Preface |
|
ix | |
|
1 The Communications Decency Act and Section 230 |
|
|
|
Who Is Responsible for Online Content? |
|
|
3 | (6) |
|
The Trump-Twitter Fight Ropes in the Rest of Silicon Valley |
|
|
9 | (4) |
|
|
|
The Law That Made Facebook What It Is Today |
|
|
13 | (3) |
|
|
Biden Wants Sec. 230 Gone, Calls Tech "Totally Irresponsible," "Little Creeps" |
|
|
16 | (4) |
|
|
WSJ, WaPO, NYT Spread False Internet Law Claims |
|
|
20 | (4) |
|
|
The Fight Over Section 230---And the Internet as We Know It |
|
|
24 | (7) |
|
|
|
|
Should the Internet Be a Public Utility? |
|
|
31 | (6) |
|
The Wired Guide to Net Neutrality |
|
|
37 | (5) |
|
|
FCC Chairman: Our Job Is to Protect a Free and Open Internet |
|
|
42 | (2) |
|
|
What the Microsoft Antitrust Case Taught Us |
|
|
44 | (3) |
|
|
|
How the Loss of Net Neutrality Could Change the Internet |
|
|
47 | (3) |
|
|
Net Neutrality May Be Dead in the US, but Europe Is Still Strongly Committed to Open Internet Access |
|
|
50 | (7) |
|
|
3 Digital Copyright Law and Open-Source Software |
|
|
|
The End of Private (Digital) Ownership? |
|
|
57 | (8) |
|
A Brief History of Open Source Software |
|
|
65 | (8) |
|
|
Reevaluating the DMCA 22 Years Later: Let's Think of the Users |
|
|
73 | (3) |
|
|
To Save Pepe the Frog from the Alt-Right, His Creator Has Invoked Copyright Law's Darker Side |
|
|
76 | (5) |
|
|
Twitter Blocks EFF Tweet That Criticized Bogus Takedown of a Previous Tweet |
|
|
81 | (4) |
|
|
In 2019, Multiple Open Source Companies Changed Course---Is It the Right Move? |
|
|
85 | (4) |
|
|
With Friends Like AWS, Who Needs an Open Source Business? |
|
|
89 | (6) |
|
|
|
|
Hackers, User Rights, and Government Surveillance |
|
|
95 | (8) |
|
Senate Republicans Unveil COVID-19-Specific Privacy Bill |
|
|
103 | (2) |
|
|
Mixed Messages: Encryption Fight Pits Security Against Privacy |
|
|
105 | (3) |
|
|
One Man's Obsessive Fight to Reclaim His Cambridge Analytica Data |
|
|
108 | (11) |
|
|
A Dark Web Tycoon Pleads Guilty. But How Was He Caught? |
|
|
119 | (4) |
|
|
Hackers Will Be the Weapon of Choice for Governments in 2020 |
|
|
123 | (3) |
|
|
Proposed US Law Is "Trojan Horse" to Stop Online Encryption, Critics Say |
|
|
126 | (4) |
|
|
Does the CFAA Apply to Voting Machine Hacks? |
|
|
130 | (3) |
|
|
Helicopter Government? How the Internet of Things Enables Pushbutton Regulation from a Distance |
|
|
133 | (6) |
|
|
Doublecheck That Ballot: Controversial Voting Machines Make Their Primary Debut in South Carolina |
|
|
139 | (5) |
|
|
|
144 | (7) |
|
|
5 Digital Nationalism and the Splinternet |
|
|
|
|
151 | (4) |
|
Society's Dependence on the Internet: 5 Cyber Issues the Coronavirus Lays Bare |
|
|
155 | (3) |
|
|
|
Battlefield Internet: A Plan for Securing Cyberspace |
|
|
158 | (8) |
|
|
|
The Rising Threat of Digital Nationalism |
|
|
166 | (5) |
|
|
Make the Internet American Again? |
|
|
171 | (3) |
|
|
Should the U.S. Reclaim Control of the Internet? Evaluating ICANN's Administrative Oversight since the 2016 Handover |
|
|
174 | (7) |
|
Bibliography |
|
181 | (6) |
Websites |
|
187 | (4) |
Index |
|
191 | |