Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

Key information liability issues facing managers: software piracy, proprietary databases, and individual rights to privacy

Published: 01 June 1990 Publication History

Abstract

No abstract available.

References

[1]
Aalders, J.C.H., Herschberg, I.S. and Van Zanten, A. Handbook for Information Security (2 vols.), North-Holland, Amsterdam, 1985.
[2]
Apple Computer Inc. V. Franklin Computer Corp., 714 Federal Reporter 2d, 1983, pp. 1240-1255.
[3]
Beheshtian, M. "Computer Copyright Law," Journal of Systems Management (37:9), September 1986, pp. 6-11.
[4]
Bequai, A. Computers + Business = Liabilities: A Preventive Guide for Management, Washington Legal Foundation, Washington, DC, 1984.
[5]
Bequai, A. Technocrimes, Lexington Books, Lexington, MA, 1987.
[6]
BloomBecker, J. Computer Crime, Computer Security, Computer Ethics, National Center for Computer Crime Data, Los Angeles, CA, 1988.
[7]
Boyer, H.A. "Using Software in Computer Networks: Avoiding Liability for Copyright Infringement," Jurimetrics Journal of Law, Science and Technology (28:3), Spring 1988, pp. 275-288.
[8]
Brickman, B.K. "The Corporate Computer: A Potential Timebomb," Financial Executive (51:4), April 1983, p. 20.
[9]
Burnside, R.S. "The Electronic Communications Privacy Act of 1986: The Challenge of Applying Ambiguous Statutory Language to Intricate Telecommunication Technologies," Rutgers Computer & Technology Law Journal (13:2), Winter 1987, pp. 451-517.
[10]
Bysouth, P. T. "Stone Tablets to Floppy Disks and the Question of Downloading," Journal of Information Science (11:3), 1985, pp. 139-142.
[11]
Canning, H.W.W. "Protection of Personal Data in the United States," The Information Society (3:2), 1984, pp. 113-130.
[12]
Caporael, L.R. "Computers, Prophecy, and Experience: A Historical Perspective," Journal of Social Issues (40:3), Fall 1984, pp. 15-29.
[13]
Computer Software Copyright Act of 1980. 94 Stat 3015, 17 U.S.C., 1980.
[14]
Copyright Statute of 1976. 17 U.S.C., 1976.
[15]
Couger, J.D. "Preparing IS Students to Deal With Ethical Issues," MIS Quarterly (13:2), June 1989, pp. 211-218.
[16]
Counterfeit Access Device and Computer Fraud and Abuse Act of 1984.18 U.S.C., 1984.
[17]
Demas, S.G. "Copyright and Legal Considerations," in Public Access Microcomputers in Academic Libraries, Howard Curtis (ed.), American Library Association, Chicago, IL, 1987, pp. 59-79.
[18]
Denning, D.E. and Denning, P.J. "Data Security," Computing Surveys (11:3), September 1979, pp. 227-249.
[19]
Denning, D.E., Denning, P.J. and Schwartz, M.D. "The Tracker: A Threat to Statistical Database Security," ACM Transactions on Database Systems (4:1), March 1979, pp. 76-96.
[20]
Diamond v. Diehr and Lutton. 450 U.S. 175, 101 S. Ct. 1048, 1981.
[21]
Dreyfuss, R.C. and Leebron, D.W. "Foreword: Privacy and Information Technology," Annual Survey of American Law 1986, June 1987, pp. 495-509.
[22]
Duchesne, R. "Copyright, Ownership of, in Machine-Readable Bibliographic Data, " in Encyclopedia of Library and Information Science, Vol. 40, Allen Kent (ed.), Marcel Dekker, New York, NY, 1986, pp. 33-43.
[23]
Dun & Bradstreet Inc. v. Greenmoss Builders Inc. 472 U.S. 749, 105 S. CT. 2939, 1985.
[24]
Everest, G.C. Database Management: Objectives, System Functions, and Administration, McGraw-Hill, New York, NY, 1986.
[25]
Federal Library and Information Center Committee. "The International Flow of Scientific and Technical Information," Government Information Quarterly (3:2), 1986, pp. 163-178.
[26]
Fields, A.R. and Schiller, Z. "Electronic Data Could Make Trouble for the Law," Business Week, October 27, 1986, pp. 128, 132.
[27]
Finner, W. "Privacy of Employment Records in the Private Sector," Annual Survey of American Law 1986, June 1987, pp. 569-585.
[28]
Flaherty, D.H. Privacy and Data Protection: An International Bibliography, Knowledge Industry, White Plains, NY, 1984.
[29]
Freed, R.N. "Computer Fraud--A Management Trap," Business Horizons, June 1969, pp. 25-30.
[30]
Freedman, R. "The Right of Privacy in the Age of Computer Data and Processing," Texas Tech Law Review (13), 1982, pp. 1361-1363.
[31]
Garman, N. "Downloading. . .Still a Live Issue?" Online (10:4), July 1986, pp. 15-25.
[32]
Gemignani, M.C. Law and the Computer, CBI Publishing, Boston, MA, 1981.
[33]
Goldstein, M.L. "Information Law: Meet the New Entrepreneur," Industry Week, April 28, 1986, pp. 65-67.
[34]
Gregurgas, F.M. "Intellectual Property Protection in the USA," Information Age (9:4), October 1987, pp. 215-219.
[35]
Hal Roach Studios, Inc. v. Richard Fiener & Co. 1984 Copyright Law Decisions (CCH) para. 25, 709 S.D.N.Y., 1984.
[36]
Hoffer, J. and Straub, D., Jr. "The 9 to 5 Underground: Are You Policing Computer Crimes?" Sloan Management Review (30:4), Summer 1989, pp. 35-44.
[37]
Huber, G.P. "The Nature and Design of Post-Industrial Organizations," Management Science (30:8), August 1984, pp. 928-951.
[38]
Jakes, J.M. and Yoches, E.R. "Legally Speaking: Basic Principles of Patent Protection for Computer Software," Communications of the ACM (32:8), August 1989, pp. 922-924.
[39]
Jones, J.W. and McLeod, R., Jr. "The Structure of Executive Information Systems: An Exploratory Analysis," Decision Sciences (17:2), Spring 1986, pp. 220-248.
[40]
Jurkat, M.A. "Computer Crime Legislation: Survey and Analysis," Annual Survey of American Law 1986, June 1987, pp. 511-544.
[41]
Koenig, C.F. "Recent Copyright Developments Relating to Computer Software and Databases," Journal of the Computer Law Association, Fall 1986, pp. 5-10.
[42]
LaPlante, A. "Liability in the Information Age," InfoWorld, August 18, 1986, pp. 37-38.
[43]
Lautsch, J.C. American Standard Handbook of Software Business Law, Reston Publishing, Reston, VA, 1985.
[44]
Mason, R.O. "Four Ethical Issues of the Information Age," MIS Quarterly (10:1), March 1986, pp. 4-12.
[45]
McFarlan, F.W. "Editor's Comments," MIS Quarterly (12:1), March 1988, pp. iii-vi.
[46]
McKibben, W.L. "Who Gets the Blame for Computer Crime?" Infosystems (5:7), July 1983, pp. 34-36.
[47]
Mika, J.J. and Shuman, B.A. "Legal Issues Affecting Libraries and Librarians," American Libraries (108), February 1988, pp. 108-112.
[48]
Mylott, T.R. Computer Law for Computer Professionals, Prentice-Hall, Englewood Cliffs, NJ, 1984.
[49]
Mykytyn, K., Mykytyn, P.P., Jr. and Slinkman, C.W. "Expert Systems: A Question of Liability?" MIS Quarterly (14:1), March 1990, pp. 27-42.
[50]
NEC Corporation v. Intel Corporation. C-94-20799-WPG, N.D. CA, 10 U.S.P.Q. 2d 1177, 1989.
[51]
Nimmer, M.B. and Geller, P.E. International Copyright Law and Practice, Matthew Bender, Albany; NY, 1988.
[52]
OECD (Organisation for Economic Co-Operation and Development). Computer-Related Crime: Analysis of Legal Policy, OECD, Paris, 1986.
[53]
Oberdorfer, D. "West, Mead to Settle Disputes," Star Tribune (Minneapolis), July 22, 1988, p. 1D.
[54]
Parker, D.B. Fighting Computer Crime, Scribner, New York, NY, 1983.
[55]
Parker, D.B. "Ethics for Information Systems Personnel," Journal of Information Systems Management (5:3), Summer 1988, pp. 44-48.
[56]
People v. Home Insurance Co. 197 Colo. 260, 591 P.2d 1036, 1979.
[57]
Rand McNally & Co. v. Fleet Management Systems, Inc. N.D. III., 1986.
[58]
Regan, P.M. "Privacy, Government Information, and Technology," Public Administration Review, November/December 1986, pp. 629-634.
[59]
Regan, P.M. "From Paper Dossiers to Electronic Dossiers: Gaps in the Privacy Act of 1974," Office: Technology and People (3), 1988, pp. 279-296.
[60]
Ricketts, J.A. "Powers-of-Ten Information Biases," MIS Quarterly (14:1), March 1990, pp. 63-77.
[61]
Roe v. Wade. 410 U.S. 113, 153, 93 S. Ct. 705, 727, 1973.
[62]
SAS Institute Inc. v. S&H Computer Systems. 605 F. Supp. 816, 225 U.S.P.O. 916, 1985.
[63]
Simpson, J. "Information Management: Issues for the Late 80s," ASLIB Information, September 1987, pp. 215-219.
[64]
Sprague, R.H. and McNurlin, B.C. Information Systems Management in Practice, Prentice-Hall, Englewood Cliffs, NJ, 1986.
[65]
Steinberg, R. "NEC v. INTEL: The Battle over Copyright Protection for Microcode," Jurimetrics Journal (27:2), Winter 1987, pp. 173-199.
[66]
Straub, D.W., Jr. "Controlling Computer Abuse: An Empirical Study of Effective Security Countermeasures," Proceedings of the Eighth International Conference on Information Systems, December 6-9, 1987, Pittsburgh, PA, pp. 277-289.
[67]
Straub, D.W., Jr. and Nance, W.D. "Discovering and Disciplining Computer Abuse in Organizations: A Field Study," MIS Quarterly (14:1), March 1990, pp. 45-60.
[68]
Straub, D.W., Jr. and Wetherbe, J.C. "Information Technologies for the 1990's: An Organizational Impact Perspective," Communications of the ACM (32:11), November 1989, pp. 1328-1339.
[69]
U.S. Congress, Office of Technology Assessment. Federal Government Information Technology: Electronic Record Systems and Individual Privacy, OTA-CIT-296, U.S. Government Printing Office, Washington, D.C., June 1986.
[70]
United States v. Miller. 425 U.S. 435, 1976.
[71]
Walton, C. and Durham, A. "Information Systems Liability," Journal of Systems Management (39:10), October 1988, pp. 36-41.
[72]
Ward v. Superior Court of California. 3 Computer L. Servo Rep. (Callahan) 206 Cal. Super. Ct., 1972.
[73]
Warren, S.D. and Brandeis, L.D. "The Right to Privacy," Harvard Law Review (4), December 15, 1890, pp. 193-220.
[74]
Weil, B.H. and Polansky, B.F. "Copyright, Serials and the Impacts of Technology," Serials Review, Summer/Fall 1986, pp. 25-32.
[75]
West Publishing Company V. Mead Data Central. 799 F.2d 1219, 1986.
[76]
Whalen V. Roe. 429 U.S. 589, 595, 97 S. Ct. 869, 874, 1977.
[77]
Wharton, L. "Legislative Issues in Computer Crime," Harvard Journal on Legislation (21:1), Winter 1984, pp. 239-254.
[78]
Whelan Associates Inc. V. Jaslow Dental Laboratory Inc. 797 F.2d 1222, 230 U.S.P.Q. 481, 1986.
[79]
Yoches, E.R. and Levine, A.J. "Legally Speaking: Basic PrinCiples of Copyright Protection for Computer Software," Communications of the ACM (32:5), May 1989, pp. 544-545.

Cited By

View all

Index Terms

  1. Key information liability issues facing managers: software piracy, proprietary databases, and individual rights to privacy

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image MIS Quarterly
    MIS Quarterly  Volume 14, Issue 2
    Jun. 1990
    96 pages
    ISSN:0276-7783
    Issue’s Table of Contents

    Publisher

    Society for Information Management and The Management Information Systems Research Center

    United States

    Publication History

    Published: 01 June 1990

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 27 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    View options

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media