11. The Battle Over the Institutional Ecology of the Digital Environment: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
(adding some controls and sentence-sliced format) |
||
Line 1: | Line 1: | ||
↑ [[Table of Contents]]<br /> | |||
← [[Part Three|Part Three]] | [[12. Conclusion: The Stakes of Information Law and Policy|Chapter 12]] → | |||
==Summary | == Content == | ||
* [http://www.benkler.org/Benkler_Wealth_Of_Networks_Chapter_11.pdf Full text (PDF)] | |||
* [[Sentence-sliced Text Chapter 11|Full text, sentence-sliced (wiki)]] | |||
== Summary == | |||
===Overview=== | ===Overview=== |
Revision as of 21:22, 24 September 2006
↑ Table of Contents
← Part Three | Chapter 12 →
Content
Summary
Overview
Institutional Ecology and Path Dependence
The Physical Layer
Transport: Wires and Wireless
Recent Developments in Broadband Regulation
Devices
A Perspective on Limiting Device Functionality
The Logical Layer
The Digital Millennium Copyright Act of 1998
The Battle over Peer-to-Peer Networks
The Domain Name System: From Public Trust to the Fetishism of Mnemonics
The Browser Wars
Free Software
The Content Layer
Copyright
Contractual Enclosure: Click-Wrap Licenses and the Uniform Computer Information Transactions Act (UCITA
Trademark Dilution
Database Protection
Linking and Trespass to Chattels: New Forms of Information Exclusivity
International "Harmonization"
Countervailing Forces
The Problem of Security
Wireless Network Security Concerns
Sources
Sources cited in the chapter
Other relevant readings
Case Studies
Supporting examples
Counter-examples
Key Concepts
Critiques and Commentary
A Critique of Benkler's Argument for a Commons-Based Content Layer