ch. 2: regulating and governing the internet should we impose limits on the flow of information in...
TRANSCRIPT
![Page 1: Ch. 2: Regulating and Governing the Internet Should we impose limits on the flow of information in cyberspace? Implementing restrictions: – Challenge:](https://reader036.vdocuments.mx/reader036/viewer/2022081008/56649e4e5503460f94b456b3/html5/thumbnails/1.jpg)
Ch. 2: Regulating and Governing the Internet
• Should we impose limits on the flow of information in cyberspace?
• Implementing restrictions:– Challenge:
![Page 2: Ch. 2: Regulating and Governing the Internet Should we impose limits on the flow of information in cyberspace? Implementing restrictions: – Challenge:](https://reader036.vdocuments.mx/reader036/viewer/2022081008/56649e4e5503460f94b456b3/html5/thumbnails/2.jpg)
Origins of the Networkpp. 29-31
• Original aim:– “Survivable communications”
• Packets, packet switching– Labeled w/ origin, destination, sequence info for
reassembling at destination– Donald Davies (beginning thru 2:09):
http://www.youtube.com/watch?v=tT4AaelwvV4 – Why is the data broken up into packets? • for Queuing (@ 1:53 in video)
![Page 3: Ch. 2: Regulating and Governing the Internet Should we impose limits on the flow of information in cyberspace? Implementing restrictions: – Challenge:](https://reader036.vdocuments.mx/reader036/viewer/2022081008/56649e4e5503460f94b456b3/html5/thumbnails/3.jpg)
Origins of the Network cont’d
• First large-scale packet switching network was ARPANET. – Initial goal: resource sharing.– Usage discovery: electronic mail• The idea of using a network to bring people together
• ARPANET and Milnet: interconnected• “A network of networks” was born – the
Internet– The “death of distance”
![Page 4: Ch. 2: Regulating and Governing the Internet Should we impose limits on the flow of information in cyberspace? Implementing restrictions: – Challenge:](https://reader036.vdocuments.mx/reader036/viewer/2022081008/56649e4e5503460f94b456b3/html5/thumbnails/4.jpg)
The Internet’s Architecture
• TCP/IP– Protocol: set of rules for communications• IP
– IP address: nnn.nnn.nnn.nnn (0-255)
• TCP– Packeting– Routers: packet switches
• NSPs
• http://www.youtube.com/watch?v=CyosOGHOBHA
![Page 5: Ch. 2: Regulating and Governing the Internet Should we impose limits on the flow of information in cyberspace? Implementing restrictions: – Challenge:](https://reader036.vdocuments.mx/reader036/viewer/2022081008/56649e4e5503460f94b456b3/html5/thumbnails/5.jpg)
Distinctive features:
• Trait of openness
• Asynchronous
• Many-to-many communications
• Distributed
• Scalable• Pp. 32-33
![Page 6: Ch. 2: Regulating and Governing the Internet Should we impose limits on the flow of information in cyberspace? Implementing restrictions: – Challenge:](https://reader036.vdocuments.mx/reader036/viewer/2022081008/56649e4e5503460f94b456b3/html5/thumbnails/6.jpg)
Facets of the Modern Internet
• WWW– Multimedia– Hypertext linking– Accessible html and http– A move to the semantic
web for coding, xml
• Pp. 33-38
• E-commerce– Trade– More products available
to the consumer– Customization– Models
• B2C• C2B• B2B• C2C
![Page 7: Ch. 2: Regulating and Governing the Internet Should we impose limits on the flow of information in cyberspace? Implementing restrictions: – Challenge:](https://reader036.vdocuments.mx/reader036/viewer/2022081008/56649e4e5503460f94b456b3/html5/thumbnails/7.jpg)
Facets cont’d
• Social Networking– Communication tools, sharing of info– See pp. 38-39 for an overview if unfamiliar– Challenges: monetizing web traffic & privacy– Ease of sharing info leads to problems
• Child porn, predators, bullying, stalking, sexting
– Should these sites be liable for the illegal activities of their users? • For the US, the Communications Decency Act §230c applies• Other countries often do not have laws to protect service
providers.– See case studies: L’Affair Yahoo and A Case of Libel pp. 50-54
![Page 8: Ch. 2: Regulating and Governing the Internet Should we impose limits on the flow of information in cyberspace? Implementing restrictions: – Challenge:](https://reader036.vdocuments.mx/reader036/viewer/2022081008/56649e4e5503460f94b456b3/html5/thumbnails/8.jpg)
Social problems of the Internet
• Erosion of privacy• Perverted forms of
speech• Illegitimate copying of
music and video files• Transaction fraud• Hackers
![Page 9: Ch. 2: Regulating and Governing the Internet Should we impose limits on the flow of information in cyberspace? Implementing restrictions: – Challenge:](https://reader036.vdocuments.mx/reader036/viewer/2022081008/56649e4e5503460f94b456b3/html5/thumbnails/9.jpg)
Regulating the Problems
• Lessig’s 4 Constraints on Behavior1. Laws2. Social Norms3. Market4. Code / Architecture
• Other considerations:– Social costs: borne involuntarily by others• Ex. Privacy
![Page 10: Ch. 2: Regulating and Governing the Internet Should we impose limits on the flow of information in cyberspace? Implementing restrictions: – Challenge:](https://reader036.vdocuments.mx/reader036/viewer/2022081008/56649e4e5503460f94b456b3/html5/thumbnails/10.jpg)
Approaches:
• Invisible hand: let it self-correct. Often best in situations where all the variables are not known/understood
– Avoids the problem of capture• “a process whereby those being regulated influence
regulators so hat they no longer act in the public interest”– Funny aside:
http://motherjones.com/media/2010/06/mark-fiore-voluntary-regulation
![Page 11: Ch. 2: Regulating and Governing the Internet Should we impose limits on the flow of information in cyberspace? Implementing restrictions: – Challenge:](https://reader036.vdocuments.mx/reader036/viewer/2022081008/56649e4e5503460f94b456b3/html5/thumbnails/11.jpg)
Approaches: cont’d
• Visible hand: regulate it• Difficulties inherent in Internet regulation:– Open architecture designed for sharing
• John Gilmore: “Information can take so many alt routes when one node is removed that the Net is almost immortally flexible … the Net interprets censorship as damage and routes around it.” p. 42
– Digital content difficult to contain– Jurisdiction is based on geography, Internet has no
boundaries.– Do we net Net/tech specific laws?
![Page 12: Ch. 2: Regulating and Governing the Internet Should we impose limits on the flow of information in cyberspace? Implementing restrictions: – Challenge:](https://reader036.vdocuments.mx/reader036/viewer/2022081008/56649e4e5503460f94b456b3/html5/thumbnails/12.jpg)
Internet Regulation and Ethics
• A mix of approaches is likely• The effectiveness of code to control behavior.• The need for regulation to consider autonomy,
privacy and security– Embracing values for human flourishing p. 50