10 Hits in 5.5 sec

Cyberspace Self-Governance: A Skeptical View from Liberal Democratic Theory

Neil Weinstock Netanel
2000 California Law Review  
Michael Froomkin, The Internet as a Source of Regulatory Arbitrage, in BORDERS IN CYBERSPACE 129 (Brian Kahin & Charles Nesson eds., 1997) (detailing the Internet's "resistance to control"). 18.  ...  TECH. 247 (1998); see also INFORMATION INFRASTRUCTURE TASK FORCE, PRIVACY AND THE NATIONAL INFORMATION INFRASTRUCTURE: PRINCIPLES FOR PROVIDING AND USING PERSONAL INFORMATION (June 6, 1995), available  ...  ); Barlow, supra note 1 (declaring that in cyberspace "all the sentiments and expressions of humanity, from the debasing to the angelic, are parts of a seamless whole, the global conversation of bits")  ... 
doi:10.2307/3481227 fatcat:4nwjurc27bcghljdjo3nmschdq

Habermas@Discourse. Net: Toward a Critical Theory of Cyberspace

A. Michael Froomkin
2003 Harvard Law Review  
(IN CYBERSPACE: INFORMATION POLICY AND THE GLOBAL INFORMATION STRUCTURE 129, 140-142 (Brian Kahin & Charles Nesson eds., 1997), available at -froomkin/articles/arbitr.htm;  ...  Johnson & David Post, Law and Borders -The Rise of Law in Cyberspace, 48 STAN. L.  ...  It appears that the circles within which ICANN seeks consensus are sharply more limited than the set of Internet actors interested in and affected by its policies. 438 The founders of ICANN made a number  ... 
doi:10.2307/1342583 fatcat:7r5574mkvzfebgzadyd5ctogly

Internet Control or Internet Censorship? Comparing the Control Models of China, Singapore, and the United States to Guide Taiwan's Choice

Jeffrey (Chien-Fei) Li
2014 Pittsburgh Journal of Technology Law and Policy  
The danger of Internet censorship is its chilling effect and substantial harm on free speech, a cornerstone of democracy, in cyberspace.  ...  Further, Taiwan should fix flaws in its current Internet control system, including the private partnership model adopted by the Copyright Act, to be consistent with Article19.3 of the ICCPR.  ...  Reidenberg, Governing Networks and Rule-Making in Cyberspace, in BORDERS IN CYBERSPACE: INFORMATION POLICY AND THE GLOBAL INFORMATION INFRASTRUCTURE 90-91 (Brian Kahin & Charles Nesson eds., 1997).  ... 
doi:10.5195/tlp.2013.131 fatcat:mvfbavfmm5gxdkl34c6jemwdhe

The Law and Economics of Internet Norms

Mark A. Lemley
2000 Social Science Research Network  
Volokh for comments on an earlier draft, the participants in the Chicago-Kent Symposium on the Internet and Legal Theory and law and economics workshops at the Boalt Hall School of Law, University of California  ...  at Berkeley, the Stanford Law School, and the USC Law Center for helping me to hone these ideas, and Ryan Garcia for research assistance.  ...  Burk, The Market for Digital Piracy, in BORDERS IN CYBERSPACE: INFORMATION POLICY AND THE GLOBAL INFORMATION INFRASTRUCTURE 205, 227-28 (Brian Kahin & Charles Nesson eds., 1997) (arguing that the Internet  ... 
doi:10.2139/ssrn.197228 fatcat:nnl3zexfqjdzla4hiopkqdoxne

Trusted computing and the digital crime scene

Yianna Danidou, Burkhard Schafer
2014 Digital Evidence and Electronic Signature Law Review  
ARTICLE: This paper analyses the future of digital forensics in an environment where control is increasingly taken away from PC users and remotely managed by trusted third parties, typically to improve  ...  Trusted Computing (TC) is used as the most developed example to illustrate some of the possible legal issues that arise.  ...  Smith, 'International Regulation of Encryption: technology will drive policy', in Brian Kahin and Charles Nesson, eds, Borders in Cyberspace: Information Policy and the Global Information Infrastructure  ... 
doi:10.14296/deeslr.v8i0.1960 fatcat:gstantv2ybdtpnyh4qr2weu4cy

Copyright History and the Future: What's Culture Got to Do With It?

Paul Edward Geller
2000 Social Science Research Network  
These rules interact with each other, as well as with other factors, such as market constraints, to generate ultimate results. 175 MATION INFRASTRUCTURE 84, 96-100 (Brian Kahin & Charles Nesson eds., 1997  ...  Nimmer, Licensing on the Global Information Infrastructure: Disharmony in Cyberspace, 16 NW. J.  ... 
doi:10.2139/ssrn.243115 fatcat:hlworc7esvhutanql3e57r3fjm

Application-Centered Internet Analysis

Timothy Wu
1999 Virginia law review  
We use information technology and tools to increase productivity and facilitate new forms of scholarship. For more information about JSTOR, please contact  ...  It is a battle of analogies: One side refers to Cyberspace as a place, while the other essentially equates the Internet and the telephone.  ...  For a collection of some of these and other articles, see Borders in Cyberspace: Information Policy and the Global Information Infrastructure (Brian Kahin & Charles Nesson eds., 1997).  ... 
doi:10.2307/1073968 fatcat:qnuzppr2k5fxbbnhf5zcpoj65i

The Copyright Divide

Peter K. Yu
2003 Social Science Research Network  
Burk, The Market for Piracy, in BORDERS IN CYBERSPACE: INFORMATION POLICY AND THE GLOBAL INFORMATION INFRASTRUCTURE 205, 205 (Brian Kahin & Charles Nesson eds., 1997) [hereinafter BORDERS IN CYBERSPACE  ...  , Global Use/Territorial Rights: Private International Law Questions of the Global Information Infrastructure, 42 J.  ... 
doi:10.2139/ssrn.460740 fatcat:43fbhj4ju5harg3o3be6xaxwrq


1999 BIBLIOTHEK Forschung und Praxis  
: digital collections: implications for users, funders, developers and maintainers/Ed.  ...  Zusammengestellt von Dieter Schmidmaier (DS), Berlin, unter Mitarbeit von Monika Cremer, Göttingen. 1 Bibliothekswesen (allgemein und vergleichend) (78) ASIS '97 proceedings of the 60 th ASIS Annual Meeting  ...  In: Library & Information science research 20 (1998) 2, S. 201-202. (132) Borders in Cyberspace: Information policy and the global Information infrastructure/Eds. Brian Kahin, Charles Nesson.  ... 
doi:10.1515/bfup.1999.23.2.248 fatcat:xtuf3nsdhbbb3km7v4whpw4lue

Cyber Security: DNS-CERT as a case for Securitization in Internet Governance

Philipp Michael Richard Mirtl
2012 unpublished
Also, this study tries to sharpen the Copenhagen school's concept of cyber securitization in that it specifies a four-layer model for cyberspace, including a physical, logical, content, and social layer  ...  This shall be achieved by applying the Copenhagen school's concept of cyber securitization to the area of Internet governance (more precisely Domain Name System governance).  ...  /ruling- Kahin, Brian and Nesson Charles (eds.), Borders in cyberspace: information policy and the global information infrastructure, Cambridge, MIT Press, 1997.  ... 
doi:10.25365/thesis.18221 fatcat:foe2woaoj5dt7djeenaq2ds5ei