Papers by Jonathan Zittrain
While the experts meet to sort out the domain name mess, a Web-browser upgrade could make any new... more While the experts meet to sort out the domain name mess, a Web-browser upgrade could make any new governance plan irrelevant.
Harvard Law Review, Jan 1, 2006
... legally protected interests - to create solutions that make it not merely possi-ble, but like... more ... legally protected interests - to create solutions that make it not merely possi-ble, but likely, that the personal computing and networking environ-ment ... An understanding of the value of generativity, the risks of its ex-cesses, and the possible means to reconcile the two, stands to ...
Internet Computing, IEEE, Jan 1, 2003
Several well-known institutions of higher education, including the primary Web servers operated b... more Several well-known institutions of higher education, including the primary Web servers operated by Caltech, Columbia, MIT, and the University of Virginia were blocked. 74
National Tax Journal, Jan 1, 1999
Current tax law makes it difficult to enforce sales taxes on most Internet commerce and has gener... more Current tax law makes it difficult to enforce sales taxes on most Internet commerce and has generated considerable policy debate. In this paper we analyze the costs and benefits of enforcing such taxes including revenue losses, competition with retail, externalities, distribution, and compliance costs. The results suggest that the costs of not enforcing taxes are quite modest and will remain so for several years. At the same time, compliance costs are likely to be low and the benefits of nurturing the Internet diminishing over time. When tax costs and benefits take this form, a moratorium provides a natural compromise.
BCL Rev., Jan 1, 2002
The online availability of pornography and unauthorized intellectual property has driven Internet... more The online availability of pornography and unauthorized intellectual property has driven Internet growth while giving rise to efforts to make the Internet more regulable. Early efforts to control the Internet have targeted the endpoints of the network-the sources and
Stan. L. Rev., Jan 1, 1999
The University of Chicago Law Review, Jan 1, 2004
Berkeley Tech. LJ, Jan 1, 1999
... The answer, it turns out, has been quite complicated, and represents a hybrid of the public a... more ... The answer, it turns out, has been quite complicated, and represents a hybrid of the public and the pri-vate. B. Quasi-private and Quasi-public Domain Naming Schemes There exist wholly private, proprietary naming schemes apart from the domain name system. ...
Harv. JL & Tech., Jan 1, 2005
Hastings Comm. & Ent. LJ, Jan 1, 2007
We assess the impact of stock touting via unsolicited email upon the stocks' trading activity, an... more We assess the impact of stock touting via unsolicited email upon the stocks' trading activity, and sketch how profitable spamming might be for those who manipulate stocks via spam as well as how harmful it is to those who might heed advice in stock-touting e-mails. We suggest that the profitability of spammed stock touting calls for adjustments to securities regulation models that rely principally on the proper labeling of information and disclosure of conflicts of interest in order to protect consumers. Cyr, J. (2005), "Spam Stock Tracker: How Much Can You Lose?",
Conn. L. Rev., Jan 1, 1998
Berkman Center for Internet & Society, Harvard Law …, Jan 1, 2002
Harv. JL & Tech., Jan 1, 1996
Harvard Law Review Forum
Professor Kerr has published a thorough and careful article on the application of the Fourth Amen... more Professor Kerr has published a thorough and careful article on the application of the Fourth Amendment to searches of computers in private hands -a treatment that has previously escaped the attentions of legal academia. 1 Such a treatment is perhaps so overdue that it has been overtaken by two phenomena: first, the emergence of an overriding concern within the United States about terrorism; and second, changes in the way people engage in and store their most private digital communications and artifacts.
... Uzbekistan 265 Europe 277 Europe Overview 279 France 297 Germany 307 Italy 317 Nordic Countri... more ... Uzbekistan 265 Europe 277 Europe Overview 279 France 297 Germany 307 Italy 317 Nordic Countries 325 Turkey 341 United ... rity and Cooperation in Europe (OSCE)including members of the European Union (EU)are (perhaps unintentionally) leading the way toward the ...
London: Allen Lane, Jan 1, 2008
A statement of issues and call for data. Cambridge, MA: …, Jan 1, 2002
… Transactions of the Royal Society A: …, Jan 1, 2008
Ubiquitous computing means network connectivity everywhere, linking devices and systems as small ... more Ubiquitous computing means network connectivity everywhere, linking devices and systems as small as a thumb tack and as large as a worldwide product distribution chain. What could happen when people are so readily networked? This essay explores issues arising from two possible emerging models of ubiquitous human computing: fungible networked brainpower and collective personal vital sign monitoring.
Spreading the Word on the Internet. OSCE: Vienna, Jan 1, 2003
Who rules the net, Jan 1, 2003
Uploads
Papers by Jonathan Zittrain