As we saw in Chapter 7, institutional and technological changes driven by the perceived imperatives of piracy and security are reshaping the networked information environment, leading to the emergence of architectures of control. Efforts to develop a framework for determining whether and how law should concern itself with these developments have been only partly successful, for reasons that ref...