Norms and the Emergence of Cooperation on the File-Swapping Networks,' 89 Virginia Law Review (2003), 505 (arguing that charismatic code creates an illusion of reciprocity that accounts for why people contribute to a filesharing network).

9.

Jay Kesan has offered a related, but more expansive analysis. See Jay P. Kesan and Rajiv C. Shah, 'Shaping Code,' Harvard Journal of Law and Technology 18 (2005): 319, 338.

10.

See Michelle Armond, 'Regulating Conduct on the Internet: State Internet Regulation and the Dormant Commerce Clause,' Berkeley Technology Law Journal 17 (2002): 379, 380.

11.

See, for example, the policy of the Minnesota attorney general on the jurisdiction of Minnesota over people transmitting gambling information into the state; available at http://web.archive.org/web/20000816215338/http://www.ag.state.mn.us/home/consumer/consumernews/OnlineS cams/memo.html (cached: http://www.webcitation.org/5IwtqoSHt).

12.

See, for example, Playboy Enterprises v. Chuckleberry Publishing, Inc., 939 FSupp 1032 (SDNY 1996); United States v. Thomas, 74 F3d 701 (6th Cir 1996); United States v. Miller, 166 F3d 1153 (11th Cir 1999); United States v. Lorge, 166 F3d 516 (2d Cir 1999); United States v. Whiting, 165 F3d 631 (8th Cir 1999); United States v. Hibbler, 159 F3d 233 (6th Cir 1998); United States v. Fellows, 157 F3d 1197 (9th Cir 1998); United States v. Simpson, 152 F3d 1241 (10th Cir 1998); United States v. Hall, 142 F3d 988 (7th Cir 1998); United States v. Hockings, 129 F3d 1069 (9th Cir 1997); United States v. Lacy, 119 F3d 742 (9th Cir 1997); United States v. Smith, 47 MJ 588 (CrimApp 1997); United States v. Ownby, 926 FSupp 558 (WDVa 1996).

13.

See Julian Dibbell, 'A Rape in Cyberspace,' Village Voice, December 23, 1993, 36.

14.

Norms are something different — more directly regulating user behavior. See Daniel Benoliel, Technological Standards, Inc.: Rethinking Cyberspace Regulative Epistemology , 92 California Law Review 1069, 1077 (2004).

15.

See, for example, 'AOL Still Suffering but Stock Price Rises,' Network Briefing, January 31, 1997; David S. Hilzenrath, '`Free' Enterprise, Online Style; AOL, CompuServe, and Prodigy Settle FTC Complaints,' Washington Post, May 2, 1997, G1; 'America Online Plans Better Information About Price Changes,' Wall Street Journal, May 29, 1998, B2; see also Swisher, Aol.com, 206–8.

16.

USENET postings can be anonymous; see Henry Spencer and David Lawrence, Man aging USENET (Sebastopol, Cal.: O'Reilly and Associates, 1998), 366–67.

17.

Web browsers make this information available, both in real time and archived in a cookie file; see http://www.cookiecentral.com/faq.htm (cached: http://www.webcitation.org/5Iwtsr5Vb). They also permit users to turn this tracking feature off.

18.

PGP is a program to encrypt messages that is offered both commercially and free.

19.

Encryption, for example, is illegal in some international contexts; see Baker and Hurst, The Limits of Trust, 130–36.

20.

Mitchell, City of Bits, 159.

21.

See Ethan Katsh, 'Software Worlds and the First Amendment,' 335, 340. 'If a compar ison to the physical world is necessary, one might say that the software designer is the architect, the builder, and the contractor, as well as the interior decorator.'

22.

Вы читаете Code 2.0
Добавить отзыв
ВСЕ ОТЗЫВЫ О КНИГЕ В ИЗБРАННОЕ

0

Вы можете отметить интересные вам фрагменты текста, которые будут доступны по уникальной ссылке в адресной строке браузера.

Отметить Добавить цитату
×