- Privacy.
Sobel, D. L. (1996). The constitutionality of the Communications Decency Act: Censorship on the internet.
- University of Florida Journal of Technology Law and Policy [On-Line], 1(Spring), 14 paragraphs. Available HTTP:
http://journal.law.ufl.edu/%7Etechlaw/1/sobel.html
An examination of the technical feasibility of enforcing the American Communications Decency Act ("CDA"),
which is part of the Telecommunications Act of 1996, the jurisdictional limitations of enforcement, and the problems
with defining indecency. Sobel provides his own conclusions about the act and its utility within American constitutional
law. Used the Webcrawler search engine and the query: "censorship and internet". Document 7.
- Copyright
Karjala, D.S. and Menell, P.S. (1995).Applying fundamental copyright principles to Lotus Development Corporation v.
Borland International Inc.
- Berkeley Technology Law Journal [On-Line], 10(1), 27 paragraphs.
Available HTTP:
http://server.berkeley.edu:80/BTJL/articles/10-1/m_k_1st.html
An examination of a specific court case, Lotus v. Borland, in which the copyright of a computer program protects
the user interface generated by that program. Used the Lycos CustomSearch search engine and the query: "internet
copyright law". Document 2.
- Privacy
Reid, C.A. (1996, Oct.21-24).The complexity of free speech, privacy, and intellectual freedom in a global network.
- ASIS Annual Meeting. Speakers: Jamie Love, Shabbir J. Sakdar, John Berry [On-Line]. 3 paragraphs.
Available HTTP:
http://lib2.med.cornell.edu/Library/HTML/asis.html#15
American Society for Information Science AGM, Oct.21-24, 1996 as reported by Reid. Of the three speakers listed,
the presentation by Sakdar specifically addresses privacy/confidentiality and states that it's virtually impossible to be
anonymous on the internet. Used the Altavista search engine and the query: "internet privacy AND scholarly articles".
Document 3.
- Security
Froomkin, A. M. (1995). The metaphor is key: Cryptography, the clipper chip, and the constitution.
- University of Pennsylvania Law Review [On-Line], 143, p.709-897, 180 pages. Available HTTP:
http://www.law.miami.edu/~froomkin/articles/clipper.htm
The article is about the conflict between the individual's power to maintain secrecy from the state and the state's power
to penetrate that secret. Froomkin looks at the isssues of encryption as a means of protection and the constitutional
implications of a government proposal that would allow easier intercepition of private communication. Used the Yahoo
search engine and the query: "internet security articles". Document 3 of site matches.
- Staying Current
Sprunger, K. V. (1996) Extending the value of current content to the researcher's desk-top: From print to internet.
- [On-Line]. 1 paragraph. Available HTTP:
http://www.sivb.org/sprunger.htm
An abstract discussing the Institute for Scientific Information's (ISI) Current Contents serial publication
and its transitional role from print to online source availabilty. Used Metacrawler "As a phrase" function and the
query: "staying current". Document 7.
- Time Management
Washington, R. and Hayes-Roth, B. (1989) Input data management in real-time AI systems.
- [On-Line]. 1 paragraph. Available HTTP:
http://www-ksl.stanford.edu/KSL_Abstracts/KSL-89-06.html
An abstract discussing artificial intelligence and the possibilty of an AI system being able to filter out much of the
incoming data so as to respond to important or unexpected events. Possible applications: health care monitoring
equipment in hospitals. Used World Wide Web Worm and the query: "time management". Document 55.