SlideShare a Scribd company logo
1 of 2
Download to read offline
The case that important gains in liberty promoted by the internet, such as freedom of
speech. We have many choice to make regarding that very nature; planners of cyber
space. Code is call to arms to make the net a place of liberty rather than control.
 “East coast code” namely the code of law, interacts with “west coast code,” namely the
software’s that shapes what can and can’t be done on the internet.
The internet has lost its innocence. The increasing of commercialization of cyberspace
put limits on freedoms. We should all care a great deal about how controllable
cyberspace will be.


The Architecture of Control:

The digital revolution has spawned a series of potential laws and regulations that pose
novel trade-offs between law enforcement, commercial progress, and individual liberty.
This is not surprising: from the telegraph to the telephone, from radio to satellite
television, new technologies have always required new laws and further interpretation of
the constitution. Because cyberspace is likely to become a pervasive part of everyday life,
similar legal decisions may have a profound impact. Market competition will have a lot
to do with how well our rights to intellectual property, free speech, and privacy are
protected.
Only the managers of AOL can broadcast messages to all members. The Y2K problem
should awaken us to other time-bombs in our lives. The character of cyberspace is still up
for grabs and different user environment yield widely different experiences. Along these
lines, lessig looks at how some current on-line environments treats constitutional values.
AOL appears to facilitate free speech by permitting multiple pseudonyms, which makes
mystery.


How Markets Can Promote Fair Use:

A popular belief holds that the digitization of information poses a grave threat to the
publishing and entertainment industries. The nature of cyberspace may flip. Instead of
promoting free and open exchange, it my end up controlling our lives in ways we have
never imagined.
The internet seemed to be a vast, out of control copying machine, churning out a copying
machine. because of emerging encryption technology, we are “entering a time when
copyright is more effectively protected than at any time.
Intellectual property rights have traditionally balanced the interests of the producers, who
should be rewarded for their creative efforts, with those of society, which benefits from
the easy and widespread dissemination of ideas. The music industry pressured
manufacturers of digital audiotape machines to make their devices degrade copies of a
given work after a certain number of copies were made.
Bear in mind that publishers in other media have already had some success at imposing
rules that strength their rights.
Making Cyberspace Safe For Free speech:

The world wide web consortium work on its platform for internet content selection’
which enables the voluntary rating of content and filtering according to those ratings.
Both net scape and Microsoft already have PICS-complaint filters within their browser
software.
Filtering can be a powerful tool of censorship when applied upstream, especially if users
are unaware that it is happening.

Selling Privacy:
Free speech and intellectual property are big issues, especially for the entertainment and
publishing industries. But every company doing business on the internet needs to think
about privacy. The use of customer information is at the heart of virtually all business- to-
consumer e-commerce strategies.
The better move toward is to provide individuals with the rights to their own personal
information, require companies to clearly state and stand by their privacy policies.
Some companies will retain the right to sell consumer information or will simply violate
their stated policies against selling without permission.

More Related Content

What's hot

Techorama 2014, the Real Deal
Techorama 2014, the Real DealTechorama 2014, the Real Deal
Techorama 2014, the Real DealBruno Segers
 
Legal Issues in Applied Technology
Legal Issues in Applied TechnologyLegal Issues in Applied Technology
Legal Issues in Applied TechnologyKarlyseRahming
 
Cyber law for cyber generation
Cyber law for cyber generationCyber law for cyber generation
Cyber law for cyber generationmasihu
 
Mary Beth Henry - Connecting to Our Future: The Digital Livable City - GCS16
Mary Beth Henry - Connecting to Our Future: The Digital Livable City - GCS16Mary Beth Henry - Connecting to Our Future: The Digital Livable City - GCS16
Mary Beth Henry - Connecting to Our Future: The Digital Livable City - GCS16KC Digital Drive
 
Wired Philadelphia
Wired PhiladelphiaWired Philadelphia
Wired Philadelphiachaase
 
Net Neutrality discussion
Net Neutrality discussionNet Neutrality discussion
Net Neutrality discussionUoS
 
Cracking Ubiquitous Payments
Cracking Ubiquitous PaymentsCracking Ubiquitous Payments
Cracking Ubiquitous PaymentsFlip Sasser
 
Overcoming the 3 digital divides - a book chapter by Eli Noam
Overcoming the 3 digital divides - a book chapter by Eli NoamOvercoming the 3 digital divides - a book chapter by Eli Noam
Overcoming the 3 digital divides - a book chapter by Eli NoamXanat V. Meza
 
CE Kordia Introduction
CE Kordia IntroductionCE Kordia Introduction
CE Kordia IntroductionAPNIC
 
Current Events Cisco III - Parr
Current Events Cisco III - ParrCurrent Events Cisco III - Parr
Current Events Cisco III - Parrguestf6708961
 
Cyber Law and Business Report: 2011 in Review
Cyber Law and Business Report: 2011 in ReviewCyber Law and Business Report: 2011 in Review
Cyber Law and Business Report: 2011 in ReviewInternet Law Center
 
Net Neutrality Divy
Net Neutrality DivyNet Neutrality Divy
Net Neutrality DivyDivy Sharma
 
Presentation Ict
Presentation IctPresentation Ict
Presentation Ictsafa
 

What's hot (19)

Techorama 2014, the Real Deal
Techorama 2014, the Real DealTechorama 2014, the Real Deal
Techorama 2014, the Real Deal
 
Legal Issues in Applied Technology
Legal Issues in Applied TechnologyLegal Issues in Applied Technology
Legal Issues in Applied Technology
 
Cyber law for cyber generation
Cyber law for cyber generationCyber law for cyber generation
Cyber law for cyber generation
 
Blog Wars at New Media Expo
Blog Wars at New Media ExpoBlog Wars at New Media Expo
Blog Wars at New Media Expo
 
Mary Beth Henry - Connecting to Our Future: The Digital Livable City - GCS16
Mary Beth Henry - Connecting to Our Future: The Digital Livable City - GCS16Mary Beth Henry - Connecting to Our Future: The Digital Livable City - GCS16
Mary Beth Henry - Connecting to Our Future: The Digital Livable City - GCS16
 
Wired Philadelphia
Wired PhiladelphiaWired Philadelphia
Wired Philadelphia
 
Net Neutrality discussion
Net Neutrality discussionNet Neutrality discussion
Net Neutrality discussion
 
Cracking Ubiquitous Payments
Cracking Ubiquitous PaymentsCracking Ubiquitous Payments
Cracking Ubiquitous Payments
 
Overcoming the 3 digital divides - a book chapter by Eli Noam
Overcoming the 3 digital divides - a book chapter by Eli NoamOvercoming the 3 digital divides - a book chapter by Eli Noam
Overcoming the 3 digital divides - a book chapter by Eli Noam
 
20170418 MEETUP on Creative Commons
20170418 MEETUP on Creative Commons20170418 MEETUP on Creative Commons
20170418 MEETUP on Creative Commons
 
Lecture7
Lecture7Lecture7
Lecture7
 
CE Kordia Introduction
CE Kordia IntroductionCE Kordia Introduction
CE Kordia Introduction
 
Current Events Cisco III - Parr
Current Events Cisco III - ParrCurrent Events Cisco III - Parr
Current Events Cisco III - Parr
 
Amazon Tax Wars
Amazon Tax WarsAmazon Tax Wars
Amazon Tax Wars
 
Cyber Law and Business Report: 2011 in Review
Cyber Law and Business Report: 2011 in ReviewCyber Law and Business Report: 2011 in Review
Cyber Law and Business Report: 2011 in Review
 
Apt 510 slideshare
Apt 510 slideshareApt 510 slideshare
Apt 510 slideshare
 
NET NEUTRALITY final
NET NEUTRALITY finalNET NEUTRALITY final
NET NEUTRALITY final
 
Net Neutrality Divy
Net Neutrality DivyNet Neutrality Divy
Net Neutrality Divy
 
Presentation Ict
Presentation IctPresentation Ict
Presentation Ict
 

Similar to E commerce

Whose Copyright Economy
Whose Copyright EconomyWhose Copyright Economy
Whose Copyright EconomyJyrki Kasvi
 
Copyright economy updated
Copyright economy updatedCopyright economy updated
Copyright economy updatedJyrki Kasvi
 
How Does The Ethics Violate The Dmca Code Of Ethics
How Does The Ethics Violate The Dmca Code Of EthicsHow Does The Ethics Violate The Dmca Code Of Ethics
How Does The Ethics Violate The Dmca Code Of EthicsBeth Johnson
 
Ipr and enforcement mechanism
Ipr and enforcement mechanismIpr and enforcement mechanism
Ipr and enforcement mechanismGanesh Chindanuru
 
Digital media and the law
Digital media and the lawDigital media and the law
Digital media and the lawSu Little
 
Building Legal Institutions for Information Technology
Building Legal Institutions for Information TechnologyBuilding Legal Institutions for Information Technology
Building Legal Institutions for Information TechnologyRitesh Nayak
 
Malaysian Piracy Industry Essay
Malaysian Piracy Industry EssayMalaysian Piracy Industry Essay
Malaysian Piracy Industry EssayCandice Him
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Technology evolves so fast
Technology evolves so fast Technology evolves so fast
Technology evolves so fast Jyrki Kasvi
 
COMPUTER_ETHICS presentation for Engineer
COMPUTER_ETHICS presentation for EngineerCOMPUTER_ETHICS presentation for Engineer
COMPUTER_ETHICS presentation for Engineeriqamin1122
 
Business 2 Students: AI & de impact op de juridische wereld.
Business 2 Students: AI & de impact op de juridische wereld. Business 2 Students: AI & de impact op de juridische wereld.
Business 2 Students: AI & de impact op de juridische wereld. Matthias Dobbelaere-Welvaert
 
ATTOBahn NETWORK(part1)The Internet of Things
ATTOBahn NETWORK(part1)The Internet of ThingsATTOBahn NETWORK(part1)The Internet of Things
ATTOBahn NETWORK(part1)The Internet of ThingsDarryl Gray
 
The Top 10 Technology Trends Of The 4th Industrial Revolution
The Top 10 Technology Trends Of The 4th Industrial RevolutionThe Top 10 Technology Trends Of The 4th Industrial Revolution
The Top 10 Technology Trends Of The 4th Industrial RevolutionAbaram Network Solutions
 

Similar to E commerce (20)

Whose Copyright Economy
Whose Copyright EconomyWhose Copyright Economy
Whose Copyright Economy
 
AOL Success
AOL SuccessAOL Success
AOL Success
 
Copyright economy updated
Copyright economy updatedCopyright economy updated
Copyright economy updated
 
The Kazaa Overlay
The Kazaa OverlayThe Kazaa Overlay
The Kazaa Overlay
 
How Does The Ethics Violate The Dmca Code Of Ethics
How Does The Ethics Violate The Dmca Code Of EthicsHow Does The Ethics Violate The Dmca Code Of Ethics
How Does The Ethics Violate The Dmca Code Of Ethics
 
Ipr and enforcement mechanism
Ipr and enforcement mechanismIpr and enforcement mechanism
Ipr and enforcement mechanism
 
Digital media and the law
Digital media and the lawDigital media and the law
Digital media and the law
 
Building Legal Institutions for Information Technology
Building Legal Institutions for Information TechnologyBuilding Legal Institutions for Information Technology
Building Legal Institutions for Information Technology
 
Malaysian Piracy Industry Essay
Malaysian Piracy Industry EssayMalaysian Piracy Industry Essay
Malaysian Piracy Industry Essay
 
Net Neutrality Rules
Net Neutrality RulesNet Neutrality Rules
Net Neutrality Rules
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Technology evolves so fast
Technology evolves so fast Technology evolves so fast
Technology evolves so fast
 
Creative Commons Essay
Creative Commons EssayCreative Commons Essay
Creative Commons Essay
 
Beyond copyright
Beyond copyrightBeyond copyright
Beyond copyright
 
COMPUTER_ETHICS presentation for Engineer
COMPUTER_ETHICS presentation for EngineerCOMPUTER_ETHICS presentation for Engineer
COMPUTER_ETHICS presentation for Engineer
 
Cr4 tpp leesburg2012
Cr4 tpp leesburg2012Cr4 tpp leesburg2012
Cr4 tpp leesburg2012
 
Cr4 tpp fgv
Cr4 tpp fgvCr4 tpp fgv
Cr4 tpp fgv
 
Business 2 Students: AI & de impact op de juridische wereld.
Business 2 Students: AI & de impact op de juridische wereld. Business 2 Students: AI & de impact op de juridische wereld.
Business 2 Students: AI & de impact op de juridische wereld.
 
ATTOBahn NETWORK(part1)The Internet of Things
ATTOBahn NETWORK(part1)The Internet of ThingsATTOBahn NETWORK(part1)The Internet of Things
ATTOBahn NETWORK(part1)The Internet of Things
 
The Top 10 Technology Trends Of The 4th Industrial Revolution
The Top 10 Technology Trends Of The 4th Industrial RevolutionThe Top 10 Technology Trends Of The 4th Industrial Revolution
The Top 10 Technology Trends Of The 4th Industrial Revolution
 

More from Ali Kamran

More from Ali Kamran (20)

Training and development
Training and developmentTraining and development
Training and development
 
Teacher
Teacher Teacher
Teacher
 
Style textile
Style textileStyle textile
Style textile
 
Sme's
Sme'sSme's
Sme's
 
Section 1 back ground (2)
Section 1 back ground (2)Section 1 back ground (2)
Section 1 back ground (2)
 
Research
ResearchResearch
Research
 
Ptcl
PtclPtcl
Ptcl
 
Pso
PsoPso
Pso
 
Pizza hut presentation
Pizza hut presentationPizza hut presentation
Pizza hut presentation
 
Pia1
Pia1Pia1
Pia1
 
Wah nobel ltd.
Wah nobel ltd.Wah nobel ltd.
Wah nobel ltd.
 
Paktel
PaktelPaktel
Paktel
 
Paktel
PaktelPaktel
Paktel
 
Outsourceing
OutsourceingOutsourceing
Outsourceing
 
Nestle
NestleNestle
Nestle
 
Motorola
MotorolaMotorola
Motorola
 
Mobilink
MobilinkMobilink
Mobilink
 
Marriott
MarriottMarriott
Marriott
 
Marriot questioinnaire
Marriot questioinnaireMarriot questioinnaire
Marriot questioinnaire
 
Management report..furguson
Management report..furgusonManagement report..furguson
Management report..furguson
 

Recently uploaded

Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 

Recently uploaded (20)

20150722 - AGV
20150722 - AGV20150722 - AGV
20150722 - AGV
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 

E commerce

  • 1. The case that important gains in liberty promoted by the internet, such as freedom of speech. We have many choice to make regarding that very nature; planners of cyber space. Code is call to arms to make the net a place of liberty rather than control. “East coast code” namely the code of law, interacts with “west coast code,” namely the software’s that shapes what can and can’t be done on the internet. The internet has lost its innocence. The increasing of commercialization of cyberspace put limits on freedoms. We should all care a great deal about how controllable cyberspace will be. The Architecture of Control: The digital revolution has spawned a series of potential laws and regulations that pose novel trade-offs between law enforcement, commercial progress, and individual liberty. This is not surprising: from the telegraph to the telephone, from radio to satellite television, new technologies have always required new laws and further interpretation of the constitution. Because cyberspace is likely to become a pervasive part of everyday life, similar legal decisions may have a profound impact. Market competition will have a lot to do with how well our rights to intellectual property, free speech, and privacy are protected. Only the managers of AOL can broadcast messages to all members. The Y2K problem should awaken us to other time-bombs in our lives. The character of cyberspace is still up for grabs and different user environment yield widely different experiences. Along these lines, lessig looks at how some current on-line environments treats constitutional values. AOL appears to facilitate free speech by permitting multiple pseudonyms, which makes mystery. How Markets Can Promote Fair Use: A popular belief holds that the digitization of information poses a grave threat to the publishing and entertainment industries. The nature of cyberspace may flip. Instead of promoting free and open exchange, it my end up controlling our lives in ways we have never imagined. The internet seemed to be a vast, out of control copying machine, churning out a copying machine. because of emerging encryption technology, we are “entering a time when copyright is more effectively protected than at any time. Intellectual property rights have traditionally balanced the interests of the producers, who should be rewarded for their creative efforts, with those of society, which benefits from the easy and widespread dissemination of ideas. The music industry pressured manufacturers of digital audiotape machines to make their devices degrade copies of a given work after a certain number of copies were made. Bear in mind that publishers in other media have already had some success at imposing rules that strength their rights.
  • 2. Making Cyberspace Safe For Free speech: The world wide web consortium work on its platform for internet content selection’ which enables the voluntary rating of content and filtering according to those ratings. Both net scape and Microsoft already have PICS-complaint filters within their browser software. Filtering can be a powerful tool of censorship when applied upstream, especially if users are unaware that it is happening. Selling Privacy: Free speech and intellectual property are big issues, especially for the entertainment and publishing industries. But every company doing business on the internet needs to think about privacy. The use of customer information is at the heart of virtually all business- to- consumer e-commerce strategies. The better move toward is to provide individuals with the rights to their own personal information, require companies to clearly state and stand by their privacy policies. Some companies will retain the right to sell consumer information or will simply violate their stated policies against selling without permission.