11. The Battle Over the Institutional Ecology of the Digital Environment: Difference between revisions

From Yochai Benkler - Wealth of Networks
Jump to navigation Jump to search
m (Reverted edit of XvgYxs, changed back to last version by Ptj)
 
(10 intermediate revisions by 7 users not shown)
Line 1: Line 1:
===[http://www.benkler.org/Benkler_Wealth_Of_Networks_Chapter_11.pdf Download the full chapter here]===
&uarr; [[Table of Contents]]<br />
&larr; [[Part Three|Part Three]] | [[12. Conclusion: The Stakes of Information Law and Policy|Chapter 12]] &rarr;


==Summary of the chapter==
== Content ==
 
* [http://www.benkler.org/Benkler_Wealth_Of_Networks_Chapter_11.pdf Full text (PDF)]
* [[Sentence-sliced Text Chapter 11|Full text, sentence-sliced (wiki)]]
 
== Summary ==


===Overview===
===Overview===
Line 9: Line 15:
===The Physical Layer===
===The Physical Layer===
====Transport: Wires and Wireless====
====Transport: Wires and Wireless====
[[Recent Developments in Broadband Regulation]]
====Devices====
====Devices====


Line 30: Line 39:


===The Problem of Security===
===The Problem of Security===
 
[[Wireless Network Security Concerns]]
==Sources==
==Sources==
===Sources cited in the chapter===
===Sources cited in the chapter===
Line 38: Line 47:
===Counter-examples===
===Counter-examples===
==Key Concepts==
==Key Concepts==
==Critiques and Commentary==
[http://www.benkler.org/wealth_of_networks/index.php/A_Critique_of_Benkler%27s_Argument_for_a_Commons-Based_Content_Layer A Critique of Benkler's Argument for a Commons-Based Content Layer]

Latest revision as of 06:16, 18 August 2007

Table of Contents
Part Three | Chapter 12

Content

Summary

Overview

Institutional Ecology and Path Dependence

The Physical Layer

Transport: Wires and Wireless

Recent Developments in Broadband Regulation

Devices

A Perspective on Limiting Device Functionality

The Logical Layer

The Digital Millennium Copyright Act of 1998

The Battle over Peer-to-Peer Networks

The Domain Name System: From Public Trust to the Fetishism of Mnemonics

The Browser Wars

Free Software

The Content Layer

Copyright

Contractual Enclosure: Click-Wrap Licenses and the Uniform Computer Information Transactions Act (UCITA

Trademark Dilution

Database Protection

Linking and Trespass to Chattels: New Forms of Information Exclusivity

International "Harmonization"

Countervailing Forces

The Problem of Security

Wireless Network Security Concerns

Sources

Sources cited in the chapter

Other relevant readings

Case Studies

Supporting examples

Counter-examples

Key Concepts

Critiques and Commentary

A Critique of Benkler's Argument for a Commons-Based Content Layer