1 / 12

Ch. 2: Regulating and Governing the Internet

Ch. 2: Regulating and Governing the Internet. Should we impose limits on the flow of information in cyberspace? Implementing restrictions: Challenge: . Origins of the Network pp. 29-31. Original aim: “Survivable communications” Packets, packet switching

jafari
Download Presentation

Ch. 2: Regulating and Governing the Internet

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Ch. 2: Regulating and Governing the Internet • Should we impose limits on the flow of information in cyberspace? • Implementing restrictions: • Challenge:

  2. Origins of the Networkpp. 29-31 • Original aim: • “Survivable communications” • Packets, packet switching • Labeled w/ origin, destination, sequence info for reassembling at destination • Donald Davies (beginning thru 2:09): http://www.youtube.com/watch?v=tT4AaelwvV4 • Why is the data broken up into packets? • for Queuing (@ 1:53 in video)

  3. Origins of the Network cont’d • First large-scale packet switching network was ARPANET. • Initial goal: resource sharing. • Usage discovery: electronic mail • The idea of using a network to bring people together • ARPANET and Milnet: interconnected • “A network of networks” was born – the Internet • The “death of distance”

  4. The Internet’s Architecture • TCP/IP • Protocol: set of rules for communications • IP • IP address: nnn.nnn.nnn.nnn (0-255) • TCP • Packeting • Routers: packet switches • NSPs • http://www.youtube.com/watch?v=CyosOGHOBHA

  5. Distinctive features: • Trait of openness • Asynchronous • Many-to-many communications • Distributed • Scalable • Pp. 32-33

  6. Facets of the Modern Internet • WWW • Multimedia • Hypertext linking • Accessible html and http • A move to the semantic web for coding, xml • Pp. 33-38 • E-commerce • Trade • More products available to the consumer • Customization • Models • B2C • C2B • B2B • C2C

  7. Facets cont’d • Social Networking • Communication tools, sharing of info • See pp. 38-39 for an overview if unfamiliar • Challenges: monetizing web traffic & privacy • Ease of sharing info leads to problems • Child porn, predators, bullying, stalking, sexting • Should these sites be liable for the illegal activities of their users? • For the US, the Communications Decency Act §230c applies • Other countries often do not have laws to protect service providers. • See case studies: L’Affair Yahoo and A Case of Libel pp. 50-54

  8. Social problems of the Internet • Erosion of privacy • Perverted forms of speech • Illegitimate copying of music and video files • Transaction fraud • Hackers

  9. Regulating the Problems • Lessig’s 4 Constraints on Behavior • Laws • Social Norms • Market • Code / Architecture • Other considerations: • Social costs: borne involuntarily by others • Ex. Privacy

  10. Approaches: • Invisible hand: let it self-correct. Often best in situations where all the variables are not known/understood • Avoids the problem of capture • “a process whereby those being regulated influence regulators so hat they no longer act in the public interest” • Funny aside: http://motherjones.com/media/2010/06/mark-fiore-voluntary-regulation

  11. Approaches: cont’d • Visible hand: regulate it • Difficulties inherent in Internet regulation: • Open architecture designed for sharing • John Gilmore: “Information can take so many alt routes when one node is removed that the Net is almost immortally flexible … the Net interprets censorship as damage and routes around it.” p. 42 • Digital content difficult to contain • Jurisdiction is based on geography, Internet has no boundaries. • Do we net Net/tech specific laws?

  12. Internet Regulation and Ethics • A mix of approaches is likely • The effectiveness of code to control behavior. • The need for regulation to consider autonomy, privacy and security • Embracing values for human flourishing p. 50

More Related