Show simple item record

dc.contributor.authorWagner, Robyn
dc.date.accessioned2007-04-13T21:25:27Z
dc.date.available2007-04-13T21:25:27Z
dc.date.issued2002
dc.identifier.urihttp://hdl.handle.net/1928/2917
dc.description70 p. ; An outstanding student paper selected as a winner of the Raymond W. Schowers Prize.en
dc.description.abstractOn February 12, 2001, the electronic world watched as the Ninth Circuit returned its unanimous decision against the Napster in A&M Records, Inc. v. Napster, Inc. Though the service continues to exist with a radically altered business model, many of Napster's users referred to the decision as one that "killed Napster." What the decision did not do, however, was to kill the public's desire to trade files freely, especially music files. Indeed, ever more sophisticated and powerful alternatives to Napster continue to sprout, attracting former Napster users in droves. When Napster was no longer provided a viable means for file sharing was not reduced, it shifted to whatever service could continue to provide access to content. New technologies periodically threaten to eliminate content owners' abilities to enforce their copyrights, and American copyright law has been at odds with such technologies since its inception. In nearly every case, however, copyright has adjusted to the new technology, frequently finding an unexpected trove of revenue for the copyright holders who had so decried the new technology. Examples of such technologies include piano rolls, phonorecords, motion pictures, cable television, photocopiers, video cassette recorders ("VCRs”), and digital audio tapes ("DATs"). Modern file sharing technologies, such as Napster, present yet another such new technology which threatens the rights of copyright holders. The "descendants" of Napster, however, offer something more. By incorporating strong cryptography and anonymity into modem file-sharing systems, they potentially offer unparalleled avenues of speech. The result pits the First Amendment squarely against the Copyright Act in an unprecedented manner.en_US
dc.format.extent3358116 bytes
dc.format.mimetypeapplication/pdf
dc.language.isoen_USen_US
dc.subjectPeer-To-Peer Networksen_US
dc.subjectFile Sharingen_US
dc.subjectNapsteren_US
dc.subjectCopyright Lawen_US
dc.subjectCopyright Infringementen_US
dc.subjectFirst Amendmenten_US
dc.subjectCryptographyen_US
dc.subjectAnonymityen_US
dc.subjectEnforcementen_US
dc.subjectNinth Circuiten_US
dc.subjectFederal Court Decisionsen_US
dc.subjectCopyright Acten_US
dc.titleCryptography and Anonymity: Two Reasons Why the First Amendment Favors Peer-To-Peer Technologyen_US
dc.typeOtheren_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record