Ãëàâíàÿ    Ex Libris    Êíèãè    Æóðíàëû    Ñòàòüè    Ñåðèè    Êàòàëîã    Wanted    Çàãðóçêà    ÕóäËèò    Ñïðàâêà    Ïîèñê ïî èíäåêñàì    Ïîèñê    Ôîðóì   
blank
Àâòîðèçàöèÿ

       
blank
Ïîèñê ïî óêàçàòåëÿì

blank
blank
blank
Êðàñîòà
blank
Lessig L. — Code: Version 2.0
Lessig L. — Code: Version 2.0



Îáñóäèòå êíèãó íà íàó÷íîì ôîðóìå



Íàøëè îïå÷àòêó?
Âûäåëèòå åå ìûøêîé è íàæìèòå Ctrl+Enter


Íàçâàíèå: Code: Version 2.0

Àâòîð: Lessig L.

Àííîòàöèÿ:

Countering the common belief that cyberspace cannot be regulated, Lessig (Harvard Law School) argues that if anything, commerce is forging the Internet into a highly regulated domain. But neither direction is inevitable; it is up to citizens to decide what values and trade-offs of control hardware and software code is to embody.


ßçûê: en

Ðóáðèêà: Òåõíîëîãèÿ/

Ñòàòóñ ïðåäìåòíîãî óêàçàòåëÿ: Ãîòîâ óêàçàòåëü ñ íîìåðàìè ñòðàíèö

ed2k: ed2k stats

Èçäàíèå: 2nd edition

Ãîä èçäàíèÿ: 2006

Êîëè÷åñòâî ñòðàíèö: 352

Äîáàâëåíà â êàòàëîã: 11.12.2007

Îïåðàöèè: Ïîëîæèòü íà ïîëêó | Ñêîïèðîâàòü ññûëêó äëÿ ôîðóìà | Ñêîïèðîâàòü ID
blank
Ïðåäìåòíûé óêàçàòåëü
Open code: regulability and      150—151 327
Open code: situations requiring      141 143
P2P filesharing      xiii 118 152 337
P3P (Platform for Privacy Preferences)      226 228 229 230 231 256 261 382n41
Packet filtering technology      56
Peer-to-peer filesharing      xiii 118 152 337
Pentagon Papers      238—239 240
PGP (pretty good privacy) program      143
PICS (WorldWideWeb Consortium's Platform for Internet Content Selection)      256—257 258
Platform for Privacy Preferences (P3P)      226 228 229 230 231 256 261 382n41
Plato      59—60
Politics: description / features      78—79
Politics: influences on courts      314 315
Polling and democracy      331—333
Pool, Ithiel de Sola      260
Pornography / blocking children from: filters      254—255 256 258—259
Pornography / blocking children from: foreign sites      254
Pornography / blocking children from: in cyberspace      47 248 249—261
Pornography / blocking children from: PICS      256—257 258 261
Pornography / blocking children from: regulation burden      251—252 254
Pornography / blocking children from: zoning approach      252—254 257—258 261
Pornography / blocking children from: “harmful tominors” tag use      253—254 257—258
Pornography: child pornography      19 20 26—27 245 385n32
Pornography: China and      79
Pornography: definition      245 246
Pornography: German laws / CompuServe and      39
Pornography: regulation of      245—248 249—261 385n32
Posner, Richard      210 225 235 355n10
Post, David      31 288 300—301
Post, Robert      162
Postel, Jon      321
Press-Connection      240
Price discrimination      221—222 382n37
Privacy      See also Anonymity; Data collection; Surveillance digital
Privacy enhancing technologies (PETs)      223 224 226 382n41.
Privacy law      227
Privacy property right      228—230
Privacy: as constraint on government regulation      213—214
Privacy: dignity / searches and      211—213 214
Privacy: domestic intelligence / security      380n13
Privacy: in private      201
Privacy: intellectual property rights comparison      200—201 230—231
Privacy: regulation modalities and      223—224
Privacy: restrictions on giving up      227
Privacy: secret monitoring      208—209 212—213
Privacy: solutions for      223—232
Privacy: values and      191—192 200—201
Privacy: “wallet architecture” vs. identity layer      51 52—53
Private law      180—181
ProCD v. Zeidenberg      187
Profiles in Courage (Kennedy)      329
Progressive      240
Prohibition      157
Property law      109—110
Property protection      169—171 180—181
Racism: indirect segregation examples      128 134 135 220 367n61 381n31 32 33
Racism: laws affecting norms and      365n37
Racism: slavery in U.S.      291—292 293 390n17 392n3
Racism: U.S. courts and      314
Radio Act (1927)      270
Radio waves      272
Raducatu Group      264
Rather, Dan      243
Reed, David      44 111
Reeves, Harold      169 170 171
Regulability      See also Identity
Regulability: anonymity / identification default      37
Regulability: as changing      x xiii xiv 27 32 36—37 71—72 73—77 75 310 311—312
Regulability: closed code and      149—150 151 327 328
Regulability: CompuServe / porn example      39
Regulability: control levels      33—36 73
Regulability: cow control comparison      73
Regulability: data / use information “imperfection”      35—36
Regulability: definition      16 23
Regulability: geographic identity      57—59
Regulability: geography of user “imperfection”      35
Regulability: identity of user “imperfection”      35
Regulability: importance of understanding      27 32
Regulability: Independence Day (movie) comparison      77
Regulability: Internet's original form and      33—34 35 38 59—60
Regulability: invisible man comparison      38 45 59—60
Regulability: knowledge needed with (overview)      23 39
Regulability: monitoring content      54—57
Regulability: open code and      150—151 327
Regulability: post office comparison      37 44
Regulability: tipping point for      74—77 75
Regulability: view of Internet / cyberspace as not regulable      ix xii 3 27 29 31—32 73
Regulation      See also; Architecture; Commerce; Government / regulation; Laws; Modalities of regulation; Norms
Regulation by code: architecture as politics      24
Regulation by code: borders story (poisonous flowers) example      10—11 13—15
Regulation by code: definition / description      81—82 84
Regulation by code: MMOGs and      13—15 24
Regulation by code: overview      24 83—84
Regulation by code: possible solution      327—329
Regulation by code: problems with (overview)      323—324
Regulation by code: University of Chicago vs. Harvard      33—34
Regulation: as inevitable (cyberspace / Internet)      4 336
Regulation: balance and      276—277
Regulation: choice and      126 130—132 277 310 311—312
Regulation: costs / choice examples      126 130—132 310
Regulation: direct / indirect methods (overview)      129 132
Regulation: discrimination against disabled persons      131 233—234
Regulation: doing nothing / effects      337—339
Regulation: modality interactions / tradeoffs and      129—132 130
Regulation: of abortion      131—132 133—134
Regulation: of drugs      131—132 366n48
Regulation: of nuclear waste      132—133 134
Regulation: protection of “dot” / individual example      121—123 122 123 234
Regulation: regulator types overview      122—125 123 234—235 234 340—345
Regulation: seatbelt use      130 327 365n43
Regulation: skepticism about government and      27—28 319—323 338
Regulation: values and      126
Regulation: “bad man” theory of      5—6
Rehnquist Court      315
Reid, Elizabeth      97
Reidenberg, Joel      61 297
Republic, The (Plato)      59—60
Richards, Neil      229—230
Rodham Clinton, Hillary      333
Roe v.Wade      132
Roe, Maher v.      132
Rosedale, Philip      114 283 284
Rosen, Jeff      210
routers      43
Rust v. Sullivan      132 133—134 135
Salinger, Pierre      241 244
Saltzer, Jerome      44 111
Scalia, Justice Antonin      134 167 212
Science and peer review      244
Search engines' records      204—205 219
Searches of computers: ambiguity / choice and      25—26
Searches of computers: as “invisible”      20—23 25
Searches of computers: burden and      22—23
Searches of computers: Carnivore and      140—141
Searches of computers: Constitution and      21—22 23 25
Searches of computers: data gathered by computers      65
Searches of computers: judicial approval and      140
Searches of computers: “worms” that sniff      20—23
Seatbelt use regulation      130 327 365n43
Second Life: code and      110 111 113—114 283—285
Second Life: commerce and      108
Second Life: description      13 108 109 284 349n8
Second Life: land ownership / property laws in      109—110
Second Life: sovereignty and      27
Second Life: statistics on use      13
Sedition      213 214
Seigenthaler, John, Sr.      243
Shamans, Software, and Spleens (Boyle)      198
Shapiro, Andrew      xv
Shelley v. Kraemer      134
Shenk, David      xv
Simple Mail Transport Protocol (SMTP)      144 145
Single Sign-on (SSO) technology      49—50
Sixth Amendment      166 213
Sklyarov, Dmitry      117
Slashdot      285
Slavery issue in U.S.      291—292 293 390n17 392n3
Smith, Una      105
Smoking regulation modalities      122—123 363n7
SMTP (Simple Mail Transport Protocol)      144 145
Social norms      See Norms
Software, free      56 139
Software, proprietary      139
Sorkin, Michael      345
Soros, George      235
source code      145—146 369n16
Sovereignty competition / possible solutions: democracy and      309—310
Sovereignty competition / possible solutions: gambling example      307—308 391n33
Sovereignty competition / possible solutions: geographical zoning and      308—309 310
Sovereignty competition / possible solutions: identity layer and      306 307
Sovereignty competition / possible solutions: many laws rule      306—310
Sovereignty competition / possible solutions: no law rule      302—305
Sovereignty competition / possible solutions: one law rule      305—306
Sovereignty competition: debate on      300—301
Sovereignty competition: in cyberspace / real space simultaneously      298—302
Sovereignty competition: overview      26—27 297—298
Sovereignty competition: pedophilia / travel example      299
Sovereignty competition: reciprocal blindness with      297
Sovereignty: citizen-sovereign model      287—288 289
Sovereignty: doctrines of immunity      290
Sovereignty: merchant-sovereign model      287—288
Spam regulation: arms race with      263
Spam regulation: blacklisting servers      263—264
Spam regulation: code and      262—263
Spam regulation: current techniques      261—264
Spam regulation: difficulties with      263—264 388n65
Spam regulation: digital IDs and      69
Spam regulation: filtering and      263—264
Spam regulation: identity layer and      52
Spam regulation: in real space      246 248—249
Spam regulation: labeling / bounty system      265—267
Spam regulation: labeling and      264—265 388n66
Spam regulation: mixed modality strategy with      267
Spam regulation: overview      245—246 261—268
Spam regulation: regulability and      52 69 73
Spam: definition / description      245 262 387n64
Spam: economic costs of      336—337
Spam: test of spammers' sophistication      75
Speech constraints      See also Free speech
Speech constraints: AOL and      90—91 235
Speech constraints: in real-space forums      91
Speech constraints: removal in cyberspace      18 19
Speech constraints: University of Chicago / Harvard Internet use and      33—34
Speech regulation      See also Free speech; Pornography; Spam
Speech regulation: broad / narrow approach      255 257
Speech regulation: free culture and      268—270
Speech regulation: free speech values and      267—268
Speech regulation: mixed modality strategy with      268
Speech regulation: transparency and      255 260
Speech regulation: “abridging” speech and      267
Speech regulators: broadcasting spectrum regulation      270—275
Speech regulators: distribution      270—275
Speech regulators: publication and      19 236 237—245
Speed bumps / effects      128 135
Spitting / saliva recovery kits      208
SSO (Single Sign-on) technology      49—50
Stallman, Richard      139 147 148 176 199
Stanford Law Review      200
Stefik, Mark      6 85—86 176 177 178—179 187 188 190
Steinert-Threlkeld, Tom      31
Stevens, Justice John Paul      141
Stewart, Justice Potter      163 164 165
Stone, Geoffrey      33—34 260
Strumpf, Koleman      337
Stuntz, William      213
Subjection ofWomen (Mill)      120
Sullivan, Rust v.      132 133—134 135
Sunstein, Cass      214 244 260
Surveillance, digital      See also Data collection digital
Surveillance, digital: abuses of      210
Surveillance, digital: as privacy threat      223
Surveillance, digital: conditions for use      224
Surveillance, digital: constitutionality of      209—211 213—214
Surveillance, digital: judicial intervention and      210—211
Surveillance, digital: latent ambiguities / choices      214
Surveillance, digital: overview / examples      202—209
Surveillance, digital: solution for      224—225
Surveillance, digital: “best intentions” phenomenon      208 210
Sydney Olympics (2000)      128
Taft, William Howard      161 162 163
Taxes: bit tax      357n27
Taxes: digital IDs and      69
TCP/IP protocols: description      35 111 143—145
TCP/IP protocols: identity / authentication      45
TCP/IP protocols: innovation and      111—112
TCP/IP protocols: protocols for data exchange      43—45
Telecommunications Act (1996)      116
Telephone networks / service: across Internet / government regulability and      64
Telephone networks / service: circuit / packet switched networks      63
Telephone networks / service: monitoring of conversations      206
Telephone networks / service: phone call data      22 64—65 215—216 355n12
Telephone networks / service: wiretapping design needs      63—64
Text use on Internet      12—13 86—87 88
There      108—109
Thierer, Adam      295
Tiebout, Charles      287—288
Time      249
Tipping      222
Tocqueville, Alexis de      333
Torvalds, Linus      147—148
Traceability      See also Identity
Traceability: AOL code and      91—92
Traceability: Internet Protocol addresses      46—47
Traceability: ISPs and      46—47
Transformative constitution      313—314
Translation of Constitution      156 160 161—168 371n15 18 22
Transparency      See also Open code
Transparency: as value      328
Transparency: democracy and      138
Transparency: effectiveness and      327—328
Transparency: law and      329
Transport layer (Internet)      144—145
Tribe, Laurence      163—164 165—166
Trusted systems      177—180 186 188 190 191—192
TWA Flight 800 crash      241 242
UDP protocol      144
Ultima online      348n7
Uncle Tom's Cabin      194
Unger, Roberto Mangabeira      78
United States, Katz v.      163—164
United States, New York v.      133 134 135
United States, Olmstead v.      157—158 160—163 164 214
United States: citizenship in      285—286 291—292 329—330
United States: extra-territorial legislation of      305—306
United States: slavery issue in      291—292 293 390n17 392n3
universities      See also specific universities
Universities: Internet beginnings with      33
Universities: regulability differences in      33—35 351n6
University of Chicago      33—34 35 350n4
UNIX      101
USA Patriot Act      305
USENET      17 18—19 39 248
V-chip      116 361n60
V-mail      206
Vaidhyanathan, Siva      4—5 194
Values      See also specific values
Values: code writing and      5 6 7 77—78 292—293
Values: collective values      198—199 320 322 377n67
Values: commercial vs. public values      77—78
Values: constitutional interpretation and      163 165 167—168
1 2 3 4
blank
Ðåêëàìà
blank
blank
HR
@Mail.ru
       © Ýëåêòðîííàÿ áèáëèîòåêà ïîïå÷èòåëüñêîãî ñîâåòà ìåõìàòà ÌÃÓ, 2004-2024
Ýëåêòðîííàÿ áèáëèîòåêà ìåõìàòà ÌÃÓ | Valid HTML 4.01! | Valid CSS! Î ïðîåêòå