Journal: I. J. Law and Information Technology

Volume 17, Issue 3

233 -- 251Bostjan Bercic, Carlisle George. Identifying Personal Data Using Relational Database Design Principles
252 -- 267Bruce L. Mann. Social Networking Websites - A Concatenation of Impersonation, Denigration, Sexual Aggressive Solicitation, Cyber-Bullying or Happy Slapping Videos
268 -- 281Ida Madieha bt. Abdul Ghani Azmi. Institutional Repositories in Malaysia : The Copyright Issues
282 -- 303P. Sean Morris. Pirates of the Internet, At Intellectual Property s End With Torrents and Challenges for Choice of Law

Volume 17, Issue 2

147 -- 179Gehan Gunasekara. The Final Privacy Frontier? Regulating Trans-Border Data Flows
180 -- 205Marita Shelly, Margaret Jackson. Doing Business with Consumers Online: Privacy, Security and the Law
206 -- 219Imtinan Ahmad, Hong Sik Kim, Laurence L. Leff, Daniel Dazza Greenwood. XML For Click-Through Contracts

Volume 17, Issue 1

1 -- 82Ephraim Nissan. Legal Evidence, Police Intelligence, Crime Analysis or Detection, Forensic Testing, and Argumentation: An Overview of Computer Tools or Techniques
83 -- 112Bruce L. Mann. Smoothing Some Wrinkles in Online Dispute Resolution
113 -- 145Emily B. Laidlaw. Private Power, Public Interest: An Examination of Search Engine Accountability