Professional Documents
Culture Documents
Ebook Who Owns Knowledge Knowledge and The Law 1St Edition Nico Stehr Bernd Weiler Online PDF All Chapter
Ebook Who Owns Knowledge Knowledge and The Law 1St Edition Nico Stehr Bernd Weiler Online PDF All Chapter
https://ebookmeta.com/product/who-owns-outer-space-international-
law-astrophysics-and-the-sustainable-development-of-space-1st-
edition-michael-byers/
https://ebookmeta.com/product/who-owns-haiti-people-power-and-
sovereignty-1st-edition-robert-maguire/
https://ebookmeta.com/product/basic-knowledge-and-conditions-on-
knowledge-1st-edition-mark-mcbride/
https://ebookmeta.com/product/who-owns-the-news-a-history-of-
copyright-1st-edition-will-slauter/
Copyright and Cartography: History, Law, and the
Circulation of Geographical Knowledge 1st Edition
Isabella Alexander
https://ebookmeta.com/product/copyright-and-cartography-history-
law-and-the-circulation-of-geographical-knowledge-1st-edition-
isabella-alexander/
https://ebookmeta.com/product/patent-law-and-women-tackling-
gender-bias-in-knowledge-governance-1st-edition-lai/
https://ebookmeta.com/product/the-right-to-housing-in-law-and-
society-1st-edition-nico-moons/
https://ebookmeta.com/product/the-knowledge-cafe-create-an-
environment-for-successful-knowledge-management-1st-edition-
benjamin-c-anyacho/
This Page
Intentionally
Left Blank
Transaction Publishers
New Brunswick (U.S.A.) and London (U.K.)
Copyright © 2008 by Transaction Publishers, New Brunswick, New Â�Jersey.
All rights reserved under International and Pan-American Copyright
Conventions. No part of this book may be reproduced or transmitted in any form
or by any means, electronic or mechanical, including photocopy, recording, or
any information storage and retrieval system, without prior permission in writing
from the publisher. All inquiries should be addressed to Transaction Publishers,
Rutgers—The State University of New Jersey, 35 Berrue Circle, Piscataway,
New Jersey 08854-8042. www.transactionpub.com
This book is printed on acid-free paper that meets the American National
Standard for Permanence of Paper for Printed Library Materials.
K487.S3W46 2008
340'.11—dc22 2007037421
Contents
Preface vii
Nico Stehr
Introduction: Knowledge and the Law: Can Knowledge be Made Just? 1
Nico Stehr, Christoph Henning and Bernd Weiler
Part 1
The Social Contexts of Knowledge and the Law
Introduction to Part 1 17
Steve Fuller
Warwick University
1. The Law and Economics of Rights in Valuable Information 25
Edmund W. Kitch
University of Virginia, USA
2. Scientific Norms, Legal Facts, and the Politics of Knowledge 67
Alfons Bora
University of Bielefeld, Germany
3. Is a Just System also Fair? Traversing the Domain of Knowledge,
Institutions, Culture, and Ethics 87
Anil K. Gupta
Indian Institute of Management, Vastrapur, India
Part 2
Major Social Institutions, Knowledge and the Law
Contributors 315
Index 321
Preface
Nico Stehr
The age of industrialization approaches its end. The structures of the traditional
social order are losing their meaning. Its elements, such as work and property,
are being overwritten by a new social order already visible on the horizon. The
bases of this social order rest on knowledge — as much on everyday knowledge
as, increasingly, on scientific knowledge. As the capacity to take action, as
the possibility to “get things rolling,” knowledge is not only constitutive for
economic activities, production and consumption. It is also the basis of any
communication between human beings, and represents the means of organizing
and integrating modern global society. It is meaningful, therefore, to describe
this society as a knowledge society. That is to say, we mold reality by virtue of
our knowledge.
While industrial societies give way to knowledge societies, the institutional
architecture of modern societies, in terms of basic social structure — in the
form of major social institutions, the political system, civic society, the law,
science, the economy and religion, to mention the most formidable institutions
— remains part of the basic structural arrangement of society. But the relations
among major social institutions change. The growing importance of knowl-
edge for social institutions is unevenly distributed among them. Yet all social
institutions have to cope with and respond to the growing societal significance
of knowledge. This is certainly also the case for the legal system.
The major interests of this anthology center on the ways in which the legal
system deals with knowledge: in light of its enhanced significance for oth-
er social institutions, for example, especially the state, civil society and the
economy; but also for science itself as the “author” of much of the additional
knowledge that is the motor of modern social change and social problems.
More concretely, two of the apparently incompatible, and in this context
competing, but fundamental perspectives on the role of knowledge between
the legal and economic systems are: (1) The notion that the most important
basis of new knowledge is available knowledge. But in so far as access to
parts of the existing knowledge base is protected (e.g. through patents, copy-
right, etc.), the growth of knowledge is impeded. (2) If new knowledge is not
vii
viii Who Owns Knowledge
1
2 Who Owns Knowledge?
In a recent decision (June 27, 2005), the US Supreme Court ruled in favor
of some major film and music companies. This means that Internet platforms
Introduction: Knowledge and the Law 3
such as Morpheus and Grokster, which offer tools that could be used to distrib-
ute music and films for free, are endangered1; or, put differently, that the law
protects the music industry from losses through piracy. But how and why did
the results of creative activities come into the purview of the legal system in
the first place? And how, for example, did creators, imitators and consumers of
“knowledge” respond then and now to the establishment and the enforcement
of property rights attached to their creations?
In the 1980s, the video player was allowed onto the market even though it
enabled users to produce copies of video films. Two decades later, major com-
panies seem to have a much higher impact on our conceptions of justice, or at
least to have such an influence on the legal system. In a current Supreme Court
case (Laboratory Corp. vs. Metabolite), a diagnostic blood test is claimed as
“property” by two different parties — companies who claim royalties due to
different patents (Andrews, 2006:B20; Kintisch, 2006:946ff.). What is at stake
here? As most theories mainly focus on the inventor (“incentives”) and the
consumer (the “public good”), it is important to distinguish the relevant stake-
holders more carefully. There are not only these two, but at least four different
parties involved.2
First, there is the artist or inventor as the initial producer of creative content.
Second, there is the industry that promotes the artist and profits from sales of
records and movies. Sometimes there are intermediary traders between them,
buying and selling patents or copyrights, which makes the issue even more
complicated. Third, we have the users who buy and consume these products.
And finally, we have associations of users who share these products amongst
themselves. It is important to see that in the case in question it was the second
party against the fourth, not — as standard economic theory often portrays it
— the first against the third party. Businesses want to “force” users to buy cop-
ies from them, and not to exchange copies amongst themselves. The question
is whether they have a right to do so, and on what grounds. In other words:
How can knowledge become a property that is protected by law? And what are
the varying interests of the different actors involved?
In some cases, as in the case of the rock band “Metallica” against the plat-
form “Napster,” it is the artists themselves suing the Internet platforms. This
touches the very notion of property: usually an owner can use his property in
whatever way he likes. But in this case, there are different dimensions of prop-
erty: on the one hand the material property of the product, the single product,
on the other hand the intellectual property, or the prototype, which usually
belongs to the industry or to the artist.
The reasons for conflicts like these are manifold. Some of them have to
be looked for in the technological changes of the last decades. Usually, mate-
rial property means that if somebody owns something, nobody else can physi-
cally use the same thing at the same time. Therefore every second user has to
buy another copy of the good in question — its use is exclusive. In terms of
many knowledge-based products, this social relation between consumers has
changed. It is technically possible to move the frontiers: goods such as music
or films are becoming intangibles. Their use is no longer exclusive if you can
reproduce them on your computer and distribute them through the Internet. Of
course this conflicts with the interests of the industries that had formerly mo-
nopolized the distribution of these products, both technically and legally. Now
that the technical matters have changed, it is a contested area whether the law
should try and suppress these possibilities to the benefit of the companies and
artists (which is what has happened in most cases so far); or whether it should
allow for this non-market distribution to the benefit of customers. In any case,
these conflicting interests, which are induced by knowledge, call for a new
legal framework.
We find a similar situation in the scientific community. Usually supported
by state funds, researchers did not have to focus on the business side of sci-
ence, which was even considered to be against the ethic of science, for example
in Robert Merton’s well-known norms of science. A “capitalization of knowl-
edge” was called for only when universities and researches had to organize
their own funding, due to the privatization of the system of education.3 Now
that scientists depend more and more on private funding, they have a greater
incentive to “sell” and “market” their products (which clearly was the motive
for Korean Woo-Suk Hwang to publish his faked stem-cell research in Science
and Nature; Wade, 2006).4
There is a complicated relation between science, economic progress, and
the law. Early on, the American Constitution granted a limited protection of
intellectual property:
Congress shall have power . . . to promote the progress of science and useful arts,
by securing for limited times to authors and inventors the exclusive right to their
respective writings and discoveries. (Constitution of the United States of America,
Article 1, Section 8; see www.constitution.org/constit_.htm)
The main argument is the economic incentive for inventors to invent, for cre-
ators to be creative, and for scientists to do research (cf. Scotchmer, 2004). This
is an argument concerning the action tendencies of individuals; yet the assump-
tion of a “homo economicus” is currently contested even in economics itself.
For this reason some — as, for example, the open-source movement (Weber,
2004) — call the incentive theory of patents into question, arguing that creativ-
ity is an end in itself and not an economic means. Given that artists and scien-
tists are publicly funded, they would hardly bother to “capitalize” their knowl-
edge — yet exactly this is what is not given in the real world any longer.
Moreover, the steady growth of the economy — and related to this, of the
public welfare in general — depends on constant innovation. This is a macro-
argument, not about individual behavior, but rather about the behavior of com-
plex social systems. Often it is simply assumed that patents are the best way to
spread new productive technologies (which can to a certain extent simply be
called “knowledge”) across the industries. Though this is a reasonable assump-
tion, it remains an empirical question, and recent research shows that the “leak-
ing” of science through patents is actually slower than the standard distribution
of knowledge via the scientific institutions: “the priority publication system in
science appears to distribute information more rapidly than the patent system”
(Adams, Clemmons, and Stephan, 2006). Some have even argued that — due
to corporate strategic behavior, legal bureaucratization and other reasons — at
this very moment, the US Patent System is even “endangering Innovation”
(Jaffe and Lerner, 2004).
In all modern societies, we now find elaborate drug regulations and correspond-
ing agencies that register, test, control, or permit pharmaceutical substances to
enter the market as legalized drugs. Until a few decades ago, decisions about
the production and marketing of chemicals as drugs were made by corpora-
tions, by individual pharmacists or by physicians (Henk, Henk, and de Vries,
1987:243–259).5 As scientific knowledge is “applied,” it becomes embedded in
social contexts external to science. As a part of such embeddedness, knowledge
is subject to the kinds of (latent) control mechanisms and social constraints
found in and constitutive for these contexts. It simply cannot escape the selec-
tivity that issues from such external contexts, even if only in efforts designed to
generate trust toward a certain artifact or solution offered by novel knowledge.
The whole area of national and international intellectual property and copy-
right protection is another arena in which legislation to control the deploy-
5 A discussion and analysis of the grants economy may be found in Boulding
(1981).
6 Who Owns Knowledge?
together with demands to regulate and adjudicate the specific utilization of and
access to knowledge.
The dissemination and application of knowledge do not occur in the imagi-
nary world of perfect, unimpeded competition and equality of opportunities.
As a result, a politics of knowledge must confront the consequences of the
social distribution of knowledge, especially the stratified access to and utiliza-
tion of knowledge.6 It remains an open question, for example, to what extent
dispossession of knowledge generates social conflicts, and in what specific
ways such struggles manifest themselves. Several decades ago, Daniel Bell
(1964:49) warned that right-wing extremism may “benefit” from any exclusion
of social groups from access to and acquisition of technical expertise.
However, such predictions of the intellectual, social, and economic gaps
sustained by knowledge overestimate the extent to which knowledge and its
use can in fact be controlled. It will be increasingly difficult to control knowl-
edge, in spite of the many efforts that will undoubtedly be made. Efforts to
control knowledge encounter contradictions. Sustaining economic growth, for
example, requires an expansion of knowledge. And knowledge that expands
rapidly is difficult to control. The expansion of knowledge enlarges the seg-
ment of knowledge-based occupations. Knowledge expansion and knowledge
dissemination rely on conditions that are themselves inimical to control. None-
theless, as we have observed, the typically expressed fear that an inevitable
outcome of such developments is the greater ease with which knowledge (and
information) can be monopolized and effectively employed for repressive
(even totalitarian) purposes, or even as a tool of maintaining the benign status
quo, had been a widely accepted premise of discussion of the social control
of knowledge, even before Orwell’s classic book on the subject. What exactly
nourishes this point of view? What is the basis for the widespread conviction
that knowledge and technical artifacts are relatively easy to control, and that
access to knowledge can be easily denied (Weingart and Pansegrau, 1999)?
Modern economies are mainly based on the market system, as opposed to other
forms of allocation like planning, gift exchange, or grants.7 But a market is nei-
ther a purely self-organizing entity, as it is often argued in mainstream textbook
economics, nor is it a universal structure that is simply given as such. There is a
broad variety of concrete markets. First, there are different markets according
to the goods traded and the services exchanged: the financial market operates
6 For a more complex approach, see Kitch (2000:1727–1741).
7 For the history of the market system, see Karl Polanyi (1944); Marcel Mauss
([1950] 1990); Belshaw (1965).
8 Who Owns Knowledge?
differently from the market for raw materials, the market for industrial goods,
the one for services or — last but not least — the labor market. Secondly, as the
property-rights approach stresses, every market depends on a legal framework.
Different countries or supranational institutions may very well “choose” quite
different institutional frames, and this is bound to have a significant impact on
the nature of markets.8
In the recent past, another market form has acquired greater and greater
economic significance; namely, the market for knowledge-based products
and services, often referred to as the foundation and the evolution of the
“knowledge economy” (see, for example, Stehr, 2002). Though more a grad-
ual leap than a qualitative inception, knowledge-based means of production,
knowledge-related products such as computer programs, new productive
technologies like nano- and biotechnology, pharmaceutical products — but
also films, CDs, and knowledge contingent services — continue to gain ever
higher market shares. The social sciences are challenged to ask how the exist-
ing legal frames adapt to these evolving markets, and how the legal system
might cope in the future in order to inject a measure of fairness and equity
into the distribution of knowledge, as well as into products and services em-
bedded in knowledge.
These questions are difficult ones. Some of the unique and salient attributes
of knowledge-based products and services are different from other commodi-
ties exchanged in the marketplace: “knowledge-based products are intangible,
non-excludable and non-rivalrous goods” (Cowan and Harrison, 2001; Cornes
and Sandler, 1986; Romer, 1993:345–399). Once dispatched to the market,
knowledge, it is argued, does not need to be acquired again and again; it is
freely available to everyone. It becomes a “public good.” The use by one agent
does not preclude its use by another agent (non-excludability), and there is no
competition when it comes to its use; or it is difficult, if not impossible, for the
creator of the claim, for example, to preclude others from using it (rivalry).
That is, if A sells such information/knowledge to B, it is unlikely that B will
enjoy the exclusive use of the information purchased. It is also unlikely that A
and B will compete for access to the general stock of knowledge.
In addition, the material base in which information is inscribed, and which
thus restricts in some way the non-rivalrous or non-excludable nature of
knowledge, may affect these relations and transactions involving knowledge/
information. For economists, these attributes of knowledge/information make
it a prototypical example of a public good. The inability to appropriate or com-
mand all the returns on knowledge is presumably a general disincentive to
8 For a public choice approach, see James Buchanan (1968). For the sensitivity of
markets to non-economic motives, see Nico Stehr, Christoph Henning, and Bernd
Weiler (2005). Also, Hernando de Soto (2000).
Introduction: Knowledge and the Law 9
the private sector, and therefore to the private fabrication as well as supply
of knowledge. Given these special characteristics of knowledge, the World
Bank concludes that “public action is sometimes required to provide the right
incentive for its creation and dissemination by the private sector, as well as to
directly create and disseminate knowledge when the market fails to provide
enough” (World Bank, 1999:17).
Yet exactly this causes a dilemma: Because capitalistic markets are not
need-driven, but rather profit-oriented, this raises the question of how prof-
its can be made in the case of non-excludable and non-rivalrous goods and
services. Prima facie there are two possibilities. Either the initial price of a
knowledge product has to be so high that the first sold product covers not only
the investments into research and development as well as the production costs,
but also a “decent” profit — and in a way, this is what patent law does. But the
economic disadvantage in this case is that demand and supply may not match:
who is willing to pay such a high price, especially when everybody knows that
the second (third, etc.) user will get access to the product for free? Therefore
the second possibility is to sell its products for “normal” prices, but to try and
restrict the access to the product in question instead, even after it is sold. This
is the aim of copyright: a user may read the book she bought, but as long as it
is protected by copyright she must not copy it. But this would mean a serious
obstacle to the dissemination of new technologies.
This is a classical dilemma: on the one side there is the immediate public
welfare associated with a new knowledge-based good: if access to this good is
restricted — technologically, by law, by monetary mechanisms, or all — the
public welfare (or its “social value,” as Cowan and Harrison put it) is dimin-
ished, as only a few producers or consumers have the right to use the new
technology or the new product, or the price of these products rises due to the
addition of royalties on top of production prices. This may tighten social in-
equality and lead to monopolies that may reduce the total market outcome (net
productivity).9 On the other hand, if access to the knowledge-based products is
not restricted, the incentive to produce them in the first place may be in ques-
tion, as it is very unlikely to make a profit. At least, this is how some authors
view the matter.10
But this only raises new questions. Is it really a primarily monetary interest
that drives scientists and artists? One could easily imagine that they might be
willing to distribute their products freely, because they — in most cases no
9 For this argument see, for example, Peter Drahos (1996); R.V. Bettig (1996); Law-
rence Lessig (2005b).
10 See, for example, A.D. Moore (2001). As an overview to these discussions see Pe-
ter S. Menell (1999); Daniel Andriessen (2004); and, for German readers: Brigitte
Hilmer (2004:708–792).
10 Who Owns Knowledge?
References
Adams, James D., J. Roger Clemmons, and Paula E. Stephan (2006) “How rapidly does
Science leak out?” National Bureau of Economic Research Working Paper Series
11997 (January 2006), online at: www.nber.org/papers/w11997.
Allee, Verna (1997) The Knowledge Evolution: Expanding Organizational Intelligence.
Boston: Butterworth-Heinemann.
Andersen, Birgitte and Sue Konzelmann (2005) “In Search of a Useful Theory of the
Productive Potential of Intellectual Property Rights,” Oxford Intellectual Property
Research Centre Working Paper Series 5, May 2005, online at www.oiprc.ox.ac.
uk/EJWP0505.html.
Andrews, Lori B. (2006) “The Patent Office as Thought Police.” The Chronicle Review
52(24): B20.
Andriessen, Daniel (2004) Making Sense of Intellectual Capital. Amsterdam: Butter-
worth Heinemann.
Bell, Daniel (1968) “The Measurement of Knowledge and Technology.” Pp. 145–246
in Eleanor B. Sheldon and Wilbert E. Moore, eds., Indicators of Social Change:
Concepts and Measurements. Hartford, CT: Russell Sage Foundation.
———(1964) “The Post-industrial Society.” In Eli Ginzberg, ed., Technology and Social
Change. New York: Columbia University Press.
Belshaw, Cyril S. (1965) Traditional Exchange and Modern Markets. Englewood
Cliffs, NJ: Prentice-Hall.
Bettig, R.V. (1996) Copyrighting Culture: The Political Economy of Intellectual Prop-
erty. Boulder: Westview Press.
12 See, for example, Bollier (2002). The term “enclosure” is meant to indicate that
there is a parallel to earlier processes that Karl Marx once called “primitive accu-
mulation.”
12 Who Owns Knowledge?
Bollier, David (2002) “Reclaiming the Commons: Why We Need to Protect our Public
Resources from Private Encroachment.” Boston Review (Summer).
Boulding, Kenneth (1981) A Preface to Grants Economics: The Economy of Love and
Fear. New York: Praeger.
Buchanan, James (1968) The Demand and Supply of Public Goods. Chicago: Rand
McNally & Company.
Burk, Dan L. and Mark A. Lemley (2003) “Policy Levers in Patent Law.” Virginia Law
Review 89(7): 1575–1696.
Cornes, Richard and Todd Sandler (1986) The Theory of Externalities, Public Goods,
and Club Goods. Cambridge: Cambridge University Press.
Cowan, Robin and Elad Harrison (2001) “Intellectual Property Rights in a Knowledge-
based Economy.” MERIT-Infonomics Research Memorandum Series 2001-027,
Maastricht Economic Research Institute on Innovation and Technology.
Drahos, Peter (1996) A Philosophy of Intellectual Property. Aldershot: Dartmouth.
Dworkins, Gerald (1997) “Should there be Property Rights in Genes?” Philosophical
Transactions: Biological Sciences 352(1357): 1077–1086.
Etkowitz, Henry and Andrew Webster (1995) “Science as Intellectual Capital.” Pp.
480–505 in Sheila Jasanoff, ed., Handbook of Science and Technology Studies.
Thousand Oaks, CA: Sage.
Hayek, Friedrich August v. (1969) “Competition as a Discovery Procedure,” available
online at http://www.mises.org/journals/qjae/pdf/qjae5_3_3.pdf.
Henk, J.H.W. Bodewitz, Buurma Henk, and Gerard H. de Vries (1987) “Regulatory Sci-
ence and the Social Management of Trust in Medicine.” Pp. 243–259 in Wiebke
E. Bijker, Thomas P. Hughes, and Trevor Pinch, eds., The Social Construction of
Technological Systems: New Directions in the Sociology and History of Technol-
ogy. Cambridge, MA: MIT Press.
Hilmer, Brigitte, ed. (2004) “Schwerpunkt: Geistiges Eigentum.” Deutsche Zeitschrift
für Philosophie 52(5):708–792.
Jaffe, Adam B. and Jost Lerner (2004) Innovation and Its Discontents: How Our Broken
Patent System is Endangering Innovation and Progress, and What to Do About It.
Princeton, NJ: Princeton University Press.
Kinsella, N. Stephan (2001) “Against Intellectual Property.” Journal of Libertarian
Studies 15(2):1–53.
Kintisch, Eli (2006) “What Good is a Patent? Supreme Court May Suggest an Answer.”
Science 311:946 ff.
Kitch, Edmund W. (2000) “Elementary and Persistent Errors in the Economic Analysis
of Intellectual Property.” Vanderbilt Law Review 53(6):1727–1741.
Klein, Naomi (2001) “Reclaiming the Commons.” New Left Review 9:81–89.
Koo, Bonwoo, Carol Nottenburg, and Philip G. Pardey (2004) “Plants and Intellectual
Property: An International Appraisal.” Science 306:1295–1297.
Lessig, Lawrence (2005a) “Innovation Commons.” Pp. 227–240 in Nico Stehr, ed., The
Governance of Knowledge. New Brunswick, NJ: Transaction.
——— (2005b) Free Culture: The Nature and Future of Creativity. London: Penguin
Books.
Mauss, Marcel ([1950] 1990) The Gift: The Form and Reason for Exchange in Archaic
Societies, trans. W.D. Halls. London: Routledge.
Menell, Peter S. (1999) “Intellectual Property: General Theories.” In Boudewijn
Bouckaert and Gerrit De Geest, eds., Encyclopedia of Law and Economics. North-
hampton, MA: Edward Elgar Publishing Inc.
Introduction: Knowledge and the Law 13
Steve Fuller
The papers in the first part of Who Owns Knowledge? are organized from the
least to the most embodied conceptions of knowledge countenanced in con-
temporary social science. The first paper, a reprinted classic by Edmund Kitch,
epitomizes a widely held view among economists, and increasingly lawyers,
that knowledge escapes any easy characterization in terms of the qualities of
ordinary privately owned material goods. Next comes Alfons Bora, a soci-
ologist in the tradition of Niklas Luhmann, who treats the body of scientific
knowledge as constituting one of several institutional sectors in the modern
social system. Finally, Anil Gupta, an expert in Indian agricultural policy, re-
gards all knowledge as derivative on people’s modes of being. The commercial
extraction of such knowledge potentially undermines their integrity as human
beings. We shall briefly review the issues that these conceptions raise.
Kitch’s pioneering attempt to integrate the legal and economic dimensions
of knowledge production is very much a product of its time and place: 1980,
University of Chicago. Back then and there Richard Posner was spearheading
the “law and economics” movement, which subsequently gained considerable
recognition, perhaps even more in economics than law itself. A legacy of this
movement has been the economic justification of institutions on grounds of
minimizing transaction costs. It is clear that Kitch partly has this issue in mind
when considering why judges associate keeping markets open and allowing
knowledge to flow freely. But before examining Kitch’s argument, readers
used to a sharp distinction between empirical and normative matters should be
warned that they are bound to be frustrated.
Kitch’s argument begins by assuming Gary Becker’s Nobel Prize-winning
human capital theory. In particular, Kitch accepts Becker’s distinction between
general and specific human capital. The former refers to knowledge that is of
use to the worker regardless of the firm that employs her services, the latter to
knowledge that has value only in the context of a specific firm. The difference
between the knowledge imparted in an academic degree course and on-the-job
training captures the spirit of Becker’s distinction. According to Becker, work-
17
18 Who Owns Knowledge?
ers will find it in their interest to the bear the cost of acquiring general capital,
which may include payment to the employer, whereas employers will find it in
their interest to bear the cost of having workers acquire specific capital.
However, Kitch observes that the rationality of Becker’s distinction has
been historically undermined by the Anglo-American common law tradition,
which for the last five centuries has ruled strongly in favor of the free mobil-
ity of labor. Thus, the law has made it easy for workers to undo the advantage
that employers hope to gain by investing in the workers’ acquisition of specific
capital. Indeed, workers become attractive to other firms — and acquire an in-
centive to shift employers — precisely because they can take with them all they
have learned. That the prior employer might suffer competitively from her local
secrets being divulged to the new employer has failed to sway judges in most
cases. On the contrary, judges have interpreted their role as ensuring the overall
competitiveness of the market. In this context, an important mechanism is the
removal of bottlenecks in the transmission of knowledge, especially of the sort
that would maintain the advantage currently enjoyed by one competitor.
Kitch is puzzled by this state of affairs, a response that is itself prima facie
puzzling. Judges clearly realize that the public’s interest in the protection of
markets pertains primarily not to the interests of particular traders but to the
overall dynamism in the system of exchange — that is, the ability for infor-
mation to circulate freely so as to enable agents to be as informed as possible
when making choices in line with their respective interests. In practice, this
concern inclines judges to remove blockages resulting from attempts to hoard
knowledge — in this case, by employers. I say “in this case” because judges
equally allow employers to undermine the attempts by individual workers to
gain power within a firm by commissioning “knowledge engineering” projects
that involve the construction of “expert systems” that attempt to make explicit,
however imperfectly, workers’ so-called tacit knowledge.
Despite his initial, perhaps Socratically feigned puzzlement, Kitch ultimate-
ly believes that the economists can learn from the judges. Kitch traces their
common law wisdom to a realization that knowledge lacks some of the basic
qualities that would enable its literal treatment as “intellectual property.” In
particular, knowledge is not really “divisible”: The fact that you know some-
thing does not exclude me from knowing it. In fact, if I come to know what
you know, the value of your knowledge diminishes because you lose whatever
advantage it held over me in my prior state of ignorance.
Here it is worth observing that, strictly speaking, Kitch’s analysis really
does apply to knowledge, and not to what he prefers to talk about, namely,
information. A key distinction between knowledge and information, clarified
by the Shannon-Weaver theory of communication, is that it is in the nature
of information to resolve the uncertainty that its receiver experiences about a
Introduction to Part 1 19
decision she must take. On this definition, what is informative for one receiver
may not be so for another if the two receivers possess different background
knowledge and action contexts. Under the circumstances, information can be
easily subject to a proprietary regime, once one targets those whose posses-
sion of the information would clarify their action context. For everyone else,
it is presumed that the same information would be of little or no operational
value.
Knowledge, in contrast, is what I have called, following Fred Hirsch, a
pure “positional good” whose value is tied exclusively to its scarcity. Kitch
recognizes the negative consequences of this definition, which he summarizes
as knowledge’s “self-protective” character. In other words, whatever positional
advantage a solitary knower might have is dissipated as more people come
to know the same thing. Thus, the “power” that philosophers from Plato and
Bacon onward have associated with knowledge pertains only to the fact that
at first it is possessed only by the few. Kitch justifies this phenomenon solely
on empirical grounds, noting the difficulty in maintaining trade secrets, both
at the level of business practice and formal legislation. In the latter case, the
key feature of intellectual property legislation is the time limit placed on the
rights bestowed to the property holder. Any incentive to invention putatively
provided by the prospect of property rights must ultimately recognize the nec-
essarily artificial restrictions they pose to the free flow of knowledge.
However, Kitch leaves open the possibility of a more philosophically prin-
cipled reason for knowledge’s so-called self-protectiveness. One such reason
might be that the metaphysics presupposed by the very idea of intellectual
property is wrong. Patent law is an outgrowth of the 18th century Enlighten-
ment view that, courtesy of Newtonian mechanics, science had nearly com-
pleted human comprehension of nature. In this frame of mind, it made sense to
speak of fixed — and known — “laws of nature” that was an intellectual legacy
of all human beings, as equal products of the same divine creator. Thus, intel-
lectual property would be a temporary right based on a demonstrated ability to
work over a determinate part of that commons so as to benefit oneself in the
short term but everyone in the long term. This line of thought, famously en-
shrined in Article 1, Section 8 of the US Constitution, assumes easy analogical
transfers between “conceptual space” and “physical space.” Thus, an applica-
tion of the laws of nature is like the application of labor to a plot of land. In this
context, a property right is meant to provide an incentive for perhaps otherwise
lazy people not simply to live off the work of others.
However, the analogy between conceptual and physical space does not make
sense if the laws of nature are still thought to be up for grabs. It suggests that
the fundamental principles that were originally used to assign a patent to an
invention may be later shown false. Taking such fallibility seriously, as is rou-
20 Who Owns Knowledge?
tinely done in the history, philosophy, and sociology of science, calls into ques-
tion the need to create a specially regulated domain of “intellectual property”
beyond the ordinary regulation of market transactions. The arguments for a
distinct category of intellectual property would then have to be restricted to the
purported socio-economic benefits of innovation, regardless of the epistemic
security of the principles on which it might be based. To be sure, these revised
arguments might work, but they would be no different from the arguments the
state uses to justify financial incentives for any risky private investments.
Moreover, notwithstanding the lip service that continues to be paid to New-
tonian “laws of nature,” intellectual property legislation has adapted to their
fallible character in its own perverse way. I refer here to the increasing willing-
ness of courts to grant patents for mathematical proofs and biological species,
typically on the basis of some unique codification that permits the proof to
be demonstrated or the species to be created. Such “codification” requires a
specially equipped computer or laboratory through which the patented object
can be presented as the product of a step-by-step process. It matters more that
the proof or species can be reliably produced by this process than that it repre-
sents or instantiates one or more laws of nature, the state of our exact access to
which may be suspended for purposes of making the strictly legal point about
property rights.
Bora agrees with Kitch on one — and perhaps only one — aspect of what
Bora calls the “reflexive politics of knowledge.” Both agree that once knowl-
edge is known, its character necessarily changes. For Kitch, this points to the
futility of institutionalizing any robust sense of intellectual property. For Bora,
on the other hand, the lesson veers in the opposite direction: Knowledge comes
to be more sharply differentiated as an institutional sector in the social system,
and hence its influence can be felt more determinately in other social sectors.
For Bora, a weakness of much of recent science and technology studies, espe-
cially that which relies uncritically on Ulrich Beck’s “risk society” idea, is its
one-sided treatment of reflexive modernization that stresses the politicization
of science but not the scientization of politics. In particular, Bora is concerned
with the emergence of “legal facts” to which scientific practice is increasingly
held accountable. Just as scientists increasingly defend their normative autono-
my on political grounds, legislators and jurists determine their attitude towards
science in terms of known or anticipated consequences of scientific activities.
In other words, science and politics have internalized aspects of each other’s
orientation to the social system. Bora imagines that such “structural coupling,”
as he calls it, both complicates and harmonizes the relationship between two
otherwise possible conflicting sectors.
Bora’s narrative has many attractive, perhaps even wishful features. While
it certainly makes sense of the evolution of legal discourse relating to sci-
Introduction to Part 1 21
I. The Law
Anglo-American law governing the subject may be divided into two sections:
information embodied in human capital and information embodied in firms.
25
26 Who Owns Knowledge?
Both workers and firms are carriers of information, and the legal issues have
centered on the relationship between them.
The human capital of a worker includes the information he has. The following
two paragraphs briefly summarize Becker’s (1975) pioneering analysis.
General human capital is capital of value to many firms, and a worker is in
a position to capture its value at any of those firms (Becker, 1975:19–26). He
will, therefore, pay the costs of acquiring this capital, either through payments
(tuition) or reduction in salary. A firm providing training that adds to general
human capital can arrange its payment schedule so that at any given time it has
provided the worker with the amount of training for which he has paid. Thus
the free movement of workers need not be restrained to generate incentives for
training that provides general human capital.
Specific human capital is human capital with value only to a particular firm
(Becker, 1975:26–37). In the information context, an example is knowledge of
the firm’s operating procedures and personnel. Because this information is of
value only to the firm, the firm will pay for the necessary training, and an em-
ployee cannot steal the information for use elsewhere. There is thus no need to
restrain the free movement of workers to generate incentives for training that
provides specific human capital.
Since at least 1800, Anglo-American law has provided no protection to a
firm for the value of the human capital of its employees. Employees have been
free to change employment at will. This law displaced an earlier legal regime,
centered on the Statute of Laborers of 1492, which significantly restricted the
free movement of labor (see Becker, 1975:379–87; Holdsworth, 1936:459–
66).
More interesting, and more difficult to analyze, is the severe limitation in
this modern law on types of contractual arrangements that can be used to re-
strict the movement of employees.1 The issue has been litigated most frequently
in the context of post-employment covenants not to compete. These covenants
are written agreements providing that in the event of termination of employ-
ment the employee cannot work for a competitor for a specified length of time
in a specified area. The courts have applied strict standards of reasonableness to
these contracts and have upheld them only in the case of employees who pos-
1 While this essay was in preparation Rubin and Shedd (1981) were writing “Human
Capital and Covenants not to Compete.” We share a common dissatisfaction with
the traditional explanations for judicial reaction to covenants not to compete. Ru-
bin and Shedd explain invalidation of such contracts on grounds of opportunistic
behavior.
The Law and Economics of Rights in Valuable Information 27
that postemployment restraints reduce both the economic mobility of employees and
their personal freedom to follow their own interests. These restraints also diminish
competition by intimidating potential competitors and by slowing down the dissemi-
nation of ideas, processes, and methods. They unfairly weaken the individual em-
ployee’s bargaining position vis-a-vis his employer and, from the social point of
view, clog the market’s channeling of manpower to employments in which its
productivity is greatest. (Blake, 1960:627)
This view assumes either that such clauses are usually in the interest of the
employer or that employees would not value, and hence not charge for, the
right to future freedom of choice. Such clauses are not in the interest of an
employer unless he makes significant investments in the employee’s human
capital. If the employee offers general skills that can be provided by others on
the labor market, the employer is indifferent to who provides those skills since
he will have to pay the market wage in any case.
The complexity and difficulty of a restrictive covenant do not seem to ex-
ceed other issues on which employers are permitted to bargain freely. For in-
The Law and Economics of Rights in Valuable Information 29
stance, fringe benefits or pension plans involve judgments about future events
and needs of the employee. The congressional pension reforms imposed by the
Employee Retirement Income Security Act suggest the modern consumerist
response to problems of this type — mandated disclosure, standardized con-
tractual arrangements, and special formation procedures. The Truth in Lending
Act imposes similar requirements on lending arrangements, which often have
term features well in excess of the likely relevant term of covenants not to
compete. These responses, however, have not included outright prohibition of
the form of contract.
One easy explanation why the lack of capacity argument has such appeal
is the judicial rule restricting the contract form. The courts have refused to
enforce the contract, so the contract is seldom used. Because it is seldom used,
society has no stock of “received wisdom” about the advantages and disad-
vantages of such contracts. If the rule were suddenly changed, employers and
employees would have to learn about such contracts and during the learning
process there would be more mistakes than with other well-established contract
forms. In this view, the rule creates the conditions of its own social desirability.
Blake has persuasively shown that the rule’s origins lie not in the contractarian
structure of the 19th century common law but in the older status law of master
and apprentice (Blake, 1960:629–37). The early cases involved apprentices
whose masters had made them promise not to pursue their craft, as masters,
after the end of the fixed term of apprenticeship. The courts held that the status
of master was inconsistent with such contractual restraints. The 19th century
cases analogized the position of the newly contractually autonomous worker
to that of a master and held that the precedents forbade such agreements. The
rule, once adopted, became its own justification.
It is difficult to put much weight on the capacity argument in light of three
anomalous regimes of employment: entertainment,3 professional sports,4 and
military enlistment.5 In these cases, entering workers sign contracts that restrict
their employment options for significant periods of time. The young ballplayer
or military volunteer seems to be able to understand the implications of such
contracts and bargain for offsetting terms. Not surprisingly, these special re-
gimes are justified on the basis of the need for the employer to invest in spe-
cialized training for the employee.
3 Courts have been willing to uphold exclusive contracts in the entertainment indus-
try because of the unique nature of the services involved and to issue injunctions
against competitive employment to enforce them. These injunctions date back to
Lumly v. Wagner, 1 DeG., M. & G. 604, 42 Eng. Rep. 687 (Ch. 1852). Materials
on modern practice are to be found in Frackman (1979) and Note (1980:489).
4 These special employment institutions are summarized in Sobel (1977).
5 The law is summarized in Schlueter (1977). The cases of validity of the contract
have focused on parents trying to undo the enlistments of their minor children.
30 Who Owns Knowledge?
Firms also possess information. This is easy to see in the case of a trade secret
written on a piece of paper locked in the firm’s safe or existing as part of the
human capital of the employees who know the secret. It is less easy to see when
information exists only in the form of the memories and habits of employees.
Assume, for instance, that six employees of a firm know a particular piece of
information. If the employees are paid a competitive wage so that they are
unlikely to leave, and if they are effectively constrained from communicating
the information to others, then the firm has an asset apart from the human
capital of the employees. Firms carry information in a web of contractual
relations and property rights.
Information held by firms, unlike information embodied in human capital,
is not self-appropriating. Becker (1975:26) recognizes this feature explicitly
for technological innovations,6 but it is true of all information that can exist
apart from human capital. For instance, a firm that has prepared a competitive
bid can lose the value of the preparatory material if the bid is communicated
to a competitor who bids one dollar less. Similarly, a firm that loses a training
manual to a competitor suffers a reduction in value.
The law has given special protection to a class of information called trade
secrets. This section will discuss, first, the law of trade secrets and then the law
protecting other kinds of information.
1. Trade secrets. The courts protect trade secrets with both damage and
injunctive remedies. The first English cases, involving formulas for medicines,
date from the second decade of the 19th century, and the first American cases,
involving manufacturing processes, from the middle of the century.7 “A trade
secret,” says the Restatement, “may consist of any formula, pattern, device or
compilation of information which is used in one’s business, and which gives
him an opportunity to obtain an advantage over competitors who do not know
or use it.” 8
The question of whether information should be protected is decided by the
courts. They require that the information have value, be used in the firm, and
not be generally known by others. Firms sometimes obtain contractual agree-
ments from employees that certain information disclosed to them is confiden-
tial. Courts will accept these agreements as evidence that the firm valued the
information and attempted to preserve its secrecy, but they decide for them-
selves whether the information should actually be protected.
The rules of trade secrecy law suggest that the law’s coverage is broad but
an overwhelming number of the reported cases deal with appropriated process
technology — how to make something.9 There are a small number of cases in-
volving knowledge of the identity of customers, and after that, nothing (Blake,
1960:667).10
tions may become fair game for all comers. Patent systems try to establish these
rights so that incentives can be provided to invest in research. Property rights in
skills, on the other hand, are automatically vested, for a skill cannot be used with-
out permission of the person possessing it.’’
7 Newberry v. James, 2 Merivale 446, 35 Eng. Rep. 1011 (Ch. 1817). The first re-
ported American case suggested that an injunction could not issue on the ground
that it would be impossible to enforce. Deming v. Chapman, 11 How. Prac. 382
(N.Y. Sup. Ct, 1854). The case involved a process for marbleizing iron, slate, and
other articles. That dictum was not followed in Hammer v. Barnes, 26 How. Pr.
174 (N.Y. Sup. Ct. 1863), involving a process for brewing ale. The leading early
American case, Peabody v. Norfolk, 98 Mass. 452 (1868), involved a process for
manufacturing gunny cloth from jute buffs.
8 Restatement of Torts § 757 (1939).
9 The restrictive covenant cases, on the other hand, most frequently deal with cus-
tomer contact situations.
10 Thus, as a practical matter, the domains of patent law and trade secrecy appear to
be congruent, except that patent law does not extend to customer relations. The
32 Who Owns Knowledge?
ways in which the patent system offsets the deleterious effects of trade secrecy
protection are analyzed in Kitch (1977:75–80). The near congruence of the two
regimes may, therefore, reflect an understanding that trade secrecy protection is
more desirable when its negative effects are offset by a property rights system.
However, the explanation offered below for the scope of trade secret protection is
that the types of information not covered by trade secrecy law have high deprecia-
tion rates that make legal protection unnecessary. See pp. 53–54. Unlike the pat-
ent-related explanation, this explanation can encompass the protection allowed to
customer lists.
11 The label is facetious since the purpose of the books is to persuade firms of the
need for security measures, but they make their point by illustrating how easy it
is to obtain a competitor’s secrets. I have located Arnold and McGuire (1975);
Harvard University, Graduate School of Business, Competitive Intelligence (C.I.
Assoc. 1959); Greene (1966); Hamilton (1967); Hickson (1968); Payne (1967);
Smith (1970). I have found Smith the most helpful. I have seen references to Ber-
gier (1975), but I have not obtained a copy.
12 Northern Petrochemicals Co. v. Tomlinson, 484 F.2d 1057 (7th Cir. 1973).
The Law and Economics of Rights in Valuable Information 33
matter of the secret and its related technology to those involved in the litiga-
tion process. The courts have developed elaborate confidentiality procedures to
deal with this situation.13 The information may be disclosed, for instance, only
to the defendant’s attorney and not to his client, the accused thief (Milgrim,
1979). But even assuming the effectiveness of these procedures, they violate
basic precepts of security. Information relating to the secret must be specially
assembled and circulated to a new group of individuals, and the litigation itself
will signal the value that the firm places upon the information.14
There is no remedy for trade secrecy theft against a firm using the trade
secret if the firm acquired the information without being aware of its tainted
origin.15 Once a secret gets out, problems of tracing will practically assure the
victim’s inability to stop competitive use. If the perpetrator of the theft is judg-
ment proof and the present holders of the information are innocent, there may
be no effective relief.
Another formidable threat to trade secrecy may be foreign espionage. The
governments of foreign powers that maintain intelligence services have an in-
terest in upgrading the technological base of their own industries. One peace-
time function of an intelligence service is obtaining otherwise unavailable
technological information.16 It is likely that foreign intelligence services are
less sensitive to legal restraints than a domestic competitor would be.
The difficulties of detection and enforcement make this a logical area for the
use of strong criminal penalties. Since the number of detectable thefts is small,
the activity can only be effectively deterred if heavy penalties are imposed on
thieves who are caught. Trade secrecy skillfully executed is not a crime under
the traditional criminal statutes. Entry only to copy is not entry with felonious
intent and hence not burglary. Information is not the kind of property that falls
within the scope of traditional theft statutes. Bribery of an employee to provide
information, but not property of the employer, is not a crime. When property
13 These are discussed in Roger M. Milgrim (1979). Milgrim observes: “Perhaps the
greatest single drawback to trade secret litigation is the disclosure which plaintiff
often must make during the course of the case.” Id. at § 7.06 [I].
14 A dramatic recent example is the action brought by the US Government to enjoin
the publication of plans for the construction of the hydrogen bomb. The litigation
revealed that the plans were genuine and led to the revelation that numerous details
about construction of the bomb were available to the public in US government
libraries.
15 Restatement of Torts § 758 (1939).
16 Payne (1967:156–95) describes some of the extensive industrial espionage activi-
ties of the iron curtain countries. West Germany recently claimed that a major fo-
cus of the East German intelligence organization is obtaining information about
microelectronic technology. Wall Street Journal, June 6, 1980:16, c. 1.
34 Who Owns Knowledge?
is taken, a crime has been committed.17 In the late 1960s and early 1970s,
twenty-six states passed statutes to make trade-secret theft a crime.18 There
have, however, been very few prosecutions under these statutes.19 The statutes
came about as the result of a ring organized to systematically steal process
secrets and materials from an American drug company and sell them to Ital-
ian manufacturers who at that time operated under an umbrella created by the
lack of drug patents under Italian law.20 The ring proved very difficult for the
company to break, and the problem highlighted a gap in the criminal laws that
many legislatures were willing to fill.
The new statutes require the theft of a trade secret. Therefore, in the criminal
prosecution determining whether what was taken was a trade secret is a central
issue. The defense must prove that what was taken was not kept secret by the
company nor known to other concerns in the industry. To defend on that issue,
the defense must ask for large amounts of material relevant to the technology
in issue. Procedures for protecting the confidentiality of this material exist, but
its assembly and dissemination during the litigation process obviously increase
the risk of further loss.21 In a California case, a convicted thief of trade secrets
from IBM argued that his conviction should be set aside because he was the
only one who had ever been prosecuted under the statute. Rejecting the argu-
ment as frivolous, the court observed:
The record in this case dramatically suggests the reason why it may be true that
section 499c is a statute which has rarely been enforced. Defendant’s prosecution
and conviction were the result of an extremely difficult, complicated and expensive
investigation instigated by IBM. It is apparent why a private company such as IBM
would engage in such an undertaking only rarely and only where, as here, the value
of the stolen trade secrets was extremely great. The legal problems involved in
prosecuting such an action are also apparent. The record on appeal itself contains
thousands of pages of transcript. (62 Cal. App. 3d 24–25, 133 Cal. Rptr. 153)
The issue of appropriate proportion between the remedy and the wrong in
trade secrecy cases has recently concerned the courts in the area of injunctive
17 When the thief uses a copying machine or takes pieces of paper, the charge may be
theft of services or of the paper. Where these thefts are of low value, the crime will
be a misdemeanor.
18 Milgrim (1979:vol. 12, at § 1.10), describes this development. See Annot., 84
A.L.R. 3d 967 (1978).
19 Six cases are cited in the A.L.R. Annotation.
20 Payne (1967:35–68) describes this incident.
21 In People v. Serrata, 62 Cal. App. 3d 9. 133 Cal. Rptr. 144 (Ct. App. 1976), the
court observed that the trial court did authorize extensive defense discovery of
IBM documents and other materials in the possession of the prosecution. IBM also
made extensive documentation available voluntarily.
Another random document with
no related content on Scribd:
Glycosuria, tests for, 422.
Glycosuria, toxic, 419.
Glycosuria, pancreatic, 420.
Glycosuria, pathological, 417.
Glycosuria, physiological, 416.
Gnathitis, 19.
Gout, 430.
Gongylonema in gullet, 93.
Grass staggers, 124.
Green potatoes, poisoning by, 286.
Growth, sugar in relation to, 428.
Gullet, inflammation of, 86.
Gullet, spasm of, 90.
Gut tie in ox, 357.
Hæmoglobinæmia, 437.
Hæmoglobinuria, 437.
Hemorrhagic gastro-enteritis in dogs, 252.
Hair and bristle balls, dog and pig, 322.
Hair balls in intestines, 320.
Hair balls in intestines, horse, 320.
Hair balls in stomach, 187.
Hard palate, congestion of, 19.
Hare lip, 49.
Harvest bug on lips, 7.
Helebore poisoning, 285.
Helleborus niger poisoning, 285.
Hepatic abscess, 495.
Hepatic congestion, 483.
Hepatic congestion in dog, 486.
Hepatic congestion in solipeds, 484.
Hepatic hemorrhage, 487.
Hepatic inflammation, 490.
Hepatic steatosis, 508.
Hepatitis, 490.
Hepatitis, infective, 498.
Hepatitis, parenchymatous, 491.
Hepatitis, suppurative, 495.
Hernia, 371.
Hernia, mesenteric, 368.
Hernia of reticulum, 367.
Hernia, omental, 368.
Hernia, pelvic, 357.
Hernia, phrenic, 359.
Hernia through foramen of Winslow, 370.
Honey dew, poisoning by, 292.
Horsetail poisoning, 286.
Hydrochloric acid and gastro-enteritis, 266.
Icterus, 457.
Icterus, from lupin poison, 476.
Icterus nouveaux nés, 473.
Impacted cloaca, 209, 319.
Impacted rumen, 108.
Impaction of colon in solipeds, 203.
Impaction of large intestine, soliped, 197.
Impaction of omasum, 123.
Indigestion, acute gastric in solipeds, 150.
Indigestion, gastric, in carnivora, 158.
Indigestion, gastric, in swine, 159.
Indigestion in abomasum, 135.
Indigestion in fourth stomach in sucklings, 136.
Indigestion, ingluvial, 94.
Indigestion, intestinal, 193.
Indigestion, intestinal in birds, 209.
Indigestion, intestinal, in solipeds, 197.
Indigestion with impaction, in dog, 205.
Indigestion, tympanitic, of rumen, 96.
Ingluvial indigestion, 94.
Intestinal atony, 314.
Intestinal calculi, 323.
Intestinal congestion, from verminous embolism, 210.
Intestinal congestion in solipeds, 220.
Intestinal indigestion in birds, 209.
Intestinal indigestion with impaction, 197.
Intestinal invagination, 344.
Intestinal obstruction in birds, 209.
Intestinal obstruction in dog, 205.
Intestinal pain, 308.
Intestinal strangulations, 356.
Intestinal tympany, 193.
Intestine, abscess of, 336.
Intestine, dilation of, 340.
Intestine, hyperplasia of, 378.
Intestine, rupture of, 332.
Intestines, foreign bodies in, 328.
Intestines, hair balls in, 320.
Intestines, strangulation of, by ovarian ligament, 380.
Intestine, stricture of, 342.
Intestine, tumors of, 374.
Intestine, ulceration of, 338.
Intestine, volvulus of, 351.
Intussusception, 344.
Invagination of bowel, 344.
Iodine poisoning, 276.
Iodism, 276.
Iron, poisoning by, 279.
Jaundice, 457
Jaundice, catarrhal, 463.
Jaundice, catarrhal, in dogs, 467.
Jaundice from ferments in fodder, 476.
Jaundice from lupins, 476.
Jaundice from obstruction, 458.
Jaundice from poisons, 459.
Jaundice in cattle, 472.
Jaundice in new born, 473.
Jaundice without bile obstruction, 459.
Juniperus sabina, poisoning, 286.
Palatitis, 19.
Pancreas, diseases of, 537.
Pancreas, foreign bodies in, 542.
Pancreatic abscess, 541.
Pancreatic calculi, 543.
Pancreatic tumors, 544.
Pancreatitis, catarrhal, 538.
Pancreatitis, interstitial, 540.
Pancreatitis, suppurative, 541.
Paper-ball in stomach, 188.
Papilloma of gullet, 93.
Papilloma of omasum, 133.
Papilloma of stomach, 191.
Paralysis of gullet, 92.
Paralysis of rectum, 371.
Paralysis of the pharynx, 83.
Paralysis of tongue, 37.
Parasites of liver, 537.
Parasites of rumen and reticulum, 122.
Parasites of spleen, 564.
Paris green poisoning, 269.
Parotid gland, inflammation of, 41.
Parotitis, 41.
Pecking feathers, 76.
Pelvic hernia in ox, 357.
Perforating ulcer of stomach, 179.
Perihepatitis, 500.
Perisplenitis, 554.
Peritonitis, 380.
Peritonitis, chronic, 392.
Peritonitis, general causes, 380.
Peritonitis in birds, 399.
Peritonitis in carnivora, 397.
Peritonitis, infection of, 385.
Peritonitis in ruminants, 395.
Peritonitis in solipeds, 383.
Peritonitis, traumatic, 383.
Pharyngeal abscess, 58.
Pharyngitis, catarrhal, 49.
Pharyngitis, chronic, 73.
Pharyngitis, microbes in, 50, 56.
Pharyngitis, phlegmonous, 54.
Pharyngitis, pseudomembranous, 60.
Pharyngitis, pseudomembranous, in birds, 67.
Pharyngitis, pseudomembranous, in cattle, 63.
Pharyngitis, pseudomembranous, in dogs, 66.
Pharyngitis, pseudomembranous, in sheep, 64.
Pharyngitis, pseudomembranous, in solipeds, 61.
Pharynx, paralysis of, 83.
Pharynx, tumors of, 84.
Phenol poisoning, 281.
Phlegmonous gastritis in horse, 162.
Phosphatic calculi in stomach, 188.
Phosphorus poisoning, 272.
Phrenic hernia, 359.
Phytolacca, poisoning by, 286.
Pica, 76.
Pins in stomach, 188.
Pip in birds, 18.
Plants, paralyzing element in, 95.
Playthings in stomach, 188.
Podophyllum, poisoning by, 286.
Poisoning by acetic acid, 266.
Poisoning by aconite, 286.
Poisoning by acorns, 286.
Poisoning by aloes, 286.
Poisoning by American water hemlock, 285.
Poisoning by ammonia, 264.
Poisoning by anemone, 286.
Poisoning by antimony, 273.
Poisoning by army worm, 288.
Poisoning by arsenic, 269, 271.
Poisoning by artichokes, 286.
Poisoning by astragalus, 287.
Poisoning by azedarach, 286.
Poisoning by bacteria, 289.
Poisoning by barium, 279.
Poisoning by bluestone, 276.
Poisoning by box leaves, 284.
Poisoning by brine, 268.
Poisoning by bromine, 276.
Poisoning by bryony, 286.
Poisoning by buckwheat, 286.
Poisoning by cantharides, 288.
Poisoning by carbolic acid, 281.
Poisoning by castor seeds, 282.
Poisoning by chickweed, 286.
Poisoning by chromium, 280.
Poisoning by cicuta maculata, 285.
Poisoning by cicuta virosa, 286.
Poisoning by clematis, 286.
Poisoning by cockroach, 288.
Poisoning by colchicum autumnale, 285.
Poisoning by conium maculatum, 286.
Poisoning by copper, 276.
Poisoning by creosote, 282.
Poisoning by croton seeds or oil, 283.
Poisoning by cryptogams, 290, 292.
Poisoning by daffodils, 284.
Poisoning by digitalis, 286.
Poisoning by ergot, 289.
Poisoning by euphorbia, 283.
Poisoning by fungi, 289, 291.
Poisoning by galega, 286.
Poisoning by giant fennel, 286.
Poisoning by honey dew, 292.
Poisoning by horsetail, 286.
Poisoning by iodine, 276.
Poisoning by iron, 279.
Poisoning by laburnum, 286.
Poisoning by lathyrus, 286.
Poisoning by lolium temulentum, 286.
Poisoning by male fern, 286.
Poisoning by melilot, 286.
Poisoning by mercurialis annua, 286.
Poisoning by mineral acids, 266.
Poisoning by moulds, 289, 290.
Poisoning by muriatic acid, 266.
Poisoning by mustard, 287.
Poisoning by nitrate of soda, 268.
Poisoning by nitric acid, 266.
Poisoning by nux vomica, 286.
Poisoning by œnanthe crocata, 286.
Poisoning by oxalic acid, 266.
Poisoning by oxytropis, 287.
Poisoning by Paris green, 269.
Poisoning by phosphorus, 272.
Poisoning by phytolacca, 286.
Poisoning by podophyllum, 286.
Poisoning by poppy, 286.
Poisoning by potash, 265.
Poisoning by potatoe beetle, 288.
Poisoning by potatoe tops, 286.
Poisoning by ranunculus, 284.
Poisoning by resinous plants, 286.
Poisoning by rhododendron, 286.
Poisoning by ryegrass, 286.
Poisoning by salts of mercury, 274.
Poisoning by saltpeter, 268.
Poisoning by savin, 286.
Poisoning by silver, 278.
Poisoning by smut, 289.
Poisoning by snapdragon, 286.
Poisoning by soda, 265.
Poisoning by sodium chloride, 267.
Poisoning by spoiled potatoes, 296, 300.
Poisoning by spurge laurel, 283.
Poisoning by spurry seeds, 286.
Poisoning by St. John’s wort, 286.
Poisoning by strychnia, 286.
Poisoning by sulphur, 275.
Poisoning by sulphuric acid, 266.
Poisoning by tares, 286.
Poisoning by tartar emetic, 273.
Poisoning by tobacco, 286.
Poisoning by toxins in food and water, 292.
Poisoning by trefoil, 286.
Poisoning by vetches, 286.
Poisoning by veratrum viride, 285.
Poisoning by white vitriol, 277.
Poisoning by yew, 286.
Poisoning by zinc, 277.
Poisoning, chronic, by arsenic, 271.
Poke root, poisoning by, 286.
Polypi on lips, 6.
Poppy poisoning, 286.
Postpharyngeal abscess, 58.
Potash and gastro-enteritis, 265.
Potato beetle, poisoning by, 288.
Potato tops, poisoning by, 286.
Pseudomembranous enteritis in birds, 226.
Pseudomembranous enteritis in cattle, 223.
Pseudomembranous enteritis in dogs, 225.
Pseudomembranous enteritis in sheep, 224.
Pseudomembranous enteritis in solipeds, 221.
Pseudomembranous pharyngitis in cattle, 62.
Pseudomembranous pharyngitis in dogs, 66.
Pseudomembranous pharyngitis in pigeons and chickens, 67.
Pseudomembranous pharyngitis in sheep, 64.
Pseudomembranous pharyngitis in solipeds, 61.
Pseudomembranous pharyngitis in swine, 65.
Ptomaines and toxins of brine, 268.
Ptyalism, 39.