Edward H. Freeman

According to our database1, Edward H. Freeman authored at least 53 papers between 1990 and 2011.

Collaborative distances:
  • no known Dijkstra number2.
  • no known Erdős number3.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2011
State of Washington v. Heckel.
Proceedings of the Encyclopedia of Information Assurance, 2011

Privacy: Legal Issues.
Proceedings of the Encyclopedia of Information Assurance, 2011

Personnel: Practices.
Proceedings of the Encyclopedia of Information Assurance, 2011

Bally v. Faber.
Proceedings of the Encyclopedia of Information Assurance, 2011

2010
Computer Printouts as Legal Evidence.
J. Digit. Forensic Pract., 2010

2007
Regulatory Compliance and the Chief Compliance Officer.
Inf. Secur. J. A Glob. Perspect., 2007

Holistic Information Security: ISO 27001 and Due Care.
Inf. Secur. J. A Glob. Perspect., 2007

Computer Hackers and Search and Seizure: <i>United States v. Jarrett</i>.
Inf. Secur. J. A Glob. Perspect., 2007

Email Privacy and the Wiretap Act: U.S. v. Councilman.
Inf. Secur. J. A Glob. Perspect., 2007

Vulnerability Disclosure: The Strange Case of Bret McDanel.
Inf. Secur. J. A Glob. Perspect., 2007

RFIDs and Personal Privacy.
Inf. Secur. J. A Glob. Perspect., 2007

2006
Service of Process by Email.
Inf. Secur. J. A Glob. Perspect., 2006

Gmail and Privacy Issues.
Inf. Secur. J. A Glob. Perspect., 2006

Open Source Software and the SCO Litigation.
Inf. Secur. J. A Glob. Perspect., 2006

Wardriving: Unauthorized Access to Wi-Fi Networks.
Inf. Secur. J. A Glob. Perspect., 2006

Disclosure of Information Theft: The ChoicePoint Security Breach.
Inf. Secur. J. A Glob. Perspect., 2006

2005
Click Fraud: Google v. Auctions Expert International.
Inf. Secur. J. A Glob. Perspect., 2005

Retention of Corporate E-Documents under Sarbanes - Oxley.
Inf. Secur. J. A Glob. Perspect., 2005

Privacy and Dot.Com Bankruptcies: Protection of Personal Data.
Inf. Secur. J. A Glob. Perspect., 2005

Cyber Courts and the Future of Justice.
Inf. Secur. J. A Glob. Perspect., 2005

Data Protection and the Commerce Clause.
Inf. Secur. J. A Glob. Perspect., 2005

2004
Document Theft: Appropriate Responses.
Inf. Secur. J. A Glob. Perspect., 2004

Corporate Liability for Illegal Downloading of Copyrighted Music.
Inf. Secur. J. A Glob. Perspect., 2004

Digital Signatures and Electronic Contracts.
Inf. Secur. J. A Glob. Perspect., 2004

Source Code Escrow.
Inf. Secur. J. A Glob. Perspect., 2004

Software Repossession: Electronic Self-Help.
Inf. Secur. J. A Glob. Perspect., 2004

2003
Exporting Encryption Software and the First Amendment: Bernstein v. U.S. Department of State.
Inf. Secur. J. A Glob. Perspect., 2003

Biometrics, Evidence, and Personal Privacy.
Inf. Secur. J. A Glob. Perspect., 2003

Privacy Notices under the Gramm - Leach - Bliley Act.
Inf. Secur. J. A Glob. Perspect., 2003

Prosecution of Computer Virus Authors.
Inf. Secur. J. A Glob. Perspect., 2003

Internet Service Providers and Search Warrants.
Inf. Secur. J. A Glob. Perspect., 2003

2002
ISP Liability for Third-Party Defamation.
Inf. Secur. J. A Glob. Perspect., 2002

The Digital Millennium Copyright Act.
Inf. Secur. J. A Glob. Perspect., 2002

Pretexting, Data Mining and Personal Privacy: The Gramm - Leach - Bliley Act.
Inf. Secur. J. A Glob. Perspect., 2002

Third-Party Liability: Who Pays for Computer Damages?
Inf. Secur. J. A Glob. Perspect., 2002

Software Robots and Trespass to Chattels: eBay v. Bidder's Edge.
Inf. Secur. J. A Glob. Perspect., 2002

2001
Legal Protection of Databases: Feist v. Rural Telephone Service.
Inf. Secur. J. A Glob. Perspect., 2001

Denial of Service to Authorized Computer Users.
Inf. Secur. J. A Glob. Perspect., 2001

The Legend and Legacy of Kevin Mitnick.
Inf. Secur. J. A Glob. Perspect., 2001

Metatagging and Trademark Law: Brookfield Communications, Inc. v. West Coast Entertainment Corp.
Inf. Secur. J. A Glob. Perspect., 2001

Internet Gripe Sites: Bally v. Faber.
Inf. Secur. J. A Glob. Perspect., 2001

2000
State Control of Unsolicited E-mail: State of Washington v. Heckel.
Inf. Secur. J. A Glob. Perspect., 2000

Anonymity on the Internet: ACLU of Georgia v. Miller.
Inf. Secur. J. A Glob. Perspect., 2000

Freedom of Speech in Cyberspace: Intel v. Hamidi.
Inf. Secur. J. A Glob. Perspect., 2000

Director Liability in Computer Negligence Cases.
Inf. Secur. J. A Glob. Perspect., 2000

1999
Attorney - Client Privilege and Electronic Data Transmission.
Inf. Secur. J. A Glob. Perspect., 1999

Issues of Jurisdiction in Cyberspace.
Inf. Secur. J. A Glob. Perspect., 1999

Search and Seizure of Computer Equipment.
Inf. Secur. J. A Glob. Perspect., 1999

Webwrap and the Law of Contracts.
Inf. Secur. J. A Glob. Perspect., 1999

Cookies and Freedom of Information: The Putnam Pit Case.
Inf. Secur. J. A Glob. Perspect., 1999

1995
When Technology and Privacy Collide.
Inf. Secur. J. A Glob. Perspect., 1995

1992
A Knowledge-based Approach to Strategic Planning.
Proceedings of the Logic Programming in Action, 1992

1990
A<sup>2</sup>: an agent-oriented programming architecture for multi-agent constraint satisfaction problems.
Proceedings of the 2nd International IEEE Conference on Tools for Artificial Intelligence, 1990


  Loading...