Difference between revisions of "11. The Battle Over the Institutional Ecology of the Digital Environment"

From Yochai Benkler - Wealth of Networks
Jump to navigation Jump to search
 
m
Line 28: Line 28:
  
 
==Sources==
 
==Sources==
===[[Sources cited in the chapter]]===
+
===Sources cited in the chapter===
===[[Other relevant readings]]===
+
===Other relevant readings===
 
==Case Studies==
 
==Case Studies==
===[[Supporting examples]]===
+
===Supporting examples===
===[[Counter-examples]]===
+
===Counter-examples===
 
==Key Concepts==
 
==Key Concepts==

Revision as of 01:17, 1 April 2006

Summary of the chapter

Overview

Institutional Ecology and Path Dependence

The Physical Layer

Transport: Wires and Wireless

Devices

The Logical Layer

The Digital Millennium Copyright Act of 1998

The Battle over Peer-to-Peer Networks

The Domain Name System: From Public Trust to the Fetishism of Mnemonics

The Browser Wars

Free Software

The Content Layer

Copyright

Contractual Enclosure: Click-Wrap Licenses and the Uniform Computer Information Transactions Act (UCITA

Trademark Dilution

Database Protection

Linking and Trespass to Chattels: New Forms of Information Exclusivity

International "Harmonization"

Countervailing Forces

The Problem of Security

Sources

Sources cited in the chapter

Other relevant readings

Case Studies

Supporting examples

Counter-examples

Key Concepts