SlideShare a Scribd company logo
1 of 16
Download to read offline
Copyright
                           Contraband
                               E d d a n K a t z
                        E x e c u t i v e D i r e c t o r
               I n f o r m a t i o n S o c i e t y P r o j e c t

                                        4 S 2 0 0 7
                               Va n c o u v e r , C a n a d a
                                N o v e m b e r 2 , 2 0 0 6




Wednesday, December 29, 2010                                       1
Digital Piracy
                  Criminalization of Copyright

                      NET Act

                      DMCA

                  Banning of Technology

                      P2P Networks

                      Circumvention Devices

Wednesday, December 29, 2010                     2
The House Report further commented on the novelty of such a
ban, concluding that Congress has "historically advanced th[e]
constitutional objective" of the Copyright Clause of the
Constitution by "regulating the use of information—not the
devices or means by which the information is delivered or
used by information consumers—and by ensuring an
appropriate balance between the interests of copyright owners
and information users."

The Senate Report was also cognizant of the moral agency
problem and the means-ends relationship when it noted that the
circumvention device bans “drafted carefully to target 'black
boxes,' and to ensure that legitimate multipurpose devices can
continue to be made and sold."

Wednesday, December 29, 2010                                     3
Morality in Digital
                Network Environments
                  Entertainment Industry Framing

                      File-Sharing is Stealing

                      Hacker Tools as Virus

                  Technology & Responsibility

                      Unraveling the Property Paradigm

                      Misattribution of Moral Agency in Technology

                  Towards an Ethics of Access to Knowledge


Wednesday, December 29, 2010                                         4
"In a common source epidemic, as where members of a population contract
a non-contagious disease from a poisoned well, the disease spreads only by
exposure to the common source. If one eliminates the common source, or
closes the contaminated well, the epidemic is stopped."

  The point of the analogy was to make it apparent that stopping "the source"
of the disease, in this case DeCSS dissemination, will not prevent further
spread; the "disease" can travel from person to person and is not easily
stopped. Judge Kaplan continued in a detailed explanation of how DeCSS and
a communicable disease are similar, likening infringement to a disease
outbreak and presumably the 2600 web site as the poisoned well. Kaplan's
sarcasm is revealed when he notes that the "disease metaphor breaks down
principally at the final point. Individuals infected with the real disease become
sick, usually are driven by obvious self-interest to seek medical attention, and
are cured of the disease if medical science is capable of doing so. Individuals
infected with the 'disease' of capability of circumventing measures controlling
access to copyrighted works in digital form, however, do not suffer from
having that ability … their self-interest will motivate some to misuse the
capability, a misuse that, in practical terms, often will be untraceable."

Wednesday, December 29, 2010                                                        5
Isolating Criminal
                      Copyright
                  Criminal Law appeals to Moral Justification

                      Distinguish from deterrence & harm-based

                  Actus Reus & Mens Rea

                      Causation - temporal & spatial distances

                      Intentionality - multiple uses of technology

                  Copyright Contraband

                      Penalizing Design & Functionality


Wednesday, December 29, 2010                                         6
technology &
                               responsibility
                  Ethical Notion Closely Related to Liability

                      Provides bright line at copyright contraband

                      Points of Inquiry: Designer, Distributor, User

                      Technology as Mediator for Human Action

                  Three Conceptual Frameworks

                      Instrumentalist Approach

                      Capabilities Approach

                      Ideology Approach


Wednesday, December 29, 2010                                           7
Instrumentalist
                           Approach
                  Means-Ends Relationship

                      Widest Application across Technologies

                      Clarity of Technology as Value-Neutral

                  Descriptive Shortcomings in Cyberspace

                      Causal Distance in Self-Regulating Machines

                      Interconnectedness of Networks

                      Fails to account for Designer or Engineer


Wednesday, December 29, 2010                                        8
The causal chain of information-processing
technology is further distributed into three stages
between the design and the action. In the program
design stage, the software engineer encodes a design
into a language that can be translated by the
computer. The second stage consists of the
computer turning the programmed design into a set
of working instructions in machine-readable form.
The final stage is the performance of its functions
according to the instructions.


Wednesday, December 29, 2010                           9
Capabilities
                                   Approach
                  General Purpose Technologies


                      Move from particular ends to potential purpose


                      define by risk of harm & secondary effects


                  Actual uses Secondary to potential uses


                      overburdens ordinary uses


                      tendency to inflate harms


                  Between Designer & Functionality


                      requires anticipation of improper & misuse


                      Blurs functionality of device & intention of designer



Wednesday, December 29, 2010                                                  10
Though it is a thin line between
looking to the functionality to
discern the designer’s intent and
assigning intent to functionality,
the moral implications of the two
are significantly different.

Wednesday, December 29, 2010         11
Ideology Approach
                  Vast Infrastructures Organizing Life


                      Beyond Means-Ends Relationship


                      Technological Embodiment of Values


                  Diffusion of Causation


                      Networks and Platforms of Information


                      Technology as Self-Sustaining System


                  Clash of Ideologies


                      Evaluation of Overall Impact of Technologies


                      Open vs. Proprietary Architectures



Wednesday, December 29, 2010                                         12
P2P: the Prosthetics
                  of Piracy?
                  Relationship of Users to Technology Design

                      Distributed File-Sharing Networks

                      Levels of Participation as Proxy for Action

                  NET Act: The Network’s Intent

                      Making Available without Profit Motive

                      Criminal Liability for Ordinary Users

                      Intentionality Imputed to the Network Itself



Wednesday, December 29, 2010                                         13
P2P II


                  Ideology of Peer Production

                      Alternative Distribution System

                      Distinct from Piracy Harm




Wednesday, December 29, 2010                            14
DRM: Ideology of
                       Permission
                  Technology Regulating Behavior

                      TPMs as Para-Copyright

                      Preempts Unauthorized Uses

                  DMCA: Second-Hand Infringement

                      Replaces Betamax Capabilities Approach

                      Ban on Circumvention Devices

                      Functionality of Circumvention Separate from Activity



Wednesday, December 29, 2010                                                  15
DRM II


                  Proprietary vs. Open Architectures

                      Trafficking as Communicable Disease

                      The Politics of Decrypting Closed Systems




Wednesday, December 29, 2010                                      16

More Related Content

What's hot

Mist2012 panel discussion-ruo ando
Mist2012 panel discussion-ruo andoMist2012 panel discussion-ruo ando
Mist2012 panel discussion-ruo andoRuo Ando
 
The Turing Test for Telepresence
The Turing Test for TelepresenceThe Turing Test for Telepresence
The Turing Test for Telepresenceijma
 
Next Night 5 Rob van Kranenburg
Next Night 5 Rob van KranenburgNext Night 5 Rob van Kranenburg
Next Night 5 Rob van Kranenburggenerationnext
 
Into the twilight zone innovations for education
Into the twilight zone innovations for educationInto the twilight zone innovations for education
Into the twilight zone innovations for educationCynthia Calongne
 
Tech2002lecweekseven0809
Tech2002lecweekseven0809Tech2002lecweekseven0809
Tech2002lecweekseven0809The_Joker
 
2012 asc walking_thetalk_final_wnotes
2012 asc walking_thetalk_final_wnotes2012 asc walking_thetalk_final_wnotes
2012 asc walking_thetalk_final_wnotesTom De Ruyck
 
Stefan Decker Keynote at CSHALS
Stefan Decker Keynote at CSHALSStefan Decker Keynote at CSHALS
Stefan Decker Keynote at CSHALSStefan Decker
 
The Mobile Device of the Future
The Mobile Device of the FutureThe Mobile Device of the Future
The Mobile Device of the FutureRade Šaptović
 
Network analysis in the social sciences
Network analysis in the social sciencesNetwork analysis in the social sciences
Network analysis in the social sciencesJorge Pacheco
 
Socialmatchmaking
SocialmatchmakingSocialmatchmaking
Socialmatchmakingepokh
 
Information+System+Development+Limit+To+Information
Information+System+Development+Limit+To+InformationInformation+System+Development+Limit+To+Information
Information+System+Development+Limit+To+InformationJo Balucanag - Bitonio
 
Distributed cognition
Distributed cognitionDistributed cognition
Distributed cognitionHongbo Zhang
 
How do you imagine social interaction within....
How do you imagine social interaction within....How do you imagine social interaction within....
How do you imagine social interaction within....Antonio Gioia
 
Digital technologies
Digital technologiesDigital technologies
Digital technologiesjamberryxxx
 
Simulating online privacy. Ethno-computational insights
Simulating online privacy. Ethno-computational insightsSimulating online privacy. Ethno-computational insights
Simulating online privacy. Ethno-computational insightsBodyspacesociety Blog
 
Saiful hidayat surfing in the digital broadband era thru being creative th...
Saiful hidayat    surfing in the digital broadband era thru being creative th...Saiful hidayat    surfing in the digital broadband era thru being creative th...
Saiful hidayat surfing in the digital broadband era thru being creative th...Saiful Hidayat
 
Gossip Network report
Gossip Network reportGossip Network report
Gossip Network reportBindy Xie
 
Exploiting incidental interactions between mobile devices
Exploiting incidental interactions between mobile devicesExploiting incidental interactions between mobile devices
Exploiting incidental interactions between mobile devicesRaúl Kripalani
 

What's hot (20)

Mist2012 panel discussion-ruo ando
Mist2012 panel discussion-ruo andoMist2012 panel discussion-ruo ando
Mist2012 panel discussion-ruo ando
 
The Turing Test for Telepresence
The Turing Test for TelepresenceThe Turing Test for Telepresence
The Turing Test for Telepresence
 
Next Night 5 Rob van Kranenburg
Next Night 5 Rob van KranenburgNext Night 5 Rob van Kranenburg
Next Night 5 Rob van Kranenburg
 
Into the twilight zone innovations for education
Into the twilight zone innovations for educationInto the twilight zone innovations for education
Into the twilight zone innovations for education
 
Tech2002lecweekseven0809
Tech2002lecweekseven0809Tech2002lecweekseven0809
Tech2002lecweekseven0809
 
Stefan Decker
Stefan DeckerStefan Decker
Stefan Decker
 
2012 asc walking_thetalk_final_wnotes
2012 asc walking_thetalk_final_wnotes2012 asc walking_thetalk_final_wnotes
2012 asc walking_thetalk_final_wnotes
 
Stefan Decker Keynote at CSHALS
Stefan Decker Keynote at CSHALSStefan Decker Keynote at CSHALS
Stefan Decker Keynote at CSHALS
 
The Mobile Device of the Future
The Mobile Device of the FutureThe Mobile Device of the Future
The Mobile Device of the Future
 
Network analysis in the social sciences
Network analysis in the social sciencesNetwork analysis in the social sciences
Network analysis in the social sciences
 
Vriti
VritiVriti
Vriti
 
Socialmatchmaking
SocialmatchmakingSocialmatchmaking
Socialmatchmaking
 
Information+System+Development+Limit+To+Information
Information+System+Development+Limit+To+InformationInformation+System+Development+Limit+To+Information
Information+System+Development+Limit+To+Information
 
Distributed cognition
Distributed cognitionDistributed cognition
Distributed cognition
 
How do you imagine social interaction within....
How do you imagine social interaction within....How do you imagine social interaction within....
How do you imagine social interaction within....
 
Digital technologies
Digital technologiesDigital technologies
Digital technologies
 
Simulating online privacy. Ethno-computational insights
Simulating online privacy. Ethno-computational insightsSimulating online privacy. Ethno-computational insights
Simulating online privacy. Ethno-computational insights
 
Saiful hidayat surfing in the digital broadband era thru being creative th...
Saiful hidayat    surfing in the digital broadband era thru being creative th...Saiful hidayat    surfing in the digital broadband era thru being creative th...
Saiful hidayat surfing in the digital broadband era thru being creative th...
 
Gossip Network report
Gossip Network reportGossip Network report
Gossip Network report
 
Exploiting incidental interactions between mobile devices
Exploiting incidental interactions between mobile devicesExploiting incidental interactions between mobile devices
Exploiting incidental interactions between mobile devices
 

Viewers also liked

Thainetizennetwork globalcybercrime 07272009
Thainetizennetwork globalcybercrime 07272009Thainetizennetwork globalcybercrime 07272009
Thainetizennetwork globalcybercrime 07272009Eddan Katz
 
Handboek operationele interne logistiek, hoofdstuk 8
Handboek operationele interne logistiek, hoofdstuk 8Handboek operationele interne logistiek, hoofdstuk 8
Handboek operationele interne logistiek, hoofdstuk 8Koninklijke Van Gorcum
 

Viewers also liked (6)

Peter Zehren.BD DVSTY & RV-5.21.15
Peter Zehren.BD DVSTY & RV-5.21.15Peter Zehren.BD DVSTY & RV-5.21.15
Peter Zehren.BD DVSTY & RV-5.21.15
 
Omni Channel Fundraising- 2014
Omni Channel Fundraising- 2014Omni Channel Fundraising- 2014
Omni Channel Fundraising- 2014
 
Thainetizennetwork globalcybercrime 07272009
Thainetizennetwork globalcybercrime 07272009Thainetizennetwork globalcybercrime 07272009
Thainetizennetwork globalcybercrime 07272009
 
Zehren, Peter Management Lessons
Zehren, Peter Management LessonsZehren, Peter Management Lessons
Zehren, Peter Management Lessons
 
Peter Zehren, Amazon Headwaters Expedition
Peter Zehren, Amazon Headwaters ExpeditionPeter Zehren, Amazon Headwaters Expedition
Peter Zehren, Amazon Headwaters Expedition
 
Handboek operationele interne logistiek, hoofdstuk 8
Handboek operationele interne logistiek, hoofdstuk 8Handboek operationele interne logistiek, hoofdstuk 8
Handboek operationele interne logistiek, hoofdstuk 8
 

Similar to Copyrightcontraband

Computer Crimes: An American Case Study
Computer Crimes: An American Case StudyComputer Crimes: An American Case Study
Computer Crimes: An American Case StudyEddan Katz
 
Thainetizennetwork slides day1
Thainetizennetwork slides day1Thainetizennetwork slides day1
Thainetizennetwork slides day1Eddan Katz
 
Freecultureforum barcelona2009 acta
Freecultureforum barcelona2009 actaFreecultureforum barcelona2009 acta
Freecultureforum barcelona2009 actaEddan Katz
 
Knowledge Sharing in the Sciences - 8JPL
Knowledge Sharing in the Sciences - 8JPLKnowledge Sharing in the Sciences - 8JPL
Knowledge Sharing in the Sciences - 8JPLKaitlin Thaney
 
Sharing Scientific Data: Legal, Normative and Social Issues
Sharing Scientific Data: Legal, Normative and Social IssuesSharing Scientific Data: Legal, Normative and Social Issues
Sharing Scientific Data: Legal, Normative and Social IssuesKaitlin Thaney
 
Pervasive computing write up
Pervasive computing write upPervasive computing write up
Pervasive computing write upWhoGoesThere
 
Tacdconference actaslides
Tacdconference actaslidesTacdconference actaslides
Tacdconference actaslidesEddan Katz
 
Mapping A2K Advocacy: Towards a Coalition Against ACTA
Mapping A2K Advocacy:Towards a Coalition Against ACTAMapping A2K Advocacy:Towards a Coalition Against ACTA
Mapping A2K Advocacy: Towards a Coalition Against ACTAEddan Katz
 
Digital media and the law
Digital media and the lawDigital media and the law
Digital media and the lawSu Little
 
A case study analysis on digital convergent design: Skynet Platform
A case study analysis on digital convergent design: Skynet PlatformA case study analysis on digital convergent design: Skynet Platform
A case study analysis on digital convergent design: Skynet Platformdi8it
 
Cloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
Cloud Forensics: Drawbacks in Current Methodologies and Proposed SolutionCloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
Cloud Forensics: Drawbacks in Current Methodologies and Proposed SolutionIJERA Editor
 
UKSG 2018 Breakout - Systems of revolt: open source and open access products ...
UKSG 2018 Breakout - Systems of revolt: open source and open access products ...UKSG 2018 Breakout - Systems of revolt: open source and open access products ...
UKSG 2018 Breakout - Systems of revolt: open source and open access products ...UKSG: connecting the knowledge community
 
Seminar Proposal Presentation on "Web Based System for of Citation Court Case...
Seminar Proposal Presentation on "Web Based System for of Citation Court Case...Seminar Proposal Presentation on "Web Based System for of Citation Court Case...
Seminar Proposal Presentation on "Web Based System for of Citation Court Case...Omisore Olatunji
 
Face the Future: Computing in an Augmented World
Face the Future: Computing in an Augmented WorldFace the Future: Computing in an Augmented World
Face the Future: Computing in an Augmented WorldTony Parisi
 
Intermediate project by harsha
Intermediate project by harshaIntermediate project by harsha
Intermediate project by harshaHARSHA DURUGOJI
 
Computer Forensic: A Reactive Strategy for Fighting Computer Crime
Computer Forensic: A Reactive Strategy for Fighting Computer CrimeComputer Forensic: A Reactive Strategy for Fighting Computer Crime
Computer Forensic: A Reactive Strategy for Fighting Computer CrimeCSCJournals
 
Networked Presence Analysis
Networked Presence AnalysisNetworked Presence Analysis
Networked Presence AnalysisAshley Thomas
 
Program For The Future: The Commons as a collective intelligence meta-innovation
Program For The Future: The Commons as a collective intelligence meta-innovationProgram For The Future: The Commons as a collective intelligence meta-innovation
Program For The Future: The Commons as a collective intelligence meta-innovationMike Linksvayer
 

Similar to Copyrightcontraband (20)

Computer Crimes: An American Case Study
Computer Crimes: An American Case StudyComputer Crimes: An American Case Study
Computer Crimes: An American Case Study
 
Thainetizennetwork slides day1
Thainetizennetwork slides day1Thainetizennetwork slides day1
Thainetizennetwork slides day1
 
Freecultureforum barcelona2009 acta
Freecultureforum barcelona2009 actaFreecultureforum barcelona2009 acta
Freecultureforum barcelona2009 acta
 
Knowledge Sharing in the Sciences - 8JPL
Knowledge Sharing in the Sciences - 8JPLKnowledge Sharing in the Sciences - 8JPL
Knowledge Sharing in the Sciences - 8JPL
 
Ka3118541860
Ka3118541860Ka3118541860
Ka3118541860
 
Sharing Scientific Data: Legal, Normative and Social Issues
Sharing Scientific Data: Legal, Normative and Social IssuesSharing Scientific Data: Legal, Normative and Social Issues
Sharing Scientific Data: Legal, Normative and Social Issues
 
Pervasive computing write up
Pervasive computing write upPervasive computing write up
Pervasive computing write up
 
Tacdconference actaslides
Tacdconference actaslidesTacdconference actaslides
Tacdconference actaslides
 
Mapping A2K Advocacy: Towards a Coalition Against ACTA
Mapping A2K Advocacy:Towards a Coalition Against ACTAMapping A2K Advocacy:Towards a Coalition Against ACTA
Mapping A2K Advocacy: Towards a Coalition Against ACTA
 
Digital media and the law
Digital media and the lawDigital media and the law
Digital media and the law
 
A case study analysis on digital convergent design: Skynet Platform
A case study analysis on digital convergent design: Skynet PlatformA case study analysis on digital convergent design: Skynet Platform
A case study analysis on digital convergent design: Skynet Platform
 
Cloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
Cloud Forensics: Drawbacks in Current Methodologies and Proposed SolutionCloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
Cloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
 
UKSG 2018 Breakout - Systems of revolt: open source and open access products ...
UKSG 2018 Breakout - Systems of revolt: open source and open access products ...UKSG 2018 Breakout - Systems of revolt: open source and open access products ...
UKSG 2018 Breakout - Systems of revolt: open source and open access products ...
 
Seminar Proposal Presentation on "Web Based System for of Citation Court Case...
Seminar Proposal Presentation on "Web Based System for of Citation Court Case...Seminar Proposal Presentation on "Web Based System for of Citation Court Case...
Seminar Proposal Presentation on "Web Based System for of Citation Court Case...
 
Face the Future: Computing in an Augmented World
Face the Future: Computing in an Augmented WorldFace the Future: Computing in an Augmented World
Face the Future: Computing in an Augmented World
 
Intermediate project by harsha
Intermediate project by harshaIntermediate project by harsha
Intermediate project by harsha
 
Ransomware
RansomwareRansomware
Ransomware
 
Computer Forensic: A Reactive Strategy for Fighting Computer Crime
Computer Forensic: A Reactive Strategy for Fighting Computer CrimeComputer Forensic: A Reactive Strategy for Fighting Computer Crime
Computer Forensic: A Reactive Strategy for Fighting Computer Crime
 
Networked Presence Analysis
Networked Presence AnalysisNetworked Presence Analysis
Networked Presence Analysis
 
Program For The Future: The Commons as a collective intelligence meta-innovation
Program For The Future: The Commons as a collective intelligence meta-innovationProgram For The Future: The Commons as a collective intelligence meta-innovation
Program For The Future: The Commons as a collective intelligence meta-innovation
 

Copyrightcontraband

  • 1. Copyright Contraband E d d a n K a t z E x e c u t i v e D i r e c t o r I n f o r m a t i o n S o c i e t y P r o j e c t 4 S 2 0 0 7 Va n c o u v e r , C a n a d a N o v e m b e r 2 , 2 0 0 6 Wednesday, December 29, 2010 1
  • 2. Digital Piracy Criminalization of Copyright NET Act DMCA Banning of Technology P2P Networks Circumvention Devices Wednesday, December 29, 2010 2
  • 3. The House Report further commented on the novelty of such a ban, concluding that Congress has "historically advanced th[e] constitutional objective" of the Copyright Clause of the Constitution by "regulating the use of information—not the devices or means by which the information is delivered or used by information consumers—and by ensuring an appropriate balance between the interests of copyright owners and information users." The Senate Report was also cognizant of the moral agency problem and the means-ends relationship when it noted that the circumvention device bans “drafted carefully to target 'black boxes,' and to ensure that legitimate multipurpose devices can continue to be made and sold." Wednesday, December 29, 2010 3
  • 4. Morality in Digital Network Environments Entertainment Industry Framing File-Sharing is Stealing Hacker Tools as Virus Technology & Responsibility Unraveling the Property Paradigm Misattribution of Moral Agency in Technology Towards an Ethics of Access to Knowledge Wednesday, December 29, 2010 4
  • 5. "In a common source epidemic, as where members of a population contract a non-contagious disease from a poisoned well, the disease spreads only by exposure to the common source. If one eliminates the common source, or closes the contaminated well, the epidemic is stopped." The point of the analogy was to make it apparent that stopping "the source" of the disease, in this case DeCSS dissemination, will not prevent further spread; the "disease" can travel from person to person and is not easily stopped. Judge Kaplan continued in a detailed explanation of how DeCSS and a communicable disease are similar, likening infringement to a disease outbreak and presumably the 2600 web site as the poisoned well. Kaplan's sarcasm is revealed when he notes that the "disease metaphor breaks down principally at the final point. Individuals infected with the real disease become sick, usually are driven by obvious self-interest to seek medical attention, and are cured of the disease if medical science is capable of doing so. Individuals infected with the 'disease' of capability of circumventing measures controlling access to copyrighted works in digital form, however, do not suffer from having that ability … their self-interest will motivate some to misuse the capability, a misuse that, in practical terms, often will be untraceable." Wednesday, December 29, 2010 5
  • 6. Isolating Criminal Copyright Criminal Law appeals to Moral Justification Distinguish from deterrence & harm-based Actus Reus & Mens Rea Causation - temporal & spatial distances Intentionality - multiple uses of technology Copyright Contraband Penalizing Design & Functionality Wednesday, December 29, 2010 6
  • 7. technology & responsibility Ethical Notion Closely Related to Liability Provides bright line at copyright contraband Points of Inquiry: Designer, Distributor, User Technology as Mediator for Human Action Three Conceptual Frameworks Instrumentalist Approach Capabilities Approach Ideology Approach Wednesday, December 29, 2010 7
  • 8. Instrumentalist Approach Means-Ends Relationship Widest Application across Technologies Clarity of Technology as Value-Neutral Descriptive Shortcomings in Cyberspace Causal Distance in Self-Regulating Machines Interconnectedness of Networks Fails to account for Designer or Engineer Wednesday, December 29, 2010 8
  • 9. The causal chain of information-processing technology is further distributed into three stages between the design and the action. In the program design stage, the software engineer encodes a design into a language that can be translated by the computer. The second stage consists of the computer turning the programmed design into a set of working instructions in machine-readable form. The final stage is the performance of its functions according to the instructions. Wednesday, December 29, 2010 9
  • 10. Capabilities Approach General Purpose Technologies Move from particular ends to potential purpose define by risk of harm & secondary effects Actual uses Secondary to potential uses overburdens ordinary uses tendency to inflate harms Between Designer & Functionality requires anticipation of improper & misuse Blurs functionality of device & intention of designer Wednesday, December 29, 2010 10
  • 11. Though it is a thin line between looking to the functionality to discern the designer’s intent and assigning intent to functionality, the moral implications of the two are significantly different. Wednesday, December 29, 2010 11
  • 12. Ideology Approach Vast Infrastructures Organizing Life Beyond Means-Ends Relationship Technological Embodiment of Values Diffusion of Causation Networks and Platforms of Information Technology as Self-Sustaining System Clash of Ideologies Evaluation of Overall Impact of Technologies Open vs. Proprietary Architectures Wednesday, December 29, 2010 12
  • 13. P2P: the Prosthetics of Piracy? Relationship of Users to Technology Design Distributed File-Sharing Networks Levels of Participation as Proxy for Action NET Act: The Network’s Intent Making Available without Profit Motive Criminal Liability for Ordinary Users Intentionality Imputed to the Network Itself Wednesday, December 29, 2010 13
  • 14. P2P II Ideology of Peer Production Alternative Distribution System Distinct from Piracy Harm Wednesday, December 29, 2010 14
  • 15. DRM: Ideology of Permission Technology Regulating Behavior TPMs as Para-Copyright Preempts Unauthorized Uses DMCA: Second-Hand Infringement Replaces Betamax Capabilities Approach Ban on Circumvention Devices Functionality of Circumvention Separate from Activity Wednesday, December 29, 2010 15
  • 16. DRM II Proprietary vs. Open Architectures Trafficking as Communicable Disease The Politics of Decrypting Closed Systems Wednesday, December 29, 2010 16