SlideShare a Scribd company logo
Theories of cyberspace
regulation
The problem: Cyberspace is a different
context from the physical world.
We may need to rethink how regulation of
behaviour works.
The question: What regulates?
What different forms of regulation are there?
Forms of regulation
Lawrence Lessig's answers:
4 things regulate - Norms; Markets, Law and 'Code'
(environment)
Law also regulates the other 3 - indirect regulation by
law
Effectiveness is very different in cyberspace
Lessig's main lesson: Consider all 4 and how
they interact
Criticism: Surveillance is a 5th form of regulation
1 Norms, morality and
self-regulation
Real space norms cause disapproval and
guilt
Cyberspace has its own 'netiquette'
Examples: using CAPITALS; attachments
sent to lists
Effectiveness in cyberspace increased by
surveillance
The morality of the goldfish bowl
2 Markets
Market constrains work in cyberspace
Unpopular 'code' can perish
Selling region-blocked DVD players in HK?
Surveillance damaged DoubleClick's share
price
Prices can affect norms
Are CD / DVD prices considered fair?
Is DVD region blocking fair?
3 'Code’ (environment)
In real space - Natural and built environment -
Bank robberies - Laws and morality help; but walls,
locks, glass & guns are better
Immigration - Distance and lack of borders
Easy to ignore, often because unchangeable
In cyberspace - ‘Code’ is the equivalent
Can control access, and monitor it
Determines what actions are possible and impossible
‘A set of constraints on how one can behave’ -Lessig
The walls, bridges, locks and cameras of cyberspace
‘Code' or 'architecture'?
'Code' is cute but confusing
East coast code (Washington) vs West coast code
(Redmond)
The US Code vs hackers' code
'Architecture' is more accurate
Cyberspace is more than software
Protocols (non-material artefacts)
Hardware (material artefacts)
Biology and geography (natural environment)
'Code' is part of cyberspace architecture
4 Law - direct and indirect
Law increasingly directly regulates
cyberspace behaviour
But it indirectly regulates the other 3
constraints
Legal regulation of architecture is the key
It is the most effective strategy for
governments
It is also vital for limiting private power
Effective regulation
Finding the best mix of constraints
How to prevent discrimination?
Prohibition; education; building codes
How to stop people smoking?
Age limits; prohibited places; education; warnings;
taxes
Surveillance: 5th constraint
A relationship of knowledge
Knowledge by the watcher of those watched
Foucault's 'discipline'; Bentham's Panopticon
Facilitated by architecture, but not part of it
Facilitates observance of norms and laws, but
independent
More important in cyberspace regulation
The normal context of identification is
removed
Law modifying
surveillance
Law acts indirectly to modify surveillance
Data protection laws protect privacy
Eg Personal Data (Privacy) Ordinance
Laws mandate compliance
eg smart ID card
Laws prevent circumvention
eg DRMS anti-circumvention
Cyber-regulation is different
Cyberspace architecture is mainly artefact
Greater immediacy of application
Cyberspace architecture is often self-
executing
Most architecture has high plasticity
Its easier to change cyberspace
Architecture's legitimacy is questionable
We should ask the pedigree of any regulation
What should private companies control?
Example: Copyright, DRMS
and anti-circumvention
DRMS - The new paradigm for content
protection
Copyright law was the old paradigm
Content owners want to control 3 parties
Content consumers
Consumer hardware manufacturers
Content intermediaries
(DRMS diagram modified from Bechtold)
Digital
content
owners
Content
intermediaries
(licensed)
Pirate distributors
Publishers, retailers,
DRMS intermediaries,
theatres, TV, etc
Consumer
hardware
manufacturers
(DRMS
licencees)
Circumvention device mfgs;
unlicensed hardware mfgs.
Content
consumers
(purchasers)
Illegal consumer copiers;
borrowers, renters etc
Contract
Technological measures
Technology protection legislation
Content protection legislation
Importance of 'commons'
Lessig's argument in ’The Future of Ideas'
The Internet is an 'innovation commons’
It is in danger of losing that character
'Commons' - Resources from which no-
one may be excluded - the 'free'
Commons are not necessarily 'tragic':
Not if they are non-rivalrous (eg protocols)
Not if you control over-consumption
Both require sufficient incentives to create
Internet as an 'innovation
commons'
Benefits of the Internet as a commons
Benefits to freedom (first book)
Benefits to innovation (second book)
Must consider each Internet 'layer'
Physical layer, 'code' layer (protocols and
applications) and content layer
Each could be a commons or controlled
Currently, each layer is partly controlled
Changes imperil the mix providing innovation
E2e: 'code' layer commons
e2e ('end to end') network design
Philosophy of the original Internet designers
'Smart' features are at the margins
Anyone can add a new application to the net
Network controllers do not decide
applications allowed
Innovation irrespective of the wishes of
network owners
'Code' helps determine the level of innovation
Lessig's recipe for
innovation (1)
1 'Physical' layer reforms
Spectrum allocation for wireless Internet
2 'Code' layer reforms
Government encouragement of open code
US government uses proprietary programs
[The PRC government has done this already]
Require 'code neutrality' by carriers, by
(a) Banishment from providing Internet services; or
(b) Requirement to provide open access; or
(c) No TCP/IP without observing e2e
Lessig's recipe for
innovation (2)
3a Content layer - Copyright law reforms
Short renewable terms
Eldred v Ashmore: stop the term being extended
[Shorter or renewable terms would breach US
treaty obligations]
For software, 5 year term only, renewable
once
A defence for new technologies
'No breach if no harm to copyright owner'
Compulsory licensing of music for file-sharing
Lessig's recipe for
innovation (3)
3a Content layer - Copyright law reforms
(cont)
Tax benefits for putting works into the public
domain
A 'right to hack' DRMS to protect fair use
('Cohen theorem')
Stop contract law undermining copyright law
3b Content layer - Patent law reforms
Moratorium on patents for software and
business methods
References(1)
Works by Lawrence Lessig
• Lawrence Lessig 'The Law of the Horse: What Cyberlaw
Might Teach' (PDF only) (1999) 113 Harvard Law
Review 501 (drafts were available from 1997)
• Lawrence Lessig Code and Other Laws of Cyberspace
Basic Books 1999
• Lawrence Lessig 'Cyberspace's Architectural
Constitution' (June 2000, Text of lecture at www9,
Amsterdam)
• Lawrence Lessig The Future of Ideas: The Fate of the
Commons in a Connected World Random House, 2001
• See his home page for links to these and others
References(2)
Works by others
• James Boyle 'Surveillance, Sovereignty, and Hard-Wired
Censors' (1997)
• Graham Greenleaf 'An Endnote on Regulating
Cyberspace: Architecture vs Law? (1998) University of
New South Wales Law Journal Volume 21, Number 2
• Stefan Bechtold 'From Copyright to Information Law -
Implications of Digital Rights Management'. Workshop
on Security and Privacy in Digital Rights Management
2001. 5. November 2001, Philadelphia, USA.
• See the Timetable for further reading

More Related Content

What's hot

Cyber defamation
Cyber defamationCyber defamation
Cyber defamation
Tuhin Batra
 
Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptx
Rahul Bharati
 
Jursdiction in cyber space
Jursdiction in cyber spaceJursdiction in cyber space
Jursdiction in cyber space
RajeshPatil191
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
Mukesh Tekwani
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
PROF. PUTTU GURU PRASAD
 
Section 66 of Information Technology Act.
Section 66 of Information Technology Act.Section 66 of Information Technology Act.
Section 66 of Information Technology Act.
anveshika thakur
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and nature
Dr. Arun Verma
 
Ch 9 White Collar and Organized Crime
Ch 9 White Collar and Organized CrimeCh 9 White Collar and Organized Crime
Ch 9 White Collar and Organized Crime
rharrisonaz
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
Rishabh Kataria
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crime
Abhinav Tyagi
 
Cyber Obscenity
Cyber ObscenityCyber Obscenity
Cyber Obscenity
sneha164
 
Online Dispute Resolution system
Online Dispute Resolution systemOnline Dispute Resolution system
Online Dispute Resolution system
Ritu Gautam
 
It act 2000
It act 2000It act 2000
It act 2000
Jaipal Dhobale
 
Cyber law case Assignment
Cyber law case AssignmentCyber law case Assignment
Cyber law case Assignment
9945446746
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
atuljaybhaye
 
Cyber law
Cyber lawCyber law
Cyber law
premarhea
 
Types of cyber crime
Types of cyber crimeTypes of cyber crime
Types of cyber crime
InshaLakhani
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
Taha Mehmood
 
Cyberspace
CyberspaceCyberspace
Cyberspace
Utchi
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Mehjabin Chowdhury
 

What's hot (20)

Cyber defamation
Cyber defamationCyber defamation
Cyber defamation
 
Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptx
 
Jursdiction in cyber space
Jursdiction in cyber spaceJursdiction in cyber space
Jursdiction in cyber space
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Section 66 of Information Technology Act.
Section 66 of Information Technology Act.Section 66 of Information Technology Act.
Section 66 of Information Technology Act.
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and nature
 
Ch 9 White Collar and Organized Crime
Ch 9 White Collar and Organized CrimeCh 9 White Collar and Organized Crime
Ch 9 White Collar and Organized Crime
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crime
 
Cyber Obscenity
Cyber ObscenityCyber Obscenity
Cyber Obscenity
 
Online Dispute Resolution system
Online Dispute Resolution systemOnline Dispute Resolution system
Online Dispute Resolution system
 
It act 2000
It act 2000It act 2000
It act 2000
 
Cyber law case Assignment
Cyber law case AssignmentCyber law case Assignment
Cyber law case Assignment
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Cyber law
Cyber lawCyber law
Cyber law
 
Types of cyber crime
Types of cyber crimeTypes of cyber crime
Types of cyber crime
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Similar to Theory Cyberspace

Building Legal Institutions for Information Technology
Building Legal Institutions for Information TechnologyBuilding Legal Institutions for Information Technology
Building Legal Institutions for Information Technology
Ritesh Nayak
 
Ipr and enforcement mechanism
Ipr and enforcement mechanismIpr and enforcement mechanism
Ipr and enforcement mechanism
Ganesh Chindanuru
 
The laws that enable agile software development
The laws that enable agile software developmentThe laws that enable agile software development
The laws that enable agile software development
Speranza Massimiliano
 
Daniel P. Homiller : The "Digital Millennium Copyright Act" (DMCA) and the "E...
Daniel P. Homiller : The "Digital Millennium Copyright Act" (DMCA) and the "E...Daniel P. Homiller : The "Digital Millennium Copyright Act" (DMCA) and the "E...
Daniel P. Homiller : The "Digital Millennium Copyright Act" (DMCA) and the "E...
Centro de Estudios Joan Bardina - Capítulo Uruguay
 
India cyber
India cyberIndia cyber
India cyber
sabariss
 
Www.cccindia.co corecentre database_docs_doc_files_india_cyber
Www.cccindia.co corecentre database_docs_doc_files_india_cyberWww.cccindia.co corecentre database_docs_doc_files_india_cyber
Www.cccindia.co corecentre database_docs_doc_files_india_cyber
cloneseeyom
 
After the Revolutions
After the RevolutionsAfter the Revolutions
After the Revolutions
Mike Godwin
 
INT 1010 05-2.pdf
INT 1010 05-2.pdfINT 1010 05-2.pdf
INT 1010 05-2.pdf
Luis R Castellanos
 
Darknet5 (1)
Darknet5 (1)Darknet5 (1)
Darknet5 (1)
Nitish Bhardwaj
 
Pptx present
Pptx presentPptx present
Pptx present
Nitish Bhardwaj
 
the darknet and the future of content distribution
the darknet and the future of content distributionthe darknet and the future of content distribution
the darknet and the future of content distribution
mustafa sarac
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
iallen
 
CYBOK: Law and Regulation webinar slides.pdf
CYBOK: Law and Regulation webinar slides.pdfCYBOK: Law and Regulation webinar slides.pdf
CYBOK: Law and Regulation webinar slides.pdf
Hari319621
 
Assignment 2
Assignment 2Assignment 2
Assignment 2
shinyvarghese1991
 
Sookman osgoode technology_focus_internet_and_it.ppt
Sookman osgoode technology_focus_internet_and_it.pptSookman osgoode technology_focus_internet_and_it.ppt
Sookman osgoode technology_focus_internet_and_it.ppt
bsookman
 
Computer ethics & copyright
Computer  ethics & copyrightComputer  ethics & copyright
Computer ethics & copyright
Vehitaltinci
 
Hhs en12 legalities_and_ethics
Hhs en12 legalities_and_ethicsHhs en12 legalities_and_ethics
Hhs en12 legalities_and_ethics
Shoaib Sheikh
 
Strategies for Answering Discussion and Essay Questions .docx
Strategies for Answering Discussion and Essay Questions .docxStrategies for Answering Discussion and Essay Questions .docx
Strategies for Answering Discussion and Essay Questions .docx
johniemcm5zt
 
Legal issues
Legal issuesLegal issues
Legal issues
DecardoDay
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
Harshita Ved
 

Similar to Theory Cyberspace (20)

Building Legal Institutions for Information Technology
Building Legal Institutions for Information TechnologyBuilding Legal Institutions for Information Technology
Building Legal Institutions for Information Technology
 
Ipr and enforcement mechanism
Ipr and enforcement mechanismIpr and enforcement mechanism
Ipr and enforcement mechanism
 
The laws that enable agile software development
The laws that enable agile software developmentThe laws that enable agile software development
The laws that enable agile software development
 
Daniel P. Homiller : The "Digital Millennium Copyright Act" (DMCA) and the "E...
Daniel P. Homiller : The "Digital Millennium Copyright Act" (DMCA) and the "E...Daniel P. Homiller : The "Digital Millennium Copyright Act" (DMCA) and the "E...
Daniel P. Homiller : The "Digital Millennium Copyright Act" (DMCA) and the "E...
 
India cyber
India cyberIndia cyber
India cyber
 
Www.cccindia.co corecentre database_docs_doc_files_india_cyber
Www.cccindia.co corecentre database_docs_doc_files_india_cyberWww.cccindia.co corecentre database_docs_doc_files_india_cyber
Www.cccindia.co corecentre database_docs_doc_files_india_cyber
 
After the Revolutions
After the RevolutionsAfter the Revolutions
After the Revolutions
 
INT 1010 05-2.pdf
INT 1010 05-2.pdfINT 1010 05-2.pdf
INT 1010 05-2.pdf
 
Darknet5 (1)
Darknet5 (1)Darknet5 (1)
Darknet5 (1)
 
Pptx present
Pptx presentPptx present
Pptx present
 
the darknet and the future of content distribution
the darknet and the future of content distributionthe darknet and the future of content distribution
the darknet and the future of content distribution
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
CYBOK: Law and Regulation webinar slides.pdf
CYBOK: Law and Regulation webinar slides.pdfCYBOK: Law and Regulation webinar slides.pdf
CYBOK: Law and Regulation webinar slides.pdf
 
Assignment 2
Assignment 2Assignment 2
Assignment 2
 
Sookman osgoode technology_focus_internet_and_it.ppt
Sookman osgoode technology_focus_internet_and_it.pptSookman osgoode technology_focus_internet_and_it.ppt
Sookman osgoode technology_focus_internet_and_it.ppt
 
Computer ethics & copyright
Computer  ethics & copyrightComputer  ethics & copyright
Computer ethics & copyright
 
Hhs en12 legalities_and_ethics
Hhs en12 legalities_and_ethicsHhs en12 legalities_and_ethics
Hhs en12 legalities_and_ethics
 
Strategies for Answering Discussion and Essay Questions .docx
Strategies for Answering Discussion and Essay Questions .docxStrategies for Answering Discussion and Essay Questions .docx
Strategies for Answering Discussion and Essay Questions .docx
 
Legal issues
Legal issuesLegal issues
Legal issues
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 

Recently uploaded

Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
MJDuyan
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
B. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdfB. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdf
BoudhayanBhattachari
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
haiqairshad
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
EduSkills OECD
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
imrankhan141184
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
Constructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective CommunicationConstructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective Communication
Chevonnese Chevers Whyte, MBA, B.Sc.
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
S. Raj Kumar
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
Wahiba Chair Training & Consulting
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 

Recently uploaded (20)

Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
B. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdfB. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdf
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
Constructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective CommunicationConstructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective Communication
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 

Theory Cyberspace

  • 1. Theories of cyberspace regulation The problem: Cyberspace is a different context from the physical world. We may need to rethink how regulation of behaviour works. The question: What regulates? What different forms of regulation are there?
  • 2. Forms of regulation Lawrence Lessig's answers: 4 things regulate - Norms; Markets, Law and 'Code' (environment) Law also regulates the other 3 - indirect regulation by law Effectiveness is very different in cyberspace Lessig's main lesson: Consider all 4 and how they interact Criticism: Surveillance is a 5th form of regulation
  • 3.
  • 4. 1 Norms, morality and self-regulation Real space norms cause disapproval and guilt Cyberspace has its own 'netiquette' Examples: using CAPITALS; attachments sent to lists Effectiveness in cyberspace increased by surveillance The morality of the goldfish bowl
  • 5. 2 Markets Market constrains work in cyberspace Unpopular 'code' can perish Selling region-blocked DVD players in HK? Surveillance damaged DoubleClick's share price Prices can affect norms Are CD / DVD prices considered fair? Is DVD region blocking fair?
  • 6. 3 'Code’ (environment) In real space - Natural and built environment - Bank robberies - Laws and morality help; but walls, locks, glass & guns are better Immigration - Distance and lack of borders Easy to ignore, often because unchangeable In cyberspace - ‘Code’ is the equivalent Can control access, and monitor it Determines what actions are possible and impossible ‘A set of constraints on how one can behave’ -Lessig The walls, bridges, locks and cameras of cyberspace
  • 7. ‘Code' or 'architecture'? 'Code' is cute but confusing East coast code (Washington) vs West coast code (Redmond) The US Code vs hackers' code 'Architecture' is more accurate Cyberspace is more than software Protocols (non-material artefacts) Hardware (material artefacts) Biology and geography (natural environment) 'Code' is part of cyberspace architecture
  • 8. 4 Law - direct and indirect Law increasingly directly regulates cyberspace behaviour But it indirectly regulates the other 3 constraints Legal regulation of architecture is the key It is the most effective strategy for governments It is also vital for limiting private power
  • 9. Effective regulation Finding the best mix of constraints How to prevent discrimination? Prohibition; education; building codes How to stop people smoking? Age limits; prohibited places; education; warnings; taxes
  • 10. Surveillance: 5th constraint A relationship of knowledge Knowledge by the watcher of those watched Foucault's 'discipline'; Bentham's Panopticon Facilitated by architecture, but not part of it Facilitates observance of norms and laws, but independent More important in cyberspace regulation The normal context of identification is removed
  • 11. Law modifying surveillance Law acts indirectly to modify surveillance Data protection laws protect privacy Eg Personal Data (Privacy) Ordinance Laws mandate compliance eg smart ID card Laws prevent circumvention eg DRMS anti-circumvention
  • 12. Cyber-regulation is different Cyberspace architecture is mainly artefact Greater immediacy of application Cyberspace architecture is often self- executing Most architecture has high plasticity Its easier to change cyberspace Architecture's legitimacy is questionable We should ask the pedigree of any regulation What should private companies control?
  • 13. Example: Copyright, DRMS and anti-circumvention DRMS - The new paradigm for content protection Copyright law was the old paradigm Content owners want to control 3 parties Content consumers Consumer hardware manufacturers Content intermediaries (DRMS diagram modified from Bechtold)
  • 14. Digital content owners Content intermediaries (licensed) Pirate distributors Publishers, retailers, DRMS intermediaries, theatres, TV, etc Consumer hardware manufacturers (DRMS licencees) Circumvention device mfgs; unlicensed hardware mfgs. Content consumers (purchasers) Illegal consumer copiers; borrowers, renters etc Contract Technological measures Technology protection legislation Content protection legislation
  • 15. Importance of 'commons' Lessig's argument in ’The Future of Ideas' The Internet is an 'innovation commons’ It is in danger of losing that character 'Commons' - Resources from which no- one may be excluded - the 'free' Commons are not necessarily 'tragic': Not if they are non-rivalrous (eg protocols) Not if you control over-consumption Both require sufficient incentives to create
  • 16. Internet as an 'innovation commons' Benefits of the Internet as a commons Benefits to freedom (first book) Benefits to innovation (second book) Must consider each Internet 'layer' Physical layer, 'code' layer (protocols and applications) and content layer Each could be a commons or controlled Currently, each layer is partly controlled Changes imperil the mix providing innovation
  • 17. E2e: 'code' layer commons e2e ('end to end') network design Philosophy of the original Internet designers 'Smart' features are at the margins Anyone can add a new application to the net Network controllers do not decide applications allowed Innovation irrespective of the wishes of network owners 'Code' helps determine the level of innovation
  • 18. Lessig's recipe for innovation (1) 1 'Physical' layer reforms Spectrum allocation for wireless Internet 2 'Code' layer reforms Government encouragement of open code US government uses proprietary programs [The PRC government has done this already] Require 'code neutrality' by carriers, by (a) Banishment from providing Internet services; or (b) Requirement to provide open access; or (c) No TCP/IP without observing e2e
  • 19. Lessig's recipe for innovation (2) 3a Content layer - Copyright law reforms Short renewable terms Eldred v Ashmore: stop the term being extended [Shorter or renewable terms would breach US treaty obligations] For software, 5 year term only, renewable once A defence for new technologies 'No breach if no harm to copyright owner' Compulsory licensing of music for file-sharing
  • 20. Lessig's recipe for innovation (3) 3a Content layer - Copyright law reforms (cont) Tax benefits for putting works into the public domain A 'right to hack' DRMS to protect fair use ('Cohen theorem') Stop contract law undermining copyright law 3b Content layer - Patent law reforms Moratorium on patents for software and business methods
  • 21. References(1) Works by Lawrence Lessig • Lawrence Lessig 'The Law of the Horse: What Cyberlaw Might Teach' (PDF only) (1999) 113 Harvard Law Review 501 (drafts were available from 1997) • Lawrence Lessig Code and Other Laws of Cyberspace Basic Books 1999 • Lawrence Lessig 'Cyberspace's Architectural Constitution' (June 2000, Text of lecture at www9, Amsterdam) • Lawrence Lessig The Future of Ideas: The Fate of the Commons in a Connected World Random House, 2001 • See his home page for links to these and others
  • 22. References(2) Works by others • James Boyle 'Surveillance, Sovereignty, and Hard-Wired Censors' (1997) • Graham Greenleaf 'An Endnote on Regulating Cyberspace: Architecture vs Law? (1998) University of New South Wales Law Journal Volume 21, Number 2 • Stefan Bechtold 'From Copyright to Information Law - Implications of Digital Rights Management'. Workshop on Security and Privacy in Digital Rights Management 2001. 5. November 2001, Philadelphia, USA. • See the Timetable for further reading