|
 |
Àâòîðèçàöèÿ |
|
 |
Ïîèñê ïî óêàçàòåëÿì |
|
 |
|
 |
|
 |
 |
|
 |
|
Lessig L. — Code: Version 2.0 |
|
 |
Ïðåäìåòíûé óêàçàòåëü |
1984 (Orwell) xiv 204 208
60 Minutes 243
911 call location information 65
Abortion regulation 131—132 133—134
Abrams, Floyd 237—238 239 240 241 242
Ackerman, Bruce 78
ACLU 255
Active Server Pages (ASP) 148
Adobe's eBook system 117
Airline baggage handling example 128
Alien and Sedition Acts (1798) 213
Alt.sex.stories 17 18 19
Ambiguities (latent) See also Free speech; Intellectual property; rights / protection; Privacy; specific technologies
Ambiguities (latent): choices and 25—26 27 155 165 166—167 188—190 195—196 214 269—270
Ambiguities (latent): codifying constitution and 315—317
Ambiguities (latent): copyright 195—196 269—270
Ambiguities (latent): description / overview 25—26 155—156 166 371n28
Ambiguities (latent): filtering / free speech 259 260
Ambiguities (latent): interstate commerce authority 189 376n49
Ambiguities (latent): possible solution / response to 326—327
Ambiguities (latent): privacy 25—26 157—158 160—165 214
Ambiguities (latent): translation of Constitution 160 161—168 371n15 18 22
America Online See AOL
AmericaBlog 215
American Lawyer Media, L.P. 94
Americans with Disabilities Act (ADA) 127
Anime Music Videos (AMVs) 195
Anonymity See also Identity; Privacy
Anonymity: choice on 197—198
Anonymity: code and 33—34
Anonymity: effects on community / class at Yale 102—106
Anonymity: escaping constraints and 18 19
Anonymity: imperfection effects on 190—192 196
Anonymity: in reading 191—192
Anonymity: in real space vs. cyberspace (summary) 45
Anonymity: post office use and 37 44
Anonymity: technologies to “anonymize” 46 56—57
AOL: charges and 360n19
AOL: community and 88
AOL: comparison with other cyberplaces 96—97 102 113
AOL: non-code modalities for controlling behavior 93 94
AOL: rules / code effects 88—92 93—94 359n17
AOL: statistics on 88
Apple's iTunes 116
Application layer (Internet) 144—145
Architecture See also Code; Modalities of regulation; Regulation by code
Architecture: as regulator 122 123 124—125 127—129 341—342 344—345
Architecture: definition / description 341—343 344—345
Architecture: generations of (cyberspace / Internet) 7
Architecture: regulation examples using 127—129
Articles of Confederation 4
ATM cards and identity 35 41—42
Audio Home Recording Act (1992) 115 177
Authentication 40 41 42—46 43
Baker, Jake 16—19 20 26 236 299 349n10
Baker, Stewart 53
Barlow, John Perry xiv—xv 3 152 302—304 305 373n11
Bendor, Jonathan 245
Benkler, Yochai 275
Benloliel, Daniel 186
Berman, Paul 319
Berners-Lee, Tim 146
Bill of Rights 7 314
Biometric technology 42 73—74 207—208
Blackburn, David 337
Blogs / bloggers 85 242—243 244
Board of Education, Brown v. 314
Boyle, James 3 22 181 198
Brandeis, Louis 157 161—162 163 201 214
Breyer, Stephen 171
Brin, David 79 218 219
Broadcasting spectrum regulation 270—275
Brown v. Board of Education 314
Bush v. Gore 141
Cailliau, Robert 146
Calabresi, Guido 326
CALEA (Communications Assistance for Law Enforcement Act/1994) 63—64 354n6 355n7
Cameron, Kim 51 52
Camp, Jean 323—324
CAN SPAMAct 264 266 337
Carnivore project 140—141
Cars: congestion control in London 62 207
Cars: license plates' importance 42—43
Cars: radio theft example 125—126
Cars: safety and architecture 128
Case, Steve 90
Castronova, Edward 12 108 139 285 300
Catalfo, Phil 84
Cates, Richard 333
CC See Counsel Connect
CDA (Communications Decency Act/1996) 249—250 252 253 255 304 316
Cellular phone calls data 64—65 215—216 355n12
CERT's (Computer Emergency Readiness Team) malware incidents graph 75 76
Chicago Sun-Times 215
Chicago Tribune 239
ChicagoWorld's Fair (1933) 129
Child Online Protection Act (COPA/1998) 250 252 253
Child pornography: online 19 20 26—27
Child pornography: prohibition of 245 385n32
Children's Internet Protection Act (CIPA/2000) 387n57
China's regulation of Internet 79—80 309
Choices and regulation (cyberspace / Internet), as unprepared to make 8 277 311—312 313
Choices and regulation (cyberspace / Internet), problems with code 313 323—324
Choices and regulation (cyberspace / Internet), problems with courts 8 313—319
Choices and regulation (cyberspace / Internet), problems with legislators 8 311—312 313 319—323
CIPA (Children's Internet Protection Act/2000) 387n57
Cisco and cryptography 71—72
Citizen-sovereign model 287—290 289
Citizenship: in U.S. 285—286 291—292 329—330
Citizenship: of the world 292 330
Civil rights in American South 365n37
Clark, David 44 111
Clark, Wesley 215—216
Clinton administration and cryptology regulation 66
Clipper Chip 66 367n63
Cloning fraud 244
Closed code See also specific projects
Closed code: Carnivore project and 140—141
Closed code: commercial software / history and 146 369n19
Closed code: description 139 140—141
Closed code: regulability of 149—150 151 327 328
Closed code: voting machines example 141—143
closed networks 35
Coase, Ronald 271 336
Code See also Closed code; Open code; Regulation by code
Code of Fair Information Practices 227—228
Code: as law 5 77—79 113
Code: definition / description 6 88 121 145
Code: history of 145—149
Code: modular code 328—329
Code: resistance to 118—119
Code: types of 139 145—149
Code: values and 5 6 7 77—78 114 277 292—293
Codifying constitution 313—314 315
Cohen Theorem 191—192 197
Cohen, Julie 191—192 197
Commerce See also Modalities of regulation
Commerce: as regulator xiii xiv 61 79—80 122 123 124 138 341 342
Commerce: data gathering by 48 52
Commerce: France / Nazi paraphernalia 57 294—295 297
Commerce: fraud as cost 42 52
Commerce: geographic identity and 57—59
Commerce: identity / authentication and 42 48 52 57—59 71—72 77
Commerce: in Tom Maddox story xii
Commerce: labor movement / liberty and 121
Commerce: legal effects on 127
Communications Assistance for Law Enforcement Act (CALEA/1994) 63—64 355n6 7
Communications Decency Act (CDA/1996) 249—250 252 253 255 304 316
Communism: transition to democracy 1—2
Communism: Vietnam and 281—282
| Communities See also Norms; specific cyberspace places
Communities: changing in cyberspace / real space 290
Communities: cyberspace (overview) 84—85
Communities: maturing of (cyberspace) 290—291 292—293
Communities: “dialogic communities” 103
Communities: “Law of Cyberspace, The” class at Yale 102—106
CompuServe 39
Computer Emergency Readiness Team (CERT) malware incidents graph 75 76
Constitution (U.S.) See also Ambiguities (latent); Bill of Rights; specific amendments
Constitution (U.S.), as transformative / codifying 314
Constitution (U.S.), cyberspace constitution / values and 275 277
Constitution (U.S.), description 6—7 314
Constitution (U.S.), intellectual property 183—184 186—187
Constitutional interpretation See also Ambiguities (latent)
Constitutional interpretation: one-step originalism / fidelity 160 161 162
Constitutional interpretation: translation and 156 160 161—168 371n15 18 22
Constitutional interpretation: values and 163 165 167—168
Constitutional interpretation: “as complete” view 166 167 214
Constitutions: as architecture 4
Constitutions: types of 313—314 315
Content monitoring 54—57
Contract and property 180 383n50
COPA (Child Online Protection Act/1998) 250 252 253
Copyright See also Digital technologies; Intellectual property
Copyright: amateur culture and 193 195—196 268—270
Copyright: as “more protected” in cyberspace 175—176 185—186 200
Copyright: choices on 188—190 198—199
Copyright: contracts and 187—188
Copyright: description (overview) 171—173 185—186 187 188—190 192
Copyright: fair use and 184—185 186 187 188—190 196 376n52
Copyright: government's focus on 337 395n8
Copyright: iCraveTV example 295—296 297
Copyright: individuals vs. authors collectively 185 301
Copyright: limits with 183—184 186—187
Copyright: piracy, economic costs of 337
Copyright: trusted systems and 177—180 186 188 190
Copyright: “commons” and 198—199
Copyright: “first sale” doctrine 177 179 185 187 375n35
Counsel Connect: comparison with other cyber-places 96—97 102 113
Counsel Connect: control by non-code modalities 96—97
Counsel Connect: description 94—95 96 97
Counsel Connect: history of 94 360n26
Counsel Connect: use of real name / effects 95 96
Courts See also specific legal cases
Courts and regulation (cyberspace / Internet): possible solutions 325—327
Courts and regulation (cyberspace / Internet): problems with 8 313—319
Courts: placement of (Europe) 128
Courts: politics and 313 314 315—317
Courts: values and 8 316 326—327
Courts: “state action”, scope of 313 317—319
Craig, Bill 295—296
Craig, Maryland v. 166
Crawford, Susan 63—64 112 118
Creative Commons license 110—111
Creative Commons nonprofit, x 110 199
Credit / debit cards: data from use 22
Credit / debit cards: fraud with 58—59 69
Credit / debit cards: reduction through architecture 126 128 135
Crime (real space) identity / authentication and 41—42 42—43
Crump, Catherine 109
Cryptography: businesses and 71—72
Cryptography: confidentiality and 53 66
Cryptography: government regulation and 66—67 71—72 357n30
Cryptography: identification and 53 54 66
Cryptography: key systems of 43 53—54 353n15
Cryptography: non-confidentiality features of 353n13
Cryptography: opposing features of 53 54
Cryptography: TCP/IP and 368n13
Cultural imperialism 300
Culture (amateur), copyright law and 193 195—196 268—270
Culture (amateur), description / increase in 193—196 376n60
Cyberspace See also Internet; specific places
Cyberspace: citizen-sovereign model in 287 288—290
Cyberspace: community and (overview) 84—85
Cyberspace: computer speed / bandwidth effects 107
Cyberspace: description 9 20 84—86 107
Cyberspace: etymology of 3
Cyberspace: generations of xiv—xv 7
Cyberspace: Internet vs. 9 83—85 283—284
Cyberspace: leaving / moving in 113 288—290
Cyberspace: merchant-sovereign model in 287 288—290
Cyberspace: regulation modalities in 113—114 124—125
Cyberspace: rule-sets in 288—289 290
Cyberspace: science-fiction writers on “future” of xii—xiv
Cyberspace: “as not regulable” view ix xii 3 27 29 31—32 73
Cyberspace: “ideal” of xiv 2—3 7 302—305
Cypherpunks 383n3
Danger Mouse 194—195
DAT (Digital Audio Technology) 115 176—177
Data collection, digital See also Surveillance digital
Data collection, digital: advertising and 216 217 219 223
Data collection, digital: examples of 22 65 215—216
Data collection, digital: on computer use / logs 65
Data collection, digital: privacy and 23 218—219 223
Data collection, digital: profiling / inequalities with 219 220—222
Data collection, digital: pros / cons of 217—218
Data collection, digital: solution for 225—230
Data link layer (Internet) 144—145
Debit cards See Credit / debit cards
DeCSS 117
Democracy: cyberspace and 139 285
Democracy: in real space vs. cyberspace 139 285
Democracy: polling and 331—333
Democracy: possible solutions for 329—334
Democracy: postcommunist Europe 1—2 3 4 8
Derivative right 229
Dibbell, Julian 98 100 107
Diebold voting machines 142
Diffie — Hellman key system 53—54
Diffie, Whitfield 53—54
Digital Audio Technology (DAT) 115 176—177
Digital Millennium Copyright Act (DMCA/1998) 117 174—175 186 305 373n10
Digital technologies See also Copyright; Data collection digital
Digital technologies: amateur culture and 194—195
Digital technologies: analog technologies vs. 114 192—193 268—269
Digital technologies: Internet copy distribution 116 173 176
Digital technologies: perfect copies with 114—115 173 176
Digital technologies: piracy risk / Congress response 115 174—175
Digital technologies: “broadcast flag” and 117—118 362n67
Disabled: anti-discrimination regulations 127 131 233—234
Disabled: architecture changes and 127
Disabled: real life vs. Internet 86—88 359n8
DMCA (Digital Millennium Copyright Act/1998) 117 174—175 186 305 373n10
DNA technology 207—208
Doctrine of a second look 326
Doctrines of immunity 290
Domain Name System 306 321
DRM (“digital rights management”) technology 116 117
Drug use regulation 131—132 366n48
DSL (broadband Internet access) 54
Durham, Ivor 101
DuVal, Richard 18
DVD-Copy Control Association 117
Dyson, Esther xiv—xv
Easterbrook, Frank 187
Education 129
Electronic Frontier Foundation 117 302
Elevator architecture 128
Ellsberg, Daniel 238
Encryption See Cryptography
Encyclopedia Britannica 243
End-to-end principle 44—45 111—112
Ethernet 389n80
EverQuest GDP 108
Face recognition technology 207
Fair use and copyright 184—185 186 187 188—190 196 376n52
FBI 64—65
FCC: broadcasting spectrum regulation 270 271
FCC: government / IP designs 63—65
FCC: “broadcast flag” and 117—118
|
|
 |
Ðåêëàìà |
 |
|
|