skip to main content
Skip header Section
Code and Other Laws of CyberspaceOctober 1999
Publisher:
  • Basic Books, Inc.
  • Division of HarperCollins 10 E. 53rd St. New York, NY
  • United States
ISBN:978-0-465-03912-8
Published:01 October 1999
Pages:
320
Skip Bibliometrics Section
Bibliometrics
Skip Abstract Section
Abstract

From the Publisher:

Should cyberspace be regulated__ __ How can it be done__ __ It's a cherished belief of techies and net denizens everywhere that cyberspace is fundamentally impossible to regulate. Harvard Professor Lawrence Lessig warns that, if we're not careful we'll wake up one day to discover that the character of cyberspace has changed from under us. Cyberspace will no longer be a world of relative freedom; instead it will be a world of perfect control where our identities, actions, and desires are monitored, tracked, and analyzed for the latest market research report. Commercial forces will dictate the change, and architecture—the very structure of cyberspace itself—will dictate the form our interactions can and cannot take.

Code And Other Laws of Cyberspace is an exciting examination of how the core values of cyberspace as we know it—intellectual property, free speech, and privacy-—are being threatened and what we can do to protect them. Lessig shows how code—the architecture and law of cyberspace—can make a domain, site, or network free or restrictive; how technological architectures influence people's behavior and the values they adopt; and how changes in code can have damaging consequences for individual freedoms. Code is not just for lawyers and policymakers; it is a must-read for everyone concerned with survival of democratic values in the Information Age.

Cited By

  1. ACM
    García R, Cediel A, Teixidó M and Gil R (2024). Semantics and Non-fungible Tokens for Copyright Management on the Metaverse and Beyond, ACM Transactions on Multimedia Computing, Communications, and Applications, 20:7, (1-20), Online publication date: 31-Jul-2024.
  2. ACM
    Angel M and Boyd D Techno-legal Solutionism Proceedings of the Symposium on Computer Science and Law, (86-97)
  3. ACM
    Jhaver S, Zhang A, Chen Q, Natarajan N, Wang R and Zhang A (2023). Personalizing Content Moderation on Social Media: User Perspectives on Moderation Choices, Interface Design, and Labor, Proceedings of the ACM on Human-Computer Interaction, 7:CSCW2, (1-33), Online publication date: 28-Sep-2023.
  4. ACM
    Venkatagiri S, Mukhopadhyay A, Hicks D, Brantly A and Luther K CoSINT: Designing a Collaborative Capture the Flag Competition to Investigate Misinformation Proceedings of the 2023 ACM Designing Interactive Systems Conference, (2551-2572)
  5. Aspray W and Doty P (2023). Does technology really outpace policy, and does it matter? A primer for technical experts and others, Journal of the Association for Information Science and Technology, 74:8, (885-904), Online publication date: 1-Jul-2023.
  6. ACM
    Grimmelmann J Programming Languages and Law: A Research Agenda Proceedings of the 2022 Symposium on Computer Science and Law, (155-165)
  7. Griffin R (2022). New school speech regulation as a regulatory strategy against hate speech on social media, Telecommunications Policy, 46:9, Online publication date: 1-Oct-2022.
  8. Karunakaran A (2022). In Cloud We Trust? Co-opting Occupational Gatekeepers to Produce Normalized Trust in Platform-Mediated Interorganizational Relationships, Organization Science, 33:3, (1188-1211), Online publication date: 1-May-2022.
  9. Adamson G Cybersecurity as the protection of cyberspace 2021 IEEE International Symposium on Technology and Society (ISTAS), (1-8)
  10. Binder S, Iannone A and Leibner C (2021). Biometric technology in “no-gate border crossing solutions” under consideration of privacy, ethical, regulatory and social acceptance, Multimedia Tools and Applications, 80:15, (23665-23678), Online publication date: 1-Jun-2021.
  11. ACM
    Venkatagiri S, Gautam A and Luther K (2021). CrowdSolve, Proceedings of the ACM on Human-Computer Interaction, 5:CSCW1, (1-30), Online publication date: 13-Apr-2021.
  12. Liao H, Pan C and Huang J A Scientometric Review of Digital Economy for Intelligent Human-Computer Interaction Research Intelligent Human Computer Interaction, (469-480)
  13. ACM
    Halfaker A and Geiger R (2020). ORES, Proceedings of the ACM on Human-Computer Interaction, 4:CSCW2, (1-37), Online publication date: 14-Oct-2020.
  14. Chang L and Coppel N (2020). Building cyber security awareness in a developing country, Computers and Security, 97:C, Online publication date: 1-Oct-2020.
  15. van de Poel I (2020). Embedding Values in Artificial Intelligence (AI) Systems, Minds and Machines, 30:3, (385-409), Online publication date: 1-Sep-2020.
  16. ACM
    Rashidi Y, Kapadia A, Nippert-Eng C and Su N (2020). "It's easier than causing confrontation": Sanctioning Strategies to Maintain Social Norms and Privacy on Social Media, Proceedings of the ACM on Human-Computer Interaction, 4:CSCW1, (1-25), Online publication date: 28-May-2020.
  17. ACM
    Chandrasekharan E, Gandhi C, Mustelier M and Gilbert E (2019). Crossmod: A Cross-Community Learning-based System to Assist Reddit Moderators, Proceedings of the ACM on Human-Computer Interaction, 3:CSCW, (1-30), Online publication date: 7-Nov-2019.
  18. ACM
    Mulligan D, Kroll J, Kohli N and Wong R (2019). This Thing Called Fairness, Proceedings of the ACM on Human-Computer Interaction, 3:CSCW, (1-36), Online publication date: 7-Nov-2019.
  19. ACM
    Frey S, Krafft P and Keegan B (2019). "This Place Does What It Was Built For", Proceedings of the ACM on Human-Computer Interaction, 3:CSCW, (1-31), Online publication date: 7-Nov-2019.
  20. ACM
    Kurka D, Pitt J and Ober J (2019). Knowledge Management for Self-Organised Resource Allocation, ACM Transactions on Autonomous and Adaptive Systems, 14:1, (1-41), Online publication date: 31-Mar-2019.
  21. ACM
    Liao H, Hsiao Y and Wang Z Choose your country or region? Proceedings of the 2nd International Conference on Information Science and Systems, (221-225)
  22. ACM
    Morgan J and Filippova A (2018). 'Welcome' Changes?, Proceedings of the ACM on Human-Computer Interaction, 2:CSCW, (1-26), Online publication date: 1-Nov-2018.
  23. ACM
    Chandrasekharan E, Samory M, Jhaver S, Charvat H, Bruckman A, Lampe C, Eisenstein J and Gilbert E (2018). The Internet's Hidden Rules, Proceedings of the ACM on Human-Computer Interaction, 2:CSCW, (1-25), Online publication date: 1-Nov-2018.
  24. ACM
    Chandrasekharan E, Samory M, Srinivasan A and Gilbert E The Bag of Communities Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, (3175-3187)
  25. ACM
    Hall A, McRoberts S, Thebault-Spieker J, Lin Y, Sen S, Hecht B and Terveen L Freedom versus Standardization Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, (6352-6362)
  26. O'Hara K (2017). Smart Contracts - Dumb Idea, IEEE Internet Computing, 21:2, (97-101), Online publication date: 1-Mar-2017.
  27. ACM
    Mendel T and Toch E Susceptibility to Social Influence of Privacy Behaviors Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, (581-593)
  28. Centivany A Values, ethics and participatory policymaking in online communities Proceedings of the 79th ASIS&T Annual Meeting: Creating Knowledge, Enhancing Lives through Information & Technology, (1-10)
  29. Castronova E, Knowles I and Ross T (2015). Policy questions raised by virtual economies, Telecommunications Policy, 39:9, (787-795), Online publication date: 1-Oct-2015.
  30. ACM
    Lutz C and Tamò A RoboCode-Ethicists Proceedings of the ACM Web Science Conference, (1-12)
  31. Eto K, Hope T and Takeda H A pattern language for an open academic society with non-professional users Proceedings of the 21st Conference on Pattern Languages of Programs, (1-8)
  32. ACM
    Bechtold S and Perrig A (2014). Accountability in future internet architectures, Communications of the ACM, 57:9, (21-23), Online publication date: 1-Sep-2014.
  33. ACM
    Geiger R Are computers merely "supporting" cooperative work Proceedings of the 2013 conference on Computer supported cooperative work companion, (51-56)
  34. Khan A, Muhammad A and Enriquez A Mining for Norms in Clouds Proceedings of the 2012 IEEE/ACM Fifth International Conference on Utility and Cloud Computing, (327-332)
  35. Klitou D A Solution, But Not a Panacea for Defending Privacy Revised Selected Papers of the First Annual Privacy Forum on Privacy Technologies and Policy - Volume 8319, (86-110)
  36. ACM
    Dong Z, Garg V, Camp L and Kapadia A Pools, clubs and security Proceedings of the 2012 New Security Paradigms Workshop, (77-86)
  37. ACM
    Garg V and Camp L (2012). Gandhigiri in cyberspace, ACM SIGCAS Computers and Society, 42:1, (9-20), Online publication date: 1-Aug-2012.
  38. ACM
    Boyd D (2012). The politics of "real names", Communications of the ACM, 55:8, (29-31), Online publication date: 1-Aug-2012.
  39. ACM
    Jackson S, Pompe A and Krieshok G Repair worlds Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work, (107-116)
  40. ACM
    Hoepman J and Galindo D Non-interactive distributed encryption Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, (81-92)
  41. ACM
    Schwagereit F, Scherp A and Staab S Survey on governance of user-generated content in web communities Proceedings of the 3rd International Web Science Conference, (1-7)
  42. ACM
    Agrawal R, Gollapudi S, Kenthapadi K, Srivastava N and Velu R Enriching textbooks through data mining Proceedings of the First ACM Symposium on Computing for Development, (1-9)
  43. ACM
    Murata K and Orito Y (2010). Japanese risk society, ACM SIGCAS Computers and Society, 40:3, (38-49), Online publication date: 1-Sep-2010.
  44. Gollmann D (2010). Computer security, WIREs Computational Statistics, 2:5, (544-554), Online publication date: 1-Sep-2010.
  45. Mikulecky P Remarks on ubiquitous intelligent supportive spaces Proceedings of the international conference on Computational and information science 2009, (523-528)
  46. ACM
    Astrachan O (2009). Pander to ponder, ACM SIGCSE Bulletin, 41:1, (192-196), Online publication date: 4-Mar-2009.
  47. ACM
    Astrachan O Pander to ponder Proceedings of the 40th ACM technical symposium on Computer science education, (192-196)
  48. Gollmann D Security in Distributed Applications Advances in Software Engineering, (254-276)
  49. ACM
    Boberg M, Piippo P and Ollila E Designing avatars Proceedings of the 3rd international conference on Digital Interactive Media in Entertainment and Arts, (232-239)
  50. Wasieleski D and Gal-Or M (2008). An enquiry into the ethical efficacy of the use of radio frequency identification technology, Ethics and Information Technology, 10:1, (27-40), Online publication date: 1-Mar-2008.
  51. ACM
    Durbin P (2007). Philosophy, activism, and computer and information specialists, Ubiquity, 2007:November, (1-1), Online publication date: 1-Nov-2007.
  52. ACM
    Bhargava H and Feng J The impact of sponsored results on the quality of information gatekeepers Proceedings of the ninth international conference on Electronic commerce, (147-152)
  53. Ensmenger N (2007). Computers as Ethical Artifacts, IEEE Annals of the History of Computing, 29:3, (88-87), Online publication date: 1-Jul-2007.
  54. Thiesse F (2007). RFID, privacy and the perception of risk, The Journal of Strategic Information Systems, 16:2, (214-232), Online publication date: 1-Jun-2007.
  55. ACM
    Flanagan M and Nissenbaum H A game design methodology to incorporate social activist themes Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (181-190)
  56. Whitworth B, de Moor A and Liu T Towards a theory of online social rights Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I, (247-256)
  57. Pitkänen O Legal research topics within services sciences Proceedings of the 2006 conference of the Center for Advanced Studies on Collaborative research, (24-es)
  58. Russell A (2006). 'Rough Consensus and Running Code' and the Internet-OSI Standards War, IEEE Annals of the History of Computing, 28:3, (48-61), Online publication date: 1-Jul-2006.
  59. Shah R and Kesan J Policy through software defaults Proceedings of the 2006 international conference on Digital government research, (265-272)
  60. Sartor G Privacy, reputation, and trust Proceedings of the 4th international conference on Trust Management, (354-366)
  61. ACM
    Tang K, Keyani P, Fogarty J and Hong J Putting people in their place Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (93-102)
  62. Berry D and Moss G (2006). Free and open-source software: Opening and democratising e-government's black box, Information Polity, 11:1, (21-34), Online publication date: 1-Jan-2006.
  63. ACM
    Bryant S, Forte A and Bruckman A Becoming Wikipedian Proceedings of the 2005 ACM International Conference on Supporting Group Work, (1-10)
  64. ACM
    Shah R and Kesan J (2005). Nurturing software, Communications of the ACM, 48:9, (80-85), Online publication date: 1-Sep-2005.
  65. Clark D, Wroclawski J, Sollins K and Braden R (2005). Tussle in cyberspace, IEEE/ACM Transactions on Networking, 13:3, (462-475), Online publication date: 1-Jun-2005.
  66. Shah R and Kesan J Governance characteristics of information technology Proceedings of the 2005 national conference on Digital government research, (91-96)
  67. Hoff J and Bjerke F (2005). Fences and gates in cyberspace: Is the Internet becoming a threat to democracy?, Information Polity, 10:1,2, (141-151), Online publication date: 1-Apr-2005.
  68. Pfleeger S and Bloom G (2005). Canning Spam, IEEE Security and Privacy, 3:2, (40-47), Online publication date: 1-Mar-2005.
  69. Barnard A and Pretorius L Ethical design issues in cyberspace Proceedings of the 4th international symposium on Information and communication technologies, (236-242)
  70. ACM
    Medina E (2004). Beyond the ballot box, ACM SIGCSE Bulletin, 36:4, (7-10), Online publication date: 1-Dec-2004.
  71. ACM
    Kienle H, German D, Tilley S and Müller H Intellectual property aspects of web publishing Proceedings of the 22nd annual international conference on Design of communication: The engineering of quality documentation, (136-144)
  72. ACM
    Mercuri R and Camp L (2004). The code of elections, Communications of the ACM, 47:10, (52-57), Online publication date: 1-Oct-2004.
  73. ACM
    Foo C and Koivisto E Defining grief play in MMORPGs Proceedings of the 2004 ACM SIGCHI International Conference on Advances in computer entertainment technology, (245-250)
  74. Vincent C and Camp J (2004). Looking to the Internet for models of governance, Ethics and Information Technology, 6:3, (161-173), Online publication date: 1-Sep-2004.
  75. ACM
    Hong J, Ng J, Lederer S and Landay J Privacy risk models for designing privacy-sensitive ubiquitous computing systems Proceedings of the 5th conference on Designing interactive systems: processes, practices, methods, and techniques, (91-100)
  76. ACM
    Medina E Beyond the ballot box Working group reports from ITiCSE on Innovation and technology in computer science education, (7-10)
  77. ACM
    Pottie G (2004). Privacy in the global e-village, Communications of the ACM, 47:2, (21-23), Online publication date: 1-Feb-2004.
  78. Scacchi W (2004). Free and Open Source Development Practices in the Game Community, IEEE Software, 21:1, (59-66), Online publication date: 1-Jan-2004.
  79. Kleist V (2004). A Transaction Cost Model of Electronic Trust, Electronic Commerce Research, 4:1-2, (41-57), Online publication date: 1-Jan-2004.
  80. Couldry N (2003). Digital divide or discursive design? On the emerging ethics of information space, Ethics and Information Technology, 5:2, (89-97), Online publication date: 8-Jul-2003.
  81. Spinello R (2003). The future of intellectual property, Ethics and Information Technology, 5:1, (1-16), Online publication date: 17-Jun-2003.
  82. Viseu A (2003). Simulation and augmentation, Ethics and Information Technology, 5:1, (17-26), Online publication date: 17-Jun-2003.
  83. Ishitani L, Almeida V and Meira Jr. W (2003). Masks, IEEE Security and Privacy, 1:3, (18-23), Online publication date: 1-May-2003.
  84. Zwass V (2003). Electronic Commerce and Organizational Innovation, International Journal of Electronic Commerce, 7:3, (7-37), Online publication date: 1-Apr-2003.
  85. Reilly E Cyberspace Encyclopedia of Computer Science, (474-475)
  86. Zeleznikow J (2002). An Australian Perspective on Research and Development Required for the Construction of Applied Legal Decision Support Systems, Artificial Intelligence and Law, 10:4, (237-260), Online publication date: 1-Dec-2002.
  87. ACM
    Camp L DRM Proceedings of the 9th ACM conference on Computer and communications security, (78-87)
  88. Jiang X, Hong J and Landay J Approximate Information Flows Proceedings of the 4th international conference on Ubiquitous Computing, (176-193)
  89. Agrawal R, Kiernan J, Srikant R and Xu Y Hippocratic databases Proceedings of the 28th international conference on Very Large Data Bases, (143-154)
  90. Burk D (2002). Lex genetica, Ethics and Information Technology, 4:2, (109-121), Online publication date: 8-Aug-2002.
  91. Goldberg I Privacy-enhancing technologies for the internet, II Proceedings of the 2nd international conference on Privacy enhancing technologies, (1-12)
  92. Szewczak E Personal information privacy and the internet Managing the human side of information technology, (131-161)
  93. Langheinrich M Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems Proceedings of the 3rd international conference on Ubiquitous Computing, (273-291)
  94. Bennett C (2001). Cookies, web bugs, webcams and cue cats, Ethics and Information Technology, 3:3, (195-208), Online publication date: 19-Sep-2001.
  95. Lyon D (2001). Facing the future, Ethics and Information Technology, 3:3, (171-180), Online publication date: 19-Sep-2001.
  96. Spinello R (2001). Code and moral values in cyberspace, Ethics and Information Technology, 3:2, (137-150), Online publication date: 11-Sep-2001.
  97. Camp J and Lewis K (2001). Code as speech, Ethics and Information Technology, 3:1, (21-33), Online publication date: 2-May-2001.
  98. ACM
    Altman M, Andreev L, Diggory M, King G, Kolster E, Sone A, Verba S, Kiskis D and Krot M Overview of the virtual data center project and software Proceedings of the 1st ACM/IEEE-CS joint conference on Digital libraries, (203-204)
  99. Anacleto J and Fels S Towards a Model of Virtual Proxemics for Wearables Human-Computer Interaction – INTERACT 2015, (433-447)
Contributors
  • Harvard Law School

Recommendations