000026664 000__ 03342cam\a2200649\i\4500 000026664 001__ 26664 000026664 003__ SzGeWIPO 000026664 005__ 20230203145916.0 000026664 008__ 110405s2011\\\\enka\\\\rb\\\\001\0\eng\d 000026664 020__ $$a9781849806213$$qPrint 000026664 020__ $$z9781849806220$$qeBook 000026664 035__ $$a(wipo)0 000026664 035__ $$a(OCoLC)742002672 000026664 040__ $$aSzGeWIPO$$beng$$erda$$cSzGeWIPO$$dCaBNVSL 000026664 041__ $$aeng 000026664 043__ $$an-us--- 000026664 050_4 $$aK1485$$b.G53 2011 000026664 050_4 $$aK1401$$b.G53 2011eb 000026664 050_4 $$aTK5105.525$$b.G53 2011eb 000026664 08204 $$a346.048$$222 000026664 084__ $$aN 75 GIB.C 000026664 090__ $$c29061$$d29050 000026664 1001_ $$aGiblin, Rebecca. 000026664 24510 $$aCode Wars :$$b10 years of P2P software litigation 000026664 264_1 $$aCheltenham, UK :$$bEdward Elgar Publishing,$$c2011. 000026664 300__ $$a272 pages :$$billustrations ;$$c24 cm 000026664 336__ $$atext$$btxt$$2rdacontent 000026664 337__ $$aunmediated$$bn$$2rdamedia 000026664 338__ $$avolume$$bnc$$2rdacarrier 000026664 504__ $$aIncludes bibliographical references (pages 230-251) and index. 000026664 5050_ $$aForeward -- 1. Introduction -- 2. Applying the pre-P2P law to napster -- 3. targeted attacks on the US secondary liability law -- 4. The targeted response -- 5. Post-Grokster fallout -- 6. Goldilocks and the three laws: why rights holders would never have sued a P2P provider under UK or Canadian law (and why the Australian law was just right) -- 7. The end of the road for Kazaa -- 8. Endgame: more P2P software providers than ever before -- 9. Can the secondary liability law respond to code's revolutionary nature? -- Bibliography -- Index. 000026664 520__ $$aCode Wars recounts the legal and technological history of the first decade of the P2P file sharing era, focusing on the innovative and anarchic ways in which P2P technologies evolved in response to decisions reached by courts with regard to their predecessors. With reference to US, UK, Canadian and Australian secondary liability regimes, this insightful book develops a compelling new theory to explain why a decade of ostensibly successful litigation failed to reduce the number, variety or availability of P2P file sharing applications – and highlights ways the law might need to change if it is to have any meaningful effect in future. A genuine interdisciplinary study, spanning both the law and information technology fields, this book will appeal to intellectual property and technology academics and researchers internationally. Historians and sociologists studying this fascinating period, as well as undergraduate and graduate students who are working on research projects in related fields, will also find this book a stimulating read. 000026664 650_0 $$aCopyright infringement$$zAustralia. 000026664 650_0 $$aComputer file sharing$$xLaw and legislation. 000026664 650_0 $$aCopyright infringement. 000026664 650_0 $$aCopyright and electronic data processing. 000026664 650_0 $$aCopyright and electronic data processing$$zAustralia. 000026664 650_0 $$aIntellectual property infringement. 000026664 650_0 $$aIntellectual property. 000026664 650_0 $$aComputer file sharing. 000026664 650_0 $$aPiracy. 000026664 650_0 $$aPiracy (Copyright)$$zAustralia. 000026664 650_0 $$aCopyright$$zAustralia. 000026664 650_0 $$aIntellectual property infringement$$zAustralia. 000026664 650_0 $$aIntellectual property$$zAustralia. 000026664 650_4 $$aCopyright 000026664 650_4 $$aInfringement 000026664 650_6 $$aPiratage (Droit d'auteur) 000026664 650_6 $$aP2P (Réseaux d'ordinateurs)$$xDroit. 000026664 651_0 $$aAustralia$$xCommerce$$xLaw and legislation. 000026664 85641 $$uhttps://www.elgaronline.com/display/9781849806213/9781849806213.xml$$yView eBook 000026664 942__ $$cMON$$jN 75 GIB.C 000026664 952__ $$w2012-02-22$$p2012-0047$$r0.00$$u41118$$bMAIN$$10$$kN 75 GIB.C$$v2012-02-22$$zTagged$$71 000026664 980__ $$aBIB$$aOS 000026664 999__ $$c29061$$d29061