Close

Articles Posted in Information Technology

Updated:

Ribert Richards Updates Legal Information Systems & Legal Informatics Resources

Legal Information Systems & Legal Informatics Resources, http://home.comcast.net/~richards1000/LegalInformationSystemsBibliography.htm , has been updated with new content. This site aggregates resources of interest to those conducting research on legal information systems. Materials listed include the following: • Articles, Preprints, Journals, Blogs, and Indexes • Conferences and Conference Proceedings • Dissertations & Theses…

Updated:

New, Powerful, State-Of-The-Art Learning Technology Coming to the American Association of Law Libraries

The American Association of Law Libraries (AALL) is proud to announce it is adopting a new, powerful, state-of-the-art learning technology, which will provide a new learning gateway to all AALL members. The new Ed2Go @AALLNET site will provide members with: Online access to the AALL Annual Meeting program recordings, as…

Updated:

CLLB Information Security Newsletter. February 2009 Volume 2 Number 2.

February 2009 Volume 2 Number 2. CLLB Information Security Newsletter Monthly Cyber Security Tips NEWSLETTER February 2009 Volume 2, Issue 2 Cyber Security Trends for 2009 From the Desk of David Badertscher The volume and complexity of cyber threats continue to increase. More of our activities-whether at home, school or…

Updated:

Q&A: Electronic Signatures*

QUESTION: Does any one use electronic signatures for documents? We conduct video arraignments with detention facilities around our county and this would be most helpful and much more efficient. Any information you can provide will be appreciated. RESPONSE: There is a difference between electronic and digital. We use a live…

Updated:

Chain of Custody: Authenticating Digital Evidence

The transition of evidence from paper to digital imposes new challenges to ensuring a proper “chain of custody'” in the authentication of digital evidence. The legal group of Merrill Corporation has recently compiled a report which addresses this and related issues: Report: AUTHENTICATING DIGITAL EVIDENCE: IDENTIFY AND AVOID THE WEAK…

Updated:

New Online Journal: Legal Information and Technology eJournal

Georgia K. Briscoe* of the University of Colorado School of Law Library has sent the following announcement which we are please to post here for the benefit of all law librarians and perhaps some others as well. Here is her announcement: In case you haven’t heard, there is a new…

Updated:

Recent Comments on Google and the Future of the Book

Sometimes it seems as though Google has become ubiquitous in the world of searching and may want to repeat its act in the world of books. While thinking about this, two articles, one forthcoming and one published Febrary 1 have come to our attention> The forthoming article Google and the…

Updated:

CLLB Information Security Newsletter. January 2009 Volume 2 # 1.

January 2009 Volume 2 # 1 Challenge or Secret Questions From the Desk of David Badertscher What are Challenge or Secret Questions? Knowledge-based authentication or the use of “Challenge or Secret Questions” helps computer users access their accounts when they forget their password. The questions are often designed as simple,…

Updated:

Results from Marshall Breeding’s 2008 Library Automation Survey

In case you missed it, the results from the 2008 version of Marshall Breeding’s Library Automation Survey are available at http://www.librarytechnology.org/perceptions2008.pl. This Survey is international in scope. There were 1,450 responses.

Contact Us