he dominant project of cyberlaw is to parse the implications of the Internet's structural rules or "code." n302 Legal scholars seeking to explain the Internet's dynamism as a unified platform have emphasized a particular structural factor: the so-called "end-to-end" model. n303 An end-to-end network is one that pushes control out to the endpoints. n304 The network focuses on moving bits from one place to another, without considering what those bits contain. Any edge device, such as a computer or mobile phone, can add a new application, and those edge devices are solely responsible for factors such as reliability and security that ensure the success of that application. Because innovations do not require the consent or updating of the network core, those innovations can be deployed more quickly.n305 As edge devices become more powerful, which they do as computing power improves over time, their enhancements can immediately be joined to the network. So, new services such as Google, Skype, Hotmail, Facebook, and Amazon.com can catch on and grow rapidly, generating significantly more social and economic benefits than in a network like the PSTN, where central control nodes must approve new features. n306
The end-to-end model emphasizes only one side of the equation - the edges. The Internet gives extraordinary power to its endpoints, but it also embodies linkages between those endpoints, and between [*400] aggregations of systems that connect into a composite network. The fact that the edges of the network define the applications say nothing about how those edges are wired together. An endpoint can offer a brilliant innovation, but such innovation will be of no value if other endpoints cannot access it, or cannot access it easily. n307 Something more than the end-to-end principle must explain how the Internet holds together.
Note: Lexis Nexis doesn't give persistent links (or else I am unable to find where they do) in order to retrieve this article simply search for "a lay perspective on the copyright wars" with only the legal box checkmarked and it will be the first result.
In this Lecture, Columbia University's University Librarian, James G. Neal, addresses the current environment of libraries in regards to copyright and open access. Neal's lecture mostly addresses the findings of the 108 Study Group which was formed to research copyright. Neal explains the current state of copyright, the findings of the 108 Study Group, and the framework necessary in order to facilitate a more open environment for publications and libraries. Neal's lecture defines the library as an all encompassing entity which disseminates information, a center for research, a publisher in its own right. Because of the library's role as a center for just about everything scholarly, the library has a vision of embracing legacy as well as current trends. The library is an information repository and a portal to information. Serving so many roles simultaneously makes the library at the forefront of the copyright war.
In my essay it will be important to state why it is the duty of the librarian to rebel against copyright in order to push for more open access. Neal helps define the library as the center of the copyright war, the very front of the action. By citing Neal and his 108 Study Group's findings, I will be able to convey the importance of the librarian to stand up against copyright in order to defend the very embodiment and idea of the library itself. Neal's article also gives information on the opninion of librarians and library organizations on the issue of copyright and open access. Using some of this information will help me to define how to faciliate a better enviornment for the sharing of intellectual materials.
tagged classroom_use copyright copyright_clearance copyright_law copyright_legal_aspects fair_use law librarians library library_issues open_access scholarly_communication scholarly_publishing teaching u.s._law university_library by aulisio ...on 23-JUL-09
U.S. Code Title 17 is the definitive legal resource for the U.S. Laws regardining copyright. This resource has relevant information on what constitutes copyright infringement and what actions are needed to remedy said infringements.
I will use the above resource as a primary source. This source will help me to define exactly what copyright infringement is according to the law. The above material will help me to define what actions a librarian could take when addressing sensitive copyrighted materials. By knowing the extent of the law I could then determine what are suitable actions to take when coming in contact with something which is questionable -- and in turn what is definitively illegal -- in order to argue for what actions a librarian could take to "push the envelope" on copyright law.