1,651 results on '"GOVERNMENT policy on the Internet"'
Search Results
2. Uncommon Carriage.
- Author
-
Reid, Blake E.
- Subjects
- *
INTERNET laws , *GOVERNMENT policy on the Internet , *TELECOMMUNICATIONS laws & regulations , *SOCIAL media laws , *MOODY v. NetChoice LLC - Abstract
As states have begun regulating the carriage of speech by "Big Tech" internet platforms, scholars, advocates, and policymakers have increasingly focused their attention on the law of common carriage. Legislators have invoked common carriage to defend social media regulations against First Amendment challenges, making arguments set to take center stage in the Supreme Court's impending consideration of the NetChoice saga. This Article challenges the coherence of common carriage as a field and its utility for assessing the constitutionality and policy wisdom of internet regulation. Evaluating the post-Civil War history of common carriage regimes in telecommunications law, this Article illustrates that conceptions of common carriage and its treatment by the courts vary significantly and are contingent on specific historical and technological circumstances. The Article observes that common carriage is an attractive nuisance for policymakers and judges. The doctrine distracts from difficult normative questions about the permissibility of government interventions into speech and the editorial discretion of internet platforms. The Article disentangles talismanic invocations of "common carriage" by isolating three distinct issues: (1) the classification of "common carriers," (2) the imposition of "common carriage" rules on those carriers, and (3) the First Amendment problems that flow from the imposition. Applying this novel three-part framework, this Article argues for a contextsensitive approach to internet regulations. This approach evaluates the designation of carriers, the imposition of rules, and the role of the First Amendment at a granular level to more robustly account for the complexity of contemporary internet platforms. [ABSTRACT FROM AUTHOR]
- Published
- 2024
3. Digitalisation Labs: A New Arena for Policy Design in German Multilevel Governance.
- Author
-
Carstens, Nora
- Subjects
- *
INTERNET laws , *DIGITIZATION , *GOVERNMENT policy on the Internet , *EMIGRATION & immigration , *WEB portals - Abstract
The federal system has long been seen as one of the biggest obstacles to the digital transformation of the German state. With the enactment of the Online Access Act (OZG), a law that obliges all federal levels to offer their administrative services digitally in a joint portal network by the end of 2022, a new arena for multilevel collaboration has developed in Germany; the so-called digitalisation labs. The labs are intended to bring together representatives of all federal levels, external actors and citizens to promote problem-oriented policy design and the development of innovative policy solutions. Following a neo-institutionalist perspective and using the analytical concepts of multilevel governance and problem-solving, this paper investigates how the institutional settings, internal dynamics and actors' composition influence policy design processes in the labs. The empirical analysis is built on a qualitative case study of two digitalisation labs in the policy field 'Immigration and Emigration', and based on ten expert interviews as well as an extensive document analysis. The paper concludes that, by promoting problem-solving, the institutional settings as well as the organisational design and actors' constellations have influenced the policy design process in several ways. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
4. Anticipating Policy and Social Implications of Named Data Networking.
- Author
-
SHILTON, KATIE, BURKE, JEFFREY A., CLAFFY, K. C., and ZHANG, LIXIA
- Subjects
- *
COMPUTER architecture , *COMPUTER networks , *INTERNET & society , *GOVERNMENT policy on the Internet , *FREEDOM of speech , *COMPUTER security - Abstract
The article discusses a possible Internet architecture known as Named Data Networking (NDN) that could alter how data is delivered across the Internet, and the potential social impact and policy implications of NDN. It describes the functional building blocks of NDN, how NDN is utilized, and how possible changes concerning NDN could impact free speech, computer security, and Internet privacy.
- Published
- 2016
- Full Text
- View/download PDF
5. Universal and non-excludable broadband Internet access: A modest proposal for municipal provisioning of broadband as a basic service.
- Author
-
Mersereau, Michel
- Subjects
- *
BROADBAND communication systems , *INTERNET access , *MUNICIPAL services , *GOVERNMENT policy on the Internet , *INTERNET access control - Abstract
This paper argues for localizing the provisioning of broadband internet access within the portfolio of municipal services with a view to achieving universal service penetration. In supporting this proposition, this paper first offers a critique of how the centralization of regulatory oversight at the federal level has proven problematic in meeting universal service objectives. The paper then presents a rationale and proposition for provisioning household broadband services in low-income urban areas through municipal social and subsidized housing undertakings, and as a partial redress to broadband disenfranchisement. [ABSTRACT FROM AUTHOR]
- Published
- 2021
6. A proposal for a new risk-based licensing approach to disclosing anonymised data under the (UK) Freedom of Information Act 2000.
- Author
-
Pearce, Henry
- Subjects
- *
FREEDOM of information , *GOVERNMENT policy on the Internet , *DATA protection laws , *DATA security laws - Abstract
Previous contributions to the literature have highlighted the disconnection between the 'release and forget' disclosure model of the (UK) Freedom of Information Act 2000 (FOIA) and the practical realities of anonymisation. This article builds on this literature, and proposes an alternative approach to disclosing anonymised data under the FOIA that operates on a context-dependant and risk-aware basis, and is designed to reconcile the law with the practical realities of anonymisation whilst striking a balance between the need to make public sector data more 'open' and protecting the privacy and data protection interests of individuals whose personal data might be contained in public sector datasets. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
7. A Social Media Case Tests The High Court’s Tech Chops.
- Author
-
Stohr, Greg and Birnbaum, Emily
- Subjects
TECHNOLOGY & law ,ACTIONS & defenses (Law) ,GOVERNMENT policy on the Internet ,INTERNET ,SOCIAL media laws - Abstract
The article reports on the technological challenges facing the U.S. Supreme Court justices as they tackle and decide cases involving technology and social media like Gonzales v. Google. In the case, the family of a terrorist victim alleged that Google's video platform YouTube promoted Islamic State videos that resulted in terrorist attacks. Also cited is the need for the judges to consider or envision the practical impacts of their rulings on the future shape of the Internet.
- Published
- 2023
8. Federal Cybersecurity: Background and Issues for Congress.
- Author
-
Jaikaran, Chris
- Subjects
INTERNET security laws ,GOVERNMENT policy on the Internet ,INFORMATION technology security - Abstract
The article provides background information and issues for U.S. Congress on federal cybersecurity. It analyzes laws, agency guidance, and standards for cybersecurity, along with agency responsibilities for cybersecurity. Options for Congress to address federal cybersecurity issues include updating statutes, requiring cyber incident reports, and the establishment of cybersecurity funding levels.
- Published
- 2021
9. Countering the Counterpublics: Progovernment Online Media and Public Opinion in Hong Kong.
- Author
-
LEE, FRANCIS L. F.
- Subjects
DIGITAL media ,GOVERNMENT policy on the Internet ,POLITICAL attitudes ,INOCULATION theory (Communication) ,ALTERNATIVE mass media - Abstract
Many studies have illustrated how digital media can facilitate political criticisms and protests, but recent scholarship has noted the ability of authoritarian states to control the Internet and undermine its oppositional character. This study focuses on the “hybrid regime” of Hong Kong, where the progovernment forces have tried to counteract the formation of an online counterpublic sphere by setting up numerous online outposts since the mid-2010s. It examines how exposure to progovernment online media content is related to political attitudes. In addition to a direct relationship, drawing on inoculation theory, this article contends that progovernment online media may also consolidate support for the government by neutralizing the influence of online alternative media. Survey data analysis shows that exposure to progovernment online media content indeed related to more conservative views, and the connection between online alternative media use and prodemocracy attitudes was weaker among older citizens regularly exposed to progovernment online media. [ABSTRACT FROM AUTHOR]
- Published
- 2021
10. Historicizing Internet Regulation in China: A Meta-Analysis of Chinese Internet Policies (1994-2017).
- Author
-
MIAO, WEISHAN, MIN JIANG, and YUNXIA PANG
- Subjects
GOVERNMENT policy on the Internet ,INTERNET laws ,SOCIAL network analysis ,CONTENT analysis - Abstract
Despite growing scholarly attention, few studies have systematically investigated the historical evolution and patterns of Chinese Internet policies. We created the first comprehensive database of national-level Chinese Internet laws and policies between 1994 and 2017 and conducted a meta-analysis of 358 policy documents using content analysis and social network analysis. We found that (1) among the 71 government agencies involved in Chinese Internet regulation, there are central-peripheral dynamics as well as complex networks of collaboration; (2) although more than 40% of regulations concern information services, the overall regulatory emphasis has evolved from Internet infrastructure to online content to digital economy; and (3) while Chinese Internet policies historically follow the principle of "rule by directives" instead of "rule of law," dominated by low-level policies, leading to both arbitrariness and adaptability, recent state efforts aim to streamline policymaking. Overall, our study contributes to debates on three core issues in Internet governance from a Chinese perspective: Who (should) regulate the Internet? What issues (should) fall under regulatory oversight? And how should the Internet be regulated via what mechanisms?. [ABSTRACT FROM AUTHOR]
- Published
- 2021
11. "Goodbye Minitel, welcome to the internet". The Hourtin speech as a turning-point for French internet policy.
- Author
-
Bellon, Anne
- Subjects
- *
HISTORY of the Internet , *COMPUTER network resources , *CYBERCULTURE , *GOVERNMENT policy on the Internet - Abstract
In 1997, the recently appointed French Prime Minister Lionel Jospin took a firm stance in favor of the Internet and announced an ambitious program to develop information technology and networks. In a country characterized by the lingering presence of the Minitel and bureaucratic reluctance to Internet solutions, this allocution, referred as the Hourtin speech, has been acknowledged as a turning-point in French internet policies. However, little is known about the dynamics that made such a statement possible. Based on interviews and personal archive of key actors, this paper offers to investigate the administrative and political processes that enabled such a change of position at the highest level of the State. While the role played by civil servants or government officials in promoting the development of the Internet in France has often been overlooked in internet histories, we offer new insight on the political work and administrative mobilizations that contributed to the diffusion of internet solutions and more broadly, to the advent of a digital revolution. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
12. Personality, media choice and political ideology: explaining ideological pluralism in China.
- Author
-
Ma, Deyong and Lewis, Orion A.
- Subjects
- *
AUTHORITARIAN personality , *IDEOLOGY , *POLITICAL attitudes , *DIGITAL media , *PUBLIC opinion , *AUTHORITARIANISM , *GOVERNMENT policy on the Internet - Abstract
To what extent do personality traits and media exposure explain political ideology? How important is authoritarian information control in structuring political attitudes relative to individual-level factors? This article evaluates the sources of political ideology using survey data from over 10,000 in internet users in China. Consistent with the literature, we find that both personality traits and media exposure are significantly associated with one's expressed ideological orientation. However prior individual-level personality traits appear to have a larger impact than information exposure and may cause citizens to self-select media information. This means that media effects have a differential impact on individuals, with authoritarian personalities being more prone to reinforce their views with propaganda. This research highlights important ways that personality mediates information exposure, helps to explain the micro-foundations that shape authoritarian control at an individual level, explains the efficacy of propaganda techniques, as well as the mechanisms of political pluralism under authoritarianism. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
13. Schleichende Nationalisierung.
- Author
-
Dietrich, Philipp and Epifanova, Alena
- Subjects
GOVERNMENT policy on the Internet ,INTERNET laws - Abstract
The article reports on Russia's law on the so-called "sovereign Internet" that aims to bring the largely free Internet under state control.
- Published
- 2020
14. SPEECH ACROSS BORDERS.
- Author
-
Daskal, Jennifer
- Subjects
- *
FREEDOM of speech , *GOVERNMENT policy on the Internet , *SOVEREIGNTY - Abstract
As both governments and tech companies increasingly seek to regulate speech online, these efforts raise critical, and contested, questions about how far those regulations can and should extend. Is it enough to delink or delist material in a geographically segmented way, or are global delinking and takedown orders needed to protect the underlying interests at stake? These questions have been posed in two high-profile disputes before the European Court of Justice and in litigation that has pitted Canadian and U.S. courts against one another. Meanwhile, a new form of geographically-segmented speech regulation is emerging--pursuant to which speech is limited based on who is speaking and from where, as opposed to what is being said. This Article examines the ways in which norms regarding speech, privacy, and a range of other rights conflict across borders, and examines the implications for territorial sovereignty and prospects for democratic control. It details the power of private-sector players in adjudicating and resolving these conflicts, the ways in which governments are seeking to harness this power on a global scale, and the broader implications for individual rights. It offers a nuanced approach that identifies the multiple competing interests at stake-- recognizing both the ways in which global takedowns or delisting can, at times, be a critical means of protecting key interests, and the risk of over-censorship and forced uniformity that can result. The Article also suggests new forms of decision making and accountability to reflect the shifting power structures and increasing porousness of borders online. [ABSTRACT FROM AUTHOR]
- Published
- 2019
15. Technological Distribution in Uganda: Information and Communications Technology and the State in an Eastern African Nation.
- Author
-
Bowman, Warigia M.
- Subjects
- *
INFORMATION & communication technologies , *GOVERNMENT policy on information technology , *TELECOMMUNICATION policy , *GOVERNMENT policy on the Internet , *INFRASTRUCTURE (Economics) - Abstract
Information and communications technologies (ICTs) include old technologies—such as the radio and the television—as well as newer technologies—such as the Internet and wireless telephony. This study considers the process that the government of Uganda has used to adopt and implement ICT policy. This study also considers the techniques which the government of Uganda has used to distribute ICTS in public locations such as government offices, schools, and hospitals. In particular, this study attempts to consider the political motivations for distribution. The Ugandan government's attempt to distribute this technology reflects strengths in the area of distribution of artefacts, particularly to rural areas. Information and communications technologies are an important part of the Ugandan economy. In addition, ICTs strengthen the ability of citizens to communicate with each other across regional and language borders through shared access points. Methodologically, this paper uses the case study method. Semi‐structured interviews were conducted with politicians, policy makers, civil society activists, citizens, academics, medical personnel, regional government officials, and business people. This paper argues that politicians use ICTs as a component of a basket of goods and services that they can distribute to witnessing publics. This paper argues that ICT should be viewed as a type of infrastructure, and that as a public good, it can be used as a "club" good or "pork." Although several authors discuss the potential of ICTs as democratizing, this paper documents that the Ugandan government has employed ICTs in oppressive ways, including for the surveillance of opposition leaders, and for social control. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
16. DIGITAL SHOPPING MALLS AND STATE CONSTITUTIONS -- A NEW FONT OF FREE SPEECH RIGHTS?
- Author
-
Jaffe, Andrei Gribakov
- Subjects
- *
FREEDOM of speech , *STATE constitutions , *ONLINE shopping , *STATE action doctrine (Antitrust law) , *SOCIAL media , *GOVERNMENT policy on the Internet - Abstract
The article discusses issues on free speech rights, social media platforms, state constitutions, as well as Internet policy and regulation. Other topics include the U.S. Constitution's First Amendment, the state action doctrine, the provisions of the Communications Decency Act (CDA), and the case "Pruneyard Shopping Center v. Robins" to examine the effectiveness of state constitutions in assuring free speech rights online.
- Published
- 2019
17. Governing through cybersecurity: national policy strategies, globalized (in‑)security and sociotechnical visions of the digital society.
- Author
-
Haddad, Christian and Binder, Clemens
- Subjects
INTERNET security ,DIGITIZATION ,GOVERNMENT policy on the Internet ,GOVERNMENTALITY ,DIGITAL technology ,GLOBALIZATION ,POWER (Social sciences) - Abstract
Copyright of Österreichische Zeitschrift für Soziologie is the property of Springer Nature and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2019
- Full Text
- View/download PDF
18. Untangling the 'Dark Web': an emerging technological challenge for the criminal law.
- Author
-
Shillito, Matthew Robert
- Subjects
- *
DARKNETS (File sharing) , *COMPUTER crimes , *CRIMINAL law , *ANONYMITY , *ONLINE marketplaces , *GOVERNMENT policy on the Internet - Abstract
The Dark Web, and the technology which underpins it, is fundamentally changing how crime is conducted. It is an enabler of cross-border, truly international crime where each of the major actors, evidence, and the proceeds of crime can all be in different jurisdictions. The technologies utilised mask the identity of individuals and the nature of the crimes committed. It is these complexities, and law's inability to deal with them, which this paper will focus on. It critically analyses six intersecting and overlapping themes in order to highlight the technological challenges posed by the Dark Web to the criminal law. The paper argues that the current approaches, regulatory structures, legislation and investigative methods are all unfit for purpose. There is little to suggest the law is any closer to restricting Dark Web crime, particularly given a substantial amount of the challenges posed are unsolved traditional issues, in a new form. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
19. Regulating the GDPR: Perspectives from the United Kingdom.
- Author
-
McCausland, Hannah
- Subjects
CONFERENCES & conventions ,GENERAL Data Protection Regulation, 2016 ,DATA protection ,DATA security ,INTERNET privacy ,GOVERNMENT policy on the Internet - Published
- 2019
20. Clarifying Privacy, Property, and Power: Case Study on Value Conflict Between Communities.
- Author
-
Ema, Arisa, Osawa, Hirotaka, Saijo, Reina, Kubo, Akinori, Otani, Takushi, Hattori, Hiromitsu, Akiya, Naonori, Kanzaki, Nobutsugu, Kukita, Minao, Komatani, Kazunori, and Ichise, Ryutaro
- Subjects
FAN fiction ,ARTIFICIAL intelligence & ethics ,INTERNET privacy ,INTELLECTUAL property ,GOVERNMENT policy on the Internet - Abstract
This study analyzes the value conflict of a paper on fan fiction writing that used online fan fiction novels as a source to extract and filter sexual expressions from text. The boundaries of public and private information are ambiguous because users are not always aware of or have agreed to the fact that their content is to be used openly. The case was complicated by the fact that the use of these data by researchers violated an unconsciously infringed upon right of a vulnerable community with a weak legal position. This paper describes the debate on this topic among researchers from engineering and humanities fields on whether the purpose of the research was ethically acceptable; how the systems can be embedded in ethical values; and what ethical, legal, social, and educational lessons are appropriate for governance of artificial intelligence (AI). Our analysis aimed not only to clarify the abstract concept of privacy but also to make changes to the submission guidelines for authors. We hope that our analysis contributes to the governance of ethical AIs and AI ethics on handling sensitive aspects of online activities. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
21. National Internet Defense--Small States on the Skirmish Line.
- Author
-
STAPLETON-GRAY, ROSS and WOODCOCK, WILLIAM
- Subjects
- *
GOVERNMENT policy on the Internet , *CYBERTERRORISM , *INTERNET & politics , *COMPUTER security , *INTERNATIONAL relations ,RUSSIAN foreign relations, 1991- ,HISTORY of Georgia (Republic) - Abstract
The article discusses defense against internet attacks at the national level, focusing on the challenges faced by smaller nation-states. Although the internet is essentially global and borderless in many respects, significant sections of it are under the discretionary control of national governments. This leads to the possibility of cyberwar, where nations attack one another's sections of the internet. Two instances where this appears to have happened are described, both of which are said to involve Russian aggression against smaller neighboring states. An attack against Estonia in 2007, and another against Georgia in 2008, are described.
- Published
- 2011
- Full Text
- View/download PDF
22. Walls of silence.
- Subjects
- *
POLITICAL persecution , *FREEDOM of expression , *GOVERNMENT policy on the Internet , *FIREWALLS (Computer security) - Abstract
The article examines the increasing repression of free expression online by governments. According to the group Freedom House, efforts to control speech intensified in 30 of the 70 nations it monitors. One of the strategies employed by governments is suspending Internet services. Also noted is the significance of the national firewall of China that blocks access to foreign social media and other sources of information.
- Published
- 2021
23. AFFORDABLE BROADBAND: FCC Could Improve Performance Goals and Measures, Consumer Outreach, and Fraud Risk Management.
- Author
-
Von Ah, Andrew
- Subjects
BROADBAND communication systems ,GOVERNMENT policy on the Internet ,LOW-income consumers ,HOUSEHOLDS - Abstract
The article discusses a U.S. Government Accountability Office (GAO) study on the Affordable Connectivity Program launched by the Federal Communications Commission (FCC) in December 2021 to help low-income households afford broadband. Topics include an assessment of the FCC program efforts in establishing performance goals and measures, conducting outreach and managing fraud risks, the growth in the number of subscribers to the FCC program since its launch, and the recommendations made by GAO.
- Published
- 2023
24. Digital politics: internet and democracy in Africa.
- Author
-
Evans, Olaniyi
- Subjects
- *
INTERNET , *DEMOCRACY , *INTERNET usage monitoring , *GOVERNMENT policy on the Internet , *POLITICAL communication - Abstract
Purpose The purpose of this paper is to investigate the relationship between internet use and democracy in Africa. It examines the non-linearities and causality between the two variables in the short and long run for 38 countries in Africa.Design/methodology/approach The study is empirical. It uses pooled mean group and causality tests for the sample of 38 African countries.Findings The panel long-run and short-run estimates show evidence of significant non-linear relationship between internet usage and democracy. While internet usage is significantly and positively related to democracy, squared internet usage is significantly but positively related. This suggests that internet usage increases with the decrease of democracy, but after a certain level of internet usage which is the turning point, democracy starts to increase. Additionally, there is uni-directional causality from internet usage to democracy. However, a bi-directional causality exists between squared internet usage and democracy.Research limitations/implications The empirical evidence from this study suggests that internet usage and democracy are highly interrelated to each other in Africa. The findings support that at the macro level, Africa is moving toward a new stage, where internet will lead to improved levels of democracy and digital politics.Practical implications Remarkably, the paper shows that democracy displays a quadratic relationship with internet usage. As a whole, the findings indicate a U-shaped pattern: democracy decreases with internet usage, stabilizes, and then increases. In other words, internet usage increases with the decrease of democracy, but after a certain level of internet usage which is the turning point, democracy starts to increase.Social implications Many African Governments that have frequently imposed restrictions on internet and social media need to stop. The decline in democracy as internet usage increases may be explained by more severity of these restrictions. However, the findings support that at the macro level, Africa is moving toward a new stage, where internet will lead to improved levels of democracy and digital politics.Originality/value Contrary to previous conceptual papers, the current study empirically investigates the causality between internet and democracy in 38 African countries. The findings indicate a U-shaped pattern: democracy decreases with internet usage, stabilizes, and then increases. In other words, internet usage increases with the decrease of democracy but after a certain level of internet usage which is the turning point, democracy starts to increase. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
25. Chapter 976: The Battle for the Open Internet: Can California Salvage Net Neutrality?
- Author
-
Reid, Camille
- Subjects
- *
NETWORK neutrality , *GOVERNMENT policy on the Internet , *INTERNET traffic , *INTERNET service providers , *TELECOMMUNICATION policy - Published
- 2019
26. Build the (Fire)Wall! Potential Dangers to Internet Freedom Under the Trump Administration.
- Author
-
Perri, Maura K.
- Subjects
CONSTITUTIONAL law ,GOVERNMENT policy on the Internet ,FREEDOM of information - Abstract
The article discusses how the internet, by generating new spaces for discourse, has produced novel types of speech that also warrant protection from governmental regulation. It discusses how the First Amendment provides that Congress shall make no law to prevent freedom of speech. It discusses President Donald Trump, has tried to prevent online criticism of his administration, but has also made statements and taken actions for governmental control of internet activity.
- Published
- 2019
27. REGULATING THE INTERNET OF THINGS: DISCRIMINATION, PRIVACY, AND CYBERSECURITY IN THE ARTIFICIAL INTELLIGENCE AGE.
- Author
-
TSCHIDER, CHARLOTTE A.
- Subjects
- *
INTERNET of things , *GOVERNMENT regulation , *ARTIFICIAL intelligence laws , *INTERNET security laws , *RIGHT of privacy , *DISCRIMINATION (Sociology) , *GOVERNMENT policy on the Internet , *EUROPEAN Union law - Abstract
The field of consumer Internet of Things (IoT) has exploded as business and researchers have sought to not only develop Internetconnected products but also define the common structure in which IoT devices will operate, including technological standards and responsive architectures. Yet, consumer IoT continues to present a host of potential risks to consumers, cascading from the multidimensional nature of IoT devices: IoT combines well-known consumer products with cutting-edge infrastructures including big data solutions, distributed data storage or "cloud," and artificial intelligence (AI) utilities. The consumer device is no longer only the product, it is the product, the data, the algorithms, and the infrastructure. Consumer products have shifted from analog to connected technologies, introducing new risks for consumers related to personal privacy, safety issues, and potential for discriminatory data. Broad, ubiquitous data collection, internet connectivity, predictive algorithms, and overall device functionality opacity threaten to undermine IoT market benefits by causing potential consumer injury: broad unfairness and disparate impact, data breaches, physical safety issues, and property damage. Existing regulatory regimes have not anticipated these damages to effectively avoid injury, and it is yet unknown how existing products liability, common law civil recovery under contracts or torts schemes, and due process procedures will apply to these products and the data they process. This Article explores the technology and market of IoT, potential consumer impacts resulting from a lack of consistent and complete legal framework, whether IoT regulation is appropriate, and how the United States can balance market needs for innovation with consistent oversight for IoT manufacturers and distributors. [ABSTRACT FROM AUTHOR]
- Published
- 2018
28. BEYOND INSTRUMENTALISM: A SUBSTANTIVIST PERSPECTIVE ON LAW, TECHNOLOGY, AND THE DIGITAL PERSONA.
- Author
-
Pasquale, Frank and Cockfield, Arthur J.
- Subjects
TECHNOLOGY & law ,INTELLECTUAL property ,TECHNOLOGY & society ,INTERNET laws ,GOVERNMENT policy on the Internet - Abstract
Law and technology matters have traditionally been researched in discrete categories such as intellectual property (e.g., copyright, patent, or trademark) or intermediary liability and responsibility (e.g., secondary liability and telecommunications regulation). In the last two decades, however, academics have studied the broader interaction between law and technology across legal fields. This Article examines progress to date and discusses two distinct perspectives on law and technology. The dominant approach has been an instrumentalist one that treats technology as a tool for individuals to use while downplaying its broader social implications. However, the fields of philosophy of technology, science and technology studies, and social studies of science are now mature enough to support a rival approach grounded in a deep understanding of the nature--rather than the results--of technological change. This substantivist approach suggests analytical principles to refine and improve technology law and policy in ways that rival, instrumentalist approaches have neglected. For instance, substantivist commitments support a law and technology construct called a "digital persona" to emphasize the need for laws and policies to promote autonomy within the online world. By contrasting instrumentalist and substantivist approaches, we demonstrate new ways to integrate ethics, policy, and law in the digital age. [ABSTRACT FROM AUTHOR]
- Published
- 2018
29. PUSH IT TO THE (CONSTITUTIONAL) LIMIT: STRENGTHENING THE NATIONAL SECURITY AGENCY'S SECTION 702 SURVEILLANCE PROGRAM.
- Author
-
PURCE, GAMES
- Subjects
MASS surveillance ,ELECTRONIC surveillance ,NATIONAL security ,GOVERNMENT policy on the Internet ,LAW - Abstract
The article discusses the authority of the U.S. National Security Agency (NSA) to perform surveillance activities under Section 702 of the Foreign Intelligence Surveillance Amendments Act (FAA). Topics discussed include the electronic foreign surveillance function of the NSA, upstream Internet collection, and reasons why the NSA should reintroduce "About" communications collection.
- Published
- 2018
30. SAY THIS, NOT THAT: GOVERNMENT REGULATION AND CONTROL OF SOCIAL MEDIA.
- Author
-
Brown, Nina I. and Peters, Jonathan
- Subjects
SOCIAL media laws ,FAKE news ,GOVERNMENT policy on the Internet ,PREVENTION - Published
- 2018
31. MATHEMATICAL ALGORITHM FOR PROCESSING MEASUREMENT RESULTS OF INTERNET ACCESS SERVICE IN THE SCOPE OF NET NEUTRALITY.
- Author
-
Smirnova, I., Lipenbergs, E., and Bobrovs, V.
- Subjects
- *
INTERNET access , *NETWORK neutrality , *INTERNET service providers , *GOVERNMENT policy on the Internet - Abstract
Since Regulation (EU) 2015/2120 of the European Parliament and of the Council came into force, Internet service providers have to fulfill various additional requirements in order to guarantee access to the open internet and provide transparent information to the end-users. Of the utmost importance is to ensure achievable, meaningful and comparable results of the internet quality indicators, particularly upload and download speed values. Regulation (EU) 2015/2120 stipulates that specific speeds should be indicated in the contracts: for fixed internet access service those are maximum, minimum, normally available and advertised speed and for mobile internet access service - estimated maximum and advertised speed. However, there are no common methods put in place to calculate required speed indicators that can lead to a large amount of noncomparable and unreviewable information and create difficulties for internet providers to describe quality indicators. Within the framework of the present research, a mathematical estimation algorithm has been elaborated and applied in order to ensure that required quality parameters are represented objectively and that they are intercomparable among different internet service providers. Unified calculation principle would foster end-user awareness of the meaning of quality indicators and also of the quality of received internet services. It would also facilitate the indication of the required information for internet service providers. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
32. The limits of (digital) constitutionalism: Exploring the privacy-security (im)balance in Australia.
- Author
-
Mann, Monique, Daly, Angela, Wilson, Michael, and Suzor, Nicolas
- Subjects
- *
GOVERNMENT policy on the Internet , *INTERNET governance , *INTERNET security , *TELECOMMUNICATION , *HUMAN rights - Abstract
This article explores the challenges of digital constitutionalism in practice through a case study examining how concepts of privacy and security have been framed and contested in Australian cyber security and telecommunications policy-making over the last decade. The Australian Government has formally committed to ‘internet freedom’ norms, including privacy, through membership of the Freedom Online Coalition (FOC). Importantly, however, this commitment is non-binding and designed primarily to guide the development of policy by legislators and the executive government. Through this analysis, we seek to understand if, and how, principles of digital constitutionalism have been incorporated at the national level. Our analysis suggests a fundamental challenge for the project of digital constitutionalism in developing and implementing principles that have practical or legally binding impact on domestic telecommunications and cyber security policy. Australia is the only major Western liberal democracy without comprehensive constitutional human rights or a legislated bill of rights at the federal level; this means that the task of ‘balancing’ what are conceived as competing rights is left only to the legislature. Our analysis shows that despite high-level commitments to privacy as per the Freedom Online Coalition, individual rights are routinely discounted against collective rights to security. We conclude by arguing that, at least in Australia, the domestic conditions limit the practical application and enforcement of digital constitutionalism’s norms. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
33. The Internet as a global good: UNESCO’s attempt to negotiate an international framework for universal access to cyberspace.
- Author
-
Pohle, Julia
- Subjects
- *
CYBERSPACE , *INTERNET governance , *CONSTITUTIONALISM , *GOVERNMENT policy on the Internet , *HUMAN rights - Abstract
The article analyzes one of the earliest intergovernmental initiatives regarding Internet constitutionalism. Based on an analytical framework that combines argumentative discourse analysis with elements from actor–network theory, it assesses the actors and discourses involved in the preparation of an international recommendation on universal access to the Internet, adopted by the United Nations Educational, Scientific, and Cultural Organization (UNESCO) in 2003. During the contentious negotiations, UNESCO had to find a balance between the divergent positions of its member states and to account for the different levels of technological development amongst them. By retracing the performative and discursive struggles that UNESCO had to face to reach consensus, the article contributes to the general understanding of ideas and practices behind Internet policy making in international settings. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
34. Internet Public Policy Themes: A Literature Review.
- Author
-
Kashani, Behzad Hassannezhad and Kasmani, Akbar Nasrollahi
- Subjects
CYBERSPACE ,GOVERNMENT policy on the Internet - Abstract
The current paper aims to present a literature review for the researches conducted on internet public policy themes and provides a classification scheme for future research agenda. This research conducts a literature review based on the studies published in English and in a peer-reviewed journal from 1979 to 2015. Simple criterion method was used to find articles. 427 articles identified in 267 academic journals. All these articles were analyzed by year of publication, number of articles in the selected journal and area topics. This extended literature review provides an exhaustive and valuable source for future internet public policy research for practitioners and scholars by presenting a comprehensive list of references. Although, part of this article was published by (Kashani & Kasmani, 2018), the references listing associated with each internet public policy issue is original. [ABSTRACT FROM AUTHOR]
- Published
- 2018
35. Global Perspectives on Internet Regulation.
- Author
-
Ben-Jacob, Marion G.
- Subjects
- *
GOVERNMENT policy on the Internet , *INTERNET users - Abstract
The Internet is a powerful tool that is used for professional and personal reasons. In order to maximize its benefits for all people, ethical behavior needs to demonstrated by all users. For the Internet to be of supreme aid to people worldwide, regulations from different countries need to be synchronized, at least to some degree. This paper examines computers, the Internet, and the ways it is incorporated into different fields. It discusses the roles of the Internet Society and the Internet Corporation for Assigned Names and Numbers (ICANN), and where things stand politically today with their responsibilities. It delves into detail with regard to the Internet regulation of several countries and then provides a summary table for the regulation of many other countries worldwide. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
36. Building Internet policy on history: lessons of the forgotten 1981 network neutrality debate.
- Author
-
Mailland, Julien
- Subjects
- *
GOVERNMENT policy on the Internet , *INTERNET users , *NETWORK neutrality policy , *MINITEL (Videotex system) - Abstract
The US-centric Internet history situates the start of the net neutrality debate around 2003, but a look at global Internet histories indicates otherwise. To wit: this case study of the forgotten net neutrality struggle that took place in France between 1979 and 1982. In 1978, the French PTT started "Minitel," the world's first successful mass market online ecosystem. The Minitel experience prefigured most of the legal, economic, industrial, and other public policy issues we face today in cyberspace. The concept of network neutrality was explicitly debated by administrators and regulators – only to be rejected upon pressure from the incumbent print press industry, which foresaw its own impending demise and did all it could to hinder the development of open and neutral digital fora. Minitel has been derided by many scholars and policy wonks as the epitome of statism that precluded real and meaningful innovation from emerging from the edges. This article demonstrates instead that hindrances to net neutrality in France in the early 1980s were the result of private sector lobbying, not of PTT administrators. It provides a counter-narrative grounded in historical data, to fuel further thinking about what policies will better support private innovation over modern online platforms. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
37. FREEDOM OF EXPRESSION IN THE INTERNET - THE ROLE OF STATES, CITIZENS AND INTERMEDIARIES: CASE STUDY OF THE SLOVAK REPUBLIC.
- Author
-
PATAKYOVÁ, MÁRIA
- Subjects
FREEDOM of expression ,GOVERNMENT policy on the Internet ,HUMAN rights ,CRIME prevention ,GOVERNMENT policy ,SOCIAL history - Abstract
Copyright of European Review of Public Law is the property of European Public Law Organization and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2018
38. Stockholm syndrome and neuroscience: Two young Chinese artists, the Great Firewall and the internet.
- Author
-
Guest, Luise
- Subjects
21ST century Chinese art ,ART & the Internet ,GOVERNMENT policy on the Internet ,ARTISTIC style ,AESTHETICS - Abstract
The article describes the works of young Chinese Miao Ying and Lu Yang from the White Rabbit Collection. It explores how their works demonstrate the generational shift among artists who work in a variety of medium and style. The influence of the Internet and the Great Firewall on their works is discussed, as well as the allegations that Miao glorifies the pirated aesthetics of the Chinternet.
- Published
- 2019
39. Public Access Web Information Systems: Lessons from the Internet EDGAR Project.
- Author
-
Kambil, Ajit and Ginsburg, Mark
- Subjects
- *
ACCESS control of public records , *EDGAR (Information retrieval system) , *WORLD Wide Web , *GOVERNMENT policy on the Internet , *STOCK exchanges - Abstract
The article asserts that improving the dissemination of government data helps keep lines of communication open between corporations, governments, and the private sector. Governments collect, generate, and disseminate vast amounts of information. Electronic Data Gathering, Analysis, and Retrieval (EDGAR) system of the U.S. Securities and Exchange Commission is responsible for regulating financial issuers and market makers, and mandating various financial disclosures critical to investor decision making. EDGAR on the Internet (EOI) initiative sought to provide widespread access to these government documents and demonstrate the Internet as a viable low-cost information distribution mechanism for public data access. Incomplete information or data within legacy applications limits the ability of Web information system designers to add value to data by automatically extracting key information. EOI clearly demonstrates the capacity of the Internet to effectively disseminate government information in a timely and inexpensive way.
- Published
- 1998
- Full Text
- View/download PDF
40. Feds Hate the Web.
- Author
-
Freeman, James
- Subjects
FEDERAL government of the United States ,TELECOMMUNICATION policy ,GOVERNMENT policy on the Internet ,UNIVERSAL service (Telecommunication) ,DATA encryption ,DIGITAL currency - Abstract
The article discusses the subtle opposition of the U.S. federal government against electronic communication and its attempt to place the Internet into utility-style regulation. Topics discussed include the concept of universal service in network economy, the cost of wiring schools and libraries, and the major threat to the Internal Revenue Service due to encryption software and electronic money.
- Published
- 1997
41. WHERE THE SPLINTERNET THRIVES.
- Author
-
Roberts, Jeff John
- Subjects
INTERNET censorship ,WORLD Wide Web ,TECHNOLOGICAL innovations ,ONLINE social networks ,WEBSITES ,GOVERNMENT policy ,GOVERNMENT policy on the Internet - Abstract
The article focuses on increased censorship of the Internet. It states that governments have tried to break the World Wide Web into a group of national Internets and mentions technological innovations have allowed countries to use censorship tools first deployed by China. It comments on the role that social network sties Twitter and Facebook played in fueling political uprisings during events like the Arab Spring which has resulted in governments trying to control websites.
- Published
- 2019
42. E-GOVERNACE TO FIGHT SEVERE WEATHER: THE ROMANIAN CASE.
- Author
-
IULIAN, FURDU
- Subjects
SEVERE weather forecasting ,INFORMATION technology ,GOVERNMENT policy on the Internet - Abstract
The aim of this paper is to describe and analyze last years romanian policies and e-government solutions in fighting extreme weather, their impact on the population, and future trends. IT warning solutions for severe weather are also presented. [ABSTRACT FROM AUTHOR]
- Published
- 2017
43. Microdeviation: Observations on the Significance of Lesser Harms in Shaping the Nature of Cyberspace.
- Author
-
Popham, James
- Subjects
- *
COMPUTER crimes , *CYBERCRIMINALS , *SOCIAL impact , *NORMALIZATION (Sociology) , *GOVERNMENT policy on the Internet , *TELECOMMUNICATION policy - Abstract
This article argues that application of the term “cybercrime” is overly expansive and by this nature exclusive of lesser deviancies, or “microdeviations.” These relatively minor deviant actions are frequently encountered online but are ineffectively checked by regulation. Their banal nature contributes to normalization, informing manufactured uncertainty and moral panic. Several examples of microdeviation are explored emphasizing the intersection of normalization and anxiety and the potential impact on digital spaces. While this issue is only part of the greater societal impact of informationalization, it nonetheless raises important questions as the global north progresses toward harmonizing Internet regulations. [ABSTRACT FROM PUBLISHER]
- Published
- 2018
- Full Text
- View/download PDF
44. The politicization of the Internet's Domain Name System: Implications for Internet security, universality, and freedom.
- Author
-
Bradshaw, Samantha and DeNardis, Laura
- Subjects
- *
INTERNET domain naming system , *GOVERNMENT policy on the Internet , *INTERNET & politics , *INTERNET security , *FREEDOM of expression , *INTELLECTUAL property - Abstract
One of the most contentious and longstanding debates in Internet governance involves the question of oversight of the Domain Name System (DNS). DNS administration is sometimes described as a "clerical" or "merely technical" task, but it also implicates a number of public policy concerns such as trademark disputes, infrastructure stability and security, resource allocation, and freedom of speech. A parallel phenomenon involves governmental and private forces increasingly altering or co-opting the DNS for political and economic purposes distinct from its core function of resolving Internet names into numbers. This article examines both the intrinsic politics of the DNS in its operation and specific examples and techniques of co-opting or altering DNS' technical infrastructure as a new tool of global power. The article concludes with an analysis of the implications of this infrastructure-mediated governance on network security, architectural stability, and the efficacy of the Internet governance ecosystem. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
45. FREEDOM AND AFFORDANCES OF THE NET.
- Author
-
GRABER, CHRISTOPH B.
- Subjects
CIVIL rights ,GOVERNMENT policy on the Internet ,SOCIOLOGICAL jurisprudence - Abstract
This Article is about the relationship between technology and society in fundamental rights theory. So far, the discussion about law and technology has generally been one-directional within the most relevant branches of the social sciences; scholars of the law have been treating technology as a black box when conducting their analyses or developing their theories. In turn, science and technology studies have considered law and regulation as a closed book, which is unsatisfactory as well. Reductionist and compartmentalized theorizing is particularly problematic when it comes to conceiving a fundamental rights theory that is able to cope with challenges of the Internet. Guided by Niklas Luhmann's autopoietic systems theory, this Article offers novel perspectives that aim at theoretically explaining how affordances can be conceptualized within constitutional rights theory, with the focus on the freedom of the Internet. [ABSTRACT FROM AUTHOR]
- Published
- 2018
46. Understanding Internet Shutdowns: A Case Study from Pakistan.
- Author
-
WAGNER, BEN
- Subjects
GOVERNMENT policy on the Internet ,COMMUNICATION ,GOVERNMENT shutdown ,AUTHORITARIANISM - Abstract
This article provides an overview of Internet shutdowns in Pakistan, which have become an increasingly common phenomenon, with 41 occurring between 2012 and 2017. It argues that to understand how shutdowns became normalized in Pakistan, it is necessary to look at the specific dynamics of how the shutdowns take place. In doing so, the concept of communicative ruptures develops to better understand intentional government shutdowns of communications. The article argues that strategic prevention of mobilization is key for short-term shutdowns, whereas long-term shutdowns can be better explained by looking at disciplinary mechanisms and denying the existence of "others." The article then discusses Internet shutdowns in the wider context of authoritarian practices before concluding with the urgent need for further research on this topic, both in Pakistan and beyond. [ABSTRACT FROM AUTHOR]
- Published
- 2018
47. Transforming Threats to Power: The International Politics of Authoritarian Internet Control in Iran.
- Author
-
MICHAELSEN, MARCUS
- Subjects
INTERNATIONAL relations ,AUTHORITARIANISM ,GOVERNMENT policy on the Internet ,COMMUNICATION - Abstract
Authoritarian Internet control is generally explained by domestic power preservation: to curtail dissent within their borders, authoritarian regimes censor, monitor, and shape online communications. Yet this focus neglects important external factors. As a global communication technology, the Internet carries strategic and normative interests of competing international actors. This article investigates the influence of international politics on practices of Internet surveillance and censorship. Using the case of Iran, I analyze how opposition to the West, and particularly to the United States, led the Iranian state to perceive the Internet as a strategic battleground for regime stability. I argue that external threats in the form of democracy promotion, cyberattacks, and sanctions have created conditions enabling the Iranian state to advance and justify capabilities for censorship and surveillance. They have also pushed the regime to build a "national Internet" that is more resistant to outside influence and open to state control. Authoritarian practices are thus produced in international struggles over the use, content, and infrastructure of digital technologies. [ABSTRACT FROM AUTHOR]
- Published
- 2018
48. The Contestation and Shaping of Cyber Norms Through China's Internet Sovereignty Agenda.
- Author
-
MCKUNE, SARAH and AHMED, SHAZEDA
- Subjects
COMPUTER crimes ,GOVERNMENT policy on the Internet ,SOVEREIGNTY ,HUMAN rights - Abstract
This article focuses on China as the state dedicating the most coordinated, strategic, and consistent efforts to promoting an Internet sovereignty agenda at home and abroad. At its core, the Chinese case for Internet sovereignty envisions the regime's absolute control over the digital experience of its population, with a focus on three dimensions: Internet governance, national defense, and internal influence. Through its guidance of the Shanghai Cooperation Organization and creation of the World Internet Conference, normative collaborations with Russia and other states, and promotion of Internet sovereignty as benefiting developing states in particular, the Chinese government is advocating for global recognition of the norm over the long term. Yet growing international support for Internet sovereignty could undermine multistakeholderism, transparency, accountability, and human rights, sparking new flash points in ongoing contestation over digital norms. [ABSTRACT FROM AUTHOR]
- Published
- 2018
49. Information, Security, and Authoritarian Stability: Internet Policy Diffusion and Coordination in the Former Soviet Region.
- Author
-
KERR, JACLYN A.
- Subjects
INFORMATION technology security ,AUTHORITARIANISM ,GOVERNMENT policy on the Internet ,POLICY diffusion ,INTERNET content - Abstract
This article examines Internet policies across the former Soviet region, showing that many of the region's nondemocratic regimes have adopted similar approaches to control Internet content and use within their territories. The implication that specific control practices are diffusing or being coordinated on within the region is substantiated by close examination of particular approaches and their origins. While these states have made relatively limited use of static content censorship, alternative, less overt controls have spread across the region. Tracing the roles of diffusion and coordination mechanisms, the article demonstrates how, even as overall Internet repression levels have increased, the particular legal frameworks, technical systems, and other control practices used have been deeply influenced by complex regional interdependencies. [ABSTRACT FROM AUTHOR]
- Published
- 2018
50. Technology and conflict: Group processes and collective violence in the Internet era.
- Author
-
Moule, Richard, Decker, Scott, and Pyrooz, David
- Subjects
VIOLENCE ,VIOLENCE prevention ,INTERNET ,GOVERNMENT policy on the Internet ,INTERNET & society ,GOVERNMENT policy - Abstract
The origins and escalation of group violence are central to the criminological enterprise. Explanations of collective violence were developed when face-to-face interactions constituted the primary form of social exchange. The Internet and related technologies provide new formats for social interaction and collective behaviors and have become increasingly salient for both of these topics. Technology alters the communication capacities of individuals and groups through the dissemination of rumor and gossip and is closely tied to inter- and intra-group relations. We illustrate the evolving landscape of group process and collective violence by focusing on street gangs and the nascent literature on gangs' use of the Internet. Next, we provide an expanded model of the cycle of gang violence, one that emphasizes the correlates and contingencies of the diffusion and escalation of conflict and more explicitly recognizes the growing importance of technology for violence. Using data from street offenders and gang members in five US cities, we provide an initial empirical assessment of core theoretical propositions in the model. We conclude by discussing the implications for future research on the relationship between technology and violence. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.