Table of Contents

Executive Summary

Part I: Trespass in Cyberspace

1    Introduction

2    Overview of Real Space Trespass
      2.1    Common Law Trespass Actions
      2.2    Statuatory Trespass Actions
      2.3    Trespass Case Law

3    Overview of Cyberspace Trespass
      3.1    Computer Fraud and Abuse Act of 1984
      3.2    State Statutes Regarding Computer Crime and Trespass

4    Technical and Legal Discussion of Cyberspace Cases
      4.1    Element I: Intent
      4.2    Element II: Entry
      4.3    Element III: Property
      4.4    Element IV: Permission

5    Technical and Legal Discussion of Potential Trespass in Cyberspace
      5.1    Spam Email
      5.2    Active Email
      5.3    Web Page Hack
      5.4    Breaking Into a Personal Computer

6    Current Strategies for Dealing With Trespass in Cyberspace
      6.1    Technology
      6.2    Legislation and Government
      6.3    Social Norms and Markets

7    The Metaphor of Trespass Breaks Down
      7.1    Problems of Trespass in Cyberspace
      7.2    Should Trespass Be Applied to Cyberspace?

Part II: The Future of Trespass and Property in Cyberspace

 8    Goals
        8.1      Internet
        8.2      Access

 9    Guiding Metaphors
        9.1    Web Hacking as Exploring a Street of Doors
        9.2    Spam as Direct Marketing
        9.3    The Usefulness and Limits of Metaphors
        9.4    Conceptualization: A More Helpful Approach

10    Definitions

11    Proposed Legal and Technical Architecture

12    Evaluation

13    Projections

14    Conclusion
 

Appendices

Appendix A    Credit of Authors
Appendix B    Acknowledgements
Appendix C    References
Appendix D    Executive Summary