Privacy a Question of Class

As we are in the beginning of the privacy course I dedicated today’s class to a closer reading of the classic Warren & Brandeis Right to Privacy article from 1890. We began with a discussion on what rights were, where they came from, and what they meant. The concept of rights is interesting as it is invoked often enough but it is often only vaguely understood.

From this point the discussion moved to trying to understand why Warren & Brandeis were interested in writing the article and what at that time in history made it relevant. The often cited cause is that Warren married Mabel Bayard, the daughter of a senator and future secretary of state – and that the press were overly prying. However, an interesting article What if Samuel D. Warren Hadn’t Married a Senator’s Daughter? by Amy Gajda shows that this was not the case. The press naturally reported it but hardly in a prying manner. Also the couple were married seven years before the publication, this may be a long time to hold a grudge. While the press were “nastier” when reporting the death of Mabel’s mother and sister, it is difficult to see if this was the true impetus for writing the article.

What is clear is that Warren had the main desire for the article and Brandeis was the lead author. Their anger was directed at the ways in which gossip had turned into an industry.

The press is overstepping in every direction the obvious bounds of propriety and of decency. Gossip is no longer the resource of the idle and the vicious, but has become a trade which is pursued with industry as well as effrontery. . . . To occupy the indolent, column upon column is filled with idle gossip, which can only be procured by intrusion upon the domestic circle . . .

The lowering of production costs for newspaper production, the increase in the gossip press, the desire for people to read this material is all reflected in the article. This was also a period of time when new technologies were enabling a new level of recording and transmitting data

Instantaneous photographs and newspaper enterprise have invaded the sacred precincts of private and domestic life; and numerous mechanical devices threaten to make good the prediction that ” what is whispered in the closet shall be proclaimed from the house-tops.

It is clear that the authors see a mix between technology and the business models that these technologies support. All this together was creating harm. Here they were looking towards a type of psychological harm that comes from the lack of protection from the sphere that is necessary for people to stay healthy in an ever more distressing world:

The intensity and complexity of life, attendant upon advancing civilization, have rendered necessary some retreat from the world, and man, under the refining influence of culture, has become more sensitive to publicity, so that solitude and privacy have become more essential to the individual; but modern enterprise and invention have, through invasions upon his privacy, subjected him to mental pain and distress, far greater than could be inflicted by mere bodily injury.

By looking at a wide range of cases and laws they explore, for example the ways in which copyright and defamation work, in order to

It is our purpose to consider whether the existing law affords a principle which can properly be invoked to protect the privacy of the individual; and, if it does, what the nature and extent of such protection is.

The answer they seek, lies in the rights stemming from the individual and are an extension of the physical space that is the property of the individual. And there extent is interest as they recognize the importance of metadata when they write

A man writes a dozen letters to different people. No person would be permitted to publish a list of the letters written. If the letters or the contents of the diary were protected as literary compositions, the scope of the protection afforded should be the same secured to a published writing under the copyright law. But the copyright law would not prevent an enumeration of the letters, or the publication of some of the facts contained therein.

The article was well received. For example an article in the 1891 Atlantic Monthly wrote (from Glancy The Invention of the Right to Privacy Arizona Law Review 1979):

…a learned and interesting article in a recent number of the Harvard Law Review, entitled The Right to Privacy. It seems that the great doctrine of Development rules not only in biology and theology, but in the law as well; so that whenever, in the long process of civilization, man generates a capacity for being made miserable by his fellows in some new way, the law, after a decent interval, steps in to protect him.

But an interesting social critique comes from Godkin writing about the Right to Privacy article in The Nation in 1890

The second reason is, that there would be no effective public support or countenance for such proceedings. There is nothing democratic societies dislike so much to-day as anything which looks like what is called “exclusiveness,” and all regard for or precautions about privacy are apt to be considered signs of exclusiveness. A man going into court, therefore, in defence of his privacy, would very rarely be an object of sympathy on the part either of a jury or the public.

He also wrote (from Glancy The Invention of the Right to Privacy Arizona Law Review 1979)

” ‘privacy’ has a different meaning to different classes or categories of persons, it is, for instance, one thing to a man who has always lived in his own house, and another to a man who has always lived in a boardinghouse.”

Godkin is interesting as he puts the privacy that Warren and Brandeis are calling for into an social or class perspective. The harm that Warren and Brandeis experience is a lack of comfort that only exists in the class that can afford it. There is no right to privacy in the sense that everyone should be given the opportunity to experience the right. It is the protection of those who already have power – not the creation of a right to empower people.

An interesting comparison is when Mark Zuckerberg declared that privacy is no longer a social norm in 2010. But in 2013  he bought four homes surrounding his house in order to ensure his privacy. Privacy is what can be afforded.

Disobedience Technology: Notes on a lecture

This lecture had the goal of introducing theories and methodologies behind civil disobedience in order to give the class the tools to identify legitimate acts of civil disobedience compared to lawlessness.

We began with the example of Socrates whose principled stand was that the law must be obeyed. In Plato’s text Crito we find Socrates in jail awaiting execution. His friends argue that he should escape.

But Socrates argues that the Laws exist as one entity, to break one would be to break them all. He cannot chose to obey the rules that suit him and disregard those which he doesn’t approve of.

The citizen is bound to the Laws like a child is bound to a parent, and so to go against the Laws would be like striking a parent. Rather than simply break the Laws and escape, Socrates should try to persuade the Laws to let him go. These Laws present the citizen’s duty to them in the form of a kind of social contract. By choosing to live in Athens, a citizen is implicitly endorsing the Laws, and is willing to abide by them. (Wikipedia)

This principled stand cost Socrates his life. However, most proponents of civil disobedience argue that there must be a way of following some rules while disobeying others. This disobedience must find legitimacy in other sources.

Greek mythology dealt with this issue in the story of Antigone where at one stage after a battle King Creon decreed that the dead were not to be buried. Antigone defied the law and buried her brother. She knew of the law and defied it knowingly arguing that she was bound by a superior divine law.

Continuing on this theme we looked at some of the classics of disobedience. Thoreau’s arguments that we are sometimes obliged to defy the government, Gandhi’s belief that we have a duty to disobey the unjust leader (and the example of the salt march), and Martin Luther King’s words that an unjust law is against God’s law.

“For years now I have heard the word ‘Wait!’…We must come to see…that ‘justice too long delayed is justice denied.’…One may well ask, ‘How can you advocate breaking some laws and obeying others?’ The answer is found in the fact that there are two types of laws: just and unjust…One has not only a legal but a moral responsibility to obey just laws. Conversely, one has a moral responsibility to disobey unjust laws.” (King Letter from Birmingham Jail)

These positions all argue that there is a higher moral authority that would make it legitimate to disobey rules. Indeed, King underscores that disobedience in such cases is a moral responsibility.

The argument against disobedience remains in the area of the social contract and the question about who could legitimately argue for the rules to be held or broken? In his Theory of Justice, John Rawles agreed that that there are situations where laws should not be followed and attempts to prevent “simple” lawlessness by stressing that disobedience is:

…a public, nonviolent, conscientious yet political act contrary to the law usually done with the aim of bringing about a change in the law or policies of the government.

H. A. Bedau argued in Civil Disobedience in Focus that in order for disobedience to be legitimate it should be

“committed openly…non-violently…and conscientiously…within the framework of the rule of law…with the intention of frustrating or protesting some law, policy or decision…of the government.”

While Peter Singer stressed

…if the aim of disobedience is to present a case to the public, then only such disobedience as is necessary to present this case is justified…if disobedience for publicity purposes is to be compatible with fair compromise, it must be non-violent.

These positions can be summed up with the idea that certain acts of disobedience are necessary in order to bring a minority position to the attention of the majority. However, in order to maintain its legitimacy, acts of disobedience must be carried out openly, non-violently, purposely, aimed at a specific rule or policy, by people prepared to accept the consequences.

Despite this, there are still critiques aimed at groups that attempt to disrupt via acts of civil disobedience. Often the arguments against disobedience are:

  • CD is not defensible in a democracy as the social contract is established and maintained by the people for the people.
  • CD is illegitimate as it subverts the equality embedded in the democratic process itself.
  • CD can only be acceptable if ALL other (democratic) methods have been exhausted

These critiques are easily enough met if we look at the American civil rights movement. The activists chose not to entrust the democratic process since the process is an endless one and does not necessarily promote change, but can be used to re-enforce established ideas. As King writes: ‘justice too long delayed is justice denied.’ The outlook for social change, brought about from within the system was bleak. By challenging the rules it became more and more clear to the majority that the rules were harmful and needed to be changed.

We then spoke of moving disobedience online. Discussing the ways in which technology can be used to support activism. At the same time our technology use has also created a system in which our activism has been trivialised and subverted. Social media is efficiently used to promote and spread information about injustice. However, social media is also used to trivialize political acts. We click on LIKE icons, re-Tweet links, and share videos but what does it all mean?

Is this Postman‘s dystopia (Amusing ourselves to Death) in action?

The slides

Why is copyright law so weird?

When we came across an old Remington Typewriter in a small curiosity shop in Manchester Vermont (founded 1761), the 12-year old looked at it with great curiosity and asked how it worked. He knew it was a writer’s tool but he was unable to figure out how text was produced.

So I explained how to load it with paper, pointed to the ribbon and explained that simply touching the keys would do very little – this was a classic machine where every key needed to be thumped hard to produce an imprint on the paper. The shopkeeper and the other customers (being older) all smiled at the idea that something so simple needed to be explained.

Naturally, everything imaginable has already been done on the Internet, so if you want to get an idea of what this conversation was like, check out the Typewriter episode of the adorable “Kids React to Technology” series:

One of my favorite quotes is that the machine “…types and prints at the same time”. Many of the kids seem to enjoy the tactile nature of typing but they all agree it’s too complicated.

Reminiscing about the typewriter is not only nostalgia. Understanding the technology of the past is vital to understanding the regulations and culture of the present. Take for example something simple like

Ctrl X – Ctrl V

Which, as most people know, are the keyboard shortcuts on a computer for cut and paste. But how many know the reason for cut and paste is that in the analogue world moving section a section of text could literally involve a pair of scissors and some glue. You cut it out and pasted it into the right place.

This is easy enough but it gets even more complex when we talk about law (or culture, but I am limiting this to law). For the longest time, copyright law did not really need to address private copying because the process of copying involved hours of labor and low-quality final output. Physical reality acted as a barrier to the action and therefore legislation was unnecessary. We have no regulation prohibiting people from passing through walls – the very nature of walls makes it unnecessary.

The problem arises when we live through a period of rapid technological change. The law is, and always will be, a slow mover. Most legislators grew up in worlds where typewriters did not need to be explained. Their understanding of the physical realities of copying were created in an analogue reality.

As Douglas Adams writes in Salmon of Doubt:

“I’ve come up with a set of rules that describe our reactions to technologies:
1. Anything that is in the world when you’re born is normal and ordinary and is just a natural part of the way the world works.
2. Anything that’s invented between when you’re fifteen and thirty-five is new and exciting and revolutionary and you can probably get a career in it.
3. Anything invented after you’re thirty-five is against the natural order of things.”

So what does this mean? Picture a legislator: they are often (unfortunately) older, wealthy men. For our example, picture Lex, a 60-year old legislator. Lex was born in 1954, he was fifteen in 1969, and hit 35 in 1989.

Technology invented prior to 1969 is perfectly natural: Obviously the typewriter, the radio and television were all natural. Email had been invented but most people were more likely to get a telegram than understand what an email was. The hottest new device – in this area – was the fax machine. Mobile telephones were invented but it was highly unlikely that anyone would ever hold one.

The development of technology between 1969 and 1989 was astounding – this era began with the first manned mission to land on the Moon: one small step and all that. But still Lex would be slowing down in his appreciation of technology; he would be able to use the VCR and he may even have considered buying the bulky Macintosh portable introduced in 1989…but the Internet, smartphones, mobile devices and most things we now take for granted in communications were not even in his imagination. Few people in 1989 thought landlines would be disappearing.

Just because Lex is old doesn’t mean he cannot be innovative. However, the lens through which he interprets the world is formed by a set of technological tools that have, for the most part, been replaced completely or been upgraded beyond recognition.

When Lex talks about copyright, he uses the vocabulary of this era but often his mindset is interpreting the words through the lens of his established technological world. To make matters worse, he is probably interpreting a set of laws that were created in the 1970s by men whose technology visions were set in the thirties. Naturally all these laws have been updated and modernized – but their fundamental nature remains anachronistic.

So the next time you are puzzled by copyright law remember that it wasn’t built for your iPad…it was built by people who never even dreamed of iPads.

This post first appeared on Commons Machinery.

Slut Shaming: Notes from a panel

My university has decided that it must act more quickly to join into a larger social debate on current events and to this end they arranged an open event on cyber bullying. The topic was well chosen as in December Göteborg experienced “slut shaming riots” when groups of youths attempted to catch and punish the person they thought was behind a local slut shaming account on Instagram.

The event was in the form of a panel with psychology professor Ann Frisén, police commissioner and chief of the youth section Birgitta Dellenhed, and myself. The university vice chancellor Helena Lindholm Schulz moderated the panel and three thoughtful and perceptive school teenagers were given the role of questioning the panelists before the audience were given time for questions.

The event was held in the old university main hall and was very well attended.

Professor Frisén opened with a presentation of what the concept of cyber bullying was and presented the findings from her research. Her worked confirmed that many children and young people experienced cyber bullying. I was next and then the presenters session was completed by commissioner Dellenhed explaining how the youth section worked and the basics of the recent slut shaming riots.

My role was to talk was on the technological side of the problem. As the reason for the panel was the result of slut shaming I focused my talk on technology’s role in slut shaming. I began with a restatement technology as neutral by using the well know “Guns don’t kill people”. In this perspective I explained that technology is not misogynistic per se but it is important not to forget that the technology is embedded with the values of the creators and adapted by the users.

I used a timeline of the last decades social media innovations to show that we have in a particularly short time evolved a whole new communications infrastructure. This infrastructure has enabled us to do things which we previously could not. This enabling has created new behaviors that may previously been unacceptable.

The ability to do new (and maybe unacceptable) things through technology means that it is our use that brings into question the rightness or wrongness of the situation. Users need social cues and guidance to know the ethics of their actions. Carrying on in technology at time minimizes the ethical social cues and makes behavior online morally complex.

As the whole event was focused on slut shaming and the riots there was a call for order and justice underlying everything that was being said. So I tried to bring back some balance by pointing out that the value of freedom and freedom of expression is important to our lives and societies. Yes I raised a warning finger against moral panic.

What is freedom of expression? Without the freedom to offend, it ceases to exist.
Salman Rushdie

The questions from the students were very interesting and deep. They reflected a need for both space and security. The complexity of this paradox (surveillance and control) was not lost on them. The questions from the floor were mostly good but towards the end was a gruff man demanding more surveillance, law and order. If we know who did it why don’t we prosecute and punish? His comments were applauded which made me think that some of the finer points were lost on the crowd.

The police explained that they do not ignore prosecutions but finding the guilty is not easy. She also pointed out that the person behind the account is also a victim (in some ways). I tried to argue that to catch the guilty in the way he was proposing would entail surveillance of all the innocent and was not compatible to a free and open society. But he denied that he was talking surveillance.

Most of the questions carried the discussion along nicely and the whole event seemed to be enjoyed by all.

The panel and the venue

Tolerance is law

Enjoying the great feeling of seeing my latest article (together with Jan Nolin) in (digital) print! Please check out Tolerance is law: Remixing Homage, Parodying Plagiarism which has been published today in the open journal Scripted.

Would like to thank the reviewers for pointing out the flaws and helping us improve the article. But I still want more so every and all comment is appreciated.

The abstract is boring but the article is (hopefully) much more interesting. Abstract:

Three centuries have passed since copyright law was developed to stimulate creativity and promote learning. The fundamental principles still apply, despite radical developments in the technology of production and distribution of cultural material. In particular the last decades’ developments and adoption of ICTs have drastically lowered barriers, which previously prevented entry into the production and distribution side of the cultural marketplace, and led to a widening of the base at which cultural production occurs and is disseminated. Additionally, digitalisation has made it economically and technically feasible for users to appropriate and manipulate earlier works as method of production.
The renegotiation of barriers and the increasing number of creators who publish their works has led to an increase in copyright violations and a pressure on copyright legislation. Many of these potential violations are tolerated, in some cases have become common practice, and created social norms. Others have not been so fortunate and the law has been rigidly enforced. This arbitrary application decreases the predictability of law and creates a situation where creation relies on the tolerance of the other copyright holders. This article analyses different cases of reuse that test the boundaries of copyright. Some of these are tolerated, others not. When regulation fails to capture the rich variation of creative reuse, it becomes difficult to predict which works will be tolerated. The analysis suggests that as copyright becomes prohibitive, social norms, power and the values of the copyright holder dominate and not law.

M Klang & J Nolin, “Tolerance is law: Remixing Homage, Parodying Plagiarism”, (2012) 9:1 SCRIPTed 7 http://script-ed.org/?p=476

Silly linking terms

Its nothing new that procrastination while attempting to write leads me off in some very strange surfing directions. In my desperation to avoid producing text I clicked on the Legal Issues link on a website and came across this

Links to our site

In creating a link to this site please indicate that we are the source of the information by including an acknowledgement near to/in the link. We would be grateful if you could notify us about the link. Please also ensure that we are not brought into disrepute by the creation of the link; in such cases, we will request the link’s removal (and, if necessary, may bring legal proceedings to seek its removal). Please note that we may move pages on this site or change their address without prior notice.

First off I was interested in their requests (1) Indicate we are the source, (2) Notify us of the link & (3) Don’t bring us into disrepute. While none of these are particularly difficult in any way they seem to indicate a lack of understanding about what a link is.

These are absolutely nowhere near the worst examples: FastCompany wanted you to fax them for permission before creating a link again in 2007 we blogged about a site that absolutely prohibited linking without permission. Here at least you don’t need to ask permission!

Yet, the best part above, is the unfortunate idea that they will take legal actions against any links that bring them into disrepute. Again this is not without precedent: the best must still be the 2001 KPMG song link row.

Finally I enjoyed their informative notice that they may “move pages on this site or change their address without prior notice”. I would really enjoy seeing any site attempt to give prior notice before moving (or removing) a webpage. Would this be considered to be adequate prior notice: “Dear Internet: On the 31 May we intend to delete this page. We are sorry for making you a bit smaller or for any confusion this may create.”?

Linking terms, such as these are odd. They are generally ignored by most users (and most probably unenforceable), if noticed they are definitely bad PR.

The web was never built, and probably never would have been built, if everyone asked and awaited permission. And since the advent of sharing via social media texts like these make even less sens.

The question is why they persist?

Update

TJ McIntyre trumped me via twitter with the news that the Irish always have to be worse 🙂 Irish Charity Told It Needs To Pay A License Fee To Link To A Newspaper Article. Should we laugh or cry?

GikII 2012 Call for papers

My favorite conference is GikII. it wins in weirdness of topic, depth of research and thoroughly nicely people. The call for papers for this year is out now: Check it out here. This is technology & law taken to the edge!

It’s harder than it used to be to write a Call for Papers for GikII, the so-cool-it-hurts blue skies workshop for papers exploring the interstices between law, technology and popular culture. Back in the day,  you could dazzle the noobs just by mentioning past glories like the first paper on Facebook and privacy, Harry Potter and the Surveillance of Doom, regulation of autonomous agents according to the Roman law of slavery, edible technologies and copyright in Dalek knitting patterns. But nowadays we live in a world where we routinely encounter unmanned surveillance drones used to deliver tacos, in commercial asteroid mining with Richard Branson, 3d printers used to create human organs and the fact that Jeremy Hunt still has a job. Still, if any of these or the other many phenomena of the digital age in desperate need of legal attention are digging a tunnel out of your brain, then send us an abstract for the 7th Gikii workshop!  Maybe this year it will be your paper which contributes the seminal GikII meme following in the honoured footsteps of LOLcats, flying penises, and knitted Daleks.

Tolerance is Law

The good news today is that the revision to the article “Tolerance is Law: Remixing Homage Parodying Plagiarism” (written with Jan Nolin) are done and its been sent in to SCRIPTed

As its not been published yet all I can provide is the abstract and this wordle doodle of the text. The good news is that SCRIPTed provides its articles freely and openly online.

 

Three centuries have passed since copyright was developed to stimulate creativity and promote learning. The fundamental principles still apply, despite radical developments in the technology of production and distribution of cultural material. In particular the last decades’ developments and adoption of ICT’s have drastically lowered barriers, which previously prevented entry into the production and distribution side of the cultural marketplace, and led to a widening of the base at which cultural production occurs and is disseminated.  Additionally, digitalization has made it economically and technically feasible for users to appropriate and manipulate earlier works as method of production.

The renegotiation of barriers and the increased number of creators who publish their works has led to an increase in copyright violations and a pressure on copyright legislation. Many of these potential violations are tolerated, in some cases have become common practice, and created social norms. Others have not been so fortunate and the law has been rigidly enforced. This arbitrary application decreases the predictability of law and creates a situation where creation relies on the tolerance of the other copyright holders. This article analyses different cases of reuse that test boundaries of copyright. Some of these are tolerated, others not. When regulation fails to capture the rich variation of creative reuse, it becomes difficult to predict which works will be tolerated. The analysis suggests that as copyright becomes prohibitive, social norms, power and the values of the copyright holder dominate and not law.

 

Death, Internet & Law PhD

This is so cool! Almost makes me want to do a second PhD… More info here.

PhD Studentship in

Law

University of Strathclyde – Faculty of Humanities and Social Sciences – School of Law -– Legal Aspects of Transmission of Digital Assets on Death

The School of Law in the University of Strathclyde invites applications for a PhD studentship which will research the area of how the law regulates the transmission of digital assets on death, including notions of access, control, propertisation, and ownership. These assets might include: Facebook profiles, photos on Flickr, tweets, virtual assets in online game worlds such as Second Life, e-money, blog texts, eBay trading accounts, etc. This is a novel area where the student will be expected to research independently into appropriate areas of private law (eg property, succession, probate, contract) as well as intellectual property law, personality law and privacy law. A back ground in technology law is not essential, nor a technology qualification, but an interest in the information society is probably essential.

Applicants from any jurisdiction (including non-UK EU jurisdictions) are welcomed but English law will most likely form one of the jurisdictions of the study. Applicants should hold a first or upper second class Honours degree or equivalent in an appropriate discipline. A Masters qualification may be helpful. The studentship is funded by the Horizon Digital Economy Research Hub (https://www.horizon.ac.uk/) who are a major interdisciplinary centre for study of the Internet and ubiquitous computing funded by the RCUK Digital Economy programme and based at Nottingham University; the successful candidate will be based within the expanding Centre for Internet Law and Policy at Strathclyde Law School, but will have opportunities to participate in Horizons activities. The student will be supervised by the Director of CILP, Professor Lilian Edwards.

Applicants should submit, by SEPTEMBER 16 2011, a full CV, two academic references, evidence of academic qualifications to date and a covering letter detailing interest in the area of research to:

Janet Riddell (Horizon Digital Economy Scholarship), Graduate School Manager, Faculty of Humanities and Social Science, Room LT205, Livingstone Tower, 26 Richmond Street, Glasgow, G1 1XH

Or by e-mail to: hass-postgrad@strath.ac.uk

Successful applicants will have their fees at home/EU rates only ((sadly)) waived for three years together with an annual maintenance award for three years of £13,590. The scholarship is for one year in the first instance and subject to satisfactory progress, will normally be renewed up to the maximum of a further 2 years.

Visit www.strath.ac.uk/postgrad for general information on postgraduate research study at the University of Strathclyde and http://www.strath.ac.uk/humanities/courses/law/courses/lawbyresearch/ for further information on research degrees in the Law School.

Informal enquiries may be addressed to: lilian.edwards@strath.ac.uk

Call for Papers: GiKII VI

GikII VI, FREEDOM, OPENNESS & PIRACY?
26-28 June 2011
IT University
Göteborg, Sweden

Call for papers
Is GikII a discussion of popular culture through the lens of law – or is it about technology law, spiced with popular culture? For five years and counting, GikII has been a vessel for the leading edge of debate about law, technology and culture, charting a course through the murky waters of our societal uses and abuses of technology.

For 2011, this ship full of seriously playful lawyers will enter for the first time the cold waters of the north (well, further north than Scotland) and enter that land of paradoxes: Sweden. Seen by outsiders as well-organised suicidal Bergman-watching conformists, but also the country that brought you Freedom of Information, ABBA, the Swedish chef, The Pirate Bay and (sort of…) Julian Assange. We offer fine weather, the summer solstice and a fair reception at the friendly harbour of Göteborg.

So come one, come all… Clean your screens, look into the harder discs of your virtual and real lives, and present your peers with your ideas on the meaning of our augmented lives. Confuse us with questions, dazzle us with legal arguments, and impress us with your GikIIness. If you have a paper on (for example) regulation of Technology & Futurama, soft law in World of Warcraft, censoring social media & Confucius, the creative role of piracy on latter day punk or plagiarism among the ancient Egyptians – We are the audience for you (for a taste of past presentations see http://www.law.ed.ac.uk/ahrc/gikii/ ).

Application process

Please send an abstract not exceeding 500 words to Professor Lilian Edwards (Lilian.Edwards@strath.ac.uk) or Dr Mathias Klang (klang@ituniv.se). The deadline for submissions is 15 April 2011. We will try to have them approved and confirmed as soon as possible so that you can organise the necessary travel and accommodation.

Registration

As with previous years, GikII is free of charge, and therefore there are limited spaces available, so please make sure you submit your paper early. Priority is always given to speakers, but there are some limited spaces available for students and non-speakers. Registration will be open shortly at http://www.law.ed.ac.uk/ahrc/gikii/