Upload
sandra-woll
View
213
Download
1
Embed Size (px)
DESCRIPTION
oippop
Citation preview
25; judicial approval and, 140;“worms” that sniff, 20–23
Seatbelt use regulation, 130, 327, 365n43Second Life: code and, 110, 111, 113–114,
283–285; commerce and, 108;description, 13, 108, 109, 284, 349n8;land ownership/property laws in,109–110; sovereignty and, 27; statisticson use, 13
Sedition, 213, 214Seigenthaler, John, Sr., 243“Separating equilibrium,” 359n11Shamans, Software, and Spleens (Boyle), 198Shapiro, Andrew, xvShelley v. Kraemer, 134Shenk, David, xvSimple mail transport protocol (SMTP),
144, 145Single Sign-on (SSO) technology, 49–50Sixth Amendment, 166, 21360 Minutes, 243Sklyarov, Dmitry, 117Slashdot, 285Slavery issue in U.S., 291–292, 293, 390n17,
392n3Smith, Una, 105Smoking regulation modalities, 122–123,
363n7SMTP (simple mail transport protocol),
144, 145Social norms. See NormsSoftware, free, 56, 139Software, proprietary, 139Sorkin, Michael, 345Soros, George, 235Source code, 145–146, 369n16Sovereignty: citizen-sovereign model,
287–288, 289; doctrines of immunity,290; merchant-sovereign model,287–288
Sovereignty competition: incyberspace/real space simultaneously,298–302; debate on, 300–301;overview, 26–27, 297–298;pedophilia/travel example, 299;reciprocal blindness with, 297
Sovereignty competition/possible solutions:democracy and, 309–310; gamblingexample, 307–308, 391n33;geographical zoning and, 308–309,310; identity layer and, 306, 307; many
laws rule, 306–310; no law rule,302–305; one law rule, 305–306
Spam: definition/description, 245, 262,387n64; economic costs of, 336–337;test of spammers’ sophistication, 75
Spam regulation: arms race with, 263;blacklisting servers, 263–264; codeand, 262–263; current techniques,261–264; difficulties with, 263–264,388n65; digital IDs and, 69; filteringand, 263–264; identity layer and, 52;labeling and, 264–265, 388n66;labeling/bounty system, 265–267;mixed modality strategy with, 267;overview, 245–246, 261–268; in realspace, 246, 248–249; regulability and,52, 69, 73
Speech constraints: AOL and, 90–91, 235;in real-space forums, 91; removal incyberspace, 18, 19; University ofChicago/Harvard Internet use and,33–34; See also Free speech
Speech regulation: “abridging” speech and,267; broad/narrow approach, 255, 257;free culture and, 268–270; free speechvalues and, 267–268; mixed modalitystrategy with, 268; transparency and,255, 260; See also Free speech;Pornography; Spam
Speech regulators: broadcasting spectrumregulation, 270–275; distribution,270–275; publication and, 19, 236,237–245
Speed bumps/effects, 128, 135Spitting/saliva recovery kits, 208SSO (Single Sign-on) technology, 49–50Stallman, Richard, 139, 147, 148, 176, 199Stanford Law Review, 200Stefik, Mark, 6, 85–86, 176, 177, 178–179,
187, 188, 190Steinert-Threlkeld, Tom, 31Stevens, Justice John Paul, 141Stewart, Justice Potter, 163, 164, 165Stone, Geoffrey, 33–34, 260Strumpf, Koleman, 337Stuntz,William, 213Subjection of Women (Mill), 120Sullivan, Rust v., 132, 133–134, 135Sunstein, Cass, 214, 244, 260Surveillance, digital: abuses of, 210; “best
intentions” phenomenon, 208, 210;
index408
0465039146-RM 12/5/06 12:31 AM Page 408