On Thursday November 6, 2008 the Law Library Association of Greater New York (LLAGNY) presented in conjunction with the Electronic Legal Information Access and Citation Committee of the American Association of Law Libraries (AALL) a program at the New York County Lawyers Association in New York City regarding how findings…
Articles Posted in Information Technology
The ECAR Study of Undergraduate Students and Information Technology
The EDUCAUSE Center for Applied Research (ECAR) Study of Undergraduate Students and Information Technology, 2008 is available at http://net.educause.edu/ir/library/pdf/ERS0808/RS/ERS0808w.pdf. Although this study was done with undergraduate students, it provides useful information relevant to all students in all fields at both the undergraduate and graduate levels. Of particular interest to lawyers…
LEH Newsletter: Copyright, New Media Law and E-Comm News
FROM THE OFFICES OF LESLEY ELLEN HARRIS Copyright, New Media Law & E-Commerce News NOTE: THIS CONTENT IS BEING REPRODUCED FOR NON-COMMERCIAL PURPOSES ONLY. __________________________________________________________________ __________________________________________________________________ Vol. 12, No. 6, October 19, 2008 ISSN 1489-954X Contents: 1. Studies, Legislation and Conventions: WIPO Study on Copyright Limitations and Exceptions for Libraries…
PC Magazine Chooses “5 Sites That Boost Your Political Awareness
PC World has named its ‘5 Sites That Will Boost Your Political Awareness.’ Included on this list are some very useful Web sites that many of you are probaly familiar with. Here is their list as posted by the American Association of Law Libraries Washington Blawg along with some helpful…
CLLB Information Security Newsletter. October 2008.
October 2008 October is National Cyber Security Awareness Month Volume 1, Issue 6 Phishing – How to Avoid Getting Hooked! From the Desk of David Badertscher What is Phishing? Phishing is a scam which attempts to entice email recipients into clicking on a link that takes them to a bogus…
CLLB Information Security Newsletter. Volume 1 Issue 5.
Volume 1 Issue 5 Personal Privacy – How to Protect Your Information From the Desk of David Badertscher As we continue to conduct more business online, such as banking, shopping and other activities, our personal information (such as name, credit card account, address, etc) is increasingly utilized. Personal information has…
Feature Articles from LLRX.Com, September 2008
Sabrina I. Pacifici Founder, Editor, Publisher: **LLRX Book Review by Heather A. Phillips – We’re All Journalists Now: The Transformation of the Press and Reshaping of the Law in the Internet Age http://www.llrx.com/columns.bookreview11.htm Heather A. Phillips highlights attorney John Gant’s contention that one’s title, income, and employer are at best…
Perspectives: Why Google Won’t Focus on Business Software
Vembu, Sridhar, “Annother View: Why Google Won’t Focus on Business Software”, Government Computer News. (September 27, 2008). “So what is Google’s plan? It is fairly obvious the company is in it to put Microsoft on the defensive on its home turf, to diminish that company’s offensive capability in the Internet.…
Legislator’s Son at Center of Sarah Palin Hack Talk, Report says
Legislator’s Son at Center of Sarah Palin Hack Talk, Report Says “Tennessee Rep. Mike Kernell says that his son, David Kernell, is at the center of speculation about the identity of the hacker who gained access to Palin’s account.” From: CIO Insider News, September 2008
Robert Pear Highlights Concerns of Loss of Federal Electronic Government Information*
One of the historic functions of libraries has been preserving and providing access to information in various media. In many ways, digitization of information has positively altered the information landscape. However, with the dynamic nature of such information, vital information preservation issues arise. In a timely September 13, 2008, New…