Architectures of Control in Product Design
At Cambridge University, Dan Lockton is working on an interesting MPhil dissertation topic that is becoming more and more important: designing products with fea…
At Cambridge University, Dan Lockton is working on an interesting MPhil dissertation topic that is becoming more and more important: designing products with fea…
Commentary on the Directive 2001/29/EC on the Harmonization of Certain Aspects of Copyright and Related Rights in the Information Society, in: Dreier/Hugenholtz…
Digital Rights Management in the United States and Europe, 52 American Journal of Comparative Law 323-382 (2004).…
Trusted Computing - Whom do we trust? Different versions of a talk at the CIS at Stanford Law School, March 28, 2005: slides, audio version, synchronized audio…
The slides of my recent talk about trusted computing at the CIS in Stanford are now available online.…
Some information about digital rights management systems used in computer games may be found here.…
One of the features offered by TC is that it transforms trust in entities into trust in components (see here on pp. 644-645 for an explanation). In such an appr…
One of the criticisms raised against trusted computing is that it solves some potential problems of the future without doing the homework first that precedes th…
So, today, the U.S. Supreme Court will hear two cases that may profoundly shape U.S. cyberlaw and may also affect cyberlaw in other countries. For more informat…
So here is another potential example of an application of P2P systems that might even be helpful from the music industry's perspective.…
Indicare has an interesting article> written by Natali Helberger about the advantages and limitations of labeling requirements as an answer to DRM. Such labe…
At the 3rd DRM conference this January in Berlin, Ross Anderson gave a dinner speech in which he envisaged a world suffused by region-coding technology (imagine…