Want to create interactive content? It’s easy in Genially!
Copy - Cyberlaw Basics (Halloween)
vic
Created on October 30, 2024
Start designing with a free template
Discover more than 1500 professional designs like these:
View
Women's Presentation
View
Vintage Photo Album
View
Geniaflix Presentation
View
Shadow Presentation
View
Newspaper Presentation
View
Memories Presentation
View
Zen Presentation
Transcript
HAPPY
Halloween!
Cyberlaw Basics
Warm Up
Cyberlaw?
Basics and Theories
Victor Laudano
Facilitation Outline
01
02
03
04
Lessig's Response to Easterbrook
Easterbrook's Law of the Horse
Zittrain's Generative Systems Theory
Lessig's Pathetic Dot Theory
Pathetic Dot theory
Lessig (2006)
- 4 regulators (individually "constraints") combine to regulate individual behavior
- can support or undermine one another
- each imposes its own costs for engaging in a behavior
- Must balance the costs, values, and efficiencies of each regulator
Law
Market
Architecture
Norms
The Future of the Internet and How to stop it
Zittrain (2008)
Generative technology v. sterile appliancesFeatures of generative systems
- Leverage
- Adaptability
- Ease of Mastery
- Accessibility
- Transferability
Innovation
Participation
write a title
AUDIO 1
contextualize your topic
AUDIO 2
Multimedia content is essential to achieve a WOW effect in your creations. Including background music, audio, or sound effects here... it always adds value!
AUDIO 3
+INFO
AUDIO 4
Do you havean idea?
Display it in a window
- Generate experiences with your content.
- It has a WOW effect. Very WOW.
- Make your audience remember the message.
- Engage and surprise your audience.
LINK
Architecture
Constrains by imposing physical burdens
The technology itself, by design or functionality, limits its own use Examples in cyberspace
- Code
- Software
- Hardware
- Encryption
Norms
Constrains by imposing a social stigma on the regulated behavior
Lorem ipsum dolor
Consectetur adipiscing elit
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod.
- Lorem ipsum dolor sit amet.
- Consectetur adipiscing elit.
- Sed do eiusmod tempor incididunt ut.
Lorem ipsum dolor sit
Law
Constrains by threatening a punishment
An increase in the threatened punishment may further deter the unwanted behavior Examples in cyberspace
- copyright
- defamation
- obscenity
Market
Constrains by price exacted
Greater choice and availability across prices and qualities decreases this constraint's efficacy Example in cyberspace
- pricing structures as a constraint to access