ArticlePDF Available

To agree or not to agree: Legal issues in online contracting

Authors:

Abstract

E-commerce for merchants and consumers is more than just establishing or visiting an attractive Web site to conduct business over the Internet. For companies and consumers alike, conducting business in cyberspace entails not only the traditional risks of sales and contracting, but also a new set of risks related to the electronic environment. For entities of all sizes, important components of those risks involve legal issues: jurisdiction, contract formation, contract validity, contract changes and errors, authentication and attribution, message integrity, and non-repudiation. Becoming familiar with these issues can help avoid costly disputes in e-business.
To agree or not to agree:
Legal issues in online
contracting
Carl Pacini
Assistant Professor of Accounting, Florida Gulf Coast
University, Fort Myers
Christine Andrews
Assistant Professor of Accounting, Florida Gulf Coast
University, Fort Myen
William Hillison
Arthur Andersen Professor of Accounting, Florida State
University, Tallahassee
E-commerce for merchants
and consumers is more than
just establishing or visiting an
attractive Web site to conduct
business over the Internet. For
companies and consumers alike,
conducting business in cyberspace
C ompanies have been doing business electronically
for a number of years. Take electronic data inter-
change, for example. Defined as the electronic
exchange of information between trading partners, EDI
has been used successfully by General Electric, General
Motors, Sears, Wal-Mart, and a number of other major
corporations. Human intervention is often nonexistent,
with goods being ordered and delivered and payments
initiated via electronic fund transfers (EITs). Unlike e-
commerce transactions, EDI traditionally requires trading
partners to use a dedicated leased transmission line or a
connection to a value-added network (VAN). Moreover, it
involves both a direct connection and high start-up and
operating costs-entry barriers that the Internet has low-
ered through its use of a common information and com-
munication platform.
Or consider Financial Electronic Data Interchange (FEDI),
which integrates EFI and ED1 and results in both remit-
tance data and fund transfers being accomplished simul-
taneously. If the seller’s bank is not EDI-capable, a buyer
can implement FED1 by contracting with a financial
value-added network @VAN), a separate organization that
enables the linking of various ED1 networks.
However, in nearly all these electronic relationships, prior
agreements (called “trading partner agreements”) provide
answers to most of the legal questions that might arise.
Virtually every contingency can be anticipated, and the
partners can agree on how to proceed, even over a dis-
pute. In contrast, when e-commerce participants are deal-
ing with strangers over an open system like the Internet,
bilateral agreements are harder to arrange. Agreements
that anticipate all contingencies cannot be expected to be
agreed to by thousands of customers who might visit an
e-merchant’s Web site.
As the world of e-commerce continues to expand, uncer-
tainty about the enforceability of electronic agreements
and the legitimacy of the parties involved has led many
executives, attorneys, business owners, regulators, and
others to ponder what might happen when disputes arise
over electronic transactions. A 1997 court ruling by a
43
Georgia appellate court has contributed to this uncer-
tainty. In Georgia Dept. of %znspurtation u. Norris, the court
held that filing a notice by fax did not satisfy a require-
ment that notice be in writing because the transmission of
“beeps and chirps” along a telephone line is not writing
in the customary sense of the term.
The risks or uncertainties related to conducting business
over the Internet are:
Jurisdiction-Who has legal jurisdiction over a cybercon-
tract, given the global nature of e-business?
Contract farmtim-Is a business or other Web site owner
making a contractual offer or an invitation to bargain?
Contract valid@-What is the legal validity of a Web
wrap or click-on contract?
Contract changes and errors-What is the legal effect of
changes and errors in transmission over the Internet?
Authentication and attribution--How can parties to a con-
tract be assured that those they are dealing with are legit-
imate?
Message integrity-Is the message received exactly the
same as the message sent?
iVonr@udiution-How can a business or consumer be
assured that parties cannot deny the content of a trans-
action or event?
Given the importance of understanding these various
risks, e-business participants should become familiar with
the basic legal issues involved. Here we will analyze the
status of contract law applicable to e-transactions, provide
an overview of recent legislative efforts that have been
undertaken to classify e-business contract law, and offer
practical suggestions for contracting in cyberspace. It is
important to note here that we do not offer legal advice in
this article; readers needing legal advice should seek such
services from competent legal counsel.
Jurisdiction
C ontracting in cyberspace presents a challenge to
Web site owners because the Internet is a form of
communication that rises above spatial bound-
aries. Its domain flows indiscriminately across intema-
tional boundaries as easily as it flows across the street.
This creates jurisdiction problems in disputes between e-
commerce buyers and sellers, such as where a contract
was formed or which state’s law applies. Moreover, because
Internet technology allows “pull” relationships (a customer
reads or downloads information from an e-merchant’s
Web site) as well as “push” relationships (an e-merchant
sends information to a customer automatically), the ques-
tion of the location of legal contact becomes complex.
In the United States, two different groups of court deci-
sions have emerged with regard to Web sites. One line of
judicial authority has granted jurisdiction over nonresi-
dents on the grounds that their Internet involvement
encompassed significant interactivity (or follow-on con-
tracts). In CompuServe Inc. II. Putterson (1996), a federal
appeals court ruled that a computer programmer in Texas
was subject to Ohio law. The programmer and Ohio-
based CompuServe had formed an electronic contract
under which CompuServe distributed and sold copies of
software. During contract negotiations, the programmer
had never visited Ohio. In Cody v. Ward (1997), a federal
district court asserted jurisdiction based on telephone and
e-mail communications that consummated a business
relationship started over Prodigy’s “Money Talk” discus-
sion forum for financial matters.
In both these cases, the Internet activities of those sub-
jected to the jurisdiction of a distant court involved more
than a visit to a passive Web site. In other cases, reports
Takach (1999), courts have asserted jurisdiction based on
solicitation of donations, signing up subscribers for Net
services, and negotiations and other dealings that occurred
as the result of an initial Internet communication.
In a second group of cases, US courts are refusing to exer-
cise jurisdiction over an out-of-state person or business
because of mere Web site access or creation. In Bensusan
Restaurant Corp. V. Richard King (1997), a Missouri jazz
club called the Blue Note established a Web site on which
it advertised. People wishing to visit the establishment
had to telephone to order tickets and physically take
delivery of them at the club in Missouri. The Web site also
contained a disclaimer that the Blue Note was not afflliat-
ed with the famous New York jazz club of the same name.
When the New York club brought a trademark infiinge-
ment suit, the federal court dismissed the action for lack
of jurisdiction, reasoning that a Web site that merely pro-
vides information is not equivalent to advertising, selling,
or promoting in New York City. The federal appeals court
deemed it significant that almost 100 percent of the cus-
tomers of the Blue Note lived in Missouri.
In the 1998 case IDS Life hurunce Co. v. SunAmericu, Inc.,
plaintiff IDS Life sued SunAmerica for unfair competition,
tortious interference with contract, misappropriation of
trade secrets, and intentional interference with business
relationships. IDS claimed that SunAmerica was inducing
IDS’s sales agents to leave the company and switch their
customers over to SunAmerica in violation of IDS employ-
ment contracts. The federal district court refused to find
jurisdiction solely on the basis of SunAmerica’s operation
of a Web site. This case reflects the common approach in
the second group of cases in that mere, general Web site
access is insufficient to confer jurisdiction on a court over
a nonresident defendant.
44 Business Horizons I January-February 2002
These two lines of US court decisions suggest the use of a .
sliding-scale standard in deciding e-business jurisdiction
issues that relates to the amount and level of online com- e
mercial activity A clear statement of this standard appears in
Zippo Mfg. Co. V. Zippo Dot Corn, Inc. (1997):
The likelihood that persona1 jurisdiction can be consti- l
tutionally exercised is directly proportional to the
nature and quality of commercial activity that an entity
conducts over the Intemet....If the defendant enters
into contracts with residents of a foreign jurisdiction
that involve the knowing and repeated transmissions of
computer files over the Internet, personal jurisdiction is
proper. At the opposite end are situations where a
defendant has simply posted information on an Inter-
net Web site that is accessible to users in foreign juris-
dictions. A passive Web site that does little more than
make information available to those who are interested
in it is not grounds for the exercise of persona1 jurisdic-
tion. The middle ground is occupied by interactive Web
sites where a user can exchange information with the
host computer. In these cases, the exercise of jurisdic-
tion is determined by examining the level of interactiv-
ity and commercial nature of the exchange of informa-
tion that occurs on the Web site.
Figure 1 illustrates the approach taken by US courts in
determining jurisdiction issues in commercial cyberspace
transactions.
The legal uncertainty faced by e-merchants is increased by
dealing with parties from other nations. Conceivably, a
foreign court could deem it reasonable to exercise juris-
diction over a US merchant who engaged in an e-business
transaction with one of its citizens. Under current law, a
foreign nation can usually assert jurisdiction over nonresi-
dents when the exercise of that jurisdiction is “reason-
able.” According to the American Law Institute (1987),
circumstances that have been found to be reasonable
include those in which a nonresident was:
regularly conducting business in a foreign country;
engaging in an activity outside the foreign country that
has a substantial, direct, and foreseeable effect in that
country; or
engaging in an activity that is the subject of court action
being owned, possessed, or used in the foreign country.
Businesses that host Web sites can implement measures to
reduce the likelihood of being summoned into court in
an undesirable jurisdiction. First, the site should include
both a forum selection clause (in which state or country a
case will be heard) and a choice of law provision (which
state’s or nation’s law applies) that are agreed to when a
purchaser decides to buy. In Burger King v. Ruahwicz
(1985), the US Supreme Court held that forum selection
clauses are generally enforceable because a person can
consent to personal jurisdiction. However, courts decide
their enforceability on a case-by-case basis. On the other
hand, in The Bremen v. Zupata Off-Shore Co. (1972), the
Supreme Court indicated that forum selection clauses
must be fair and reasonable to be enforced. These same
principles also apply to a choice of law provision.
Cmpi v. MicrosofC Network (1999) can serve as a useful
illustration of these principles. Microsoft Network, an
online computer service, required prospective subscribers
to view multiple computer screens of information, includ-
ing a membership agreement containing a forum selec-
tion clause. The membership agreement appeared on the
screen in a scrollable window next to blocks providing the
choices “I Agree” and “I Don’t Agree,” either of which
prospective members had the option to click at any point.
A New Jersey appellate court struck down a challenge to
the forum selection clause because there was no basis to
conclude that it was proffered unfairly or designed to con-
ceal its provisions. The court concluded the plaintiffs
knew they were entering into a contract.
Figure 1
Sliding scale standard of jurisdiction in e-commerce cases
Jurisdiction Jurisdiction depends
oninteractivity No jurisdition
I
Interactive Web site:
l Provides information
for users to make
purchase decisions
l Actively solicits
business
I I
Mixed Web site: Passive Web site:
l Provides information l Provides only
l Users can exchange information
information with l Does not solicit
host computer business
Source: Ferrera et al. (2001 j
Hence, a brilliantly worded provision
on jurisdiction and/or choice of law is
not useful unless the Web site owner
has brought it to the attention of the
user. For example, a forum selection
and/or choice of law clause may be
unenforceable if it appears only at the
foot of the home page and does not
appear on subsequent pages. Some
Internet users will not visit a Web site
via a home page but may do so from a
hyperlinked site or from a bookmark
list. To help reduce the noted risks, a
required checkbox for indicating agree-
ment to a forum selection and/or
choice of law clause can be included,
placed just before or as part of a trans-
action execution selection.
To agree or not to agree: Legal issues in online contracting 45
Second, the Web site owner should use technology that
counts site “hits” (and possibly have it audited by a CPA
firm) to document the number of sales in another state or
foreign nation. Such evidence could be valuable in demon-
strating that the Web site does little or no business in the
location where a plaintiff files a lawsuit. Failure to satisfy
the “minimum contacts” requirement of due process can
result in the plaintiff being unable to establish jurisdiction.
Third, e-business Web site owners should use written dis-
claimers, which give owners more control over the parties
with whom they do business. A site disclaimer clause may
state that certain transactions will not be entered into with
residents of specific states, provinces, or countries. More-
over, the clause could be used in conjunction with a tech-
nology filter that precludes the site from being accessed by
visitors from certain states or countries. In the final analy-
sis, those who employ the Net to do business out of state
and/or abroad must closely examine the parameters of
dealing in cyberspace.
Contract formation
T
he advent of e-commerce over the Net has raised
various legal issues about the formation of elec-
tronic contracts. One area of uncertainty is whether
a business Web site owner is making an offer or merely an
invitation to make an offer. Does the potential customer’s
communication constitute an offer or an acceptance? The
answer will dictate the time and place a contract is made.
The question of offer or acceptance was aptly demon-
strated recently when an e-merchant in the UK advertised
televisions on its Web site for f3.99 instead of f399
because of a computer error. More than 20,000 orders
were placed before the e-merchant realized why the televi-
sions were so popular and closed down its site. The legal
issue to be resolved is whether displaying goods or ser-
vices on a Web site amounts to an offer by the seller,
which e-consumers accept, or an invitation to negotiate,
to which they respond with an offer.
Given the risks, businesses would be well advised to con-
struct a Web site that is, in effect, a “shop window” or an
invitation to make an offer. This allows the customer to
make an offer to buy goods or services that the site owner
is free to accept or reject. The prudent e-business should
clearly set out an agreed-upon method of contract accept-
ance. First, the screen should state in large, bold print that
any indication of interest sent by an e-customer is an
offer, not an acceptance. Once the e-business receives an
offer from a purchaser, it can decide whether or not to
accept. It then sends an e-mail to the customer after con-
sidering and approving the purchaser’s offer. These proce-
dures give greater control to the e-merchant in choosing
the terms that will govern the contract.
Contract validity
A
nother emerging issue is the legal validity of Web
wrap or click-on contracts. Such a contract is typi-
cally found on a Web site offering goods or ser-
vices for sale. The e-consumer or e-business wanting to
create a legal relationship (buyer and seller) with a Web
merchant finds legal terms on the computer screen, often
in a dialogue box that permits messages and responses.
The consumer usually consents to the terms by clicking a
box on the screen that says “OK” or “I agree.” The ques-
tion arises, however, as to when an acceptance occurs in
such a situation.
Traditional contract law usually holds that an acceptance
is effective when sent by the offeree using an authorized
mode of communication. This “mailbox rule” applies
unless the offer provides otherwise, the offeree uses an
unauthorized method of acceptance, or the acceptance is
sent after the offeree sends a rejection. In Bickmore v. Bick-
more (1996), a Canadian court held that a faxed accept-
ance of a faxed offer was delivered when the acceptance
was sent. The mailbox rule developed, however, in the
nineteenth century when contracts were often negotiated
at a distance through the mails and the courts had to pro-
tect the offeree from losses incurred by any delay or failure
on the part of the post office. Given the advent of instanta-
neous communication, such as the Net, some courts have
The issue is whether displaying
goods or services on a Web site
amounts to an offer by the seller,
which e-consumers accept, or an
invitation to negotiate, to which
they respond with an offer.
held that the rationale behind the mailbox rule does not
apply. In Enrores u. Miles Far East Corporation (1955) and
Brinkibon v. S&hag (1983), two English courts ruled that
acceptance is effective upon receipt in situations involving
instantaneous forms of communication.
Thus, if the Net can be regarded as an instantaneous com-
munication medium, then it appears more appropriate to
consider that acceptance occurs (or the contract is formed)
when the response-the “clicking on an icon”-is received.
This principle is a clear abrogation of the mailbox rule, but
is consistent with the policy in virtually all EDI model trad-
ing partner agreements that have addressed the issue. It is
46 Business Horizons / January-February 2002
also consistent with existing or proposed legislation such as
the United Nations Convention on Contracts for the Inter-
national Sale of Goods (CISG), proposed revisions to Arti-
cle 2 and 2A of the Uniform Commercial Code, the United
Nations Model Law on Electronic Commerce, and the Uni-
form Computer Information Transactions Act (UCITA).
“Receipt” does not require that the recipient of the elec-
tronic message know of, open, or read the message. All it
requires is that the electronic message be available for pro-
cessing by the recipient’s information system.
Contract changes
and errors
W ith recent advances in information technology,
the use of software to send or answer mes-
sages automatically has moved from the realm
of science fiction to business reality. The new technology,
referred to as “electronic agents” or “intelligent agents,”
makes it possible for computers to initiate and complete a
transaction without human intervention. In fact, the entire
point of the new technology is to allow such transactions
to take place without any need for human traders to
review or even be aware of particular transactions.
Currently the common law is more or less unclear on the
How the law responds to such innovation will have an
enormous impact on the development and growth of e-
legal effect of using an electronic agent even though the pol-
commerce. For example, where no prior EDI agreement
icy of “owner responsibility” seems generally accepted.
exists between the parties, may one of them make an offer
Moreover, two model statutes provide some guidance to
or acceptance by machine? Who is responsible if the com-
those who operate Web sites with electronic agent character-
puter “makes a deal” contrary to the programmer’s inten-
tion? These questions relate to risk that must be considered
by those involved with computer-to-computer transactions.
istics. For example, the Uniform Electronic Transactions Act
(UETA), which has been adopted by several states, does
Another area of concern in e-commerce is the legal effect
of changes and errors in transmission. The common law
remains unclear in this area, but UETA offers a practical
solution. When a business or person (Party A) conducts
an electronic transaction with the Web site of Party B, and
if Party B does not allow Party A a chance to correct or
prevent an error, the error can be avoided provided that
Party A:
l promptly notifies Party B of the error and the fact that
Party A did not intend to be bound by the electronic
message sent;
l takes reasonable steps, including those that conform to
Party B’s reasonable instructions, to destroy or to return
to Party B (according to Party B’s instructions) any item
of value received as a result of the erroneous electronic
message; and
l has not used or received any benefit or value from the
consideration received from Party B.
This avoidance rule is limited to human error when deal-
ing with a machine or computer system.
correct any error.
Authentication, attribution,
Resort to the law can be avoided if Party B constructs a
Web site that enables an e-customer or e-merchant to pre-
vent the transmission of an erroneous record, or enables
an e-customer or e-merchant to correct an error once sent.
For example, an electronic agent may be programmed to
provide a “confirmation screen” to the e-customer with
the ability to prevent the erroneous record from being
transmitted. Similarly, the electronic agent might receive
the transmission sent by the e-consumer and then send
back a confirmation that the person must accept before
the transaction is consummated. In either case, the elec-
tronic agent would provide an opportunity to prevent or
address the limited circumstance in which a contract is
formed solely by electronic agents in an automated transac-
tion. Although UFXA applies only to parties who have
agreed to conduct transactions by electronic means, it makes
clear that a contract may be formed by the interactions of
the electronic agents of the parties, even if no individual was
aware of or reviewed the agent’s actions or the final contract
terms. Both UETA and the UN Model Law on Electronic
Commerce consider information systems to be instruments
of the owner for purposes of forming contracts. Machines or
computers may not appear to have the necessary intent
required to form a contract, but those who place them in
operation for that purpose do have that intent.
and nonrepudiation of
electronic contracts
A nother key issue in e-commerce is the problem of
attributing an electronic message to the person
who purports to send it. Although cyberspace
involves anonymity, e-customers and e-merchants must be
matched up with legally responsible parties in the real
world. Those involved in e-business must confront issues
linked to the authentication of an electronic message
sender. First, consumers and businesses want to know that
they can rely on a message as having actually been sent by
the purported sender. Second, e-commerce participants
wish to avoid liability in the event a message allegedly sent
by one party was actually sent by an interloper or hacker.
To agree or not to agree: Legal issues in online contracting 47
Both UETA and UCITA take the position that an electronic
record (information that is inscribed on a tangible medi-
um or stored in an electronic or other medium and is
retrievable in perceptible form) or signature (a mark
made with the intention of authenticating the marked
document) is attributable to a person or entity if it was
the act of the person or entity. One’s actions include those
of both human and electronic agents. For example, an
electronic signature on a purchase order, in response to a
declining inventory level, is attributable to a person
whether it originated with that person, an employee, or a
software program (intelligent or electronic agent).
UETA and UCITA also indicate that the person’s act may be
attributable in virtually any manner. This includes any
security procedure used to determine the person or entity
to which an electronic record or signature can be attrib-
uted. A “security procedure” is one employed for the pur-
pose of verifying that an electronic signature, record, or
performance is that of a specific person, or for detecting
changes or errors in the information in an electronic
record. The term includes procedures that require the use
of algorithms or other codes, passwords, encryption, or
callback, or any other acknowledgment procedure. Security
procedures are, in fact, only one way of attributing an elec-
tronic communication to a specific party or entity.
According to UCITA, a receiving party, acting in good
faith, who properly applies an attribution procedure and
ascertains that a message was from a given party can bind
that party. An electronic communication may be attrib-
uted to a party when:
the message was dispatched by one who obtained the
necessary access number or device(s) from a source
under the control of the alleged sender;
the access occurred because of the purported sender’s
failure to exercise reasonable care in protecting the
number or device; and
the receiving party relied upon the message to his, her,
or its detriment.
In essence, one who negligently permits an electronic
message to be sent is bound by that communication to
anyone who detrimentally relies on it.
Electronic signatures
A common attribution procedure used in the e-business
environment is an electronic signature. Traditionally, a sig-
nature is any mark or symbol affixed to a writing to mani-
fest the signer’s intent to adopt it as his own and to be
bound by it. UETA defines an electronic signature as an
electronic sound, symbol, or process attached to or logically
associated with a record and executed or adopted by a per-
son with the intent to sign the record. Numerous types of
electronic signatures have been developed through
48
advances in technology. However, the two primary cate-
gories are: (1) non-cryptographic methods and (2) crypto-
graphic methods. The former are designed primarily to mit-
igate identification and authentication risks. The latter pro-
vide controls necessary to meet the additional risks of non-
repudiation and security. The spectrum of electronic signa-
ture technologies currently available is discussed below.
Non-cryptographic controls
Password or personal ID number. Passwords and PINS have
been used as controls over access to information for many
years to authenticate a user and allow access to a computer
network. However, it should be recognized that the role of
a PIN or password is just that of authentication. In other
words, the user who has the PIN provides a form of assur-
ance that he is the authorized person. In this sense, the PIN
is a form of electronic signature. To function properly, it
must be known by both parties prior to use. Use of the PIN
over an open communication channel can create additional
problems. It is usually essential that the PIN be encrypted
so that it cannot be intercepted and learned by others.
Smart card. A smart card contains an embedded chip that
can generate, store, and/or process data. The card can be
used to facilitate various authentication technologies when
inserted into a reader device. Information from the cards
chip is read by security software only when the user enters a
PIN or password or provides a biometric identifier. This
method provides greater security than use of a PIN alone
because a user must have both (1) physical possession of
the smart card and (2) knowledge of the PIN. This type of
control is common with ATM transactions. Because of the
physical nature of the card (or any other physical form of
identity), it is termed a “token.” Good security requires that
the smart card and the PIN be kept or stored separately.
Digitized signature. A digitized signature is a graphical
image of a handwritten signature recorded by digital pen
and pad. By using special software, the recipient compares
the digitized representation of the entered signature with a
stored copy of the graphical image of it. A digitized signa-
ture is more reliable for authentication than a PIN because
there is a biometric component to the creation of the
handwritten image. In other words, the recording device
and associated evaluation software compare not only the
shape of the letters but also the timing of each pen stroke,
its duration, and/or the pen pressure. Forging a digitized
signature can be more difftcult than on paper because digi-
tal comparisons with a computer program are more dis-
criminatory than those done with the human eye.
At first glance, this form of electronic signature appears
to be well suited for authentication. It is not only difficult
to forge, it also maintains a format familiar to manual
approaches. However, the user-created image on the digi-
tal pad is literally a stored digital file to be compared to
the maintained version. If the digital signature file is sent
Business Horizons / January-February 2002
electronically, it is subject to interception, copying, and
later resubmission by parties other than the signer. Thus,
just like PINS, digitized signatures should not be sent over
open networks unless encrypted.
Biometrics. Individuals have unique physical characteristics
that can be converted into digital format to be recorded in
a file and interpreted by a computer. Among these are
voice patterns, fingerprints, and patterns present on the
retina of one or both eyes. In this technology, the physical
characteristic is measured by a microphone, optical reader,
or some other device, converted into digital code, and
then compared with an authenticated copy of that charac-
teristic stored in the computer. No matter the type of bio-
metric measure, the resulting code is stored in a file. If the
security file is compromised, impersonation becomes a
serious risk. Thus, again, such information should be sent
over open networks only when it is encrypted.
Cryptographic controls
Symmetric encryption. In symmetric encryption, both the
sender and receiver have access to the same key, which is
not known publicly. If Paul wants to send Sally an en-
crypted message, he uses a key to encode the message and
Forging a digitized signature can
be more difficult than on paper
because digital comparisons with
a computer program are more
discriminatory than those done
with the human eye.
transmits the message to Sally. Sally uses the same key-
and only that key-to decrypt the message. Because the
same key performs these two functions, and only Paul
and Sally know it, Sally knows the message must have
come from Paul. This form of encryption provides assur-
ance about authentication as well as privacy and nonrepu-
diation. Keeping the key secret, however, is paramount
and difficult to manage with multiple users.
The most popular and widely used private-key cipher is
the Data Encryption Standard (DES), the federal standard
enunciated in 1977. Today, a more secure variant of DES,
called Triple DES (because it applies the encryption algo-
rithm three times using different keys) is now widely used
in the private sector. Other alternatives to DES have been
developed by RSA Data Security, including RC2, RC4, and
RC5. DES, however, is soon to be replaced by a new feder-
al standard.
In October 2000, after a three-year global competition,
the US Department of Commerce announced that an
encryption algorithm named Rijndael is the proposed
new Advanced Encryption Standard (AES). Reavis (2001)
reports that security products should be available by early
2002, based on AES. Rijndael will be unclassified, free of
any royalties, and publicly available for use and export
anywhere in the world.
Asymmetric encryption. Two researchers at Stanford Univer-
sity developed public key cryptography because of the dif-
ficulties involved in exchanging and managing private
keys. Unlike symmetric key cryptography, this asymmetric
encryption uses an algorithm with a public key and a pri-
vate key that are mathematically linked. The private key is
kept secret by the owner while the public key is freely
available. One key can only decrypt a message encrypted
with the other key. Given this unique characteristic, the
two-key set can be used in creating electronic signatures.
The first one can be a signing key that is kept private,
while the second one can be used as a public validation
key that is available to all other parties. Thus, if Paul
encrypts a message with his private key that can be
decrypted by Sally with Paul’s public key, Paul must have
sent it because he is the only one with a key who can
encrypt a message that can be decrypted by the public key.
As long as the private signing key is kept privy only to
Paul, the integrity of the process can be virtually assured.
And as long as the receiving party can gain access to the
public key, the authenticity objective can be met. As with
symmetric key encryption, the length of the key dictates
the strength of the protection offered by symmetric en-
cryption. Thus, given a key of sufficient length, public key
cryptography can provide protection similar to that of
private key techniques.
Although the public key method is highly effective, several
operational shortcomings must be overcome. The first
entails recognizing that just because a public key decrypts
a message does not ensure that it is the key of the person
it is intended to represent. Anyone could make a key pub-
lic and claim it to be that of another party Current prac-
tice makes the public key part of a “digital certificate” (or
digital signature), a specialized electronic document pro-
vided by a trusted party called a Certificate Authority. The
CA investigates the identity of the party and maintains a
protected record of his public key. A receiving party who
receives a signed message from a purported person obtains
the public key from the CA as part of the digital certifi-
cate. Again, if the message can be decrypted using the cer-
tified public key, then the receiver can be confident that it
is from the assumed party.
The second shortcoming of public key encryption is its
inefficiency. Whereas symmetric keys are typically short-
perhaps 40 or 128 bits-asymmetric key technology
To agree or not to agree: Legal issues in online contracting 49
requires the keys to be long, typically 1,024 bits. This cre-
ates considerable overhead in encryption and decryption
that makes sending and receiving long messages impracti-
cal. One method used to mitigate this problem is to create
a “hash” from the original message and then just encrypt
the hash as a signature.
Hashing refers to the process of creating a short string of
characters, also called a “digest,” from the original plain-
text message. After creating a message digest, the sender’s
private key encrypts it and it becomes a digital signature.
The recipient uses the sender’s public key to decrypt the
message digest and confirm the identity of the sender.
Digital signatures ensure not only the authenticity of the
sender but also provide for nonrepudiation by binding the
sender of a message to its contents. However, it should be
noted that because the public key is available to anyone,
the message, though encrypted by the sender’s private key,
is not secure. It could be intercepted and read by anyone
having the sender’s public key prior to receipt by the
intended recipient.
The third shortcoming relates to extending the use of this
technology to meet security risk. The most popular tech-
nology now in use to secure retail e-business is Secure
Sockets Layer (SSL). For example, someone logging on
to a Web site can order flowers or books by clicking an
appropriate selection and entering a credit card number.
SSL is the security protocol that encrypts the order and
credit card information to provide secure e-commerce,
using a combination of private and public key encryption.
In lay terms, the computers of the two parties use public
key encryption techniques for authentication purposes and
generate, encode, and send a secret private (symmetric) key
to be used in sending the actual mes-
sages. This is the “best of all possible
worlds”; authentication can take place,
the message can be communicated
securely and efficiently, and nonrepu-
diation risks can be mitigated.
Legal status of
e-signatures
E-SIGN, the Electronic Signatures in
Global and National Commerce Act,
took effect on October 1, 2000, allow-
ing electronic signatures or documents
to satisfy most existing legal require-
ments for written signatures, disclo-
sures, or records. Its implementation,
however, does not mean that all e-sig-
natures and records are now automati-
cally legally binding. It does mean
that for any transactions involving
interstate or global commerce, any
laws or regulations that require the use
of signatures or written documents cannot be used to
deny the validity or legality of the transaction merely
because electronic records and signatures were used. The
most important exception for e-business is that E-SIGN
does not affect the laws governing contracts or business
transactions but is an overlay on those laws. If a signature
must be notarized or made under oath, then a certifying
official using an e-signature can satisfy the requirement.
The new law makes several notable exceptions for certain
contracts and other records that must still be completed
in writing and accompanied by a standard manual signa-
ture. This list includes wills, codicils, testamentary trusts,
cancellation notices involving health and life insurance
(other than annuities), legal documents related to family
law (such as divorce decrees), court orders and notices,
and default notices and foreclosure documents related to
a person’s primary residence. E-SIGN also does not affect
the writing requirement attached to records and docu-
ments governed by the Uniform Commercial Code, such
as checks, drafts, certificates of deposit, notes, letters of
credit, bulk transfers, warehouse receipts, and security
interests in personal property. The new law also does not
affect the rights of holders of most securities against secu-
rities issuers. In general, it allows e-signatures or docu-
ments to satisfy most existing legal requirements for writ-
ten signatures. On the other hand, it neither entirely elim-
inates risks related to e-signatures and documents nor
ensures their enforceability. Nor does it require any per-
son to agree to use electronic signatures.
E-SIGN sets forth certain conditions for the enforcement
of electronic transactions. Where an existing law mandates
that a contract be in writing such as the Statute of Frauds,
3 in business-to-business (B23) e-comtsxrce, where both parties have agreed to
conduct business by e!ectrunic means, electronic a$ents may form contracts
because those who placed them in operation had the intent to contract.
4 Confirmation screens should be used to give consumers an opportunity to
prevent the transmission of erroneous orders and correct an error once sent.
5 Security procedures should be used so e-consumers and merchants can be
matched with legally responsible parties.
50 Business Horizons I January-February 2002
the enforceability of the electronic record of the contract
requires that record to be capable of being retained and
“accurately reproduced” for later reference. Another condi-
tion of enforcement is that any action taken electronically
must be attributable to the person to be bound.
E-SIGN is “technology-neutral,” anticipating the use of
electrical, digital, magnetic, wireless, optical, and electro-
magnetic means for e-signatures. It also contains various
consumer protection provisions. First, a consumer must
have “afftrmatively consented” to the use of electronic
communication, and must not have withdrawn such con-
sent. Before consenting, the consumer must receive certain
disclosures. In a “clear and conspicuous” statement, the
consumer must be informed of
l the right to have a record of the transaction provided on
paper;
l the right to withdraw the consent to have the record
provided in electronic form;
l the fact that any consent provided applies only to a
specific transaction;
l how to obtain a copy of any electronic message sent
and whether any fee will be charged for a copy;
l the procedures required to withdraw any consent pro-
vided; and
l the type of hardware and software needed to access and
retain any electronic record created by the transaction
involved.
The law is written in such a fashion as to not restrict or
impinge on preceded consumer protection laws.
A s e-commerce grows, Web site owners remain
concerned about the outcome of potential dis-
putes or lawsuits over many aspects of online
contracting. E-businesses can increase the likelihood of
avoiding a costly dispute by gaining a basic familiarity
with the legal issues involved (see Figure 2).
To establish jurisdiction, business Web sites should be
constructed to include both a forum selection clause and
a choice of law provision, both of which should be part of
the contract terms. E-commerce participants should con-
sider what actions by buyers and sellers lead to forming a
contract, and the prudent Web site owner should set forth
an explicit means of contract formation (offer and accept-
ance). Because the use of electronic agents creates uncer-
tainty in contract formation-May one make an offer or
acceptance by machine?-a Web site should enable e-
commerce participants to prevent the transmission of an
erroneous record or to correct one after transmission.
When it comes to electronic messages, e-consumers and e-
merchants alike must be matched up with legally respon-
sible parties in the real world. Both must know that they
can rely on a message as having actually been sent by the
purported sender, and avoid liability in the event a mes-
sage was sent or altered by an interloper or hacker. Finally,
e-commerce participants must know the laws regarding e-
signatures, PINS, smart cards, digitized signatures, biomet-
rics, and various forms of encryption. Because E-SIGN
now allows electronic signatures to satisfy most existing
legal requirements for written signatures, documents, or
records, laws or regulations that require the use of signa-
tures or written documents cannot be used to deny the
validity of the transaction merely because electronic signa-
tures and records were used. This is true for any transac-
tions involving interstate or global commerce. 0
References and selected bibliography
American Law Institute. 1987. Restatement (Third) of the Foreign
Relations Law of the United States $421. New York: American
Law Institute.
Beattie, C.R. 2000. Facilitating electronic commerce--The Uni-
form Electronic Transactions Act. Un~orm Commercial Code
Law Journal 32 (Winter): 243-269.
Bensusan Restaurant Corp. v. Richard King. 1997. 126 E3d 25 (2d
Cir.)
Bernstein, L., and G. Kaplan. 2000. The Electronic Signatures
Act: Giving a boost to e-commerce. ABA Bank Compliance
(September): 21-26.
Bickmore II. Bickmore. 1996. 7 CRC. (4th) 294 (Ont. Ct.(Gen.
Div.)).
Boss, Amelia, and J.K. Winn. 1997. The emerging law of electron-
ic commerce. The Business Lawyer 52 (August): 1,469-1,502.
7’he Bremen v. Zapata Off-Shore Co. 1972. 407 U.S. 1.
Brinkibon v. Stahag Stahl and Stahlwarenhandelsgesellschaft m.b.H.
1983. 2 A.C. 34 (H.L.).
Burger King v. Rmizewicz. 1985. 471 U.S. 462.
Caspi v. Microsoft Network, LLC. 1999. 732 A.2d 528 (N.J. Super.
Ct. App. Div.).
Cody v. Ward. 1997. 954 ESupp. 43 (D. Conn.).
CompuSetve Incorporated v. Patterson. 1996. 89 E3d 1257 (6th Cir.).
Enrores v. Miles Far East Corporation. 1955. 2 Q.B. 327 (C.A.).
Ferrera, G., S. Lichtenstein, M. Reder, R. August, and W. Scbiano.
2001. CyberLaw. Cincinnati: Thomson Learning.
Georgia Dept. of ‘Bansportation v. Norris. 1997. 474 S.E.2d 216
(Ga. App. 199G), rew’d on other grounds, 486 S.E.Zd 826 (Ga.).
Gregory, J. 1999. Solving legal issues in electronic commerce.
Canadian Business Law Journal 32 (July): 84-131.
Harrison, A. 2000. Feds propose new encryption standard. Com-
puterworLd (9 October): 14.
IDS Life insurance Co. v. SunAmerica Inc. 1998. 958 ESupp. 1268
(N.D. Ill. 1997), affd in part, vat. in part, 136 E3d 537 (7th Cir.).
Kerr, I. 1999. Spirits in the material world: Intelligent agents as
intermediaries in electronic commerce. The Dalhousie Law JOUT-
nal 22 (Fall): 190-249.
Lui-Kwan, K.M. 1999. Recent developments in digital signature
legislation and electronic commerce. Berkeley Technology Law
journal 14 (Fall): 463-481.
To agree or not to agree: Legal issues in online contracting 51
McIntyre, J.T. 2000. The electronic signature law and its impact
on financial planners. Journal of Financial Planning (Septem-
ber): 36-38.
Miller, Roger, and E Cross. 2002. The legal and e-commerce envi-
ronment today 3rd ed. Cincinnati: Thomson Learning.
Moss, V. 2000. Congress enacts new e-signature law. Credit Union
Magazine (September): 87-89.
Oliveira, L., I? Amorim, and C. Vilao. 1999. Electronic com-
merce. International Financial Law Review (January): 39-43.
Pinsky, L. 2000. Digital signatures: A sign of the times. @
www.lsus.edu/classes/cscl0l/spring98/mar24/gorydetl.htm
(October).
Reavis, J. 2001. Goodbye DES, hello AES. Network World (July):
l-3.
Takach, G. 1999. Internet law: Dynamics, themes and skill sets.
Canadian Business Law Journal 32 (July): 1-83.
Winn, J.K., and M.R. Puller-r. 1999. Despatches from the front:
Recent skirmishes along the frontiers of electronic commerce.
The Business Lawyer 55 (November): 455-496.
Zippo Mfg. Co. v. Zippo Dot Corn, Inc. 1997. 952 ESupp. 1119
(W.D. Pa.).
52 Business Horizons I January-February 2002
... Al respecto, el AED ha resultado viable para analizar el tema de las contrataciones, sobre todo si se considera que de ese sinalagma o negocio jurídico se desprende un beneficio de tipo económico para las partes y en el cual dichos sujetos contratantes buscan un ganar-ganar; por otro lado, gracias a las tecnologías de información y comunicación (TIC) han proliferado los contratos que utilizan el ciberespacio como entorno para el perfeccionamiento de los mismos. Tal es el caso de los llamados clickwraps que ha puesto a tambalear los esquemas tradicionales de validez contractual, principalmente si se atiende a que el consentimiento se manifiesta a través de un clic en un icono que contiene la leyenda Ok, I agree, Estoy de acuerdo (clickwraps) (Pacini et al., 2002). Resulta evidente, entonces, que este tipo de contratación es mucho más riesgosa que aquella tradicional, elevando los costos de transacción y generando importantes externalidades a partir de fallas que el mercado no es capaz de corregir. ...
... Así, los contratos clickwraps son aquellos celebrados por medios electrónicos, en los cuales el sujeto o usuario se obliga por la acción de cliquear en un icono que contiene la leyenda OK, I agree, acepto, estoy de acuerdo o alguna similar disponible en el portal web y que conlleva la manifestación de su consentimiento al entenderse que ha aceptado la policitación; en caso de no hacer clic se niega el acceso al usuario, pues se entenderá que no consiente en obligarse (Benavides Quintan et al., 2022;Han, 2010;Kim, 2013;Tay, 1998;Pacini et al., 2002). ...
Article
Full-text available
The methods for getting into the knowledge and analysis of the Legal System have diversified and the Anglo-Saxon tradition is committed to applying concepts and tools traditionally used in Economic Science, which gave rise to the so-called Economic Analysis of Law (EAL) that has been gradually adopted in the Roman-Germanic legal systems. In this sense, this work consists of an intellectual effort that involved, firstly, the shaping of the theoretical framework of EAL as an emerging discipline in the contemporary legal context of the Bonapartist systems, and secondly, the theory of transaction costs applied to the field of electronic contracting, specifically the so-called clickwraps, that is taken again as a legal-economic tool through qualitative research using the exegetic method and the documentary technique, all of the above under the of applied analysis approach. As a result, the need to regulate this type of contracts following the tradition of the International Commercial Law oriented to a uniformity of the domestic systems and attending to identified minimum standards of regulation was confirmed which contributes to the Civil Law regulations with limited regulation and few judicial pronouncements in this line
... The experts studied the doctrine and the problem of determining the legal status of smart contracts. Giancaspro (2017) investigated smart contracts from a legal point of view; Pacini, Andrews and Hillison (2002) dealt with legal issues that could arise when signing smart contracts; the difficult problem of preserving the privacy of smart contracts was studied by Barinova and Zapechnikov (2017); Blackwax (2017) considered smart contracts and made the assumption that they would eventually replace lawyers; Iserlis (2017) made a reasonable conclusion in his work that smart contracts changed the way of doing business; Hazard and Hardjono (2016) considered the creation of a basis for smart contracts in future blockchains. Many other experts were also engaged in determining the legal nature and use of smart contracts; however, in these studies, the possibilities and status of smart contracts were not sufficiently investigated. ...
... The idea of a smart contract has been preceded by the creation of a vending coffee machine -the process of purchasing goods in it embodies an agreement, according to which anyone can buy a product at a predetermined price, while the security mechanisms of the machine are designed so that the cost of hacking is higher than the cost of products and automatic cash accumulations (Pacini, Andrews and Hillison, 2002). ...
Article
Full-text available
This article using critical analysis discusses the legal status of smart contracts, their features and characteristics, and the possibility of introducing this category into the legal field. The main goal of the study is to determine the legal status of smart contracts. The study concludes that a smart contract is a program code based on blockchain technology, which, by legal characteristics, is a legally significant message recorded in a language (artificial language) and sealed with an electronic digital signature of each of the parties (or certified with a special key). It is proved that the multilateral interactions implemented through smart contracts can reduce the costs of operations and control them, increase the speed of operations and reduce the risks associated with dishonest actions of the parties, minimize or completely exclude intermediaries from the transaction; therefore, legislation should provide for the possibility of using smart contracts along with existing contracts.
... Konsumen mungkin menghadapi masalah dengan ketersediaan produk, keterlambatan pengiriman, atau layanan pelanggan yang buruk, yang dapat menyebabkan persepsi negatif terhadap dunia e-commerce dan keengganan untuk terlibat dalam transaksi online di masa depan. (Bharadwaj & Soni, 2023;Schultz & Block, 2023;Deng et al., 2023;Ayob, 2021;Abdalla et al., 2021;Ishak & Wanli, 2020;El-Ebiary et al., 2020;Falahat et al., 2019;Goyal et al., 2019;Fan et al., 2013;Alqahtani et al., 2012;Rao et al., 2011;Rahman et al., 2009;Smith, 2008;Chatterjee & Datta, 2008;Karakaya & Shea, 2008;Pacini et al., 2002;Inks & Mayo, 2002;Schimmel & Nicholls, 2002). ...
Chapter
Full-text available
Salah satu kekhawatiran utama bagi konsumen e-commerce adalah masalah kepercayaan. Anonimitas dan jarak fisik yang melekat dalam transaksi online dapat membuat konsumen ragu untuk berbagi informasi sensitif, seperti detail pembayaran, dengan vendor e-commerce. Kurangnya kepercayaan ini dapat diperburuk oleh kekhawatiran tentang keandalan dan keamanan platform E-commerce, serta potensi pelanggaran privasi dan penyalahgunaan data. (Metzger & Pure, 2023; Ahmed et al., 2023; Wardhana, et al., 2022; Wang, 2022; Sim et al., 2021; Soleimani, 2021; El-Ebiary et al., 2020; Falahat et al., 2019; Matbouli & Gao, 2012; Rahman et al., 2009; Forman, 2008; Chatterjee & Datta, 2008; Kossecki & Kaczor, 2006; Sinclaire et al., 2006; Liu et al., 2004; Kossecki, 2004; Ruppel et al., 2003; Gold et al., 2003; Guerra et al., 2003; Luo, 2002; Hanumesh & Sunder, 2000; Hanumesh & Sunder, 2000). Tantangan umum lainnya bagi konsumen e-commerce adalah kurangnya kesiapan dan kesiagaan beberapa bisnis e-commerce. Konsumen mungkin menghadapi masalah dengan ketersediaan produk, keterlambatan pengiriman, atau layanan pelanggan yang buruk, yang dapat menyebabkan persepsi negatif terhadap dunia e-commerce dan keengganan untuk terlibat dalam transaksi online di masa depan.(Bharadwaj & Soni, 2023; Schultz & Block, 2023; Deng et al., 2023; Ayob, 2021; Abdalla et al., 2021; Ishak & Wanli, 2020; El-Ebiary et al., 2020; Falahat et al., 2019; Goyal et al., 2019; Fan et al., 2013; Alqahtani et al., 2012; Rao et al., 2011; Rahman et al., 2009; Smith, 2008; Chatterjee & Datta, 2008; Karakaya & Shea, 2008; Pacini et al., 2002; Inks & Mayo, 2002; Schimmel & Nicholls, 2002).
... Still, the major difference between them is that depending on the different needs and uses of the parties, ready-made templates of the various kinds of contracts are already available on the internet. The parties getting into an agreement just need to choose a template from the available templates, fill in their details, and attach their digital signatures [7], [8], [9], [10]. Although the parties just have to download or buy the existing templates, which saves a lot of time compared to traditional paper contracts, the parties can also modify the template according to their needs if they have to. ...
Conference Paper
Full-text available
The ambiguity and complexity of the traditional legal contracts have motivated the study and exploration of a better and advanced contract known as blockchain-based smart contracts. A smart contract is a self-executable contract where the terms of the agreement between the involved parties are directly written into the lines of code that resides in the distributed ledger technology known as the blockchain. Obtaining a better understanding of smart contracts to overcome the fundamental issues of traditional legal contracts is vital for the successful and faster dispute settlement process without the intervention of any third-party mediators like courts, banks, lawyers, etc. In this paper, we present a comprehensive overview of the key features of the paradigm shift from traditional paper contracts to smart contracts. In addition, we also discuss why smart contracts are necessary to be legally enforced and the crucial conditions that are required for them to be legally enforceable. Furthermore, we outline recent trends and emerging technologies such as Natural Language Processing, Machine Learning, and the Internet of Things that have been combined together with smart contracts.
Article
This paper discusses e-construction infrastructure, its definition, importance and status, and recommendations for its improvement. This paper builds on the current existing research in e-construction and offers recommendations for restructuring e-construction by focusing first on the infrastructure as the first building block. The paper will summarize the challenges in e-construction while focusing on providing a framework to overcome those challenges. The paper starts by defining the e-construction infrastructure, then presents an argument for why we should investigate e-construction infrastructure. It then proceeds to summarizing the status of e-construction infrastructure, and provides a framework for improvement. The e-construction infrastructure is interdisciplinary in nature; it involves business process, trading models, network hardware and software infrastructure, software interoperability standards, legal standards, and more. Therefore, an interdisciplinary approach is used in building or improving this infrastructure. The thesis of this paper is that the ultimate value that the industry can derive from e-construction will be reached when those disciplines and standards are aligned in an integrated e-construction infrastructure.
Article
Full-text available
The birth of the internet and the subsequent adoption of information and communication technologies (ITCs) has revolutionized global business opportunities. Businesses worldwide now use ICTs to manage their day to day organisational processes and the Internet is an integral part of their marketing, communication and trading strategies. For many though, the process of globalization is just beginning and each year a growing number of eCommerce sites are trading globally and shipping internationally. The globalization of trade presents a number of risks and problems ranging over a variety of areas from political, economic, social and cultural perspectives. These issues include; Disparate laws and regulations, loss of tax revenue, issues of currency exchange, security of data and personal information, company validity, integrity and reputation, and differences in social and cultural communication approaches and transactional expectations.
Article
The recent proliferation of online-based trade makes negotiations with service providers for global supply networks evermore challenging. The Internet is believed to be a viable means for enabling and facilitating these supply chain interactions. As such, commercial web-based services that support negotiation processes have emerged (i.e., e-negotiation services). Even though these services have promising benefits for supply chain participants, they have not been accepted by most business users. Current e-negotiation studies fail to capture the substantive reasons of this low acceptance as they typically ignore real-world aspects of commercial negotiations. As such, this study argues that an action research approach is a plausible means to study this issue, and to drive changes in the e-negotiations services market. Accordingly, a research plan is outlined with guidelines and recommendations for future action research projects.
Article
In this chapter, I define the scope of electronic commerce law and discuss how law can evolve in response to rapid change in social and business practices. I summarize how commercial law has adapted to electronic sales of goods using EDI and Internet distribution systems, discuss the strengths and weaknesses from a legal perspective of a new technology-based model for electronic commerce - digital signatures and public key infrastructure - and compare that model with others for managing the legal risks of electronic sales of goods. I also summarize how changes in payment system technologies and bank practices have produced new laws governing electronic payment systems; and how financial markets have moved to electronic systems for transferring investment securities.
Article
The article provides an in-depth analysis of the contract issues peculiar to automated electronic commerce. The aim of the study is to provide a critical evaluation of the various solutions that might be adopted by a legislature seeking to cure formal defects in agreements that are negotiated and entered into by software programs, independent of human review. The author begins with an examination of the current state of the technology that automates electronic commerce, offering some speculation as to its future development. He then outlines the barriers to automated electronic commerce inherent in traditional contract doctrine. He argues against the proposal to cure doctrinal difficulties by deeming electronic devices to be legal persons and investigates the merit of the legislative approaches adopted by UNCITRAL, the National Conference of Commissioners of Uniform State Laws (U.S.), and the Uniform Law Conference of Canada. He ends by advocating an alternative approach, based on the law of agency.
Article
Recent progress on the understanding of the mechanical anisotropy of orientedpolymers is reviewed. The key issues that are discussed include theexperimental validation of theoretical predictions for the elastic constantsof fibres, quantitative interpretations of the mechanical anisotropy of chain-extended polyethylenes and liquid crystalline polymers using aggregate models,the analysis of anisotropic polymers and fibre/resin composites and compositemodels for specially oriented polyethylene sheets and high moduluspolyethylene fibres.
CyberLaw. Cincinnati: Thomson Learning. Georgia Dept. of 'Bansportation v
  • G Ferrera
  • S Lichtenstein
  • M Reder
  • R August
  • W Scbiano
Ferrera, G., S. Lichtenstein, M. Reder, R. August, and W. Scbiano. 2001. CyberLaw. Cincinnati: Thomson Learning. Georgia Dept. of 'Bansportation v. Norris. 1997. 474 S.E.2d 216 (Ga. App. 199G), rew'd on other grounds, 486 S.E.Zd 826 (Ga.).
The legal and e-commerce envi-ronment today
  • Miller
  • Roger
Miller, Roger, and E Cross. 2002. The legal and e-commerce envi-ronment today 3rd ed. Cincinnati: Thomson Learning.
Goodbye DES, hello AES
  • Reavis
Reavis, J. 2001. Goodbye DES, hello AES. Network World (July): l-3.