![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "toc:db/journals/jthtl/jthtl8.bht:"
@article{DBLP:journals/jthtl/Adelmann10, author = {Todd C. Adelmann}, title = {Are Your Bits Worn Out? The DMCA, Replacement Parts, and Forced Repeat Software Purchases}, journal = {J. Telecommun. High Technol. Law}, volume = {8}, number = {1}, pages = {185--216}, year = {2010}, url = {http://www.jthtl.org/content/articles/V8I1/JTHTLv8i1\_Adelmann.PDF}, timestamp = {Wed, 22 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jthtl/Adelmann10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jthtl/Brensdal10, author = {Kelli Brensdal}, title = {The Status of the Safe Harbor Provision after Proveris Scientific Corp. v. Innovasystems, Inc}, journal = {J. Telecommun. High Technol. Law}, volume = {8}, number = {2}, pages = {523--546}, year = {2010}, url = {http://www.jthtl.org/content/articles/V8I2/JTHTLv8i2\_Brensdal.PDF}, timestamp = {Wed, 22 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jthtl/Brensdal10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jthtl/Cohn10, author = {Cindy Cohn}, title = {Lawless Surveillance, Warrantless Rationales}, journal = {J. Telecommun. High Technol. Law}, volume = {8}, number = {2}, pages = {351--358}, year = {2010}, url = {http://www.jthtl.org/content/articles/V8I2/JTHTLv8i2\_Cohn.PDF}, timestamp = {Wed, 22 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jthtl/Cohn10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jthtl/Dogan10, author = {Stacey L. Dogan}, title = {Beyond Trademark Use}, journal = {J. Telecommun. High Technol. Law}, volume = {8}, number = {1}, pages = {135--156}, year = {2010}, url = {http://www.jthtl.org/content/articles/V8I1/JTHTLv8i1\_Dogan.PDF}, timestamp = {Wed, 22 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jthtl/Dogan10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jthtl/Frieden10, author = {Rob Frieden}, title = {Case Studies in Abandoned Empiricism and the Lack of Peer Review at the Federal Communications Commission}, journal = {J. Telecommun. High Technol. Law}, volume = {8}, number = {2}, pages = {277--312}, year = {2010}, url = {http://www.jthtl.org/content/articles/V8I2/JTHTLv8i2\_Frieden.PDF}, timestamp = {Wed, 22 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jthtl/Frieden10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jthtl/Fry10, author = {Blake Fry}, title = {Why Typefaces Proliferate Without Copyright Protection}, journal = {J. Telecommun. High Technol. Law}, volume = {8}, number = {2}, pages = {425--490}, year = {2010}, url = {http://www.jthtl.org/content/articles/V8I2/JTHTLv8i2\_Fry.PDF}, timestamp = {Wed, 22 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jthtl/Fry10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jthtl/Goldman10, author = {Eric Goldman}, title = {Wikipedia's Labor Squeeze and its Consequences}, journal = {J. Telecommun. High Technol. Law}, volume = {8}, number = {1}, pages = {157--184}, year = {2010}, url = {http://www.jthtl.org/content/articles/V8I1/JTHTLv8i1\_Goldman.PDF}, timestamp = {Wed, 22 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jthtl/Goldman10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jthtl/Greenstein10, author = {Shane Greenstein}, title = {Glimmers and Signs of Innovative Health in the Commercial Internet}, journal = {J. Telecommun. High Technol. Law}, volume = {8}, number = {1}, pages = {25--78}, year = {2010}, url = {http://www.jthtl.org/content/articles/V8I1/JTHTLv8i1\_Greenstein.PDF}, timestamp = {Wed, 22 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jthtl/Greenstein10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jthtl/HahnS10, author = {Robert Hahn and Hal J. Singer}, title = {Why the iPhone Won't Last Forever and What the Government Should Do to Promote its Successor}, journal = {J. Telecommun. High Technol. Law}, volume = {8}, number = {2}, pages = {313--350}, year = {2010}, url = {http://www.jthtl.org/content/articles/V8I2/JTHTLv8i2\_HahnSinger.PDF}, timestamp = {Wed, 22 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jthtl/HahnS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jthtl/Kovacic10, author = {William E. Kovacic}, title = {The Digital Broadband Migration and the Federal Trade Commission: Building the Competition and Consumer Protection Agency of the Future}, journal = {J. Telecommun. High Technol. Law}, volume = {8}, number = {1}, pages = {1--24}, year = {2010}, url = {http://www.jthtl.org/content/articles/V8I1/JTHTLv8i1\_Kovacic.PDF}, timestamp = {Wed, 22 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jthtl/Kovacic10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jthtl/Larsen10, author = {Per Larsen}, title = {Text Message Price Gouging: {A} Perfect Storm of Tacit Collusion}, journal = {J. Telecommun. High Technol. Law}, volume = {8}, number = {1}, pages = {217--242}, year = {2010}, url = {http://www.jthtl.org/content/articles/V8I1/JTHTLv8i1\_Larsen.PDF}, timestamp = {Wed, 22 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jthtl/Larsen10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jthtl/Loewenstein10, author = {Avi Loewenstein}, title = {Ticket Sniping}, journal = {J. Telecommun. High Technol. Law}, volume = {8}, number = {1}, pages = {243--276}, year = {2010}, url = {http://www.jthtl.org/content/articles/V8I1/JTHTLv8i1\_Loewenstein.PDF}, timestamp = {Wed, 22 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jthtl/Loewenstein10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jthtl/Looijen10, author = {Devin Looijen}, title = {Time for a Change: The Schema of Contract in the Digital Era}, journal = {J. Telecommun. High Technol. Law}, volume = {8}, number = {2}, pages = {547--570}, year = {2010}, url = {http://www.jthtl.org/content/articles/V8I2/JTHTLv8i2\_Looijen.PDF}, timestamp = {Wed, 22 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jthtl/Looijen10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jthtl/OHolleran10, author = {Jeffrey O'Holleran}, title = {Blood Code: The History and Future of Video Game Censorship}, journal = {J. Telecommun. High Technol. Law}, volume = {8}, number = {2}, pages = {571--612}, year = {2010}, url = {http://www.jthtl.org/content/articles/V8I2/JTHTLv8i2\_OHolleran.PDF}, timestamp = {Wed, 22 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jthtl/OHolleran10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jthtl/Reid10, author = {Blake Ellis Reid}, title = {Introduction}, journal = {J. Telecommun. High Technol. Law}, volume = {8}, number = {1}, year = {2010}, url = {http://www.jthtl.org/content/articles/V8I1/JTHTLv8i1\_Intro.PDF}, timestamp = {Wed, 22 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jthtl/Reid10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jthtl/Reid10a, author = {Blake Ellis Reid}, title = {Introduction}, journal = {J. Telecommun. High Technol. Law}, volume = {8}, number = {2}, year = {2010}, url = {http://www.jthtl.org/content/articles/V8I2/JTHTLv8i2\_Intro.PDF}, timestamp = {Wed, 22 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jthtl/Reid10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jthtl/Reid10b, author = {Blake Ellis Reid}, title = {Substitution Effects: {A} Problematic Justification for the Third-Party Doctrine of the Fourth Amendment}, journal = {J. Telecommun. High Technol. Law}, volume = {8}, number = {2}, pages = {613--630}, year = {2010}, url = {http://www.jthtl.org/content/articles/V8I2/JTHTLv8i2\_Reid.PDF}, timestamp = {Wed, 22 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jthtl/Reid10b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jthtl/Samuelson10, author = {Pamela Samuelson}, title = {Academic Author Objections to the Google Book Search Settlement}, journal = {J. Telecommun. High Technol. Law}, volume = {8}, number = {2}, pages = {491--522}, year = {2010}, url = {http://www.jthtl.org/content/articles/V8I2/JTHTLv8i2\_Samuelson.PDF}, timestamp = {Wed, 22 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jthtl/Samuelson10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jthtl/Soghoian10, author = {Christopher Soghoian}, title = {Caught in the Cloud: Privacy, Encryption, and Government Back Doors in the Web 2.0 Era}, journal = {J. Telecommun. High Technol. Law}, volume = {8}, number = {2}, pages = {359--424}, year = {2010}, url = {http://www.jthtl.org/content/articles/V8I2/JTHTLv8i2\_Soghoian.PDF}, timestamp = {Wed, 22 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jthtl/Soghoian10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jthtl/Speta10, author = {James B. Speta}, title = {The Shaky Foundations of the Regulated Internet}, journal = {J. Telecommun. High Technol. Law}, volume = {8}, number = {1}, pages = {101--134}, year = {2010}, url = {http://www.jthtl.org/content/articles/V8I1/JTHTLv8i1\_Speta.PDF}, timestamp = {Wed, 22 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jthtl/Speta10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jthtl/Yoo10, author = {Christopher S. Yoo}, title = {Innovations in the Internet's Architecture that Challenge the Status Quo}, journal = {J. Telecommun. High Technol. Law}, volume = {8}, number = {1}, pages = {79--100}, year = {2010}, url = {http://www.jthtl.org/content/articles/V8I1/JTHTLv8i1\_Yoo.PDF}, timestamp = {Wed, 22 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jthtl/Yoo10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.