• 沒有找到結果。

Branscomb, Anne Wells, Anonymity, Autonomy, and Accountability as Challenges to the First Amendment in Cyberspaces, 104 YALE L.J. 1639 (1995).

Burk, Dan L. & Cohen, Julie E., Fair Use Infrastructure For Rights Management Systems, 15 HARV.J.L.&TECH. 41 (2001).

Burk, Dan L. & Lemley, Mark A., Is Patent Law Technology-Specific?, 17 BERKELEY TECH.L.J.

1155 (2002).

Burke, Edmund B. (Peter), The Expanding Importance of The Computer Fraud and Abuse Act,

Gigalaw Article, Jan. 2001, <http://www.gigalaw.com/articles/2001-all/burke-2001-01-all.

html>.

Carrie Kirby, RIAA Goes After 532 Unnamed File Sharers, SAN FRAN.CHRON., Jan. 22, 2004, at B-1, <http://www.sfgate.com/cgi-bin/article.cgi?file=/chronicle/archive/2004/01/22/

BUGJD4EP2O1.DTL>.

Cohen, Julie E., A Right to Read Anonymously: A Closer Look at “Copyright Management” in Cyberspace, 28 CONN. L. Rev. 981 (1996).

Dreazen, Yochi J., Russian Company Passes First Test Of Copyright Law, WALL ST.J., Dec. 18, 2002, at B4.

Esler, Brian W., Protecting the Protection: A Trans-Atlantic Analysis of the Emerging Right to Technological Self-Help, 43 IDEA 553 (2003).

Evangelista, Benny, The Music Revolution Has Arrived: Itunes, Napster 2.0 Make Download-ing Songs Easy and Legal, SAN FRAN.CHRON., Feb. 8, 2004, at E-1, <http://www.sfgate.

com/cgi-bin/article.cgi?file=/chronicle/archive/2003/10/20/BUGJG2E8IF1.DTL>.

Fisher, William & Yang, Christopher, Peer-to-Peer Copying, <http://cyber.law.harvard.edu/

ilaw/P2P.html> (Nov. 18, 2001).

Friedman, Lawrence M., Erewhon: The Coming Global Legal Order, 37 STAN.J.INTL L. 347 (2001).

Gilmore, Janet, Law students draft Internet privacy bill, at <http://www.berkeley.edu/news/

media/releases/2003/05/05_privacy.shtml> (press release May 5, 2003).

Goldsmith, Jack L., Against Cyberanarchy, 65 U.CHI.L.REV. 1199 (1998).

Hopper, D. Ian, House Grills FBI on E-Mail Surveillance, S.F.EXAM., July 25, 2000, at A6

<http://www.sfgate.com/cgi-bin/article.cgi?file=/examiner/archive/2000/07/25/NEWS13188.

dtl>.

Hua, Vanessa & Egelko, Bob, AT&T Wins Appeal on Net Access, S.F.EXAM., June 23, 2000, at B1<http://www.sfgate.com/cgi-bin/article.cgi?file=/examiner/archive/2000/06/23/BUSINESS464.

dtl>.

Johnson, David R. & Post, David G., Law and Borders-The Rise of Law in Cyberspace, 48 STAN.L.REV. 1367 (1996).

Katyal, Neal Kumar, Digital Architecture As Crime Control, 112 YALE L.J. 2261 (2003).

Kerr, Donald M., Congressional Statement on Carnivore Diagnostic Tool, <http://www.fbi.gov/

congress/congress00/kerr090600.htm> (Sept. 6, 2000).

Kraut, Robert E., Sunder, Shyam, Telang, Rahul & Morris, James, Working Paper, Pricing Electronic Mail to Solve the Problem of Spam, at <http://www.heinz.cmu.edu/~rtelang/

Pricing%20Email.pdf>.

Krim, Jonathan, EarthLink, AOL Allege Spamming Networks, WASH.POST, Feb. 19, 2004, at E01.

Litman, Jessica, The DNS Wars: Trademarks And The Internet Domain Name System, 4 J.

SMALL &EMERGING BUS.L. 149 (2000).

Lohr, Steve, Microsoft Said to Encourage Big Investment in SCO Group, N.Y.TIMES, Mar. 12, 2004, at C5, <http://www.nytimes.com/2004/03/12/technology/12soft.html>.

Lyrissa Barnet Lindsky, Silencing John Doe: Defamation and discourse in cyberspace, 49 DUKE L.J. 855 (2000).

Mayer, Caroline E., Court Says Do-Not-Call List Can Be Enforced, WASH.POST, Oct. 8, 2003, at A01 <http://www.washingtonpost.com/wp-dyn/articles/A58828-2003Oct7.html>.

Merges, Robert Patrick & Reynolds, Glenn Harlan, The Proper Scope of the Copyright and Patent Power, 37 HARV.J.LEGIS. 45 (2000).

Nadan, Christian H., Open Source Licensing: Virus or Virtue?, 10 TEX.INTELL.PROP.L.J. 349 (2002).

Post, David, Of Blackholes and Decentralized Lawmaking in Cyberspace, 2 VAND.J.ENT.L.&

PRAC. 70 (2000).

Poulsen, Kevin, Linux Kernel Backdoor Blocked, at <http://www.theregister.co.uk/content/55/

33855.html> (posted Nov. 7, 2003).

Raymond, Eric Steven, Release Early, Release Often, a section in his online treatise The Cathe-dral and the Bazaar, Revision 1.57, at <http://www.catb.org/~esr/writings/catheCathe-dral-bazaar/

cathedral-bazaar/ar01s04.html> (Sept. 11, 2000).

Raysman, Richard & Brown, Peter, Discovering the Identity of Anonymous Internet Posters, N.Y.L.J., Sept. 11, 2001 <http://cyber.law.harvard.edu/stjohns/anon-net.html>.

Reder, Margo E. K. & O’Brien, Christine Neylon, Corprate Cybersmear: Employers File John Doe Defamation Lawsuits Seeking the Identity Ofanonymous Empolyee Internet Posters, 8 MICH.TELCOMM.&TECH.L.REV. 195 (2002), available at <http://www.mttlr.org/ vo-leight/Reder.pdf>.

Reilly, Bill, The Impact of the USA Patriot Act on Network Security Practice, J. Internet L., Mar. 2002, at 1 <http://packetstormsecurity.nl/papers/legal/patriot.doc>.

Samuelson, Pamela, Intellectual Property and the Digital Economy: Why the Anti-Circumvention Regulations Need to Be Revised, 14 BERKELEY TECH.L.J. 519 (1999),

<http://www.sims.berkeley.edu/~pam/papers/Samuelson_IP_dig_eco_htm.htm>.

Zeller, Tom, Cloak, Dagger, Echelon, N.Y. TIMES, July 16, 2000 <http://www.nytimes.

com/library/review/071600echelon-review.html>.

其他

Creative Commons, at <http://creativecommons.org/> (visited Mar. 23, 2004).

eCos, at <http://sources.redhat.com/ecos/> (visited Mar. 23, 2004).

EFF, Cyberslapp / John Doe Cases, at <www.eff.org/Privacy/Anonymity/#cases> (visited Jan.

20, 2004).

EFF, EFF “Intellectual Property: Digital Millennium Copyright Act (DMCA): U.S. v. Elcom-Soft & Sklyarov” Archive, at <http://www.eff.org/IP/DMCA/US_v_Elcomsoft/> (updated Mar. 13, 2003).

EFF, Felten v. RIAA, at <http://www.eff.org/IP/DMCA/Felten_v_RIAA/> (visited Jan. 20, 2004).

EFF, RIAA v. The People, at <http://www.eff.org/IP/P2P/riaa-v-thepeople.php> (visited Mar.

23, 2004).

GNU, Frequently Asked Questions about the GNU GPL, at <http://www.gnu.org/licenses/gpl-faq.html> (updated Feb. 26, 2004).

Open Source Initiative, The Open Source Definition, version 1.9 <http://opensource.org/

docs/definition.php> (visited Mar. 2, 2004).

Spam Laws, at <http://www.spamlaws.com/state/index.html> (visited Mar. 23, 2004).

台灣正體中文 iCommons 討論網站,at <http://www.openfoundry.org/icommons/> (visited Nov. 29, 2003).

自由軟體入口網站,at <http://www.oss.org.tw> (visited Mar. 23, 2004).

國家資通安全會報,at <http://www.nicst.nat.gov.tw/group/application/nics/index.php> (vi-sited Mar. 23, 2004).

相關文件