ch. 2: regulating and governing the internet should we impose limits on the flow of information in...

12
Ch. 2: Regulating and Governing the Internet Should we impose limits on the flow of information in cyberspace? • Implementing restrictions: – Challenge:

Upload: ethelbert-anthony

Post on 28-Dec-2015

213 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Ch. 2: Regulating and Governing the Internet Should we impose limits on the flow of information in cyberspace? Implementing restrictions: – Challenge:

Ch. 2: Regulating and Governing the Internet

• Should we impose limits on the flow of information in cyberspace?

• Implementing restrictions:– Challenge:

Page 2: Ch. 2: Regulating and Governing the Internet Should we impose limits on the flow of information in cyberspace? Implementing restrictions: – Challenge:

Origins of the Networkpp. 29-31

• Original aim:– “Survivable communications”

• Packets, packet switching– Labeled w/ origin, destination, sequence info for

reassembling at destination– Donald Davies (beginning thru 2:09):

http://www.youtube.com/watch?v=tT4AaelwvV4 – Why is the data broken up into packets? • for Queuing (@ 1:53 in video)

Page 3: Ch. 2: Regulating and Governing the Internet Should we impose limits on the flow of information in cyberspace? Implementing restrictions: – Challenge:

Origins of the Network cont’d

• First large-scale packet switching network was ARPANET. – Initial goal: resource sharing.– Usage discovery: electronic mail• The idea of using a network to bring people together

• ARPANET and Milnet: interconnected• “A network of networks” was born – the

Internet– The “death of distance”

Page 4: Ch. 2: Regulating and Governing the Internet Should we impose limits on the flow of information in cyberspace? Implementing restrictions: – Challenge:

The Internet’s Architecture

• TCP/IP– Protocol: set of rules for communications• IP

– IP address: nnn.nnn.nnn.nnn (0-255)

• TCP– Packeting– Routers: packet switches

• NSPs

• http://www.youtube.com/watch?v=CyosOGHOBHA

Page 5: Ch. 2: Regulating and Governing the Internet Should we impose limits on the flow of information in cyberspace? Implementing restrictions: – Challenge:

Distinctive features:

• Trait of openness

• Asynchronous

• Many-to-many communications

• Distributed

• Scalable• Pp. 32-33

Page 6: Ch. 2: Regulating and Governing the Internet Should we impose limits on the flow of information in cyberspace? Implementing restrictions: – Challenge:

Facets of the Modern Internet

• WWW– Multimedia– Hypertext linking– Accessible html and http– A move to the semantic

web for coding, xml

• Pp. 33-38

• E-commerce– Trade– More products available

to the consumer– Customization– Models

• B2C• C2B• B2B• C2C

Page 7: Ch. 2: Regulating and Governing the Internet Should we impose limits on the flow of information in cyberspace? Implementing restrictions: – Challenge:

Facets cont’d

• Social Networking– Communication tools, sharing of info– See pp. 38-39 for an overview if unfamiliar– Challenges: monetizing web traffic & privacy– Ease of sharing info leads to problems

• Child porn, predators, bullying, stalking, sexting

– Should these sites be liable for the illegal activities of their users? • For the US, the Communications Decency Act §230c applies• Other countries often do not have laws to protect service

providers.– See case studies: L’Affair Yahoo and A Case of Libel pp. 50-54

Page 8: Ch. 2: Regulating and Governing the Internet Should we impose limits on the flow of information in cyberspace? Implementing restrictions: – Challenge:

Social problems of the Internet

• Erosion of privacy• Perverted forms of

speech• Illegitimate copying of

music and video files• Transaction fraud• Hackers

Page 9: Ch. 2: Regulating and Governing the Internet Should we impose limits on the flow of information in cyberspace? Implementing restrictions: – Challenge:

Regulating the Problems

• Lessig’s 4 Constraints on Behavior1. Laws2. Social Norms3. Market4. Code / Architecture

• Other considerations:– Social costs: borne involuntarily by others• Ex. Privacy

Page 10: Ch. 2: Regulating and Governing the Internet Should we impose limits on the flow of information in cyberspace? Implementing restrictions: – Challenge:

Approaches:

• Invisible hand: let it self-correct. Often best in situations where all the variables are not known/understood

– Avoids the problem of capture• “a process whereby those being regulated influence

regulators so hat they no longer act in the public interest”– Funny aside:

http://motherjones.com/media/2010/06/mark-fiore-voluntary-regulation

Page 11: Ch. 2: Regulating and Governing the Internet Should we impose limits on the flow of information in cyberspace? Implementing restrictions: – Challenge:

Approaches: cont’d

• Visible hand: regulate it• Difficulties inherent in Internet regulation:– Open architecture designed for sharing

• John Gilmore: “Information can take so many alt routes when one node is removed that the Net is almost immortally flexible … the Net interprets censorship as damage and routes around it.” p. 42

– Digital content difficult to contain– Jurisdiction is based on geography, Internet has no

boundaries.– Do we net Net/tech specific laws?

Page 12: Ch. 2: Regulating and Governing the Internet Should we impose limits on the flow of information in cyberspace? Implementing restrictions: – Challenge:

Internet Regulation and Ethics

• A mix of approaches is likely• The effectiveness of code to control behavior.• The need for regulation to consider autonomy,

privacy and security– Embracing values for human flourishing p. 50