Ãëàâíàÿ    Ex Libris    Êíèãè    Æóðíàëû    Ñòàòüè    Ñåðèè    Êàòàëîã    Wanted    Çàãðóçêà    ÕóäËèò    Ñïðàâêà    Ïîèñê ïî èíäåêñàì    Ïîèñê    Ôîðóì   
blank
Àâòîðèçàöèÿ

       
blank
Ïîèñê ïî óêàçàòåëÿì

blank
blank
blank
Êðàñîòà
blank
Lessig L. — Code: Version 2.0
Lessig L. — Code: Version 2.0



Îáñóäèòå êíèãó íà íàó÷íîì ôîðóìå



Íàøëè îïå÷àòêó?
Âûäåëèòå åå ìûøêîé è íàæìèòå Ctrl+Enter


Íàçâàíèå: Code: Version 2.0

Àâòîð: Lessig L.

Àííîòàöèÿ:

Countering the common belief that cyberspace cannot be regulated, Lessig (Harvard Law School) argues that if anything, commerce is forging the Internet into a highly regulated domain. But neither direction is inevitable; it is up to citizens to decide what values and trade-offs of control hardware and software code is to embody.


ßçûê: en

Ðóáðèêà: Òåõíîëîãèÿ/

Ñòàòóñ ïðåäìåòíîãî óêàçàòåëÿ: Ãîòîâ óêàçàòåëü ñ íîìåðàìè ñòðàíèö

ed2k: ed2k stats

Èçäàíèå: 2nd edition

Ãîä èçäàíèÿ: 2006

Êîëè÷åñòâî ñòðàíèö: 352

Äîáàâëåíà â êàòàëîã: 11.12.2007

Îïåðàöèè: Ïîëîæèòü íà ïîëêó | Ñêîïèðîâàòü ññûëêó äëÿ ôîðóìà | Ñêîïèðîâàòü ID
blank
Ïðåäìåòíûé óêàçàòåëü
1984 (Orwell)      xiv 204 208
60 Minutes      243
911 call location information      65
Abortion regulation      131—132 133—134
Abrams, Floyd      237—238 239 240 241 242
Ackerman, Bruce      78
ACLU      255
Active Server Pages (ASP)      148
Adobe's eBook system      117
Airline baggage handling example      128
Alien and Sedition Acts (1798)      213
Alt.sex.stories      17 18 19
Ambiguities (latent)      See also Free speech; Intellectual property; rights / protection; Privacy; specific technologies
Ambiguities (latent): choices and      25—26 27 155 165 166—167 188—190 195—196 214 269—270
Ambiguities (latent): codifying constitution and      315—317
Ambiguities (latent): copyright      195—196 269—270
Ambiguities (latent): description / overview      25—26 155—156 166 371n28
Ambiguities (latent): filtering / free speech      259 260
Ambiguities (latent): interstate commerce authority      189 376n49
Ambiguities (latent): possible solution / response to      326—327
Ambiguities (latent): privacy      25—26 157—158 160—165 214
Ambiguities (latent): translation of Constitution      160 161—168 371n15 18 22
America Online      See AOL
AmericaBlog      215
American Lawyer Media, L.P.      94
Americans with Disabilities Act (ADA)      127
Anime Music Videos (AMVs)      195
Anonymity      See also Identity; Privacy
Anonymity: choice on      197—198
Anonymity: code and      33—34
Anonymity: effects on community / class at Yale      102—106
Anonymity: escaping constraints and      18 19
Anonymity: imperfection effects on      190—192 196
Anonymity: in reading      191—192
Anonymity: in real space vs. cyberspace (summary)      45
Anonymity: post office use and      37 44
Anonymity: technologies to “anonymize”      46 56—57
AOL: charges and      360n19
AOL: community and      88
AOL: comparison with other cyberplaces      96—97 102 113
AOL: non-code modalities for controlling behavior      93 94
AOL: rules / code effects      88—92 93—94 359n17
AOL: statistics on      88
Apple's iTunes      116
Application layer (Internet)      144—145
Architecture      See also Code; Modalities of regulation; Regulation by code
Architecture: as regulator      122 123 124—125 127—129 341—342 344—345
Architecture: definition / description      341—343 344—345
Architecture: generations of (cyberspace / Internet)      7
Architecture: regulation examples using      127—129
Articles of Confederation      4
ATM cards and identity      35 41—42
Audio Home Recording Act (1992)      115 177
Authentication      40 41 42—46 43
Baker, Jake      16—19 20 26 236 299 349n10
Baker, Stewart      53
Barlow, John Perry      xiv—xv 3 152 302—304 305 373n11
Bendor, Jonathan      245
Benkler, Yochai      275
Benloliel, Daniel      186
Berman, Paul      319
Berners-Lee, Tim      146
Bill of Rights      7 314
Biometric technology      42 73—74 207—208
Blackburn, David      337
Blogs / bloggers      85 242—243 244
Board of Education, Brown v.      314
Boyle, James      3 22 181 198
Brandeis, Louis      157 161—162 163 201 214
Breyer, Stephen      171
Brin, David      79 218 219
Broadcasting spectrum regulation      270—275
Brown v. Board of Education      314
Bush v. Gore      141
Cailliau, Robert      146
Calabresi, Guido      326
CALEA (Communications Assistance for Law Enforcement Act/1994)      63—64 354n6 355n7
Cameron, Kim      51 52
Camp, Jean      323—324
CAN SPAMAct      264 266 337
Carnivore project      140—141
Cars: congestion control in London      62 207
Cars: license plates' importance      42—43
Cars: radio theft example      125—126
Cars: safety and architecture      128
Case, Steve      90
Castronova, Edward      12 108 139 285 300
Catalfo, Phil      84
Cates, Richard      333
CC      See Counsel Connect
CDA (Communications Decency Act/1996)      249—250 252 253 255 304 316
Cellular phone calls data      64—65 215—216 355n12
CERT's (Computer Emergency Readiness Team) malware incidents graph      75 76
Chicago Sun-Times      215
Chicago Tribune      239
ChicagoWorld's Fair (1933)      129
Child Online Protection Act (COPA/1998)      250 252 253
Child pornography: online      19 20 26—27
Child pornography: prohibition of      245 385n32
Children's Internet Protection Act (CIPA/2000)      387n57
China's regulation of Internet      79—80 309
Choices and regulation (cyberspace / Internet), as unprepared to make      8 277 311—312 313
Choices and regulation (cyberspace / Internet), problems with code      313 323—324
Choices and regulation (cyberspace / Internet), problems with courts      8 313—319
Choices and regulation (cyberspace / Internet), problems with legislators      8 311—312 313 319—323
CIPA (Children's Internet Protection Act/2000)      387n57
Cisco and cryptography      71—72
Citizen-sovereign model      287—290 289
Citizenship: in U.S.      285—286 291—292 329—330
Citizenship: of the world      292 330
Civil rights in American South      365n37
Clark, David      44 111
Clark, Wesley      215—216
Clinton administration and cryptology regulation      66
Clipper Chip      66 367n63
Cloning fraud      244
Closed code      See also specific projects
Closed code: Carnivore project and      140—141
Closed code: commercial software / history and      146 369n19
Closed code: description      139 140—141
Closed code: regulability of      149—150 151 327 328
Closed code: voting machines example      141—143
closed networks      35
Coase, Ronald      271 336
Code      See also Closed code; Open code; Regulation by code
Code of Fair Information Practices      227—228
Code: as law      5 77—79 113
Code: definition / description      6 88 121 145
Code: history of      145—149
Code: modular code      328—329
Code: resistance to      118—119
Code: types of      139 145—149
Code: values and      5 6 7 77—78 114 277 292—293
Codifying constitution      313—314 315
Cohen Theorem      191—192 197
Cohen, Julie      191—192 197
Commerce      See also Modalities of regulation
Commerce: as regulator      xiii xiv 61 79—80 122 123 124 138 341 342
Commerce: data gathering by      48 52
Commerce: France / Nazi paraphernalia      57 294—295 297
Commerce: fraud as cost      42 52
Commerce: geographic identity and      57—59
Commerce: identity / authentication and      42 48 52 57—59 71—72 77
Commerce: in Tom Maddox story      xii
Commerce: labor movement / liberty and      121
Commerce: legal effects on      127
Communications Assistance for Law Enforcement Act (CALEA/1994)      63—64 355n6 7
Communications Decency Act (CDA/1996)      249—250 252 253 255 304 316
Communism: transition to democracy      1—2
Communism: Vietnam and      281—282
Communities      See also Norms; specific cyberspace places
Communities: changing in cyberspace / real space      290
Communities: cyberspace (overview)      84—85
Communities: maturing of (cyberspace)      290—291 292—293
Communities: “dialogic communities”      103
Communities: “Law of Cyberspace, The” class at Yale      102—106
CompuServe      39
Computer Emergency Readiness Team (CERT) malware incidents graph      75 76
Constitution (U.S.)      See also Ambiguities (latent); Bill of Rights; specific amendments
Constitution (U.S.), as transformative / codifying      314
Constitution (U.S.), cyberspace constitution / values and      275 277
Constitution (U.S.), description      6—7 314
Constitution (U.S.), intellectual property      183—184 186—187
Constitutional interpretation      See also Ambiguities (latent)
Constitutional interpretation: one-step originalism / fidelity      160 161 162
Constitutional interpretation: translation and      156 160 161—168 371n15 18 22
Constitutional interpretation: values and      163 165 167—168
Constitutional interpretation: “as complete” view      166 167 214
Constitutions: as architecture      4
Constitutions: types of      313—314 315
Content monitoring      54—57
Contract and property      180 383n50
COPA (Child Online Protection Act/1998)      250 252 253
Copyright      See also Digital technologies; Intellectual property
Copyright: amateur culture and      193 195—196 268—270
Copyright: as “more protected” in cyberspace      175—176 185—186 200
Copyright: choices on      188—190 198—199
Copyright: contracts and      187—188
Copyright: description (overview)      171—173 185—186 187 188—190 192
Copyright: fair use and      184—185 186 187 188—190 196 376n52
Copyright: government's focus on      337 395n8
Copyright: iCraveTV example      295—296 297
Copyright: individuals vs. authors collectively      185 301
Copyright: limits with      183—184 186—187
Copyright: piracy, economic costs of      337
Copyright: trusted systems and      177—180 186 188 190
Copyright: “commons” and      198—199
Copyright: “first sale” doctrine      177 179 185 187 375n35
Counsel Connect: comparison with other cyber-places      96—97 102 113
Counsel Connect: control by non-code modalities      96—97
Counsel Connect: description      94—95 96 97
Counsel Connect: history of      94 360n26
Counsel Connect: use of real name / effects      95 96
Courts      See also specific legal cases
Courts and regulation (cyberspace / Internet): possible solutions      325—327
Courts and regulation (cyberspace / Internet): problems with      8 313—319
Courts: placement of (Europe)      128
Courts: politics and      313 314 315—317
Courts: values and      8 316 326—327
Courts: “state action”, scope of      313 317—319
Craig, Bill      295—296
Craig, Maryland v.      166
Crawford, Susan      63—64 112 118
Creative Commons license      110—111
Creative Commons nonprofit, x      110 199
Credit / debit cards: data from use      22
Credit / debit cards: fraud with      58—59 69
Credit / debit cards: reduction through architecture      126 128 135
Crime (real space) identity / authentication and      41—42 42—43
Crump, Catherine      109
Cryptography: businesses and      71—72
Cryptography: confidentiality and      53 66
Cryptography: government regulation and      66—67 71—72 357n30
Cryptography: identification and      53 54 66
Cryptography: key systems of      43 53—54 353n15
Cryptography: non-confidentiality features of      353n13
Cryptography: opposing features of      53 54
Cryptography: TCP/IP and      368n13
Cultural imperialism      300
Culture (amateur), copyright law and      193 195—196 268—270
Culture (amateur), description / increase in      193—196 376n60
Cyberspace      See also Internet; specific places
Cyberspace: citizen-sovereign model in      287 288—290
Cyberspace: community and (overview)      84—85
Cyberspace: computer speed / bandwidth effects      107
Cyberspace: description      9 20 84—86 107
Cyberspace: etymology of      3
Cyberspace: generations of      xiv—xv 7
Cyberspace: Internet vs.      9 83—85 283—284
Cyberspace: leaving / moving in      113 288—290
Cyberspace: merchant-sovereign model in      287 288—290
Cyberspace: regulation modalities in      113—114 124—125
Cyberspace: rule-sets in      288—289 290
Cyberspace: science-fiction writers on “future” of      xii—xiv
Cyberspace: “as not regulable” view      ix xii 3 27 29 31—32 73
Cyberspace: “ideal” of      xiv 2—3 7 302—305
Cypherpunks      383n3
Danger Mouse      194—195
DAT (Digital Audio Technology)      115 176—177
Data collection, digital      See also Surveillance digital
Data collection, digital: advertising and      216 217 219 223
Data collection, digital: examples of      22 65 215—216
Data collection, digital: on computer use / logs      65
Data collection, digital: privacy and      23 218—219 223
Data collection, digital: profiling / inequalities with      219 220—222
Data collection, digital: pros / cons of      217—218
Data collection, digital: solution for      225—230
Data link layer (Internet)      144—145
Debit cards      See Credit / debit cards
DeCSS      117
Democracy: cyberspace and      139 285
Democracy: in real space vs. cyberspace      139 285
Democracy: polling and      331—333
Democracy: possible solutions for      329—334
Democracy: postcommunist Europe      1—2 3 4 8
Derivative right      229
Dibbell, Julian      98 100 107
Diebold voting machines      142
Diffie — Hellman key system      53—54
Diffie, Whitfield      53—54
Digital Audio Technology (DAT)      115 176—177
Digital Millennium Copyright Act (DMCA/1998)      117 174—175 186 305 373n10
Digital technologies      See also Copyright; Data collection digital
Digital technologies: amateur culture and      194—195
Digital technologies: analog technologies vs.      114 192—193 268—269
Digital technologies: Internet copy distribution      116 173 176
Digital technologies: perfect copies with      114—115 173 176
Digital technologies: piracy risk / Congress response      115 174—175
Digital technologies: “broadcast flag” and      117—118 362n67
Disabled: anti-discrimination regulations      127 131 233—234
Disabled: architecture changes and      127
Disabled: real life vs. Internet      86—88 359n8
DMCA (Digital Millennium Copyright Act/1998)      117 174—175 186 305 373n10
DNA technology      207—208
Doctrine of a second look      326
Doctrines of immunity      290
Domain Name System      306 321
DRM (“digital rights management”) technology      116 117
Drug use regulation      131—132 366n48
DSL (broadband Internet access)      54
Durham, Ivor      101
DuVal, Richard      18
DVD-Copy Control Association      117
Dyson, Esther      xiv—xv
Easterbrook, Frank      187
Education      129
Electronic Frontier Foundation      117 302
Elevator architecture      128
Ellsberg, Daniel      238
Encryption      See Cryptography
Encyclopedia Britannica      243
End-to-end principle      44—45 111—112
Ethernet      389n80
EverQuest GDP      108
Face recognition technology      207
Fair use and copyright      184—185 186 187 188—190 196 376n52
FBI      64—65
FCC: broadcasting spectrum regulation      270 271
FCC: government / IP designs      63—65
FCC: “broadcast flag” and      117—118
1 2 3 4
blank
Ðåêëàìà
blank
blank
HR
@Mail.ru
       © Ýëåêòðîííàÿ áèáëèîòåêà ïîïå÷èòåëüñêîãî ñîâåòà ìåõìàòà ÌÃÓ, 2004-2024
Ýëåêòðîííàÿ áèáëèîòåêà ìåõìàòà ÌÃÓ | Valid HTML 4.01! | Valid CSS! Î ïðîåêòå