You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Jonathan Zittrain argues that the Internet is on a path towards ruin. He argues that the Internet is losing 'generativity', the capacity to welcome unfiltered contributions from anyone, and offers a way for us to save this generative Internet.
Use this short secondary text with any torts casebook to give your students a demonstration of the practical dimensions to tort law alongside the doctrine they are already learning. The Torts Game is ingeniously designed to engage student interest as it reviews key topics. This new coursebook vividly illustrates the realities of tort law: uses a real world case involving Charles "Mean Joe" Greene to work through torts doctrines, exploring the dilemmas that confront attorneys provides four modules that address intentional tort, The interplay between intentional tort and negligence, employer liability and insurance dimensions of the case as it explores how these doctrines play out in practice ...
A law school casebook that maps the progression of the law of torts through the language and example of public judicial decisions in a range of cases. A tort is a wrong that a court is prepared to recognize, usually in the form of ordering the transfer of money (“damages”) from the wrongdoer to the wronged. The tort system offers recourse for people aggrieved and harmed by the actions of others. By filing a lawsuit, private citizens can demand the attention of alleged wrongdoers to account for what they’ve done—and of a judge and jury to weigh the claims and set terms of compensation. This book, which can be used as a primary text for a first-year law school torts course, maps the pr...
A study of Internet blocking and filtering around the world: analyses by leading researchers and survey results that document filtering practices in dozens of countries. Many countries around the world block or filter Internet content, denying access to information that they deem too sensitive for ordinary citizens—most often about politics, but sometimes relating to sexuality, culture, or religion. Access Denied documents and analyzes Internet filtering practices in more than three dozen countries, offering the first rigorously conducted study of an accelerating trend. Internet filtering takes place in more than three dozen states worldwide, including many countries in Asia, the Middle Ea...
Reports on a new generation of Internet controls that establish a new normative terrain in which surveillance and censorship are routine. Internet filtering, censorship of Web content, and online surveillance are increasing in scale, scope, and sophistication around the world, in democratic countries as well as in authoritarian states. The first generation of Internet controls consisted largely of building firewalls at key Internet gateways; China's famous “Great Firewall of China” is one of the first national Internet filtering systems. Today the new tools for Internet controls that are emerging go beyond mere denial of information. These new techniques, which aim to normalize (or even ...
The free and open source software movement, from its origins in hacker culture, through the development of GNU and Linux, to its commercial use today. In the 1980s, there was a revolution with far-reaching consequences—a revolution to restore software freedom. In the early 1980s, after decades of making source code available with programs, most programmers ceased sharing code freely. A band of revolutionaries, self-described “hackers,” challenged this new norm by building operating systems with source code that could be freely shared. In For Fun and Profit, Christopher Tozzi offers an account of the free and open source software (FOSS) revolution, from its origins as an obscure, margin...
Privacy is one of the most important concepts of our time, yet it is also one of the most elusive. As rapidly changing technology makes information increasingly available, scholars, activists, and policymakers have struggled to define privacy, with many conceding that the task is virtually impossible. In this concise and lucid book, Daniel J. Solove offers a comprehensive overview of the difficulties involved in discussions of privacy and ultimately provides a provocative resolution. He argues that no single definition can be workable, but rather that there are multiple forms of privacy, related to one another by family resemblances. His theory bridges cultural differences and addresses hist...
Experts examine censorship, surveillance, and resistance across Asia, from China and India to Malaysia and the Philippines. A daily battle for rights and freedoms in cyberspace is being waged in Asia. At the epicenter of this contest is China—home to the world's largest Internet population and what is perhaps the world's most advanced Internet censorship and surveillance regime in cyberspace. Resistance to China's Internet controls comes from both grassroots activists and corporate giants such as Google. Meanwhile, similar struggles play out across the rest of the region, from India and Singapore to Thailand and Burma, although each national dynamic is unique. Access Contested, the third v...
This volume brings together a group of contributors from varied backgrounds to tell a history of intellectual property in 50 objects.