17.01.2015 Views

Download - Future of the Internet – And how to stop it.

Download - Future of the Internet – And how to stop it.

Download - Future of the Internet – And how to stop it.

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

332<br />

Index<br />

copyright infringement (continued )<br />

technologies, 216; penalties for,<br />

286n99; and robot scanning, 224–25;<br />

statute <strong>of</strong> lim<strong>it</strong>ations on, 191; Wikipedia<br />

policy on, 143, 168, 189, 195<br />

copyright law, 79, 111, 112, 197; and<br />

Dig<strong>it</strong>al Millennium Copyright Act,<br />

119–20; fair use defense in, 115; and<br />

free s<strong>of</strong>tware, 189; online, 123–26;<br />

and prior restraints, 115–16; and <strong>to</strong>lerated<br />

uses, 119–22<br />

Cornell Univers<strong>it</strong>y, 39<br />

couchsurfing.com, 243, 301n7<br />

Craigslist, 85<br />

Creative Commons, 79, 193, 225, 226,<br />

227<br />

Cuff, Dana, 210<br />

Cunningham, Ward, 95, 96, 133, 151<br />

Currah, <strong>And</strong>rew, 83<br />

CVS (concurrent versions system), 94<br />

cyberlaw: acoustic separation in, 122; amplification<br />

<strong>of</strong>, 114–17; code as, 104–<br />

8, 197, 310n92; conduct rules, 122–<br />

23; consumer protection, 177; and<br />

contraband rules, 103–4; and data<br />

portabil<strong>it</strong>y, 177; decision rules, 122–<br />

23; and due process, 172–74; and end<strong>to</strong>-end<br />

neutral<strong>it</strong>y, 164–65; ex ante legislative-style<br />

drafting <strong>of</strong>, 109; flexibil<strong>it</strong>y<br />

<strong>of</strong>, 107; illegal online file sharing, 111–<br />

12; impoundment remedies in, 104;<br />

and individual liabil<strong>it</strong>y, 193–95; information<br />

aggrega<strong>to</strong>rs protected in, 138;<br />

lim<strong>it</strong>ations <strong>of</strong>, 168; and lockdown,<br />

102, 177; notice-and-takedown regime<br />

in, 119–20; objections <strong>to</strong>, 111–12;<br />

perfect enforcement <strong>of</strong>, 107–10, 112,<br />

122, 134, 166; and preemption, 108;<br />

and prior restraints, 115, 122; and responsibil<strong>it</strong>y,<br />

162–64; rule and sanction<br />

approach <strong>to</strong>, 129; rules vs. standards<br />

in, 128; as self-enforcing, 107; sources<br />

<strong>of</strong>, 128; specific injunction, 108–9;<br />

and surveillance, 109–10; and <strong>to</strong>lerated<br />

uses, 119–22, 190–91; trad<strong>it</strong>ional<br />

frameworks <strong>of</strong>, 242; and unwanted<br />

robot access, 224–25<br />

cyberspace, map <strong>of</strong>, 166<br />

Cyworld, 218<br />

Dagon, Dave, 46<br />

Dan-Cohen, Meir, 122<br />

darknets, 197<br />

databases, 88; centralized, 208; government,<br />

202; and privacy law, 202; relational,<br />

15; search, 224; <strong>of</strong> worms and<br />

viruses, 53<br />

data ga<strong>the</strong>ring, 160<br />

data genealogy, 225–28<br />

data mining, 204–5<br />

data portabil<strong>it</strong>y, 176–78<br />

data reposi<strong>to</strong>ries, 186–88<br />

decision rules, 122–23<br />

Defense Department, U.S., 38<br />

democracy, semiotic, 146<br />

differential pricing, 204–5<br />

Dig<strong>it</strong>al Millennium Copyright Act <strong>of</strong><br />

1998 (DMCA), 119–20, 224<br />

dig<strong>it</strong>al rights management (DRM) systems,<br />

105<br />

dig<strong>it</strong>al video recorders (DVRs), 57, 103–<br />

4, 109, 121<br />

domain names, 96, 171, 239<br />

DVD players, copy protection in, 108,<br />

123<br />

eBay, 85, 148, 151; vs. Bidder’s Edge,<br />

224, 225; and ident<strong>it</strong>y <strong>to</strong>kens, 228;<br />

reputation system on, 217–18<br />

e-books, 109<br />

EchoStar, 103–4, 107, 108, 121<br />

educa<strong>to</strong>rs, fear as response <strong>of</strong>, 244<br />

electric<strong>it</strong>y, adaptabil<strong>it</strong>y <strong>of</strong>, 72<br />

Electronic Frontier Foundation, 161<br />

e-mail: government surveillance <strong>of</strong>, 118,<br />

187; as necess<strong>it</strong>y, 137; and sender au<strong>the</strong>ntication,<br />

193–94; third-party s<strong>to</strong>rage<br />

<strong>of</strong>, 185–88. See also spam

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!