Ransomware – Practical and Legal Considerations for Confronting the New Economic Engine of the Dark Web JA Sherer, MM McLellan, ER Fedeles, NL Sterling Richmond Journal of Law and Technology 23 (3), 1-49, 2017 | 25 | 2017 |
Merger and Acquisition Due Diligence: A Proposed Framework to Incorporate Data Privacy, Information Security, E-Discovery, and Information Governance into Due Diligence Practices JA Sherer, TM Hoffman, EE Ortiz Richmond Journal of Law and Technology 21 (5), 1-76, 2015 | 22* | 2015 |
Wherever You Go, There You Are (With Your Mobile Device): Privacy Risks and Legal Complexities Associated with International ‘Bring Your Own Device’ Programs ML McLellan, JA Sherer, ER Fedeles Richmond Journal of Law and Technology 21 (11), 1-49, 2015 | 18* | 2015 |
Digital Direction for the Analog Attorney-Date Protection, E-Discovery, and the Ethics of Technological Competence In Today's World of Tomorrow S Blaustein, ML McLellan, JA Sherer Richmond Journal of Law & Technology 22 (4), 10, 2016 | 16 | 2016 |
Cognitive computing and proposed approaches to conceptual organization of case law knowledge bases: a proposed model for information preparation, indexing, and analysis A Taal, JA Sherer, KA Bent, ER Fedeles Artificial Intelligence and Law 24 (4), 347-370, 2016 | 11 | 2016 |
When Is a Chair Not a Chair? Big Data Algorithms, Disparate Impact, and Considerations of Modular Programming JA Sherer The Computer & Internet Lawyer 34 (8), 6-10, 2017 | 10 | 2017 |
Merger and Acquisition Due Diligence Part II - The Devil in the Details JA Sherer, TM Hoffman, KM Wallace, EE Ortiz, TJ Satnick Richmond Journal of Law and Technology 22 (4), 1-50, 2016 | 9 | 2016 |
Examining the most popular weight loss diets: how effective are they? EL Sherer, JA Sherer Jaapa 21 (11), 31-34, 2008 | 9 | 2008 |
The (Social) Media Is the Message: Navigating Legal and Reputational Risks Associated with Employee Social Media Use JA Sherer, ML McLellan, BA Yantis The Computer & Internet Lawyer 36 (5), 1-8, 2019 | 7 | 2019 |
An Investigator’s Christmas Carol: Past, present, and future law enforcement agency data mining practices JA Sherer, NL Sterling, L Burger, M Banaschik, A Taal Cyber Criminology, 251-273, 2018 | 7 | 2018 |
Big Data Discovery, Privacy, and the Application of Differential Privacy Mechanisms JA Sherer, J Le, A Taal The Computer & Internet Lawyer 32 (7), 2015 | 7 | 2015 |
Technological and Information Governance Approaches to Data Loss and Leakage Mitigation A Taal, J Le, A Ponce de Leon, JA Sherer, KS Jenson Computer Science and Information Technology 4 (6), 181-187, 2016 | 6 | 2016 |
Increased C-Suite Recognition of Insider Threats through Modern Technological and Strategic Mechanisms A Taal, J Le, JA Sherer 15th European Conference on Cyber Warfare and Security (ECCWS), 2016 | 4 | 2016 |
Practical Magic: Law's Hands-on AI Revolution JA Sherer, E Walters Law Prac. 44, 32, 2018 | 3 | 2018 |
Like This, Not That – Mitigating Corporate Social Media Engagement Risks JA Sherer, ML McLellan The Computer & Internet Lawyer 32 (8), 2015 | 3 | 2015 |
A consideration of eDiscovery technologies for internal investigations A Taal, J Le, JA Sherer Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber …, 2015 | 3 | 2015 |
Picking Up the Slack™ Legal and Information Governance Considerations for New(er) Technologies JA Sherer, A Singer, SB Barnes Richmond Journal of Law & Technology 25 (4), 1-19, 2019 | 2 | 2019 |
Picking Up the Slack–Legal and Information Governance Considerations for New (er) Technologies, 25 RICH JA Sherer, A Singer, SB Barnes JL & Tech, 2019 | 2 | 2019 |
Ethics, Technology, and Attorney Competence KS Jenson, C Watson, JA Sherer Advanced eDiscovery Institute Course Materials, 2014 | 2 | 2014 |
AI–human interaction: Soft law considerations and application C Casey, A Dindiyal, JA Sherer Journal of AI, Robotics & Workplace Automation 1 (4), 360-370, 2022 | 1 | 2022 |