Results 11 to 20 of about 7,474,745 (317)
This study evaluates and compares the suitability for child–computer interaction (CCI, the branch within human–computer interaction focused on interactive computer systems for children) of two devices: a standard computer mouse and the ENLAZA interface ...
Cristina Sanchez +5 more
doaj +3 more sources
The Law Commission presumption concerning the dependability of computer evidence [PDF]
We consider the condition set out in section 69(1)(b) of the Police and Criminal Evidence Act 1984 (PACE 1984) that reliance on computer evidence should be subject to proof of its correctness, and compare it to the 1997 Law Commission recommendation that
Ladkin, P. B. +3 more
core +1 more source
Patentability of Computer Program Algorithms in the G20 States
Ubiquitous computerization and digitalization are contributing to the unprecedented growth of the software market. Computer programs are protected as subject of copyright law in international law and domestic legal systems.
A. Matveev, E. Martyanova
doaj +1 more source
Application of Computer Technology in Legal Practice [PDF]
Based on the practice of law, the modern technology of electronic computer means and the practice that can be accepted by everyone who has been processed by electronic means have been obtained by the scientific and technological means that are now widely
Tan Yuanyuan, Li Ying
doaj +1 more source
Law for Computer Scientists and Other Folk
This book introduces law to computer scientists. Computer scientists develop, protect, and maintain computing systems in the broad sense of that term, whether hardware, software, or data. They may be focused on e.g.
M. Hildebrandt
semanticscholar +1 more source
Formalizing Human Ingenuity: A Quantitative Framework for Copyright Law's Substantial Similarity [PDF]
A central notion in U.S. copyright law is judging the substantial similarity between an original and an (allegedly) derived work. Capturing this notion has proven elusive, and the many approaches offered by case law and legal scholarship are often ill ...
Sarah Scheffler +2 more
semanticscholar +1 more source
This article identifies key features of the sociotechnical contexts of computer law and security at the times of this journal's establishment in 1985, and of its 200th Issue in 2018.
R. Clarke, Marcus R. Wigan
semanticscholar +1 more source
Problems of existing models of protection of computer programs in Ukraine
The law enforcement and legislative practice of most states followed the path of protecting computer programs by copyright law. It happened because the model of copyright protection of the computer programs is cheaper and faster procedure than patent ...
Олена Вікторівна Піхурець +1 more
doaj +1 more source
Comparative study of cyber-crime in Iran and international law [PDF]
Because of human activities complexity, Willy-nilly any change in present world would have impacts and outcomes. In such a way that with invention of new device, besides its correct and legal usage there is always the possibility of its misusing. In this
Bita Dashti, Maryam Afshari
doaj +1 more source
Machine Learning and Asylum Adjudications: From Analysis of Variations to Outcome Predictions
Individuals who demonstrate well-founded fears of persecution or face real risk of being subjected to torture, are eligible for asylum under Danish law.
Panagiota Katsikouli +7 more
doaj +1 more source

