Want to create interactive content? It’s easy in Genially!

Get started free

Copy - Cyberlaw Basics (Halloween)

vic

Created on October 30, 2024

Start designing with a free template

Discover more than 1500 professional designs like these:

Women's Presentation

Vintage Photo Album

Geniaflix Presentation

Shadow Presentation

Newspaper Presentation

Memories Presentation

Zen Presentation

Transcript

HAPPY

Halloween!

Cyberlaw Basics

Warm Up

Cyberlaw?

Basics and Theories
Victor Laudano

Facilitation Outline

01

02

03

04

Lessig's Response to Easterbrook

Easterbrook's Law of the Horse

Zittrain's Generative Systems Theory

Lessig's Pathetic Dot Theory

Pathetic Dot theory

Lessig (2006)
  • 4 regulators (individually "constraints") combine to regulate individual behavior
    • can support or undermine one another
    • each imposes its own costs for engaging in a behavior
  • Must balance the costs, values, and efficiencies of each regulator

Law

Market

Architecture

Norms

The Future of the Internet and How to stop it

Zittrain (2008)

Generative technology v. sterile appliancesFeatures of generative systems

  1. Leverage
  2. Adaptability
  3. Ease of Mastery
  4. Accessibility
  5. Transferability

Innovation
Participation

write a title

AUDIO 1

contextualize your topic

AUDIO 2

Multimedia content is essential to achieve a WOW effect in your creations. Including background music, audio, or sound effects here... it always adds value!

AUDIO 3

+INFO

AUDIO 4

Do you havean idea?

Display it in a window
  • Generate experiences with your content.
  • It has a WOW effect. Very WOW.
  • Make your audience remember the message.
  • Engage and surprise your audience.

LINK

Architecture

Constrains by imposing physical burdens

The technology itself, by design or functionality, limits its own use Examples in cyberspace

  • Code
  • Software
  • Hardware
  • Encryption

Norms

Constrains by imposing a social stigma on the regulated behavior

Lorem ipsum dolor

Consectetur adipiscing elit

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod.

  • Lorem ipsum dolor sit amet.
  • Consectetur adipiscing elit.
  • Sed do eiusmod tempor incididunt ut.

Lorem ipsum dolor sit

Law

Constrains by threatening a punishment

An increase in the threatened punishment may further deter the unwanted behavior Examples in cyberspace

  • copyright
  • defamation
  • obscenity

Market

Constrains by price exacted

Greater choice and availability across prices and qualities decreases this constraint's efficacy Example in cyberspace

  • pricing structures as a constraint to access