An edition of Configuring the networked self (2012)

Configuring the networked self

law, code, and the play of everyday practice

My Reading Lists:

Create a new list

Check-In

×Close
Add an optional check-in date. Check-in dates are used to track yearly reading goals.
Today


Buy this book

Last edited by ImportBot
July 20, 2023 | History
An edition of Configuring the networked self (2012)

Configuring the networked self

law, code, and the play of everyday practice

"The legal and technical rules governing flows of information are out of balance, argues Julie E. Cohen in this original analysis of information law and policy. Flows of cultural and technical information are overly restricted, while flows of personal information often are not restricted at all. The author investigates the institutional forces shaping the emerging information society and the contradictions between those forces and the ways that people use information and information technologies in their everyday lives. She then proposes legal principles to ensure that people have ample room for cultural and material participation as well as greater control over the boundary conditions that govern flows of information to, from, and about them"--

Publish Date
Language
English
Pages
337

Buy this book

Previews available in: English

Edition Availability
Cover of: Configuring the Networked Self
Configuring the Networked Self
2012, Yale University Press
in English
Cover of: Configuring the Networked Self
Configuring the Networked Self
2012, Yale University Press
in English
Cover of: Configuring the networked self
Configuring the networked self: law, code, and the play of everyday practice
2012, Yale University Press
in English

Add another edition?

Book Details


Table of Contents

Introduction : imagining the networked information society
From the virtual to the ordinary : networked space, networked bodies, and the play of everyday practice
Copyright, creativity, and cultural progress
Decentering creativity
Privacy, autonomy, and information
Reimagining privacy
Piracy, security, and architectures of control
Rethinking "unauthorized access"
The structural conditions of human flourishing.

Edition Notes

Includes bibliographical references and index.

Published in
New Haven

Classifications

Dewey Decimal Class
342.08/58
Library of Congress
K564.C6 C635 2012, K564.C6C635 2012

The Physical Object

Pagination
p. cm.
Number of pages
337

ID Numbers

Open Library
OL24857835M
Internet Archive
configuringnetwo0000cohe
ISBN 13
9780300125436
LCCN
2011019631
OCLC/WorldCat
711045619

Community Reviews (0)

Feedback?
No community reviews have been submitted for this work.

Lists

This work does not appear on any lists.

History

Download catalog record: RDF / JSON
July 20, 2023 Edited by ImportBot import existing book
August 2, 2020 Edited by ImportBot import existing book
July 27, 2011 Created by LC Bot import new book