1
Fingerprints/thumbprints, 42 Finkelstein, Seth, 245 Firefox, 147 First Amendment: copyright and, 186–187; effects of, 18, 20, 115, 116, 121, 186–187, 214, 294, 386n45; “Madisonian” conception of, 260; times when ignored, 315 Fishkin, James, 332 Ford, Richard, 286 Fourteenth Amendment, 167, 286 Fourth Amendment: as constraint on regulation, 213, 214; dignity/searches and, 211–213, 214; historical background of, 21, 22, 158–160; latent ambiguities and, 157–158, 160–165; search/burden and, 22–23; searches (“invisible”) of computers, 21–22, 23; text of, 158; warrants and, 21, 22, 158, 159–160, 370n8; See also specific court cases Frankfurter, Felix, 271 Free Culture (Lessig), 110 “Free software,” 56, 139 Free Software Foundation’s General Public License (GPL), 148 “Free software movement,” 199 Free speech: architectural significance, 236, 237, 383n3, 4; country differences in, 235–236, 294; credibility and, 241–242; “indecency” and, 250; protection/regulation modalities and, 233, 234, 234–236, 275; values and, 255, 258, 260, 261, 267–268; See also Speech constraints; Speech regulation French Revolution and Paris architecture, 127 Friedman, Milton, 235 FTC (Federal Trade Commission), 266, 305 FTP (file transfer protocol), 144, 145 Future of Ideas, The (Lessig), 111 {TXB3} Gambling on Internet, 15–16, 23, 69, 307–308 Gandy, Oscar, 219 GDPs of virtual worlds, 108 Geist, Michael, 62, 305 General Public License (GPL), 148 Generative Internet (Zittrain), 74–76 Geographic identity, 57–59 Geography as architectural constraints, 127–128 George II/III, Kings, 21 Georgetown University Law Review, 249 Geoselect IP mapping service, 58 Gibson, William, 3 Ginsberg (“harmful to minors”) speech, 250, 257, 258 Ginsberg v. New York, 247, 251 GNU/Linux, 147–148, 369n20, 22 GNU project, 147 Godwin, Mike, 84 Goldsmith, Jack, 58, 298, 301 Gomez, Jean-Jacques, 295, 297 Goodale, James, 237–238 Google: advertising method, 205; China and, 80, 309; Gmail records, 204, 205–206; government demand for data, 47, 204–205; “neutral” search principle of, 70–80; privacy policy of, 226 Gore, Al, 244–245 Gore, Bush v., 141 Government/regulation: digital IDs and, 68–72; “East Coast Code”/“West Coast Code,” 72–74, 324, 357n34; examples, 62–67; exploiting commerce, xiii, xiv, 72–73, 77, 80, 81; in China, 79–80; intervention conditions, 338; in Vernon Vinge story, xii; overview, 61–62; See also Sovereignty Government/regulation (indirect); choosing indirect/direct methods, 132, 366n53, 54; democracy and, 138; overview, 67–68; problems with, 132–137, 138; responsibility misdirection with, 133–134; segregation example, 134–135; violence on television, 115–116; White Paper on intellectual property, 173–174 “Grand Theft Auto,” 19, 107 Grokster/Grokster, 147 Guinier, Lani, 286 Gyges, 59 {TXB3} Hacker meaning, 8 Hafner, Katie, 101 Hansen, Chuck, 240 Harter, Peter, 150 index 403

417

Embed Size (px)

DESCRIPTION

VHTVHY

Citation preview

Page 1: 417

Fingerprints/thumbprints, 42Finkelstein, Seth, 245Firefox, 147First Amendment: copyright and,

186–187; effects of, 18, 20, 115, 116,121, 186–187, 214, 294, 386n45;“Madisonian” conception of, 260;times when ignored, 315

Fishkin, James, 332Ford, Richard, 286Fourteenth Amendment, 167, 286Fourth Amendment: as constraint on

regulation, 213, 214; dignity/searchesand, 211–213, 214; historicalbackground of, 21, 22, 158–160;latent ambiguities and, 157–158,160–165; search/burden and, 22–23;searches (“invisible”) of computers,21–22, 23; text of, 158; warrants and,21, 22, 158, 159–160, 370n8; See alsospecific court cases

Frankfurter, Felix, 271Free Culture (Lessig), 110“Free software,” 56, 139Free Software Foundation’s General Public

License (GPL), 148“Free software movement,” 199Free speech: architectural significance,

236, 237, 383n3, 4; countrydifferences in, 235–236, 294;credibility and, 241–242; “indecency”and, 250; protection/regulationmodalities and, 233, 234, 234–236,275; values and, 255, 258, 260, 261,267–268; See also Speech constraints;Speech regulation

French Revolution and Paris architecture,127

Friedman, Milton, 235FTC (Federal Trade Commission), 266,

305FTP (file transfer protocol), 144, 145Future of Ideas, The (Lessig), 111{TXB3}Gambling on Internet, 15–16, 23, 69,

307–308Gandy, Oscar, 219GDPs of virtual worlds, 108Geist, Michael, 62, 305General Public License (GPL), 148Generative Internet (Zittrain), 74–76

Geographic identity, 57–59Geography as architectural constraints,

127–128George II/III, Kings, 21Georgetown University Law Review, 249Geoselect IP mapping service, 58Gibson,William, 3Ginsberg (“harmful to minors”) speech,

250, 257, 258Ginsberg v. New York, 247, 251GNU/Linux, 147–148, 369n20, 22GNU project, 147Godwin, Mike, 84Goldsmith, Jack, 58, 298, 301Gomez, Jean-Jacques, 295, 297Goodale, James, 237–238Google: advertising method, 205; China

and, 80, 309; Gmail records, 204,205–206; government demand fordata, 47, 204–205; “neutral” searchprinciple of, 70–80; privacy policy of,226

Gore, Al, 244–245Gore, Bush v., 141Government/regulation: digital IDs and,

68–72; “East Coast Code”/“West CoastCode,” 72–74, 324, 357n34; examples,62–67; exploiting commerce, xiii, xiv,72–73, 77, 80, 81; in China, 79–80;intervention conditions, 338; inVernon Vinge story, xii; overview,61–62; See also Sovereignty

Government/regulation (indirect);choosing indirect/direct methods, 132,366n53, 54; democracy and, 138;overview, 67–68; problems with,132–137, 138; responsibilitymisdirection with, 133–134;segregation example, 134–135;violence on television, 115–116; WhitePaper on intellectual property,173–174

“Grand Theft Auto,” 19, 107Grokster/Grokster, 147Guinier, Lani, 286Gyges, 59{TXB3}Hacker meaning, 8Hafner, Katie, 101Hansen, Chuck, 240Harter, Peter, 150

index 403

0465039146-RM 12/5/06 12:31 AM Page 403