Presented to you through Paradigm Publishing Services
Yale University Press
Book
Licensed
Unlicensed
Requires Authentication
Configuring the Networked Self
Language:
English
Published/Copyright:
2012
About this book
The legal and technical rules governing flows of information are out of balance, argues Julie E. Cohen in this original analysis of information law and policy. Flows of cultural and technical information are overly restricted, while flows of personal information often are not restricted at all. The author investigates the institutional forces shaping the emerging information society and the contradictions between those forces and the ways that people use information and information technologies in their everyday lives. She then proposes legal principles to ensure that people have ample room for cultural and material participation as well as greater control over the boundary conditions that govern flows of information to, from, and about them.
Author / Editor information
Julie E. Cohen teaches and writes about intellectual property law and privacy law, with particular focus on copyright and on the intersection of copyright and privacy rights in the networked information society. She lives in Bethesda, Maryland.
Topics
-
Download PDFPublicly Available
Frontmatter
i -
Download PDFPublicly Available
Contents
vii -
Download PDFRequires Authentication UnlicensedLicensed
Acknowledgments
ix - Part One: Locating the Networked Self
-
Download PDFRequires Authentication UnlicensedLicensed
1. Introduction: Imagining the Networked Information Society
3 -
Download PDFRequires Authentication UnlicensedLicensed
2. From the Virtual to the Ordinary: Networked Space, Networked Bodies, and the Play of Everyday Practice
32 - Part Two: Copyright and the Play of Culture
-
Download PDFRequires Authentication UnlicensedLicensed
3. Copyright, Creativity, and Cultural Progress
61 -
Download PDFRequires Authentication UnlicensedLicensed
4. Decentering Creativity
80 - Part Three: Privacy and the Play of Subjectivity
-
Download PDFRequires Authentication UnlicensedLicensed
5. Privacy, Autonomy, and Information
107 -
Download PDFRequires Authentication UnlicensedLicensed
6. Reimagining Privacy
127 - Part Four: Code, Control, and the Play of Material Practice
-
Download PDFRequires Authentication UnlicensedLicensed
7. “Piracy,” “Security,” and Architectures of Control
155 -
Download PDFRequires Authentication UnlicensedLicensed
8. Rethinking “Unauthorized Access”
187 - Part Five: Human Flourishing in a Networked World
-
Download PDFRequires Authentication UnlicensedLicensed
9. The Structural Conditions of Human Flourishing
223 -
Download PDFRequires Authentication UnlicensedLicensed
10. Conclusion: Putting Cultural Environmentalism into Practice
267 -
Download PDFRequires Authentication UnlicensedLicensed
Notes
273 -
Download PDFRequires Authentication UnlicensedLicensed
Bibliography
297 -
Download PDFRequires Authentication UnlicensedLicensed
Index
325
Publishing information
Pages and Images/Illustrations in book
eBook published on:
January 24, 2012
eBook ISBN:
9780300177930
Pages and Images/Illustrations in book
Main content:
352