Welcome to the Globethics.net Library!


  • The Consumer and Investor Access to Information Act of 1999 : hearing before the Subcommittee on Telecommunications, Trade, and Consumer Protection of the Committee on Commerce, House of Representatives, One Hundred Sixth Congress, first session, on H.R. 1858, June 15, 1999.

    United States. Congress. House. Committee on Commerce. Subcommittee on Telecommunications, Trade, and Consumer Protection. (Washington : U.S. G.P.O. : For sale by the U.S. G.P.O., Supt. of Docs., Congressional Sales Office,, 1999)
    "Serial no. 106-49."
  • Authors, Online

    Gervais, Daniel J., 1963- (Columbia Journal of Law & the Arts, 2015)
    article published in law journal
  • Authors, Online

    Gervais, Daniel J. (Columbia Journal of Law & the Arts, 2015)
    article published in law journal
  • Cyber Piracy: Can File Sharing be Regulated without Impeding the Digital Revolution?

    Bogusz, Barbara; Filby, Michael Robert (University of Leicester, 2013-05-30)
    This thesis explores regulatory mechanisms of managing the phenomenon of file sharing in the online environment without impeding key aspects of digital innovation, utilising a modified version of Lessig’s modalities of regulation to demonstrate significant asymmetries in various regulatory approaches. After laying the foundational legal context, the boundaries of future reform are identified as being limited by extra-jurisdictional considerations, and the regulatory direction of legal strategies to which these are related are linked with reliance on design-based regulation. The analysis of the plasticity of this regulatory form reveals fundamental vulnerabilities to the synthesis of hierarchical and architectural constraint, that illustrate the challenges faced by the regulator to date by countervailing forces. Examination of market-based influences suggests that the theoretical justification for the legal regulatory approach is not consistent with academic or policy research analysis, but the extant effect could impede openness and generational waves of innovation. 
 A two-pronged investigation of entertainment industry-based market models indicates that the impact of file sharing could be mitigated through adaptation of the traditional model, or that informational decommodification could be harnessed through a suggested alternative model that embraces the flow of free copies. The latter model demonstrates how the interrelationships between extant network effects and sub-model externalities can be stimulated to maximise capture of revenue without recourse to disruption. The challenges of regulating community-based norms are further highlighted where the analysis submits that the prevalence of countervailing forces or push-back from the regulated act as an anti-constraint to hierarchical and design-based regulation, due to an asymmetry between legal, architectural and traditional market-based approaches, and effective control of the file sharing community. This thesis argues that file sharing can be regulated most efficaciously by addressing this asymmetry through alternative market-based strategies. This can be influenced through extending hierarchical regulation to offer alternative legal and norm-based models that complement, rather than disrupt, the community-based norms of file sharing.
  • The Sport of Cybersecurity: How Professional Sport Leagues Can Better Protect the Competitive Integrity of Their Games

    Grow, Nathaniel; Shackelford, Scott J. (Digital Commons @ Boston College Law School, 2020-02-27)
    From a Major League Baseball scouting director using a cyberattack to break into a competitor’s records, to an NBA franchise being compromised in a phishing scheme, U.S. professional sports leagues are waking up to the fact that cybersecurity is no longer just a problem for the government or tech firms—it has now reached into the playing field, locker room, and boardroom. This Article breaks new ground by examining how the four major U.S. professional sports leagues—Major League Baseball, the National Football League, the National Basketball Association, and the National Hockey League—are protecting themselves from these cyber risks that threaten the competitive integrity of their games, and proposes ways in which the leagues could do more to proactively mitigate their cyber risk.

عرض المزيد