A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Cyberspace Self-Governance: A Skeptical View from Liberal Democratic Theory
2000
California Law Review
Michael Froomkin, The Internet as a Source of Regulatory Arbitrage, in BORDERS IN CYBERSPACE 129 (Brian Kahin & Charles Nesson eds., 1997) (detailing the Internet's "resistance to control"). 18. ...
TECH. 247 (1998); see also INFORMATION INFRASTRUCTURE TASK FORCE, PRIVACY AND THE NATIONAL INFORMATION INFRASTRUCTURE: PRINCIPLES FOR PROVIDING AND USING PERSONAL INFORMATION (June 6, 1995), available ...
); Barlow, supra note 1 (declaring that in cyberspace "all the sentiments and expressions of humanity, from the debasing to the angelic, are parts of a seamless whole, the global conversation of bits") ...
doi:10.2307/3481227
fatcat:4nwjurc27bcghljdjo3nmschdq
Habermas@Discourse. Net: Toward a Critical Theory of Cyberspace
2003
Harvard Law Review
(IN CYBERSPACE: INFORMATION POLICY AND THE GLOBAL INFORMATION STRUCTURE
129, 140-142 (Brian Kahin & Charles Nesson eds., 1997), available at http://www.law.miami.edu/
-froomkin/articles/arbitr.htm; ...
Johnson & David Post, Law and Borders -The Rise of Law in Cyberspace, 48 STAN. L. ...
It appears that the circles within which ICANN seeks consensus are sharply more limited than the set of Internet actors interested in and affected by its policies. 438 The founders of ICANN made a number ...
doi:10.2307/1342583
fatcat:7r5574mkvzfebgzadyd5ctogly
Internet Control or Internet Censorship? Comparing the Control Models of China, Singapore, and the United States to Guide Taiwan's Choice
2014
Pittsburgh Journal of Technology Law and Policy
The danger of Internet censorship is its chilling effect and substantial harm on free speech, a cornerstone of democracy, in cyberspace. ...
Further, Taiwan should fix flaws in its current Internet control system, including the private partnership model adopted by the Copyright Act, to be consistent with Article19.3 of the ICCPR. ...
Reidenberg, Governing Networks and Rule-Making in Cyberspace, in BORDERS IN CYBERSPACE: INFORMATION POLICY AND THE GLOBAL INFORMATION INFRASTRUCTURE 90-91 (Brian Kahin & Charles Nesson eds., 1997). ...
doi:10.5195/tlp.2013.131
fatcat:mvfbavfmm5gxdkl34c6jemwdhe
The Law and Economics of Internet Norms
2000
Social Science Research Network
Volokh for comments on an earlier draft, the participants in the Chicago-Kent Symposium on the Internet and Legal Theory and law and economics workshops at the Boalt Hall School of Law, University of California ...
at Berkeley, the Stanford Law School, and the USC Law Center for helping me to hone these ideas, and Ryan Garcia for research assistance. ...
Burk, The Market for Digital Piracy, in BORDERS IN CYBERSPACE: INFORMATION POLICY AND THE GLOBAL INFORMATION INFRASTRUCTURE 205, 227-28 (Brian Kahin & Charles Nesson eds., 1997) (arguing that the Internet ...
doi:10.2139/ssrn.197228
fatcat:nnl3zexfqjdzla4hiopkqdoxne
Trusted computing and the digital crime scene
2014
Digital Evidence and Electronic Signature Law Review
ARTICLE: This paper analyses the future of digital forensics in an environment where control is increasingly taken away from PC users and remotely managed by trusted third parties, typically to improve ...
Trusted Computing (TC) is used as the most developed example to illustrate some of the possible legal issues that arise. ...
Smith, 'International Regulation of Encryption: technology will drive policy', in Brian Kahin and Charles Nesson, eds, Borders in Cyberspace: Information Policy and the Global Information Infrastructure ...
doi:10.14296/deeslr.v8i0.1960
fatcat:gstantv2ybdtpnyh4qr2weu4cy
Copyright History and the Future: What's Culture Got to Do With It?
2000
Social Science Research Network
These rules interact with each other, as well as with other factors, such as market constraints, to generate ultimate results. 175 MATION INFRASTRUCTURE 84, 96-100 (Brian Kahin & Charles Nesson eds., 1997 ...
Nimmer, Licensing on the Global Information Infrastructure: Disharmony in Cyberspace, 16 NW. J. ...
doi:10.2139/ssrn.243115
fatcat:hlworc7esvhutanql3e57r3fjm
Application-Centered Internet Analysis
1999
Virginia law review
We use information technology and tools to increase productivity and facilitate new forms of scholarship. For more information about JSTOR, please contact support@jstor.org. ...
It is a battle of analogies: One side refers to Cyberspace as a place, while the other essentially equates the Internet and the telephone. ...
For a collection of some of these and other articles, see Borders in Cyberspace: Information Policy and the Global Information Infrastructure (Brian Kahin & Charles Nesson eds., 1997). ...
doi:10.2307/1073968
fatcat:qnuzppr2k5fxbbnhf5zcpoj65i
The Copyright Divide
2003
Social Science Research Network
Burk, The Market for Piracy, in BORDERS IN CYBERSPACE: INFORMATION POLICY AND THE GLOBAL INFORMATION INFRASTRUCTURE 205, 205 (Brian Kahin & Charles Nesson eds., 1997) [hereinafter BORDERS IN CYBERSPACE ...
, Global Use/Territorial Rights: Private International Law Questions of the Global Information Infrastructure, 42 J. ...
doi:10.2139/ssrn.460740
fatcat:43fbhj4ju5harg3o3be6xaxwrq
Literaturhinweise
1999
BIBLIOTHEK Forschung und Praxis
: digital collections: implications for users, funders, developers and maintainers/Ed. ...
Zusammengestellt von Dieter Schmidmaier (DS), Berlin, unter Mitarbeit von Monika Cremer, Göttingen. 1 Bibliothekswesen (allgemein und vergleichend) (78) ASIS '97 proceedings of the 60 th ASIS Annual Meeting ...
In: Library & Information science research 20 (1998) 2, S. 201-202. (132) Borders in Cyberspace: Information policy and the global Information infrastructure/Eds. Brian Kahin, Charles Nesson. ...
doi:10.1515/bfup.1999.23.2.248
fatcat:xtuf3nsdhbbb3km7v4whpw4lue
Cyber Security: DNS-CERT as a case for Securitization in Internet Governance
2012
unpublished
Also, this study tries to sharpen the Copenhagen school's concept of cyber securitization in that it specifies a four-layer model for cyberspace, including a physical, logical, content, and social layer ...
This shall be achieved by applying the Copenhagen school's concept of cyber securitization to the area of Internet governance (more precisely Domain Name System governance). ...
/ruling-
Kahin, Brian and Nesson Charles (eds.), Borders in cyberspace: information policy and the global information infrastructure, Cambridge, MIT Press, 1997. ...
doi:10.25365/thesis.18221
fatcat:foe2woaoj5dt7djeenaq2ds5ei