Le pirate informatique, un explorateur des courants juridiques du réseau
The article examines the figure of the computer pirate, its facets and its evolution under the influence of technical developments and the regulation thereof. The analysis is carried out by looking at the interplay between legal, technical and social norms, focusing on the relationship between new t...
Main Authors: | , |
---|---|
Format: | Article |
Language: | fra |
Published: |
ENS Éditions
2014-06-01
|
Series: | Tracés |
Subjects: | |
Online Access: | https://journals.openedition.org/traces/5914 |
_version_ | 1797313301765423104 |
---|---|
author | Primavera De Filippi Mélanie Dulong de Rosnay |
author_facet | Primavera De Filippi Mélanie Dulong de Rosnay |
author_sort | Primavera De Filippi |
collection | DOAJ |
description | The article examines the figure of the computer pirate, its facets and its evolution under the influence of technical developments and the regulation thereof. The analysis is carried out by looking at the interplay between legal, technical and social norms, focusing on the relationship between new technologies bypassing the law and the rules of law which, while trying to regulate these new technologies, eventually extend into new and previously unregulated territories. From the first pirate radios to the peer-to-peer file haring platforms, a regularity can be found among the tensions and discrepancies that subsists between technical, and initially marginal innovations and the applicable law. Extending the scope of legal regulation causes changes in the technology, and a widespread deployment and use of these technologies to exercise certain rights which have been threatened by anti-piracy laws. |
first_indexed | 2024-03-08T02:29:49Z |
format | Article |
id | doaj.art-59f6eead8c1e48c08165d4213db23bc9 |
institution | Directory Open Access Journal |
issn | 1763-0061 1963-1812 |
language | fra |
last_indexed | 2024-03-08T02:29:49Z |
publishDate | 2014-06-01 |
publisher | ENS Éditions |
record_format | Article |
series | Tracés |
spelling | doaj.art-59f6eead8c1e48c08165d4213db23bc92024-02-13T14:06:08ZfraENS ÉditionsTracés1763-00611963-18122014-06-0126436510.4000/traces.5914Le pirate informatique, un explorateur des courants juridiques du réseauPrimavera De FilippiMélanie Dulong de RosnayThe article examines the figure of the computer pirate, its facets and its evolution under the influence of technical developments and the regulation thereof. The analysis is carried out by looking at the interplay between legal, technical and social norms, focusing on the relationship between new technologies bypassing the law and the rules of law which, while trying to regulate these new technologies, eventually extend into new and previously unregulated territories. From the first pirate radios to the peer-to-peer file haring platforms, a regularity can be found among the tensions and discrepancies that subsists between technical, and initially marginal innovations and the applicable law. Extending the scope of legal regulation causes changes in the technology, and a widespread deployment and use of these technologies to exercise certain rights which have been threatened by anti-piracy laws.https://journals.openedition.org/traces/5914Internetpiracycopyrighthackersdistributed networks |
spellingShingle | Primavera De Filippi Mélanie Dulong de Rosnay Le pirate informatique, un explorateur des courants juridiques du réseau Tracés Internet piracy copyright hackers distributed networks |
title | Le pirate informatique, un explorateur des courants juridiques du réseau |
title_full | Le pirate informatique, un explorateur des courants juridiques du réseau |
title_fullStr | Le pirate informatique, un explorateur des courants juridiques du réseau |
title_full_unstemmed | Le pirate informatique, un explorateur des courants juridiques du réseau |
title_short | Le pirate informatique, un explorateur des courants juridiques du réseau |
title_sort | le pirate informatique un explorateur des courants juridiques du reseau |
topic | Internet piracy copyright hackers distributed networks |
url | https://journals.openedition.org/traces/5914 |
work_keys_str_mv | AT primaveradefilippi lepirateinformatiqueunexplorateurdescourantsjuridiquesdureseau AT melaniedulongderosnay lepirateinformatiqueunexplorateurdescourantsjuridiquesdureseau |