Caslon Analytics elephant logo title for Recognition page
home | about | site use | resources | publications | timeline   spacer graphic  
blaw

books

dissertations

articles

reports

bodies




a snapshot of the Elephant, corporate logo and 1490s pinup boy

section heading icon     articles and papers

This page highlights recognition through citation in peer reviewed journal articles and symposium papers.

It covers -

The following page highlights recognition in government, industry and academic reports.

subsection heading icon    articles and research papers

Citations include -

  • 'The Private Sector Amendment to Australia's Privacy Act: A First Step On The Road To Privacy' by Alexandra McKay in 14(1) Pacific Rim Law & Policy Journal (2003), 223-251
  • 'Harassment through the Digital Medium: A Cross-Jurisdictional Comparative Analysis on the Law on Cyberstalking' by Warren Chik in 3(1) Journal of International Commercial Law & Technology (2008)
  • 'Acceptance of blog usage: The roles of technology acceptance, social influence and knowledge sharing motivation' by Chin-Lung Hsu & Judy Chuan-Chuan Lin in 45(1) Information & Management (2008), 65-74
  • 'Creating a Market for Justice; a Market Incentive Solution to Regulating the Playing Field: Judicial Deference, Judicial Review, Due Process, and Fair Play in Online Consumer Arbitration' by Llewellyn Gibbons in 23(1) Northwestern Journal of International Law & Business (2002), 1-64
  • 'Can the Australian Model be Applied to US Moral Rights Legislation?' by Joan Pattarozzi in 15 Cardozo Journal of International & Comparative Law (2007), 423-57
  • 'Protecting Hippocratic Ideals: Geographic Information and Implications for Bioprivacy' by George Cho in 4(1) International Journal of Geoinformatics (2008)
  • 'Not Dead, Just Sleeping: Canada's Prohibition on Blasphemous Libel as a Case Study in Obsolete Legislation' by Jeremy Patrick (2008)
  • 'The Law, Politics, and "Historical Wounds": The Dja Dja Warrung Bark Etchings Case in Australia' by Elizabeth Willis in 15 International Journal of Cultural Property (2008), 49-63
  • 'Balancing Public and Private Interests in Database-Protection' (Faculty of Law, Heinrich-Heine Universitaet Duesseldorf, Center for Business & Corporate Law Research Paper Series 03) by Michael Beurskens (2004)
  • 'Research And Development Productivity And Spillovers: Empirical Evidence At The Firm Level' by Robert Wieser in 19(4) Journal of Economic Surveys (2005), 587-621
  • 'Cyber Chaos: The Clash Between Band Fansites and Intellectual Property Holders' by KJ Geary-Boehm in Southern Illinois University Law Journal (2005), 87-122
  • 'The Dawn of A New Age' by Sarah Hinchliffe in 15(1) Murdoch University Electronic Journal of Law (2008), 43-55
  • 'Human Computer Interaction Based Intrusion Detection' by Roman Yampolskiy in International Conference on Information Technology (ITNG'07) (2007), 837-842
  • 'US Jurisdictional Monopolization of International Cybersquatting Disputes: A Review of Current Inequities and Future Consequences' by Aaron Horowitz in 11 Journal of Technology Law & Policy (2006), 191-224
  • 'Accepting Droit de Suite as an Equal and Fair Measure Under Intellectual Property Law and Contemplation of Its Implementation in the United States Post Passage of the EU Directive' by Mara Grumbo in 30 Hastings Communications and Entertainment Law Journal (2008), 357-386
  • 'Management knowledge and knowledge management: Realism and forms of truth' by John Mingers in 6(1) Knowledge Management Research & Practice (2008), 62-76
  • 'Indigenous Knowledge & Intellectual Property: A Sustainability Agenda' by Margaret Raven & Dora Marinova (2006)
  • 'Cleaning Metadata on the World Wide Web: Suggestions for a Regulatory Approach' by Marcel Gordon in 24(4) John Marshall Journal of Computer & Information Law (2006), 531-568
  • 'Email-facilitated qualitative interviews with traumatic brain injury survivors: A new and accessible method' by Jennifer Egan, Lesley Chenoweth & Donna McAuliffe in 20(12) Brain Injury (2006), 1283-1294
  • 'Identity Management: Is an Identity Card the Solution for Australia?' by Margaret Jackson & Julian Ligertwood in 24(4) Prometheus (2006), 379-387
  • 'Muted voices in the legislative process: the role of scholarship in US Congressional efforts to protect children from internet pornography' by Jeffrey Blevins & Fernando Anton in 10(1) New Media & Society (2008), 115-137
  • 'Spam After CAN-SPAM: How Inconsistent Thinking Has Made A Hash Out of Unsolicited Commercial E-Mail Policy' by Jeffrey Sullivan & Michael de Leeuw in 20(4) Santa Clara Computer & High Technology Law Journal (2004), 887-932
  • 'Content Cybercrimes: Criminality and Censorship in Asia' by Roderic Broadhurst in 34 Indian Journal of Criminology (2006), 11-30
  • 'Centre & Creative Periphery in the Histories of the Book in the English Speaking World and Global English Studies' by Ian Willison in Publishing History (2006)
  • 'Fine Art Online: Digital Imagery and Current International Interpretations of Ethical Considerations in Copyright Law' by Molly Torsen' in 5(1) Digital Technology Law Journal (2004)
  • 'An intelligent proactive security system for cyber centres using Cognitive Agents' by P. Venkataram, Jeremy Pitt, B. Sathish Babu & E. Mamdani in 2(3) International Journal of Information and Computer Security (2008), 235-249
  • 'On updating problems in latent semantic indexing' by Hongyuan Zha & Horst Simon in 21(2) SIAM Journal on Scientific Computing (1999), 782-791
  • 'New Zealand's Efforts to Catch Up in Legislating Against Spam' by Adrian Sawyer in 21(7) Journal of International Banking Law and Regulation (2006), 409-415
  • 'International regulation of the publication of publicly accessible personal information' by Marcia Neave in 10 Privacy Law & Policy Reporter (2003), 120
  • 'Be Careful What You Click For: An Analysis of Online Contracting' by Rachel Conklin in 20(3) Loyola Consumer Law Review (2008), 325-347
  • 'Deregulating Relevancy in Internet Trademark Law' by Eric Goldman in 54 Emory Law Journal (2005), 507-598
  • 'Cyberstalking: Utilizing Newspaper Accounts to Establish Victimization Patterns' by Laura Moriarty & Kimberly Freiberger in 3(2) Victims and Offenders (2008), 131-141
  • 'The Maoriland Worker and Blasphemy in New Zealand' by Geoffrey Troughton in 91 Labour History (2006), 113-129
  • 'High Speed and Reliable Anti-Spam Filter' by Jalel Rejeb, Thuy Le & Narinder Anand in International Conference on Software Engineering Advances (2006), 66
  • Graham Greenleaf's Still quacking like a duck: The national ID Card proposal - University of New South Wales Faculty of Law Research Series (2007)
  • Ana Alonso's 'La globalización y el mito del tamaño en la industria mediática y de telecomunicaciones' (2005)
  • 'Media Licensing, Convergence and Globalization' by Robert Horvitz in 1 EastBound (2006), 202-226
  • Deborah Bowen's 'Towards an e-Criture Feminine: Woolf, DuPlessis, Cixous, and the Emerging Discursive Tradition in Women's Online Diaries' (2004)
  • 'A Call for Action: The Need for Canadian Spam Legislation' by Perry Cheung in 7 Asper Review of International Business and Trade Law (2007), 227-252
  • 'Language Networks on LiveJournal' by Susan Herring, John Paolillo et al in 40th Annual Hawaii International Conference on System Sciences (2007), 79-90
  • 'Apples And Oranges (And Wine): Why The International Conversation Regarding Geographic Indications Is At A Standstill' by Molly Torsen in 87 Journal of the Patent and Trademark Office Society (2005), 31-56
  • 'Jurisdiction in B2C E-Commerce Redress in the European Community' by O C Eang in 3(4) Journal of Electronic Commerce in Organizations (2005), 75-87
  • 'The Constitutional Failing of the AntiCybersquatting Act' by Ned Snow in Willamette Law Review (2005), 1-84
  • 'Reconstructing Contemporary Democracy' by Jan Scholte in 15 (XXX) Indiana Journal of Global Legal Studies (2008), 1-47
  • 'The Semiotics of Digital Law' by Andreas Schreiner in 17(3) International Journal for the Semiotics of Law (2004), 259-266
  • 'Multi-Lateral Recognition of PKI Certification Authorities in the Asian Region: Transborder Data Flow and Information Privacy Issues' by Alana Maurushat in 35 Hong Kong Law Journal (2005), 569-595
  • 'Hadley's Liability-Limiting and Commerce Enhancing Principles Applied in the British Commonwealth and the USA' by Marsha Huie in 11 Texas Wesleyan Law Review (2005), 649-673
  • 'A New Impetus for Chinese Copyright Protection: The Regulations on Collective Administration of Copyright' by Yuan Zeqing in 28(4) European Intellectual Property Review (2006), 241-245
  • 'Of Nodes and Power Laws: A Network Theory Approach to Internet Jurisdiction Through Data Privacy' by Andrea Matwyshyn in 98(2) Northwestern University Law Review (2004), 493-543
  • 'Rethinking European Union Competence in the Field of Media Ownership: The Internal Market, Fundamental Rights and European Citizenship' by Rachael Smith in 29(5) European Law Review (2004), 652-672
  • 'Implementing a Swarm-based Search Engine' by Shawn Stewart (2006)
  • 'HIV and AIDS, the internet pornography industry and safer sex' by S T Green in 15(3) International Journal of STD & AIDS (2004), 206-208
  • 'Getting the Message: A Comparative Analysis of Laws Regulating Law Enforcement Agencies' Access to Stored Communications in Australia and the United States' by Tonia Starey in 10 Media & Arts Law Review (2005), 23-55
  • 'Beyond the 'digital divide': Internet diffusion and inequality in Australia' by Suzanne Willis & Bruce Tranter in 42(1) Journal of Sociology (2006), 43-59
  • 'International Distributions: Divergence of Co-Ownership Laws' by Goldie Gabriel in 9 Vanderbilt Journal of Entertainment & Technology Law (2007), 519-532
  • 'World Habeas Corpus' by Vicki Jackson in 91(2) Cornell Law Review (2006), 303-387
  • 'Indigenous Australians and the Digital Divide' by Kate Samaras in 55 Libri (2005), 84-95
  • 'I. Kant, J.G. Fichte, J.A.H. Reimarus, L'autore e i suoi diritti. Scritti polemici sulla proprietà intellettuale' by Maria Chiara Pievatolo in 5 Recensioni filosofiche (NS) (2006)
  • 'Patients' perceptions of general practitioners using computers during the patient-doctor consultation' by Joanne Callen, Megan Bevis & Jean McIntosh in 34(1) Health Information Management (2005), 8-14
  • 'Tailoring Mobile Phones to Fit The Italian Lifestyle' by Erika Papaccioli in Perspectives on Business and Economics (2003), 59-67
  • 'Direct and Indirect Human Computer Interaction Based Biometrics' by Roman Yampolskiy & Venu Govindaraju in 2(10) Journal of Computers (2007), 76-88
  • 'Promises and Perils of Weblogistan: Online Personal Journals and the Islamic Republic of Iran' by Liora Hendelman-Baavur in 11(2) Middle East Review of International Affairs (2007)
  • 'Podcasting: A new technology in search of viable business models' by Sheri Crofts, Jon Dilley, Mark Fox, Andrew Retsema & Bob Williams in 10(9) First Monday (2005)
  • 'Cybercafes and their Potential as Community Development Tools in India' by Anikar Haseloff in 1(3) Journal of Community Informatics (2005)
  • 'Cyber crime and biometric authentication - the problem of privacy versus protection of business assets' by Michael Crowley in Proceedings of the 4th Australian Information Security Conference (Edith Cowan University, 2006)
  • 'The Resale Royalty and Australian Visual Artists: Painting the Full Picture' by Paul Lewis in 8(4) Media & Arts Law Review (2003), 306-313
  • 'WarDriving: Technical & Legal Context' by Hira Sathu in Proceedings of the 5th WSEAS International Conference on Telecommunications and Informatics (2006)
  • David Wyld's The Blogging Revolution: Government in the Age of Web 2.0 (2007)
  • 'Online Defamation: A Case Study in Competing Rights' (2005) by Julie Dare
  • 'National innovative capacity in East Asia' by Mei-Chih Hu & John Mathews in 34 Research Policy (2005), 1322-1349
  • 'Toward A Third-Wave Feminist Legal Theory: Young Women, Pornography and the Praxis of Pleasure' by Bridget Crawford in 14 Michigan Journal of Gender & Law (2007), 99-161
  • 'The Emerging Legal Environment for Podcasting' by Mark Fox & Tony Ciro in 16(8) Entertainment Law Review (2005), 215-223
  • Xenophobia, Media Stereotyping, and Their Role in Global Insecurity (Geneva Centre for Security Policy) by Katja Flückiger (2006)
  • 'Protecting Moral Rights in the United States and the United Kingdom: Challenges and Opportunities under the UK's New Performances Regulations' by Robert Bird & Lucille Ponte in 24 Boston University International Law Journal (2006), 213-284
  • 'Unholy Speech And Holy Laws: Blasphemy Laws In Pakistan - Controversial Origins, Design Defects And Free Speech Implications' by Osama Siddique & Zahra Hayat (2007)
  • 'Laws on Right to Privacy in Mobile Marketing' by Jawahitha Sarabdeen in 5(5) WSEAS Transactions on Business & Economics (2008), 280-290
  • 'Owning the Sun: Can Native Culture be Protected through Current Intellectual Property Law?' by Jill Kelley in 7 Journal of High Technology Law (2007), 180-200
  • 'Dating & Intimacy in the 21st Century: The Use of Online Dating Sites in Australia' by Millsom Henry-Waring & Jo Barraket in 6(1) International Journal of Emerging Technologies & Society (2008), 14-33
  • Realignment of Corporate Structures: Integration & Consolidation in the Freight Forwarding and 3PL Industry, National University of Singapore Centre for Maritime Studies Policy Paper 2 (2006)
  • 'A brief look at the history of privacy' by Natasha Stott Despoja in 79 AQ - Australian Quarterly (May-June 2007)
  • 'Laughs and Legends or The Furniture That Glows? Television as History' by John Hartley, Joshua Green & Jean Burgess (2005)
  • 'Complying with Australia’s new privacy legislation' by Mark Berthold in Privacy Law and Policy Reporter (2001)
  • 'Online shoppers in Australia: dealing with problems' by Huong Ha & Ken Coghill in International Journal of Consumer Studies (2007)
  • 'Identifying the Identity Thief: Is it time for a (smart) Australia Card?' by Lucy Cradduck & Adrian McCullagh in 16(2) International Journal of Law and Information Technology (2007), 125-158
  • 'Acceptance and Usage of Webcasting among Users of Selected Cyber Cafés in Klang Valley' by Siti Azzman Shariffadeen, Musa Abu Hassan & Md. Salleh Hassan (2007)
  • 'Behavioral Modeling' by Roman Yampolskiy in 5(5) American Journal of Applied Sciences (2008), 496-503
  • 'Cooperative Integration: A Structural Geography of Primetime Program Production and Broadcast' by Tonya Lindsey in Web Journal of Mass Communication Research (2005)
  • 'Bank Management of Risk Dynamics' by Tim Scheffmann in Conference Proceedings: The 23rd International Conference of the System Dynamics Society (2005)
  • 'ICT for development and commerce: A case study of internet cafés in India' by Nimmi Rangaswamy in Proceedings of the 9th International Conference on Social Implications of Computers in Developing Countries (2007)
  • Blasphemy and the Law: A Comparative Study by Brenton Priestley (2006)
  • 'Overnight Internet Browsing Among Cyber Café users in Abraka, Nigeria' by Esharenana Adomi in 3(2) Journal of Community Informatics (2007)
  • 'Regulating Spam in Hong Kong and Malaysia: Lessons From Other Jurisdictions' by Rebecca Ong in 1 Journal of Information Law & Technology (2005)
  • 'Cooperative Integration: A Structural Geography of Primetime Program Production and Broadcast' by Tonya Lindsey in 8(4) Web Journal of Mass Communication Research (2005)
  • 'Progress of e-Health in Australia: the National framework' by
    Shivakumar Kolachalam in Nuove Tecnologie in Medicina: Applicazioni Informatiche e Telematiche in Medicina (2006)
  • 'Behavioral Modeling: an Overview' by Roman Yampolskiy in 5(5) American Journal of Applied Sciences (2008), 496-503
  • 'Three Cases of Corporate Fraud: An Audit Perspective' (University of Waikato Working Paper Series, No 94) by Karen van Peursem, Maiqing Zhou, Tracey Flood & James Buttimore (2007)
  • 'Security and Usability: The Gap in Real-World Online Banking' by Mohammad Mannan & P. C. van Oorschot (2007)
  • 'Information, Knowledge and Truth: A Polyvalent View: Kent Business School Working Paper' by John Mingers (2005)
  • 'Technologiedynamik, Zukunftstechnologien und die Rolle von Forschungsförderungspolitik - Beiträge aus der Informatik und Physik' by Michael Rübhausen (2005)
  • 'ICANN Can: Contracts and Porn Sites: Or Choosing to Play Internet Ball in American Cyberspace' by Brent Little & Cheryl Preston (2007)
  • 'Wissenschaftliches E-Publizieren mit 'Open-Access' - Initiativen und Widerstände' by Klaus Graf in 2(2) Zeitenblicke (2003)
  • 'New technology and partner notification - why aren't we using them?' by J E Tomnay, M K Pitts & C K Fairley in 16(1) International Journal of STD & AIDS(2005), 19-22
  • 'Cyberharassment & Online Defamation: A Default Form of Regulations?' by Julie Dare in 11 Transformations (2005)
  • 'Reducing Spam With Best Practices' by Luke Haber in Proceedings of the 12th Australasian World Wide Web Conference (2006)
  • 'Parlez Usted Urdu?: The Big Picture' by Patricia Wetzel (2006)
  • 'Women in the Web of Secondary Copyright Liability and Internet Filtering' by Ann Bartow in 32(3) Northern Kentucky Law Review (2005), 449-506
  • 'Website privacy policy statements and the changing face of e-commerce' by Mark Berthold in Privacy Law & Policy Reporter (2002)
  • 'New Trends in Global Broadcasting: "Nuestro Norte es el Sur" (Our North is the South)' by Orayb Najjar in 6(10) Global Media Journal (2006)
  • 'Open Access and the divide between "mainstream" and "peripheral" science' by Jean-Claude Guédon in Como gerir e qualificar revistas científicas (2007) edited by Sueli Ferreira & Maria Targino
  • 'Robert Maxwell: A Study of Power in Media Leadership' by Anders Bjursted (2006)
  • 'HIV and AIDS, the internet pornography industry and safer sex' by S T Green in 15(3) International Journal of STD & AIDS (2004), 206-208
  • 'Designs for Immunity: A Comparison of the Criminal Prosecutions of United States Presidents & Italian Prime Ministers' by Brianne Biggiani in 14(1) Cardozo Journal of International & Comparative Law (2006), 209-246
  • 'Management 2.0: a primer on blogging for executives' by David Wyld in 31(6) Management Research News (2008), 448-483
  • 'Google Search Engine and its Usefulness to Library Professionals' by Vivekanand Jain & Sanjiv Sarafin in 26(5) DESIDOC Bulletin of Information Technology (2006), 23-28
  • 'Blog: Fiction: Intent - A critical study of the creation of intentional and unintentional fictions in the current online blog culture' by Kirsty McGill (2008)
  • 'Behavioural biometrics: a survey and classification' by Roman Yampolskiy & Venu Govindaraju in 1(1) International Journal of Biometrics (2008), 81-113
  • 'Taxation and Global Justice: Closing the Gap between Theory and Practice' by Gillian Brock in 39(2) in Journal of Social Philosophy (2008), 161-184
  • 'Indigenous Knowledge in Peru' by Norka Paden in 1 Tribes and Tribals (2007), 195-204
  • 'Privacy Impact Assessment in Australian Contexts' by Roger Clarke in 15(1) Murdoch eLaw Journal (2008)
  • 'A Totally Online Course in Web Design for Teachers: Aids and Cautions' by Cleborne Maddux, Leping Liu, Rhoda Cummings & Marlowe Smaby in 19(7) Technology & Teacher Education Annual (2008), 4227-4232
  • Laws and Regulations Dealing with Information Security and Privacy: An Investigative Study' by John Cassini, Dawn Medlin & Adriana Romaniello in 2(2) International Journal of Information Security & Privacy (2008), 70-82
  • 'Global communication and political culture in the semi-periphery: the rise of the Globo corporation' by Peter Wilkin in 34 Review of International Studies (2008), 93-114
  • 'No Age Discrimination For Biometrics' by Marthie Lessing & L. Weissenberger (2008)
  • 'Towards a User Generated State? The impact of web 2.0 on government and the public sector' (Media@lse Fifth Anniversary Conference, 2008) by Valerie Frissen, Noor Huijboom & Bas Kotterink
  • 'What makes a document readable?' by Richard Castle in 58 Clarity: Journal of the international association promoting plain legal language (2007), 12-16
  • Internet Business Methods: Problems with Patentability: A paper submitted for the Loman Friedlander Award, NZIPA (2005) by Anne Griffin
  • 'Preserving Creativity from Endless Digital Exploitation: Has the Time Come for the New Concept of Copyright Dilution?' (6th Annual Intellectual Property Colloquium, Tulane Uni Law School, 2008) by Lucille Ponte
  • 'Recent amendments in the Laws pertaining to crimes against women: An overview' by Dasari Harish, Kumar Ashwini & B Sharma in 30(4) Journal of Indian Academy of Forensic Medicine (2008)
  • 'Legal Bans on Pro-Suicide Web Sites: An Early Retrospective From Australia' by Jane Pirkis, Luke Neal, Andrew Dare, Warwick Blood & David Studdert in 39(2) Suicide & Life Threatening Behaviour (2009) 190-193
  • 'National and International Dimensions of Copyright’s Public Domain (An Australian Case Study)' by Graham Greenleaf in 6(2) SCRIPTed (2009) 259







icon for link to next page   next page (recognition in reports)




this site
the web

Google

version of February 2010
© Bruce Arnold
caslon.com.au | caslon analytics