Difference between revisions of "11. The Battle Over the Institutional Ecology of the Digital Environment"

From Yochai Benkler - Wealth of Networks
Jump to navigation Jump to search
m
m (Reverted edit of XvgYxs, changed back to last version by Imres)
Line 1: Line 1:
 +
&uarr; [[Table of Contents]]<br />
 +
&larr; [[Part Three|Part Three]] | [[12. Conclusion: The Stakes of Information Law and Policy|Chapter 12]] &rarr;
  
 +
== Content ==
 +
 +
* [http://www.benkler.org/Benkler_Wealth_Of_Networks_Chapter_11.pdf Full text (PDF)]
 +
* [[Sentence-sliced Text Chapter 11|Full text, sentence-sliced (wiki)]]
 +
 +
== Summary ==
 +
 +
===Overview===
 +
 +
===Institutional Ecology and Path Dependence===
 +
 +
===The Physical Layer===
 +
====Transport: Wires and Wireless====
 +
 +
[[Recent Developments in Broadband Regulation]]
 +
 +
====Devices====
 +
 +
[[A Perspective on Limiting Device Functionality]]
 +
 +
===The Logical Layer===
 +
====The Digital Millennium Copyright Act of 1998====
 +
====The Battle over Peer-to-Peer Networks====
 +
====The Domain Name System: From Public Trust to the Fetishism of Mnemonics====
 +
====The Browser Wars====
 +
====Free Software====
 +
 +
===The Content Layer===
 +
====Copyright====
 +
====Contractual Enclosure: Click-Wrap Licenses and the Uniform Computer Information Transactions Act (UCITA====
 +
====Trademark Dilution====
 +
====Database Protection====
 +
====Linking and Trespass to Chattels: New Forms of Information Exclusivity====
 +
====International "Harmonization"====
 +
====Countervailing Forces====
 +
 +
===The Problem of Security===
 +
[[Wireless Network Security Concerns]]
 +
==Sources==
 +
===Sources cited in the chapter===
 +
===Other relevant readings===
 +
==Case Studies==
 +
===Supporting examples===
 +
===Counter-examples===
 +
==Key Concepts==
 +
==Critiques and Commentary==
 +
[http://www.benkler.org/wealth_of_networks/index.php/A_Critique_of_Benkler%27s_Argument_for_a_Commons-Based_Content_Layer A Critique of Benkler's Argument for a Commons-Based Content Layer]

Revision as of 17:29, 20 June 2007

Table of Contents
Part Three | Chapter 12

Content

Summary

Overview

Institutional Ecology and Path Dependence

The Physical Layer

Transport: Wires and Wireless

Recent Developments in Broadband Regulation

Devices

A Perspective on Limiting Device Functionality

The Logical Layer

The Digital Millennium Copyright Act of 1998

The Battle over Peer-to-Peer Networks

The Domain Name System: From Public Trust to the Fetishism of Mnemonics

The Browser Wars

Free Software

The Content Layer

Copyright

Contractual Enclosure: Click-Wrap Licenses and the Uniform Computer Information Transactions Act (UCITA

Trademark Dilution

Database Protection

Linking and Trespass to Chattels: New Forms of Information Exclusivity

International "Harmonization"

Countervailing Forces

The Problem of Security

Wireless Network Security Concerns

Sources

Sources cited in the chapter

Other relevant readings

Case Studies

Supporting examples

Counter-examples

Key Concepts

Critiques and Commentary

A Critique of Benkler's Argument for a Commons-Based Content Layer