√лавна€    Ex Libris     ниги    ∆урналы    —татьи    —ерии     аталог    Wanted    «агрузка    ’удЋит    —правка    ѕоиск по индексам    ѕоиск    ‘орум   
blank
јвторизаци€

       
blank
ѕоиск по указател€м

blank
blank
blank
 расота
blank
Lessig L. Ч Code: Version 2.0
Lessig L. Ч Code: Version 2.0

„итать книгу
бесплатно

—качать книгу с нашего сайта нельз€

ќбсудите книгу на научном форуме



Ќашли опечатку?
¬ыделите ее мышкой и нажмите Ctrl+Enter


Ќазвание: Code: Version 2.0

јвтор: Lessig L.

јннотаци€:

Countering the common belief that cyberspace cannot be regulated, Lessig (Harvard Law School) argues that if anything, commerce is forging the Internet into a highly regulated domain. But neither direction is inevitable; it is up to citizens to decide what values and trade-offs of control hardware and software code is to embody.


язык: en

–убрика: “ехнологи€/

—татус предметного указател€: √отов указатель с номерами страниц

ed2k: ed2k stats

»здание: 2nd edition

√од издани€: 2006

 оличество страниц: 352

ƒобавлена в каталог: 11.12.2007

ќперации: ѕоложить на полку | —копировать ссылку дл€ форума | —копировать ID
blank
ѕредметный указатель
1984 (Orwell)      xiv 204 208
60 Minutes      243
911 call location information      65
Abortion regulation      131Ч132 133Ч134
Abrams, Floyd      237Ч238 239 240 241 242
Ackerman, Bruce      78
ACLU      255
Active Server Pages (ASP)      148
Adobe's eBook system      117
Airline baggage handling example      128
Alien and Sedition Acts (1798)      213
Alt.sex.stories      17 18 19
Ambiguities (latent)      See also Free speech; Intellectual property; rights / protection; Privacy; specific technologies
Ambiguities (latent): choices and      25Ч26 27 155 165 166Ч167 188Ч190 195Ч196 214 269Ч270
Ambiguities (latent): codifying constitution and      315Ч317
Ambiguities (latent): copyright      195Ч196 269Ч270
Ambiguities (latent): description / overview      25Ч26 155Ч156 166 371n28
Ambiguities (latent): filtering / free speech      259 260
Ambiguities (latent): interstate commerce authority      189 376n49
Ambiguities (latent): possible solution / response to      326Ч327
Ambiguities (latent): privacy      25Ч26 157Ч158 160Ч165 214
Ambiguities (latent): translation of Constitution      160 161Ч168 371n15 18 22
America Online      See AOL
AmericaBlog      215
American Lawyer Media, L.P.      94
Americans with Disabilities Act (ADA)      127
Anime Music Videos (AMVs)      195
Anonymity      See also Identity; Privacy
Anonymity: choice on      197Ч198
Anonymity: code and      33Ч34
Anonymity: effects on community / class at Yale      102Ч106
Anonymity: escaping constraints and      18 19
Anonymity: imperfection effects on      190Ч192 196
Anonymity: in reading      191Ч192
Anonymity: in real space vs. cyberspace (summary)      45
Anonymity: post office use and      37 44
Anonymity: technologies to УanonymizeФ      46 56Ч57
AOL: charges and      360n19
AOL: community and      88
AOL: comparison with other cyberplaces      96Ч97 102 113
AOL: non-code modalities for controlling behavior      93 94
AOL: rules / code effects      88Ч92 93Ч94 359n17
AOL: statistics on      88
Apple's iTunes      116
Application layer (Internet)      144Ч145
Architecture      See also Code; Modalities of regulation; Regulation by code
Architecture: as regulator      122 123 124Ч125 127Ч129 341Ч342 344Ч345
Architecture: definition / description      341Ч343 344Ч345
Architecture: generations of (cyberspace / Internet)      7
Architecture: regulation examples using      127Ч129
Articles of Confederation      4
ATM cards and identity      35 41Ч42
Audio Home Recording Act (1992)      115 177
Authentication      40 41 42Ч46 43
Baker, Jake      16Ч19 20 26 236 299 349n10
Baker, Stewart      53
Barlow, John Perry      xivЧxv 3 152 302Ч304 305 373n11
Bendor, Jonathan      245
Benkler, Yochai      275
Benloliel, Daniel      186
Berman, Paul      319
Berners-Lee, Tim      146
Bill of Rights      7 314
Biometric technology      42 73Ч74 207Ч208
Blackburn, David      337
Blogs / bloggers      85 242Ч243 244
Board of Education, Brown v.      314
Boyle, James      3 22 181 198
Brandeis, Louis      157 161Ч162 163 201 214
Breyer, Stephen      171
Brin, David      79 218 219
Broadcasting spectrum regulation      270Ч275
Brown v. Board of Education      314
Bush v. Gore      141
Cailliau, Robert      146
Calabresi, Guido      326
CALEA (Communications Assistance for Law Enforcement Act/1994)      63Ч64 354n6 355n7
Cameron, Kim      51 52
Camp, Jean      323Ч324
CAN SPAMAct      264 266 337
Carnivore project      140Ч141
Cars: congestion control in London      62 207
Cars: license plates' importance      42Ч43
Cars: radio theft example      125Ч126
Cars: safety and architecture      128
Case, Steve      90
Castronova, Edward      12 108 139 285 300
Catalfo, Phil      84
Cates, Richard      333
CC      See Counsel Connect
CDA (Communications Decency Act/1996)      249Ч250 252 253 255 304 316
Cellular phone calls data      64Ч65 215Ч216 355n12
CERT's (Computer Emergency Readiness Team) malware incidents graph      75 76
Chicago Sun-Times      215
Chicago Tribune      239
ChicagoWorld's Fair (1933)      129
Child Online Protection Act (COPA/1998)      250 252 253
Child pornography: online      19 20 26Ч27
Child pornography: prohibition of      245 385n32
Children's Internet Protection Act (CIPA/2000)      387n57
China's regulation of Internet      79Ч80 309
Choices and regulation (cyberspace / Internet), as unprepared to make      8 277 311Ч312 313
Choices and regulation (cyberspace / Internet), problems with code      313 323Ч324
Choices and regulation (cyberspace / Internet), problems with courts      8 313Ч319
Choices and regulation (cyberspace / Internet), problems with legislators      8 311Ч312 313 319Ч323
CIPA (Children's Internet Protection Act/2000)      387n57
Cisco and cryptography      71Ч72
Citizen-sovereign model      287Ч290 289
Citizenship: in U.S.      285Ч286 291Ч292 329Ч330
Citizenship: of the world      292 330
Civil rights in American South      365n37
Clark, David      44 111
Clark, Wesley      215Ч216
Clinton administration and cryptology regulation      66
Clipper Chip      66 367n63
Cloning fraud      244
Closed code      See also specific projects
Closed code: Carnivore project and      140Ч141
Closed code: commercial software / history and      146 369n19
Closed code: description      139 140Ч141
Closed code: regulability of      149Ч150 151 327 328
Closed code: voting machines example      141Ч143
closed networks      35
Coase, Ronald      271 336
Code      See also Closed code; Open code; Regulation by code
Code of Fair Information Practices      227Ч228
Code: as law      5 77Ч79 113
Code: definition / description      6 88 121 145
Code: history of      145Ч149
Code: modular code      328Ч329
Code: resistance to      118Ч119
Code: types of      139 145Ч149
Code: values and      5 6 7 77Ч78 114 277 292Ч293
Codifying constitution      313Ч314 315
Cohen Theorem      191Ч192 197
Cohen, Julie      191Ч192 197
Commerce      See also Modalities of regulation
Commerce: as regulator      xiii xiv 61 79Ч80 122 123 124 138 341 342
Commerce: data gathering by      48 52
Commerce: France / Nazi paraphernalia      57 294Ч295 297
Commerce: fraud as cost      42 52
Commerce: geographic identity and      57Ч59
Commerce: identity / authentication and      42 48 52 57Ч59 71Ч72 77
Commerce: in Tom Maddox story      xii
Commerce: labor movement / liberty and      121
Commerce: legal effects on      127
Communications Assistance for Law Enforcement Act (CALEA/1994)      63Ч64 355n6 7
Communications Decency Act (CDA/1996)      249Ч250 252 253 255 304 316
Communism: transition to democracy      1Ч2
Communism: Vietnam and      281Ч282
Communities      See also Norms; specific cyberspace places
Communities: changing in cyberspace / real space      290
Communities: cyberspace (overview)      84Ч85
Communities: maturing of (cyberspace)      290Ч291 292Ч293
Communities: Уdialogic communitiesФ      103
Communities: УLaw of Cyberspace, TheФ class at Yale      102Ч106
CompuServe      39
Computer Emergency Readiness Team (CERT) malware incidents graph      75 76
Constitution (U.S.)      See also Ambiguities (latent); Bill of Rights; specific amendments
Constitution (U.S.), as transformative / codifying      314
Constitution (U.S.), cyberspace constitution / values and      275 277
Constitution (U.S.), description      6Ч7 314
Constitution (U.S.), intellectual property      183Ч184 186Ч187
Constitutional interpretation      See also Ambiguities (latent)
Constitutional interpretation: one-step originalism / fidelity      160 161 162
Constitutional interpretation: translation and      156 160 161Ч168 371n15 18 22
Constitutional interpretation: values and      163 165 167Ч168
Constitutional interpretation: Уas completeФ view      166 167 214
Constitutions: as architecture      4
Constitutions: types of      313Ч314 315
Content monitoring      54Ч57
Contract and property      180 383n50
COPA (Child Online Protection Act/1998)      250 252 253
Copyright      See also Digital technologies; Intellectual property
Copyright: amateur culture and      193 195Ч196 268Ч270
Copyright: as Уmore protectedФ in cyberspace      175Ч176 185Ч186 200
Copyright: choices on      188Ч190 198Ч199
Copyright: contracts and      187Ч188
Copyright: description (overview)      171Ч173 185Ч186 187 188Ч190 192
Copyright: fair use and      184Ч185 186 187 188Ч190 196 376n52
Copyright: government's focus on      337 395n8
Copyright: iCraveTV example      295Ч296 297
Copyright: individuals vs. authors collectively      185 301
Copyright: limits with      183Ч184 186Ч187
Copyright: piracy, economic costs of      337
Copyright: trusted systems and      177Ч180 186 188 190
Copyright: УcommonsФ and      198Ч199
Copyright: Уfirst saleФ doctrine      177 179 185 187 375n35
Counsel Connect: comparison with other cyber-places      96Ч97 102 113
Counsel Connect: control by non-code modalities      96Ч97
Counsel Connect: description      94Ч95 96 97
Counsel Connect: history of      94 360n26
Counsel Connect: use of real name / effects      95 96
Courts      See also specific legal cases
Courts and regulation (cyberspace / Internet): possible solutions      325Ч327
Courts and regulation (cyberspace / Internet): problems with      8 313Ч319
Courts: placement of (Europe)      128
Courts: politics and      313 314 315Ч317
Courts: values and      8 316 326Ч327
Courts: Уstate actionФ, scope of      313 317Ч319
Craig, Bill      295Ч296
Craig, Maryland v.      166
Crawford, Susan      63Ч64 112 118
Creative Commons license      110Ч111
Creative Commons nonprofit, x      110 199
Credit / debit cards: data from use      22
Credit / debit cards: fraud with      58Ч59 69
Credit / debit cards: reduction through architecture      126 128 135
Crime (real space) identity / authentication and      41Ч42 42Ч43
Crump, Catherine      109
Cryptography: businesses and      71Ч72
Cryptography: confidentiality and      53 66
Cryptography: government regulation and      66Ч67 71Ч72 357n30
Cryptography: identification and      53 54 66
Cryptography: key systems of      43 53Ч54 353n15
Cryptography: non-confidentiality features of      353n13
Cryptography: opposing features of      53 54
Cryptography: TCP/IP and      368n13
Cultural imperialism      300
Culture (amateur), copyright law and      193 195Ч196 268Ч270
Culture (amateur), description / increase in      193Ч196 376n60
Cyberspace      See also Internet; specific places
Cyberspace: citizen-sovereign model in      287 288Ч290
Cyberspace: community and (overview)      84Ч85
Cyberspace: computer speed / bandwidth effects      107
Cyberspace: description      9 20 84Ч86 107
Cyberspace: etymology of      3
Cyberspace: generations of      xivЧxv 7
Cyberspace: Internet vs.      9 83Ч85 283Ч284
Cyberspace: leaving / moving in      113 288Ч290
Cyberspace: merchant-sovereign model in      287 288Ч290
Cyberspace: regulation modalities in      113Ч114 124Ч125
Cyberspace: rule-sets in      288Ч289 290
Cyberspace: science-fiction writers on УfutureФ of      xiiЧxiv
Cyberspace: Уas not regulableФ view      ix xii 3 27 29 31Ч32 73
Cyberspace: УidealФ of      xiv 2Ч3 7 302Ч305
Cypherpunks      383n3
Danger Mouse      194Ч195
DAT (Digital Audio Technology)      115 176Ч177
Data collection, digital      See also Surveillance digital
Data collection, digital: advertising and      216 217 219 223
Data collection, digital: examples of      22 65 215Ч216
Data collection, digital: on computer use / logs      65
Data collection, digital: privacy and      23 218Ч219 223
Data collection, digital: profiling / inequalities with      219 220Ч222
Data collection, digital: pros / cons of      217Ч218
Data collection, digital: solution for      225Ч230
Data link layer (Internet)      144Ч145
Debit cards      See Credit / debit cards
DeCSS      117
Democracy: cyberspace and      139 285
Democracy: in real space vs. cyberspace      139 285
Democracy: polling and      331Ч333
Democracy: possible solutions for      329Ч334
Democracy: postcommunist Europe      1Ч2 3 4 8
Derivative right      229
Dibbell, Julian      98 100 107
Diebold voting machines      142
Diffie Ч Hellman key system      53Ч54
Diffie, Whitfield      53Ч54
Digital Audio Technology (DAT)      115 176Ч177
Digital Millennium Copyright Act (DMCA/1998)      117 174Ч175 186 305 373n10
Digital technologies      See also Copyright; Data collection digital
Digital technologies: amateur culture and      194Ч195
Digital technologies: analog technologies vs.      114 192Ч193 268Ч269
Digital technologies: Internet copy distribution      116 173 176
Digital technologies: perfect copies with      114Ч115 173 176
Digital technologies: piracy risk / Congress response      115 174Ч175
Digital technologies: Уbroadcast flagФ and      117Ч118 362n67
Disabled: anti-discrimination regulations      127 131 233Ч234
Disabled: architecture changes and      127
Disabled: real life vs. Internet      86Ч88 359n8
DMCA (Digital Millennium Copyright Act/1998)      117 174Ч175 186 305 373n10
DNA technology      207Ч208
Doctrine of a second look      326
Doctrines of immunity      290
Domain Name System      306 321
DRM (Уdigital rights managementФ) technology      116 117
Drug use regulation      131Ч132 366n48
DSL (broadband Internet access)      54
Durham, Ivor      101
DuVal, Richard      18
DVD-Copy Control Association      117
Dyson, Esther      xivЧxv
Easterbrook, Frank      187
Education      129
Electronic Frontier Foundation      117 302
Elevator architecture      128
Ellsberg, Daniel      238
Encryption      See Cryptography
Encyclopedia Britannica      243
End-to-end principle      44Ч45 111Ч112
Ethernet      389n80
EverQuest GDP      108
Face recognition technology      207
Fair use and copyright      184Ч185 186 187 188Ч190 196 376n52
FBI      64Ч65
FCC: broadcasting spectrum regulation      270 271
FCC: government / IP designs      63Ч65
FCC: Уbroadcast flagФ and      117Ч118
1 2 3 4
blank
–еклама
blank
blank
HR
@Mail.ru
       © Ёлектронна€ библиотека попечительского совета мехмата ћ√”, 2004-2017
Ёлектронна€ библиотека мехмата ћ√” | Valid HTML 4.01! | Valid CSS! ќ проекте