T Steal a Car' Vs 'Information Wants to Be Free' Regulatory Failure of Copyright Law Through the Prism of Systems Theory

Total Page:16

File Type:pdf, Size:1020Kb

T Steal a Car' Vs 'Information Wants to Be Free' Regulatory Failure of Copyright Law Through the Prism of Systems Theory 'You wouldn't steal a car' vs 'Information wants to be free' Regulatory failure of copyright law through the prism of Systems Theory Katarzyna Gracz Thesis submitted for assessment with a view to obtaining the degree of Doctor of Laws of the European University Institute Florence, 10.05.2016 European University Institute Department of Law 'You wouldn't steal a car' vs 'Information wants to be free' Regulatory failure of copyright law through the prism of Systems Theory Katarzyna Gracz Thesis submitted for assessment with a view to obtaining the degree of Doctor of Laws of the European University Institute Examining Board Prof. Dr. Giovanni Sartor, European University Institute (Supervisor) Prof. Dr. Jiři Přiban, Cardiff University (Co-Supervisor) Prof. Dr. Hans-Wolfgang Micklitz, European University Institute Prof. em. Dr. Gunther Teubner, Goethe Universität, Frankfurt am Main © Katarzyna Gracz, 2016 No part of this thesis may be copied, reproduced or transmitted without prior permission of the author Researcher declaration to accompany the submission of written work Department of Law – LL.M. and Ph.D. Programmes I Katarzyna Gracz certify that I am the author of the work 'You wouldn't steal a car' vs 'Information wants to be free' Regulatory failure of copyright law through the prism of Systems Theory I have presented for examination for the Ph.D. at the European University Institute. I also certify that this is solely my own original work, other than where I have clearly indicated, in this declaration and in the thesis, that it is the work of others. I warrant that I have obtained all the permissions required for using any material from other copyrighted publications. I certify that this work complies with the Code of Ethics in Academic Research issued by the European University Institute (IUE 332/2/10 (CA 297). The copyright of this work rests with its author. Quotation from this thesis is permitted, provided that full acknowledgement is made. This work may not be reproduced without my prior written consent. This authorisation does not, to the best of my knowledge, infringe the rights of any third party. I declare that this work consists of 130 000 words. Statement of inclusion of previous work (if applicable): I confirm that earlier drafts of fragments of this thesis have been already published in: Katarzyna Gracz, 'Bridging the Gaps Between Social and Legal Norms Concerning Protection of Intellectual and Artistic Creations: On the Crisis of Copyright Law in the Digital Era', The Journal of World Intellectual Property (2013) Vol. 16, no. 1–2, pp. 39–57; Katarzyna Gracz and Primavera de Filippi, 'Regulatory failure of copyright law through the lenses of autopoietic systems theory'. International Journal of Law And Information Technology, 2014, 0, 1–33; Katarzyna Gracz, 'On the Role of Copyright Protection in the Information Society. Anti-ACTA Protests in Poland as a Lesson in Participatory Democracy', 4 (2013) Journal of Intellectual Property, Information Technology and Electronic Commerce Law (JIPITEC) 21; Statement of language correction (if applicable): This thesis (has been corrected for linguistic and stylistic errors. I certify that I have checked and approved all language corrections, and that these have not affected the content of this work. Florence, 29.02.2016 To my three beloved boys: Ignanio, Tolo and Kajtek so that they always remember that one should never give up no matter how hopeless the process might seem. Gentlemen, thank you for being my strength. I would have never done it without you. For my Grandmother who taught me this lesson and my Mom, Dad and all the rest of my Family who never doubted in my ability to follow this motto. Kochani – dziękuję! Będzie rybka oraz pipka!1 1 The allusion is made to a popular Polish saying (Albo rybka albo pipka) which well illustrates the common belief that women cannot have it all. Oh yes, we can! It just takes double time or/and energy, motivation, patience and all the types of various resources, including the help of the whole community. According to Igbo and Yoruba proverb It takes a whole village to raise a child. It takes a whole tribe to raise two kids and write a PhD thesis. I feel utmost gratitude to all who voluntarily participated in this communal effort. This thesis is as much yours as it is mine. The mistakes committed and flaws in reasoning, however, belong solely to me. Summary The thesis aims at explaining current regulatory crisis of copyright law (understood as its inability to regulate social dynamics as regards production, reproduction, dissemination of and access to information goods) through the application of systems theory. It refers to the concept of autopoietic legal system in order to draft a model representing the ecosystem in which copyright law functions. This model not only allows for observing copyright regime as it stands currently but also for analysing how it evolved over time. It scrutinises the interdependencies between the legal system and other constituent elements of its ecosystem: politics, economy, art, science, technology, religion, mass media, education as well as non-functionally differentiated segments of society: circles of relatives and friends. The main goal of this analysis is to highlight the fact that the current regulatory crisis of copyright is the result of the legal system's failure to equally acknowledge all the diverse rationalities constituting its ecosystem. The primary hypothesis of the study is that the core of the problem may be attributed to the divergence between legal norms, and competing non-legal copynorms constructed in the process of co-evolution within various elements of the model in question. In the analysis all the relevant copynorms understood as segmented social norms regulating social dynamics with respect to production, reproduction, dissemination of and access to information goods have been reconstructed to indicate their potential to oppose legal regulations. The thesis pivots around the concept of reflexive justice which refers to the equal acknowledgement of colliding rationalities. It concludes with the firm statement that copyright law in the digital environment needs profound reform. The concept of reflexive justice as developed within the systems theoretical approach is perceived by the author of this thesis as the most promising starting point for the new philosophy of copyright law. 1 2 Table of Contents Summary................................................................................................................................1 Acknowledgements................................................................................................................7 I. Introduction.........................................................................................................................9 1. Nature of copyright....................................................................................................9 2. Regulatory failure of copyright law in the digital environment. Succinct description of the problem....................................................................................................................9 3. Hypothesis and research questions...........................................................................12 4. Justification of the chosen methodological perspective and novelty of the applied approach...........................................................................................................................14 5. Methodology and description of the analysed model...............................................20 5.1 Theoretical stance..................................................................................................20 Concise Introduction to Systems theory..................................................................20 Law as a normative autopoietic system...................................................................28 Concept of the reflexive law as developed in the systems theory............................32 Justice under reflexive law......................................................................................35 5.2 Description of the analysed model.........................................................................36 Law..........................................................................................................................37 Politics.....................................................................................................................38 Economy..................................................................................................................39 Science....................................................................................................................41 Technology..............................................................................................................41 Art...........................................................................................................................44 Religion...................................................................................................................49 Mass-media.............................................................................................................53 Education.................................................................................................................57 Family and friends...................................................................................................64 Open Source, Open Access and Creative
Recommended publications
  • Anonsocialmix: Anonymous P2P File Sharing Over Social Networks
    AnonSocialMix: Anonymous P2P File Sharing Over Social Networks Student Name: Rajdeep Mukherjee IIIT-D-MTech-CS-GEN-MT15051 July, 2017 Indraprastha Institute of Information Technology New Delhi Thesis Committee Dr. Sambuddho Chakravarty, IIIT Delhi (Advisor) Dr. Tanmoy Chakraborty, IIIT Delhi (Internal Examiner) Dr. Vinay Joseph Ribeiro, IIT Delhi (External Examiner) Submitted in partial fulfillment of the requirements for the Degree of M.Tech. in Computer Science, in Information Security Category ©2017 IIIT-D MTech-CS-GEN-17-MT15051 All rights reserved Certificate This is to certify that the thesis titled “AnonSocialMix: Anonymous P2P File Sharing Over Social Networks" submitted by Rajdeep Mukherjee for the partial fulfillment of the requirements for the degree of Master of Technology in Computer Science & Engineering is a record of the bonafide work carried out by him under my guidance and supervision in the Security and Privacy group at Indraprastha Institute of Information Technology, Delhi. This work has not been submitted anywhere else for the reward of any other degree. Dr.Sambuddho Chakravarty Indraprastha Institute of Information Technology, New Delhi 2 Abstract Peer-to-peer (P2P) file sharing accounts for one of the major sources of the Internet traffic. As privacy and anonymity issues continue to grow due to constant censorship and network surveil- lance, more and more Internet users are getting attracted towards the facilities for anonymous communication. Extensive research has been conducted over the years towards the design and development of several anonymous P2P file sharing protocols and systems. Size of the Anonymity Set plays a crucial role in determining the degree of anonymity being provided by such networks.
    [Show full text]
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • PROTOCOLOS E CÓDIGOS NA ESFERA PÚBLICA INTERCONECTADA Revista De Sociologia E Política, Vol
    Revista de Sociologia e Política ISSN: 0104-4478 [email protected] Universidade Federal do Paraná Brasil Silveira, Sergio Amadeu da NOVAS DIMENSÕES DA POLÍTICA: PROTOCOLOS E CÓDIGOS NA ESFERA PÚBLICA INTERCONECTADA Revista de Sociologia e Política, vol. 17, núm. 34, octubre, 2009, pp. 103-113 Universidade Federal do Paraná Curitiba, Brasil Disponível em: http://www.redalyc.org/articulo.oa?id=23816088008 Como citar este artigo Número completo Sistema de Informação Científica Mais artigos Rede de Revistas Científicas da América Latina, Caribe , Espanha e Portugal Home da revista no Redalyc Projeto acadêmico sem fins lucrativos desenvolvido no âmbito da iniciativa Acesso Aberto REVISTA DE SOCIOLOGIA E POLÍTICA V. 17, Nº 34 : 103-113 OUT. 2009 NOVAS DIMENSÕES DA POLÍTICA: PROTOCOLOS E CÓDIGOS NA ESFERA PÚBLICA INTERCONECTADA Sergio Amadeu da Silveira RESUMO O texto propõe a existência de uma divisão básica na relação entre política e Internet: a política “da” Internet e a política “na” Internet. Em seguida, agrega os temas das políticas da internet em três campos de disputas fundamentais: sobre a infra-estrutura da rede; sobre os formatos, padrões e aplicações; e sobre os conteúdos. Analisa os temas políticos atuais mais relevantes de cada campo conflituoso, articulando dois aspectos: o tecno-social e o jurídico-legislativo. Este artigo trabalha com o conceito de arquitetura de poder, uma extensão da definição de Alexander Galloway sobre o gerenciamento protocolar, e com a perspectiva de Yochai Benkler sobre a existência de uma esfera pública interconectada. Sua conclusão indica que a liberdade nas redes cibernéticas depende da existência da navegação não-identificada, ou seja, do anonimato.
    [Show full text]
  • Hacker Culture & Politics
    HACKER CULTURE & POLITICS COMS 541 (CRN 15368) 1435-1725 Department of Art History and Communication Studies McGill University Professor Gabriella Coleman Fall 2012 Arts W-220/ 14:35-17:25 Professor: Dr. Gabriella Coleman Office: Arts W-110 Office hours: Sign up sheet Tuesday 2:30-3:30 PM Phone: xxx E-mail: [email protected] OVERVIEW This course examines computer hackers to interrogate not only the ethics and technical practices of hacking, but to examine more broadly how hackers and hacking have transformed the politics of computing and the Internet more generally. We will examine how hacker values are realized and constituted by different legal, technical, and ethical activities of computer hacking—for example, free software production, cyberactivism and hactivism, cryptography, and the prankish games of hacker underground. We will pay close attention to how ethical principles are variably represented and thought of by hackers, journalists, and academics and we will use the example of hacking to address various topics on law, order, and politics on the Internet such as: free speech and censorship, privacy, security, surveillance, and intellectual property. We finish with an in-depth look at two sites of hacker and activist action: Wikileaks and Anonymous. LEARNER OBJECTIVES This will allow us to 1) demonstrate familiarity with variants of hacking 2) critically examine the multiple ways hackers draw on and reconfigure dominant ideas of property, freedom, and privacy through their diverse moral 1 codes and technical activities 3) broaden our understanding of politics of the Internet by evaluating the various political effects and ramifications of hacking.
    [Show full text]
  • Experiences of Internet Traffic Monitoring with Tstat
    1 Experiences of Internet Traffic Monitoring with Tstat A. Finamore M. Mellia M. Meo M. M. Munaf`o D. Rossi 1Politecnico di Torino 2TELECOM ParisTech email: {[email protected]} email: [email protected] Abstract—Since the early days of the Internet, network traffic Internet monitoring tools are based on active probing, ranging monitoring has always played a strategic role in understanding from simple operation management or network tomography and characterize users’ activities. In this paper, we present our via ping or traceroute, to more complex delay and capac- experience in engineering and deploying Tstat, an open source passive monitoring tool that has been developed in the past ten ity estimation via capprobe or pathchar. Finally, large and years. Started as a scalable tool to continuously monitor packets controlled testbeds can be easily setup using tools like netem that flow on a link, Tstat has evolved into a complex application or dummynet. For the passive approach pure observations are that gives to network researchers and operators the possibility to performed by means of dedicated tools, named sniffers by derive extended and complex measurements thanks to advanced the Internet metrology community, that simply observe and traffic classifiers. After discussing Tstat capabilities and internal design, we analyze the traffic that flows on links. Several passive mea- present some examples of measurements collected deploying surement tools are available. Some tools, such as tcpdump or Tstat at the edge of several ISP networks in the past years. Wireshark, are designed to let researchers interactively analyze While other works report a continuous decline of P2P traffic the captured packets.
    [Show full text]
  • Selected Filmography of Digital Culture and New Media Art
    Dejan Grba SELECTED FILMOGRAPHY OF DIGITAL CULTURE AND NEW MEDIA ART This filmography comprises feature films, documentaries, TV shows, series and reports about digital culture and new media art. The selected feature films reflect the informatization of society, economy and politics in various ways, primarily on the conceptual and narrative plan. Feature films that directly thematize the digital paradigm can be found in the Film Lists section. Each entry is referenced with basic filmographic data: director’s name, title and production year, and production details are available online at IMDB, FilmWeb, FindAnyFilm, Metacritic etc. The coloured titles are links. Feature films Fritz Lang, Metropolis, 1926. Fritz Lang, M, 1931. William Cameron Menzies, Things to Come, 1936. Fritz Lang, The Thousand Eyes of Dr. Mabuse, 1960. Sidney Lumet, Fail-Safe, 1964. James B. Harris, The Bedford Incident, 1965. Jean-Luc Godard, Alphaville, 1965. Joseph Sargent, Colossus: The Forbin Project, 1970. Henri Verneuil, Le serpent, 1973. Alan J. Pakula, The Parallax View, 1974. Francis Ford Coppola, The Conversation, 1974. Sidney Pollack, The Three Days of Condor, 1975. George P. Cosmatos, The Cassandra Crossing, 1976. Sidney Lumet, Network, 1976. Robert Aldrich, Twilight's Last Gleaming, 1977. Michael Crichton, Coma, 1978. Brian De Palma, Blow Out, 1981. Steven Lisberger, Tron, 1982. Godfrey Reggio, Koyaanisqatsi, 1983. John Badham, WarGames, 1983. Roger Donaldson, No Way Out, 1987. F. Gary Gray, The Negotiator, 1988. John McTiernan, Die Hard, 1988. Phil Alden Robinson, Sneakers, 1992. Andrew Davis, The Fugitive, 1993. David Fincher, The Game, 1997. David Cronenberg, eXistenZ, 1999. Frank Oz, The Score, 2001. Tony Scott, Spy Game, 2001.
    [Show full text]
  • Underglobalization Beijing’S Media Urbanism and the Chimera of Legitimacy
    Underglobalization Beijing’s Media Urbanism and the Chimera of Legitimacy Joshua Neves Underglobalization Beijing’s Media Urbanism and the Chimera of Legitimacy Joshua Neves duke university press | durham and london | 2020 © 2020 Duke University Press All rights reserved Printed in the United States of Amer i ca on acid- free paper ∞ Designed by Drew Sisk Typeset in Portrait Text, SimSun, and Univers by Westchester Publishing Services Library of Congress Cataloging- in- Publication Data Names: Neves, Joshua, [date] author. Title: Underglobalization : Beijing’s media urbanism and the chimera of legitimacy / Joshua Neves. Description: Durham : Duke University Press, 2020. | Includes bibliographical references and index. Identifiers: lccn 2019032496 (print) | lccn 2019032497 (ebook) isbn 9781478007630 (hardcover) isbn 9781478008057 (paperback) isbn 9781478009023 (ebook) Subjects: lcsh: Product counterfeiting— Law and legislation— China. | Piracy (Copyright)— China. | Legitimacy of governments—China. | Globalization—China. Classification: lcc knq1160.3.n48 2020 (print) | lcc knq1160.3 (ebook) | ddc 302.230951— dc23 lc record available at https:// lccn . loc. gov / 2019032496 lc ebook record available at https:// lccn . loc. gov / 2019032497 Cover art: Xing Danwen, detail from Urban Fictions, 2004. Courtesy of the artist and Danwen Studio. Chapter 5 was originally published in “Videation: Technological Intimacy and the Politics of Global Connection,” in Asian Video Cultures: In the Penumbra of the Global, edited by Joshua Neves and Bhaskar
    [Show full text]
  • Seadrive Peter Haro1,2 and Otto Anshus2 1SINTEF ICT, Trondheim, Norway 2Department of Computer Science, University of Tromsø, Norway
    Seadrive Peter Haro1,2 and Otto Anshus2 1SINTEF ICT, Trondheim, Norway 2Department of Computer Science, University of Tromsø, Norway Abstract Seadrive is a novel file synchronizations framework and file hosting service for offshore naval fleets. Offshore vessels outside the range of cellular networks employ volatile satellite-based networks unsuited for file synchronization. Seadrive aspires to provide naval fleets with usable file hosting services over low bandwidth, high latency network links with high loss rate and large variability in the overall network stability. We provide the rationale for Seadrive; present the architecture, and design of the framework. We present an initial evaluation of the correctness and performance, preliminary results shows that Seadrive outperforms existing system in the test environment. Introduction Modern naval- and fishing fleets utilize a multitude of information systems from different sources when planning and executing offshore operations. These vessels are equipped with several sensors and instruments, which provide a constant stream of information regarding various on-board systems, of which some are readily available to the crew and actively employed during an operation. The governing bodies of large naval-, fishing-, and oil- fleets requires information to flow from their management system(s) to their fleet in a robust manner, likewise the fleets have information required by the governing entity. The information flow in today’s systems is primarily based on using e-mail. However, end-users report these systems as unsatisfactory for the following reasons. • Important information is lost in the copious amount of other e-mails • Documents arriving during shift A are often not read by shift B • The systems are slow • The files sent through these systems are constrained not only by file-type, but also their size When important information is lost, the results can vary from small trifles to disasters, such as overfishing, not following updated safety regulations or monetary losses.
    [Show full text]
  • Joint Report on Publicly Available Hacking Tools (NCSC)
    Page 2 Joint report on publicly available hacking tools Joint report on publicly available hacking tools Page 3 Contents Introduction .............................................................................................................................................. 4 Nature of the tools ............................................................................................................................................. 4 Report structure.................................................................................................................................................. 4 Remote access trojans: JBiFrost ........................................................................................................... 5 In use .................................................................................................................................................................... 5 Capabilities .......................................................................................................................................................... 5 Examples ............................................................................................................................................................. 5 Detection and protection .................................................................................................................................. 6 Web shells: China Chopper ...................................................................................................................
    [Show full text]
  • Online File-Hosting Service
    ISSN XXXX XXXX © 2017 IJESC Research Article Volume 7 Issue No.3 Online File-Hosting Service Khaja Viqar Uddin1, MD Daniyal Raza2, Faheem Uddin3, Abdul Rais4 B.Tech Students 1,2,3, Assistant Professor4 Department of Computer Science Engineering Lords Institute of Engineering and Technology,Hyderabad, India Abstract: It is a type of file hosting application. Which is used for storing multimedia files in a Database or a server which can be a ccessed from any remote location by the user if he or she has the hardware and software requirements. In this we are trying to improve or counter the drawbacks of the existing system and possibly add few new features.It creates a special folder on user’s device. The content of which are then synchronized to the application server and to other devices that has installed the application. This application uses a freemium business model, users are offered a free account with a set storage size. Keywords:Multimedia, Synchronized, Remote Location.Freemium Business Model. I.INTRODUCTION: II.EXPLANATION A file hosting service, cloud storage service, online file Personal file storage storage provider, or cyberlocker is an Internet hosting Personal file storage services are aimed at private individuals, service specifically designed to host user files. It allows users offering a sort of "network storage" for personal backup, file to upload files that could then be accessed over the internet access, or file distribution. Users can upload their files and from a different computer, tablet, s mart phone or other share them publicly or keep them password-protected. networked device, by the same user or possibly by other users, Document-sharing services allow users to share and after a password or other authentication is provided.
    [Show full text]
  • Characterizing the File Hosting Service Ecosystem
    Characterizing the File Hosting Service Ecosystem Aniket Mahanti, Niklas Carlsson~, and Carey Williamson University of Calgary, Canada ~ Linköping University, Sweden ABSTRACT et al. [1] who studied traffic, usage, and performance File Hosting Services (FHS) such as Rapidshare and Mega- characteristics of a single FHS, namely Rapidshare. upload have recently become popular. The decline of P2P We propose a comprehensive characterization study file sharing has prompted various services including FHS to of FHS workloads. We study four popular FHS: Rapid- replace it. We propose a comprehensive multi-level charac- share, Megaupload, Hotfile, and Mediafire. Using a terization of the FHS ecosystem. We devise a measurement year-long dataset of HTTP transaction summaries col- framework to collect datasets from multiple vantage points. lected from a large university edge network, we charac- To the best of our knowledge, this work is the first to char- terize usage behaviour, content properties, service in- acterize the FHS ecosystem. The work will highlight the frastructure, and performance of these services. To get content, usage, performance, infrastructure, and quality of a global picture, we use a large crawl dataset and com- service characteristics of FHS. FHS can have significant im- pare and contrast the content properties of the services plications on Internet traffic, if these services were to sup- with locally observed characteristics. plant P2P as the dominant content sharing technology. A distinguishing feature of our work is the use of de- tailed Web transactions that allowed us to distinguish free and premium services based on user clickstreams. 1. INTRODUCTION We present a case study comparing FHS with P2P, and File Hosting Services (FHS) were originally designed show preliminary results highlighting content properties for file backup purposes and for uploading files that were and performance of FHS.
    [Show full text]
  • 3 Oppositional Feature Documentary in the 1990S: Channel 4 and Oppositional Auteurs
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by OpenGrey Repository UNSPECIFIED UNSPECIFIED UNSPECIFIED, University of the West of England. We recommend you cite the published version. The publisher’s URL is https://eprints.uwe.ac.uk/secure/20924/ Refereed: No (no note) Disclaimer UWE has obtained warranties from all depositors as to their title in the material deposited and as to their right to deposit such material. UWE makes no representation or warranties of commercial utility, title, or fit- ness for a particular purpose or any other warranty, express or implied in respect of any material deposited. UWE makes no representation that the use of the materials will not infringe any patent, copyright, trademark or other property or proprietary rights. UWE accepts no liability for any infringement of intellectual property rights in any material deposited but will remove such material from public view pend- ing investigation in the event of an allegation of any such infringement. PLEASE SCROLL DOWN FOR TEXT. THE POLITICAL AVANT-GARDE: OPPOSITIONAL DOCUMENTARY IN BRITAIN SINCE 1990 STEVE PRESENCE A thesis submitted in partial fulfilment of the requirements of the University of the West of England, Bristol for the degree of Doctor of Philosophy Faculty of Arts, Creative Industries and Education, University of the West of England, Bristol February 2013 Contents ACKNOWLEDGEMENTS .................................................................................................................. III ABSTRACT
    [Show full text]