Abad Piero, J.L., N. Asokan, M. Steiner, and M. Waidner. 1998. "Designing a Generic Payment Service," IBM Systems Journal, 37(1):72–88.
Abadi, Martin, Michael Burrows, Butler Lampson, and Gordon Plotkin. 1993. "A Calculus for Access Control in Distributed Systems," ACM Transactions on Programming Languages and Systems, 15(4):706–734.
Abate, Tom. 1998. "Record Labels Fear Move to Digital Format Will Encourage Piracy," San Francisco Chronicle, September 10, p. B1. Available online at <http://www.sfgate.com/cgibin/article.cgi?file=/chronicle/archive/1998/09/10/BU3722.DTL>.
Acken, John M. 1998. "How Watermarking Adds Value to Digital Content," Communications of the ACM, 41(7):75–77.
Alford, William P. 1995. To Steal a Book Is an Elegant Offense. Stanford, CA: Stanford University Press.
Alrashid, Tareq M., James A. Barker, Brian S. Christian, Steven C. Cox, Michael W. Rabne, Elizabeth A. Slotta, and Luella R. Upthegrove. 1998. "Safeguarding Copyrighted Contents: Digital Libraries and Intellectual Property Management," D-Lib Magazine, April. Available online at <http://www.dlib.org/dlib/april98/04barker.html>.
American Library Association. 1988. Less Access to Less Information by and About the U.S. Government: A 1981–1987 Chronology. Washington, DC: American Library Association.
American Library Association. 1992. Less Access to Less Information by and About the U.S. Government: A 1988–1991 Chronology. Washington, DC: American Library Association.
Anderson, Lessley. 1998. "RIAA Setback: Rio Gets a Go," The Industry Standard, October 27. Available online at <http://www.thestandard.net/articles/article_print/0,454,2254,00.html>.
Anderson, Ross. 1993. "Why Cryptosystems Fail," pp. 215–227 in Proceedings of the 1st ACM Conference on Computer and Communications Security. New York: Association for Computing Machinery.
AsiaBizTech. 1999. "Artists Set Up Digital Media Copyright Protection Group," February 8. Tokyo: Nikkei BP BizTech, Inc. Available online at <http://www.nikkeibp.asiabiztech.com/Database/1999_Feb/08/New.02.gwif.html>.
Association of American Universities (AAU). 1994. Report of the AAU Task Force on Intellectual Property Rights in an Electronic Environment. Available online at <http://www.arl.org/aau/IPTOC.html>.
Atkins, D., P. Buis, C. Hare, R. Kelley, C. Nachenburg, A.B. Nelson, P. Philips, T. Ritchie, and W. Steen. 1996. Internet Security: Professional Reference. Indianapolis, IN: New Riders Publishing.
Aucsmith, D. 1996. "Tamper Resistant Software," pp. 317–334 in Proceedings of the 1st International Information-Hiding Workshop. Lecture Notes in Computer Science, 1174. Berlin: Springer.
Bauman, Larry. 1999. "New Issues, Including Interactive Intelligence, Cybergold, and eGain, Weather the Tech Sell-Off," Wall Street Journal, September 24, p. C7.
Bayeh, E. 1998. "The Web Sphere Application Server Architecture and Programming Model," IBM Systems Journal, 37(3):336–348.
Bearman, David, and Jennifer Trant. 1998. "Authenticity of Digital Resources: Towards a Statement of Requirements in the Research Process," D-Lib Magazine, June. Available online at <http://www.dlib.org/dlib/june98/06bearman.html>.
Benkler, Y. 1999. "Intellectual Property and the Organization of Information Production." Draft: October. New York: New York University Law School.
Besen, Stanley M., and Leo J. Raskind. 1991. "An Introduction to the Law and Economics of Intellectual Property," Journal of Economic Perspectives, 5(1):3–27, Winter.
Blaze, M., J. Feigenbaum, and J. Lacy. 1996. "Decentralized Trust Management," pp. 164–173 in Proceedings of the 17th Symposium on Security and Privacy. Los Alamitos, CA: IEEE Computer Society Press. Available online at <http://www.research.att.com/~jf/pubs/oakland96proc.ps>.
Blaze, Matt, J. Feigenbaum, Paul Resnick, and M. Strauss. 1997. "Managing Trust in an Information-Labeling System," European Transactions on Telecommunications, 8(5):491–501, September.
Blaze, Matt, J. Feigenbaum, and Martin Strauss. 1998. "Compliance Checking in the PolicyMaker Trust-Management System," pp. 254–274 in Proceedings of the 2nd Financial Cryptography Conference. Lecture Notes in Computer Science, 1465. Berlin: Springer.
Bloomberg News. 1999a. "6 Companies to Push New Digital Standard," Bloomberg News, New York Times, February 18.
Bloomberg News. 1999b. "Priceline.com Sues Microsoft," Bloomberg News, New York Times, October 14. Available online at <http://www.nytimes.com/library/tech/99/10/biztech/articles/14suit.html>.
Brackenbury, I.F., D.F. Ferguson, K.D Gottschalk, and R.A. Storey. 1998. "IBM's Enterprise Server for Java," IBM Systems Journal, 37(3):323–335.
Branscomb, Anne W. 1994. Who Owns Information? From Privacy to Public Access. New York: Basic Books.
Briggs, B. 1998. "Lotus eSuite," IBM Systems Journal, 37(3):372–385.
Buel, Stephen. 1999. "Grateful Dead Lets Fans Swap Concert Recordings on the Web," San Jose Mercury News, May 12, p. 1A.
Business Software Alliance/Software and Information Industry Association (BSA/SIIA). 1999. 1999 Global Software Privacy Report. Washington, DC: BSA/SIIA.
Business Wire. 1999a. "Liquid Audio and 48 Leading Companies Form Coalition to Add Authentication Mark to Digital Music Formats Including MP3," Business Wire (via Lexis/Nexis), Redwood City, CA, January 25. Available online at <http://www.businesswire.com>.
Business Wire. 1999b. "SightSound.com Links Patent Licensing Program to SDMI, Targeting Companies for Provisional Agreements," Business Wire (via Lexis/Nexis), Beverly Hills, CA, January 28. Available online at <http://www.businesswire.com>.
Callas, J., J. Feigenbaum, D. Goldschlag, and E. Sawyer. 1999. "Fair Use, Intellectual Property, and the Information Economy (Panel Session Summary)," pp. 173–183 in Proceedings of the 3rd Financial Crypto Conference. Lecture Notes in Computer Science, 1648. Berlin: Springer.
Caruso, Denise. 1999. " A New Model for the Internet: Fees for Services," New York Times, July 19. Available online at <http://www.nytimes.com/library/tech/99/07/biztech/articles/19digi.html>.
Chamberland, L.A., S.F. Lymer, and A.G. Ryman. 1998. "IBM VisualAge for Java," IBM Systems Journal, 37(3):386–408.
Chapman, Gary. 1999. "Singapore Wires Its Hopes to Net with Ambitious Schools Program," Los Angeles Times, February 22, p. C1.
Cheng, P.C., J.A Garay, A. Herzberg, and H. Krawczyk. 1998. "A Security Architecture for the Internet Protocol," IBM Systems Journal, 37(1):42–60.
Clark, Don. 1999. "Digital Books on the Web Move Closer to the Market," Wall Street Journal, August 31, p. B1.
Cleary, Sharon. 1999. "Music Sites Dish Out Songs, Stats, and Bios," Wall Street Journal, April 29, p. B10.
CNN Newsroom. 1998. 4:30 a.m. ET Broadcast, October 20. Atlanta, GA: Cable News Network.
Cohen, Julie E. 1996. "A Right to Read Anonymously: A Closer Look at 'Copyright Management' in Cyberspace," 28 Connecticut Law Review, pp. 981–1039.
Cohen, Julie E. 1998. "Copyright and the Jurisprudence of Self-Help," 13 Berkeley Technology Law Journal, pp. 1089–1143.
Colonial Williamsburg Foundation. 1999. "Electronic Field Trips." Available online at <http://www.history.org>.
Commission on Preservation and Access and the Research Libraries Group (CPA/RLG). 1995. Preserving Digital Information: Final Report of the Task Force on Archiving of Digital Information. Washington, DC: CPA/RLG. Available online at <http://www.rlg.org/ArchTF/tfadi.index.htm>.
Computer Science and Telecommunications Board (CSTB), National Research Council. 1991a. Computers at Risk: Safe Computing in the Information Age. Washington, DC: National Academy Press.
Computer Science and Telecommunications Board (CSTB), National Research Council. 1991b. Intellectual Property Issues in Software. Washington, DC: National Academy Press.
Computer Science and Telecommunications Board (CSTB), National Research Council. 1994. Information Technology in the Service Society: A Twenty-First Century Lever. Washington, DC: National Academy Press.
Computer Science and Telecommunications Board (CSTB), National Research Council. 1996. Cryptography's Role in Securing the Information Society. Washington, DC: National Academy Press.
Computer Science and Telecommunications Board (CSTB), National Research Council. 1998. Fostering Research on the Economic and Social Impacts of Information Technology: Report of a Workshop. Washington, DC: National Academy Press.
Computer Science and Telecommunications Board (CSTB), National Research Council. 1999a. Being Fluent with Information Technology. Washington, DC: National Academy Press.
Computer Science and Telecommunications Board (CSTB), National Research Council. 1999b. Funding a Revolution: Government Support for Computing Research. Washington, DC: National Academy Press.
Computer Science and Telecommunications Board (CSTB), National Research Council. 1999c. Trust in Cyberspace. Washington, DC: National Academy Press.
Cox, B. 1994. ''Superdistribution," Wired, Vol. 2, September. Available online at <www.wired.com/wired/archive/2.09/superdis.html>.
Cox, Ingemar J., Joe Kilian, Tom Leighton, and Talal Shamoon. 1995. Secure Spread Spectrum Watermarking for Multimedia: Technical Report 95–10. Princeton, NJ: NEC Research Institute, Inc., December 4. Available online at <http://www.neci.nj.nec.com/tr/index.html>.
Craver, Scott, Nasir Memon, Boon-Lock Yeo, and Minerva M. Yeung. 1997. "On the Invertibility of Invisible Watermarking Techniques," pp. 540–543 in Proceedings of the IEEE Signal Processing Society 1997 International Conference on Image Processing (ICIP'97). Los Alamitos, CA: IEEE Computer Society Press.
Craver, Scott, Boon-Lock Yeo, and Minerva M. Yeung. 1998. "Technical Trials and Legal Tribulations," Communications of the ACM, 41(7):44–45.
Crews, Kenneth, and John O'Donnell. 1998. "Indiana University, Online Copyright Tutorial." Indianapolis, IN: Indiana University Copyright Management Center, August 3.
Dean, Drew. 1997. "The Security of Static Typing with Dynamic Linking," pp. 18–27 in Proceedings of the 4th ACM Conference on Computer and Communications Security. New York: ACM Press Books.
Dean, Drew, Ed Felten, and Dan Wallach. 1996. "Java Security: From HotJava to Netscape and Beyond," pp. 190–200 in Proceedings of the 1996 IEEE Symposium on Security and Privacy. Los Alamitos, CA: IEEE Computer Society Press.
Diffie, W., and M. Hellman. 1976. "New Directions in Cryptography," IEEE Transactions on Information Theory, IT-22(6):644–654, November.
Doyle, Jim. 1994. "Milpitas Couple Indicted in Computer Porn Case," San Francisco Chronicle, February 14, p. A12.
Dwork, Cynthia. 1999. "Copyright? Protection?" pp. 31–48 in Mathematics of Information Coding, Extraction, and Distribution, G. Cybenko, D. O'Leary, and J. Rissanen, eds. New York: Springer.
Dyson, Esther. 1995. "Intellectual Value," Wired, 3(7):136–141 and 181–185.
Einhorn, Bruce. 1999. "Asia Logs On," Business Week, International Edition, February 1, p. 34.
Ellison, Carl. 1999. SPKI Certificate Documentation. Available online at <http://www.pobox.com/~cme/html/spki.html>.
Feigenbaum, Joan. 1998. "Towards an Infrastructure for Authorization: Position Paper." Invited Talk at the USENIX E-Commerce Conference. Available online at <http://www.research.att.com/~jf/pubs/usenix-ecommerce98.ps>.
Finlayson, Gordon. 1999. "Australia Senate Passes Net Control Bill," ZD Net, May 27. Available online at <http://www.zdnet.com/zdnn/stories/news/0,4586,2266715,00.html>.
Foster, Ed. 1998. "What's in a Name? Not Even the Real Pirates Want Us to Call It Software Piracy," Infoworld, 20(52):79.
Frank, Robert H., and Phillip J. Cook. 1995. The Winner-Take-All Society. New York: Free Press.
Geller, Paul. 1993. International Copyright Law and Practice. New York: Matthew Bender.
Gilder, George. 1993. "Metcalfe's Law and Legacy," Forbes ASAP, September 13. Available online at <http://www.seas.upenn.edu/~gaj1/metgg.html>.
Gladney, H.M. 1997. "Access Control for Large Collections," ACM Transactions on Information Systems, 15(2):154–194, April.
Gladney, Henry M. 1998. "Safeguarding Digital Library Contents and Users: Interim Retrospect and Prospects," D-Lib Magazine, July/August. Available online at <http://www/dlib.org/dlib/july98/gladney/07gladney.html>.
Gladney, Henry M., and Jeff Lotspiech. 1998. "Safeguarding Digital Library Contents and Users: Storing, Sending, Showing, and Honoring Usage Terms and Conditions," D-Lib Magazine, May. Available online at <http://www.dlib.org/dlib/may98/gladney/05gladney.html>.
Gleick, James. 1998. "The Digital Attic: Are We Now Amnesiacs? Or Packrats?" New York Times, April 12, sec. 6, col. 1, p. 20.
Goldman, Joel S. 1999. "The State Street Bank CaseIts Implications to Financial Institutions," Intellectual Property Today, January 8, p. 8. Available online at <http://www.lawworksiptoday.com/current/magindx.htm>.
Gomes, Lee. 1999. "Free Tunes for Everyone! MP3 Music Moves into the High-School Mainstream," Wall Street Journal, June 15, p. B1.
Gottschalk, K.D. 1998. "Technical Overview of IBM's Java Initiatives," IBM Systems Journal, 7(3):308–322.
Gray, Jim, and Andreas Reuter. 1992. Transaction Processing: Concepts and Techniques. Morgan Kaufmann Series in Data Management Systems. San Mateo, CA: Academic Press.
Hamblett, Mark. 1999. "Freelancers Win Victory Over Reprints," New York Law Journal, September 28, p. 8.
Hardy, I. Trotter. 1998. Project Looking ForwardFinal Report: Sketching the Future of Copyright in a Networked World. Washington, DC: U.S. Copyright Office. Available online at <http://lcweb.loc.gov/copyright/reports>.
Hayton, Richard J., Jean M. Bacon, and Ken Moody. 1998. "Access Control in an Open, Distributed Environment," pp. 3–14 in Proceedings of the IEEE Symposium on Security and Privacy. Los Alamitos, CA: IEEE Computer Society Press.
Hazan, Victor. 1970. "The Origins of Copyright Law in Ancient Jewish Law: Introduction," Copyright Society of the USA Bulletin, pp. 23–28.
Hellweg, Eric. 1999. "Musical Discord," Business 2.0, September. Available online at <http://www.business2.com/articles/1999/09/content/break.html>.
Henderson, Carol C. 1998. Libraries as Creatures of Copyright: Why Librarians Care About Intellectual Property Law and Policy. Available online at <http://www.ala.org/washoff/copylib.html>.
Herzberg, Amir. 1998. "Safeguarding Digital Library Contents: Charging for Online Content," D-Lib Magazine, January. Available online at <http://www.dlib.org/dlib/january98/ibm/01herzberg.html>.
Herzberg, Amir, and Dalit Naor. 1998. "Surf'N'Sign: Client Signatures on Web Documents," IBM Systems Journal, 37(1):61–71.
Hinds, Michael deCourcy. 1988. "Personal but Not Confidential: A New Debate Over Privacy," New York Times, February 27, sec. 1, col. 1, p. 56.
Holderness, M. 1998. "Moral Rights and Authors' Rights: The Keys to the Information Age," 1 Journal of Information, Law, and Technology. University of Warwick: Coventry, UK: Strathclyde University: Coventry, UK. February 27. Available online at <http://elj.warwick.ac.uk/jilt/infosoc/98_1hold/>.
Information Infrastructure Task Force (IITF). 1995. Intellectual Property and the National Information Infrastructure: The Report of the Working Group on Intellectual Property Rights Information Infrastructure Task Force (IITF). Washington, DC: U.S. Department of Commerce.
Jackson, Michael, and Jayne Noble Suhler. 1998. "But My Child Wouldn't Lie or Cheat! Think Again, More Teens Admit to Unethical Behavior," Dallas Morning News, October 19, p. 1A. Available online at <http://www.josephsoninstitute.org/98-Survey/98survey.htm>.
Joy, Bill, and Ken Kennedy. 1998. President's Information Technology Advisory Committee: Interim Report. August. Washington, DC: President's Information Technology Advisory Committee. Available online at <http://www.ccic.gov/ac/interim/>.
Kamien, Morton I., and Nancy L. Schwartz. 1975. "Market Structure and Innovation: A Survey," Journal of Economic Literature, XIII(1):1–37.
Kaminer, Wendy. 1997. "On Work Made for Hire: Declaration of an Independent Writer," Washington, DC: National Public Radio, April 8.
Kaplan, Benjamin. 1967. Copyright: An Unhurried View. New York: Columbia University Press.
Kaplan, Carl S. 1999. "In Court's View, MP3 Player Is Just a 'Space Shifter,'" New York Times on the Web, July 9. Available online at <http://www.nytimes.com/library/tech/99/07/cyber/cyberlaw/09law.html>.
Kiernan, Vincent. 1999. "Vanderbilt's Television Archive Hopes to Digitize Newscasts for Scholars' Use," Chronicle of Higher Education, p. A35, June 4.
King, John Leslie, Rebecca E. Grinter, and Jeanne M. Pickering. 1997. "The Rise and Fall of Netville: The Saga of a Cyberspace Construction Boomtown in the Great Divide," pp. 3–33 in Culture of the Internet, Sara Kiesler, ed. Mahwah, NJ: Lawrence Erlbaum Associates.
Kobayashi, M. 1997. Digital Watermarking: A Historical Survey. IBM Tokyo Laboratory Research Reports. Yamato, Japan: IBM.
Konen, R. 1998. "Overview of the MPEG-4 Standard." Available online at the MPEG-4 Web page, <http://www.cselt.it/mpeg>.
Koved, Larry, Anthony J. Nadalin, Don Neal, and Tim Lawson. 1998. "The Evolution of Java Security," IBM Systems Journal, 37(3):349–364.
Lacy, J., J. Snyder, and D. Maher. 1997. "Music on the Internet and the Intellectual Property Protection Problem," pp. SS77–SS83 in Proceedings of the International Symposium on Industrial Electronics. New York: IEEE Computer Society Press.
Lacy, J., N. Rump, and P. Kudumakis. 1998. "MPEG-4 Intellectual Property Management and Protection (IPMP) Overview and Applications." Available online at the MPEG-4 Web page <http://www.cselt.it/mpeg>.
Ladd, David. 1983. "The Harm of the Concept of Harm in Copyright: The 13th Donald C. Brace Memorial Lecture," Journal of the Copyright Society of the U.S.A, 30(5):420–432, June.
Lawrence, S.R., and C.L. Giles. 1999. "Accessibility of Information on the Web," Nature 400(6740):107–109.
Lehman, Bruce. 1998. Conference on Fair Use: Final Report to the Commissioner on the Conclusion of the Conference on Fair Use. Washington, DC: U.S. Patent and Trademark Office.
Lemos, Robert. 1999. "SightSound.com to Music Sites: Pay Up!" January 28. Available online at <http://biz.yahoo.com/bw/990128/ca_sightso_1.html>.
Lessig, Lawrence. 1999a. Code and Other Laws of Cyberspace. New York: Basic Books.
Lessig, Lawrence. 1999b. "The Law of the Horse: What Cyberlaw Might Teach." Harvard Law Review, Fall issue. Available online at <http://cyber.harvard.edu/lessig.html>.
Lipton, Beth. 1988. "Hollywood Steps Up Copyright Fight," CNET News.com, July 29. Available online at <http://www.news.com/News/Item/0,4,24751,00.html>.
Livingston, Brian. 1999. "Digital Encryption of Audio Files Is Cracked: What Will This Mean for the Software Industry?" Infoworld, August 30, p. 42.
Lotspiech, Jeffrey, Ulrich Kohl, and Marc Kaplan. 1997. "Safeguarding Digital Library Contents and Users: Protecting Documents Rather Than Channels," D-Lib Magazine, September. Available online at <http://www.dlib.org/dlib/september97/ibm/09lotspiech.html>.
Luby, Michael. 1996. Pseudorandomness and Its Cryptographic Applications. Princeton, NJ: Princeton University Press.
Lynch, Clifford A. 1997. "When Technology Leads Policy," in Proceedings of the 131st ARL Meeting. Washington, DC. Available online at <http://www.arl.org/arl/proceedings/131/lynch.html>.
Madison, James, Alexander Hamilton, and John Jay. 1787. The Federalist. New York: The Colonial Press.
Manly, Lorne. 1997. "Off the Record," New York Observer, April 7, p. 6.
Markoff, John. 1999. "Bridging Two Worlds to Make On-Line Digital Music Profitable," New York Times, September 13, p. 1.
Matheson, L., S. Mitchell, T. Shamoon, R. Tarjan, and F. Zane. 1998. "Robustness and Security of Digital Watermarks," pp. 227–240 in Proceedings of the 2nd Financial Cryptography Conference, Lecture Notes in Computer Science, 1465. Berlin: Springer.
McCann-Erickson Agency. 1998. "Total U.S. Advertising Spending by Medium," Advertising Age, Neilsen Media Research, April. Available online at <http://adage.com/dataplace/topmarkets/us.html>.
McWilliams, Gary. 1999. "New PCs Say, 'Let Me Entertain You,' and Sales Get Unexpected Lift," Wall Street Journal, September 28, p. B1.
Memon, N., and P.W. Wong. 1998. "Protecting Digital Media Content," Communications of the ACM, 41(7):34–43.
Menezes, Alfred J., Paul C. van Oorschot, and Scott Vanstone. 1997. Handbook of Applied Cryptography. Boca Raton, FL: CRC Press.
Merkle, R.C. 1978. "Secure Communications over Insecure Channels," Communications of the ACM, 4(21):294–299.
Mintzer, Fred C., L.E. Boyle, A.N. Cazes, B.S. Christian, S.C. Cox, F.P. Giordano, H.M. Gladney, J.C. Lee, M.L. Kelmanson, A.C. Lirani, K.A. Magerlein, A.M.B. Pavani, and F. Schiattarella. 1996. "Towards On-Line Worldwide Access to Vatican Library Materials," IBM Journal of Research and Development, 40(2):139–162.
Mintzer, Fred, Gordon W. Braudaway, and Minerva M. Yeung. 1997. "Effective and Ineffective Digital Watermarks," pp. 9–12 in Proceedings of IEEE ICIP'97. Los Alamitos, CA: IEEE Computer Society Press.
Mintzer, Fred, Jeff Lotspiech, and Norishige Morimoto. 1997. "Digital Watermarking," D-Lib Magazine, December. Available online at <http://www.dlib.org/dlib/december97/ibm/12lotspiech.html>.
Moore, Geoffrey A. 1995. Crossing the Chasm: Marketing and Selling High-Tech Products to Mainstream Customers. New York: Harper Collins.
Murphy, John B. 1998. "Introducing the North American Industry Classification System," Monthly Labor Review, 121(7):43–47, July.
National Research Council. 1997. Bits of Power: Issues in Global Access to Scientific Data. Washington, DC: National Academy Press.
National Research Council. 1999. A Question of Balance: Private Rights and the Public Interest in Scientific and Technical Databases. Washington, DC: National Academy Press.
National Telecommunications and Information Administration (NTIA). 1999. Falling Through the Net: Defining the Digital Divide. Washington, DC: U.S. Department of Commerce.
Negroponte, Nicholas. 1995. Being Digital. New York: Alfred A. Knopf.
Neumann, Peter G. 1995. Computer Related Risks. New York: ACM Press Books.
New York Times. 1998. "Keeping Copyright in Balance" [Editorial], February 21, sec. A, col. 1, p. 10.
Nimmer, Melville B., and Paul Edward Geller, eds. 1988. International Copyright Law and Practice. New York: Matthew Bender.
Nimmer, David, Elliot Brown, and Gary N. Frischling. 1999. "The Metamorphosis of Contract into Expand," 87 California Law Review 1, pp. 17–77.
Noll, Roger G. 1993. "The Economics of Information: A User's Guide," pp. 25–52 in The Knowledge Economy: Annual Review of the Institute for Information Studies, 1993–94. Queenstown, MD: Aspen Institute.
Norman, Donald A. 1998. The Invisible Computer. Cambridge, MA: MIT Press.
Office of Technology Assessment of the U.S. Congress. 1989. Copyright and Home Copying: Technology Challenges the Law, OTA-CIT-422. Washington, DC: U.S. Government Printing Office, October.
Office of Technology Assessment of the U.S. Congress. 1993. Accessibility and Integrity of Networked Information Collections, OTA-BP-TCT-109, by Clifford A. Lynch. Washington, DC: U.S. Congress Office of Technology Assessment.
Okerson, Ann. 1996. "Buy or Lease: Two Models for Scholarly Information at the End (or the Beginning) of an Era," Daedalus, 125(4):55–76.
Ove, T. 1998. "Honesty Is Still the Best Policy," Pittsburgh Post-Gazette, October 18, p. A1. Available online at <http://www.post-pazette.com/regionstate/19981018honor2.asp>.
Patrizio, Andy. 1999a. "DOJ Cracks Down on MP3 Pirate," Wired News, August 23. Available online at <http://www.wired.com/news/politics/0,1283,21391,00.html>.
Patrizio, Andy. 1999b. "Why the DVD Hack Was a Cinch," Wired News, November 2. Available online at <http://www.wired.com/news/technology/0,1282,32263,00.html>.
Patrizio, Andy, and Malcolm Maclachlan. 1998. "MP3 Player Could Skirt Legal Challenge," TechWeb, October 21. Available online at <http://www.techweb.com/wire/story/TWB19981021S0003>.
Patry, William F. 1994. Copyright Law and Practice. Washington, DC: Bureau of National Affairs.
Philips, Chuck. 1999. "Label Gets Top Spot with Online Spin," Los Angeles Times, October 7, p. C1.
Phipps, Jennie L. 1998 "Ripping Off Writers or Justified New Profits?" Editor & Publisher, May 30, p. 18ff.
Pollack, Andrew. 1999. "Feature Film to Be Produced for Release on Web," New York Times, August 24, p. 1 of business section.
Ramanujapuram, Arun, and Prasad Ram. 1998. "Digital Content and Intellectual Property Rights," Dr. Dobb's Journal, 23(12):20–27, December.
Ramstad, Evan. 1999. "Circuit City Pulls the Plug on Its Divx Videodisk Venture," Wall Street Journal, June 17, p. B10.
Reidenberg, Joel R. 1998. "Lex Informatica: The Formulation of Information Policy Rules Through Technology," 76 Texas Law Review, pp. 553–593.
Reuters. 1999. "HK to Launch Campaign on Intellectual Property," San Jose Mercury News, July 28, 9:30 a.m. PDT. Available online at <http://www.mercurycenter.com/>.
Rivest, R.L. 1998. "Chaffing and Winnowing: Confidentiality Without Encryption." Available online at <http://theory.lcs.mit.edu/~rivest/chaffing-980701.txt>.
Rivest, R.L., A. Shamir, and L.M. Adelman. 1978. "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Communications of the ACM, 21(12):120–126.
Robertson, Chiyo. 1999. "Lycos May Face Lawsuit Over MP3," ZDNet, March 25. Available online at <http://www.zdnet.com/zdnn/stories/news/0,4586,2231720,00.html>.
Robinson, Sara. 1999. "Recording Industry Escalates Crackdown on Digital Piracy," New York Times, October 4, sec. C, col. 4, p. 5. Available online at <http://www.nytimes.com/library/tech/99/10/biztech/articles/04musi.html>.
Rogers, David. 1999. "Senate Panel Proposes Property-Rights Office," Wall Street Journal, June 25, p. A6.
Rosen, R.J., R.J. Anderson, L.H. Chant, J.B. Dunlop, J.C. Gambles, D.W. Rogers, and J.H. Yates. 1970. Computer Control Guidelines. Toronto: Canadian Institute of Chartered Accountants. Superseded by Information Technology Control Guidelines, 3rd ed. (1998). Available online at <http://www.cica.ca>.
Rosen, R.J., R.J. Anderson, L.H.Chant, J.B. Dunlop, J.C. Gambles, and D.W. Rogers. 1975. Computer Audit Guidelines. Toronto: Canadian Institute of Chartered Accountants, Study Group on Computer Control and Audit Guidelines.
Rothenberg, J. 1999. Avoiding Technological Quicksand. Washington, DC: Council on Library and Information Resources.
Rubin, B.S., A.R. Christ, and K.A. Bohrer. 1998. "Java and the IBM San Francisco Project," IBM Systems Journal, 37(3):365–371.
Samuelson, Pamela. 1999. "Intellectual Property and the Digital Economy: Why the Anti-Circumvention Regulations Need to Be Revised," 14 Berkeley Technology Law Journal, pp. 519–566. Available online at <http://sims.berkeley.edu/pam/papers/dmcapaper.pdf>.
Samuelson, Pamela, Randall Davis, Mitchell D. Kapor, and J.H. Reichman. 1994. "A Manifesto Concerning the Legal Protection of Computer Programs," 94 Columbia Law Review, pp. 2308–2431.
Sandburg, Brenda. 1998. "Madness in PTO's E-Commerce Method? It Doesn't Take a Genius to Try Out Old Ideas on the Net, But It Can Win You a Patent," IP Magazine, August 27.
Scheinfeld, Robert C., and Parker H. Bagley. 1998. "Shakeout on State Street: The Decision Allows Virtually Anything Under the Sun to Win Patent Protection," IP Magazine, November. Available online at <http://www.ipmag.com/98-nov/schein.html>.
Shapiro, Carl, and Hal R. Varian. 1998. Information Rules: A Strategic Guide to the Networked Economy. Boston: Harvard Business School Press.
Shy, Oz. 1998. "The Economics of Software Copy Protection and Other Media," Internet Publishing and Beyond: The Economics of Digital Information and Intellectual Property, Deborah Hurley, Brian Kahin, and Hal Varian, eds. Cambridge, MA: MIT Press.
Siegel, David. 1996. Creating Killer Web Sites: The Art of Third-Generation Site Design. Indianapolis, IN: Hayden Books.
Simon, Herbert A. 1971. "Designing Organizations for an Information-Rich World," in Computers, Communications, and the Public Interest. M. Greenberger, ed. Baltimore, MD: Johns Hopkins University Press.
Siwek, Stephen E., and Gale Mosteller. 1998. Copyright Industries in the U.S. Economy: The 1998 Report. Washington, DC: International Intellectual Property Alliance.
Sloman, M. 1994. "Policy Driven Management for Distributed Systems," Journal of Network & System Management, 2(4):333–360.
Smith, Sean W., and Steve H. Weingart. 1997. "Building a High-Performance, Programmable Secure Coprocessor," IBM Research Report, RC21045. Yorktown Heights, NY: IBM T.J. Watson Research Center, November.
Smith, S.W., E.R. Palmer, and S.H. Weingart. 1998. "Using a High-Performance, Programmable Secure Coprocessor," FC98: Proceedings of the 2nd International Conference on Financial Cryptography. Anguilla, Brit. West Indies: Springer-Verlag LNCS.
Soilins, K., and L. Masinter. 1994. Functional Requirements for Uniform Resource Names. Internet Engineering Task Force, RFC 1737, December. Available online at <http://www.ietf.org>.
Stefik, Mark. 1996. The Digital Property Rights Language: Manual and Tutorial. Version 1.02, September 18. Palo Alto, CA: Xerox Palo Alto Research Center.
Stefik, Mark. 1997a. "Shifting the Possible: How Digital Property Rights Challenge Us to Rethink Digital Publishing," 12 Berkeley Technology Law Journal, pp. 137–159.
Stefik, Mark. 1997b. "Trusted Systems," Scientific American, 276(3):78–81.
Steinbach, S.E., I. Karp, and A.C. Hoffman. 1976. The House Report on the Copyright Act of 1976, Appendix 4. Mathew Bender (daily edition, Sept. 21).
Stevens, W. Richard. 1996. TCP/IP Illustrated. Reading, MA: Addison-Wesley.
Stone, Martha L. 1998. "Copyright Questions Abound on the Web," Editor & Publisher, Dec. 12, pp. 44–45.
Strauss, Neil, and Matt Richtel. 1999. "Pact Reached on Downloading of Digital Music," New York Times, June 29, p. B1.
Streitfeld, David. 1999. "Who's Reading What? Using Powerful 'Data Mining' Technology, Amazon.com Stirs an Internet Controversy," Washington Post, August 27, p. A01.
Sullivan, Jennifer. 1999. "Net Overloads U.S. Patent Agency," Wired News, July 13. Available online at <http://www.wired.com/news/print_version/politics/story/19473.html?wnpg=all>.
Sullivan, Jennifer, and John Gatner. 1999. "Cracked: MS's New Music Format," Wired News, August 18, 1:45 p.m. Available online at <http://www.wired.com/news/print-version/technology/story/21325.html?wnpg=all>.
Swisher, Kara. 1999. "Internet Firms Set Lobby Group to Push Views on Privacy, Intellectual Property," Wall Street Journal, July 12, p. A22.
Thomas, Karen. 1998. "Teen Ethics: More Cheating and Lying," USA Today, October 19, p. 1D.
Thomason, Robert, and Rob Pegoraro. 1999. "Web Site Cuts Deal with Songwriters," Washington Post, June 17, p. C01.
Tirole, Jean. 1988. The Theory of Industrial Organization. Cambridge, MA: MIT Press.
U.S. Copyright Office. 1998. Circular 21: Reproduction of Copyrighted Works by Educators and Librarians. Washington, DC: Library of Congress, U.S. Copyright Office. Available online at <http://lcweb.loc.gov/copyright/>.
U.S. Copyright Office. 1998. Guidelines for Educational Uses of Music. Washington, DC: Library of Congress, U.S. Copyright Office.
U.S. Copyright Office. 1999. Report on Copyright and Digital Distance Education. Washington, DC: Library of Congress, U.S. Copyright Office.
Walker, Adrian. 1998. "The Internet Knowledge Manager and Its Use for Rights and Billing in Digital Libraries PAKeM98," pp. 147 and 103–117 in Proceedings of the First International Conference on the Practical Application of Knowledge Management. Blackpool, UK: Practical Application Co., Ltd.
Warner, Julian. 1999. "Information Society or Cash Nexus? A Study of the United States as a Copyright Haven," Journal of the American Society for Information Science, 50(5):461–470.
Wingfield, Nick. 1999. "New Battlefield for Priceline Is Diapers, Tuna," Wall Street Journal, September 22, p. B1.
Wired News. 1999. "Millions of Eardrums Go Digital," August 10. Available online at <http://www.wired.com/news/print_version/culture/story/21193.html?wnpg=all>.
Wolverton, Troy. 1999. "Expedia to Customers: Name Your Hotel Room Price," CNET News.corn, September 7, 9:35 p.m. PT. Available online at <http://news.cnet.com/news/0-1007-202-113636.html>.
Wyckoff, P., S.W. Laughry, T.J. Lehman, and D.A. Ford. 1998. "T Spaces," IBM Systems Journal, 37(3):454–474.
Zeitchik, Steven. 1999. "The Great Ether Grab," Publisher's Weekly.com, June 14. Available online at <http://www.publishersweekly.com/articles/19990614_71279.asp>.
Zimmerman, P. 1994. PGP User's Guide. Cambridge, MA: MIT Press.