Code & Other Laws of Cyberspace Reviewed by Thuy Nguyen November 17 th 2005 By Lawrence Lessig.

Slides:



Advertisements
Similar presentations
To plagiarize or not plagiarize? That is the question.
Advertisements

TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 2: Legislating Privacy: Your Rights.
Democrats vs. Republicans: Both Sides
1 CS 501 Spring 2003 CS 501: Software Engineering Lecture 6 Legal Aspects of Software Engineering II.
IGE105 – Communication Technology in a Changing World Dr. Ken Cosh Week 10.
An Endnote on Regulating Cyberspace: Architecture vs Law Author: Graham Greenleaf. Presented by: Oliver Bannatyne, 28 th May 2002.
Chapter 3: American Free Enterprise Section 1
Ethics and Information in the Digital Age Rafael Capurro University of Applied Sciences, Germany LIDA 2001, Dubrovnik, Croatia, May, 2001.
Cambridge, July 1, “unregulable” (1) what things regulate.
HLS, July 3, free speech regulate speech.
Privacy Chris Kelly iLaw July 5, 2002.
IP3 The Future of Ideas. What is Property? We are in the midst of an unprecedented technological revolution Technological change implies cultural change.
Computers in Society The Computer Industry: Open Source.
Framework for Global Electronic Commerce Communications 411 Relevant Site:
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 12-1© 2007 Prentice-Hall, Inc ELC 200 Day 19.
The Laws of Cyberspace Larry Lessig. Introductory Story Before Russian Revolution Tsar had system of internal passports which marked estate you came from.
Juan Van-Halen DIRECTOR GENERAL HOUSING AND REHABILITATION MADRID REGION NEW IDEAS ON AFFORDABLE HOUSING.
UNIT 2: CONTEXT. Chapter 3: Ethics & Social Responsibility.
LEVADA-CENTERLEVADA-CENTER “From opinions to understanding” LEVADA-CENTERLEVADA-CENTER.
© 2014 Cengage Learning. All Rights Reserved
Teaching the Ethics of Information and Information Technology Emily Miller-Francisco Southern Oregon University Online Northwest January 21, 2005 
Chapter 17.3 Regulating the Internet. Internet Speech ► Free speech is a key democratic right. The Internet promotes free speech by giving all users a.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
STATE UNIVERSITY FOR LIBRARY STUDIES AND INFORMATION TECHNOLOGIES INTELLECTUAL PROPERTY OF INFORMATION RESOURCES ON THE INTERNET. Assist.Prof. Tereza Trencheva.
CYBERLAW 2002 Professor Susanna Frederick Fischer Class One: Introduction August 26, 2002.
Digital Citizenship - Framework for Teaching Digital Citizenship Mike Ribble Instructional Services Coordinator College of Education Kansas State University.
Lessig – Code and the Future of Ideas. Code – Intellectual Property Optimal is mix between public and private spaces Many agents can use cyberspace -
Economics: American Free Enterprise Chapter 2 Section 1.
CS 501: Software Engineering Fall 1999 Lecture 19 Management II Business and legal aspects of software engineering.
ETHICS and COMPUTERS An Overview 23/04/2017.
CODE OF CONDUCT TRAINING. We conduct our global business honestly, ethically and legally, believing that good ethics is good business. The Company’s Philosophy.
Ethics and Cultures Difference in International Business Week 2 Introduction to International Business.
Safe European Home? do we need a closed European Internet? Bill Thompson | School of Information Management Information and Society.
Methods of Internet Regulation. Areas of Concern National Security –Bomb-making, drugs, terrorism Protection of Minors –Violence, pornography Protection.
Public Opinion, Political Ideology & Political Socialization Ch. 11.
Computer Ethics Chapter 14 – Computers: Understanding Technology.
Quiz 10/6 Give one way that power is separated in America. Give one power of the federal government. Give one power of the state government. Give one concurrent.
AUTHORS RIGHTS Hilton Gibson 14th International Symposium on Electronic Theses and Dissertations Paper Session 1A - Publishing and Plagiarism, Pavilion.
Chapter 7 Impact of Information Technology. Agenda Shneiderman’s Plagues of the Information era Ethics Issues Corporate Code of IT Ethics Other Impacts.
Copyright © 2004 Pearson Education, Inc. Slide 9-1 Chapter 9 Ethical, Social, and Political Issues in E-commerce.
Copyright Clarity Project Clearing the Confusion for Educators By Vicky Nicolich.
MIS 2000 Social Implications of IST. Outline Law & Ethics Accountability and Liability Information Rights Privacy Computer Abuse and Crime Intellectual.
 Mill believes liberty is needed for full development of human nature.  Having liberty and being able to make your free choice will flourish your capacity.
Laws and Codes for the Internet: a Continental European Legal Perspective Fernando Galindo Faculty of Law University of Zaragoza Belfast,
Its Legal, Ethical & Global Environment 6 th Ed. Its Legal, Ethical & Global Environment 6 th Ed. B U S I N E S S MARIANNE M. JENNINGS Copyright ©2003.
Public Opinion The Role of Citizen Attitudes and Beliefs in Democracy This presentation is the property of Dr. Kevin Parsneau for use by him and his current.
American Free Enterprise: The Benefits of Free Enterprise.
Knowledge Management Systems Blog use - Who’s who? - What can make it easier? RSS readers good or bad? KMS System Evaluation The Future of Work.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
1 CS 501 Spring 2004 CS 501: Software Engineering Lecture 6 Legal Aspects of Software Engineering II.
AN ECONOMIC SYSTEM CHARACTERIZED BY… 1. PRIVATE OR CORPORATE OWNERSHIP OF CAPITAL GOODS; 2. INVESTMENTS THAT ARE DETERMINED BY PRIVATE DECISION RATHER.
Introduction to Business © Thomson South-Western ChapterChapter Social Responsibility of Business and Government Social Responsibility Government.
1 The Social Role of Legal Theory: The diffusion of Kawashima's Theory in Japan,The U.S, and China Wei Guo Hokkaido University Hokkaido,Japan
Created by Lorena Espinoza U.S History Mc-Elmoyl – p. 7.
University of Zaragoza
Constitution Debated.
Name that tune! Raise your hand if you know how to answer BOTH of the questions below. Artist? How does this song relate to what we’re learning today?
Presented by Mr.Tossapon Tassanakunlapan
MODEL OF DEMOCRACY WESTERN VS. COMMUNIST.
NS4960 Spring Term 2018 Burnell and Simon Chapter 3 U. S
By: Arron Ferguson Ignacio Leibas
Exploring Individualism
Net Neutrality The Great Debate.
– Communication Technology in a Changing World
Constitution Debated.
Computer Security Social Legal and Ethical issues
Slide 1 The State of the State in Cyberspace The Hybrid Regulation of Global Data Protection Ralf Bendrath University of Bremen Collaborative Research.
ผลกระทบของอินเตอร์เน็ตต่อปริมณฑลทางกฎหมาย
P2.
Ethical, Social and Political Issues
Presentation transcript:

Code & Other Laws of Cyberspace Reviewed by Thuy Nguyen November 17 th 2005 By Lawrence Lessig

Outline About the author and the bookAbout the author and the book Main arguments of the bookMain arguments of the book Model of regulationModel of regulation Regulability in cyberspaceRegulability in cyberspace ApplicationsApplications KM perspectiveKM perspective Conclusions & DiscussionsConclusions & Discussions

The Author Currently professor at Stanford Law SchoolCurrently professor at Stanford Law School Taught at Harvard Law School and Chicago Law SchoolTaught at Harvard Law School and Chicago Law School Bachelor in Business & Economics at UPennBachelor in Business & Economics at UPenn Bachelor in Philosophy at Trinity College, CambridgeBachelor in Philosophy at Trinity College, Cambridge J.D. from Yale Law SchoolJ.D. from Yale Law School Political view: conservative, then liberalPolitical view: conservative, then liberal Expertise in cyberspace lawExpertise in cyberspace law Works:Works: –Code & Other Laws of Cyberspace (2000) –The Future of Ideas (2001) –Free Culture (2004)

Main Arguments of the Book Cyberspace is not totally free & unregulable as commonly believed.Cyberspace is not totally free & unregulable as commonly believed. E-commerce pushes certificate-rich cyberspace, by-product is regulability.E-commerce pushes certificate-rich cyberspace, by-product is regulability. Government helps this process by changing the ARCHITECTURE (code) of cyberspace.Government helps this process by changing the ARCHITECTURE (code) of cyberspace. It’s our responsibility to determine how the cyberspace should be, as it would unavoidably have impacts on our life.It’s our responsibility to determine how the cyberspace should be, as it would unavoidably have impacts on our life.

Model of Regulation

Life of a Pathetic Dot Market Architecture Law Norms

Example - Smoking Legal constraint: under 18 can’t buy cigarettesLegal constraint: under 18 can’t buy cigarettes Social norms constraint: no smoking in private cars or homes without asking for permissionSocial norms constraint: no smoking in private cars or homes without asking for permission Market constraint: price constrains affordabilityMarket constraint: price constrains affordability Technology constraint (architecture): unfiltered vs filteredTechnology constraint (architecture): unfiltered vs filtered

Examples - Cyberspace Law regulates behavior: copyright law, defamation law, obscenity law.Law regulates behavior: copyright law, defamation law, obscenity law. Norms regulate behavior: talk too much in discussion lists, your s are filtered.Norms regulate behavior: talk too much in discussion lists, your s are filtered. Market regulates behavior: pricing of internet services, or busy signalsMarket regulates behavior: pricing of internet services, or busy signals Architecture (code) regulates behavior: software and hardware constrain what you can doArchitecture (code) regulates behavior: software and hardware constrain what you can do

Role of Law Market Architecture Law Norms

Role of Law - Examples Discrimination against the disabled:Discrimination against the disabled: –Law barring discrimination on the basis of phisycal disability (regulate directly) –Educate children to change social norms (regulate through norms) –Subsidize companies to hire the disabled (regulate through market) –Regulate building codes to make building accessible to the disabled (regulate through architecture)

Regulability in Cyberspace

Cyberspace uncontrollable – Flat WRONG Cyberspace is uncontrollable, given its current statusCyberspace is uncontrollable, given its current status Commerce will change this, no matter whatCommerce will change this, no matter what Government to take positive role: regulate cyberspace through regulating its architecture (code)Government to take positive role: regulate cyberspace through regulating its architecture (code) West Coast vs East Coast regulationWest Coast vs East Coast regulation

Control by Opening the Code NOT equal losing controlNOT equal losing control EQUAL open controlEQUAL open control Requires law making be PUBLIC and TRANSPARENTRequires law making be PUBLIC and TRANSPARENT Perfect control might not be possible, but effective control isPerfect control might not be possible, but effective control is

Action Has to be Taken We are NOT ready for a new technological revolution: lesson from collapse of European communismWe are NOT ready for a new technological revolution: lesson from collapse of European communism WE need to make decisionsWE need to make decisions Don’t let Microsoft & IBM decide what’s good for usDon’t let Microsoft & IBM decide what’s good for us Start with “translation process”: translate real- space values to be preserved in cyberspaceStart with “translation process”: translate real- space values to be preserved in cyberspace

Applications

Translation of Constitution The Trespass Law caseThe Trespass Law case –Protects persons, houses, papers, and effects, against unreasonable searches and seizures –Wiretapping: violation or not? –No: there’s no physical trespassing, physical properties protected –YES: although no physical trespassing, privacy violated Preserve MEANINGS & PRINCIPLES, not PRACTICESPreserve MEANINGS & PRINCIPLES, not PRACTICES

Applications Intellectual propertyIntellectual property –Technically possible to protect intellectual property –Means: trusted system, private fences not public law –Attention will shift to copy-duty, not copy-right PrivacyPrivacy Free speechFree speech SovereigntySovereignty

From KM Perspective Understanding what regulates cyberspace helps us understand the framework in which information, knowledge, and behavior are regulatedUnderstanding what regulates cyberspace helps us understand the framework in which information, knowledge, and behavior are regulated We can shape what will manage us in the futureWe can shape what will manage us in the future Future of KM can be either good or bad, depending on our action, but there is great potential for better KM if regulations are transparentFuture of KM can be either good or bad, depending on our action, but there is great potential for better KM if regulations are transparent

Conclusions We are entering an era of great potential for changing the cyberspace.We are entering an era of great potential for changing the cyberspace. We have to determine what change we want to make.We have to determine what change we want to make. Objects in cyberspace subject to the same regulators as in real-spaceObjects in cyberspace subject to the same regulators as in real-space Need to select what values to translate from real-space to cyberspaceNeed to select what values to translate from real-space to cyberspace All these are KM and shape the future of KMAll these are KM and shape the future of KM