default search action
Edward H. Freeman
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2011
- [r4]Edward H. Freeman:
Bally v. Faber. Encyclopedia of Information Assurance 2011 - [r3]Edward H. Freeman:
Personnel: Practices. Encyclopedia of Information Assurance 2011 - [r2]Edward H. Freeman:
Privacy: Legal Issues. Encyclopedia of Information Assurance 2011 - [r1]Edward H. Freeman:
State of Washington v. Heckel. Encyclopedia of Information Assurance 2011 - 2010
- [j47]Edward H. Freeman:
Computer Printouts as Legal Evidence. J. Digit. Forensic Pract. 3(2-4): 98-105 (2010)
2000 – 2009
- 2007
- [j46]Edward H. Freeman:
RFIDs and Personal Privacy. Inf. Secur. J. A Glob. Perspect. 16(1): 61-64 (2007) - [j45]Edward H. Freeman:
Vulnerability Disclosure: The Strange Case of Bret McDanel. Inf. Secur. J. A Glob. Perspect. 16(2): 127-131 (2007) - [j44]Edward H. Freeman:
Email Privacy and the Wiretap Act: U.S. v. Councilman. Inf. Secur. J. A Glob. Perspect. 16(3): 182-185 (2007) - [j43]Edward H. Freeman:
Computer Hackers and Search and Seizure: United States v. Jarrett. Inf. Secur. J. A Glob. Perspect. 16(4): 239-243 (2007) - [j42]Edward H. Freeman:
Holistic Information Security: ISO 27001 and Due Care. Inf. Secur. J. A Glob. Perspect. 16(5): 291-294 (2007) - [j41]Edward H. Freeman:
Regulatory Compliance and the Chief Compliance Officer. Inf. Secur. J. A Glob. Perspect. 16(6): 357-361 (2007) - 2006
- [j40]Edward H. Freeman:
Disclosure of Information Theft: The ChoicePoint Security Breach. Inf. Secur. J. A Glob. Perspect. 14(6): 11-15 (2006) - [j39]Edward H. Freeman:
Wardriving: Unauthorized Access to Wi-Fi Networks. Inf. Secur. J. A Glob. Perspect. 15(1): 11-15 (2006) - [j38]Edward H. Freeman:
Open Source Software and the SCO Litigation. Inf. Secur. J. A Glob. Perspect. 15(3): 5-9 (2006) - [j37]Edward H. Freeman:
Gmail and Privacy Issues. Inf. Secur. J. A Glob. Perspect. 15(4): 2-6 (2006) - [j36]Edward H. Freeman:
Service of Process by Email. Inf. Secur. J. A Glob. Perspect. 15(6): 7-11 (2006) - 2005
- [j35]Edward H. Freeman:
Data Protection and the Commerce Clause. Inf. Secur. J. A Glob. Perspect. 13(6): 5-9 (2005) - [j34]Edward H. Freeman:
Cyber Courts and the Future of Justice. Inf. Secur. J. A Glob. Perspect. 14(1): 5-9 (2005) - [j33]Edward H. Freeman:
Privacy and Dot.Com Bankruptcies: Protection of Personal Data. Inf. Secur. J. A Glob. Perspect. 14(3): 9-13 (2005) - [j32]Edward H. Freeman:
Retention of Corporate E-Documents under Sarbanes - Oxley. Inf. Secur. J. A Glob. Perspect. 14(4): 5-9 (2005) - [j31]Edward H. Freeman:
Click Fraud: Google v. Auctions Expert International. Inf. Secur. J. A Glob. Perspect. 14(5): 5-9 (2005) - 2004
- [j30]Edward H. Freeman:
Software Repossession: Electronic Self-Help. Inf. Secur. J. A Glob. Perspect. 12(6): 2-6 (2004) - [j29]Edward H. Freeman:
Source Code Escrow. Inf. Secur. J. A Glob. Perspect. 13(1): 8-11 (2004) - [j28]Edward H. Freeman:
Digital Signatures and Electronic Contracts. Inf. Secur. J. A Glob. Perspect. 13(2): 8-12 (2004) - [j27]Edward H. Freeman:
Corporate Liability for Illegal Downloading of Copyrighted Music. Inf. Secur. J. A Glob. Perspect. 13(4): 6-10 (2004) - [j26]Edward H. Freeman:
Document Theft: Appropriate Responses. Inf. Secur. J. A Glob. Perspect. 13(5): 4-8 (2004) - 2003
- [j25]Edward H. Freeman:
Internet Service Providers and Search Warrants. Inf. Secur. J. A Glob. Perspect. 11(6): 6-9 (2003) - [j24]Edward H. Freeman:
Prosecution of Computer Virus Authors. Inf. Secur. J. A Glob. Perspect. 12(1): 5-9 (2003) - [j23]Edward H. Freeman:
Privacy Notices under the Gramm - Leach - Bliley Act. Inf. Secur. J. A Glob. Perspect. 12(2): 5-9 (2003) - [j22]Edward H. Freeman:
Biometrics, Evidence, and Personal Privacy. Inf. Secur. J. A Glob. Perspect. 12(3): 4-8 (2003) - [j21]Edward H. Freeman:
Exporting Encryption Software and the First Amendment: Bernstein v. U.S. Department of State. Inf. Secur. J. A Glob. Perspect. 12(4): 12-16 (2003) - 2002
- [j20]Edward H. Freeman:
Software Robots and Trespass to Chattels: eBay v. Bidder's Edge. Inf. Secur. J. A Glob. Perspect. 10(6): 6-9 (2002) - [j19]Edward H. Freeman:
Third-Party Liability: Who Pays for Computer Damages? Inf. Secur. J. A Glob. Perspect. 11(1): 5-9 (2002) - [j18]Edward H. Freeman:
Pretexting, Data Mining and Personal Privacy: The Gramm - Leach - Bliley Act. Inf. Secur. J. A Glob. Perspect. 11(2): 4-8 (2002) - [j17]Edward H. Freeman:
The Digital Millennium Copyright Act. Inf. Secur. J. A Glob. Perspect. 11(4): 4-8 (2002) - [j16]Edward H. Freeman:
ISP Liability for Third-Party Defamation. Inf. Secur. J. A Glob. Perspect. 11(5): 10-14 (2002) - 2001
- [j15]Edward H. Freeman:
Internet Gripe Sites: Bally v. Faber. Inf. Secur. J. A Glob. Perspect. 9(6): 1-5 (2001) - [j14]Edward H. Freeman:
Metatagging and Trademark Law: Brookfield Communications, Inc. v. West Coast Entertainment Corp. Inf. Secur. J. A Glob. Perspect. 10(1): 1-5 (2001) - [j13]Edward H. Freeman:
The Legend and Legacy of Kevin Mitnick. Inf. Secur. J. A Glob. Perspect. 10(2): 1-6 (2001) - [j12]Edward H. Freeman:
Denial of Service to Authorized Computer Users. Inf. Secur. J. A Glob. Perspect. 10(3): 1-5 (2001) - [j11]Edward H. Freeman:
Legal Protection of Databases: Feist v. Rural Telephone Service. Inf. Secur. J. A Glob. Perspect. 10(4): 1-5 (2001) - 2000
- [j10]Edward H. Freeman:
Director Liability in Computer Negligence Cases. Inf. Secur. J. A Glob. Perspect. 9(1): 1-5 (2000) - [j9]Edward H. Freeman:
Freedom of Speech in Cyberspace: Intel v. Hamidi. Inf. Secur. J. A Glob. Perspect. 9(2): 1-5 (2000) - [j8]Edward H. Freeman:
Anonymity on the Internet: ACLU of Georgia v. Miller. Inf. Secur. J. A Glob. Perspect. 9(4): 1-6 (2000) - [j7]Edward H. Freeman:
State Control of Unsolicited E-mail: State of Washington v. Heckel. Inf. Secur. J. A Glob. Perspect. 9(5): 1-5 (2000)
1990 – 1999
- 1999
- [j6]Edward H. Freeman:
Issues of Jurisdiction in Cyberspace. Inf. Secur. J. A Glob. Perspect. 7(4): 20-26 (1999) - [j5]Edward H. Freeman:
Attorney - Client Privilege and Electronic Data Transmission. Inf. Secur. J. A Glob. Perspect. 7(4): 46-51 (1999) - [j4]Edward H. Freeman:
Cookies and Freedom of Information: The Putnam Pit Case. Inf. Secur. J. A Glob. Perspect. 8(1): 39-44 (1999) - [j3]Edward H. Freeman:
Webwrap and the Law of Contracts. Inf. Secur. J. A Glob. Perspect. 8(2): 14-20 (1999) - [j2]Edward H. Freeman:
Search and Seizure of Computer Equipment. Inf. Secur. J. A Glob. Perspect. 8(3): 10-15 (1999) - 1995
- [j1]Edward H. Freeman:
When Technology and Privacy Collide. Inf. Secur. J. A Glob. Perspect. 4(3): 62-66 (1995) - 1992
- [c2]Edward H. Freeman:
A Knowledge-based Approach to Strategic Planning. Logic Programming Summer School 1992: 109-117 - 1990
- [c1]Edward H. Freeman:
A2: an agent-oriented programming architecture for multi-agent constraint satisfaction problems. TAI 1990: 830-840
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint