![]() | ![]() |
2007 | ||
---|---|---|
44 | EE | Edward H. Freeman: RFIDs and Personal Privacy. Information Systems Security 16(1): 61-64 (2007) |
43 | EE | Edward H. Freeman: Vulnerability Disclosure: The Strange Case of Bret McDanel. Information Systems Security 16(2): 127-131 (2007) |
42 | EE | Edward H. Freeman: Email Privacy and the Wiretap Act: U.S. v. Councilman. Information Systems Security 16(3): 182-185 (2007) |
41 | EE | Edward H. Freeman: Computer Hackers and Search and Seizure: United States v. Jarrett. Information Systems Security 16(4): 239-243 (2007) |
40 | EE | Edward H. Freeman: Holistic Information Security: ISO 27001 and Due Care. Information Systems Security 16(5): 291-294 (2007) |
39 | EE | Edward H. Freeman: Regulatory Compliance and the Chief Compliance Officer. Information Systems Security 16(6): 357-361 (2007) |
2006 | ||
38 | EE | Edward H. Freeman: Disclosure of Information Theft: The ChoicePoint Security Breach. Information Systems Security 14(6): 11-15 (2006) |
37 | EE | Edward H. Freeman: Wardriving: Unauthorized Access to Wi-Fi Networks. Information Systems Security 15(1): 11-15 (2006) |
36 | EE | Edward H. Freeman: Open Source Software and the SCO Litigation. Information Systems Security 15(3): 5-9 (2006) |
35 | EE | Edward H. Freeman: Gmail and Privacy Issues. Information Systems Security 15(4): 2-6 (2006) |
34 | EE | Edward H. Freeman: Service of Process by Email. Information Systems Security 15(6): 7-11 (2006) |
2005 | ||
33 | EE | Edward H. Freeman: Data Protection and the Commerce Clause. Information Systems Security 13(6): 5-9 (2005) |
32 | EE | Edward H. Freeman: Cyber Courts and the Future of Justice. Information Systems Security 14(1): 5-9 (2005) |
31 | EE | Edward H. Freeman: Privacy and Dot.Com Bankruptcies: Protection of Personal Data. Information Systems Security 14(3): 9-13 (2005) |
30 | EE | Edward H. Freeman: Retention of Corporate E-Documents under Sarbanes - Oxley. Information Systems Security 14(4): 5-9 (2005) |
29 | EE | Edward H. Freeman: Click Fraud: Google v. Auctions Expert International. Information Systems Security 14(5): 5-9 (2005) |
2004 | ||
28 | EE | Edward H. Freeman: Software Repossession: Electronic Self-Help. Information Systems Security 12(6): 2-6 (2004) |
27 | EE | Edward H. Freeman: Source Code Escrow. Information Systems Security 13(1): 8-11 (2004) |
26 | EE | Edward H. Freeman: Digital Signatures and Electronic Contracts. Information Systems Security 13(2): 8-12 (2004) |
25 | EE | Edward H. Freeman: Corporate Liability for Illegal Downloading of Copyrighted Music. Information Systems Security 13(4): 6-10 (2004) |
24 | EE | Edward H. Freeman: Document Theft: Appropriate Responses. Information Systems Security 13(5): 4-8 (2004) |
2003 | ||
23 | EE | Edward H. Freeman: Internet Service Providers and Search Warrants. Information Systems Security 11(6): 6-9 (2003) |
22 | EE | Edward H. Freeman: Prosecution of Computer Virus Authors. Information Systems Security 12(1): 5-9 (2003) |
21 | EE | Edward H. Freeman: Privacy Notices under the Gramm - Leach - Bliley Act. Information Systems Security 12(2): 5-9 (2003) |
20 | EE | Edward H. Freeman: Biometrics, Evidence, and Personal Privacy. Information Systems Security 12(3): 4-8 (2003) |
19 | EE | Edward H. Freeman: Exporting Encryption Software and the First Amendment: Bernstein v. U.S. Department of State. Information Systems Security 12(4): 12-16 (2003) |
2002 | ||
18 | EE | Edward H. Freeman: Software Robots and Trespass to Chattels: eBay v. Bidder's Edge. Information Systems Security 10(6): 6-9 (2002) |
17 | EE | Edward H. Freeman: Third-Party Liability: Who Pays for Computer Damages? Information Systems Security 11(1): 5-9 (2002) |
16 | EE | Edward H. Freeman: Pretexting, Data Mining and Personal Privacy: The Gramm - Leach - Bliley Act. Information Systems Security 11(2): 4-8 (2002) |
15 | EE | Edward H. Freeman: The Digital Millennium Copyright Act. Information Systems Security 11(4): 4-8 (2002) |
14 | EE | Edward H. Freeman: ISP Liability for Third-Party Defamation. Information Systems Security 11(5): 10-14 (2002) |
2001 | ||
13 | EE | Edward H. Freeman: Metatagging and Trademark Law: Brookfield Communications, Inc. v. West Coast Entertainment Corp. Information Systems Security 10(1): 1-5 (2001) |
12 | EE | Edward H. Freeman: The Legend and Legacy of Kevin Mitnick. Information Systems Security 10(2): 1-6 (2001) |
11 | EE | Edward H. Freeman: Denial of Service to Authorized Computer Users. Information Systems Security 10(3): 1-5 (2001) |
10 | EE | Edward H. Freeman: Legal Protection of Databases: Feist v. Rural Telephone Service. Information Systems Security 10(4): 1-5 (2001) |
9 | EE | Edward H. Freeman: Internet Gripe Sites: Bally v. Faber. Information Systems Security 9(6): 1-5 (2001) |
2000 | ||
8 | EE | Edward H. Freeman: Director Liability in Computer Negligence Cases. Information Systems Security 9(1): 1-5 (2000) |
7 | EE | Edward H. Freeman: Freedom of Speech in Cyberspace: Intel v. Hamidi. Information Systems Security 9(2): 1-5 (2000) |
6 | EE | Edward H. Freeman: Anonymity on the Internet: ACLU of Georgia v. Miller. Information Systems Security 9(4): 1-6 (2000) |
5 | EE | Edward H. Freeman: State Control of Unsolicited E-mail: State of Washington v. Heckel. Information Systems Security 9(5): 1-5 (2000) |
1999 | ||
4 | EE | Edward H. Freeman: Cookies and Freedom of Information: The Putnam Pit Case. Information Systems Security 8(1): 39-44 (1999) |
3 | EE | Edward H. Freeman: Webwrap and the Law of Contracts. Information Systems Security 8(2): 14-20 (1999) |
2 | EE | Edward H. Freeman: Search and Seizure of Computer Equipment. Information Systems Security 8(3): 10-15 (1999) |
1992 | ||
1 | Edward H. Freeman: A Knowledge-based Approach to Strategic Planning. Logic Programming Summer School 1992: 109-117 |