首页 > 最新文献

Information & Communications Technology Law最新文献

英文 中文
12. Copyright infringement in the digital environment 12. 数字环境下的版权侵权
IF 1.5 Q1 LAW Pub Date : 2019-07-15 DOI: 10.1093/HE/9780198804727.003.0012
A. Murray
This chapter analyses cases of copyright infringement in the online environment. It begins by analysing some early cases regarding file-sharing technologies, including A&M Records, Inc. v Napster, Inc., MGM Studios, Inc. v Grokster, Ltd, and Sweden v Neij et al. (the Pirate Bay case). It assesses new techniques for fighting illegal file-sharing, such as blocking access to websites offering file-sharing technology or indexes with a focus on the operation of s. 97A website blocking orders. It examines the recent Supreme Court decision in Cartier International v British Sky Broadcasting which will have substantial implications for costs in these orders. Finally, it describes the slightly controversial process known as speculative invoicing.
本章分析了网络环境下的著作权侵权案件。本文首先分析了一些关于文件共享技术的早期案例,包括A&M唱片公司诉Napster公司,米高梅工作室诉Grokster公司,瑞典诉Neij等人(海盗湾案)。它评估了打击非法文件共享的新技术,例如阻止访问提供文件共享技术或索引的网站,重点是第97A条网站封锁令的操作。它审查了最近最高法院对卡地亚国际诉英国天空广播公司的裁决,这将对这些订单的成本产生重大影响。最后,它描述了被称为投机发票的稍微有争议的过程。
{"title":"12. Copyright infringement in the digital environment","authors":"A. Murray","doi":"10.1093/HE/9780198804727.003.0012","DOIUrl":"https://doi.org/10.1093/HE/9780198804727.003.0012","url":null,"abstract":"This chapter analyses cases of copyright infringement in the online environment. It begins by analysing some early cases regarding file-sharing technologies, including A&M Records, Inc. v Napster, Inc., MGM Studios, Inc. v Grokster, Ltd, and Sweden v Neij et al. (the Pirate Bay case). It assesses new techniques for fighting illegal file-sharing, such as blocking access to websites offering file-sharing technology or indexes with a focus on the operation of s. 97A website blocking orders. It examines the recent Supreme Court decision in Cartier International v British Sky Broadcasting which will have substantial implications for costs in these orders. Finally, it describes the slightly controversial process known as speculative invoicing.","PeriodicalId":44342,"journal":{"name":"Information & Communications Technology Law","volume":"1 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2019-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88845977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
9. Software 9. 软件
IF 1.5 Q1 LAW Pub Date : 2019-07-15 DOI: 10.1093/he/9780198804727.003.0009
A. Murray
This chapter examines whether software should be protected by patent law or by the law of copyright, or through a sui generis form of protection. It first provides a historical background on software and copyright protection, before discussing the scope of software copyright protection and copyright infringement. The chapter then looks at several forms of copyright infringement such as offline, online, and employee piracy, and also explains the look and feel infringement by citing three cases: Navitaire v easyJet, Nova Productions v Mazooma Games, and SAS Institute v World Programming Ltd. In addition, it considers permissible acts under the UK’s Copyright, Designs and Patents Act 1988 without infringing the rights of the copyright holder, including software licences, end-user licence agreements (EULAs),. Finally, the chapter analyses cases relating to patent protection for computer software, including software patents under the European Patent Convention and the decision in Aerotel v Telco and Macrossan.
本章探讨软件是否应该受到专利法或版权法的保护,或者通过一种特殊的保护形式。首先介绍了软件和著作权保护的历史背景,然后讨论了软件著作权保护和著作权侵权的范围。然后,本章将着眼于几种形式的版权侵权,如离线、在线和员工盗版,并通过三个案例来解释外观和感觉侵权:Navitaire诉easyJet, Nova Productions诉Mazooma Games, SAS Institute诉World Programming Ltd。此外,它还考虑在不侵犯版权所有者权利的情况下,根据英国《1988年版权、设计和专利法》允许的行为,包括软件许可证、最终用户许可协议(eula)、最后,本章分析了与计算机软件专利保护有关的案例,包括欧洲专利公约下的软件专利和Aerotel v Telco和Macrossan案的判决。
{"title":"9. Software","authors":"A. Murray","doi":"10.1093/he/9780198804727.003.0009","DOIUrl":"https://doi.org/10.1093/he/9780198804727.003.0009","url":null,"abstract":"This chapter examines whether software should be protected by patent law or by the law of copyright, or through a sui generis form of protection. It first provides a historical background on software and copyright protection, before discussing the scope of software copyright protection and copyright infringement. The chapter then looks at several forms of copyright infringement such as offline, online, and employee piracy, and also explains the look and feel infringement by citing three cases: Navitaire v easyJet, Nova Productions v Mazooma Games, and SAS Institute v World Programming Ltd. In addition, it considers permissible acts under the UK’s Copyright, Designs and Patents Act 1988 without infringing the rights of the copyright holder, including software licences, end-user licence agreements (EULAs),. Finally, the chapter analyses cases relating to patent protection for computer software, including software patents under the European Patent Convention and the decision in Aerotel v Telco and Macrossan.","PeriodicalId":44342,"journal":{"name":"Information & Communications Technology Law","volume":"109 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2019-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80578398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
20. Obscenity in the information society 20.信息社会中的淫秽
IF 1.5 Q1 LAW Pub Date : 2019-07-15 DOI: 10.1093/HE/9780198804727.003.0020
A. Murray
This chapter, which examines pornography and obscenity on the internet, first provides an overview of the UK common law standard known as the Hicklin principle and the Obscene Publications Acts. It then discusses the UK standard and US statutory interventions on pornography, the impact of the case ACLU v Reno on the regulation of sexually explicit content on the internet, pseudo-images, and images depicting child abuse as the most extreme form of pornographic image, and the policing of pseudo-images in the UK and internationally. The chapter also considers the law on non-photographic pornographic images of children, along with private regulation of pornographic imagery and the new Age-verification code for adult websites.
本章探讨了互联网上的色情和淫秽内容,首先概述了英国普通法标准,即希克林原则和淫秽出版物法案。然后讨论了英国标准和美国对色情的法定干预,ACLU诉Reno案对互联网上露骨的色情内容、伪图像和将虐待儿童描述为最极端形式的色情图像的图像的监管的影响,以及英国和国际上对伪图像的监管。这一章还考虑了关于儿童非摄影色情图像的法律,以及色情图像的私人监管和成人网站的新年龄验证码。
{"title":"20. Obscenity in the information society","authors":"A. Murray","doi":"10.1093/HE/9780198804727.003.0020","DOIUrl":"https://doi.org/10.1093/HE/9780198804727.003.0020","url":null,"abstract":"This chapter, which examines pornography and obscenity on the internet, first provides an overview of the UK common law standard known as the Hicklin principle and the Obscene Publications Acts. It then discusses the UK standard and US statutory interventions on pornography, the impact of the case ACLU v Reno on the regulation of sexually explicit content on the internet, pseudo-images, and images depicting child abuse as the most extreme form of pornographic image, and the policing of pseudo-images in the UK and internationally. The chapter also considers the law on non-photographic pornographic images of children, along with private regulation of pornographic imagery and the new Age-verification code for adult websites.","PeriodicalId":44342,"journal":{"name":"Information & Communications Technology Law","volume":"83 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2019-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81071876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
8. Intellectual property rights and the information society 8. 知识产权与信息社会
IF 1.5 Q1 LAW Pub Date : 2019-07-15 DOI: 10.1093/HE/9780198804727.003.0008
A. Murray
This chapter examines intellectual property rights (IPRs) in relation to the information society. The discussion begins with an overview of IPRs involving copyright, patents, trademarks, and the database right, and then considers IPRs and the process of digitization within the framework of cyberlaw. It mentions the criticism received for overprotecting content or systems in the information society and discusses the idea of an over-reliance on models developed for a previous age and for different challenges in dealing with the information economy and society. It concludes by highlighting the tension between the information society and the intellectual property industry in terms of what each wants and expects: liberty, free use of content, and unfettered free expression for the former; and protection, control over use, and abuse and reward for the latter.
本章探讨与信息社会有关的知识产权。本文首先概述了涉及版权、专利、商标和数据库权的知识产权,然后在网络法框架内考虑知识产权和数字化进程。它提到了对信息社会中过度保护内容或系统的批评,并讨论了在处理信息经济和社会时过度依赖为上一个时代和不同挑战而开发的模型的想法。报告最后强调了信息社会和知识产权行业之间的紧张关系,即双方都想要和期待什么:自由,自由使用内容,前者不受约束地自由表达;保护,控制使用,以及对后者的滥用和奖励。
{"title":"8. Intellectual property rights and the information society","authors":"A. Murray","doi":"10.1093/HE/9780198804727.003.0008","DOIUrl":"https://doi.org/10.1093/HE/9780198804727.003.0008","url":null,"abstract":"This chapter examines intellectual property rights (IPRs) in relation to the information society. The discussion begins with an overview of IPRs involving copyright, patents, trademarks, and the database right, and then considers IPRs and the process of digitization within the framework of cyberlaw. It mentions the criticism received for overprotecting content or systems in the information society and discusses the idea of an over-reliance on models developed for a previous age and for different challenges in dealing with the information economy and society. It concludes by highlighting the tension between the information society and the intellectual property industry in terms of what each wants and expects: liberty, free use of content, and unfettered free expression for the former; and protection, control over use, and abuse and reward for the latter.","PeriodicalId":44342,"journal":{"name":"Information & Communications Technology Law","volume":"10 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2019-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81332439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
1. The world of bits 1. 比特的世界
IF 1.5 Q1 LAW Pub Date : 2019-07-15 DOI: 10.1093/he/9780198804727.003.0001
A. Murray
The question ‘what can we control?’ underpins both the information society and the knowledge economy, and represents the maturity of information technology. Most importantly, it signals a transition from a world that saw economic value in terms of atoms to a world which values information in bits. This chapter examines this transition and the role of bits in the information society. It first provides an overview of bits and their place in the digitization process. The chapter then looks at the advent of digital music and other digital goods such as digital video and electronic books. It also considers the shift from rivalrous goods to nonrivalrous goods before concluding with a discussion of the legal challenge of the information society.
问题是“我们能控制什么?”是信息社会和知识经济的基础,是信息技术成熟的标志。最重要的是,它标志着一个从以原子衡量经济价值的世界向以比特衡量信息价值的世界的转变。本章探讨了这种转变和比特在信息社会中的作用。它首先概述了比特及其在数字化过程中的地位。然后,本章探讨了数字音乐和其他数字产品(如数字视频和电子书)的出现。在讨论信息社会的法律挑战之前,它还考虑了从竞争性商品到非竞争性商品的转变。
{"title":"1. The world of bits","authors":"A. Murray","doi":"10.1093/he/9780198804727.003.0001","DOIUrl":"https://doi.org/10.1093/he/9780198804727.003.0001","url":null,"abstract":"The question ‘what can we control?’ underpins both the information society and the knowledge economy, and represents the maturity of information technology. Most importantly, it signals a transition from a world that saw economic value in terms of atoms to a world which values information in bits. This chapter examines this transition and the role of bits in the information society. It first provides an overview of bits and their place in the digitization process. The chapter then looks at the advent of digital music and other digital goods such as digital video and electronic books. It also considers the shift from rivalrous goods to nonrivalrous goods before concluding with a discussion of the legal challenge of the information society.","PeriodicalId":44342,"journal":{"name":"Information & Communications Technology Law","volume":"72 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2019-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87048027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
23. Data protection: rights and obligations 23. 数据保护:权利和义务
IF 1.5 Q1 LAW Pub Date : 2019-07-15 DOI: 10.1093/HE/9780198804727.003.0023
A. Murray
This chapter examines the rights of data subjects under GDPR and the role of the state in supervising data controllers. It examines data subject rights, including the subject access right and the right to correct and manage personal data. It deals with the development of the so-called Right to be Forgotten and the Mario Costeja González case. It examines the current supervisory regime, including the role of the Information Commissioner’s Office and the enforcement rights of data subjects. Key cases, including Durant v The Financial Services Authority, Edem v IC & Financial Services Authority, Dawson-Damer v Taylor Wessing, and Ittihadieh v 5–11 Cheyne Gardens are discussed, and the chapter concludes by examining the enhanced enforcement rights awarded to the Information Commissioner’s Office by the General Data Protection Regulation in 2018.
本章探讨了GDPR下数据主体的权利以及国家在监督数据控制者方面的作用。它审查了数据主体的权利,包括主体访问权和更正和管理个人数据的权利。它涉及所谓的被遗忘权和Mario Costeja González案件的发展。它审查了当前的监管制度,包括信息专员办公室的角色和数据主体的执行权。本章讨论了关键案例,包括Durant诉金融服务管理局、Edem诉IC和金融服务管理局、Dawson-Damer诉Taylor Wessing和Ittihadieh诉5-11 Cheyne Gardens,并通过审查2018年《通用数据保护条例》授予信息专员办公室的增强执法权来结束本章。
{"title":"23. Data protection: rights and obligations","authors":"A. Murray","doi":"10.1093/HE/9780198804727.003.0023","DOIUrl":"https://doi.org/10.1093/HE/9780198804727.003.0023","url":null,"abstract":"This chapter examines the rights of data subjects under GDPR and the role of the state in supervising data controllers. It examines data subject rights, including the subject access right and the right to correct and manage personal data. It deals with the development of the so-called Right to be Forgotten and the Mario Costeja González case. It examines the current supervisory regime, including the role of the Information Commissioner’s Office and the enforcement rights of data subjects. Key cases, including Durant v The Financial Services Authority, Edem v IC & Financial Services Authority, Dawson-Damer v Taylor Wessing, and Ittihadieh v 5–11 Cheyne Gardens are discussed, and the chapter concludes by examining the enhanced enforcement rights awarded to the Information Commissioner’s Office by the General Data Protection Regulation in 2018.","PeriodicalId":44342,"journal":{"name":"Information & Communications Technology Law","volume":"117 2","pages":""},"PeriodicalIF":1.5,"publicationDate":"2019-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72628865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
16. Electronic contracts 16. 电子合同
IF 1.5 Q1 LAW Pub Date : 2019-07-15 DOI: 10.1093/HE/9780198804727.003.0016
A. Murray
This chapter examines contracts in electronic commerce and their implications for the traditional contract law and the law relating to payment and payment methods. It first looks at the rules for the formation of informal electronic contracts and the regulation of offer and acceptance, focusing on Articles 9–11 of the European Union’s Electronic Commerce Directive. The chapter then considers the question of when acceptance is effectively communicated to the offeror, the terms of the contract, and their enforcement as well as evaluating formal contracts and discussing their formation and terms. A focus for this chapter is the evolving laws on electronic signatures, the role of qualified trust service providers and how electronic signatures are formalized. The chapter concludes with a discussion of the evolving area of smart contracts: their design, formation, and what the role of the law is in relation to these self-enforcing agreements.
本章探讨电子商务中的合同及其对传统合同法和有关支付和支付方式的法律的影响。本文首先着眼于非正式电子合同的形成规则以及要约和承诺的监管,重点是欧盟电子商务指令的第9-11条。然后,本章考虑了承诺何时有效地传达给要约人,合同条款及其执行,以及评估正式合同并讨论其形成和条款的问题。本章的重点是电子签名法律的演变、合格信托服务提供者的作用以及电子签名的形式化方式。本章最后讨论了智能合约的发展领域:它们的设计、形成,以及法律在这些自我执行协议中的作用。
{"title":"16. Electronic contracts","authors":"A. Murray","doi":"10.1093/HE/9780198804727.003.0016","DOIUrl":"https://doi.org/10.1093/HE/9780198804727.003.0016","url":null,"abstract":"This chapter examines contracts in electronic commerce and their implications for the traditional contract law and the law relating to payment and payment methods. It first looks at the rules for the formation of informal electronic contracts and the regulation of offer and acceptance, focusing on Articles 9–11 of the European Union’s Electronic Commerce Directive. The chapter then considers the question of when acceptance is effectively communicated to the offeror, the terms of the contract, and their enforcement as well as evaluating formal contracts and discussing their formation and terms. A focus for this chapter is the evolving laws on electronic signatures, the role of qualified trust service providers and how electronic signatures are formalized. The chapter concludes with a discussion of the evolving area of smart contracts: their design, formation, and what the role of the law is in relation to these self-enforcing agreements.","PeriodicalId":44342,"journal":{"name":"Information & Communications Technology Law","volume":"14 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2019-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88815259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
22. Data protection: the legal framework 22. 数据保护:法律框架
IF 1.5 Q1 LAW Pub Date : 2019-07-15 DOI: 10.1093/HE/9780198804727.003.0022
A. Murray
This chapter examines data protection, digitization of data, its implications for personal privacy, and the regulation of data industries. It begins by discussing the current law found in the General Data Protection Regulation and the Data Protection Act 2018. It examines the key concepts of data controllers, data processors, and data subjects, and discusses the conditions for the processing of personal data. This includes an examination of key cases such as Nowak v Data Protection Commissioner and Bodil Lindqvist. It looks at the geographical scope of the GDPR and the extraterritorial effect of the Regulation, and examines the domestic purposes exemption after Ryneš.
本章探讨了数据保护、数据数字化、其对个人隐私的影响以及数据行业的监管。本文首先讨论了《通用数据保护条例》和《2018年数据保护法》中的现行法律。它考察了数据控制者、数据处理者和数据主体的关键概念,并讨论了处理个人数据的条件。这包括对Nowak诉数据保护专员和Bodil Lindqvist等关键案件的审查。它着眼于GDPR的地理范围和该条例的域外效力,并审查了在莱内什之后的国内目的豁免。
{"title":"22. Data protection: the legal framework","authors":"A. Murray","doi":"10.1093/HE/9780198804727.003.0022","DOIUrl":"https://doi.org/10.1093/HE/9780198804727.003.0022","url":null,"abstract":"This chapter examines data protection, digitization of data, its implications for personal privacy, and the regulation of data industries. It begins by discussing the current law found in the General Data Protection Regulation and the Data Protection Act 2018. It examines the key concepts of data controllers, data processors, and data subjects, and discusses the conditions for the processing of personal data. This includes an examination of key cases such as Nowak v Data Protection Commissioner and Bodil Lindqvist. It looks at the geographical scope of the GDPR and the extraterritorial effect of the Regulation, and examines the domestic purposes exemption after Ryneš.","PeriodicalId":44342,"journal":{"name":"Information & Communications Technology Law","volume":"107 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2019-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77007100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
5. Cyber-speech 5. Cyber-speech
IF 1.5 Q1 LAW Pub Date : 2019-07-15 DOI: 10.1093/HE/9780198804727.003.0005
A. Murray
This chapter examines cyber-speech and its implications for free expression. It first provides an overview of the technologies involved, from simple systems such as web pages and internet forums to social media platforms (SMPs) such as blogs, social media platforms, and media-sharing sites. The chapter then highlights the social implications of the shift in power from centralized media organizations to decentralized ‘citizen journalism’. It also considers the responsibilities that citizens owe to each other in this environment and how regulators may balance freedom of expression with social responsibility. To determine whose values predominate when regulating a global media tool which does not recognize traditional borders, the chapter presents three particular case studies: political speech, hate speech, and commercial speech.
本章探讨网络言论及其对言论自由的影响。它首先概述了所涉及的技术,从网页和互联网论坛等简单系统到博客、社会媒体平台和媒体共享网站等社会媒体平台(smp)。然后,本章强调了权力从集中的媒体组织转移到分散的“公民新闻”的社会影响。它还考虑了公民在这种环境中对彼此的责任,以及监管机构如何在言论自由与社会责任之间取得平衡。为了确定在监管不承认传统边界的全球媒体工具时,谁的价值观占主导地位,本章提出了三个具体的案例研究:政治言论、仇恨言论和商业言论。
{"title":"5. Cyber-speech","authors":"A. Murray","doi":"10.1093/HE/9780198804727.003.0005","DOIUrl":"https://doi.org/10.1093/HE/9780198804727.003.0005","url":null,"abstract":"This chapter examines cyber-speech and its implications for free expression. It first provides an overview of the technologies involved, from simple systems such as web pages and internet forums to social media platforms (SMPs) such as blogs, social media platforms, and media-sharing sites. The chapter then highlights the social implications of the shift in power from centralized media organizations to decentralized ‘citizen journalism’. It also considers the responsibilities that citizens owe to each other in this environment and how regulators may balance freedom of expression with social responsibility. To determine whose values predominate when regulating a global media tool which does not recognize traditional borders, the chapter presents three particular case studies: political speech, hate speech, and commercial speech.","PeriodicalId":44342,"journal":{"name":"Information & Communications Technology Law","volume":"5 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2019-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80999381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
3. Net neutrality 3.网络中立
IF 1.5 Q1 LAW Pub Date : 2019-07-15 DOI: 10.1093/HE/9780198804727.003.0003
A. Murray
This chapter examines the nature of network neutrality or net neutrality. This is a highly prized design feature of the network that all data packets shall be treated equally. It was the nature of the early network that this design feature was protected and established by visionaries such as Vint Cerf and Bob Kahn. Tim Berners-Lee the creator of the World Wide Web has written at length as to how net neutrality allowed him to create the web without asking permission from anyone. However, modern network design challenges this ‘first amendment of the internet’ and recent developments, in particular in the United States, have led to debate on whether net neutrality should be legally enshrined.
本章探讨网络中立或网络中立的本质。这是一个高度重视的网络设计特征,所有的数据包都应该被平等对待。早期网络的本质是,这一设计特征得到了文特·瑟夫(Vint Cerf)和鲍勃·卡恩(Bob Kahn)等有远见者的保护和建立。蒂姆·伯纳斯-李,万维网的创造者,曾详细地写过网络中立性是如何让他在不征求任何人许可的情况下创建网络的。然而,现代网络设计挑战了这一“互联网第一修正案”,最近的发展,特别是在美国,引发了关于网络中立性是否应该在法律上得到保障的辩论。
{"title":"3. Net neutrality","authors":"A. Murray","doi":"10.1093/HE/9780198804727.003.0003","DOIUrl":"https://doi.org/10.1093/HE/9780198804727.003.0003","url":null,"abstract":"This chapter examines the nature of network neutrality or net neutrality. This is a highly prized design feature of the network that all data packets shall be treated equally. It was the nature of the early network that this design feature was protected and established by visionaries such as Vint Cerf and Bob Kahn. Tim Berners-Lee the creator of the World Wide Web has written at length as to how net neutrality allowed him to create the web without asking permission from anyone. However, modern network design challenges this ‘first amendment of the internet’ and recent developments, in particular in the United States, have led to debate on whether net neutrality should be legally enshrined.","PeriodicalId":44342,"journal":{"name":"Information & Communications Technology Law","volume":"24 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2019-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81880148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Information & Communications Technology Law
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1