Zobrazeno 1 - 10
of 25
pro vyhledávání: '"Janine S. Hiller"'
Autor:
Janine S. Hiller, Lindsay Sain Jones
Publikováno v:
American Business Law Journal. 59:61-121
Publikováno v:
SSRN Electronic Journal.
Autor:
Kimberly A. Houser, Janine S. Hiller
Publikováno v:
American Business Law Journal. 57:827-865
Publikováno v:
SSRN Electronic Journal.
Autor:
Janine S. Hiller, Scott Shackelford
Publikováno v:
American Business Law Journal. 55:5-51
Autor:
Roberta S. Russell, Janine S. Hiller
Publikováno v:
Journal of Contingencies and Crisis Management. 25:31-38
Information systems are essential for crisis management; therefore, maintaining the security of those systems is important. Furthermore, during a crisis, privacy and personal integrity issues can sometimes be overlooked. Yet, both security and privac
Publikováno v:
SSRN Electronic Journal.
The increasing interest being in social entrepreneurship has brought with it the beginnings of a legal revolution in the way that firms are incorporated and managed with thirty-three states having enacted statues permitting the formation of special c
Autor:
Janine S. Hiller
Publikováno v:
American Business Law Journal. 53:251-314
The Patient Protection and Affordable Care Act (“Affordable Care Act” or ACA), health information technology (HIT) adoption, and increasing implementation of electronic medical records, are all propelling health care into the world of big data. B
Publikováno v:
American Business Law Journal. 52:721-787
This Article analyzes recent business realities and regulatory trends shaping the proactive cybersecurity industry. To provide a framework for our discussion, we begin by describing the historical development of the industry and how it has been shape
Autor:
Roberta S. Russell, Janine S. Hiller
Publikováno v:
Computer Law & Security Review. 29:236-245
Attacks on computers and information networks, both public and private, are disclosed in the news daily. Most recently, Apple, Facebook, and Twitter acknowledged that they were attacked and were now taking additional measures to secure their networks