Communications of the ACM - Digital rights management
PHEmail: designing a privacy honoring email system
CHI '03 Extended Abstracts on Human Factors in Computing Systems
How DRM-based content delivery systems disrupt expectations of "personal use"
Proceedings of the 3rd ACM workshop on Digital rights management
There's No Such Thing as a Free (Software) Lunch
Queue - Open Source
Digital citizenship: parameters of the digital divide
dg.o '03 Proceedings of the 2003 annual national conference on Digital government research
Privacy, identity and security in ambient intelligence: a scenario analysis
Telematics and Informatics
Free software and the political philosophy of the cyborg world
ACM SIGCAS Computers and Society - Selected papers from CEPE 2007: The Seventh International Conference on Computer Ethics -- philosophical enquiry
Sensitive Data Transaction in Hippocratic Multi-Agent Systems
Engineering Societies in the Agents World IX
Privacy and artificial agents, or, is Google reading my email?
IJCAI'07 Proceedings of the 20th international joint conference on Artifical intelligence
Social networking: the new computer fluency?
Proceedings of the 41st ACM technical symposium on Computer science education
Split-and-delegate: threshold cryptography for the masses
FC'02 Proceedings of the 6th international conference on Financial cryptography
The search for a research method for studying OSS process innovation
Empirical Software Engineering
BCS '10 Proceedings of the 24th BCS Interaction Specialist Group Conference
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
Software development environments on the web: a research agenda
Proceedings of the ACM international symposium on New ideas, new paradigms, and reflections on programming and software
Work-to-rule: the emergence of algorithmic governance in Wikipedia
Proceedings of the 6th International Conference on Communities and Technologies
Hi-index | 0.00 |
From the Publisher:Should cyberspace be regulated? How can it be done? It's a cherished belief of techies and net denizens everywhere that cyberspace is fundamentally impossible to regulate. Harvard Professor Lawrence Lessig warns that, if we're not careful we'll wake up one day to discover that the character of cyberspace has changed from under us. Cyberspace will no longer be a world of relative freedom; instead it will be a world of perfect control where our identities, actions, and desires are monitored, tracked, and analyzed for the latest market research report. Commercial forces will dictate the change, and architecturethe very structure of cyberspace itselfwill dictate the form our interactions can and cannot take. Code And Other Laws of Cyberspace is an exciting examination of how the core values of cyberspace as we know itintellectual property, free speech, and privacy-are being threatened and what we can do to protect them. Lessig shows how codethe architecture and law of cyberspacecan make a domain, site, or network free or restrictive; how technological architectures influence people's behavior and the values they adopt; and how changes in code can have damaging consequences for individual freedoms. Code is not just for lawyers and policymakers; it is a must-read for everyone concerned with survival of democratic values in the Information Age.