Difference between revisions of "11. The Battle Over the Institutional Ecology of the Digital Environment"

From Yochai Benkler - Wealth of Networks
Jump to navigation Jump to search
m (Reverted edit of XvgYxs, changed back to last version by Ptj)
(8 intermediate revisions by 6 users not shown)
Line 1: Line 1:
===[http://www.benkler.org/Benkler_Wealth_Of_Networks_Chapter_11.pdf Download the full chapter here]===
&uarr; [[Table of Contents]]<br />
&larr; [[Part Three|Part Three]] | [[12. Conclusion: The Stakes of Information Law and Policy|Chapter 12]] &rarr;
==Summary of the chapter==
== Content ==
* [http://www.benkler.org/Benkler_Wealth_Of_Networks_Chapter_11.pdf Full text (PDF)]
* [[Sentence-sliced Text Chapter 11|Full text, sentence-sliced (wiki)]]
== Summary ==
Line 33: Line 39:
===The Problem of Security===
===The Problem of Security===
[[Wireless Network Security Concerns]]
===Sources cited in the chapter===
===Sources cited in the chapter===
Line 42: Line 48:
==Key Concepts==
==Key Concepts==
==Critiques and Commentary==
==Critiques and Commentary==
[http://www.benkler.org/wealth_of_networks/index.php/A_Critique_of_Benkler%27s_Argument_for_a_Commons-Based_Content_Layer A Critique of Benkler's Argument for a Commons-Based Content Layer]

Latest revision as of 10:16, 18 August 2007

Table of Contents
Part Three | Chapter 12




Institutional Ecology and Path Dependence

The Physical Layer

Transport: Wires and Wireless

Recent Developments in Broadband Regulation


A Perspective on Limiting Device Functionality

The Logical Layer

The Digital Millennium Copyright Act of 1998

The Battle over Peer-to-Peer Networks

The Domain Name System: From Public Trust to the Fetishism of Mnemonics

The Browser Wars

Free Software

The Content Layer


Contractual Enclosure: Click-Wrap Licenses and the Uniform Computer Information Transactions Act (UCITA

Trademark Dilution

Database Protection

Linking and Trespass to Chattels: New Forms of Information Exclusivity

International "Harmonization"

Countervailing Forces

The Problem of Security

Wireless Network Security Concerns


Sources cited in the chapter

Other relevant readings

Case Studies

Supporting examples


Key Concepts

Critiques and Commentary

A Critique of Benkler's Argument for a Commons-Based Content Layer