Backdoor Man: A Radiograph of Computer Source Code Theft Cases
18 J. High Tech. L. 1 (2017)
Opening the Door to Self-Driving Cars: How Will This Change the Rules of the Road?
18 J. High Tech. L. 38 (2017)
Paul J. Pearah, Ph.D.
Defending with Clapper: Applying the Supreme Court’s Article III Standing Interpretation to Data Breach Lawsuits
18 J. High Tech. L. 71 (2017)
Conor L. McSweeney
The Computer Fraud and Abuse Act: Are You Still Watching?
18 J. High Tech. L. 98 (2017)
Alex N. Samaei
More Than Just Skin(s) in the Game: How One Digital Video Game Item is Being Used for Unregulated Gambling Purposes Online
18 J. High Tech. L. 125 (2017)
John Vrooman Haskell
An Inside Job: The Intersection of Federal Computer Law and Trade Secret Law in Cases of Insider Misappropriation
18 J. High Tech L. 161 (2017)
Jenna M. Andrews
Enter the World of Yesterday, Tomorrow and Fantasy: Walt Disney World’s Creation and its Implications on Privacy Rights Under the MagicBand System
18 J. High Tech. L. 198 (2017)