附註:Includes bibliographical references (pages 365-436) and index.
1. Controlling the Internet : is anyone in charge? -- 2. Just how different is cyberspace? -- 3. Is there really a problem here? Sorting out categories of allegedly problematic conduct -- 4. The inherent limits of our legal system -- 5. The traditional regulation model -- 6. International models of agreement and cooperation -- 7. Changing the architecture of the Internet : code-based regulation and its implications -- 8. Charting a roadmap for prospective regulation -- 9. Combating dangerous conduct in cyberspace : a focus on cyberterrorism -- 10. Combating fraudulent conduct in cyberspace : a focus on consumer rights -- 11. Coming to terms with unlawfulanarchic conduct in cyberspace : a focus on private digital copying by the average netizen -- 12. Confronting inappropriate conduct in cyberspace : online hate and the inherent limits of the law -- Conclusion.
摘要:This book provides a framework for thinking about the law and cyberspace, examining the extent to which the Internet is currently under control and the extent to which it can or should be controlled. It focuses in part on the proliferation of MP3 file sharing, a practice made possible by the development of a file format that enables users to store large audio files with near-CD sound quality on a computer. By 1998, software available for free on the Web enabled users to copy existing digital files from CDs. Later technologies such as Napster and Gnutella allowed users to exchange MP3 files in cyberspace without having to post anything online. This ability of online users to download free music caused an uproar among music executives and many musicians, as well as a range of much-discussed legal action. Regulation strategies identified and discussed include legislation, policy changes, administrative agency activity, international cooperation, architectural changes, private ordering, and self-regulation. The book also applies major regulatory models to some of the most volatile Internet issues, including cyber-security, consumer fraud, free speech rights, intellectual property rights, and file-sharing programs.