ABSTRACT
The study of human-computer interaction requires consideration of aspects of interactions with technology that may be outside of the control of both user and designer. One example of when a user's question of "can I do this?" may have an answer beyond technological affordances is that of legal constraints. This paper considers an example of this phenomenon: section 1201 of the Digital Millennium Copyright Act (DMCA) in the United States, which criminalizes circumventing copyright protection such as digital rights management (DRM). The DMCA also includes a triennial policymaking process that considers exemptions to the law to protect "lawful users" from adverse effects. Through an analysis of public comments of support for exemptions, this paper explores the ways in which users see the law as a hindrance to desired uses of technology. This analysis sheds light on users' expectations for rights of use, how these expectations clash with policy, and what this might mean for technology designers. Drawing lessons from the infrastructure problem in HCI, this paper concludes with laying out solutions that can both work within policy constraints, and more importantly, work to change them.
- Mark Ackerman. 2000. The Intellectual Challenge of CSCW: The Gap Between Social Requirements and Technical Feasibility. Human-Computer Interaction 15, (sep 2000), 179--203.Google Scholar
- Todd C Adelmann. 2010. Are Your Bits Worn Out: The DMCA, Replacement Parts, and Forced Repeat Software Purchases. Journal on Telecommunications and High Technology Law 8 (2010), 185--214.Google Scholar
- Nate Anderson. 2009. Landmark Study: DRM Truly Does Make Pirates Out of Us All. (2009). https://arstechnica.com/tech-policy/2009/05/ landmark-study-drm-truly-does-make-pirates-out-of-us-all/Google Scholar
- Krzyztof Bebenek. 2016. Strong Wills, Weak Locks: Consumer Expectations and the DMCA Anticircumvention Regime. Berkeley Technology Law Journal 26, 3 (2016), 1457--1488.Google Scholar
- Marek Bell, Matthew Chalmers, Louise Barkhuus, Malcolm Hall, Scott Sherwood, Paul Tennent, Barry Brown, Duncan Rowland, Steve Benford, Mauricio Capra, and others. 2006. Interweaving mobile games with everyday life. In Proceedings of the ACM CHI Conference on Human Factors in Computing Systems. ACM, 417--426.Google ScholarDigital Library
- Berco Beute. 2005. Mobile DRM - Usability Out the Door? Telematics and Informatics 22, 1--2 (2005), 83--96.Google ScholarDigital Library
- Alan F. Blackwell. 2006. The reification of metaphor as a design tool. ACM Transactions on Computer-Human Interaction 13, 4 (2006), 490--530.Google ScholarDigital Library
- Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative Research in Psychology 3, 2 (apr 2006), 77--101.Google ScholarCross Ref
- Joyram Chakraborty and Nirali M Chakraborty. 2015. Public policy and violence in video games. interactions 22, 1 (2015), 64--67.Google Scholar
- Karen Temple Claggett. 2017. Section 1201 of Title 17: A Report of the Register of Copyrights. Technical Report. United States Copyright Office. https://www.copyright. gov/policy/1201/section-1201-full-report.pdfGoogle Scholar
- W. Keith Edwards, Mark W. Newman, and Erika Shehan Poole. 2010. The Infrastructure Problem in HCI. In Proceedings of the ACM CHI Conference on Human Factors in Computing Systems. Atlanta, GA, 423--432.Google ScholarDigital Library
- Casey Fiesler and Amy S. Bruckman. 2014. Remixers' Understandings of Fair Use Online. In Proceedings of the ACM CSCW Conference on Computer-Supported Cooperative Work & Social Computing. ACM Press, Baltimore, MD, 1023--1032.Google Scholar
- Casey Fiesler, Jessica Feuston, and Amy S. Bruckman. 2015. Understanding Copyright Law in Online Creative Communities. In Proceedings of the ACM CSCW Conference on Computer-Supported Cooperative Work & Social Computing. Vancouver, BC, Canada, 116--129.Google Scholar
- Casey Fiesler, Cliff Lampe, and Amy S. Bruckman. 2016. Reality and Perception of Copyright Terms of Service for Online Content Creation. In Proceedings of the ACM CSCW Conference on Computer-Supported Cooperative Work & Social Computing. 1450--1461.Google Scholar
- Casey Fiesler and Nicholas Proferes. 2018. "Participant" Perceptions of Twitter Research Ethics. Social Media+ Society 4, 1 (2018), 2056305118763366.Google Scholar
- Jon Garon. 2008. What If DRM Fails?: Seeking Patronage in the iWasteland and the Virtual O. Michigan State Law Review (2008), 103--151.Google Scholar
- Urs Gasser and John Palfrey. 2007. Case Study: DRM-protected Music Interoperability and e-Innovation. Technical Report. Berkman Center Publication Series. 1--61 pages.Google Scholar
- Anthony G. Giannoumi, Molly Land, Wondwossen M. Beyene, and Peter Blanck. 2017. Web Accessibility and Technology Protection Measures: Harmonizing the Rights of Persons with Cognitive Disabilities and Copyright Protections on the Web. Cyberpsychology 11, 1 (2017).Google Scholar
- Dan Goldstein, Eve Hill, Jonathan Lazar, David Lepofsky, Alice Siempelkamp, and Anne Taylor. 2011. Increasing Legal Requirements for Interface Accessibility. In Extended Abstracts of the ACM CHI Conference on Human Factors in Computing Systems. Vancouver, BC, Canada, 745--748.Google Scholar
- James Grimmelmann. 2005. Regulation By Software. Yale Law Journal 114, 7 (2005), 1719--1758.Google Scholar
- Alan Hedge. 2013. Ergonomics and US public policy. interactions 20, 1 (2013), 64--67.Google Scholar
- Bill D. Herman and Oscar H. Gandy. 2006. Catch 2101: A Legislative History and Content Analysis of the DMCA Exemption Proceedings. Cardozo Arts & Entertainment Law Journal 24 (2006), 121--190.Google Scholar
- Philip Inglesant and M Angela Sasse. 2007. Usability is the best policy: public policy and the lived experience of transport systems in London. In Proceedings of the 21st British HCI Group Annual Conference on People and Computers: HCI... but not as we know it-Volume 1. British Computer Society, 35--44.Google ScholarCross Ref
- Steven J Jackson, Tarleton Gillespie, and Sandy Payette. 2014. The Policy Knot: Re-integrating Policy , Practice and Design in CSCW Studies of Social Computing. In Proceedings of the ACM CSCW Conference on Computer-Supported Cooperative Work & Social Computing. Baltimore, MD, 588--602.Google ScholarDigital Library
- Christopher Kelty. 2005. Trust Among the Algorithms: Ownership, Identity, and the Collaborative Stewardship of Information. In CODE: Collaborative Ownership and the Digital Economy. 127--154.Google Scholar
- Jonathan Lazar. 2014. Engaging in Information Science Research That Informs Public Policy. The Library Quarterly: Information, Community, Policy 84, 4 (2014), 451--459.Google Scholar
- Jonathan Lazar, Paul T Jaeger, Anthony Adams, Anthony Angelozzi, John Manohar, James Marciniak, Justin Murphy, Pouria Norasteh, Charles Olsen, Evangelos Poneres, and others. 2010. Up in the air: Are airlines following the new DOT rules on equal pricing for people with disabilities when websites are inaccessible? Government Information Quarterly 27, 4 (2010), 329--336.Google ScholarCross Ref
- Lawrence Lessig. 2006. Code: And other Laws of Cyberspace, Version 2.0. Basic Books, New York, NY.Google ScholarDigital Library
- Ewa Luger, Lachlan Urquhart, Tom Rodden, and Michael Golembewski. 2015. Playing the Legal Card: Using Ideation Cards to Raise Data Protection Issues within the Design Process. In Proceedings of the ACM CHI Conference on Human Factors in Computing Systems. Seoul, Korea, 457--466.Google ScholarDigital Library
- Jennifer A Nekuda Malik. 2017. Scientists initiate grassroots efforts to show importance of STEM to US government. MRS Bulletin 42, 8 (2017), 554--556.Google ScholarCross Ref
- Corinne L. Miller. 2008. The Video Game Industry and Video Game Culture Dichotomy: Reconciling Gaming Culture Norms with the Anti-Circumvention Measures of the DMCA. Texas Intellectual Property Law Journal 16, 453--480 (2008).Google Scholar
- Deirde K. Mulligan, John Han, and Aaron J. Burstein. 2003. How DRM-based Content Delivery Systems Disrupt Expectations of Personal uUe. Proceedings of the ACM Workshop on Digital Rights Management (2003), 77--89.Google ScholarDigital Library
- William Odom, Abi Sellen, Richard Harper, and Eno Thereska. 2012. Lost in Translation: Understanding the Possession of Digital Things in the Cloud. In Proceedings of the ACM CHI Conference on Human Factors in Computing Systems. Austin, TX, 781--790.Google ScholarDigital Library
- Stephen J. Payne. 2003. Users' Mental Models: The Very Ideas. In HCI Models, Theories, and Frameworks: Toward a Multidisciplinary Science, John M. Carroll (Ed.). Morgan Kaufmann Publishers, San Francisco, CA, 135--156.Google Scholar
- R. Anthony Reese. 2003. The First Sale Doctrine in the Era of Digital Networks. Boston University Law Review 44 (2003), 577--652.Google Scholar
- P Samuelson. 1989. Protecting User Interfaces through Copyright: The Debate. Proceedings of the ACM CHI Conference on Human Factors in Computing Systems (1989), 97--104.Google ScholarDigital Library
- Pamela Samuelson. 2016a. Freedom to Tinker. Theoretical Inquiries in Law 17, 2 (2016), 563--600.Google ScholarCross Ref
- Pamela Samuelson. 2016b. New Exemptions to Anti-Circumvention Rules. Commun. ACM 59, 3 (2016), 24--26.Google ScholarDigital Library
- Molly Sauter. 2014. The Coming Swarm: DDOS Actions, Hacktivism, and Civil Disobedience on the Internet. Bloomsbury Publishing, New York, NY.Google Scholar
- Truan Savage. 2014. Avoiding the Next Napster: Copyright Infringement and Investor Liability in the Age of User Generated Content. Michigan Business & Entrepreneurial Law Review 4, 2 (2014), 261--292.Google Scholar
- Priti Trivedi. 2010. Writing The Wrong: What The E-Book Industry Can Learn From Digital Music's Mistakes With DRM. Journal of Law and Policy 18, 2 (2010), 925--967.Google Scholar
- Lachlan Urquhart and Tom Rodden. 2017. New directions in information technology law: learning from human?computer interaction. International Review of Law, Computers and Technology 31, 2 (2017), 150--169.Google ScholarDigital Library
- Jessica Vitak, Katie Shilton, and Z. Ashktorab. 2016. Beyond the Belmont Principles: Ethical Challenges, Practices, and Beliefs in the Online Data Research Community. In Proceedings of the ACM CSCW Conference on Computer Supported Cooperative Work & Social Computing. San Franciso, CA, 941--953.Google Scholar
- Rick Wash. 2010. Folk Models of Home Computer Security. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS). Redmond, WA, 1--16.Google ScholarDigital Library
- Katherine Weigle. 2017. How the Digital Millennium Copyright Act Affects Cybersecurity. American University Intellectual Property Brief 9, 1 (2017), 1--24.Google Scholar
- Langdon Winner. 1986. Do Artifacts Have Politics? In The Whale and the Reactor: A Search for Limits in the Age of High Technology. University of Chicago Press, Chicago, IL, 19--39.Google Scholar
Index Terms
- Lawful Users: Copyright Circumvention and Legal Constraints on Technology Use
Recommendations
Lessons in Copyright Activism: K-12 Education and the DMCA 1201 Exemption Rulemaking Process
Digital learning is being transformed by changes in copyright law. This article discusses the author's personal journey as a copyright education activist through two rounds of rulemaking proceedings before the Copyright Office concerning the anti-...
The Bangladesh Justice Audit
ICEGOV '17: Proceedings of the 10th International Conference on Theory and Practice of Electronic GovernanceThe Bangladesh Constitution guarantees human rights, freedom, equality, justice and rule of law for all citizens. Article 33(1) ensures the rights for each citizen to legal support and article 35(3) affirms that every person accused of a criminal ...
Private use as fair use: is it fair?
Selected papers from CEPE 2007: The Seventh International Conference on Computer Ethics -- philosophical enquiryThe age of digital technology has introduced new complications into the issues of fair and private use of copyrighted material. In fact, the question of private use of another's work has been transformed from a side issue in intellectual property ...
Comments