1
25; judicial approval and, 140; “worms” that sniff, 20–23 Seatbelt use regulation, 130, 327, 365n43 Second Life: code and, 110, 111, 113–114, 283–285; commerce and, 108; description, 13, 108, 109, 284, 349n8; land ownership/property laws in, 109–110; sovereignty and, 27; statistics on use, 13 Sedition, 213, 214 Seigenthaler, John, Sr., 243 “Separating equilibrium,” 359n11 Shamans, Software, and Spleens (Boyle), 198 Shapiro, Andrew, xv Shelley v. Kraemer, 134 Shenk, David, xv Simple mail transport protocol (SMTP), 144, 145 Single Sign-on (SSO) technology, 49–50 Sixth Amendment, 166, 213 60 Minutes, 243 Sklyarov, Dmitry, 117 Slashdot, 285 Slavery issue in U.S., 291–292, 293, 390n17, 392n3 Smith, Una, 105 Smoking regulation modalities, 122–123, 363n7 SMTP (simple mail transport protocol), 144, 145 Social norms. See Norms Software, free, 56, 139 Software, proprietary, 139 Sorkin, Michael, 345 Soros, George, 235 Source code, 145–146, 369n16 Sovereignty: citizen-sovereign model, 287–288, 289; doctrines of immunity, 290; merchant-sovereign model, 287–288 Sovereignty competition: in cyberspace/real space simultaneously, 298–302; debate on, 300–301; overview, 26–27, 297–298; pedophilia/travel example, 299; reciprocal blindness with, 297 Sovereignty competition/possible solutions: democracy and, 309–310; gambling example, 307–308, 391n33; geographical zoning and, 308–309, 310; identity layer and, 306, 307; many laws rule, 306–310; no law rule, 302–305; one law rule, 305–306 Spam: definition/description, 245, 262, 387n64; economic costs of, 336–337; test of spammers’ sophistication, 75 Spam regulation: arms race with, 263; blacklisting servers, 263–264; code and, 262–263; current techniques, 261–264; difficulties with, 263–264, 388n65; digital IDs and, 69; filtering and, 263–264; identity layer and, 52; labeling and, 264–265, 388n66; labeling/bounty system, 265–267; mixed modality strategy with, 267; overview, 245–246, 261–268; in real space, 246, 248–249; regulability and, 52, 69, 73 Speech constraints: AOL and, 90–91, 235; in real-space forums, 91; removal in cyberspace, 18, 19; University of Chicago/Harvard Internet use and, 33–34; See also Free speech Speech regulation: “abridging” speech and, 267; broad/narrow approach, 255, 257; free culture and, 268–270; free speech values and, 267–268; mixed modality strategy with, 268; transparency and, 255, 260; See also Free speech; Pornography; Spam Speech regulators: broadcasting spectrum regulation, 270–275; distribution, 270–275; publication and, 19, 236, 237–245 Speed bumps/effects, 128, 135 Spitting/saliva recovery kits, 208 SSO (Single Sign-on) technology, 49–50 Stallman, Richard, 139, 147, 148, 176, 199 Stanford Law Review, 200 Stefik, Mark, 6, 85–86, 176, 177, 178–179, 187, 188, 190 Steinert-Threlkeld, Tom, 31 Stevens, Justice John Paul, 141 Stewart, Justice Potter, 163, 164, 165 Stone, Geoffrey, 33–34, 260 Strumpf, Koleman, 337 Stuntz, William, 213 Subjection of Women (Mill), 120 Sullivan, Rust v., 132, 133–134, 135 Sunstein, Cass, 214, 244, 260 Surveillance, digital: abuses of, 210; “best intentions” phenomenon, 208, 210; index 408

422

Embed Size (px)

DESCRIPTION

oippop

Citation preview

Page 1: 422

25; judicial approval and, 140;“worms” that sniff, 20–23

Seatbelt use regulation, 130, 327, 365n43Second Life: code and, 110, 111, 113–114,

283–285; commerce and, 108;description, 13, 108, 109, 284, 349n8;land ownership/property laws in,109–110; sovereignty and, 27; statisticson use, 13

Sedition, 213, 214Seigenthaler, John, Sr., 243“Separating equilibrium,” 359n11Shamans, Software, and Spleens (Boyle), 198Shapiro, Andrew, xvShelley v. Kraemer, 134Shenk, David, xvSimple mail transport protocol (SMTP),

144, 145Single Sign-on (SSO) technology, 49–50Sixth Amendment, 166, 21360 Minutes, 243Sklyarov, Dmitry, 117Slashdot, 285Slavery issue in U.S., 291–292, 293, 390n17,

392n3Smith, Una, 105Smoking regulation modalities, 122–123,

363n7SMTP (simple mail transport protocol),

144, 145Social norms. See NormsSoftware, free, 56, 139Software, proprietary, 139Sorkin, Michael, 345Soros, George, 235Source code, 145–146, 369n16Sovereignty: citizen-sovereign model,

287–288, 289; doctrines of immunity,290; merchant-sovereign model,287–288

Sovereignty competition: incyberspace/real space simultaneously,298–302; debate on, 300–301;overview, 26–27, 297–298;pedophilia/travel example, 299;reciprocal blindness with, 297

Sovereignty competition/possible solutions:democracy and, 309–310; gamblingexample, 307–308, 391n33;geographical zoning and, 308–309,310; identity layer and, 306, 307; many

laws rule, 306–310; no law rule,302–305; one law rule, 305–306

Spam: definition/description, 245, 262,387n64; economic costs of, 336–337;test of spammers’ sophistication, 75

Spam regulation: arms race with, 263;blacklisting servers, 263–264; codeand, 262–263; current techniques,261–264; difficulties with, 263–264,388n65; digital IDs and, 69; filteringand, 263–264; identity layer and, 52;labeling and, 264–265, 388n66;labeling/bounty system, 265–267;mixed modality strategy with, 267;overview, 245–246, 261–268; in realspace, 246, 248–249; regulability and,52, 69, 73

Speech constraints: AOL and, 90–91, 235;in real-space forums, 91; removal incyberspace, 18, 19; University ofChicago/Harvard Internet use and,33–34; See also Free speech

Speech regulation: “abridging” speech and,267; broad/narrow approach, 255, 257;free culture and, 268–270; free speechvalues and, 267–268; mixed modalitystrategy with, 268; transparency and,255, 260; See also Free speech;Pornography; Spam

Speech regulators: broadcasting spectrumregulation, 270–275; distribution,270–275; publication and, 19, 236,237–245

Speed bumps/effects, 128, 135Spitting/saliva recovery kits, 208SSO (Single Sign-on) technology, 49–50Stallman, Richard, 139, 147, 148, 176, 199Stanford Law Review, 200Stefik, Mark, 6, 85–86, 176, 177, 178–179,

187, 188, 190Steinert-Threlkeld, Tom, 31Stevens, Justice John Paul, 141Stewart, Justice Potter, 163, 164, 165Stone, Geoffrey, 33–34, 260Strumpf, Koleman, 337Stuntz,William, 213Subjection of Women (Mill), 120Sullivan, Rust v., 132, 133–134, 135Sunstein, Cass, 214, 244, 260Surveillance, digital: abuses of, 210; “best

intentions” phenomenon, 208, 210;

index408

0465039146-RM 12/5/06 12:31 AM Page 408