:::

詳目顯示

回上一頁
題名:網際網路法發展趨勢特別報導
書刊名:科技法學評論
作者:王明禮 引用關係李界昇周威秀林三元林明儀林郁菁林夢平張睿元雷雅雯蔡惠如蕭敏
作者(外文):Wang, Ming-liLee, Jason Jieh-shengChou, kellyLin, San-yuanLin, Ming-yiLin, Yu-chingLin, Meng-pingChang, Richard Jui-yuanLei, Ya-wenTsai, Grace Huei-juHsiao, Karen Min
出版日期:2004
卷期:1:1
頁次:頁1-59
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(2) 博士論文(1) 專書(1) 專書論文(0)
  • 排除自我引用排除自我引用:1
  • 共同引用共同引用:0
  • 點閱點閱:28
期刊論文
1.Burk, Dan L.、Cohen, Julie E.(2001)。Fair Use Infrastructure for Rights Management Systems。Harvard Journal of Law & Technology,15,41。  new window
2.Cohen, Julie E.(1996)。A right to Read Anonymously: A Closer Look at "Copyright Management" in Cyberspace。Connecticut Law Review,28,981-1039。  new window
3.吳兆琰(20031000)。新興網路犯罪法制議題分析及因應--以歐洲理事會「網路犯罪防制公約」為中心。科技法律透析,15(10),30-48。  延伸查詢new window
4.Post, David(2000)。Of Blackholes and Decentralized Lawmaking in Cyberspace。VAND. J. ENT. L. & PRAC.,2,70。  new window
5.Branscomb, Anne Wells(1995)。Anonymity, Autonomy, and Accountability as Challenges to the First Amendment in Cyberspaces。YALE L.J.,104,1639。  new window
6.Esler, Brian W.(2003)。Protecting the Protection: A Trans-Atlantic Analysis of the Emerging Right to Technological Self-Help。IDEA,43,553。  new window
7.Friedman, Lawrence M.(2001)。Erewhon: The Coming Global Legal Order。STAN. J. INT'L L.,37,347。  new window
8.Katyal, Neal Kumar(2003)。Digital Architecture As Crime Control。YALE L.J.,112,2261。  new window
9.Litman, Jessica(2000)。The DNS Wars: Trademarks And The Internet Domain Name System。J. SMALL & EMERGING BUS. L.,4,149。  new window
10.Lindsky, Lyrissa Barnet(2000)。Silencing John Doe: Defamation and discourse in cyberspace。DUKE L.J.,49,855。  new window
11.Merges, Robert Patrick、Reynolds, Glenn Harlan(2000)。The Proper Scope of the Copyright and Patent Power。HARV. J. LEGIS.,37,45。  new window
12.Nadan, Christian H.(2002)。Open Source Licensing: Virus or Virtue?。TEX. INTELL. PROP. L. J.,10,349。  new window
13.Raysman, Richard、Brown, Peter(20010911)。Discovering the Identity of Anonymous Internet Posters。N.Y.L.J.。  new window
14.Reder, Margo E. K.、O'Brien, Christine Neylon(2002)。Corporate Cybersmear: Employers File John Doe Defamation Lawsuits Seeking the Identity of Anonymous Employee Internet Posters。MICH. TELCOMM. & TECH. L. REV.,8,195。  new window
15.Reilly, Bill(200203)。The Impact of the USA Patriot Act on Network Security Practice。J. Internet L.,1。  new window
16.Goldsmith, Jack L.(1998)。Against Cyberanarchy。U. CHI. L. REV.,65,1199。  new window
17.Samuelson, Pamela(1999)。Intellectual Property and the Digital Economy: Why the Anti-Circumvention Regulations Need to Be Revised。Berkeley Technology Law Journal,14(2),519-566。  new window
18.Burk, Dan L.、Lemley, Mark A.(2002)。Is Patent Law Technology-Specific?。Berkeley Technology Law Journal,17,1155-1167。  new window
19.Johnson, David R.、Post, David G.(1996)。Law and borders: The rise of law in cyberspace。Stanford Law Review,48(5),1367-1402。  new window
會議論文
1.ESTES, DAWN、PARMAR, BHAVEENI(2003)。SPAM, SPAM AND MORE SPAM。16th Annual Computer And Technology Law Institute,(會議日期: May 29-30, 2003)。  new window
圖書
1.BRIN, DAVID(1998)。TRANSPARENT SOCIETY。  new window
2.Lessig, Lawrence(1999)。Code: And Other Laws Of Cyberspace。  new window
3.MACKINNON, CATHARINE A.(1987)。FEMINISM UNMODIFIED: DISCOURSES ON LIFE AND LAW。  new window
4.SUNSTEIN, CASS R.(2002)。REPUBLIC.COM。  new window
5.VAIDHYANATHAN, SIVA(2003)。COPYRIGHTS AND COPYWRONGS。  new window
6.Lessig, Lawrence(2001)。The Future of Ideas: The Fate of the Commons in a Connected World。Random House, Inc.。  new window
其他
1.INTERCHANGE OF DATA BETWEEN ADMINISTRATIONS。THE IDA OPEN SOURCE MIGRATION GUIDELINES,http://europa.eu.int/ISPO/ida/export/files/en/1618.pdf, 2003/11/08。  new window
2.PEW INTERNET PROJECT(2003)。SPAM: HOW IT IS HURTING EMAIL AND DEGRADING LIFE ON THE INTERNET,http://www.pewinternet.org/reports/toc.asp?Report=102。  new window
3.馮震宇(20020731)。網路犯罪與網路犯罪條約,http://www.apipa.org.tw/Article/Article-ViewADA.asp?intADAarticleID=88&strSortTarget=adaCreateDate。  延伸查詢new window
4.Burke, Edmund B.(2001)。The Expanding Importance of The Computer Fraud and Abuse Act,http://www.gigalaw.com/articles/2001-all/burke-2001-01-all.html。  new window
5.Kirby, Carrie(20040122)。RIAA Goes After 532 Unnamed File Sharers,http://www.sfgate.com/cgi-bin/article.cgi?file=/chronicle/archive/2004/01/22/BUGJD4EP2O1.DTL。  new window
6.Dreazen, Yochi J.(20021218)。Russian Company Passes First Test Of Copyright Law。  new window
7.Evangelista, Benny(20040208)。The Music Revolution Has Arrived: Itunes, Napster 2.0 Make Downloading Songs Easy and Legal,http://www.sfgate.com/cgi-bin/article.cgi?file=/chronicle/archive/2003/10/20/BUGJG2E8IF1.DTL。  new window
8.Fisher, William,Yang, Christopher(2001)。Peer-to-Peer Copying,http://cyber.law.harvard.edu/ilaw/P2P.html。  new window
9.Gilmore, Janet(20030505)。Law students draft Internet privacy bill,http://www.berkeley.edu/news/media/releases/2003/05/05_privacy.shtml。  new window
10.Hopper, D. Ian(20000725)。House Grills FBI on E-Mail Surveillance,http://www.sfgate.com/cgi-bin/article.cgi?file=/examiner/archive/2000/07/25/NEWS13188.dtl。  new window
11.Hua, Vanessa,Egelko, Bob(20000623)。AT&T Wins Appeal on Net Access,http://www.sfgate.com/cgi-bin/article.cgi?file=/examiner/archive/2000/06/23/BUSINESS464.dtl。  new window
12.Kerr, Donald M.(20000906)。Congressional Statement on Carnivore Diagnostic Tool,http://www.fbi.gov/congress/congress00/kerr090600.htm。  new window
13.Kraut, Robert E.,Sunder, Shyam,Telang, Rahul,Morris, James。Working Paper, Pricing Electronic Mail to Solve the Problem of Spam,http://www.heinz.cmu.edu/~rtelang/Pricing%20Email.pdf。  new window
14.Krim, Jonathan(20040219)。EarthLink, AOL Allege Spamming Networks。  new window
15.Lohr, Steve(20040312)。Microsoft Said to Encourage Big Investment in SCO Group,http://www.nytimes.com/2004/03/12/technology/12soft.html。  new window
16.Mayer, Caroline E.(20031008)。Court Says Do-Not-Call List Can Be Enforced,http://www.washingtonpost.com/wp-dyn/articles/A58828-2003Oct7.html。  new window
17.Poulsen, Kevin(20031107)。Linux Kernel Backdoor Blocked,http://www.theregister.co.uk/content/55/33855.html。  new window
18.Raymond, Eric Steven(20000911)。Release Early, Release Often, a section in his online treatise The Cathedral and the Bazaar,http://www.catb.org/~esr/writings/cathedral-bazaar/cathedral-bazaar/ar01s04.html。  new window
19.Zeller, Tom(20000716)。Cloak, Dagger, Echelon,http://www.nytimes.com/library/review/071600echelon-review.html。  new window
20.EFF。Cyberslapp/John Doe Cases,www.eff.org/Privacy/Anonymity/#cases, 2004/06/20。  new window
21.EFF。EFF "Intellectual Property: Digital Millennium Copyright Act (DMCA): U.S. v. Elcom-Soft & Sklyarov" Archive,http://www.eff.org/IP/DMCA/US_v_Elcomsoft/, 2003/03/13。  new window
22.EFF。Felten v. RIAA,http://www.eff.org/IP/DMCA/Felten_v_RIAA/, 2004/01/20。  new window
23.EFF。RIAA v. The People,http://www.eff.org/IP/P2P/riaa-v-thepeople.php, 2004/03/23。  new window
24.GNU。Frequently Asked Questions about the GNU GPL,http://www.gnu.org/licenses/gplfaq.html, 2004/02/26。  new window
25.Open Source Initiative。The Open Source Definition,http://opensource.org/docs/definition.php, 2004/03/02。  new window
26.Federal Trade Commission(2003)。To Promote Innovation: The Proper Balance of Competition and Patent Law and Policy,http://www.ftc.gov/os/2003/10/innovationrptsummary.pdf, 2008/08/28。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
:::
QR Code
QRCODE