Skip to main content

Digital Right and the Ethics of Digitisation: A Case Study in Technology and Implicit Contracts

  • Chapter
Humanities in the Twenty-First Century
  • 212 Accesses

Abstract

Digitisation represents the fourth great revolution in human communication, following the invention of language, the invention of writing, and the invention of the printing press. The invention of language permitted the communication of symbolic, abstract thought. The invention of writing gave humans the ability to transmit knowledge across generations: for the first time, a person could know more than one could learn from experience in a human lifetime. However, literacy was far from universal, and books were few and far between. Thus, the benefits of literacy were restricted to a small elite: every pre-printing-press civilisation boasted only a small percentage of adult literacy. Even most rulers were illiterate; Charlemagne was notable and noted for his ability to read and write (Burroughs 1980).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1–800-Contacts et al. (2011) Letter in Support of the Protect IP Act. May 2011, http://image.exct.net/lib/fee913797d6303/m/1/110525_MultiIndustry_S968_PROTECTIPAct_Senate.pdf .

  2. American Association of Law Libraries et al. (2011) Re: S. 968, Preventing Real Online Threats to Economic Creativity and Theft of Intellectual Property Act of 2011, 25 May, http://www.publicknowledge.org/files/docs/Publicinterest%20968letter.pdf

  3. Anderson, Nate (2011) ‘Google: don’t give private “trolls” Web censorship power’, Law & Disorder, April, http://arstechnica.com/tech-policy/news/2011/04/goog-le-private-web-censorship-lawsuits-would-create-trolls.ars

  4. Bennett, C. H. and Brassard, G. (1984) ‘Quantum cryptography: public key distribution and coin tossing’, in Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, p. 175.

    Google Scholar 

  5. Berry, John N. (2000) ‘The real purpose of copyright’, Library Journal, 125(12), July, 6.

    Google Scholar 

  6. Bomberger, Alan C, A. Peri Frantz, William S. Frantz, Ann C. Hardy, Norman Hardy, Charles R. Landau and Jonathan S. Shapir (1992) ‘The KeyKOS Nanokernel Architecture’, http://www.cis.upenn.edu/~KeyKOS/NanoKernel/ NanoKernel.html. This paper first appeared in Proceedings of the USENIX Workshop on Micro-Kernels and Other Kernel Architectures, USENIX Association, April, pp. 95–112.

    Google Scholar 

  7. Burroughs, Donald (1980) The Age of Charlemagne, 2nd edn, Exeter Books: New York.

    Google Scholar 

  8. Chiariglione, Leonardo (2000) ‘An open letter to the digital community’, http://web.archive.org/web/20020924131633/http://www.sdmi.org/pr/OL_Sept_6_2000.htm

    Google Scholar 

  9. Couts, Andrew (2012) SOPA sponsor Rep. Lamar Smith to SOPA opponents: You don’t matter. Digital trends, January, http://www.digitaltrends.com/opinion/sopa-sponsor-rep-lamar-smith-to-sopa-opponents-you-dont-matter/

    Google Scholar 

  10. Craver, Scott A., John P. McGregor, Min Wu, Bede Liu, Adam Stubblefield, Ben Swartzlander, Dan S. Wallach, Drew Dean, and Edward W. Felten (2001) Reading Between the Lines : Lessons from the SDMI Challenge. 10th Annual USENIX Security Symposium, 13–17 August, Washington, DC.

    Google Scholar 

  11. Crocker, Steve, David Dagon, Dan Kaminsky, Danny McPherson and Paul Vixie (2011a) ‘Internet engineers’ letter in opposition to DNS filtering legislation’, 12 October, http://www.scribd.com/doc/72712021/Internet-Engineers-Letter-in-Opposition-To-DNS-Filtering-Legislation

    Google Scholar 

  12. Crocker, Steve, David Dagon, Dan Kaminsky, Danny McPherson and Paul Vixie (2011b) Security and other technical concerns raised by the DNS filtering requirements in the PROTECT IP Bill, May, http://domainincite.com/docs/PROTECT-IP-Technical-Whitepaper-Final.pdf

  13. Eaton, Kit (2009) ‘Amazon’s “1984” Kindle recall was legal, not big brotherish’, Fast Company, July, http://www.fastcompany.com/blog/kit-eaton/technomix/amazons-1984-kindle-recall-was-legal-not-big-brotherish

    Google Scholar 

  14. Electronic Frontier Foundation (EFF) (2002) ‘US v. ElcomSoft Sklyarov’, https://www.eff.org/cases/us-v-elcomsoft-sklyarov.

    Google Scholar 

  15. Electronic Frontier Foundation (EFF) (2010) ‘Unintended consequences: twelve years under the DMCA’, https://www.eff.org/wp/unintended-consequences-under-dmca

    Google Scholar 

  16. Gardner, Sue (2012) ‘English wikipedia anti-SOPA blackout’, Wikipedia, 16 January, http://wikimediafoundation.org/wiki/English_Wikipedia_anti-SOPA_blackout

    Google Scholar 

  17. Gribble, Steven D. (2012) ‘Technical Perspective: the benefits of capability-based protection’, in Communications of the ACM, Volume 55, no. 3, March.

    Google Scholar 

  18. Halliday, Josh (2011) ‘Google boss: anti-piracy laws would be disaster for free speech’, The Guardian, 18 May, http://www.guardian.co.uk/technology/2011/ may/18/google-eric-schmidt-piracy

  19. Hathaway, Jay (2008) ‘Steve Jobs confirms iPhone app “kill switch” switched Downloadsquad’, http://downloadsquad.switched.com/2008/08/12/steve-jobs-confirms-iphone-app-kill-switch/

    Google Scholar 

  20. Helprin, Mark (2007) ‘Op-ed: a great idea lives forever. Shouldn’t its copyright?’ The New York Times, 20 May, http://www.nytimes.com/2007/05/20/opinion/20helprin.html

  21. Kastan, Donald (2006) The Oxford Encyclopedia of British Literature, Volume I, Oxford, Oxford University Press.

    Google Scholar 

  22. Kidder, Rushworth M. (1992) In the Backyards of Our Lives and Other Essays, Yankee Books.

    Google Scholar 

  23. Lemley, Mark, David S. Levine and David G. Post (2011) ‘Don’t break the internet’, Stanford Law Review Online, 64 Stan. L. Rev. Online 34 December, http://www.stanfordlawreview.org/online/dont-break-internet

  24. Lessig, Lawrence (2001) ‘Copyright’s First Amendment’, UCLA L. Rev ., 48(1057), 1065.

    Google Scholar 

  25. Levy, Henry M. (1984) Capability-Based Computer Systems, Bedford, Mass., Digital Equipment Corporation/Digital Press.

    Google Scholar 

  26. Manjoo, Fahrad (2009) ‘Why 2024 will be like nineteen eighty-four’, Slate.com, 20 July. http://www.slate.com/articles/technology/technology/2009/07/why_2024_will_be_like_nineteen_eightyfour.html

    Google Scholar 

  27. McCullagh, Declan (2011) ‘Senate bill amounts to death penalty for Web sites’, Cnet News, 12 May, http://news.cnet.com/8301–31921_3–20062398-281.html

    Google Scholar 

  28. Miller, Mark S., Ka-Ping Yee and Jonathan Shapiro (2003) Capability Myths Demolished, Technical Report SRL2003–02, Systems Research Laboratory, Johns Hopkins University PDF available online from www.jhu.edu.

    Google Scholar 

  29. Moren, Dan (2008) ‘Jobs confirms iPhone application “kill switch”’, Macworld, 11 August, http://www.macworld.com/article/1134930/iphone_killswitch.html

  30. Moya, Jared (2010) ‘Court maintains ban on DVD backup software’, ZeroPaid. com, March, http://www.zeropaid.com/news/88303/court-maintains-ban-on-dvd-backup-software/

    Google Scholar 

  31. Naughton, John (2009) ‘The original Big Brother is watching you on Amazon Kindle’, The Observer (26 July).

    Google Scholar 

  32. Noyes, Katherine (2010) ‘UAE to go dark for BlackBerry data’, E-Commerce Times, 2 August, http://www.ecommercetimes.com/story/70533.html

  33. Oppenheim, Matthew J. (2001) ‘RIAA/SDMI legal threat letter’, 9 April, Electronic Frontier Foundation (www.eff.org) .

    Google Scholar 

  34. Pai, Vivek S., Limin Wang, KyoungSoo Park, Ruoming Pang, and Larry Peterson (January 2004) ‘The dark side of the Web: an open proxy’s view’, in SIGCOMM Comput. Commun. Rev., 34(1), 57–62, DOI=10.1145/972374.972385 http://doi.acm.org/10.1145/972374.972385

    Article  Google Scholar 

  35. Rabin, Michael (1979) ‘Digitalized signatures and public key functions as intractable as factorization’, MIT/LCS/TR-212.

    Google Scholar 

  36. Rivest, R., Shamir, A. and Adleman, L. (1978) ‘A method for obtaining digital signatures and public-key cryptosystems’, in Communications of the ACM, 21(2), 120–6, doi:10.1145/359340.359342.

    Article  Google Scholar 

  37. Sandoval, Greg (2009) ‘At RealDVD hearing, MPAA says copying DVDs never legal’, Cnet news, 21 May, http://news.cnet.com/8301–1023_3–10246638-93.html

    Google Scholar 

  38. Shannon, Claude (1949) ‘Communication theory of secrecy systems’, in Bell System Technical Journal, 28(4), 656–715.

    Article  Google Scholar 

  39. Singh, Simon (1999) The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography, New York, Doubleday .

    Google Scholar 

  40. Stone, Brad (2009) ‘Amazon erases Orwell books from Kindle’, New York Times, 18 July, http://www.nytimes.com/2009/07/18/technology/companies/18amazon.html

  41. Timm, Trevor (2012) ‘How PIPA and SOPA violate White House principles supporting free speech and innovation’, The Electronic Frontier Foundation, January, https://www.eff.org/deeplinks/2012/01/how-pipa-and-sopa-violate-white-house-principles-supporting-free-speech

    Google Scholar 

  42. United States Copyright Office (1998) ‘The Digital Millennium Copyright Act of 1998: U.S. Copyright Office Summary’, http://www.copyright.gov/legislation/dmca.pdf

    Google Scholar 

  43. United States House of Representatives (2011) ‘Stop Online Piracy Act (SOPA)’, http://judiciary.house.gov/hearings/pdf/112%20HR%203261.pdf

    Google Scholar 

  44. United States Senate (1996) Senate Report 104–315, ‘Copyright Term Extension Act of 1996’, reproduced at http://www.copyright.gov/legislation/s-rep104–315.html

  45. United States Senate (2011) ‘Preventing Real Online Threats to Economic Creativity and Theft of Intellectual Property Act of 2011’. http://www.govtrack.us/congress/bills/112/s968/text

    Google Scholar 

  46. Watson, R. N. M., Anderson, J., Laurie, B. and Kennaway, K. A. (2012) ‘Taste of Capsicum: practical capabilities for UNIX’, Communications of the ACM, 55(3), March.

    Google Scholar 

  47. Wertlieb, Mark (2012) ‘Leahy says PIPA concerns unfounded’, Vermont Public Radio, January, http://www.vpr.net/news_detail/93116/leahy-says-pipa-concerns-unfounded/

    Google Scholar 

  48. World Intellectual Property Organization (WIPO) (1979) ‘Berne Convention for the Protection of Literary and Artistic Works’, as amended 1979, http://www.wipo.int/treaties/en/ip/berne/trtdocs_wo001.html

    Google Scholar 

  49. Yu, Daisy (2010) ‘Inside the RIM: decrypting the BlackBerry’, Tech News World, 1 October, http://www.technewsworld.com/story/70941.html

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Copyright information

© 2013 Rick McGeer

About this chapter

Cite this chapter

McGeer, R. (2013). Digital Right and the Ethics of Digitisation: A Case Study in Technology and Implicit Contracts. In: Belfiore, E., Upchurch, A. (eds) Humanities in the Twenty-First Century. Palgrave Macmillan, London. https://doi.org/10.1057/9781137361356_12

Download citation

Publish with us

Policies and ethics