Law & Technology Resources

About

This began, more or less, as a dump of my SSRN Briefcase.  It will be supplemented and added to with additional resources.  Further, the most-proper citations and locations of each paper will be sought and updated.  If you have recommendations for articles or books to add to this list, please contact John.

This is a continuing project, please forgive its perpetually unfinished state.

Cyberspace & Virtual Worlds

Shubha Ghosh, Gray Markets in Cyberspace, Working Paper Series,  available at http://ssrn.com/abstract=153083.

Greg Lastowka & Dan Hunter, Virtual Crime, New York Law School Law Review (forthcoming), available at http://ssrn.com/abstract=564801.

Michael Meehan, Virtual Property: Protecting Bits in Context, Richmond Journal of Law and Technology (2006), available at http://ssrn.com/abstract=908924.

Charles Blazer, The Five Indicia of Virtual Property, 5 Pierce Law Review 137 (2006), available at http://ssrn.com/abstract=962905.

Steven J. Horowitz, Competing Lockean Claims to Virtual Property, 20 Harvard Journal of Law and Technology (2007), available at http://ssrn.com/abstract=981755.

Juliet M. Moringiello, Towards a System of Estates in Virtual Property, Widener Law School Legal Studies Research Paper No. 08-22; CYBERLAW SECURITY & PRIVACY, Sylvia Mercado Kierkegaard, ed., International Association of IT Lawyers, 2007; International Journal of Private Law, Vol. 3. Available at SSRN: http://ssrn.com/abstract=1070184.

Ben. K. Pollitzer, Serious Business: When Virtual Items Gain Real World Value, (December 1, 2007), available at http://ssrn.com/abstract=1090048.

Ryan G. Vacca, Viewing Virtual Property Ownership Through the Lens of Innovation, 76 Tenn. L. Rev. 33 (2008), available at http://ssrn.com/abstract=1100302.

Kristina B. Denapolis West, Real Concerns in Virtual Property, (July 1, 2005), available at http://ssrn.com/abstract=1154234.

Juliet M. Moringiello, What Virtual Worlds Can do for Property Law, Florida Law Review (Forthcoming 2009), available at http://ssrn.com/abstract=1366450.

John William Nelson, The Virtual Property Problem: What Property Rights in Virtual Resources Might Look Like, How They Might Work, and Why They are a Bad Idea, 41 McGeorge Law Review (Forthcoming 2010), available at http://ssrn.com/abstract=1469299.

John William Nelson, Fiber Optic Foxes: Virtual objects and virtual worlds through the lens of Pierson v. Post and the Law of Capture, 14 J. Tech. L. & Pol’y 5 (2009), available at http://ssrn.com/abstract=1469532.

Property Theory

Lucian A. Bebchuck, Property Rights and Liability Rules: The Ex Ante View of the Cathedral, 100 Michigan Law Review 601 (2001), available at http://ssrn.com/abstract=301283.

Michael W. Carroll, Whose Music is it Anyway? How we Came to View Musical Expression as a Form of Property, 72 University of Cincinnati Law Review 1405 (2004), available at http://ssrn.com/abstract=477162.

Dean Lueck & Thomas J. Miceli, Property Rights and Property Law, HANDBOOK OF LAW AND ECONOMICS, Polinsky & Shavell, eds., (Forthcoming), available at http://ssrn.com/abstract=578323.

Jerald Highes, Karl Reiner Lang, Eric K. Clemons & Robert J. Kauffman, A Unified Interdisciplinary Theory of Open Source Culture and Entertainment, (July 20, 2007), available at http://ssrn.com/abstract=1077909.

Horace Anderson, ‘Criminal Minded?’ Mixtape DJs, the Piracy Paradox, and Lessons for the Recording Industry, 76 Tennessee Law Review (2008), available at http://ssrn.com/abstract=1273805.

Josh Blackman, Outfoxed Pierson v. Post and the Natural Law, (May 13, 2009), available at http://ssrn.com/abstract=1403932.

Technology & Privacy

Christine A. Coletta, Laptop Searches at the United States Borders and the Border Search Exception to the Fourth Amendment, Boston College Law Review (Forthcoming), available at http://ssrn.com/abstract=994729.

Nathan Alexander Sales, Run for the Border: Laptop Searches and the Fourth Amendment, 43 University of Richmond Law Review 1091 (2009), available at http://ssrn.com/abstract=1279683.

Sara M. Smyth, Searches of Computers and Computer Data at the United States Border: The Need for a New Framework Following United States v. Arnold, 1 Journal of Law, Technology and Policy (February 18, 2009), available at http://ssrn.com/abstract=1345927.

John William Nelson, Border Confidential: Why Searches of Laptop Computers at the Border Should Require Reasonable Suspicion, 31 American Journal of Trial Advocacy 137 (2007), available at http://ssrn.com/abstract=1469292.

No Comments

Leave a Reply

Your email is never shared.Required fields are marked *