Beyond Our Control?: Confronting the Limits of Our Legal System in the Age of Cyberspace
This book provides a framework for thinking about the law and cyberspace, examining the extent to which the Internet is currently under control and the extent to which it can or should be controlled. It focuses in part on the proliferation of MP3 file sharing, a practice made possible by the development of a file format that enables users to store large audio files with near-CD sound quality on a computer. By 1998, software available for free on the Web enabled users to copy existing digital files from CDs. Later technologies such as Napster and Gnutella allowed users to exchange MP3 files in cyberspace without having to post anything online. This ability of online users to download free music caused an uproar among music executives and many musicians, as well as a range of much-discussed legal action.Regulation strategies identified and discussed include legislation, policy changes, administrative agency activity, international cooperation, architectural changes, private ordering, and self-regulation. The book also applies major regulatory models to some of the most volatile Internet issues, including cyber-security, consumer fraud, free speech rights, intellectual property rights, and file-sharing programs.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Just How Different Is Cyberspace?
Is There Really a Problem Here? Sorting Out Categories of Allegedly Problematic Conduct
The Inherent Limits of Our Legal System
The Traditional Regulation Model Applying Existing Rules and Developing New Legal Frameworks at the Individual Country Level
International Models of Agreement and Cooperation
Changing the Architecture of the Internet CodeBased Regulation and Its Implications
Combating Dangerous Conduct in Cyberspace A Focus on Cyberterrorism
Combating Fraudulent Conduct in Cyberspace A Focus on Consumer Rights
Coming to Terms with Unlawful Anarchic Conduct in Cyberspace A Focus on Private Digital Copying by the Average Netizen
Confronting Inappropriate Conduct in Cyberspace Online Hate and the Inherent Limits of the Law
Charting a Roadmap for Prospective Regulation
Other editions - View all
Beyond Our Control?: Confronting the Limits of Our Legal System in the Age ...
No preview available - 2001
ACLU activity addition agreement Amendment architecture arguably argued attacks basic behavior chapter commerce Communications Decency Act companies CompuServe conduct consensus consumer context continue copying copyright law criminal cyber cyberspace cyberterrorism defendants disputes domain name system downloading e-commerce e-mail electronic example federal files focusing fraud global Gnutella groups hackers harassment hate-related ICANN identified impact individual infringement intellectual property Internet Internet service providers Internet-related ISPs issues Journal jurisdiction law enforcement Law Review Lawrence Lessig lawsuit legal system legislation Lessig limits ment Napster NET Act Netizens offline online users online world particular persons pornography problem prohibited protection regarding regulation regulatory Reno restrictions rules social contract social norms speech statute supra TCP/IP tion typically U.S. Congress U.S. Supreme Court visited