Code and Other Laws of Cyberspace
There’s a common belief that cyberspace cannot be regulated—that it is, in its very essence, immune from the government’s (or anyone else’s) control.Codeargues that this belief is wrong. It is not in the nature of cyberspace to be unregulable; cyberspace has no “nature.” It only has code—the software and hardware that make cyberspace what it is. That code can create a place of freedom—as the original architecture of the Net did—or a place of exquisitely oppressive control.If we miss this point, then we will miss how cyberspace is changing. Under the influence of commerce, cyberpsace is becoming a highly regulable space, where our behavior is much more tightly controlled than in real space.But that’s not inevitable either. We can—we must—choose what kind of cyberspace we want and what freedoms we will guarantee. These choices are all about architecture: about what kind of code will govern cyberspace, and who will control it. In this realm, code is the most significant form of law, and it is up to lawyers, policymakers, and especially citizens to decide what values that code embodies.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Four Puzzles from Cyberspace
10 other sections not shown
American architecture argued argument Avatar space balance chapter choice citizens Clipper Chip Coast Code commerce Congress constitutional constraint context copy copyright law cost Court Cryptography cyberspace democracy described disabled effect Electronic enable encryption example federal filtering Fourth Amendment framers free speech gambling government's Hal Abelson Harvard idea important individuals intellectual property Internet Jake John Perry Barlow Larry Lessig latent ambiguity Law Journal Law Review Lawrence Lessig lawyers Lessig liberty limited live machine ment monitoring norms open code open source Pamela Samuelson Pentagon Papers political porn Post problem protection protocol question real space real-space regime require rules sense server simply social story structures TCP/IP threat tion Transparent Society trusted systems United users values visited May 30 Yochai Benkler York