Return to Article Details Computer architectures for protection of personal informatic property: Putting pirates, pigs and rapists in perspective