dblp.uni-trier.dewww.uni-trier.de

Edward H. Freeman

List of publications from the DBLP Bibliography Server - FAQ
Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2007
44EEEdward H. Freeman: RFIDs and Personal Privacy. Information Systems Security 16(1): 61-64 (2007)
43EEEdward H. Freeman: Vulnerability Disclosure: The Strange Case of Bret McDanel. Information Systems Security 16(2): 127-131 (2007)
42EEEdward H. Freeman: Email Privacy and the Wiretap Act: U.S. v. Councilman. Information Systems Security 16(3): 182-185 (2007)
41EEEdward H. Freeman: Computer Hackers and Search and Seizure: United States v. Jarrett. Information Systems Security 16(4): 239-243 (2007)
40EEEdward H. Freeman: Holistic Information Security: ISO 27001 and Due Care. Information Systems Security 16(5): 291-294 (2007)
39EEEdward H. Freeman: Regulatory Compliance and the Chief Compliance Officer. Information Systems Security 16(6): 357-361 (2007)
2006
38EEEdward H. Freeman: Disclosure of Information Theft: The ChoicePoint Security Breach. Information Systems Security 14(6): 11-15 (2006)
37EEEdward H. Freeman: Wardriving: Unauthorized Access to Wi-Fi Networks. Information Systems Security 15(1): 11-15 (2006)
36EEEdward H. Freeman: Open Source Software and the SCO Litigation. Information Systems Security 15(3): 5-9 (2006)
35EEEdward H. Freeman: Gmail and Privacy Issues. Information Systems Security 15(4): 2-6 (2006)
34EEEdward H. Freeman: Service of Process by Email. Information Systems Security 15(6): 7-11 (2006)
2005
33EEEdward H. Freeman: Data Protection and the Commerce Clause. Information Systems Security 13(6): 5-9 (2005)
32EEEdward H. Freeman: Cyber Courts and the Future of Justice. Information Systems Security 14(1): 5-9 (2005)
31EEEdward H. Freeman: Privacy and Dot.Com Bankruptcies: Protection of Personal Data. Information Systems Security 14(3): 9-13 (2005)
30EEEdward H. Freeman: Retention of Corporate E-Documents under Sarbanes - Oxley. Information Systems Security 14(4): 5-9 (2005)
29EEEdward H. Freeman: Click Fraud: Google v. Auctions Expert International. Information Systems Security 14(5): 5-9 (2005)
2004
28EEEdward H. Freeman: Software Repossession: Electronic Self-Help. Information Systems Security 12(6): 2-6 (2004)
27EEEdward H. Freeman: Source Code Escrow. Information Systems Security 13(1): 8-11 (2004)
26EEEdward H. Freeman: Digital Signatures and Electronic Contracts. Information Systems Security 13(2): 8-12 (2004)
25EEEdward H. Freeman: Corporate Liability for Illegal Downloading of Copyrighted Music. Information Systems Security 13(4): 6-10 (2004)
24EEEdward H. Freeman: Document Theft: Appropriate Responses. Information Systems Security 13(5): 4-8 (2004)
2003
23EEEdward H. Freeman: Internet Service Providers and Search Warrants. Information Systems Security 11(6): 6-9 (2003)
22EEEdward H. Freeman: Prosecution of Computer Virus Authors. Information Systems Security 12(1): 5-9 (2003)
21EEEdward H. Freeman: Privacy Notices under the Gramm - Leach - Bliley Act. Information Systems Security 12(2): 5-9 (2003)
20EEEdward H. Freeman: Biometrics, Evidence, and Personal Privacy. Information Systems Security 12(3): 4-8 (2003)
19EEEdward H. Freeman: Exporting Encryption Software and the First Amendment: Bernstein v. U.S. Department of State. Information Systems Security 12(4): 12-16 (2003)
2002
18EEEdward H. Freeman: Software Robots and Trespass to Chattels: eBay v. Bidder's Edge. Information Systems Security 10(6): 6-9 (2002)
17EEEdward H. Freeman: Third-Party Liability: Who Pays for Computer Damages? Information Systems Security 11(1): 5-9 (2002)
16EEEdward H. Freeman: Pretexting, Data Mining and Personal Privacy: The Gramm - Leach - Bliley Act. Information Systems Security 11(2): 4-8 (2002)
15EEEdward H. Freeman: The Digital Millennium Copyright Act. Information Systems Security 11(4): 4-8 (2002)
14EEEdward H. Freeman: ISP Liability for Third-Party Defamation. Information Systems Security 11(5): 10-14 (2002)
2001
13EEEdward H. Freeman: Metatagging and Trademark Law: Brookfield Communications, Inc. v. West Coast Entertainment Corp. Information Systems Security 10(1): 1-5 (2001)
12EEEdward H. Freeman: The Legend and Legacy of Kevin Mitnick. Information Systems Security 10(2): 1-6 (2001)
11EEEdward H. Freeman: Denial of Service to Authorized Computer Users. Information Systems Security 10(3): 1-5 (2001)
10EEEdward H. Freeman: Legal Protection of Databases: Feist v. Rural Telephone Service. Information Systems Security 10(4): 1-5 (2001)
9EEEdward H. Freeman: Internet Gripe Sites: Bally v. Faber. Information Systems Security 9(6): 1-5 (2001)
2000
8EEEdward H. Freeman: Director Liability in Computer Negligence Cases. Information Systems Security 9(1): 1-5 (2000)
7EEEdward H. Freeman: Freedom of Speech in Cyberspace: Intel v. Hamidi. Information Systems Security 9(2): 1-5 (2000)
6EEEdward H. Freeman: Anonymity on the Internet: ACLU of Georgia v. Miller. Information Systems Security 9(4): 1-6 (2000)
5EEEdward H. Freeman: State Control of Unsolicited E-mail: State of Washington v. Heckel. Information Systems Security 9(5): 1-5 (2000)
1999
4EEEdward H. Freeman: Cookies and Freedom of Information: The Putnam Pit Case. Information Systems Security 8(1): 39-44 (1999)
3EEEdward H. Freeman: Webwrap and the Law of Contracts. Information Systems Security 8(2): 14-20 (1999)
2EEEdward H. Freeman: Search and Seizure of Computer Equipment. Information Systems Security 8(3): 10-15 (1999)
1992
1 Edward H. Freeman: A Knowledge-based Approach to Strategic Planning. Logic Programming Summer School 1992: 109-117

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)