Overview of the virtual data center project and software
Proceedings of the 1st ACM/IEEE-CS joint conference on Digital libraries
DRM: doesn't really mean digital copyright management
Proceedings of the 9th ACM conference on Computer and communications security
Telematics and Informatics - Special issue: Regulating the internet: EU and US perspectives
BT Technology Journal
Code and moral values in cyberspace
Ethics and Information Technology
Facing the future: Seeking ethics foreveryday surveillance
Ethics and Information Technology
Cookies, web bugs, webcams and cue cats: Patterns of surveillance on the world wide web
Ethics and Information Technology
Lex genetica: The law and ethics of programmingbiological code
Ethics and Information Technology
ACM Transactions on Internet Technology (TOIT)
Information Services and Use - Special issue on ICSTI/CODATA/ICSU seminar on preserving the record of science
From Copyright to Information Law - Implications of Digital Rights Management
DRM '01 Revised Papers from the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management
Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing
UbiComp '02 Proceedings of the 4th international conference on Ubiquitous Computing
Overcoming organizational barriers to web accessibility in higher education: a case study
Design and implementation of web-enabled teaching tools
Personal information privacy and the internet: issues, challenges and solutions
Managing the human side of information technology
Masks: Bringing Anonymity and Personalization Together
IEEE Security and Privacy
The future of intellectual property
Ethics and Information Technology
Simulation and augmentation: Issues of wearable computers
Ethics and Information Technology
Digital divide or discursive design? On the emerging ethics of information space
Ethics and Information Technology
Journal of the American Society for Information Science and Technology
Toward an information technology research agenda for public administration
Public information technology
Privacy in the global e-village
Communications of the ACM - Information cities
Digital government and citizen participation in international context
Digital government
Privacy risk models for designing privacy-sensitive ubiquitous computing systems
DIS '04 Proceedings of the 5th conference on Designing interactive systems: processes, practices, methods, and techniques
Communications of the ACM - Voting systems
Intellectual property aspects of web publishing
Proceedings of the 22nd annual international conference on Design of communication: The engineering of quality documentation
European Journal of Information Systems
Looking to the Internet for models of governance
Ethics and Information Technology
Beyond the ballot box: computer science education and social responsibility
Working group reports from ITiCSE on Innovation and technology in computer science education
Canning Spam: Proposed Solutions to Unwanted Email
IEEE Security and Privacy
DRMS, TCP and the EUCD: technology and law
Telematics and Informatics - Special issue: Copyright: rights-holders, users and innovators
Governance characteristics of information technology
dg.o '05 Proceedings of the 2005 national conference on Digital government research
Sexual harassment on the internet
Social Science Computer Review - Deviance and the internet: New challenges for social science
Defining grief play in MMORPGs: player and developer perceptions
Proceedings of the 2004 ACM SIGCHI International Conference on Advances in computer entertainment technology
Ethical design issues in cyberspace
WISICT '05 Proceedings of the 4th international symposium on Information and communication technologies
Tussle in cyberspace: defining tomorrow's internet
IEEE/ACM Transactions on Networking (TON)
Encyclopedia of Computer Science
Communications of the ACM - Special issue: RFID
Keeping ubiquitous computing to yourself: a practical model for user control of privacy
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Becoming Wikipedian: transformation of participation in a collaborative online encyclopedia
GROUP '05 Proceedings of the 2005 international ACM SIGGROUP conference on Supporting group work
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Property rights, legal issues, and business models in virtual world communities
Electronic Commerce Research
Policy through software defaults
dg.o '06 Proceedings of the 2006 international conference on Digital government research
'Rough Consensus and Running Code' and the Internet-OSI Standards War
IEEE Annals of the History of Computing
Legal research topics within services sciences
CASCON '06 Proceedings of the 2006 conference of the Center for Advanced Studies on Collaborative research
Web Dragons: Inside the Myths of Search Engine Technology
Web Dragons: Inside the Myths of Search Engine Technology
A game design methodology to incorporate social activist themes
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Controlling the net: European approaches to content and access regulation
Journal of Information Science
Digital copyright and value added information services
Information Services and Use
The impact of sponsored results on the quality of information gatekeepers
Proceedings of the ninth international conference on Electronic commerce
RFID, privacy and the perception of risk: A strategic framework
The Journal of Strategic Information Systems
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Electronic Commerce and Organizational Innovation: Aspects and Opportunities
International Journal of Electronic Commerce
Foundations and Trends in Web Science
Computers as Ethical Artifacts
IEEE Annals of the History of Computing
End-user privacy in human-computer interaction
Foundations and Trends in Human-Computer Interaction
Managing legal risks associated with intellectual property on the web
International Journal of Business Information Systems
Legal research topics in user-centric services
IBM Systems Journal
Learning management systems as an ambient intelligence playground
International Journal of Web Based Communities
An enquiry into the ethical efficacy of the use of radio frequency identification technology
Ethics and Information Technology
Democratic and Anti-Democratic Regulators of the Internet: A Framework
The Information Society
A Cross-National Study of Computer News Sites: Global News, Local Sites
The Information Society
Just how risky is online voting?
Information Polity - Public Administration in the Information Society: Essays in Risk and Trust
Fences and gates in cyberspace: Is the Internet becoming a threat to democracy?
Information Polity - Public Administration in the Information Society: Essays in Risk and Trust
Information Polity - Public Administration in the Information Society: Essays in Risk and Trust
Proceedings of the 3rd international conference on Digital Interactive Media in Entertainment and Arts
Design with Intent: Persuasive Technology in a Wider Context
PERSUASIVE '08 Proceedings of the 3rd international conference on Persuasive Technology
Back to the future: digital decision making
Information and Communications Technology Law
Security in Distributed Applications
Advances in Software Engineering
Proceedings of the 40th ACM technical symposium on Computer science education
Policy and Legal Challenges of VirtualWorlds and Social Network Sites
RELAW '08 Proceedings of the 2008 Requirements Engineering and Law
Remarks on ubiquitous intelligent supportive spaces
CIS'09 Proceedings of the international conference on Computational and information science 2009
Convivial software: an end-user perspective on free and open source software
Ethics and Information Technology
Practical versus moral identities in identity management
Ethics and Information Technology
Cognitive automata and the law: electronic contracting and the intentionality of software agents
Artificial Intelligence and Law
Privacy-enhancing technologies for the internet, II: five years later
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Information Communication Technologies and Framing for Backfire in the Digital Rights Movement
Social Science Computer Review
ACM SIGCAS Computers and Society - Selected Papers from ETHICOMP 2010
Enriching textbooks through data mining
Proceedings of the First ACM Symposium on Computing for Development
Interagency data exchange protocols as computational data protection law
Proceedings of the 2010 conference on Legal Knowledge and Information Systems: JURIX 2010: The Twenty-Third Annual Conference
Privacy-enhancing identity management in business
Digital privacy
Non-interactive distributed encryption: a new primitive for revocable privacy
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society
Ethics and Information Technology
Privacy, reputation, and trust: some implications for data protection
iTrust'06 Proceedings of the 4th international conference on Trust Management
Repair worlds: maintenance, repair, and ICT for development in rural Namibia
Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work
Towards a theory of online social rights
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
Communications of the ACM
The thinking eye is only half the story: high-level semantic video surveillance
Information Polity - Special issue on Part 1: Revisiting the Surveillance Camera Revolution: Issues of Governance and Public Policy
Pools, clubs and security: designing for a party not a person
Proceedings of the 2012 workshop on New security paradigms
Mining for Norms in Clouds: Complying to Ethical Communication through Cloud Text Data Mining
UCC '12 Proceedings of the 2012 IEEE/ACM Fifth International Conference on Utility and Cloud Computing
Gandhigiri in cyberspace: a novel approach to information ethics
ACM SIGCAS Computers and Society
Cracking down on autonomy: three challenges to design in IT Law
Ethics and Information Technology
Are computers merely "supporting" cooperative work: towards an ethnography of bot development
Proceedings of the 2013 conference on Computer supported cooperative work companion
Getting Real About Virtual Worlds: A Review
International Journal of Virtual Communities and Social Networking
International Journal of Applied Logistics
Survey on governance of user-generated content in web communities
Proceedings of the 3rd International Web Science Conference
International Journal of Applied Logistics
Privacy intrusiveness and web audiences: Empirical evidence
Telecommunications Policy
International Journal of Information Retrieval Research
Hi-index | 0.02 |
From the Publisher:Should cyberspace be regulated? How can it be done? It's a cherished belief of techies and net denizens everywhere that cyberspace is fundamentally impossible to regulate. Harvard Professor Lawrence Lessig warns that, if we're not careful we'll wake up one day to discover that the character of cyberspace has changed from under us. Cyberspace will no longer be a world of relative freedom; instead it will be a world of perfect control where our identities, actions, and desires are monitored, tracked, and analyzed for the latest market research report. Commercial forces will dictate the change, and architecturethe very structure of cyberspace itselfwill dictate the form our interactions can and cannot take. Code And Other Laws of Cyberspace is an exciting examination of how the core values of cyberspace as we know itintellectual property, free speech, and privacy-are being threatened and what we can do to protect them. Lessig shows how codethe architecture and law of cyberspacecan make a domain, site, or network free or restrictive; how technological architectures influence people's behavior and the values they adopt; and how changes in code can have damaging consequences for individual freedoms. Code is not just for lawyers and policymakers; it is a must-read for everyone concerned with survival of democratic values in the Information Age.