The Future of the Internet - And How to Stop It
暂无分享,去创建一个
[1] L. Hayes,et al. Living with Internet , 1996 .
[2] Thomas H. Jackson,et al. The Fresh-Start Policy in Bankruptcy Law , 1985 .
[3] Julie E. Cohen,et al. Fair Use Infrastructure for Rights Management Systems , 2004 .
[4] Y. Benkler. 'Sharing Nicely': On Shareable Goods and the Emergence of Sharing as a Modality of Economic Production , 2004 .
[5] L. Treviño,et al. Academic Dishonesty: Honor Codes and Other Contextual Influences , 1993 .
[6] Lawrence B. Solum,et al. The Layers Principle: Internet Architecture and the Law , 2003 .
[7] Brett M. Frischmann,et al. Network Neutrality and the Economics of an Information Superhighway: A Reply to Professor Yoo , 2007 .
[8] Chrysanthos Dellarocas,et al. Strategic Manipulation of Internet Opinion Forums: Implications for Consumers and Firms , 2004, Manag. Sci..
[9] Vinton G. Cerf,et al. The past and future history of the Internet , 1997, CACM.
[10] Jacqueline D. Lipton,et al. Beyond Cybersquatting: Taking Domain Name Disputes Past Trademark Policy , 2005 .
[11] Samir Chatterjee,et al. Network convergence and the NAT/Firewall problems , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.
[12] Daniel J. Solove,et al. Privacy and Power: Computer Databases and Metaphors for Information Privacy , 2001 .
[13] Orin S. Kerr. A User's Guide to the Stored Communications Act, and a Legislator's Guide to Amending it , 2003 .
[14] J. Reidenberg. Rules of the Road for Global Electronic Highways: Merging the Trade and Technical Paradigms , 1992 .
[15] Rebecca Henderson. The Innovator's Dilemma as a Problem of Organizational Competence , 2006 .
[16] Philip Selznick,et al. American Society And The Rule Of Law , 2005 .
[17] Juris Hartmanis,et al. The Cornell commission: on Morris and the worm , 1989, Commun. ACM.
[18] J. Zittrain,et al. Spam Works: Evidence from Stock Touts and Corresponding Market Activity , 2007 .
[19] Alan K. Chen. The Ultimate Standard: Qualified Immunity in the Age of Constitutional Balancing Tests , 2005 .
[20] Allan Friedman,et al. Good neighbors can make good fences: a peer-to-peer user security system , 2007, IEEE Technology and Society Magazine.
[21] Tim Wu. Net Neutrality , 2010, Net Neutrality.
[22] Kevin Werbach,et al. A Layered Model for Internet Policy , 2005, J. Telecommun. High Technol. Law.
[23] Jeff Johnson,et al. HOW'S MY DRIVING? , 1998 .
[24] William W. Fisher. THEORIES OF INTELLECTUAL PROPERTY , 2000 .
[25] Gautham Rao,et al. The Federal Posse Comitatus Doctrine: Slavery, Compulsion, and Statecraft in Mid-Nineteenth-Century America , 2008, Law and History Review.
[26] J. Reidenberg. Governing Networks and Rule-Making in Cyberspace , 1996 .
[27] W. Norton. The Evolution of the U.S. Internet Peering Ecosystem , 2003 .
[28] Paul Resnick,et al. Trust among strangers in internet transactions: Empirical analysis of eBay' s reputation system , 2002, The Economics of the Internet and E-commerce.
[29] Lawrence Lessig,et al. Open Code and Open Societies: Values of Internet Governance , 1999 .
[30] R. Lynn Campbell,et al. Judicial involvement in Domain Name Disputes in Canada , 2004 .
[31] Vinton G. Cerf,et al. A brief history of the internet , 1999, CCRV.
[32] Leonardo Lazarte,et al. TO BLOG OR NOT TO BLOG , 2007 .
[33] S. Brenner. Private-Public Sector Cooperation in Combating Cybercrime: In Search of a Model , 2009 .
[34] Jonathan L. Zittrain,et al. Normative Principles for Evaluating Free and Proprietary Software , 2004 .
[35] Druin Burch. Two concepts of liberty , 2004, The Lancet.
[36] Daniel J. Solove. Identity Theft, Privacy, and the Architecture of Vulnerability , 2003 .
[37] J B Whitlow,et al. NASA (NATIONAL AERONAUTICS AND SPACE ADMINISTRATION) ADVANCED TURBOPROP RESEARCH AND CONCEPT VALIDATION PROGRAM , 1988 .
[38] Burton Grad,et al. A Personal Recollection: IBM's Unbundling of Software and Services , 2002, IEEE Ann. Hist. Comput..
[39] L. Kohlberg. The Claim to Moral Adequacy of a Highest Stage of Moral Judgment , 1973 .
[40] Robert E. Kahn,et al. The role of government in the evolution of the Internet , 1994, CACM.
[41] Jerry Kang. Information Privacy in Cyberspace Transactions , 1998 .
[42] David Clark,et al. Do appliances threaten Internet innovation? , 2001, IEEE Commun. Mag..
[43] Mark A. Lemley. Intellectual Property Rights and Standard-Setting Organizations , 2002 .
[44] J. Stiglitz,et al. The Architecture of Economic Systems: Hierarchies and Polyarchies , 1984 .
[45] Gavin A. Schmidt,et al. To blog or not to blog , 2008 .
[46] Paul Resnick,et al. The value of reputation on eBay: A controlled experiment , 2002 .
[47] Philip S. Yu,et al. Intellectual Property and the Information Ecosystem , 2005 .
[48] Cybersecurity and the Generative Dilemma , 2022 .
[49] Christopher S. Yoo,et al. Would Mandating Broadband Network Neutrality Help or Hurt Competition? A Comment on the End-to-End Debate , 2004, J. Telecommun. High Technol. Law.
[50] Joseph William Singer,et al. The Reliance Interest in Property , 1988 .
[51] Harold Borko,et al. The first west coast computer faire: Conference proceedings: J.C. Warren Jr. (editor). 15–17 April 1977, San Francisco, California, $12.00 (paperback) , 1979 .
[52] Dana Cuff,et al. Pervasive Computing: Embedding the Public Sphere , 2004 .
[53] Brett M. Frischmann. An Economic Theory of Infrastructure and Commons Management , 2004 .
[54] James Q. Whitman. Enforcing Civility and Respect: Three Societies , 2000 .
[55] Antonin Scalia,et al. The Rule of Law as a Law of Rules , 1989 .
[56] Joseph E. Stiglitz,et al. The Quality of Managers in Centralized versus Decentralized Organizations , 1990 .
[57] John Markoff,et al. Attack of the Zombie Computers Is Growing Threat , 2007 .
[58] Carlisle M. Adams,et al. Rights Management , 2005, Encyclopedia of Cryptography and Security.
[59] Lawrence Lessig,et al. Reading The Constitution in Cyberspace , 1997 .
[60] William V. Vetter. Preying on the Web: Tax Collection in the Virtual World , 2001 .
[61] L. Kaplow. Rules versus Standards: An Economic Analysis , 1992 .
[62] A. Froomkin,et al. Habermas@discourse.net: Toward a Critical Theory of Cyberspace , 2003 .
[63] J. Barlow. A Declaration of the Independence of Cyberspace , 2021, Commonplace.
[64] James Bessen,et al. medium provided this notice is preserved. AN EMPIRICAL LOOK AT SOFTWARE PATENTS , 2004 .
[65] J. Reidenberg. Lex Informatica: The Formulation of Information Policy Rules through Technology , 1997 .
[66] Judit Bar-Ilan,et al. Web links and search engine ranking: The case of Google and the query "jew" , 2006, J. Assoc. Inf. Sci. Technol..
[67] Byron D. Hittle. An Uphill Battle: The Difficulty of Deterring and Detecting Perpetrators of Internet Stock Fraud , 2001 .
[68] Eric Goldman,et al. A Road to No Warez: The No Electronic Theft Act and Criminal Copyright Infringement , 2004 .
[69] Rebecca MacKinnon,et al. China's Internet: Let a Thousand Filters Bloom , 2005 .
[70] Paul Resnick,et al. Reputation systems , 2000, CACM.
[71] Colby B. Springer. Master of the Domain (Name): A History of Domain Name Litigation and the Emergence of the Anticybersquatting Consumer Protection Act and Uniform Dispute Resolution Policy , 2001 .
[72] Diane M. Griffiths,et al. THE REGENTS OF THE UNIVERSITY OF CALIFORNIA , 2007 .
[73] Neil Weinstock Netanel,et al. Locating Copyright within the First Amendment Skein , 2001 .
[74] G.E. Moore,et al. Cramming More Components Onto Integrated Circuits , 1998, Proceedings of the IEEE.
[75] Barbara van Schewick. Towards an Economic Framework for Network Neutrality Regulation , 2005, J. Telecommun. High Technol. Law.
[76] J. Giles. Internet encyclopaedias go head to head , 2005, Nature.
[77] John Logan Piburn. A constitution and a code , 1932 .
[78] Jerome H. Saltzer,et al. End-to-end arguments in system design , 1984, TOCS.
[79] K. A. Taipale. Internet and Computer Crime: System Architecture as Crime Control , 2003 .
[80] John Langford,et al. CAPTCHA: Using Hard AI Problems for Security , 2003, EUROCRYPT.
[81] Yochai Benkler,et al. Free As the Air to Common Use: First Amendment Constraints on Enclosure of the Public Domain , 1999 .
[82] W. Bradley Wendel,et al. Regulation of Lawyers Without the Code, the Rules, or the Restatement: Or, What Do Honor and Shame Have to do with Civil Discovery Practice? , 2003 .
[83] Mark A. Lemley,et al. The End of End-to-End: Preserving the Architecture of the Internet in the Broadband Era , 2000 .
[84] Christian Sandvig,et al. Software Defaults as De Facto Regulation: The Case of Wireless APs , 2005 .