Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
The anarchist in the library : how the clash between freedom and control is hacking the real world and crashing the system
Vaidhyanathan S., Basic Books, Inc., New York, NY, 2004. Type: Book (9780465089840)
Date Reviewed: Feb 3 2005

Should the Internet and other technologies be completely free of control, an anarchy, or should they be subject to absolute controls dictated by an authority, an oligarchy? This describes the issues that Vaidhyanathan addresses in his thought-provoking book. Following are some of the ideas presented.

Chapter 1 presents a history of the clash between anarchists and oligarchs, setting the stage for the rest of the book. Chapter 2 characterizes the Internet as a peer-to-peer system, as illustrated by the battle between music creators, copyright owners, and music consumers when the Internet was used as a vehicle for sharing Moving Picture Experts Group audio layer 3 (MP3) music files (for example, Napster).

Chapter 3 discusses cynicism applied to cyberspace. More questions are asked than answered. Most people use the Internet for three functions: inter-personal communication (email), news and library research, and shopping. One conflict discussed here is that the technology that makes safe shopping possible (128-bit encryption) is the same technology that let the 9/11 terrorists use the Internet for their hateful planning, without detection. A cynic would say this is the nature of the beast.

Chapter 5 considers the movie industry. One fundamental difference between music and movies is the structure of the product. At a cost of three dollars to rent a DVD movie, the sheer download size of such a movie gives little incentive to deal in pirate copies on the Internet. There is a discussion of various copy protection mechanisms, and of the laws (such as the Digital Millennium Copyright Act (DMCA)) that provide penalties to hackers who might circumvent protection mechanisms. A point is made that creating derivative works based on original movies is part of culture, and copyright schemes thwart this type of creativity.

Chapter 9 discusses examples of control versus laissez-faire, from science and mathematics. From science: should the maps of the human genome be patented, to give a commercial advantage to a commercial interest, or should they be public property? From mathematics: anyone who manufactures a security intervention device (decryption program) for profit violates the DMCA law.

In conclusion, Vaidhyanathan says his book was supposed to be about entertainment, the battle over control of digital music, text, and video. Instead, his concerns moved to the regulation and control of all sorts of information, including cultural and political. His position is that we should construct and maintain systems that discourage both anarchy and oligarchy.

This is a thoughtful, well-written, academic work that deserves reading. Hopefully, it will start a public dialog that will guide the future of technology.

Reviewer:  J. W. Snively Review #: CR130758 (0510-1108)
Bookmark and Share
 
Intellectual Property Rights (K.4.1 ... )
 
 
Internet (H.4.3 ... )
 
 
Regulation (K.4.1 ... )
 
 
Communications Applications (H.4.3 )
 
 
Governmental Issues (K.5.2 )
 
 
Public Policy Issues (K.4.1 )
 
Would you recommend this review?
yes
no
Other reviews under "Intellectual Property Rights": Date
The Internet is changing the music industry
Lam C., Tan B. Communications of the ACM 44(8): 62-68, 2001. Type: Article
Jan 1 2002
The moral rights of authors in the age of digital information
Fernández-Molina J., Peis E. Journal of the American Society for Information Science 52(2): 109-117, 2001. Type: Article
Dec 1 2001
Legally speaking: the promise and problems of the No Electronic Theft Act
Grosso A. Communications of the ACM 43(2): 23-26, 2000. Type: Article
Feb 1 2000
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy