6.

MacPherson, C. B. (1973). Democratic Theory: Essays in Retrieval . Oxford University Press.

Maffini, G. (1990). “The Role of Public Domain Databases in the Growth and Development ofGIS.” Mapping Awareness 49-54.

Page 9: Selected Bibliography - UCSB · 2015. 10. 21. · Selected Bibliography on Law, Information Policy, and Spatial Databases Compiled by: Harlan J. Onsrud Jeffrey Johnson Xavier Lopez

5

McClure, Charles R., Peter Hernon, and Harold Relyea (1989). United States government information policies: views and perspectives . Information management, policy, and services .Norwood, N.J.: Ablex. 349.

Milrad, L. , and M.A. Wilkinson (1992). “Open Access to Computer Programs Produced byFederal Government Agencies.” GIS Law 1.1: 16.

Morton, Sandy I (1990). “Federal Information Policy.” Government Information Quarterly 7.1:67.

Napier, B.W. (1992). “The Future of Information Technology Law.” Cambridge Law Journal 51: 46-65.

Nilsen, Kirsti (1993). “Canadian Government Electronic Information Policy.” Government Information Quarterly 10.2: 203.

Nimmer, R.T., and P.A. Krauthaus (1992). “Information as a Commodity: New Imperatives ofCommercial Law.” Law and Contemporary Problems 55: 103-130.

Onsrud, H.J. (1992). “In Support of Cost Recovery for Publicly Held Geographic Information.” GIS Law 1.2: 1-7.

Onsrud, H.J. (1992). “In Support of Open Access for Publicly Held Geographic Information.” GIS Law 1.1: 3-6.

Osborne, D. , and T. Gaebler (1992). Reinventing Government: How the Entrepreneurial Spirit is Transforming the Public Sector . Reading, MA: Addison-Wesley Publishing.

Perritt, Henry H. (1989). “Government Information Goes On-Line.” Technology Review 92.8:60-67.

Puissegur, Alma (1989). Does Charging for Public Information Eradicate the Defense ofSovereign Immunity? Managing the Risks and Recovering the Costs of Geographic and Facilities Management Systems . Madison, WI: University of Wisconsin, Madison; Departmentof Engineering Professional Development.

Puissegur, Alma (1989). An Overview of State Open Records Laws. Managing the Risks and Recovering the Costs of Geographic and Facilities Management Systems . Univ. of Wisconsin-Madison: Department of Engineering Professional Development.

Rhind, D. (1992). “Data Access, Charging and Copyright and their Implications forGeographical Information Systems.” International Journal of Geographical Information Systems 6.1: 13.

Roitman, Howard (1988). Public Records Laws: A Proposed Model for Changes. 26th URISA Proceedings . Los Angeles, California: URISA. 4: 338-347.

Roitman, Howard (1989). Towards a Practical Policy on Public Access to Automated MappingData Bases. Managing the Risks and Recovering the Costs of Geographic and Facilities Management Systems . Univ. of Wisconsin-Madison: Department of Engineering ProfessionalDevelopment.

Roitman, H. (1990). “Legal Issues in Providing Public Access to an AMS: Case Studies andVariances.” URISA Journal 2: 38 - 45.

Page 10: Selected Bibliography - UCSB · 2015. 10. 21. · Selected Bibliography on Law, Information Policy, and Spatial Databases Compiled by: Harlan J. Onsrud Jeffrey Johnson Xavier Lopez

6

Rowley, J, and P. Gilbert (1989). “The Market for Land Information Services, Systems andSupport.” AGI Yearbook . London: The Association of Geographic Information. 85-91.

Rubinstein, Gwen (1990). “The Quantification of Information: The Paperwork Budget and theBirth of the Burden Hour.” Government Information Quarterly 7.1: 73.

Samuelson, Pamela (1991). “First Amendment Rights for Information Providers?” Communications of the ACM 34.6: 19-23.

Sherick, L. G. (1978). How to Use the Freedom of Information Act (FOIA) . New York: ARCOPublishing Co., Inc.

Sherwood, Diane E (1990). “Strategic Arguements and Tactical Battles over FederalInformation Policy Development.” Government Information Quarterly 7.1: 59.

Shill, Harold B. (1992). “Information 'Publics' and Equitable Electronic Access to ElectronicGovernment Information: The Case of Agriculture.” Government Information Quarterly 9.3:305.

Special Committee on Audit Activity and Access to Records (1989). DCAA's Access to Records . American Bar Association.Stahl, E.M. (1993). “City Information System There for the Asking.” Bellevue, Washington Journal-American A1.

Stewart, Robert Keith (1990). “Access and Efficiency in Reagan-era information policy: A casestudy of the attempt to privatize the National Technical Information Service.” Ph.D. Universityof Washington.

Stipek, Lawrence, and David Toccaca (1993). Implementing and Assessing the Value of DirectPublic Access to the Loudon County, Virginia Geographic Information System. Annual Conference of the URISA . Atlanta, GA: 2: 202-208.

Thorpe, John A. (1989). Private Ownership of a Multi-User GIS. Annual Conference of the URISA . Boston, MA: 2 : 95-99.

Tosta, N. (1991). “Public Access: Right or Privilege?” Geo Info Systems Nov/Dec 1991: 20-62.

Tosta, Nancy, and Peter Croswell (1992). The Effects of 'Policies' on the Implementation andUse of Information Technology. Annual Conference of the URISA . Washington, D.C.: URISA.5: 272-289.

Turner, Ronald R. (1991). “U.S. Department of Energy: A case study of decision-making ininformation access policy.” D.P.A. University of Southern California.

Villasana, Sol (1990). “The People's Right to Know in the Age of Electronic Information.” Barrister 17.3: 61-64.

Weiss, Peter N. (1991). “Can They Keep Abreast?” Government Information Quarterly 8.4:377.

Westhoff, Jurgen (1993). “The EEC Electronic Information Services Market.” Government Information Quarterly 10.3: 369.

Page 11: Selected Bibliography - UCSB · 2015. 10. 21. · Selected Bibliography on Law, Information Policy, and Spatial Databases Compiled by: Harlan J. Onsrud Jeffrey Johnson Xavier Lopez

7

Westin, A. F. (1971). Information Technology in a Democracy . Cambridge, MA: HarvardUniversity Press.

Wood, Fred B. (1991). “Helping America Compete through More Effective Use of Scientificand Technical Information: An Opportunity for Office of Science and Technology PolicyLeadership.” Government Information Quarterly 8.1: 105-112.

Woodsford, P.A. (1991). Demand for Geographic Data From the Private Sector in Europe. La Cartografia Española ante el Mercado Unico Europeo . La Coruna, Spain:

Page 12: Selected Bibliography - UCSB · 2015. 10. 21. · Selected Bibliography on Law, Information Policy, and Spatial Databases Compiled by: Harlan J. Onsrud Jeffrey Johnson Xavier Lopez

8

Privacy

Alder, Allan , and Morton H. Halperin (1983). Litigation under the Federal Freedom of Information Act and Privacy Act . Washington, D. C.:Center for National Security Studies.

Anderson, Ronald E., et al. (1993). “Using the new ACM code of ethics in decision making.” Communications of the ACM .February.

Anonymous (1977). “Formalism, Legal Realism, and Constitutionally Protected Privacy Underthe Fourth and Fifth Amendments.” Harvard Law Review 90: 945-991.

Anonymous (1984). “Protecting Privacy Under the Fourth Amendment.” The Yale Law Journal 91: 313-343.

Anonymous (1991). “The Constitutional Protection of Informational Privacy.” Boston University Law Review 71.1: 133-160.

Anonymous (1991). “Privacy and Computer Law.” Law Institute Journal 65.6: 462-522.

Anonymous (1992). “An Overview of Computer Matching, Its Privacy Implications, and theRegulatory Schemes of Select Jurisdictions.” Government Information Quarterly 9.1: 35.

Australian Land Information Council (1990). Data Custodianship/Trusteeship. Issues in Land Information Management-Paper Number 1 . Belconnen ACT, Australia: Australian LandInformation Council.

Bedingfield, D. (1992). “Privacy or Publicity? The Enduring Confusion Surrounding theAmerican Tort of Invasion of Privacy.” Modern Law Review 55: 111-118.

Benjamin, L.M. (1991). “Privacy, Computers, and Personal Information: Toward Equality andEquity in an Information Age.” Communications and the Law 13: 3-16.

Berman, J. , and J. Goldman A Federal Right of Information Privacy: The Need for Reform .Washington, D.C.: The Benton Foundation.

Page 13: Selected Bibliography - UCSB · 2015. 10. 21. · Selected Bibliography on Law, Information Policy, and Spatial Databases Compiled by: Harlan J. Onsrud Jeffrey Johnson Xavier Lopez

9

Blume, Peter (1992). “An EEC Policy for Data Protection.” Computer/Law Journal 11.3: 399.

Blume, Peter (1993). “Credit Reporting and Data Protection: Efficiency Versus Privacy.” The International Computer Lawyer 1.8: 12.

Brody, H. (1992). “Of Bytes and Rights.” Technology Review 95.8: 22-29.

Bruce, Jo Anne Czecowski (1988). Privacy and Confidentiality of Health Care Information . 2ed. Chicago, IL: American Hospital Publishers.

Bygrave, L.A. (1990). “The Privacy Act of 1988: A Study in the Protection of Privacy and theProtection of Political Power.” Federal Law Review 19: 128-153.

Bynum, T., W. Maner, and J. Fodor, ed. (1992). Computing and Privacy . New Haven, CT:Research Center on Computing and Society.

Chaum, David (1992). “Achieving Electronic Privacy.” Scientific American August 01: 96.

Clarke, Roger A. (1989). “Information Technology and Dataveillance.” Communications of the ACM 31.5: 498-512.

Commissioner/Ontario (1992). “Computer Matching, Its Privacy Implications, and theRegulatory Schemes of Select Jurisdictions.” Government Information Quarterly 9.1: 35-49.

Committee on House Administration, United States. Congress. House. (1976). Legislative History of the Privacy Act of 1974: Source Book on Privacy . Washington D.C.: U.S.Government Printing Office.

Cruse, R.E. (1992). “Invasions of Privacy and Computer Matching Programs: AnotherPerspective.” Computer/Law Journal 11.3: 461-480.

Dansby, H. Bishop (1991). Informational Privacy and GIS. Annual Conference of the URISA .San Francisco, CA: URISA. 4: 18-28.

Donaldson, Kelly P., and Merv Sedunary (1992). Privacy and Confidentiality in LandInformation Systems. Annual Conference of the AURISA . Queensland, Australia: AURISA. 1:164-172.

Doyle, Charles (1990). “Privacy in the Age of Computers.” CRS Review .July/August: 6-8.

Epstein, Richard A. (1980). “A Taste for Privacy? Evolution and the Emergence of aNaturalistic Ethic.” Journal of Legal Studies 9: 665-681.

Estadella-Yuste, Olga (1992). “The Draft Directive of the European Community Regarding theProtection of Personal Data.” International and Comparative Law Quarterly 41: 170-178.

Flaherty, David H. (1979). Privacy and Access to Government Data for Research: An International Bibliography . London: Mansell.

Flaherty, David H. (1989). Protecting Privacy in Surveillance Societies . Chapel Hill andLondon: The University of North Carolina Press. 467.

Page 14: Selected Bibliography - UCSB · 2015. 10. 21. · Selected Bibliography on Law, Information Policy, and Spatial Databases Compiled by: Harlan J. Onsrud Jeffrey Johnson Xavier Lopez

10

Flaherty, David H. (1991). “On the Utility of Constitutional Rights to Privacy and DataProtection.” Case Western Reserve Law Review 41: 831-855.

Fong, Elizabeth (1977). Computer Science & Technology: A Data Base Management Approach to Privacy Act Compliance . Washington D.C.: Dept. of Commerce, National Bureau ofStandards.

Fortner, Robert S. (1986). “Physics and metaphysics in an information age: Privacy, dignity andidentity.” Communication 9: 151-172.

Freedman, W. (1987). The Right of Privacy in the Computer Age . Greenwood PublishingGroup, Inc.

Freid, C. (1968). “Privacy.” Yale Law Journal 77.3: 475-493.

Gerhart, J. M. (1987). “Technology Encroaches on the Reasonable Expectation of Privacy: DowChemical Company vs. United States.” New Mexico Law Review 17: 391-408.

Goldstein, B.D. (1992). “Confidentiality and Dissemination of Personal Information: anExamination of State Laws Governing Data Protection.” Emory Law Journal 41: 1185-1280.Gormley, K. (1992). “One Hundred Years of Privacy.” Wisconsin Law Review : 1335-1441.

Gormley, K., and R.G. Hartman (1992). “Privacy and the States.” Temple Law Review 65:1279-1323.

Graham, Jonathan P. (1987). “Privacy, Computers, and the Commercial Dissemination ofPersonal Information.” Texas Law Review June:

Guynes, C.S. (1989). “Protecting Statistical Databases: A Matter of Privacy.” Computers and Society 19.1: 15-23.

Halpern, Sheldon W. (1991). “Rethinking the Right of Privacy: Dignity, Decency, and the Law'sLimitations.” Rutgers Law Review 43: 539-563.

Hershleifer, J., and R. Epstein (1980). “Privacy: Its Origin, Function and Future.” The Journal of Legal Studies 9: 649-682.

Hiramatsu, Tsuyoshi (1993). “Telecommunications in Japan: Nonprotection of Privacy.” The International Computer Lawyer 1.3: 22.

Hoffman, Lance J., ed. (1992). The Second Conference on Computers, Freedom, and Privacy . 1vols. Computers, Freedom, and Privacy. Washington, D.C.: Association for ComputingMachinery, Inc. 163.

Howe, Eric (1991). “The United Kingdom's Data Protection Act.” Government Information Quarterly 8.4: 345.

Hughes, G. (1991). “An Overview of Data Protection in Australia.” Melbourne University Law Review 18: 83-120.

Karasik, Eve H. (1990). “A Normative Analysis of Disclosure, Privacy, and Computers: TheState Cases.” Computer/Law Journal 10.4: 603-634.

Page 15: Selected Bibliography - UCSB · 2015. 10. 21. · Selected Bibliography on Law, Information Policy, and Spatial Databases Compiled by: Harlan J. Onsrud Jeffrey Johnson Xavier Lopez

11

Kirby, Michael (1991). “Legal Aspects of Transborder Data Flows.” Computer/Law Journal 11.2: 233.

Klein, S.S. (1992). “Your Right to Privacy: a Selective Bibliography.” Legal Reference Series Quarterly 12: 217-231.

Kugelmass, Joel, and Gregg McVicar (1991). “Privacy in California.” California Journal 22.11: 493.

Kusserow, Richard F. (1984). “The Government Needs Computer Matching to Root out Wasteand Fraud.” Communications of the ACM 27.6: 542-545.

Laperriere, R., R. Cote, and G.A. LeBel (1992). “The Transborder Flow of Personal Data fromCanada: International and Comparative Law Issues.” Jurimetrics Journal 32.Summer: 547-569.

Larson, Erik (1993). The Naked Consumer: How Our Private Lives Become Public Commodities . Henry Holt & Co.

Laudon, Kenneth C. (1986). Dossier Society . New York: Columbia University Press. 415.

Leia, Gregory J. (1989). Telematics: Canadian Legal Response to Issues of Privacy andConfidentiality. Annual Conference of the URISA . Boston, MA: URISA. 4: 277-292.

Linowes, David F., and Ray C. Spencer (1990). “Privacy: The Workplace Issue of the '90s.” The John Marshall Law Review 23: 591-620.

Madsen, Wayne (1992). Handbook of Personal Data Protection . New York: Stockton Press.1015.

Marx, Gary T. (1986). “Chapter 9; The Iron Fist and the Velvet Glove: Totalitarian Potentialswithin Democratic Structures.” The Social Fabric: Dimensions and Issues . Ed. James E. Short.Beverly Hills, CA: Sage Publishers. 135-161.

McLean, Deckle (1993). “Privacy Gaining Heft as an FOIA Exemption.” Communications and the Law 15.1: 25-46.

McSweeney, A.D. (1992). “A Select Bibliography of Books, Articles, and Official ReportsRelating to Privacy and Data Protection.” Journal of Law and Information Science 3: 172-178.

Michael, James (1991). “Protecting Privacy.” Solicitors Journal 135.10: 304-305.

Morris, Linda, and Steven Pharr (1992). “Invasion of Privacy: A Dillemma for MarketingResearch and Database Technology.” Journal of Information Systems Management 43.10: 10.

Onsrud, Harlan (1993). GIS and Privacy. GIS/LIS '93 . Minneapolis, MN.

Pearson, Hilary E. (1991). “Data Protection in Europe.” The Computer Lawyer 8.8: 24.

Post, R.C. (1989). “The Social Foundations of Privacy: Community and Self in the CommonLaw Tort.” California Law Review 77.5: 957-1010.

Potvin, Louise (1991). “Privacy Issues in the Information Age: What Corporations Need toKnow.” Government Information Quarterly 8.1: 95.

Page 16: Selected Bibliography - UCSB · 2015. 10. 21. · Selected Bibliography on Law, Information Policy, and Spatial Databases Compiled by: Harlan J. Onsrud Jeffrey Johnson Xavier Lopez

12

Reidenberg, J.R. (1992). “Privacy in the Information Economy: A Fortress or Frontier forIndividual Rights?” Federal Communications Law Journal 44.2: 195-243 .

Reitman, Valerie (1991). “Firms scrap plans to sell database with personal details onconsumers.” The Philadelphia Inquirer Jan. 24, 1991: 1.

Relyea, Harlold C. (1993). “Security Classification Reform: The Waiting Agenda.” Government Information Quarterly 10.3: 333.

Rosenbaum, J.I. (1992). “The European Commission's Draft Directive on Data Protection.” Jurimetrics Journal 33: 1-12.

Rotenberg, Marc (1993). “Communications Privacy: Implications for Network Design.” Communications of the ACM 36.8: 61.

Rotenburg, Marc (1991). “In Support of a Data Protection Board in the United States.” Government Information Quarterly 8.1: 79.

Rothfeder, Jeffrey (1992). Privacy for Sale: How Computerization Has Made Everyone's Private Life an Open Secret . New York: Simon and Schuster. 218.Rubin, Michael Rogers (1988). Private rights, public wrongs: the computer and personal privacy . Norwood, NJ: Ablex Publishing Corporation.

Rubin, Michael Rogers (1989). “The Computer and Personal Privacy, Part III: The Regulationof Computer Records in the United States.” Library Hi Tech 7.3: 11.

Schwartz, John (1991). “How did they get my name?” Newsweek June 3: 40- 42.

Schwartz, Laurens R. (1989). “Chapter 8: Computer Privacy.” Computer Law Forms Handbook . New York, NY: Clark Boardman Company, Ltd. 325 - 332.

Schwartz, P. (1992). “Data Processing and Government Administration: the Failure of theAmerican Legal Response to the Computer.” Hastings Law Journal 43: 1321-1389.

Shattuck, J. (1984). “Computer Matching is a Serious Threat to Individual Rights.” Communications of the ACM June: 538-541.

Smith, Henry Jefferson (1990). “Managing information: A study of personal informationprivacy.” D.B.A. Harvard University.

Smith, R.E. (1992). “About Privacy In Compilation of State and Federal Privacy Laws .” Privacy Journal : 5-6 .

Smith, Robert Ellis (1992). Compilation of State and Federal Privacy Laws . 7 ed. Providence,RI: Privacy Journal.

Southard, C. Dennis (1989). “Individual Privacy and Governmental Efficiency: Technology'sEffect on the Government's Ability to Gather, Store, and Distribute Information.” Computer/Law Journal 9.3: 359.

Srinivasan, Srinija (1992). “Privacy and Data Protection in Japan.” Government Information Quarterly 9.2: 121.

Trubow, George (1987). Privacy Law and Practice . Mathew Bender.

Page 17: Selected Bibliography - UCSB · 2015. 10. 21. · Selected Bibliography on Law, Information Policy, and Spatial Databases Compiled by: Harlan J. Onsrud Jeffrey Johnson Xavier Lopez

13

Trubow, G. (1989). Watching the Watchers: The Coordination of Federal Privacy Policy .Washington, D.C.: The Benton Foundation.

Trubow, G.B. (1990). “Protecting Informational Privacy in the Information Society.” Northern Illinois University Law Review .10, 1990: 521-542.

Trubow, G.B. (1992). “The European Harmonization of Data protection Laws Threatens U.S.Participation in Trans Border Data Flow.” Northwestern Journal of International Law and Business 13: 159-176.

Tye, Larry (1993). “Privacy Lost in a High-Tech Era.” The Boston Sunday Globe September 5:1, 18.

U.S. Department of Justice (1992). Freedom of Information Act Guide and Privacy Act Overview . Washington, D.C.: United States Government Printing Office. 318.

Van Geel, Mieke (1992). “The Computer Matching and Privacy Act of 1988.” Tilburg Foreign Law Review 2.1: 41.

van Meurs, Philip Cornelus (1990). “Technology, society and dmocracy: The social impact of,and democratic control over technology, with special reference to information technology anddata protection.” Ph.D. London School of Economics and Political Science.

Vanberg, Harold E. (1988). “A Privacy Primer.” Texas Bar Journal .November: 1010-1015.

Warren, S.D. , and L. Brandeis (1890). “The Right to Privacy.” Harvard Law Review 4.5:193-220.

Wilkins, R. G. (1987). “Defining the 'Reasonable Expectation of Privacy': An EmergingTripartite Analysis.” Vanderbilt Law Review 40: 1077-1129.

Wilkinson, Margaret Ann (1992). “Impact of the Ontario "Freedom of Information andProtection of Privacy Act 1987" upon affected organizations.” Ph.D. The University of WesternOntario.

Wood, Charles Cresson (1991). “Burning Computer Security, Privacy, and Freedom Issues.” Computers and Security 10.6: 524.

Page 18: Selected Bibliography - UCSB · 2015. 10. 21. · Selected Bibliography on Law, Information Policy, and Spatial Databases Compiled by: Harlan J. Onsrud Jeffrey Johnson Xavier Lopez

15

Copyright, Patents, and Trade Secrets

Awerdick, J.W. (1993). “Who Owns the Data inthe Database?” The Practical Lawyer 39.4: 19-26.

Aziz, Baharuddin (1990). “ASEAN copyright law and U.S. intellectual property interests in theinformation age: A political-economic analysis.” Ph.D. University of Oregon.

Band, J. , and L.F.H. McDonald (1992). “The Proposed EC Database Directive: The Reversal ofFeist v. Rural Telephone.” The Computer Lawyer 9.6: 19-21.

Bartz, Philip D., and Jonathan Band (1991). “FEIST v. Rural Telephone: The Beginning of theEnd of Software Overprotection?” The Computer Lawyer 8.8: 24.

Baumgarten, John A. (1988). “Scope of Protection of Computer Programs Under CopyrightLaw.” Computer Software: Protection and Marketing . Patents, Copyrights, Trademarks, andLiterary Property Course Handbook Series. Practicing Law Institute.

Brooks, Daniel T. (1991). Patents, Copyrights, Trademarks, and Literary Property;. 13th Annual Computer Law Institute . New York City: Practising Law Institute. 687.

Brown, Jack E. (1991). “The Protection of High Technology Intellectual Property.” Computer/Law Journal 11.1: 29.

Dansby, H.B. (1991). “Recovering GIS Development Cost by Copyright.” GIS World April1991: 100-101.

Dowling, Thomas P. (1986). “Trade Secret Protection Through the Use of TRO's andPreliminary Injunctions.” Protection Trade Secrets . Copyrights, Trademarks, and LiteraryProperty Course Handbook Series. Practicing Law Institute.

Dunn, Susan A. (1986). “Defining the Scope of Copyright Protection for Computer Software.” Stanford Law Review 38:

Page 19: Selected Bibliography - UCSB · 2015. 10. 21. · Selected Bibliography on Law, Information Policy, and Spatial Databases Compiled by: Harlan J. Onsrud Jeffrey Johnson Xavier Lopez

16

Englund, Steven R. (1990). “Idea, Process, or Protected Expression?: Determining the Scope ofCopyright Protection of the Structure of Computer Programs.” Michigan Law Review :

Fleischmann, Eric (1987). “The Impact of Digital Technology on Copyright Law.” Computer/Law Journal 8.1: 1-22.

Fries, Janet (1992). “Intellectual Property in Digital Imaging Technology.” Bulletin of Law, Science, and Technology 84: 9-12.

Ginsburg, J.C. (1991). “Creation and Commercial Value: Copyright Protection of Works ofInformation in the United States.” Protecting Works of Fact: Copyright, Freedom of Expression and Information Law . Ed. E.J. Dommering. Deventer, Netherlands: Kluwer Law and TaxationPublishers.

Grover, Derrick, ed. (1989). The Protection of Computer Software- Its Technology and Application . Cambridge, NY: Cambridge University Press.

Hamilton, David (1991). “Can Electronic Property be Protected?” Science July 5: 23.

Hart, Robert (1989). “Legal protection--patents, copyright and trade marks.” The Protection of Computer Software--Its Technology and Application . Ed. Derrick Grover. Cambridge, NY:Cambridge University Press.

Jakes, J.M. , and E.R.Yoches (1989). “Basic Principles of Patent Protection for ComputerSoftware.” Communications of the ACM August: 922-924.

Jensen, Mary Brandt (1993). “Electronic Reserve and Copyright.” Computers in Libraries 13.3:

Johnson-Laird, Andrew (1992). “Reverse Engineering of Software: Separating Legal Mythologyfrom Actual Technology.” Software Law Journal 5.2: 331-354.

Johnston, Donald F. (1978). Copyright Handbook . New York: R.R. Bowker Co.

Karjala, Dennis S. (1988). “United States Adherence to the Berne Convention and CopyrightProtection of Information-Based Technologies.” Reflections on Law and Science, Section of Science and Technology . Tempe, AZ: American Bar Association and the Center for the Study ofLaw, Science and Technology, Arizona State University College of Law.

Kutten, L.J. (1990). Computer Software; Protection/Liability/Law/Forms . Vol. 1 of Intellectual Property Library . New York: Clark Boardman Company, Ltd.

Lefkowitz, S. , and E.R.Yoches (1989). “The Role of Trademarks in the Protection of ComputerSoftware.” Communications of the ACM December: 1391-1396.

Levy, Steven M. (1988). “Single Copyright Registration for Computer Programs: OutdatedPerceptions Byte the Dust.” Brooklyn Law Review 54: 965-.

Lopez, X.R. (1993). “Database Copyright Issues in the European GIS Community.” Government Information Quarterly 10.3: 305-318.

Millard, Christopher J. (1985). Legal protection of Computer Programs and Data . Toronto:Carswell Co. 239.

Page 20: Selected Bibliography - UCSB · 2015. 10. 21. · Selected Bibliography on Law, Information Policy, and Spatial Databases Compiled by: Harlan J. Onsrud Jeffrey Johnson Xavier Lopez

17

Miller, Phillip H. (1991). “Life After FEIST: Facts, the First Amendment, and the CopyrightStatus of Automated Databases.” Fordham Law Review 60.3: 507-539.

Motyka, Carol A. (1990). “Effects of U.S. Adherence to the Berne Convention.” Rutgers Computer and Technology Law Journal 16.1: 195-226.

Mueller, Janice M. (1989). “Determining the Scope of Copyright Protection for Computer/UserInterfaces.” Computer/Law Journal 9.1: 37-59.

Nydegger, R.D. (1992). “Practical and Legal Considerations in Drafting a U.S. PatentApplication for Computer-related Inventions.” Rutgers Computer and Technology Law Journal 18: 109-363.

Ostfeld, D.M., S.D. Grayson, and S.J. Metalitz (1993). “Copyright Protection for GovernmentSoftware?” Computer Law Reporter 17.2: 256-265.

Pattison, Michael (1992). “The European Commision's Proposal on the Protection of ComputerDatabases.” European Intellectual Property Review 14.4: 113-120.

Pearson, Hillary E. (1990). “Chapter 22: Computer Databases: Copyright and OtherProtection.” The Law and Business of Computer Software . Ed. D. C. Toedt. 1 ed. New York,NY: Clark Boardman Company, Ltd. 22/i - 22/33.

Peterson, Gale R. (1990). “Chapter 3: Trade Secrets Rights in Computer Technology.” The Law and Business of Computer Software . Ed. D. C. Toedt. New York, NY: Clark BoardmanCompany, Ltd. 1: 3/1 - 3/50.

Radcliffe, M.F. (1992). “Trademarks: The Computer Industry's Forgotten Asset.” Computer Law Journal 9: 10-14.

Reback, Gary L. , and Michael J. Patrick (1989). “Trade Secret Issues in the ComputerIndustry.” Computer Software 1989: Protection and Marketing . Patents, Copyrights,Trademarks, and Literary Property Course Handbook Series . Practicing Law Institute.

Reuben, R.C. (1993). “What's New in Intellectual Property?” ABA Journal .Jan/Feb: 72-77.

Rimas, Vytas (1984). “Trade Secret Protection of Computer Software.” Computer Law Journal 5: 77-99.

Salpeter, J. (1992). “Are you obeying copyright law?” Technology and Learning 12.8: 12-23.

Saltman, Roy G. (1977). Copyright in Computer-readable Works: Policy Impacts of Technological Change . Washington D.C. : Deptartment of Commerce, National Bureau ofStandards,.

Samuelson, Pamela (1990). “How to Interpret the Lotus Decision (And How Not To).” Communications of the ACM 33.11: 27-33.

Samuelson, Pamela (1990). “Should Program Algorithms be Patented?” Communications of the ACM August: 23-27.

Samuelson, Pamela (1991). “Is Information Property?” Communications of the ACM 34 .3:15-18.

Page 21: Selected Bibliography - UCSB · 2015. 10. 21. · Selected Bibliography on Law, Information Policy, and Spatial Databases Compiled by: Harlan J. Onsrud Jeffrey Johnson Xavier Lopez

18

Samuelson, Pamela (1991). “Legally Speaking: Digital Media and the Law.” Communications of the ACM 34.10: 23.

Samuelson, P. (1992). “Copyright Law and Electronic Compilations of Data.” Communications of the ACM February: 27-32.

Samuelson, Pamela (1993). “Legally Speaking: Computer programs and Copyright's Fair UseDoctrine.” Communications of the ACM 36.9: 19.

Samuelson, Pamela, Michel Denber, and Robert J. Glushko (1992). “Legally Speaking:Developments on the Intellectual Property Front.” Communications of the ACM 35.6: 33.

Samuelson, Pamela , and Robert J. Glushko (1990). “Survey on the Look and Feel Lawsuits.” Communications of the ACM 33.5: 483-487.

Schwartz, Laurens R. (1990). “§2.2 Trade Secrets §2.3 Copyright Protection.” Computer Law Forms Handbook . New York, NY: Clark Boardman Company, Ltd. 2/126 - 2/140.

Seecof, Benjamin R. (1990). “Scanning into the Future of Copyrightable Images: Computer-Based Image Processing Poses a Present Threat.” High Technology Law Journal 5.2: 372-399.

Soltysinski, Stanislaw J. (1990). “Legal Protection for Computer Programs, Public Access toInformation and Freedom of Competitive Research and Development Activities.” Rutgers Computer and Technology Law Journal 16.2: 447-474.

Toedt, D.C., ed. (1990). The Law and Business of Computer Software . Clark BoardmanCompany, Ltd.

Tosta, N. (1992). “Copyrights, Servicerights?” GeoInfo Systems February: 22-23, 31.

United States Congress, Office of Technology Assessment (1986). Intellectual Property Rights in an Age of Electronics and Information . Washington D.C.: Congress of the U.S., Office ofTechnology.

Walter, P.A. (1991). “Databases: Protecting an Asset; Avoiding a Liability.” The Computer Lawyer, March 1991, 8.3: 10-19.

Walter, P.A. (1991). “Facts After Feist.” The Practical Lawyer 37.8: 67-79.

Wiley, Richard E. (1987). “Report on Legal Developments in Electronic Publishing.” Jurimetrics Journal .Summer: 403-422.

Wolf, D.B. (1992). “Is There Copyright Protection for Maps after Feist?” Journal of the Copyright Society of the USA 39.3: 224-242 .

Wolf, D.B. (1992). “New Landscape in the Copyright Protection for Maps: Mason v.Montgomery Data, Inc.” Journal of the Copyright Society of the USA 39.4: 401-406.

Works, National Commission on New Technological Uses of Copyrighted (1979). Final Report of the National Commission on New Technological Uses of Copyrighted Works . United States,National Commission on New Technological Uses of Copyrighted Works.

Yoches, E. Robert (1989). “Legal Protection for Computer Software.” Communications of the ACM 32 .2: 169-171.

Page 22: Selected Bibliography - UCSB · 2015. 10. 21. · Selected Bibliography on Law, Information Policy, and Spatial Databases Compiled by: Harlan J. Onsrud Jeffrey Johnson Xavier Lopez

20

Computer Contracts, Licensing, Electronic Document Interchange, and Encryption

Barkan, David (1990). “Preparing for EDI byBenjamin Wright; Reviewed by David Barkan.” High Technology Law Journal 5.1: 193-198.

Bigelow, Robert P., and Susan H. Nycum (1973). Your Computer and the Law . EnglewoodCliffs, NJ: Prentice-Hall, Inc.

Bigelow, Robert P., and Susan H. Nycum (1975). “The Law of Contracts, Chapter 9.” Your Computer and the Law . Englewood Cliffs, NJ: Prentice-Hall, Inc. 99 - 107.

Chatterton, William (1989). Contractual Issues in Managing the Risks and Recovering the Costsof Geographic and Facilities Management Systems. Managing the Risks and Recovering the Costs of Geographic and Facilities Management Systems . Madison, WI: University ofWisonsin, Madison; Department of Engineering Professional Development.

Chesler, L. (1991). “Contractual Issues in the Remarketing of Systems.” Computer/Law Journal 11: 247-264.

Computer Law Division, EDI Committee (1992). “Model Electronic Payments Agreement andCommentary.” Jurimetrics Journal 32.Summer: 601-618.

Dewitz, Sandra Donaldson (1992). “Contracting on a performative network: Using informationtechnology as a legal intermediary.” Ph.D. The University of Texas at Austin.

Dziewit, H.S., J.M. Graziano, and C.J. Daley (1989). “The Quest for the Paperless Office -Electronic Contracting: State of the Art Possibility but Legal Impossibility?” Computer and High Technology Law Journal .5: 75-97.

EDI and Information Technology Division of the Science and Technology Section of theAmerican Bar Association (1992). “Model Electronic Payments Agreement and Commentary.” Jurimetrics Journal : 619-670.

Einhorn, D.A. (1992). “Box-top Licenses and the Battle-of-the-Forms.” Software Law Journal .5: 401-418.

Page 23: Selected Bibliography - UCSB · 2015. 10. 21. · Selected Bibliography on Law, Information Policy, and Spatial Databases Compiled by: Harlan J. Onsrud Jeffrey Johnson Xavier Lopez

21

Farhoomand, Ali F. (1992). “A dynamic hierarchical structural model of information systemsuccess: The case of electronic document interchange.” Ph.D. McGill University.

Flanagan, Michael (1993). “Database Licensing: A Future View.” Computers in Libraries 13.1:21.

Gordon, M.L. (1991). “Key Issues in Contracting for the Development of Joint and DerivedProducts.” Computer Law Journal .11: 1-27.

Gwyn, S.R., and A.T. Rogers (1992). “Negotiating and Litigating Computer Contracts, SelectedIssues.” Alabama Law 53: 404-408.

Johnson, Gregory L. (1991). “Electronic Contracts: Are They Enforceable Under Article 2 ofthe U.C.C.” Software Law Journal 4.2: 247-269.

Kirby, M.D. (1992). “Information Security-OECD Objectives.” Journal of Law and Information Science 3: 25-46.Lipner, Seth E. , and Stephen Kalman (1989). “Chapter 6: Licensing Computer Technology.” Computer Law Cases and Materials . Columbus OH: Merrill Publishing Company. 413-420.

Miller, Clifford (1992). “Electronic Evidence-Can You Prove the Transaction Took Place?” The Computer Lawyer 9.5: 21-33.

Milrad, Louis H. (1992). “Contracting for GIS Technology in the Public Sector.” GIS Law 1.1:14-15.

Morrisson, D.R. (1992). “The Statute of Frauds Online: Can a Computer Sign a Contract for theSale of Goods?” George Mason University Law Review 14: 637-662.

Pearson, H. (1990). “Protecting Computer Databases Through Contract.” The Law and Business of Computer Software . Ed. Toedt. New York : Clark Boardman Company, Ltd. 22-33.

Reed, Chris (1989). “EDI - contractual and liability issues.” Computer Law and Practice 6.2:36-41.

Rosenthal, I. (1993). “Data Security, Competitiveness, and Government Controls inCryptography in the Information Age.” Computer Law Reporter 16.6: 1098-1104.

Rosenthal, I , and D. Miller (1993). “The Clipper Chip and Cryptography Policy: ProblemsRemain for Exports of Mass Market Software with Encryption Capabilities.” Computer Law Reporter 17.5: 861-867.

Simon, David F. (1990). Computer Law Handbook: Software Protection; Contracts; Litigation; Forms . Philadelphia, PA: American Law Institute. 301.

Smith, G.P. (1992). “Shrink-Wrap Licenses in Europe after the EC Software Directive.” Computer Law Journal .11: 597-606.

Sobel, D.L. (1992). “Governmental Restrictions on the Development and Dissemination ofCryptographic Technologies: The Controversy Over the Digital Signature Standard.” Computer Law Reporter 16.2: 265-270.

Page 24: Selected Bibliography - UCSB · 2015. 10. 21. · Selected Bibliography on Law, Information Policy, and Spatial Databases Compiled by: Harlan J. Onsrud Jeffrey Johnson Xavier Lopez

22

Somma, John T., and Jay Batson (1987). “The Legal Environment of Commercial DatabaseAdministration.” Jurimetrics Journal 27.3: 297-315.

Stevens, Douglas M. (1988). “Return to the Stone Age...The Regulation of Program Trading.” Computer/Law Journal 8.4: 479-496.

Walden, Ian (1989). “EDI and the law: an introduction.” Computer Law and Practice 6.2: 34-35.

Wenig, Donald R. (1991). “Computer Transactions and Uniform Commercial Code 2A: does 2Afit?” Software Law Journal 4.3: 457-492.

Wiley, Richard E. (1987). “Report on Legal Developments in Electronic Publishing.” Jurimetrics Journal : 403-422.

Wright, Benjamin (1991). “Authenticating EDI: The Location of a Trusted Recordkeeper.” Software Law Journal 4.2: 173-178.

Liability and Admissibility of Computer Evidence

Page 25: Selected Bibliography - UCSB · 2015. 10. 21. · Selected Bibliography on Law, Information Policy, and Spatial Databases Compiled by: Harlan J. Onsrud Jeffrey Johnson Xavier Lopez

23

Agranoff, Michael H. (1989). “Curb onTechnology: Liability for Failure to Protect Computerized Data Against Unauthorized Access.” Computer and High Technology Law Journal 5: 263-320.

Blumberg, Donald F. (1992). “Assessment of the Legal Issues and Conflicts in The InformationTechnology Service Market.” The Computer Lawyer 9.4: 14-23.

Bradgate, R. (1990). “The evidential status of computer output and communications.” Computer Law and Practice 6.5: 142-148.

Brannigan, Vincent M., and Ruth E. Dayhoff (1981). “Liability for Personal Injuries Caused byDefective Medical Computer Programs.” American Journal of Law 7: 123-137.

Burk, Dan L. (1993). “When Scientists Act Like Lawyers: The Problem of Adversary Science.” Jurimetrics Journal 33.3: 363-376.

Cardinali, Richard (1991). “Injuries Caused by Computer Systems: Who is Liable?” Journal of Products Liability 13.4: 347.

Chapman, Bert (1992). “Willing to Provide But Unable to Support: The Dilemma of SmallerDepositories in an Electronic Era.” Government Information Quarterly 9.1: 81.

Chatterton, William. (1989). The Legal Aspects of Data Sharing. Managing the Risks and Recovering the Costs of Geographic and Facilities Management Systems . Madison, WI:University of Wisconsin-Madison, Department of Engineering Professional Development.

Ciresi, M.V., and M.K. Wivell (1991). “Protecting Your Evidence Against 'Junk Science'Attacks.” Trial 27: 35-40.

Condo, Joseph. (1991). “Computer Malpractice: Two Alternatives to the Traditional'Professional Negligence' Standard.” Computer Law Journal .11: 323-340.

Dansby, B. (1992). “Public Records and Governmental Liability.” GIS Law 1.2: 8 - 13.

Page 26: Selected Bibliography - UCSB · 2015. 10. 21. · Selected Bibliography on Law, Information Policy, and Spatial Databases Compiled by: Harlan J. Onsrud Jeffrey Johnson Xavier Lopez

24

Epstein, Earl F. (1987). Litigation Over Information: The Use and Misuse of Maps. International Geographic Information Systems Symposium: The Research Agenda . Arlington,VA: NASA.

Epstein, Earl F, and Thomas D. Duchesneau (1989). The Impact of Information Science onConflict. Annual Conference of the URISA . Boston, MA: URISA. 4: 305-310.

Fisher, Royal P. (1984). Information Systems Security . Englewood Cliffs, NJ: Prentice-Hall.

Foresman, Timothy, Robert, et al. (1990). GIS Insurance: The Accuracy Question. Annual Conference of the URISA . Edmonton, Alberta: URISA. IV: 129-142.

Forinash, R.A. (1992). “Analyzing Scientific Evidence: From Validity to Reliability with aTwo-step Approach.” St. Mary's Law Journal 24: 223-271.

Guilshan, C. (1992). “A Picture Is Worth a Thousand Lies: Electronic Imaging and the Future ofthe Admissibility of Photographs Into Evidence.” Rutgers Computer & Technology Law Journal 18.1: 365-380.

Hansen, M. (1993). “Believe It or Not.” ABA Journal .June: 64-67.

Huber, Peter W. (1988). Liability: The Legal Revolution and Its Consequences . New York:Basic Books, Inc., Publishers. 253.

Johnson, M.A. (1992). “Computer Printouts as Evidence: Stricter Foundations or Presumptionof Reliability?” Marquette Law Review 75: 439-466.

Kaye, D.H. (1992). “Proof in Law and Science.” Jurimetrics Journal 32.3: 313-322.

Keating, Michael B. (1985). “Computer Evidence.” Litigation 12.Fall: 35-38.

King, Roger, and Carolyn Stanley (1985). “Ensuring the Court Admissibility of Computer-Generated Records.” ACM Transactions on Office Information Systems 3.4: 398-412.

Krieger, Roy (1992). “Now Showing at a Courtroom Near You.” ABA Journal .December: 92-96.

Kuong, Javier F. (1975). Computer Auditing and Security Manual . Wellesley Hills, MA:Management Advisory Pub.

Lathrop, Bruce (1990). “Design-Induced Errors in Computer Systems.” Computer/Law Journal 10.Winter: 87-126.

Loevinger, L. (1992). “Standards of Proof in Science and Law.” Jurimetrics Journal of Law, Science and Technology 32.3: 323-344.

Lynch, Daniel J., and Ian Brenson (1989). “Computer Generated Evidence: The Impact ofComputer Technology on the Traditional Rules of Evidence.” Loyola University Law Journal 20: 919-936.

Medina, Anthony M. (1985). “The Admissibility of Computer Records as Evidence.” Washington State Bar News July: 14-19.

Page 27: Selected Bibliography - UCSB · 2015. 10. 21. · Selected Bibliography on Law, Information Policy, and Spatial Databases Compiled by: Harlan J. Onsrud Jeffrey Johnson Xavier Lopez

25

Miller, Clifford G. (1990). “Computer-generated evidence - implications for the corporate user,Part 1.” Computer Law, and Practice .July/August: 177-184.

Mullins, Brian W. (1991). The Rules of Evidence: An Overview . Madison, WI: WickwireGavin, P.C. 20.

Nelson, Leonard J. (1986). “Garbage In, Garbage Out: The Need for New Approaches toComputer Evidence.” American Journal of Trial Advocacy 9: 411-421.

Nimmer, Raymond, and Patricia A. Krauthaus (1985). “Computer Error and User LiabilityRisk.” Jurimetrics Journal 26: 121-137.

Nycum, Susan H., and William A. Lowell (1981). “Common Law and Statutory Liability forInaccurate Computer -Based Data.” Emory Law Journal 30: 445-470.

Onsrud, Harlan J. (1990). “Liability Concerns for Surveyors Contributing Data to Public LandInformation Systems.” ACSM Bulletin April: 20-24.

Onsrud, H.J. (1992). “Evidence Generated from GIS.” GIS Law 1.3: 1-9.

Perritt, H.H. (1992). “Tort Liability, the First Amendment, and Equal Access to ElectronicNetworks.” Harvard Journal of Law and Technology 5: 65-151.

Reed, Chris (1992). “EC Antitrust Law and the Exploitation of Intellectual Property Rights inSoftware.” Jurimetrics Journal 32.3: 431-443.

Salmon, Elizabeth E (1989). Constructing the Legal Risk Decision Matrix for GIS CostRecovery. Annual Conference of the URISA . Boston, MA: URISA. 4: 293-304.

Samuelson, Pamela (1993). “Legally Speaking: Liability for Defective Electronic Information.” Communications of the ACM 36.3: 21.

Shalit, Hava, et al. (1990). GIS Insurance: The Accuracy Question. Annual Conference of the URISA . 129-142.

Smith, J.C. (1984). Liability in Negligence . Toronto: Carswell Legal Publications. 273.

Snyder, Randy (1989). “Assuring the Competency of Computer Generated Evidence.” Computer Law Journal 9: 103-121.

Sookman, Barry B. (1989). Liability of Information Providers. Annual Conference of the URISA . 256-276.

Sookman, B.B. (1990). “Canada: Liability of Geographic Information Systems Providers.” International Computer Law Adviser 4.5: 24.

Spradling, Major Kevin K. (1990). “GPS and the Law.” GPS World November/December: 48-51.

Sprague, Robert D. (1991). “Comment: Developing Theories of Legal Liability for InaccurateComputer Information.” Law/Technology 24.2: 1.

Sprague, Robert D. (1992). “Computer Crime: A Review of CYBERPUNK by Katie Hafner andJohn Markoff.” Rutgers Computer and Technology Law Journal 18: 439-460.

Page 28: Selected Bibliography - UCSB · 2015. 10. 21. · Selected Bibliography on Law, Information Policy, and Spatial Databases Compiled by: Harlan J. Onsrud Jeffrey Johnson Xavier Lopez

26

Storm, P. (1984). “Admitting Computer Generated Records: A Presumption of Reliability.” The John Marshall Law Review 18: 115-154.

Straub, Detmar W., and Rosann Webb Collins (1990). “Key Information Issues FacingManagers: Software Piracy, Proprietary Databases, and Individual Rights to Privacy.” MIS Quarterly June: 143-156.

Tarter, Blodwen (1992). “Information Liability: New Interpretations for the Electronic Age.” Computer Law Journal 11: 481-553.

Triaille, Jean-Paul (1990). “The EEC Directive of July 25, 1985 on Product Liability and itsApplication to Databases and Information.” International Computer Law Adviser 5.2: 7.

Turley, Todd M. (1988). “Expert Software Systems: The Legal Implications.” Computer/Law Journal 8.4: 455-477.

Wilkes, D. (1991). “The Wiretap Statute: A Haven for Hackers.” Jurimetrics Journal 31.Summer: 415-427.

York, Cynthia M. (1986). “Criminal Liability for the Misappropriation of Computer SoftwareTrade Secrets.” University of Detroit Law Review 63.Spring:

Page 29: Selected Bibliography - UCSB · 2015. 10. 21. · Selected Bibliography on Law, Information Policy, and Spatial Databases Compiled by: Harlan J. Onsrud Jeffrey Johnson Xavier Lopez

27

General Books, Articles, and Bibliographies

ACM (1993). “Bibliography on Computer Ethics.” Internet FTP : acm.org --> SIGCAS Forum

Allen, Don A., and Lanny J. Davis (1992). Allen and Davis on Computer Contracting: A User's Guide with Forms and Strategies . Prentice Hall. 1380.

Antenucci, J.C., et al. (1991). “Chapter 11 Legal Issues.” Geographic Information Systems: A Guide to the Technology . New York: Van Nostrand Reinhold.

Beazley, John (1991). “What is this Thing Called Ethics and, Sometimes, The Code of Ethics?” Photogrammetric Engineering and Remote Sensing 57.5: 281.

Dunlop, Charles, and Rob Kling, ed. (1991). Computerization and Controversy . Boston:Academic Press, Inc. 758.

Economou, Andoni (1991). “Twenty-Third Selected Bibliography on Computers, Technologyand the Law.” Rutgers Computer and Technology Law Journal 17: 563-610.

Economou, Andoni (1992). “Twenty-Fourth Selected Bibliography on Computers, Technologyand the Law.” Rutgers Computer and Technology Law Journal 18: 970-1012.

Epstein, Michael A., Ronald S. Laurie, and Lawrence E. Elder (1992). International Intellectual Property: The European Community and Eastern Europe . 2 vols. Prentice Hall. 2354.

Erdmann, M. D., M. B. Williams, and C. Gutierrez (1990). Computers, Ethics and Society .Oxford University Press.

Gould, C., ed. (1989). The Information Web: Ethical and Social Implications of Computer Networking . Westview Press.

Johnson, D. G. (1993). Computer Ethics . 2 ed. Englewood Cliffs: Prentice-Hall.

Page 30: Selected Bibliography - UCSB · 2015. 10. 21. · Selected Bibliography on Law, Information Policy, and Spatial Databases Compiled by: Harlan J. Onsrud Jeffrey Johnson Xavier Lopez

28

Kahin, Brian, ed. (1992). Building Information Infrastructure . Issues in the Development of theNational Research and Education Network. New Baskerville: McGraw-Hill Primis. 443.

Lyon, D. (1988). The Information Society: Issues and Illusions . New York: Policy Press.

Maguire, David J., Michael F. Goodchild, and David W. Rhind, ed. (1991). Geographic Information Systems; Volume 1: Principles; Volume 2: Applications . 2 vols. New York:Longman Scientific and Technical. 900.

Miller, Richard I. (1974). Legal Aspects of Technology Utilization . Lexington, MA: LexingtonBooks.

Milton, L.E. (1993). “Management of Legal Issues Within Operations.” GIS Law 1.4: 8-13.

Parker, Donn B., Susan Swope, and Bruce N. Baker (1990). Ethical Conflicts in Information and Computer Science, Technology, and Business . Wellesley, MA: QED Information Sciences.245.

Perrolle, J. A. (1987). Computers and Social Change: Information, Property and Power .Wadsworth Publishing Company.Radcliffe, M.F. (1991). “The Future of Computer Law: Ten Challenges for the Next Decade.” The Computer Lawyer 8.8: 1-11.

Scott, Michael D. (1985). Computer Law . Vol. 1 of 1 vols. Wiley Law Publications.

Scott, M.D. (1992). Scott on Computer Law . 2 ed. 2 vols. Prentice Hall Law and Business.842.