Computer & Internet Law:

ABA, Computer Law Division
ABA, E-Commerce Law Division
The Berkeley Center for Law & Technology
A Guide to the Proposed Law on Software Transactions
Boston University School of Law Journal of Science & Technology Law
Journal of Technology Law & Policy
Harvard Journal of Law & Technology
Santa Clara University Computer and High Tech Law Journal
Arizona State University Center for the Study of Law, Science & Technology
An Exploration of Cyberspace Security R&D Investment Strategies for DARPA - "The Day After . . . in Cyberspace II" By Robert H. Anderson and Anthony C. Hearn (RAND).
Copyrighting Your Software - Why Bother? Article from Nolo Press.
Criminal Law and The Internet By Mark D. Rasch. From the Computer Law Association.
Cyberlaundering - Anonymous Digital Cash and Money Laundering By R. Mark Bortner.
Cyber-Stalking: Obsessional Pursuit and the Digital Criminal By Wayne Petherick.
Cybertheft - An Every Day Crime Crime By Michael de Roo.
Cybertheft - Will Copyright Law Prevent Digital Tyranny On the Superhighway? By Needham J. Boddie II.
Electronic Records in Criminal Proceedings Stevan D. Mitchell.
Governance of Pornography and Child Pornography on the Global Internet By Yaman Akdeniz.
In Athena's Camp - Preparing for Conflict in the Information Age John Arquilla and David Ronfeldt (RAND).
New Age Comstockery - Exon vs. The Internet By Robert Corn-Revere, Cato Institute.
Search and Seizure of Canadian Computer Environments By Daniel Shap.
Systems Development Agreement Vesting Ownership of Intellectual Property Rights in Developer By Leonard T. Nuara, P.C.
Taking the Fourth Amendment to Bits - The Department of Justice Guidelines for Computer Searches and Seizures By Roderick T. McCarvel.
The Law vs. Online Stalking By Marie D'Amico.
The Legal Risks of Computer Pests and Hacker Tools By Benjamin Wright, J.D.
The Social Organization of the Computer Underground By Gordon R. Meyer.
Virtual Community Standards By Mike Godwin.
Whose Standards? Whose Community? By David Loundy.
Articles and Reports By Jol A. Silversmith.
Unauthorized access to computer systems