메뉴 건너뛰기




Volumn 5, Issue 4, 2003, Pages 3-9

Manipulating the governance characteristics of code

Author keywords

Communication processes; Information; Modulators; Regulation; Standards; Technology led strategy

Indexed keywords

COMMUNICATION AND INFORMATION MEDIA; REGULATORY FRAMEWORK;

EID: 21644475378     PISSN: 14636697     EISSN: None     Source Type: Journal    
DOI: 10.1108/14636690310495184     Document Type: Article
Times cited : (27)

References (33)
  • 1
    • 0002692296 scopus 로고
    • Filling the gaps in incomplete contracts: an economic theory of default rules
    • Ayres, I. and Gertner, R. (1989), “Filling the gaps in incomplete contracts: an economic theory of default rules”, Yale Law Journal, Vol. 99, pp. 97-130.
    • (1989) Yale Law Journal , vol.99 , pp. 97-130
    • Ayres, I.1    Gertner, R.2
  • 3
    • 0038290017 scopus 로고    scopus 로고
    • Fair use infrastructure for rights management systems
    • Burk, D.L. and Cohen, J.E. (2001), “Fair use infrastructure for rights management systems”, Harvard Journal of Law and Technology, Vol. 15, pp. 41-83.
    • (2001) Harvard Journal of Law and Technology , vol.15 , pp. 41-83
    • Burk, D.L.1    Cohen, J.E.2
  • 5
    • 0042917362 scopus 로고
    • Making standards the IETF way
    • Crocker, D. (1993), “Making standards the IETF way”, Standardview, Vol. 1, pp. 48-56.
    • (1993) Standardview , vol.1 , pp. 48-56
    • Crocker, D.1
  • 8
    • 33644490270 scopus 로고    scopus 로고
    • This bug in your PC is a smart cookie
    • 12 February.
    • Jackson, T. (1996), “This bug in your PC is a smart cookie”, Financial Times, 12 February.
    • (1996) Financial Times
    • Jackson, T.1
  • 9
    • 33644477469 scopus 로고    scopus 로고
    • Software worlds and the first amendment: virtual doorkeepers in cyberspace
    • Katsh, M.E. (1996), “Software worlds and the first amendment: virtual doorkeepers in cyberspace”, The University of Chicago Legal Forum, Vol. 1996, pp. 335-60.
    • (1996) The University of Chicago Legal Forum , vol.1996 , pp. 335-360
    • Katsh, M.E.1
  • 11
    • 0042306308 scopus 로고    scopus 로고
    • Architecture as crime control
    • Katyal, N.K. (2002), “Architecture as crime control”, Yale Law Journal, Vol. 111.
    • (2002) Yale Law Journal , vol.111
    • Katyal, N.K.1
  • 12
    • 0003533519 scopus 로고    scopus 로고
    • HTTP state management mechanism
    • RFC 2965, available at:
    • Kristol, D. and Montulli, L. (2000), “HTTP state management mechanism”, RFC 2965, available at: www.ietf.org/rfc/rfc2965.txt
    • (2000)
    • Kristol, D.1    Montulli, L.2
  • 13
    • 0012128179 scopus 로고    scopus 로고
    • HTTP cookies: standards, privacy and politics
    • Kristol, D.M. (2001), “HTTP cookies: standards, privacy and politics”, ACM Transactions on Internet Technology, Vol. 1, pp. 151-98.
    • (2001) ACM Transactions on Internet Technology , vol.1 , pp. 151-198
    • Kristol, D.M.1
  • 15
    • 0347080017 scopus 로고    scopus 로고
    • The end of end-to-end: preserving the architecture of the Internet in the Broadband era
    • Lemley, M. and Lessig, L. (2001), “The end of end-to-end: preserving the architecture of the Internet in the Broadband era”, UCLA Law Review, Vol. 48, pp. 925-72.
    • (2001) UCLA Law Review , vol.48 , pp. 925-972
    • Lemley, M.1    Lessig, L.2
  • 17
    • 0005470307 scopus 로고    scopus 로고
    • Zoning speech on the Internet: a legal and technical model
    • Lessig, L. and Resnick, P. (1999), “Zoning speech on the Internet: a legal and technical model”, Michigan Law Review, Vol. 98, pp. 395-431.
    • (1999) Michigan Law Review , vol.98 , pp. 395-431
    • Lessig, L.1    Resnick, P.2
  • 19
    • 0035031024 scopus 로고    scopus 로고
    • Cookies and Web browser design: toward realizing informed consent online
    • Association for Computing Machinery
    • Millett, L., Friedman, B. and Felten, E. (2001), “Cookies and Web browser design: toward realizing informed consent online”, in Conference on Human Factors in Computing Systems, Association for Computing Machinery, pp. 46-52.
    • (2001) Conference on Human Factors in Computing Systems , pp. 46-52
    • Millett, L.1    Friedman, B.2    Felten, E.3
  • 21
    • 33644481900 scopus 로고    scopus 로고
    • Opt-in government: using the Internet to empower choice-privacy application
    • Pollack, M. (2001), “Opt-in government: using the Internet to empower choice-privacy application”, Catholic University Law Review, Vol. 50, pp. 653.
    • (2001) Catholic University Law Review , vol.50 , pp. 653
    • Pollack, M.1
  • 22
    • 0242351531 scopus 로고    scopus 로고
    • The national strategy to secure cyberspace
    • available at:
    • President's Critical Infrastructure Protection Board (2002), “The national strategy to secure cyberspace”, available at: www.whitehouse.gov/pcipb/.
    • (2002)
  • 23
    • 0346728652 scopus 로고    scopus 로고
    • Lex Informatica: the formulation of information policy rules through technology
    • Reidenberg, J.R. (1998), “Lex Informatica: the formulation of information policy rules through technology”, Texas Law Review, Vol. 76, pp. 553-93.
    • (1998) Texas Law Review , vol.76 , pp. 553-593
    • Reidenberg, J.R.1
  • 24
    • 0030258432 scopus 로고    scopus 로고
    • PICS: Internet access controls without censorship
    • Resnick, P. and Miller, J. (1996), “PICS: Internet access controls without censorship”, Communications of the ACM, Vol. 39, pp. 87-93.
    • (1996) Communications of the ACM , vol.39 , pp. 87-93
    • Resnick, P.1    Miller, J.2
  • 25
    • 0005502376 scopus 로고    scopus 로고
    • Giving the Web a memory costs its users privacy
    • Schwartz, J. (2001), “Giving the Web a memory costs its users privacy”, in New York Times, 4 September.
    • (2001) New York Times , Issue.4 September
    • Schwartz, J.1
  • 27
    • 0041347548 scopus 로고    scopus 로고
    • Incorporating societal concerns into communication technologies
    • Shah, R.C. and Kesan, J.P. (2003), “Incorporating societal concerns into communication technologies”, IEEE Technology and Society Magazine, Fall.
    • (2003) IEEE Technology and Society Magazine , Issue.Fall
    • Shah, R.C.1    Kesan, J.P.2
  • 30


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.