You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Written on the occasion of copyright's 300th anniversary, John Tehranian's Infringement Nation presents an engaging and accessible analysis of the history and evolution of copyright law and its profound impact on the lives of ordinary individuals in the twenty-first century. Organized around the trope of the individual in five different copyright-related contexts - as an infringer, transformer, pure user, creator and reformer - the book charts the changing contours of our copyright regime and assesses its vitality in the digital age. In the process, Tehranian questions some of our most basic assumptions about copyright law by highlighting the unseemly amount of infringement liability an aver...
Americans are sharply divided on the issue of Internet censorship. This book examines the history of censorship in the United States as well as current federal, state, and local laws. It provides the opinions and perspectives of government and business leaders, activists, and ordinary Americans on both sides of the issue.
"Code counters the common belief that cyberspace cannot be controlled or censored. To the contrary, under the influence of commerce, cyberspace is becoming a highly regulable world where behavior will be much more tightly controlled than in real space."--Cover.
New ways to design spaces for online interaction—and how they will change society. Computers were first conceived as “thinking machines,” but in the twenty-first century they have become social machines, online places where people meet friends, play games, and collaborate on projects. In this book, Judith Donath argues persuasively that for social media to become truly sociable media, we must design interfaces that reflect how we understand and respond to the social world. People and their actions are still harder to perceive online than face to face: interfaces are clunky, and we have less sense of other people's character and intentions, where they congregate, and what they do. Donat...
Reports on a new generation of Internet controls that establish a new normative terrain in which surveillance and censorship are routine. Internet filtering, censorship of Web content, and online surveillance are increasing in scale, scope, and sophistication around the world, in democratic countries as well as in authoritarian states. The first generation of Internet controls consisted largely of building firewalls at key Internet gateways; China's famous “Great Firewall of China” is one of the first national Internet filtering systems. Today the new tools for Internet controls that are emerging go beyond mere denial of information. These new techniques, which aim to normalize (or even ...
This work explores the relationships between legal institutions and political and economic transformation. It argues that as law is enlisted to help produce the profound economic and sociotechnical shifts that have accompanied the emergence of the informational economy, it is changing in fundamental ways.
This book provides a comprehensive, authoritative, and state-of-the-art discussion of fundamental legal issues in intermediary liability online, while also describing advancement in intermediary liability theory and identifying recent policy trends.
Since its original publication in 1999, this foundational book has become a classic in its field. This second edition, Code Version 2.0, updates the work and was prepared in part through a wiki, a web site allowing readers to edit the text, making this the first reader-edited revision of a popular book. Code counters the common belief that cyberspace cannot be controlled or censored. To the contrary, under the influence of commerce, cyberspace is becoming a highly regulable world where behavior will be much more tightly controlled than in real space. We can - we must - choose what kind of cyberspace we want and what freedoms it will guarantee. These choices are all about architecture: what kind of code will govern cyberspace, and who will control it. In this realm, code is the most significant form of law and it is up to lawyers, policymakers, and especially average citizens to decide what values that code embodies. Publisher: Basic Books/Perseus.
"Code counters the common belief that cyberspace cannot be controlled or censored. To the contrary, under the influence of commerce, cyberspace is becoming a highly regulable world where behavior will be much more tightly controlled than in real space." -- Cover.
A biography of Tor—a cultural and technological history of power, privacy, and global politics at the internet's core. Tor, one of the most important and misunderstood technologies of the digital age, is best known as the infrastructure underpinning the so-called Dark Web. But the real “dark web,” when it comes to Tor, is the hidden history brought to light in this book: where this complex and contested infrastructure came from, why it exists, and how it connects with global power in intricate and intimate ways. In Tor: From the Dark Web to the Future of Privacy, Ben Collier has written, in essence, a biography of Tor—a cultural and technological history of power, privacy, politics, ...