• Specific Year
    Any

Zhang, Constance --- "Regulation of the Internet - New Laws & New Paradigms" [2006] JlLawInfoSci 4; (2006) 17 Journal of Law, Information and Science 53

[∗] Final year Arts/Law student, University of Sydney.

The author would like to thank Dr Isabel Karpin (Senior Lecturer, Faculty of Law, University of Sydney)

for her advice on this paper as well as the anonymous referees for their helpful suggestions.

[1] Richard A. Spinello, Regulating Cyberspace: The Policies and Technologies of Control (2002) 21.

[2] Andrew D. Murray, The Regulation of Cyberspace: Control in the Online Environment (2007) 233, quoting Eric Schmidt.

[3] James Boyle, Net Total, Law Politics and Property in Cyberspace (2001) 29.

[4] Lawrence Lessig, Code and Other Laws of Cyberspace (1999) 86-8.

[5] Ibid 91-5.

[6] Andrew D. Murray and Colin Scott, ‘Controlling the New Media: Hybrid Responses to New Forms of Power’ (2002) 65 Modern Law Review 491.

[7] Ibid 505.

[8] See Michel Foucault, Discipline and Punish: The Birth of the Prison (1977).

[9] See Michel Foucault, ‘The Eye of Power’ in Colin Gordon (ed) Foucault Power/Knowledge (1980) 146-65.

[10] Lawrence Lessig, The Future of Ideas: the Fate of the Commons in a Connected World (2001) 23.

[11] Spinello, above n 1, 15; Murray, above n 2, 44.

[12] Lessig, above n 4, 6.

[13] Diagram reproduced from Figure 2.4 in Murray, above n 2, 45.

[14] Spinello, above n 1, x.

[15] Ibid 52-7.

[16] Christoph Engel, Governing the Egalitarians from Without: The Case of the Internet (Reprints of the Max Planck Institute, 2003/10) http://ssrn.com/abstract=462485 at 7 May 2007.

[17] P. Goldstein, Copyright’s Highway (1994).

[18] Berne Convention for the Protection of Literary and Artistic Works, opened for signature 9 September 1886, as revised [1978] ATS 5, art 7(1) (entered into force generally 1 August 1931).

[19] Agreement on Trade-Related Aspects of Intellectual Property Rights, opened for signature 15 April 1994 [1995] ATS 38, art 12 (entered into force generally 1 January 1995).

[20] Sections 40-43; 103A-103C. See also other defences in ss 43A-73 and 104-112E.

[21] Murray, above n 2, 176.

[22] Ibid.

[23] Telstra Limited, ‘BigPond Music Terms and Conditions – Terms of Service and Sale (Terms)’ http://bigpondmusic.com/Terms.aspx at 10 June 2007.

[24] D. Burk and J. Cohen, ‘Fair Use Infrastructure for Copyright Management Systems’ (2001) 15 Harvard Journal of Law & Technology 41, 49.

[25] US Court of Appeals 7th Cir No 05-1314 (2005).

[26] 00 Cir 0472 JSR SDNY (2000).

[27] [2005] FCA 972.

[28] A&M Records Inc v Napster Inc, 114 F Supp 2d 896 (N D Cal 2000).

[29] Murray, above n 2, 186.

[30] Ibid.

[31] 125 S Ct 2764 (2005).

[32] Murray, above n 2, 188.

[33] [2005] FCA 1242.

[34] Murray, above n 2, 44-5.

[35] Ibid 195.

[36] European Convention for the Protection of Human Rights and Fundamental Freedoms, opened for signature 10 December 1948, Council of Europe, ETS No 005, (entered into force generally on 3 September 1953).

[37] Engel, above n 16.

[38] Reno v ACLU, [1997] USSC 73; 521 US 844 (1997).

[39] Engel, above n 16.

[40] LICRA v Yahoo! Inc. et Yahoo France, T.G.I. Paris, 22 May 2000, N°RG: 00/05308.

[41] Jack Goldsmith and Tim Wu, Who Controls the Internet? Illusions of a Borderless World (2006) 7, 8; Michael A. Geist, ‘Is There a There There? Toward Greater Certainty for Internet Jurisdiction’ (2001) 16 Berkeley Technology Law Journal 1345, 1350.

[42] Ibid.

[43] Spinello, above n 1, 52-7.

[44] Ibid 116.

[45] Ibid 177-8.

[46] Lessig, above n 4, 34.

[47] Engel, above n 16.

[48] See the classification of problematic online conduct into four categories in Stuart Biegel, Beyond Our Control? Confronting the Limits of Our Legal System in the Age of Cyberspace (2001) 54.

[49] Spinello, above n 1, 221-7; Lessig, above n 4, 30-42, 48-58.

[50] Lessig, above n 4, 54-5.

[51] For a description of this virtual community and the Mr Bungle affair, see J. Dibble, Ch 1 ‘A Rape in Cyberspace’ in My Tiny Life: Crime and Passion in a Virtual World (1998).

[52] ‘Virtual Theft’ Leads to Arrest (2007) BBC News http://news.bbc.co. uk/1/hit/technology/7094764.stm at 14 November 2007.

[53] Jason Whittaker, The Cyberspace Handbook (2004) 272-3.

[54] Boyle, above n 3.

[55] Metro-Goldwyn-Mayer Studios Inc v Grokster Ltd, 243 F Supp 2d 1073 (2003), 1084.

[56] 952 F Supp 1119 (1997).

[57] Brian Fitzgerald, G. Middleton and A. Fitzgerald, Jurisdiction and the Internet (2004) 106-8.

[58] [1984] USSC 53; 465 US 783 (1984).

[59] Fitzgerald and Fitzgerald, above n 57, 106 and 110.

[60] 243 F Supp 2d 1073 (2003).

[61] [2002] HCA 56.

[62] LICRA v Yahoo! Inc. et Yahoo France, T.G.I. Paris, 22 May 2000, N°RG: 00/05308.

[63] Darrel C. Menthe, ‘Jurisdiction in Cyberspace: A Theory of International Spaces’ (1998) 4 Michigan Telecommunications and Technology Law Review 69.

[64] Ibid 84.

[65] The Antarctic Treaty, opened for signature 1 December 1959, [1961] ATS 12, art 8 (entered into force generally 23 June 1961).

[66] Treaty on Principles Governing the Activities of States in the Exploration and Use of Outer Space, including the Moon and Other Celestial Bodies, opened for signature 27 January 1967, [1967] ATS 24, art 8 (entered into force generally 10 October 1967).

[67] Menthe, above n 63, 84.

[68] Ibid 85.

[69] Biegel, above n 48, 157-86.

[70] Jurgen Habermas, ‘Learning by Disaster? A Diagnostic Look Back on the Short 20th Century’ in Constellations Vol 5, No 3, September 1998, 307-320.

Download

No downloadable files available