PROTOCOLOS E CÓDIGOS NA ESFERA PÚBLICA INTERCONECTADA Revista De Sociologia E Política, Vol

Total Page:16

File Type:pdf, Size:1020Kb

PROTOCOLOS E CÓDIGOS NA ESFERA PÚBLICA INTERCONECTADA Revista De Sociologia E Política, Vol Revista de Sociologia e Política ISSN: 0104-4478 [email protected] Universidade Federal do Paraná Brasil Silveira, Sergio Amadeu da NOVAS DIMENSÕES DA POLÍTICA: PROTOCOLOS E CÓDIGOS NA ESFERA PÚBLICA INTERCONECTADA Revista de Sociologia e Política, vol. 17, núm. 34, octubre, 2009, pp. 103-113 Universidade Federal do Paraná Curitiba, Brasil Disponível em: http://www.redalyc.org/articulo.oa?id=23816088008 Como citar este artigo Número completo Sistema de Informação Científica Mais artigos Rede de Revistas Científicas da América Latina, Caribe , Espanha e Portugal Home da revista no Redalyc Projeto acadêmico sem fins lucrativos desenvolvido no âmbito da iniciativa Acesso Aberto REVISTA DE SOCIOLOGIA E POLÍTICA V. 17, Nº 34 : 103-113 OUT. 2009 NOVAS DIMENSÕES DA POLÍTICA: PROTOCOLOS E CÓDIGOS NA ESFERA PÚBLICA INTERCONECTADA Sergio Amadeu da Silveira RESUMO O texto propõe a existência de uma divisão básica na relação entre política e Internet: a política “da” Internet e a política “na” Internet. Em seguida, agrega os temas das políticas da internet em três campos de disputas fundamentais: sobre a infra-estrutura da rede; sobre os formatos, padrões e aplicações; e sobre os conteúdos. Analisa os temas políticos atuais mais relevantes de cada campo conflituoso, articulando dois aspectos: o tecno-social e o jurídico-legislativo. Este artigo trabalha com o conceito de arquitetura de poder, uma extensão da definição de Alexander Galloway sobre o gerenciamento protocolar, e com a perspectiva de Yochai Benkler sobre a existência de uma esfera pública interconectada. Sua conclusão indica que a liberdade nas redes cibernéticas depende da existência da navegação não-identificada, ou seja, do anonimato. Apontada como uma das principais contendas políticas da Internet, a possibilidade do anonimato é apresentada como um elemento fundamental de resistência frente às amplas possibilidades de controle da comunicação social. Sendo assim, a garantia da liberdade de produzir conteúdos e de acessá- los nas redes cibernéticas – em que os rastros digitais acompanham toda a navegação dos cidadãos interagentes – exige a defesa da não-identificação. PALAVRAS-CHAVE: política da Internet; arquiteturas de poder; ciberpolítica; poder nas redes. I. INTRODUÇÃO tendência. Segundo a pesquisa realizada pelo Pew Research Center for the People & the Press e da Há diversas maneiras de discutir a relação en- Pew Internet & American Life Project, em 2008, tre a política e a Internet, mas existe uma divisão 42% dos jovens norte-americanos entre 18 e 29 básica que amplia nossa clareza sobre o contexto anos disseram informar-se sobre a campanha pela histórico em que tais articulações ocorrem. Al- Internet, destacando o papel crescente das cha- guns observam a política na Internet, outros ob- madas redes sociais, principalmente, do MySpace servam a política da Internet. Este artigo tratará e do Facebook (KHOUT, 2008). das disputas sobre a organização e a ação das re- des digitais e do conflito entre tentativas de con- Os estudos da política na rede focalizam, prin- trole e de emancipação do ciberespaço, bem como, cipalmente, o uso da Internet pelos partidos e can- da relevância dos códigos e protocolos para a didatos (BARROS FILHO, COUTINHO & comunicação livre e distribuída ou para a subor- SAFLATE, 2007; CHAIA, 2008). Existem, ainda, dinação dos fluxos informacionais às tradicionais instigantes análises sobre o impacto das interfaces hierarquias e verticalidades que conformaram o colaborativas (RHEINGOLD, 2004; UGARTE, mundo da comunicação de massas. Assim, aqui 2008), do uso das mídias sociais como será discutida a política da Internet. organizadores coletivos (SILVEIRA, 2007), do surgimento de uma nova esfera pública agora Sem dúvida, são cada vez mais relevantes para interconectada (BENKLER, 2006), além de uma uma sociedade em rede (CASTELLS, 1998) as vasta gama de debates sobre a representação, a investigações e análises da política na Internet, organização política e as instituições democráti- principalmente agora, quando não há mais dúvi- cas a partir do ciberespaço (COLEMAN, 1999; das de sua importância como arranjo midiático HAGUE & LOADER, 1999; NIXON & fundamental para as disputas pelo poder de Esta- JOHANSSON, 1999; WILHELM, 1999; BARBER, do. A campanha de Barack Hussein Obama não se 2004; TERRANOVA, 2004; JENKINS & tratou de um ponto fora da curva, mas de uma THORBURN, 2004; NOVECK, 2005). Recebido em 2 de fevereiro de 2009. Rev. Sociol. Polít., Curitiba, v. 17, n. 34, p. 103-113, out. 2009 Aprovado em 25 de fevereiro de 2009. 103 NOVAS DIMENSÕES DA POLÍTICA Quando a opção é o estudo da política da rede, tínua incorporação de novas criações tecnológicas. o temário e os objetos de análise passam a ser Até este momento, a Internet tem sido uma obra outros. Uma tentativa razoável de compreendê- inacabada, em constante desenvolvimento. Tal si- los se dá a partir do seu agrupamento em três tuação desagrada vários segmentos econômicos tipos de política: 1) sobre a infra-estrutura; 2) sobre e políticos do capitalismo, bem como extratos os conteúdos; e 3) sobre os formatos e aplica- burocráticos de formação autoritária. A velha in- ções. Existem conflitos, disputas e proposições dústria cultural e o conjunto das indústrias de envolvendo agentes sociais em cada um desses intermediação são diretamente afetadas, embora agrupamentos. Diversos interesses chocam-se em diferentes graus, pela expansão da comunica- com a finalidade de manter ou alterar a dinâmica e ção distribuída e pela surpreendente criatividade a organização da Internet. Como a rede mundial tecnológica espalhada pelo planeta. Entre inúme- de computadores torna-se extremamente relevante ros exemplos, é perceptível que o instituto da pro- para o cotidiano comunicacional do planeta, iden- priedade intelectual, muito importante para o ca- tificar essa nova dimensão da política é igualmen- pitalismo industrial, foi abalado por uma série de te relevante para compreendermos nosso tempo. inovações realizadas pelos usuários da rede. O exemplo típico é o das redes P2P (peer-to-peer), II. CARACTERIZAÇÃO DA COMUNICAÇÃO que ganhou destaque com o Napster no início deste EM REDES DIGITAIS século. A Internet é um arranjo midiático. Foi e é de- Em um processo de comunicação sob contro- senvolvida a partir da reunião de diversos meios e le completo de Estados ou de firmas seria muito tecnologias. Manuel Castells descreveu a Internet mais fácil conter tecnologias que colocassem em como a “improvável intersecção da big science, risco negócios bilionários ou interesses podero- da pesquisa militar e da cultura libertária” sos. Até o advento da comunicação distribuída em (CASTELLS, 2003, p. 19). Isso quer dizer que a redes digitais, o capital teve maior poder sobre a rede, originada nos interesses militares, foi sendo comunicação. No livro Mudança estrutural da reconfigurada pelos seus usuários, principalmen- esfera pública (1984), Habermas mostrou como te pela comunidade acadêmica e pelos hackers, a imprensa foi capturada pelo capital, uma vez grupos de programadores talentosos altamente que as verbas de publicidade eram essenciais à influenciados pela contracultura da década de manutenção das empresas de comunicação. De 1960. A rede mundial de computadores não pode modo distinto, na comunicação em rede, nem ser definida como um produto nem como um mesmo as poderosas operadoras de telefonia pu- conjunto de equipamentos com a evolução con- deram evitar que a disseminação da “voz sobre trolada por uma ou algumas empresas. A Internet IP” (VoIP) retirasse seus rendimentos. A Recording não tem um centro, uma sede, trata-se de uma Industry Association of America (RIAA), se con- rede distribuída, construída colaborativamente por seguiu judicialmente impedir o funcionamento do grupos de voluntários que no decorrer de sua his- Napster, fracassou ao tentar bloquear o uso das tória foram envolvendo, além dos acadêmicos e redes P2P de compartilhamento de arquivos. hackers, engenheiros e especialistas de várias empresas, para construírem os elementos funda- Nesse sentido, o professor Alejandro Piscitelli mentais do funcionamento da rede, a saber, os desenvolveu uma caracterização geral extremamen- seus protocolos de comunicação. te clara do que a rede mundial de computadores representa: “Internet fue el primer medio massivo A evolução da Internet não foi ditada nem mes- de la historia que permitió una horizontalización de mo pelo governo norte-americano. A rede cres- las comunicaciones, una simetría casi perfecta en- ceu e foi moldada incorporando as soluções tre producción y recepción, alterando en forma tecnológicas desenvolvidas pelos seus usuários. indeleble la ecología de los medios”1 (PISCITELLI, Como a Internet não estava submetida às hierar- 2002, p. 207). Já o ciberativista espanhol David quias tradicionais das firmas (BENKLER, 2006), não era e não é necessário obter autorização de ninguém para criar nela novos conteúdos, forma- 1 Tradução livre: “A Internet foi o primeiro meio massivo tos e tecnologias. Esse modelo aberto e não-pro- da história que permitiu a horizontalização das comunica- prietário é um dos fatores vitais que asseguraram ções, uma simetria quase perfeita entre produção e recep- a rápida expansão e evolução da rede com a con- ção, alterando de forma indelével a ecologia dos meios”. 104 REVISTA DE SOCIOLOGIA E POLÍTICA V. 17, Nº 34 : 103-113 OUT. 2009 Ugarte difere a comunicação descentralizada da O controle da comunicação através de uma comunicação distribuída. Para ele, a Internet é uma organização de hierarquia
Recommended publications
  • Hacker Culture & Politics
    HACKER CULTURE & POLITICS COMS 541 (CRN 15368) 1435-1725 Department of Art History and Communication Studies McGill University Professor Gabriella Coleman Fall 2012 Arts W-220/ 14:35-17:25 Professor: Dr. Gabriella Coleman Office: Arts W-110 Office hours: Sign up sheet Tuesday 2:30-3:30 PM Phone: xxx E-mail: [email protected] OVERVIEW This course examines computer hackers to interrogate not only the ethics and technical practices of hacking, but to examine more broadly how hackers and hacking have transformed the politics of computing and the Internet more generally. We will examine how hacker values are realized and constituted by different legal, technical, and ethical activities of computer hacking—for example, free software production, cyberactivism and hactivism, cryptography, and the prankish games of hacker underground. We will pay close attention to how ethical principles are variably represented and thought of by hackers, journalists, and academics and we will use the example of hacking to address various topics on law, order, and politics on the Internet such as: free speech and censorship, privacy, security, surveillance, and intellectual property. We finish with an in-depth look at two sites of hacker and activist action: Wikileaks and Anonymous. LEARNER OBJECTIVES This will allow us to 1) demonstrate familiarity with variants of hacking 2) critically examine the multiple ways hackers draw on and reconfigure dominant ideas of property, freedom, and privacy through their diverse moral 1 codes and technical activities 3) broaden our understanding of politics of the Internet by evaluating the various political effects and ramifications of hacking.
    [Show full text]
  • Selected Filmography of Digital Culture and New Media Art
    Dejan Grba SELECTED FILMOGRAPHY OF DIGITAL CULTURE AND NEW MEDIA ART This filmography comprises feature films, documentaries, TV shows, series and reports about digital culture and new media art. The selected feature films reflect the informatization of society, economy and politics in various ways, primarily on the conceptual and narrative plan. Feature films that directly thematize the digital paradigm can be found in the Film Lists section. Each entry is referenced with basic filmographic data: director’s name, title and production year, and production details are available online at IMDB, FilmWeb, FindAnyFilm, Metacritic etc. The coloured titles are links. Feature films Fritz Lang, Metropolis, 1926. Fritz Lang, M, 1931. William Cameron Menzies, Things to Come, 1936. Fritz Lang, The Thousand Eyes of Dr. Mabuse, 1960. Sidney Lumet, Fail-Safe, 1964. James B. Harris, The Bedford Incident, 1965. Jean-Luc Godard, Alphaville, 1965. Joseph Sargent, Colossus: The Forbin Project, 1970. Henri Verneuil, Le serpent, 1973. Alan J. Pakula, The Parallax View, 1974. Francis Ford Coppola, The Conversation, 1974. Sidney Pollack, The Three Days of Condor, 1975. George P. Cosmatos, The Cassandra Crossing, 1976. Sidney Lumet, Network, 1976. Robert Aldrich, Twilight's Last Gleaming, 1977. Michael Crichton, Coma, 1978. Brian De Palma, Blow Out, 1981. Steven Lisberger, Tron, 1982. Godfrey Reggio, Koyaanisqatsi, 1983. John Badham, WarGames, 1983. Roger Donaldson, No Way Out, 1987. F. Gary Gray, The Negotiator, 1988. John McTiernan, Die Hard, 1988. Phil Alden Robinson, Sneakers, 1992. Andrew Davis, The Fugitive, 1993. David Fincher, The Game, 1997. David Cronenberg, eXistenZ, 1999. Frank Oz, The Score, 2001. Tony Scott, Spy Game, 2001.
    [Show full text]
  • Underglobalization Beijing’S Media Urbanism and the Chimera of Legitimacy
    Underglobalization Beijing’s Media Urbanism and the Chimera of Legitimacy Joshua Neves Underglobalization Beijing’s Media Urbanism and the Chimera of Legitimacy Joshua Neves duke university press | durham and london | 2020 © 2020 Duke University Press All rights reserved Printed in the United States of Amer i ca on acid- free paper ∞ Designed by Drew Sisk Typeset in Portrait Text, SimSun, and Univers by Westchester Publishing Services Library of Congress Cataloging- in- Publication Data Names: Neves, Joshua, [date] author. Title: Underglobalization : Beijing’s media urbanism and the chimera of legitimacy / Joshua Neves. Description: Durham : Duke University Press, 2020. | Includes bibliographical references and index. Identifiers: lccn 2019032496 (print) | lccn 2019032497 (ebook) isbn 9781478007630 (hardcover) isbn 9781478008057 (paperback) isbn 9781478009023 (ebook) Subjects: lcsh: Product counterfeiting— Law and legislation— China. | Piracy (Copyright)— China. | Legitimacy of governments—China. | Globalization—China. Classification: lcc knq1160.3.n48 2020 (print) | lcc knq1160.3 (ebook) | ddc 302.230951— dc23 lc record available at https:// lccn . loc. gov / 2019032496 lc ebook record available at https:// lccn . loc. gov / 2019032497 Cover art: Xing Danwen, detail from Urban Fictions, 2004. Courtesy of the artist and Danwen Studio. Chapter 5 was originally published in “Videation: Technological Intimacy and the Politics of Global Connection,” in Asian Video Cultures: In the Penumbra of the Global, edited by Joshua Neves and Bhaskar
    [Show full text]
  • 3 Oppositional Feature Documentary in the 1990S: Channel 4 and Oppositional Auteurs
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by OpenGrey Repository UNSPECIFIED UNSPECIFIED UNSPECIFIED, University of the West of England. We recommend you cite the published version. The publisher’s URL is https://eprints.uwe.ac.uk/secure/20924/ Refereed: No (no note) Disclaimer UWE has obtained warranties from all depositors as to their title in the material deposited and as to their right to deposit such material. UWE makes no representation or warranties of commercial utility, title, or fit- ness for a particular purpose or any other warranty, express or implied in respect of any material deposited. UWE makes no representation that the use of the materials will not infringe any patent, copyright, trademark or other property or proprietary rights. UWE accepts no liability for any infringement of intellectual property rights in any material deposited but will remove such material from public view pend- ing investigation in the event of an allegation of any such infringement. PLEASE SCROLL DOWN FOR TEXT. THE POLITICAL AVANT-GARDE: OPPOSITIONAL DOCUMENTARY IN BRITAIN SINCE 1990 STEVE PRESENCE A thesis submitted in partial fulfilment of the requirements of the University of the West of England, Bristol for the degree of Doctor of Philosophy Faculty of Arts, Creative Industries and Education, University of the West of England, Bristol February 2013 Contents ACKNOWLEDGEMENTS .................................................................................................................. III ABSTRACT
    [Show full text]
  • Copyright, Creative Commons and Artistic Integrity
    Edith Cowan University Research Online Theses : Honours Theses 2010 Copyright, creative commons and artistic integrity Yagan M. Kiely Edith Cowan University Follow this and additional works at: https://ro.ecu.edu.au/theses_hons Part of the Intellectual Property Law Commons, and the Other Music Commons Recommended Citation Kiely, Y. M. (2010). Copyright, creative commons and artistic integrity. https://ro.ecu.edu.au/theses_hons/ 1332 This Thesis is posted at Research Online. https://ro.ecu.edu.au/theses_hons/1332 Edith Cowan University Copyright Warning You may print or download ONE copy of this document for the purpose of your own research or study. The University does not authorize you to copy, communicate or otherwise make available electronically to any other person any copyright material contained on this site. You are reminded of the following: Copyright owners are entitled to take legal action against persons who infringe their copyright. A reproduction of material that is protected by copyright may be a copyright infringement. Where the reproduction of such material is done without attribution of authorship, with false attribution of authorship or the authorship is treated in a derogatory manner, this may be a breach of the author’s moral rights contained in Part IX of the Copyright Act 1968 (Cth). Courts have the power to impose a wide range of civil and criminal sanctions for infringement of copyright, infringement of moral rights and other offences under the Copyright Act 1968 (Cth). Higher penalties may apply, and higher damages may be awarded, for offences and infringements involving the conversion of material into digital or electronic form.
    [Show full text]
  • Raw Thought: the Weblog of Aaron Swartz Aaronsw.Com/Weblog
    Raw Thought: The Weblog of Aaron Swartz aaronsw.com/weblog 1 What’s Going On Here? May 15, 2005 Original link I’m adding this post not through blogging software, like I normally do, but by hand, right into the webpage. It feels odd. I’m doing this because a week or so ago my web server started making funny error messages and not working so well. The web server is in Chicago and I am in California so it took a day or two to get someone to check on it. The conclusion was the hard drive had been fried. When the weekend ended, we sent the disk to a disk repair place. They took a look at it and a couple days later said that they couldn’t do anything. The heads that normally read and write data on a hard drive by floating over the magnetized platter had crashed right into it. While the computer was giving us error messages it was also scratching away a hole in the platter. It got so thin that you could see through it. This was just in one spot on the disk, though, so we tried calling the famed Drive Savers to see if they could recover the rest. They seemed to think they wouldn’t have any better luck. (Please, plase, please, tell me if you know someplace to try.) I hadn’t backed the disk up for at least a year (in fairness, I was literally going to back it up when I found it giving off error messages) and the thought of the loss of all that data was crushing.
    [Show full text]
  • Online Media Piracy: Convergence, Culture, and the Problem of Media
    Online Media Piracy: Convergence, Culture, and the Problem of Media Change Sean Fuller Department of Gender and Cultural Studies The University of Sydney A thesis submitted to fulfil requirements for the degree of Doctor of Philosophy at the University of Sydney i DECLARATION I hereby declare that this submission is my own work and that, to the best of my knowledge and belief, it contains no material previously published or written by another person nor material which to a substantial extent has been accepted for the award of any other degree or diploma of the university or any other institute of higher learning, except where due acknowledgement has been made in the text. Sean Fuller April 7, 2018 ii Abstract This thesis proposes that there is a symbiotic relationship between the emergence of online media piracy and the industrial, economic and legal changes that have shaped contemporary popular media in the early 21st century. The Internet is at the heart of most recent transformations of the popular media environment, such as the emergence of video- on-demand formats for film and television consumption and the impact this has had on the nature of those media forms. This thesis discusses the powerful role played by online media piracy in shaping these developments, both through changing the expectations of consumers, and the options that are available for distributors of media content. As well as exploring the diverse forms and practices of online media piracy today, this thesis also explores theories of media change, considering how we might understand such piracy as a force underpinning media change, and how the changes it has helped shape might be placed in a broader historical context.
    [Show full text]
  • Open Content Licensing
    Open Content Licensing Open Content Licensing From Theory to Practice Edited by Lucie Guibault & Christina Angelopoulos Amsterdam University Press Cover design: Kok Korpershoek bno, Amsterdam Lay-out: JAPES, Amsterdam ISBN 978 90 8964 307 0 e-ISBN 978 90 4851 408 3 NUR 820 Creative Commons License CC BY NC (http://creativecommons.org/licenses/by-nc/3.0) L. Guibault & C. Angelopoulos / Amsterdam University Press, Amsterdam, 2011 Some rights reversed. Without limiting the rights under copyright reserved above, any part of this book may be reproduced, stored in or introduced into a retrieval system, or transmitted, in any form or by any means (electronic, mechanical, photocopying, recording or otherwise). Contents 1. Open Content Licensing: From Theory to Practice – An Introduction 7 Lucie Guibault, Institute for Information Law, University of Amsterdam 2. Towards a New Social Contract: Free-Licensing into the Knowledge Commons 21 Volker Grassmuck, Humboldt University Berlin and University of Sao Paulo 3. Is Open Content a Victim of its Own Success? Some Economic Thoughts on the Standardization of Licenses 51 Gerald Spindler and Philipp Zimbehl, University of Göttingen 4. (Re)introducing Formalities in Copyright as a Strategy for the Public Domain 75 Séverine Dusollier, Centre de Recherche Informatique et Droit, Université Notre- Dame de la Paix (Namur) 5. User-Related Assets and Drawbacks of Open Content Licensing 107 Till Kreutzer, Institute for legal questions on Free and Open Source Software (ifrOSS) 6. Owning the Right to Open Up Access to Scientific Publications 137 Lucie Guibault, Institute for Information Law, University of Amsterdam 7. Friends or Foes? Creative Commons, Freedom of Information Law and the European Union Framework for Reuse of Public Sector Information 169 Mireille van Eechoud, Institute for Information Law, University of Amsterdam 8.
    [Show full text]
  • Technical Report: an Estimate of Infringing Use of the Internet
    Technical report: An Estimate of Infringing Use of the Internet January 2011 Version 1.8 Envisional Ltd, Betjeman House, 104 Hills Road, Cambridge, CB2 1LQ Telephone: +44 1223 372 400 www.envisional.com [email protected] Envisional: Internet bandwidth usage estimation 2 1 Introduction Envisional was commissioned by NBC Universal to analyse bandwidth usage across the internet with the specific aim of assessing how much of that usage infringed upon copyright. This report provides the results of that analysis and is in three main parts. Part A examines the internet arenas most often used for online piracy – peer-to-peer networks (with a specific focus on bittorrent), cyberlockers (file hosting sites such as Rapidshare), and other web-based piracy venues (such as streaming video) – and estimates the proportion of infringing content found on each. Part B is a critical analysis of recent studies from four network equipment and monitoring companies. These companies measured network traffic at multiple (and different) sites worldwide to characterize overall internet usage. Part C combines the data and analysis from Part A and Part B in an attempt to show what proportion of internet traffic represents unauthorised distribution of copyrighted material. 1.1 Executive Summary . Across all areas of the global internet, 23.76% of traffic was estimated to be infringing. This excludes all pornography, the infringing status of which can be difficult to discern. The level of infringing traffic varied between internet venues and was highest in those areas of the internet commonly used for the distribution of pirated material. BitTorrent traffic is estimated to account for 17.9% of all internet traffic.
    [Show full text]
  • Fan-Funded Film: How Audience Participation Is Shaping the Future of Motion Pictures
    The University of Maine DigitalCommons@UMaine Honors College Winter 12-2014 Fan-Funded Film: How Audience Participation Is Shaping The Future of Motion Pictures Renee E. Moody University of Maine Follow this and additional works at: https://digitalcommons.library.umaine.edu/honors Part of the English Language and Literature Commons, and the Mass Communication Commons Recommended Citation Moody, Renee E., "Fan-Funded Film: How Audience Participation Is Shaping The Future of Motion Pictures" (2014). Honors College. 253. https://digitalcommons.library.umaine.edu/honors/253 This Honors Thesis is brought to you for free and open access by DigitalCommons@UMaine. It has been accepted for inclusion in Honors College by an authorized administrator of DigitalCommons@UMaine. For more information, please contact [email protected]. FAN-FUNDED FILM: HOW AUDIENCE PARTICIPATION IS SHAPING THE FUTURE OF MOTION PICTURES by Renee E. Moody A Thesis Submitted in Partial Fulfillment of the Requirements of a Degree with Honors (English, Mass Communication) The Honors College University of Maine December 2014 Advisory Committee: Margery Irvine, Lecturer in English, Advisor Steven R. Evans, Associate Professor of English Michael J. Socolow, Associate Professor, Department of Communication and Journalism Sarah Brookes, Assistant Professor of Communication and Journalism Edith Pratt Elwood, Adjunct Assistant Professor, Honors College (Sociology) © 2014 Renee Moody All Rights Reserved ABSTRACT A look at intellectual property rights in the Internet Age. Fan-Funded Film examines the omnipresent issue of piracy and the financial strategy of crowdfunding. Both have existed in film for decades, but have increased dramatically in recent years. Through the use of several theories and real life examples, I explore the problem of piracy's popularity and how audience participation through crowdfunding could be the answer.
    [Show full text]
  • Beyond Binaries: Teaching Intellectual Property in the Writing Classroom Many Types of Writing Require Students to Use Others
    Shaun Slattery Department of Writing, Rhetoric, & Discourse CCCC 2009 DePaul University, Chicago Saturday March 4, 2-3:15 pm [email protected] O.14 Plagiarism & Intellectual Property http://condor.depaul.edu/~sslatte1/ Beyond Binaries: Teaching Intellectual Property in the Writing Classroom Many types of writing require students to use others’ intellectual property (IP), and norms for incorporation and attribution differ across contexts. Academic traditions of acknowledgment through citation sometimes clash with common cultural practices of reuse and remix. Writing courses, especially those that include public, professional, digital, and multimodal writing, create what DeVoss and Porter in their 2006 Computers and Composition article call the “copyright crisis.” As we try to help students understand IP issues and make sense of them ourselves, it is important to have strategies for addressing intellectual property in the teaching of writing. I recently developed and taught a special topics graduate course on writing and intellectual property in the digital age. From this experience, I found that situating these issues in relation to larger cultural, legal, and economic contexts helped students productively engage in conversations about plagiarism and copyright. I eschewed the simple binary of right and wrong, and more narrowly plagiarism/not plagiarism, and instead asked my students to articulate their own personal ethics of authorship, rights protection, permissions granting, and fair use. They examined how their own IP practices are part of a larger “copynorms,” or communal conventions and values concerning intellectual property use and attribution. Reflecting on these experiences, I will describe assignments that, in my experience, help students learn legal and ethical options for using others’ work as well as securing rights for their own work.
    [Show full text]
  • T Steal a Car' Vs 'Information Wants to Be Free' Regulatory Failure of Copyright Law Through the Prism of Systems Theory
    'You wouldn't steal a car' vs 'Information wants to be free' Regulatory failure of copyright law through the prism of Systems Theory Katarzyna Gracz Thesis submitted for assessment with a view to obtaining the degree of Doctor of Laws of the European University Institute Florence, 10.05.2016 European University Institute Department of Law 'You wouldn't steal a car' vs 'Information wants to be free' Regulatory failure of copyright law through the prism of Systems Theory Katarzyna Gracz Thesis submitted for assessment with a view to obtaining the degree of Doctor of Laws of the European University Institute Examining Board Prof. Dr. Giovanni Sartor, European University Institute (Supervisor) Prof. Dr. Jiři Přiban, Cardiff University (Co-Supervisor) Prof. Dr. Hans-Wolfgang Micklitz, European University Institute Prof. em. Dr. Gunther Teubner, Goethe Universität, Frankfurt am Main © Katarzyna Gracz, 2016 No part of this thesis may be copied, reproduced or transmitted without prior permission of the author Researcher declaration to accompany the submission of written work Department of Law – LL.M. and Ph.D. Programmes I Katarzyna Gracz certify that I am the author of the work 'You wouldn't steal a car' vs 'Information wants to be free' Regulatory failure of copyright law through the prism of Systems Theory I have presented for examination for the Ph.D. at the European University Institute. I also certify that this is solely my own original work, other than where I have clearly indicated, in this declaration and in the thesis, that it is the work of others. I warrant that I have obtained all the permissions required for using any material from other copyrighted publications.
    [Show full text]