BlumenthalDavid, EpsteinSherrie, and MaxwellJames. 1986. “Commercializing University Research: Lessons from the Experience of the Wisconsin Alumni Research Foundation.”New England Journal of Medicine314(19 June): 1621–66.
2.
BlumenthalDavid, GluckMichael, LouisKaren Seashore, StotoMichael A., and WiseDavid. 1986. “University Industry Research Relationships in Biotechnology: Implications for the University.”Science232(13 June): 1361–66.
3.
BlumenthalDavid, GluckMichael, LouisKaren Seashore, and WiseDavid. 1986. “Industrial Support of University Research in Biotechnology.”Science231(17 January): 242–46.
4.
BollingerLee. 1985. “First Amendment and National Security.”Michigan Alumnus (Jan./Feb.): 19–21.
5.
BorkRobert. 1971. “Neutral Principles and Some First Amendment Problems.”Indiana Law Journal47: 1.
6.
DuValBenjamin S.Jr.. 1986a. “Enforcing Security at the Source: Secrecy and the Government Employee, Contractee, and Grantee.” Presented at the Symposium “National Security and First Amendment Protection of Scientific and Technical Information,” Annual Meeting of the American Association for the Advancement of Science, Philadelphia, PA, May.
7.
DuVal BenjaminS.Jr.. 1986b. “The Occasions of Secrecy.”University of Pittsburgh Law Review47: 579–674.
8.
EasterbrookFrank H.. 1981. “Insider Trading, Secret Agents, Evidentiary Privileges, and the Production of Information.”Supreme Court Review, pp. 309ff.
9.
EdgarHarold. 1986. Informal comments at the Symposium “Natural Security and First Amendment Protection of Scientific and Technical Information,” Annual Meeting of the American Association for the Advancement of Science, Philadelphia, May.
10.
EtzkowitzHenry. 1983. “Entrepreneurial Scientists and Entrepreneurial Universities in American Academic Science.”Minerva21: 198–233.
11.
EtzkowitzHenry, and PetersLois. 1988. “Organizational Innovation in the University for Knowledge Transfer.” Paper presented at the International Conference on Managing Interdisciplinary Research Groups, University of Manchester Business School, 13–15 July.
12.
FergusonJames R.. 1985. “National Security Controls on Technological Knowledge: A Constitutional Perspective.”Science, Technology, and Human Values10(Spring): 87–98.
13.
GoldmanAlan. 1987. “Ethical Issues in Proprietary Restrictions on Research Results.”Science, Technology, and Human Values12(Winter): 1.
14.
KarpWalter. 1985. “Liberty Under Siege.”Harper's (Nov.): 271.
15.
LeminA. J.. 1985. “Protecting Property Interests in Biotechnology.” Paper presented at the National Science Foundation Conference “Ethical Implications of Trade Secrecy, Patents, and Related Property Controls for Science and Technology,” Chicago, IL, October.
16.
National Science Foundation Conference, “Ethical Implications of Trade Secrecy, Patents, and Related Property Controls for Science and Technology.”1985. Chicago, IL, October. Supported by the NSF Program on Ethics and Values in Science and Technology (EVIST); organized by the Center for the Study of Ethics in the Professions, Illinois Institute of Technology.
17.
New York Times.1986. September 21: Sec. 1, p. 20.
18.
SamuelsonPamela. 1984. “CONTU Revisited: The Case Against Copyright Protection for Computer Programs in Machine-Readable Form.”Duke Law Journal, p. 663.
19.
SamuelsonPamela. 1987. “Innovation and Competition: Conflicts over Intellectual Property Rights in New Technologies.”Science, Technology, and Human Values12(Winter): 1.
20.
Tanzman, Edward, organizer. 1987. “National Security Classification and the Individual Researcher.” Session (43–2) at the Annual Meeting of the American Association for Advancement of Science, Chicago, February.