Configuring the Networked Self
About this book
The legal and technical rules governing flows of information are out of balance, argues Julie E. Cohen in this original analysis of information law and policy. Flows of cultural and technical information are overly restricted, while flows of personal information often are not restricted at all. The author investigates the institutional forces shaping the emerging information society and the contradictions between those forces and the ways that people use information and information technologies in their everyday lives. She then proposes legal principles to ensure that people have ample room for cultural and material participation as well as greater control over the boundary conditions that govern flows of information to, from, and about them.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Contents
- Acknowledgments
- Part One: Locating the Networked Self
- 1. Introduction: Imagining the Networked Information Society
- 2. From the Virtual to the Ordinary: Networked Space, Networked Bodies, and the Play of Everyday Practice
- Part Two: Copyright and the Play of Culture
- 3. Copyright, Creativity, and Cultural Progress
- 4. Decentering Creativity
- Part Three: Privacy and the Play of Subjectivity
- 5. Privacy, Autonomy, and Information
- 6. Reimagining Privacy
- Part Four: Code, Control, and the Play of Material Practice
- 7. “Piracy,” “Security,” and Architectures of Control
- 8. Rethinking “Unauthorized Access”
- Part Five: Human Flourishing in a Networked World
- 9. The Structural Conditions of Human Flourishing
- 10. Conclusion: Putting Cultural Environmentalism into Practice
- Notes
- Bibliography
- Index
