The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.03 - May-June (2013 vol.17)
pp: 10-17
M. Christopher Riley , American University
ABSTRACT
Internet governance once took place through a social contract: good behavior from all parties produced a ripe environment for invention and innovation, and generated tremendous worldwide benefits. Over time, an influx of money and power began to break the Internet's utopia, leading to crime, censorship, and fights over control. Internet governance now requires a complex system of checks and balances among users, businesses, and governments—and too great a power imbalance among these groups could undermine some policy goals in favor of others.
INDEX TERMS
Internet, Government policies, Privacy, Access control, Best practices, Computer security, Computer crime, abuse and crime involving computers, Internet, censorship, regulation, legal, use of power, abuse of power, privacy, security, public policy
CITATION
M. Christopher Riley, "Anarchy, State, or Utopia?: Checks and Balances in Internet Governance", IEEE Internet Computing, vol.17, no. 3, pp. 10-17, May-June 2013, doi:10.1109/MIC.2013.24
REFERENCES
1. L. Lessig, Code and Other Laws of Cyberspace, Basic Books, 2000.
2. P. Elmer-Dewitt, "First Nation in Cyberspace," Time Int'l,6 Dec. 1993.
3. M. Chris Riley and B. Scott, "Deep Packet Inspection: The End of the Internet as We Know It?" white paper, Free Press, Mar. 2009; www.freepress.net/filesDeep_Packet_Inspection_The_End_of_the_Internet_As_We_Know_It.pdf.
4. T.J. McIntyre, "Child Abuse Images and Cleanfeeds: Assessing Internet Blocking Systems," Research Handbook on Governance of the Internet, I. Brown ed., to appear, 2013; http://ucd-ie.academia.edu/TJMcIntyre/Papers/ 794093Child_Abuse_Images_and_Cleanfeeds_Assessing_Internet_Blocking_Systems.
5. I. Katz, "Web Freedom Faces Greatest Threat Ever, Warns Google's Sergey Brin," The Guardian,15 Apr. 2012; www.guardian.co.uk/technology/2012/apr/15 web-freedom-threat-google-brin.
6. J. Zittrain, The Future of the Internet — And How to Stop It, Yale Univ. Press, 2009.
7. B. van Schewick, , Internet Architecture and Innovation, MIT Press, 2012.
8. C. Sang-Hun, "Korea Policing the Net: Twist? It's South Korea," New York Times,12 Aug. 2012; www.nytimes.com/2012/08/13/world/asiacritics-see-south-korea-internet-curbs-as-censorship.html.
9. Internet Freedom Fact Sheet, US Dept. of State, 15 Feb. 2011; www.state.gov/r/pa/prs/ps/2011/02156623.htm.
10. B. Ray, "India: We Do Have the Blackberry Encryption Keys/RIM: Er, I Think You'll Find You Don't," The Register,2 Aug. 2012; www.theregister.co.uk/2012/08/02/rim_keys_india .
11. N. Gaouette and B. Greeley, "US Funds Help Democracy Activists Evade Internet Crackdowns," Bloomberg,20 Apr. 2011; www.bloomberg.com/news/2011-04-20u-s-funds-help-democracy-activists-evade-internet-crackdowns.html.
33 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool