Upload
sandra-woll
View
214
Download
0
Embed Size (px)
DESCRIPTION
VHTVHY
Citation preview
Fingerprints/thumbprints, 42Finkelstein, Seth, 245Firefox, 147First Amendment: copyright and,
186–187; effects of, 18, 20, 115, 116,121, 186–187, 214, 294, 386n45;“Madisonian” conception of, 260;times when ignored, 315
Fishkin, James, 332Ford, Richard, 286Fourteenth Amendment, 167, 286Fourth Amendment: as constraint on
regulation, 213, 214; dignity/searchesand, 211–213, 214; historicalbackground of, 21, 22, 158–160;latent ambiguities and, 157–158,160–165; search/burden and, 22–23;searches (“invisible”) of computers,21–22, 23; text of, 158; warrants and,21, 22, 158, 159–160, 370n8; See alsospecific court cases
Frankfurter, Felix, 271Free Culture (Lessig), 110“Free software,” 56, 139Free Software Foundation’s General Public
License (GPL), 148“Free software movement,” 199Free speech: architectural significance,
236, 237, 383n3, 4; countrydifferences in, 235–236, 294;credibility and, 241–242; “indecency”and, 250; protection/regulationmodalities and, 233, 234, 234–236,275; values and, 255, 258, 260, 261,267–268; See also Speech constraints;Speech regulation
French Revolution and Paris architecture,127
Friedman, Milton, 235FTC (Federal Trade Commission), 266,
305FTP (file transfer protocol), 144, 145Future of Ideas, The (Lessig), 111{TXB3}Gambling on Internet, 15–16, 23, 69,
307–308Gandy, Oscar, 219GDPs of virtual worlds, 108Geist, Michael, 62, 305General Public License (GPL), 148Generative Internet (Zittrain), 74–76
Geographic identity, 57–59Geography as architectural constraints,
127–128George II/III, Kings, 21Georgetown University Law Review, 249Geoselect IP mapping service, 58Gibson,William, 3Ginsberg (“harmful to minors”) speech,
250, 257, 258Ginsberg v. New York, 247, 251GNU/Linux, 147–148, 369n20, 22GNU project, 147Godwin, Mike, 84Goldsmith, Jack, 58, 298, 301Gomez, Jean-Jacques, 295, 297Goodale, James, 237–238Google: advertising method, 205; China
and, 80, 309; Gmail records, 204,205–206; government demand fordata, 47, 204–205; “neutral” searchprinciple of, 70–80; privacy policy of,226
Gore, Al, 244–245Gore, Bush v., 141Government/regulation: digital IDs and,
68–72; “East Coast Code”/“West CoastCode,” 72–74, 324, 357n34; examples,62–67; exploiting commerce, xiii, xiv,72–73, 77, 80, 81; in China, 79–80;intervention conditions, 338; inVernon Vinge story, xii; overview,61–62; See also Sovereignty
Government/regulation (indirect);choosing indirect/direct methods, 132,366n53, 54; democracy and, 138;overview, 67–68; problems with,132–137, 138; responsibilitymisdirection with, 133–134;segregation example, 134–135;violence on television, 115–116; WhitePaper on intellectual property,173–174
“Grand Theft Auto,” 19, 107Grokster/Grokster, 147Guinier, Lani, 286Gyges, 59{TXB3}Hacker meaning, 8Hafner, Katie, 101Hansen, Chuck, 240Harter, Peter, 150
index 403
0465039146-RM 12/5/06 12:31 AM Page 403