Copy - Cyberlaw Basics (Halloween)
vic
Created on October 30, 2024
Over 30 million people create interactive content in Genially
Check out what others have designed:
TAKING A DEEPER DIVE
Presentation
WWII JUNE NEWSPAPER
Presentation
AUSSTELLUNG STORYTELLING
Presentation
HISTORY OF THE EARTH
Presentation
3 TIPS FOR AN INTERACTIVE PRESENTATION
Presentation
49ERS GOLD RUSH PRESENTATION
Presentation
INTERNATIONAL EVENTS
Presentation
Transcript
HAPPY
Halloween!
Cyberlaw Basics
Warm Up
Victor Laudano
Cyberlaw?
Basics and Theories
04
03
02
01
Facilitation Outline
Lessig's Pathetic Dot Theory
Zittrain's Generative Systems Theory
Easterbrook's Law of the Horse
Lessig's Response to Easterbrook
Norms
Architecture
Market
Law
- 4 regulators (individually "constraints") combine to regulate individual behavior
- can support or undermine one another
- each imposes its own costs for engaging in a behavior
- Must balance the costs, values, and efficiencies of each regulator
Pathetic Dot theory
Lessig (2006)
Innovation
Participation
The Future of the Internet and How to stop it
Zittrain (2008)
Generative technology v. sterile appliancesFeatures of generative systems
- Leverage
- Adaptability
- Ease of Mastery
- Accessibility
- Transferability
write a title
contextualize your topic
Multimedia content is essential to achieve a WOW effect in your creations. Including background music, audio, or sound effects here... it always adds value!
AUDIO 1
AUDIO 3
AUDIO 4
AUDIO 2
+INFO
Do you havean idea?
Display it in a window
LINK
- Generate experiences with your content.
- It has a WOW effect. Very WOW.
- Make your audience remember the message.
- Engage and surprise your audience.
The technology itself, by design or functionality, limits its own use Examples in cyberspace
Architecture
Constrains by imposing physical burdens
- Code
- Software
- Hardware
- Encryption
Norms
Constrains by imposing a social stigma on the regulated behavior
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod.
Lorem ipsum dolor sit
Lorem ipsum dolor
Consectetur adipiscing elit
- Lorem ipsum dolor sit amet.
- Consectetur adipiscing elit.
- Sed do eiusmod tempor incididunt ut.
An increase in the threatened punishment may further deter the unwanted behavior Examples in cyberspace
Law
Constrains by threatening a punishment
- copyright
- defamation
- obscenity
Greater choice and availability across prices and qualities decreases this constraint's efficacy Example in cyberspace
Market
Constrains by price exacted
- pricing structures as a constraint to access