Fantasy Crime: the Role of Criminal Law in Virtual Worlds

Total Page:16

File Type:pdf, Size:1020Kb

Fantasy Crime: the Role of Criminal Law in Virtual Worlds Vanderbilt Journal of Entertainment & Technology Law Volume 11 Issue 1 Issue 1 - Fall 2008 Article 1 2008 Fantasy Crime: The Role of Criminal Law in Virtual Worlds Susan W. Brenner Follow this and additional works at: https://scholarship.law.vanderbilt.edu/jetlaw Part of the Computer Law Commons, and the Criminal Law Commons Recommended Citation Susan W. Brenner, Fantasy Crime: The Role of Criminal Law in Virtual Worlds, 11 Vanderbilt Journal of Entertainment and Technology Law 1 (2020) Available at: https://scholarship.law.vanderbilt.edu/jetlaw/vol11/iss1/1 This Article is brought to you for free and open access by Scholarship@Vanderbilt Law. It has been accepted for inclusion in Vanderbilt Journal of Entertainment & Technology Law by an authorized editor of Scholarship@Vanderbilt Law. For more information, please contact [email protected]. VANDERBILT JOURNAL OF ENTERTAINMENT AND TECHNOLOGY LAW VOLUME 11 FALL2008 NUMBER 1 Fantasy Crime: The Role of Criminal Law in Virtual Worlds Susan W Brenner* ABSTRACT This Article analyzes activity in virtual worlds that would constitute crime if they were committed in the real world. It reviews the evolution of virtual worlds like Second Life and notes research which indicates that more and more of our lives will move into this realm. The Article then analyzes the criminalizationof virtual conduct that inflicts "harm" in the real world and virtual conduct that only inflicts "harm" in the virtual world. It explains that the first category qualifies as cybercrime and can be prosecuted under existing law. Finally, it analyzes the necessity and propriety of criminalizing the second category of conduct, both now and in the future. * NCR Distinguished Professor of Law and Technology, University of Dayton School of Law, Dayton, Ohio. J.D., Indiana University, 1981; M.A., Kent State University, 1971; B.A., Southwestern Oklahoma State University, 1968. The author has spoken at numerous events, including the First International Conference on Legal, Security and Privacy issues in Hamburg, the Montreux Secure IT Conference in Switzerland, Interpol's Fourth and Fifth International Conferences on Cybercrimes, the Middle East IT Security Conference, the American Bar Association's National Cybercrime Conference, the Yale Law School Conference on Cybercrime and the Symposium on Internet and Privacy held at Stanford University Law School. She is a cybercrime consultant for Global CyberRisk, LLC and a member of the American Academy of Forensic Sciences. 1 2 VANDERBILT J. OF ENT AND TECH LAW [Vol. 11:1:1 TABLE OF CONTENTS I. R EAL CRIM ES .............................................................................. 4 A . H ard H arms ........................................................................ 6 B . S oft H a rm s ............................................................................... 8 1. M orality ............................................................................ 8 2. Affectivity ...................................................................... 10 3. System ic ........................................................................ 16 II. V IRTUAL W ORLDS ...................................................................... 19 A. MOOs, MUDs and MMORPGs ......................................... 19 B . Second Lives ...................................................................... 32 1. Second L ife .................................................................... 32 2. The Lesser Metaverses .................................................. 47 3. Evolving Metaverse(s) .................................................. 49 III. FANTASY CRIM E ....................................................................... 51 A . Cybercrime .......................................................................... 53 B . Fantasy Crime ................................................................... 61 1. H arm ............................................................................. 61 2. F antasy ......................................................................... 64 a. Victim less Crimes .................................................. 65 b. TraditionalCrimes ................................................ 70 i. Property H arm .................................................. 70 ii. Personal H arm .................................................. 75 aa. Virtual Rape ............................................. 75 bb. Virtual Murder and Pedophilia................ 86 IV . FINAL THOUGHTS ..................................................................... 94 "[W]hen a man doth ... imagine the Death of our Lord the King ....that... be... Treason....,1 This mid-fourteenth century statute did something we no longer do: criminalize mere thought. 2 In modern Anglo-American jurisprudence, the legal phenomenon of "crime" requires the coalescence of four distinct elements: (1) actus reus (an overt act or a culpable failure to act), (2) mens rea (a blameworthy mental state), (3) causation (the consequence of actus reus), and (4) harm (the resultant 1. Statute of Treasons, 1351, 25 Edw. 3, c. 2, § 2 (Eng.). 2. At least in later centuries, it seems to have required either an overt act of levying war against the king or speech that could be construed as treasonous. See, e.g., Benjamin A. Lewis, Note, An Old Means to a Different End: The War on Terror, American Citizens ...and the Treason Clause, 34 HOFSTRA L. REV. 1215, 1220-21 (2006); William T. Mayton, Seditious Libel and the Lost Guarantee of a Freedom of Expression, 84 COLUM. L. REV. 91, 101 (1984). 2008] FANTASY CRIME injury to one or more victims). 3 Parsing the extent to which these elements coalesced in a particular instance can be surprisingly problematic, even for conduct in the real, physical world. Our criminal law is, after all, the product of millennia of experience in the physical world. The physical world was historically the only world we could inhabit and was, as a result, the only available venue for our abiding predilection to inflict harm upon persons or property. Criminal law therefore evolved to deal with tangible, physical harms. While criminal law has, over the last several decades, expanded its scope to encompass certain "soft harms" that involve moral or systemic injuries, its bedrock principles are ultimately grounded in tangible harm. The physical world is no longer the necessary and inevitable arena of human activity. Cyberspace gives us a new, non-spatial arena in which we can conduct many, if not all, of the activities we carry out in the physical world. The availability of this new, conceptual vector for human activity has various consequences for criminal law. I have written about many of these consequences elsewhere: (1) how cyberspace challenges the implementation of the systems we use to enforce our criminal laws and control crime; (2) how it can require us to broaden the way we define certain crimes-such as theft-to encompass intangibles; and (3) how it may require us to define new crimes, such as the denial of service attacks that are used to shut down access to websites and essential services. These consequences are all important and conceptually challenging, but my task here is to analyze an even more intransigent phenomenon: crime in virtual worlds like Second Life. The analysis that follows is divided into three sections: Section II reviews the goals that criminal law is designed to achieve and analyzes the role that harm plays in the articulation and realization of these goals; its focus is on crime in the real, physical world. Section III describes the virtual worlds that are emerging in cyberspace. Section IV analyzes the issue of "fantasy crime," and considers whether criminal law should be extrapolated to encompass conduct that inflicts virtual harms. 3. See WAYNE R. LAFAVE, SUBSTANTIVE CRIMINAL LAW 13-16 § 1.2(b) (2d ed. 2003). VANDERBILTJ OFENT AND TECH. LAW [Vol. 11:1:1 I. REAL CRIMES in "[C]rimes ...are a breach ...of the.., duties, due to the4 whole community.., its social aggregate capacity." By "real crime" I refer to crime that occurs entirely in the physical world. In real crime, both the conduct involved in the commission of the crime and the resulting harm that conduct inflicts occur in real, physical space. Crime has been an essential-if not foundational-concern of law since humans began living in organized groups. 5 Organized social life requires the orchestration of the efforts 6 and sensibilities of a diverse populace, which necessitates order. Human collectives-societies-must maintain order if they are to survive and prosper. Order has historically had two complementary aspects: external order and internal order.7 External order involves a 8 society's relationship with its physical and biological environment. Societies must implement the efforts of their individual members to deal with physical threats (e.g., earthquakes, droughts, fires) and threats posed by competing societies.9 Historically, societies have dealt with external human threats by creating a separate institution-the military-to discourage and resolve threats from "outsiders."10 Societies achieve and maintain internal order by using two complementary sets of rules. The first set-the civil rules-structures the activities of those who comprise a society in predictable, productive ways." Civil rules define relationships (e.g., ruler-ruled, husband-wife, employer-employee) and allocate tasks (e.g., farmer, teacher, mayor).12 They also set legitimate social expectations (e.g.,
Recommended publications
  • What Is an International Crime? (A Revisionist History)
    \\jciprod01\productn\H\HLI\58-2\HLI205.txt unknown Seq: 1 14-FEB-18 9:00 Volume 58, Number 2, Spring 2017 What Is an International Crime? (A Revisionist History) Kevin Jon Heller* The question “what is an international crime?” has two aspects. First, it asks us to identify which acts qualify as international crimes. Second, and more fundamentally, it asks us to identify what is distinctive about an international crime. Some disagreement exists concerning the first issue, particularly with regard to torture and terrorism. But nearly all states, international tribunals, and ICL scholars take the same position concerning the second issue, insisting that an act qualifies as an international crime if—and only if—that act is universally criminal under international law. This definition of an international crime leads to an obvious question: how exactly does an act become universally criminal under international law? One answer, the “direct criminalization thesis” (DCT), is that certain acts are universally criminal because they are directly criminalized by international law itself, regardless of whether states criminalize them. Another answer, the “national criminalization the- sis” (NCT), rejects the idea that international law directly criminalizes particular acts. According to the NCT, certain acts are universally criminal because international law obligates every state in the world to criminalize them. This Article argues that if we take positivism seriously, as every international criminal tribunal since Nuremberg has insisted we must, the NCT provides the only coherent explanation of how international law can deem certain acts to be universally criminal. I. INTRODUCTION The question posed by the title of this Article has two aspects.
    [Show full text]
  • Theft in the Digital: Can You Steal Virtual Property?
    Theft in the Digital: Can you Steal Virtual Property? Wayne Rumbles* I. Introduction This article explores issues arising around the theft of virtual property. It first explains a number of perhaps counter intuitive concepts vital to the understanding of the importance of extending ‘real world’ criminal law and criminal liability to conduct inside virtual worlds such as World of Warcraft or Second Life. This article focuses on theft of virtual property and explores how other jurisdictions are developing responses to this issue. It then develops an analysis of the operation of ‘real world’ New Zealand criminal law rules around theft, in the context of the evolution of virtual property. II. Understanding Virtual Worlds At first glance the virtual world universe, with its multitude of virtual realms, may seem like nothing but a place for virtual play, a place to which our teenage sons and daughters disappear when they should be cleaning their room. Online multiplayer computer simulated environments have come along way since Habitat was launched in 1988, on the Commodore 64 platform running through the online service QuantumLink.1 Today these worlds are interactive 3D or 2D virtual environments, which provide social spaces accessed via the Internet and accommodate millions of human users. Users interact in this world through avatars, which are computer generated representations, and acquire virtual property of one sort or another through their avatars. The number, complexity and diversity of these worlds continue to develop at a steadily increasing pace. There are still many uncertainties in the development of virtual worlds, however what is certain is that they will continue to grow and absorb aspects of our social interaction on the web.
    [Show full text]
  • International Intellectual Property Law
    ee--RRGG Electronic Resource Guide International Intellectual Property Law * Jonathan Franklin This page was last updated February 8, 2013. his electronic resource guide, often called the ERG, has been published online by the American Society of International Law (ASIL) since 1997. T Since then it has been systematically updated and continuously expanded. The chapter format of the ERG is designed to be used by students, teachers, practitioners and researchers as a self-guided tour of relevant, quality, up-to-date online resources covering important areas of international law. The ERG also serves as a ready-made teaching tool at graduate and undergraduate levels. The narrative format of the ERG is complemented and augmented by EISIL (Electronic Information System for International Law), a free online database that organizes and provides links to, and useful information on, web resources from the full spectrum of international law. EISIL's subject-organized format and expert-provided content also enhances its potential as teaching tool. 2 This page was last updated February 8, 2013. I. Introduction II. Overview III. Research Guides and Bibliographies a. International Intellectual Property Law b. International Patent Law i. Public Health and IP ii. Agriculture, Plant Varieties, and IP c. International Copyright Law i. Art, Cultural Property, and IP d. International Trademark Law e. Trade and IP f. Arbitration, Mediation, and IP g. Traditional Knowledge and IP h. Geographical Indications IV. General Search Strategies V. Primary Sources VI. Primary National Legislation and Decisions VII. Recommended Link sites VIII. Selected Non-Governmental Organizations IX. Electronic Current Awareness 3 This page was last updated February 8, 2013.
    [Show full text]
  • Flash Reports on Labour Law January 2017 Summary and Country Reports
    Flash Report 01/2017 Flash Reports on Labour Law January 2017 Summary and country reports EUROPEAN COMMISSION Directorate DG Employment, Social Affairs and Inclusion Unit B.2 – Working Conditions Flash Report 01/2017 Europe Direct is a service to help you find answers to your questions about the European Union. Freephone number (*): 00 800 6 7 8 9 10 11 (*) The information given is free, as are most calls (though some operators, phone boxes or hotels may charge you). LEGAL NOTICE This document has been prepared for the European Commission however it reflects the views only of the authors, and the Commission cannot be held responsible for any use which may be made of the information contained therein. More information on the European Union is available on the Internet (http://www.europa.eu). Luxembourg: Publications Office of the European Union, 2017 ISBN ABC 12345678 DOI 987654321 © European Union, 2017 Reproduction is authorised provided the source is acknowledged. Flash Report 01/2017 Country Labour Law Experts Austria Martin Risak Daniela Kroemer Belgium Wilfried Rauws Bulgaria Krassimira Sredkova Croatia Ivana Grgurev Cyprus Nicos Trimikliniotis Czech Republic Nataša Randlová Denmark Natalie Videbaek Munkholm Estonia Gaabriel Tavits Finland Matleena Engblom France Francis Kessler Germany Bernd Waas Greece Costas Papadimitriou Hungary Gyorgy Kiss Ireland Anthony Kerr Italy Edoardo Ales Latvia Kristine Dupate Lithuania Tomas Davulis Luxemburg Jean-Luc Putz Malta Lorna Mifsud Cachia Netherlands Barend Barentsen Poland Leszek Mitrus Portugal José João Abrantes Rita Canas da Silva Romania Raluca Dimitriu Slovakia Robert Schronk Slovenia Polonca Končar Spain Joaquín García-Murcia Iván Antonio Rodríguez Cardo Sweden Andreas Inghammar United Kingdom Catherine Barnard Iceland Inga Björg Hjaltadóttir Liechtenstein Wolfgang Portmann Norway Helga Aune Lill Egeland Flash Report 01/2017 Table of Contents Executive Summary ..............................................
    [Show full text]
  • Section 7: Criminal Offense, Criminal Responsibility, and Commission of a Criminal Offense
    63 Section 7: Criminal Offense, Criminal Responsibility, and Commission of a Criminal Offense Article 15: Criminal Offense A criminal offense is an unlawful act: (a) that is prescribed as a criminal offense by law; (b) whose characteristics are specified by law; and (c) for which a penalty is prescribed by law. Commentary This provision reiterates some of the aspects of the principle of legality and others relating to the purposes and limits of criminal legislation. Reference should be made to Article 2 (“Purpose and Limits of Criminal Legislation”) and Article 3 (“Principle of Legality”) and their accompanying commentaries. Article 16: Criminal Responsibility A person who commits a criminal offense is criminally responsible if: (a) he or she commits a criminal offense, as defined under Article 15, with intention, recklessness, or negligence as defined in Article 18; IOP573A_ModelCodes_Part1.indd 63 6/25/07 10:13:18 AM 64 • General Part, Section (b) no lawful justification exists under Articles 20–22 of the MCC for the commission of the criminal offense; (c) there are no grounds excluding criminal responsibility for the commission of the criminal offense under Articles 2–26 of the MCC; and (d) there are no other statutorily defined grounds excluding criminal responsibility. Commentary When a person is found criminally responsible for the commission of a criminal offense, he or she can be convicted of this offense, and a penalty or penalties may be imposed upon him or her as provided for in the MCC. Article 16 lays down the elements required for a finding of criminal responsibility against a person.
    [Show full text]
  • What Motivates the Authors of Video Game Walkthroughs and Faqs? a Study of Six Gamefaqs Contributors Michael Hughes Trinity University, [email protected]
    Trinity University Digital Commons @ Trinity Library Faculty Research Coates Library 1-1-2018 What Motivates the Authors of Video Game Walkthroughs and FAQs? A Study of Six GameFAQs Contributors Michael Hughes Trinity University, [email protected] Follow this and additional works at: https://digitalcommons.trinity.edu/lib_faculty Part of the Library and Information Science Commons Repository Citation Hughes, M.J. (2018). What motivates the authors of video game walkthroughs and FAQs? A study of six GameFAQs contributors. First Monday, 23(1), 1-13. doi: 10.5210/fm.v23i1.7925 This Article is brought to you for free and open access by the Coates Library at Digital Commons @ Trinity. It has been accepted for inclusion in Library Faculty Research by an authorized administrator of Digital Commons @ Trinity. For more information, please contact [email protected]. First Monday, Volume 23, Number 1 - 1 January 2018 Walkthroughs, also known as FAQs or strategy guides, are player-authored documents that provide step-by-step instructions on how to play and what to do in order to finish a given video game. Exegetical in their length and detail, walkthroughs require hours of exacting labor to complete. Yet authors are rarely compensated for work that markedly differs from other kinds of fan creativity. To understand their motivations, I interviewed six veteran GameFAQs authors, then inductively analyzed the transcripts. Open coding surfaced five themes attributable to each participant. Together, these themes constitute a shifting mix of motivations, including altruism, community belonging, self-expression, and recognition — primarily in the form of feedback and appreciation but also from compensation.
    [Show full text]
  • CONJECTURE GAMES PRESENTS: Conjectural Roleplaying Gamemaster
    CONJECTURE GAMES PRESENTS: CRGE conjectural roleplaying gamemaster emulator By Zach Best Artwork by Matthew Vasey The Helldragon (order #6976544) “If everyone is thinking alike, then somebody isn’t thinking.” – George S. Patton Dedicated to Katie. Who shares every step with me. Written by Zach Best Artwork by Matthew Vasey Published by Conjecture Games (www.conjecturegames.com) Special Thanks to Alex Yari, Francis Flammang, David Dankel, Nicky Tsouklais, Matthew Mooney, Aaron Zeitler, Kenny Norris, Jimmy Williams, and Deathworks for playtesting, editing, and general commenting. Very Special Thanks to Chris Stieha for being the first and most thorough playtester an indie game designer could ever ask for. All text is © Zach Best (2014). All artwork is © Matthew Vasey (2014) and used with permission for this work. The mention of or reference to any company or product in these pages is not a challenge to the trademark or copyright concerned. 2 The Helldragon (order #6976544) Table of Contents What is CRGE? pg. 4 Loom of Fate – Binary GM Emulator, pg. 6 The Surge Count, pg. 8 Unexpectedly Explanations, pg. 10 Loom of Fate Examples, pg. 11 Loom of Fate Tutorial, pg. 13 Conjured Threads – Story Indexing Game Engine, pg. 14 Stage of the Scene, pg. 16 CRGE Scene Setup, pg. 18 Bookkeeping, pg. 18 Storyspinning – Frameworks for CRGE, pg. 20 Vignette Framework, pg. 21 Vignette Framework Tutorial, pg. 23 Tapestry –Multiplayer CRGE Module, pg. 24 Appendix I (Tables), pg. 27 Appendix II (Vignette Framework Tutorial Example), pg. 28 3 The Helldragon (order #6976544) What is CRGE? Conjecture The Conjectural Roleplaying Gamemaster “Is the door locked?” This is a very simple Emulator (“CRGE”) is a supplement for any pen question applicable to many RPG adventures.
    [Show full text]
  • Violent Victimization in Cyberspace: an Analysis of Place, Conduct, Perception, and Law
    Violent Victimization in Cyberspace: An Analysis of Place, Conduct, Perception, and Law by Hilary Kim Morden B.A. (Hons), University of the Fraser Valley, 2010 Thesis submitted in Partial Fulfillment of the Requirements for the Degree of Master of Arts IN THE SCHOOL OF CRIMINOLOGY FACULTY OF ARTS AND SOCIAL SCIENCES © Hilary Kim Morden 2012 SIMON FRASER UNIVERSITY Summer 2012 All rights reserved. However, in accordance with the Copyright Act of Canada, this work may be reproduced, without authorization, under the conditions for “Fair Dealing.” Therefore, limited reproduction of this work for the purposes of private study, research, criticism, review and news reporting is likely to be in accordance with the law, particularly if cited appropriately. Approval Name: Hilary Kim Morden Degree: Master of Arts (School of Criminology) Title of Thesis: Violent Victimization in Cyberspace: An Analysis of Place, Conduct, Perception, and Law Examining Committee: Chair: Dr. William Glackman, Associate Director Graduate Programs Dr. Brian Burtch Senior Supervisor Professor, School of Criminology Dr. Sara Smyth Supervisor Assistant Professor, School of Criminology Dr. Gregory Urbas External Examiner Senior Lecturer, Department of Law Australian National University Date Defended/Approved: July 13, 2012 ii Partial Copyright Licence iii Abstract The anonymity, affordability, and accessibility of the Internet can shelter individuals who perpetrate violent acts online. In Canada, some of these acts are prosecuted under existing criminal law statutes (e.g., cyber-stalking, under harassment, s. 264, and cyber- bullying, under intimidation, s. 423[1]). However, it is unclear whether victims of other online behaviours such as cyber-rape and organized griefing have any established legal recourse.
    [Show full text]
  • Last Line of Defence Cyber Security of Industrial Control Sys- Tems
    Last line of defence Cyber security of industrial control sys- tems M. Luchs Delft University of Technology LASTLINEOFDEFENCE CYBER SECURITY OF INDUSTRIAL CONTROL SYSTEMS by M. Luchs in partial fulfillment of the requirements for the degree of Master of Science in Offshore and Dredging Engineering at the Delft University of Technology, to be defended publicly on Wednesday October 26th, 2016 at 14:00 PM. Supervisor: dr. ir. C. Doerr Thesis committee: Prof. dr. C. van Rhee, TU Delft dr. ir. S. A. Miedema, TU Delft Ir. F.van der Heijden, Heerema Fabrication Group An electronic version of this thesis is available at http://repository.tudelft.nl/. PREFACE Before you lies the thesis "Last line of defence: Cyber security of industrial control systems". This work in- vestigates the state of cyber security within the offshore and dredging industry, the result of which has led to the proposal of a novel intrusion detection system for industrial control systems. It is written to complete the graduation requirements of the MSc program Offshore and Dredging Engineering at the Delft University of Technology. The project has been undertaken in collaboration with Heerema Fabrication Group whom where looking to increase their awareness on cyber security. Investigating the state of cyber security within the offshore and dredging industry has led to the research question, which was formulated together with my supervisor from the TU-Delft, Christian Doerr. The work has proven challenging at times, in part because the subject is fairly unexplored terrain, and also my missing of a background in cyber security and computer networks. Nonethe- less it has provided me with many avenues for growth and learning, especially since both the TU-Delft as HFG provided me the option to freely explore and thus gain insights broader then in one area of focus alone.
    [Show full text]
  • V6N1 June 2021
    ONEONE WORLDWORLD inin DialogueDialogue Volume 6 Number 1 2021 SOCIAL STUDIES COUNCIL of the ALBERTA TEACHERS’ ASSOCIATION Social Studies Council Contact Information President Journal Editor ATA Staff Advisor Jennifer Williams Craig Harding Dave Matson Bus 403-948-3800 Bus 403-777-7870 780-447-9420 [email protected] [email protected] or [email protected] [email protected] ONEONE WORLDWORLD inin DialogueDialogue Volume 6 Number 1 2021 A Message from the Editor 2 Craig Harding Articles A Meditation on Current and Future Trajectories for Elementary Social Studies in Alberta 4 David Scott Reimagining Schools to Be Places of Deeper Learning 16 Jacqui Kusnick Smashing Down “Old” Ways of Thinking: Uncritical Critical Thinking in Teacher Education 26 Matthew Etherington Responding to the Ravages of COVID-19: Dialogic Encounters in/as Pedagogy in Social Studies 39 Tim Skuce and Shannon D M Moore The Importance of Bridging Creativity and Critical Thinking 48 Anasthasia Filion More Copyright © 2021 by The Alberta Teachers’ Association (ATA), 11010 142 Street NW, Edmonton, Alberta T5N 2R1. Unless otherwise indicated in the text, reproduction of material in One World in Dialogue is authorized for classroom and professional development use, provided that each copy contain full acknowledgement of the source and that no charge be made beyond the cost of reprinting. Any other reproduction in whole or in part without prior written consent of the Association is prohibited. One World in Dialogue is published for the Social Studies Council by the ATA. EDITOR: Craig Harding, 403-777-7870, [email protected]. EDITORIAL AND PRODUCTION SERVICES: Document Production staff, ATA.
    [Show full text]
  • Faculty Research Working Papers Series
    Faculty Research Working Papers Series Napster's Second Life? - The Regulatory Challenges of Virtual Worlds Viktor Mayer-Schönberger and John Crowley September 2005 RWP05-052 The views expressed in the KSG Faculty Research Working Paper Series are those of the author(s) and do not necessarily reflect those of the John F. Kennedy School of Government or Harvard University. Copyright belongs to the author(s). Papers may be downloaded for personal use only. Napster’s Second Life? The Regulatory Challenges of Virtual Worlds+ Viktor Mayer-Schönberger* & John Crowley‡ Imagine a world with millions of people communicating and transacting. Imagine a world just like ours except that is it made entirely of bits, not atoms. Ten years ago, John Perry Barlow imagined such a radical world – cyberspace.1 He saw people interacting without the constraints of national rules. They would be independent from regulatory fiat and unbound by the mandates of Washington, Paris, London, Berlin or Beijing. His vision relied on information traveling a global network at lightning speed, with content living off server farms in nations with little regulation, weak enforcement, or both. In this world of global regulatory arbitrage2, organizations could relocate their servers to jurisdictional safe havens overnight. 3 They might pop up in exotic places like Aruba4 or + We thank Urs Gasser, Raph Koster, David Lazer, Beth Noveck, Cory Ondrejka, and John Palfrey, who have read the manuscript and provided most valuable feedback. We gratefully acknowledge the research assistance of Malte Ziewitz. * Associate Professor of Public Policy, John F. Kennedy School of Government, Harvard University. ‡ Technologist and freelance consultant for the John F.
    [Show full text]
  • Broadcast Bulletin Issue Number 88
    O fcom Broadcast Bulletin Issue number 88 2 July 2007 Ofcom Broadcast Bulletin, Issue 88 2 July 2007 Contents Introduction 3 Standards cases Notice of Sanction 4 In Breach 5 Fairness & Privacy cases Not Upheld 7 Other programmes not in breach/outside remit 15 2 Ofcom Broadcast Bulletin, Issue 88 2 July 2007 Introduction Ofcom’s Broadcasting Code (“the Code”) took effect on 25 July 2005 (with the exception of Rule 10.17 which came into effect on 1 July 2005). This Code is used to assess the compliance of all programmes broadcast on or after 25 July 2005. The Broadcasting Code can be found at http://www.ofcom.org.uk/tv/ifi/codes/bcode/ The Rules on the Amount and Distribution of Advertising (RADA) apply to advertising issues within Ofcom’s remit from 25 July 2005. The Rules can be found at http://www.ofcom.org.uk/tv/ifi/codes/advertising/#content From time to time adjudications relating to advertising content may appear in the Bulletin in relation to areas of advertising regulation which remain with Ofcom (including the application of statutory sanctions by Ofcom). 3 Ofcom Broadcast Bulletin, Issue 88 2 July 2007 Standards cases Notice of Sanction Channel 5 Broadcasting Ltd (“Channel 5”) Brainteaser, 25 January, 15 February (two occasions), 20 February and 6 March 2007, 12:30 On 26 June 2007, Ofcom published its decision to impose a statutory sanction on Channel 5 for breaches of Rule 2.11 (competitions should be conducted fairly) of Ofcom’s Broadcasting Code. Ofcom has found that this Rule was breached when fake names were used as competition ‘winners’ on three of the above occasions; and production staff posed as ‘winners’ on air another two occasions.
    [Show full text]