8.

And only theft. If you transferred the property for a different purpose — say, sold the property — then the feature wouldn't change.

9.

Compare Susan Brenner, 'The Privacy Privilege: Law Enforcement, Technology and the Constitution,' Journal of Technology Law and Policy 7 (2002): 123, 160. ('Pool tables in cyberspace do not require legs in this place where gravity does not exist'), citing Neal Stephenson, Snow Crash (New York: Bantam, 1992), 50 (in the Metaverse, tables only have tops, not legs).

10.

Jake Baker's given name was Abraham Jacob Alkhabaz, but he changed his name after his parents' divorce. See Peter H. Lewis, 'Writer Arrested After Sending Violent Fiction Over Internet,' New York Times, February 11, 1995, 10.

11.

The seven are comp, misc, news, rec, sci, soc, and talk. See Henry Edward Hardy, 'The History of the Net, v8.5,' September 28, 1993, available at http://www.eff.org/Net_culture/net.history.txt (cached: http://www.webcitation.org/5IwlZ2VhY).

12.

I have drawn from Jonathan Wallace and Mark Mangan's vivid account in Sex, Laws, and Cyberspace (New York: M&T Books, 1996), 63–81, though more interesting variations on this story circulate on the Net (I'm playing it safe).

13.

See United States v. Baker, 890 FSupp 1375, 1390 (EDMich 1995); see also Wallace and Mangan, Sex, Laws, and Cyberspace, 69–78.

14.

See Kurt Eichenwald, 'Through His Webcam, a Bot Joins a Sordid Online World,' New York Times , December 19, 2005, A1.

15.

See C. Anderson and B. Bushman, 'Effects of Violent Video Games on Aggressive Behavior, Aggressive Cognition, Aggressive Affect, Physiological Arousal, and Prosocial Behavior: A Meta-Analytic Review of the Scientific Literature,' Psychological Science 12(5) (2001): 353–359, available at http://www.psychology.iastate.edu/faculty/caa/abstracts/2000-2004/01AB.pdf (cached: http://www.webcitation.org/5IwlayUp8); Jonathan L. Freedman, Media Violence and Its Effect on Aggression (Toronto: Toronto University Press, 2002).

16.

See William J. Stuntz, 'The Substantive Origins of Criminal Procedure,' Yale Law Journal 105 (1995): 393, 406–7.

17.

See, for example, Thomas K. Clancy, 'The Role of Individualized Suspicion in Assess ing the Reasonableness of Searches and Seizures,' University of Memphis Law Review 25 (1995): 483, 632. 'Individualized suspicion . . . has served as a bedrock protection against unjustified and arbitrary police actions.'

18.

See United States v. Place, 462 US 696, 707 (1983).

19.

James Boyle, Shamans, Software, and Spleens: Law and the Construction of the Information Society (Cambridge, Mass.: Harvard University Press, 1996), 4.

20.

See Susan Freiwald, 'Uncertain Privacy: Communication Attributes After the Digital Telephony Act,' Southern California Law Review 69 (1996): 949, 951, 954.

21.

Cf. John Rogers, 'Bombs, Borders, and Boarding: Combatting International Terrorism at United States Airports and the Fourth Amendment,' Suffolk Transnational Law Review 20 (1997): 501, n.201.

22.

Вы читаете Code 2.0
Добавить отзыв
ВСЕ ОТЗЫВЫ О КНИГЕ В ИЗБРАННОЕ

0

Вы можете отметить интересные вам фрагменты текста, которые будут доступны по уникальной ссылке в адресной строке браузера.

Отметить Добавить цитату
×