Lost Profits in a Multicomponent World, 59 Boston College Law Review 1321 (2018).
Crowdsourcing & Data Analytics: The New Settlement Tools, co-authored with Christopher Robertson and David V. Yokum, 102 Judicature 62 (peer reviewed) (2018).
Why Courts Fail to Protect Privacy: Race, Age, Bias and Technology, 106 California Law Review 263 (2018) (co-authored with Ian Farrell, Catherine Durso and Christopher Robertson).
Time is Money: An Empirical Assessment of Non-Economic Damages Arguments, 95 Washington University Law Review 1 (2017) (co-authored with John Campbell and Christopher Robertson).
Testing the White Hat Effect in Patent Litigation, co-authored with Roderick O’Dorisio, 27 Federal Circuit Bar Journal 155 (2017).
An Early Look at Mayo's Impact on Personalized Medicine, 2016 Patently -O-Patent Law Journal 10 (co-authored with Amy Mapes).
Countering the Plaintiff’s Anchor: Jury Simulations to Evaluate Damages Arguments, 101 Iowa Law Review 543 (2016) (co-authored with John Campbell, Christopher Robertson and David Yokum).
Horizontal Innovation and Interface Patents, 2016 Wisconsin Law Review 287.
Causation and Harm In a Multicomponent World, 164 University of Pennsylvania Law Review Online 61 (2016).
The Infringement Continuum, 35 Cardozo Law Review 1359 (2014).
A Case Study In Patent Litigation Transparency, 2014 Journal of Dispute Resolution 87 (2014) (solicited and co-authored with Derigan Silver).
Patent Imperialism, 109 Northwestern University Law Review Online 77 (2014).
Finding the Point of Novelty in Software Patents, 28 Berkeley Technology Law Journal 1218 (2013).
Reconciling Foreign and Domestic Infringement, 80 UMKC Law Review 607 (invited symposium contribution) (2012).
Moderating Mayo, 107 Northwestern University Law Review 423 (2012).
The Case for Contribution in Patent Law, 80 University of Cincinnati Law Review 113 (2011) awarded a Samsung/Stanford Patent Prize.
Not So Confidential: A Call for Restraint in Sealing Court Records, 2011 Patently-O Patent L.J. 6 (July 29, 2011).
Breaking Aro’s Commandment: Recognizing That Inventions Have Heart, 20 Fordham Intellectual Property, Media & Entertainment Law Journal 1185 (2010).
Rethinking Enablement in the Predictable Arts – Fully Scoping the New Rule (2009 Stanford Technology Law Review 3 (2009) reprinted in Intellectual Property Law Review, Thomson West 2010 ed.).
After eBay v. MercExchange: The Changing Landscape for Patent Remedies, 9 Minn. J. L. Sci. and Tech. 543 (2008) (reprinted in Patent Law Review, Thomson West 2009 ed.).
Human Capital as Intellectual Property? Non-Competes and the Limits of IP Protection, 50 Akron Law Review 903 (2017).
Trademark Laundering, Useless Patents, and Other IP Challenges for the Marijuana Industry, co-authored with Sam Kamin, 73 Washington & Lee Law Review 217 (2016).
The Copyright/Patent Boundary, 48 U. Rich. L. Rev. 611 (2014).
Borrowed Fiction and the Rightful Copyright Position, 32 Cardozo Arts & Entertainment Law Journal 389 (2014).
Making Non-Competes Unenforceable, 54 Ariz. L. Rev. 939 (2012).
The Wrong Tool for the Job: The IP Problem with Noncompetition Agreements, 52 Wm. & Mary L. Rev. 873 (2010).
Regulating Search, 22 HARV. J.L. & TECH. 475 (Spring 2009).
Super-Copyright: Contracts, Preemption, and the Structure of Copyright Policymaking, 41 U.C. Davis Law Review (2007).
Working Together In A Digital World: An Introduction, co-authored with Michael S. Mireles, 84 Denv. U. L. Rev. 1 Denver University Law Review 2006.
Mutant Copyrights And Backdoor Patents: The Problem Of Overlapping Intellectual Property Protection, 19 Berkeley Tech. L.J. 1473 Berkeley Technology Law Journal Fall 2004 Article.
Privacy Law in a Nutshell, co-authored with Stephen D. Rynerson and Erica Kitaev, 2nd edition (Thomson/West Publishing) (March 2014).
Chasing the Clouds without Getting Drenched: A Call for Fair Practices in Cloud Computing Services, co-authored with Melody Mosley Gates, Maury Nichols, and Ana Guitierrez, 16 Journal of Technology Law and Policy 193 (2011).
Bit-Wise But Privacy Foolish: Smarter E-Messaging Technologies Call for a Return to Core Privacy Principles, co-authored with Melody Mosley Gates and Michael Smith, 20 Albany Law Journal of Science and Technology 487 (2010).
Corporate Privacy Trend: The “Value” of Personally Identifiable Information (“PII”) Equals the “Value” of Financial Assets, 15 RICH. J.L. & TECH. 11 (2009) (co-author).
Privacy Law Nutshell, Thompson-West 2008.
Balance of Privacy vs. Security: A Historical Perspective of the USA PATRIOT Act, co-authored with Maury M. Nichols, Stephen D. Rynerson, Lance A. Maish, & Jon David Rogers, 31 Rutgers Computer & Tech. L.J. 285 Rutgers Computer and Technology Law Journal 2005.
An Analysis of the Use of Bilateral Agreements between Transnational Trading Groups: The U.S./EU E-Commerce Privacy Safe Harbor, co-authored with Stephen D. Rynerson & Britney D. Beall-Eder, 39 Tex. Int'l L.J. 171 Texas International Law Journal Winter 2004 Article.
International Take-Down Policy: A Proposal for the WTO and WIPO to Establish International Copyright Procedural Guidelines for Internet Service Providers, co-authored with Natalie A. Norman, 22 Hastings Comm. & Ent. L.J. 391 Hastings Communications and Entertainment Law Journal (COMM/ENT) Spring Summer 2000 Article.
Multinational Economic Netowrk Effects and the Need for an International Antitrust Response from the World Trade Organization: A Case Study in Broadcast - Media and News Corporation, co-authored with Eric K. Weingarten, 21 U. Pa. J. Int'l Econ. L. 41 University of Pennsylvania Journal of International Economic Law Spring 2000 Article.
Network Effects in Technology Markets: Applying the Lessons of Intel and Microsoft to Future Clashes between AntiTrust and Intellectual Property, co-authored with Kevin B. Davis, 8 J. Intell. Prop. L. 1 Journal of Intellectual Property Law Fall, 2000 Articles.
Sofware Patents: A U.S. and E.U. Comparison, co-authored with Kurt Leyendecker & Steven L. Webb, 8 U. Balt. Intell. Prop. L.J. 1 University of Baltimore Intellectual Property Law Journal Spring 2000 Article.
Encryption, Key Recovery, and Commercial Trade Secret Assets: A Proposed Legislative Model, co-authored with Charles P. Henderson, 25 Rutgers Computer & Tech. L.J. 97 Rutgers Computer and Technology Law Journal 1999 Article.
The Essential Facilities Doctrine in the Deregulated Telecommunications Industry, co-authored with David A. Forkner & Brian P. Jumps, 13 Berkeley Tech. L.J. 565 Berkeley Technology Law Journal Spring 1998 Article.
Transnational Extradition for Computer Crimes: Are New Treaties and Law Needed?, co-authored with T. Muther and H.Brissette, 34 Harvard J on Legislation 317 (1997).
The Internet and the Single Document Rule: Searching for the Four Corners of the Electronic Paper, co-authored with Alexander Neudeck, 78 J Pat & Trademark Office Society 751 (1996).
Antitrust Pitfalls in Licensing, co-authored with Sharon K. Black & Alexander R. Smith, Practising Law Institute PLI Order No. G4-3968 June & July, 1996 Intellectual Property Antitrust 1996.
Computer Crime Investigation & Prosecution: Substantive Statutes & Technical and Legal Search Considerations, co-authored with E. Banker and A. Smith, Air Force L.R. (1996).
Computer Crime: Substantive Statutues & Technical & Legal Search Considerations, co-authored with Alexander R. Smith & Elizabeth A. Banker, 39 A.F. L. Rev. 225 Air Force Law Review 1996.
Computer Law: Cases - Comments and Questions, co-authored with Peter B. Maggs and James A. Sprowl, West Publishing (1991) (Including Teachers Manual) (1996 Supplement).
Computer Technology and the Law, McGraw Hill, Colorado Springs, Colorado (1983) (Annual Supplements through 1999). (1996).
Software Maintenance License Prohibitions in the EU and the US, 27 IIC 804 (No. 6 1996) (Max Planck Institute, Munich Germany).
Legal Guide to Computer Crime: A Primer For Investigators and Lawyers, co-authored with E. Banker and A. Smith, Office of the Staff Judge Advocate, Air Force Office of Special Investigations, United States Air Force, 1995.
Minimizing Reverse Engineering: Sample Language for Dueal United States and European Union Software Licenses, co-authored with Sharon K. Black-Keefer & Alexander R. Smith, 24 Denv. J. Int'l L. & Pol'y 145 Denver Journal of International Law and Policy Fall, 1995.
Software Interoperability and Reverse Engineering, co-authored with Gus Winfield & Letty Friesen, 20 Rutgers Computer & Tech. L.J. 189 Rutgers Computer and Technology Law Journal 1994 Symposium: Current Issues of Software Copyrightability.
The Use of Quiet Title and Declaratory Judgment Proceedings in Computer Software Ownership Disputes, co-authored with James Shortall, Jr. & Vernon A. Evans, 71 Denv. U. L. Rev. 543 Denver University Law Review 1994.
A Practical Guide to Discovering Computerized Files in Complex Litigation, co-authored with Steven G. Austin, 11 Rev. Litig. 501 Review of Litigation Summer, 1992.
A Proposed Legal Advisors' Road map for Software Developers: On the Shoulders of Giants May No Mudball Stand, co-authored with Robert D. Sprague, M. Susan Lombardi, and Carolyn M. Lindh, 191 Denver Law Journal 68, (Spring 1991 Symposium Issue).
Summary Judgment and Discovery Strategies in Antitrust and RICO Actions After Matsushita v. Zenith, co-authored with Andrew P. McCallin, 36 The Antitrust Bulletin 325 (1991).
Advising Software Developers: Avoiding Copyright Infringements As Tough With Inconsistent Case Rules, co-authored with Robert Sprague, 9 Preventive L. R. 23 (1990).
Computer Security and the Protection of Sensitive But Not Classified Data: The Computer Security Act of 1987, co-authored with Elizabeth J. Bedient, 30 A.F.L. Rev. 135 (1989).
Software Patenting Trends: Who's Getting How Many of What?, co-authored with B.F. Smith, 1978-1987, J. Patent & Trademark Office Spring 1989.
Orwellian Constitutional Issues: Information Privacy, Security, and The New Technology, co-authored with with Susan J. Oran, Constitution 2000 (Chapter 8) (1988) (Carl Vinson Institute of Government, University of Georgia).
"Software License and Maintenance Agreements" Chapter on Selecting Software Packages for Financial Institutions, co-authored with Sue Oran (Bank Administration Institute, Chicago, Illinois) (1987).
A Comparison of German and U.S. Experiences in Software Copyrights, 6 International Review of Industrial Property and Copyright Law 751 (1987).
Cash Management After E.F. Hutton, co-authored with Michael C. Tierney, 170 The Bankers Magazine 25 (1987).
The Legal Environment of Commercial Database Administration, co-authored with Jay Batson, 27 Jurimetrics 297 (1987).
Computer and Software Law Audits, co-authored with Stephen D. Shirey, 2 Software Law Journal 201 (1986).
Book Review Out of the Inner Circle: A Hacker's Guide to Computer Security (By Bill Landreth) (Microsoft Press) (Rocky Mountain News, Book Review) (June 1985).
Computer Software in Public Schools, 28 Ed. Law Rep. 315 West's Education Law Reporter 1986 Commentary Dwight L. Pringle (1985).
Micro Tax Software: A Bargain?, 14 Colo. Law. 393 Colorado Lawyer March, 1985 Carole Thomas.
An Economic Analysis of Future Trends on the Development of Information for Lawyers -- Lexis, Juris, Westlaw, and FLITE, 9, Rutgers Computer and Technology Law Journal, (#2) (Aug/Sept 1983, with Andrea R. Stern). Reprinted in the Defense Law J. (April 1984).
Confidential Communications and Information In A Computer Era, co-authored with Lorna C. Youngs, 12 Hofstra L. Rev. 849 Hofstra Law Review Summer, 1984.
A Legal and Technical Assessment of the Effects of Computers on Privacy, co-authored with Richard A. Wehmhoefer, 60 Denver L.J. 449 (1983).
Advertising, Imperfect Competition, and The Market for Legal Services, co-authored with Rodney Peterson, Journal of Behavioral Economics (Winter 1983 Issue).
The Communications Regulatory Environment in the 1980's, co-authored with Rodney D. Peterson, Gary Alexander, and Curt W. Petty, Computer/Law Journal 1 (Summer 1983).
Antitrust Exposure In The Use of the Mini-Trial, Mini-Trial Handbook, Chapter F, (Edited by Eric D. Green) (Center for Public Resources, New York) (1982).
Colorado's Multidistrict Litigation Panel, co-authored with Mac V. Danford, Colorado Lawyer 1982 (October 1988).
Corporate and Tax Considerations for Nonprofit Organizations, co-authored with Richard G. Macklin and Peter C. Guthery, Closely Held Corporations in Colorado, Chapter 24) (Edited by Cathy S. Krendl) (Continuing Legal Education in Colorado, Inc. Publishers) (1981).
The Computer as a Tool for Legal Decision Making, co-authored with Thomas H. Gonser and Eileen I. Wilhelm, 27 The Practical Lawyer 11 (Sept. 1981).
An Antitrust Primer, 1980 Transportation Law Institute-Carrier Liability in an Evolving Regulatory Environment: Claims and Antitrust, p. 189.
The Computer Industry: An Economic-Legal Analysis of Its Technology and Growth, Lexington Books, D.C. Heath and Co. Lexington, MA (1976) (2nd printing).
Enforcement Under the Illinois Antitrust Act, 5 Loyola University of Chicago Law Journal 25 (1974).
Functional Discounts: A Legal-Economic Concept Permitting New Experiments in Distribution Systems, 14 Santa Clara Lawyer 211 (1974).
The Legal Protection of Computer Software, co-authored with Richard M. Fischl, Center for Advanced Computation, Document No. 120 (1974), University of Illinois at Urbana-Champaign, Illinois, p 41.
A Method for Analyzing, Detecting, and Correcting Multi-collinearity, co-authored with Morris M. Kleiner, Center for Advanced Computation, Document No. 118 (1974), University of Illinois at Urbana-Champaign, Illinois, p. 47.
"Antitrust Law -- Belliston V. Texaco, Inc.," 455 2d 175 (10th Circ.), cert. denied, 408 U.S. 929 (1972),", 455 2d 175 (10th Circ.), cert. denied, 408 U.S. 929 (1972).