Norms and the Emergence of Cooperation on the File-Swapping Networks,' 89
9.
Jay Kesan has offered a related, but more expansive analysis. See Jay P. Kesan and Rajiv C. Shah, 'Shaping Code,'
10.
See Michelle Armond, 'Regulating Conduct on the Internet: State Internet Regulation and the Dormant Commerce Clause,'
11.
See, for example, the policy of the Minnesota attorney general on the jurisdiction of Minnesota over people transmitting gambling information into the state; available at http://web.archive.org/web/20000816215338/http://www.ag.state.mn.us/home/consumer/consumernews/OnlineS cams/memo.html (cached: http://www.webcitation.org/5IwtqoSHt).
12.
See, for example,
13.
See Julian Dibbell, 'A Rape in Cyberspace,'
14.
Norms are something different — more directly regulating user behavior. See Daniel Benoliel,
15.
See, for example, 'AOL Still Suffering but Stock Price Rises,'
16.
USENET postings can be anonymous; see Henry Spencer and David Lawrence, Man aging USENET (Sebastopol, Cal.: O'Reilly and Associates, 1998), 366–67.
17.
Web browsers make this information available, both in real time and archived in a cookie file; see http://www.cookiecentral.com/faq.htm (cached: http://www.webcitation.org/5Iwtsr5Vb). They also permit users to turn this tracking feature off.
18.
PGP is a program to encrypt messages that is offered both commercially and free.
19.
Encryption, for example, is illegal in some international contexts; see Baker and Hurst,
20.
Mitchell,
21.
See Ethan Katsh, 'Software Worlds and the First Amendment,' 335, 340. 'If a compar ison to the physical world is necessary, one might say that the software designer is the architect, the builder, and the contractor, as well as the interior decorator.'
22.