The Would-Be Technocracy: Evaluating Efforts to Direct and Control Social Change with Internet Protocol Design
This article discusses the shortcomings of value in design approach to protect human rights on the Internet. It argues that Internet protocols do not single handedly mitigate human rights on the Internet and in order to measure their impact, they need to be put in context. In other words, instead of...
Uloženo v:
| Vydáno v: | Journal of information policy (University Park, Pa.) Ročník 11; s. 376 - 402 |
|---|---|
| Hlavní autoři: | , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
Pennsylvania State University Press
01.12.2021
|
| Témata: | |
| ISSN: | 2381-5892, 2158-3897 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | This article discusses the shortcomings of value in design approach to protect human rights on the Internet. It argues that Internet protocols do not single handedly mitigate human rights on the Internet and in order to measure their impact, they need to be put in context. In other words, instead of design determinism, contextual analysis of Internet technologies that involve Internet protocols should take place. |
|---|---|
| AbstractList | This article discusses the shortcomings of value in design approach to protect human rights on the Internet. It argues that Internet protocols do not single handedly mitigate human rights on the Internet and in order to measure their impact, they need to be put in context. In other words, instead of design determinism, contextual analysis of Internet technologies that involve Internet protocols should take place. |
| Author | Badiei, Farzaneh Fidler, Bradley |
| Author_xml | – sequence: 1 givenname: Farzaneh surname: Badiei fullname: Badiei, Farzaneh organization: Yale Law School, New Haven, US – sequence: 2 givenname: Bradley surname: Fidler fullname: Fidler, Bradley organization: Stevens Institute of Technology, Hoboken, US |
| BookMark | eNqFkEtLAzEUhYNUsNb-BcleZsxjnuJG26qFgoIVl0MmyXRSx2RIMkr_vTNUuhCkd3Pu4nz3cc7BSBstAbjEKIwpia-3SlemNY0KMQ4JIjhENE1OwJjgOAtolqejvqcZDuIsJ2dg6twW9RXFCUXZGOh1LeG76RoR3Eu4lrzWhlvGdzdw8cWajnmlN3BRVcZ6B72Bc2Ul95BpAWdGe2sa-Gq4Yg2c1UxvJPxWvoZL7aXV0sMXa7zhvWkundroC3BascbJ6a9OwNvDYj17ClbPj8vZ3SrgFEc-oLjKac4jXiapyPMkR2WZszTqNcoISSsUU8F4KjClmcRMxCJmgnLCShohwekE3O7ncmucs7IquPL9L8PFTDUFRsUQX3GIr8C4GOIrhvh6PPmDt1Z9Mrs7Dl7twa3zxh6of93R3i26D9m1VjpXuJYfW_IDNribjQ |
| CitedBy_id | crossref_primary_10_21615_cesder_7666 crossref_primary_10_4000_terminal_8221 |
| Cites_doi | 10.17487/rfc0819 10.17487/rfc0827 10.1002/poi3.190 10.1353/tech.2018.0090 10.17487/rfc1052 10.1177/001041407701000305 10.1353/tech.2014.0096 10.1007/978-94-007-6970-0_17 10.1057/jit.2015.5 10.1080/1369118X.2012.659199 10.1080/13600869.2013.801589 10.17487/rfc1105 10.1002/j.1538-7305.1948.tb01338.x 10.17487/RFC8280 10.1016/j.techsoc.2014.05.001 10.1145/2804228 |
| ContentType | Journal Article |
| Copyright | This work is licensed under Creative Commons Attribution CC-BY-NC-ND. |
| Copyright_xml | – notice: This work is licensed under Creative Commons Attribution CC-BY-NC-ND. |
| DBID | JFNAL AAYXX CITATION |
| DOI | 10.5325/jinfopoli.11.2021.0376 |
| DatabaseName | JSTOR Journals Open Access CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | CrossRef |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Government Library & Information Science Law |
| EISSN | 2158-3897 |
| EndPage | 402 |
| ExternalDocumentID | 10_5325_jinfopoli_11_2021_0376 10.5325/jinfopoli.11.2021.0376 |
| GroupedDBID | 4S 5VS AAFWJ ABIFP ACGFO ADALM ADBBV AEGXH AEUPB AFPKN AIAGR ALMA_UNASSIGNED_HOLDINGS ARCSS BCNDV EBS EJD GROUPED_DOAJ JFNAL KQ8 M~E OK1 RNS TUS UDIET ZWISI .4S H13 AAYXX CITATION |
| ID | FETCH-LOGICAL-c314t-31f939c4cb67d99690bb9a7490b48227f053dac7d1338e1ad5d5ad3c2ab340dc3 |
| ISICitedReferencesCount | 1 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000673436300003&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 2381-5892 |
| IngestDate | Sat Nov 29 06:48:05 EST 2025 Tue Nov 18 22:00:06 EST 2025 Thu May 29 13:17:24 EDT 2025 Tue Aug 02 12:39:43 EDT 2022 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Language | English |
| License | This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c314t-31f939c4cb67d99690bb9a7490b48227f053dac7d1338e1ad5d5ad3c2ab340dc3 |
| OpenAccessLink | http://dx.doi.org/10.5325/jinfopoli.11.2021.0376 |
| PageCount | 27 |
| ParticipantIDs | crossref_citationtrail_10_5325_jinfopoli_11_2021_0376 crossref_primary_10_5325_jinfopoli_11_2021_0376 jstor_primary_jinfopoli_11_2021_0376 dukeupress_spc_10_5325_jinfopoli_11_2021_0376 |
| PublicationCentury | 2000 |
| PublicationDate | 20211201 |
| PublicationDateYYYYMMDD | 2021-12-01 |
| PublicationDate_xml | – month: 12 year: 2021 text: 20211201 day: 1 |
| PublicationDecade | 2020 |
| PublicationTitle | Journal of information policy (University Park, Pa.) |
| PublicationYear | 2021 |
| Publisher | Pennsylvania State University Press |
| Publisher_xml | – name: Pennsylvania State University Press |
| References | Reidenberg, Joel. “Lex Informatica: The Formulation of Information Policy Rules through Technology.”Texas Law Review76 (1997): 553–593. Haigh, Thomas, and MarkPriestley. “Innovators Assemble: Ada Lovelace, Walter Isaacson, and the Superheroines of Computing.”Communications of the ACM58, no. 9 (2015): 20–27. 15. Latour and Woolgar. 20. Koops and Leenes. 50. Fidler. Hayek, Friedrich August. “The Use of Knowledge in Society.”American Economic Review35, no. 4 (1945): 519–30. 42. Keen. Pinch, Trevor, and FrankTrocco. Analog Days. Cambridge: Harvard University Press, 2004. DK Hostmaster. “Danish Act on Internet Domains.”https://www.dk-hostmaster.dk/en/danish- act-internet-domains. Accessed May 5, 2021. 12. Nissenbaum; Ackerman, Darrell, and Weitzner; Warnier, Dechesne, and Brazier, 431-445. 3. Mueller and Badiei. 55. Caesar et al. Rosen, Eric. Exterior Gateway Protocol (EGP): RFC 0827. Internet Engineering Task Force. 1982. https://www.rfc-editor.org/info/rfc827. Accessed May 5, 2021. 18. Koops and Leenes. 53. Cisco. 10. Hughes; Latour and Woolgar; Kranakis, Bijker, and Pinch; Pinch and Trocco. 11. Rice; Rogers. 41. Ibid. 44. Oever and Cath, 11. Westergard, Björn. “Do Computers Follow Rules Once Followed by Workers?”IEEE Annals of the History of Computing39, no. 4 (2017): 5–8. Internet Corporation for Assigned Names and Numbers (ICANN). “Bylaws for Internet Corporation for Assigned Names and Numbers.” Section 1.1.i, ICANN. https://www.icann.org/resources/pages/governance/bylaws-en/#article1. Accessed May 5, 2021. DK Hostmaster. Protocol Politics: The Globalization of Internet Governance. Cambridge, MA: MIT Press, 2009. 25. Zuboff. 54. IETF Meeting Proceeding: Internetworking Working Group. Hughes, Thomas Parke. Networks of Power: Electrification in Western Society, 1880–1930. Baltimore: Johns Hopkins University Press, 1983. 38. Ibid. 46. Rosen. 51. Rosen. Kranakis, Eda, BijkerWiebe, and TrevorPinch. Constructing a Bridge: An Exploration of Engineering Culture, Design, and Research in Nineteenth-Century France and America. Cambridge: MIT Press, 1997. Caesar, Matthew, DonaldCaldwell, NickFeamster, JenniferRexford, AmanShaikh, and Jacobusvan der Merwe. “Design and Implementation of a Routing Control Platform.” In Proceedings of the 2nd Conference on Symposium on Networked Systems Design & Implementation—Volume 2, 15–28. 2005. 47. Lougheed and Rekhter. Rogers, Everett. Communication Technology. New York: Simon and Schuster, 1986. 35. Mueller and Badiei. 65. Cerf. 57. Russell. Mueller, Milton L., and FarzanehBadiei. “Requiem for a Dream: On Advancing Human Rights via Internet Architecture.”Policy & Internet11, no. 1 (2019): 61–83. 52. Russell and Schafer; Fidler. Akin, William. Technocracy and the American Dream: The Technocrat Movement, 1900–1941. Berkley: University of California Press, 1977. Lessig, Lawrence. Code: And Other Laws of Cyberspace. 2nd ed. New York: Basic Books, 2009. Working Party on the Protection of Individuals with regard to the Processing of Personal Data. First Annual Report (Report no. XV/5025/97-final-EN corr). Brussels: WP3, European Commission, 1997. 5. Boyle; Shapin and Schaffer. Brand, Stewart. How Buildings Learn: What Happens After They're Built. New York: Penguin Random House, 1995. Zuboff, Shoshana. “Big Other: Surveillance Capitalism and the Prospects of an Information Civilization.”Journal of Information Technology30, no. 1 (2015): 75–89. Rice, Ronald. “Network Analysis and Computer-Mediated Communication Systems.” In Advances in Social Network Analysis: Research in the Social and Behavioral Sciences, edited by JosephGalaskiewicz and StanleyWasserman, 167. United Kingdom: Sage Publications, 1994. 6. Smith; Marx. 36. DeNardis, “Hidden Levers of Internet Control.” Abbate, Janet. “From ARPANET to Internet: A History of ARPA-Sponsored Computer Networks, 1966–1988.” PhD diss., University of Pennsylvania, 1994, https://repository.upenn.edu/dissertations/AAI9503730 (AAI9503730). Accessed May 5, 2021. 19. Cavoukian. 66. Harrenstein and White. Smith, Adam. An Inquiry into the Nature and Causes of the Wealth of Nations: In 2 Vol. London: Allason, 1819. 17. Working Party on the Protection of Individuals with regard to the Processing of Personal Data. Simon, Craig. “Launching the DNS War: Dot-Com Privatization and the Rise of Global Internet Governance.” PhD diss., University of Miami, 2006. http://scholarlyrepository.miami.edu/dissertations/2484. Accessed May 5, 2021. 48. Fidler. 33. Russell; Leiner et al. Handley, Mark. “Why the Internet Only Just Works.”BT Technology Journal24, no. 3 (2006): 120. Boyle, Robert. New Experiments Physico-Mechanicall, Touching the Spring of the Air, and Its Effect. Oxford, UK: Miles Flesher for Richard Davis, 1662. 45. Faraj, Kwon, and Watts, 185. Shapin, Steven, and SimonSchaffer. Leviathan and the Air-Pump: Hobbes, Boyle, and the Experimental Life. New Jersey: Princeton University Press, 2011. 63. Several hierarchical databases, such as ANSI SQL, were popular. 13. Bowker and Star. 58. Handley, 120. Mueller, Milton L. Ruling the Root: Internet Governance and the Taming of Cyberspace. Cambridge, MA: MIT Press, 2002. Su, Zaw-Sing, and JohnPostel. The Domain Naming Convention for Internet User Applications: RFC 819. Internet Engineering Task Force. 1982. https://www.rfc-editor.org/info/rfc819. Accessed May 5, 2021. Weber, Max. Economy and Society: An Outline of Interpretive Sociology. Vol. 1. Berkeley: University of California Press, 1978. 31. Kuhn. Bowker, Geoffrey, and SusanLeigh Star. Sorting Things Out: Classification and Its Consequences. Cambridge: MIT Press, 2000. IETF Meeting Proceeding: Internetworking Working Group. 1988, Reston, VA. https://www.ietf.org/proceedings/11.pdf. Accessed May 5, 2021. Bowers, Karen, and PhillGross, eds. Proceedings of the Twelfth Internet Engineering Task Force. March1989. https://www.ietf.org/proceedings/12.pdf. Accessed May 5, 2021. 64. Haigh and Priestley. Fidler, Bradley. “The Evolution of Internet Routing: Technical Roots of the Network Society.”Internet Histories3, no. 3–4 (2019): 364–87. 67. “Bylaws for Internet Corporation for Assigned Names and Numbers.” Vinsel, Lee. “You’re Doing It Wrong: Notes on Criticism and Technology Hype.” Medium. February1, 2021. https://sts-news.medium.com/youre-doing-it-wrong-notes-on-criticism-and-technology-hype-18b08b4307e5. Accessed May 5, 2021. Fidler, Bradley, and AndrewL. Russell. “Financial and Administrative Infrastructure for the Early Internet: Network Maintenance at the Defense Information Systems Agency.”Technology and Culture59, no. 4 (2018): 899–924. Sadowski, Jathan, and EvanSelinger. “Creating a Taxonomic Tool for Technocracy and Applying It to Silicon Valley.”Technology in Society38 (2014): 161–68. 49. McQuillan and Walden. Faraj, Samer, DowanKwon, and StephanieWatts. “Contested Artifact: Technology Sensemaking, Actor Networks, and the Shaping of the Web Browser.”Information Technology & People17, no. 2 (2004): 185. Harrenstein, Ken, and VicWhite. NICNAME/WHOIS, RFC 812. Internet Engineering Task Force. 1982. https://tools.ietf.org/html/rfc812. Accessed May 5, 2021. 4. Shannon, 379–423. 68. This law has been mentioned on the .DK registry website; “Danish Act on Internet Domains.” Shannon, Claude. “A Mathematical Theory of Communication.”The Bell System Technical Journal27, no. 3 (1948): 379–423. Anttiroiko, Ari-Veikko. “Castells’ Network Concept and Its Connections to Social, Economic and Political Network Analyses.”Journal of Social Structure16, no. 11 (2015): 1–18. Kuhn, Thomas. The Structure of Scientific Revolution. 4th ed. Chicago: University of Chicago Press, 2012. Putnam, Robert. “Elite Transformation in Advanced Industrial Societies: An Empirical Assessment of the Theory of Technocracy.”Comparative Political Studies10, no. 3 (1977): 383–412. 2. Ten Oever and Cath. 21. Ibid. 23. Akin; Sadowski and Selinger. 29. Lessig. Keen, Steve. Debunking Economics: The Naked Emperor Dethroned?London: Zed Books Ltd., 2011. Cerf, Vint. IAB Recommendations for the Development of Internet Network Management Standards: RFC 1052. Internet Engineering Task Force. 1988. https://doi.org/10.17487/RFC1052. Accessed May 5, 2021. Leiner, Barry M., VintonG. Cerf, DavidD. Clark, RobertE. Kahn, LeonardKleinrock, DanielC. Lynch, JonPostel, LarryG. Roberts, and StephenWolff. “Brief History of the Internet.”Internet Society, 1997. https://www.internetsociety.org/internet/history-internet/brief-history-internet/. Accessed May 5, 2021. 22. Hayek; Putnam. 26. Vinsel. Ackerman, Mark, TrevorDarrell, and DanielJ. Weitzner. “Privacy in Context.”Human–Computer Interaction16, no. 2–4 (2001): 167–76. Koops, Bert-Jaap, and RonaldLeenes. “Privacy Regulation Cannot Be Hardcoded. A Critical Comment on the ‘Privacy by Design’ Provision in Data-Protection Law.”International Review of Law, Computers & Technology28, no. 2 (2014): 159–71. Lougheed, Kirk, and YakovRekhter. Border Gateway Protocol (BGP): RFC 1105. Internet Engineering Task Force. 1989. https://www.rfc-editor.org/info/rfc1105. Accessed May 5, 2021. Veblen, Thorstein. The Place of Science in Modern Civilisation and Other Essays. New York: B.W. Huebsch, 1919. 62. Mueller. Marx, Karl. Capital: A Critique of Political Economy. Translated by DavidFernbach. London: Penguine, 1990. Cavoukian, Ann. “Privacy by Design: The 7 Foundational Principles.”Information and Privacy Commissioner of Ontario, Canada. Last revised January1, 2011. https://iapp.org/media/pdf/resource_center/pbd_implement_7found_principles.pdf. Accessed May 5, 2021. Cisco. “Cisco Systems Customer Service Newsletter.”1989. https://weare.cisco.com/c/dam/r/weare/assets/files/packet-winter89.pdf. Accessed May 5, 2021. 14. Ibid., 32. Russell, Andrew. Open Standards and the Digital Age. Cambridge: Cambridge University Press, 2014. Ten Oever , Niels, and CorrineCath. Research into Human Rights Protocol Considerations: RFC8280. Internet Engineering Task Force. 2017. https://doi.org/10.17487/RFC8280. Accessed May 5, 2021. 27. Mueller and Badiei. 37. Ten Oever and Cath. Russell, Andrew, and ValerieSchafer. “In 2022070120324238300_r5 (2022070120324238300_r45) 1986 (2022070120324238300_r43) 1997; 76 2022070120324238300_r1 (2022070120324238300_r25) 1983 2022070120324238300_r61 (2022070120324238300_r36) 1990 2022070120324238300_r9 (2022070120324238300_r62) 2015; 30 2022070120324238300_r13 2022070120324238300_r57 (2022070120324238300_r37) 1977; 1 2022070120324238300_r11 2022070120324238300_r55 2022070120324238300_r12 2022070120324238300_r15 2022070120324238300_r16 (2022070120324238300_r42) 1977; 10 (2022070120324238300_r4) 2015; 16 (2022070120324238300_r40) 2009 (2022070120324238300_r8) 1995 (2022070120324238300_r2) 2001; 16 (2022070120324238300_r3) 1977 (2022070120324238300_r29) 2014; 28 (2022070120324238300_r31) 2012 2022070120324238300_r23 (2022070120324238300_r38) 2002 (2022070120324238300_r32) 1986 2022070120324238300_r26 (2022070120324238300_r53) 1819 2022070120324238300_r27 (2022070120324238300_r51) 2011 (2022070120324238300_r14) 1968; 14 (2022070120324238300_r24) 1945; 35 (2022070120324238300_r18) 2004; 17 (2022070120324238300_r20) 2018; 59 (2022070120324238300_r60) 2017; 39 (2022070120324238300_r21) 2015; 58 (2022070120324238300_r22) 2006; 24 (2022070120324238300_r49) 2014; 38 2022070120324238300_r35 2022070120324238300_r33 (2022070120324238300_r41) 2004 (2022070120324238300_r59) 1978 (2022070120324238300_r28) 2011 DK Hostmaster (2022070120324238300_r17) 2009 (2022070120324238300_r34) 2009 (2022070120324238300_r44) 1994 (2022070120324238300_r58) 2015 (2022070120324238300_r10) 2005 (2022070120324238300_r39) 2019; 11 (2022070120324238300_r50) 1948; 27 (2022070120324238300_r30) 1997 2022070120324238300_r54 2022070120324238300_r52 (2022070120324238300_r19) 2019; 3 2022070120324238300_r46 (2022070120324238300_r47) 2014 (2022070120324238300_r6) 2000 (2022070120324238300_r48) 2014; 55 (2022070120324238300_r7) 1662 (2022070120324238300_r56) 1919 |
| References_xml | – reference: Koops, Bert-Jaap, and RonaldLeenes. “Privacy Regulation Cannot Be Hardcoded. A Critical Comment on the ‘Privacy by Design’ Provision in Data-Protection Law.”International Review of Law, Computers & Technology28, no. 2 (2014): 159–71. – reference: Akin, William. Technocracy and the American Dream: The Technocrat Movement, 1900–1941. Berkley: University of California Press, 1977. – reference: Kuhn, Thomas. The Structure of Scientific Revolution. 4th ed. Chicago: University of Chicago Press, 2012. – reference: Sadowski, Jathan, and EvanSelinger. “Creating a Taxonomic Tool for Technocracy and Applying It to Silicon Valley.”Technology in Society38 (2014): 161–68. – reference: Weber, Max. Economy and Society: An Outline of Interpretive Sociology. Vol. 1. Berkeley: University of California Press, 1978. – reference: 4. Shannon, 379–423. – reference: 59. Abbate. – reference: Vinsel, Lee. “You’re Doing It Wrong: Notes on Criticism and Technology Hype.” Medium. February1, 2021. https://sts-news.medium.com/youre-doing-it-wrong-notes-on-criticism-and-technology-hype-18b08b4307e5. Accessed May 5, 2021. – reference: Lessig, Lawrence. Code: And Other Laws of Cyberspace. 2nd ed. New York: Basic Books, 2009. – reference: Internet Corporation for Assigned Names and Numbers (ICANN). “Bylaws for Internet Corporation for Assigned Names and Numbers.” Section 1.1.i, ICANN. https://www.icann.org/resources/pages/governance/bylaws-en/#article1. Accessed May 5, 2021. – reference: Warnier, Martijn, FrancienDechesne, and FrancesBrazier. “Design for the Value of Privacy.” In Handbook of Ethics, Values, and Technological Design: Sources, Theory, Values and Application Domains, edited by Jeroenvan den Hoven, Pieter E.Vermaas, and Ibovan de Poel, 431–45. Dordrecht: Springer, 2015. – reference: 14. Ibid., 32. – reference: Bowker, Geoffrey, and SusanLeigh Star. Sorting Things Out: Classification and Its Consequences. Cambridge: MIT Press, 2000. – reference: 22. Hayek; Putnam. – reference: Shapin, Steven, and SimonSchaffer. Leviathan and the Air-Pump: Hobbes, Boyle, and the Experimental Life. New Jersey: Princeton University Press, 2011. – reference: 19. Cavoukian. – reference: Boyle, Robert. New Experiments Physico-Mechanicall, Touching the Spring of the Air, and Its Effect. Oxford, UK: Miles Flesher for Richard Davis, 1662. – reference: 25. Zuboff. – reference: Fidler, Bradley, and AndrewL. Russell. “Financial and Administrative Infrastructure for the Early Internet: Network Maintenance at the Defense Information Systems Agency.”Technology and Culture59, no. 4 (2018): 899–924. – reference: 57. Russell. – reference: Hughes, Thomas Parke. Networks of Power: Electrification in Western Society, 1880–1930. Baltimore: Johns Hopkins University Press, 1983. – reference: 1. Lessig; DeNardis, Protocol Politics. – reference: 28. Reidenberg. – reference: Anttiroiko, Ari-Veikko. “Castells’ Network Concept and Its Connections to Social, Economic and Political Network Analyses.”Journal of Social Structure16, no. 11 (2015): 1–18. – reference: 48. Fidler. – reference: Conway, Melvin. “How Do Committees Invent?”Datamation14, no. 4 (1968): 28–31. – reference: Kranakis, Eda, BijkerWiebe, and TrevorPinch. Constructing a Bridge: An Exploration of Engineering Culture, Design, and Research in Nineteenth-Century France and America. Cambridge: MIT Press, 1997. – reference: Hayek, Friedrich August. “The Use of Knowledge in Society.”American Economic Review35, no. 4 (1945): 519–30. – reference: 53. Cisco. – reference: 61. Simon; Fidler and Russell. – reference: Faraj, Samer, DowanKwon, and StephanieWatts. “Contested Artifact: Technology Sensemaking, Actor Networks, and the Shaping of the Web Browser.”Information Technology & People17, no. 2 (2004): 185. – reference: Caesar, Matthew, DonaldCaldwell, NickFeamster, JenniferRexford, AmanShaikh, and Jacobusvan der Merwe. “Design and Implementation of a Routing Control Platform.” In Proceedings of the 2nd Conference on Symposium on Networked Systems Design & Implementation—Volume 2, 15–28. 2005. – reference: 31. Kuhn. – reference: Nissenbaum, Helen. Privacy in Context: Technology, Policy, and the Integrity of Social Life. Palo Alto: Stanford University Press, 2009. – reference: DK Hostmaster. “Danish Act on Internet Domains.”https://www.dk-hostmaster.dk/en/danish- act-internet-domains. Accessed May 5, 2021. – reference: Russell, Andrew, and ValerieSchafer. “In the Shadow of ARPANET and Internet: Louis Pouzin and the Cyclades Network in the 1970s.”Technology and Culture55 (2014): 880–907. – reference: Ackerman, Mark, TrevorDarrell, and DanielJ. Weitzner. “Privacy in Context.”Human–Computer Interaction16, no. 2–4 (2001): 167–76. – reference: 34. Internet Research Task Force. – reference: 15. Latour and Woolgar. – reference: Veblen, Thorstein. The Place of Science in Modern Civilisation and Other Essays. New York: B.W. Huebsch, 1919. – reference: 33. Russell; Leiner et al. – reference: Cavoukian, Ann. “Privacy by Design: The 7 Foundational Principles.”Information and Privacy Commissioner of Ontario, Canada. Last revised January1, 2011. https://iapp.org/media/pdf/resource_center/pbd_implement_7found_principles.pdf. Accessed May 5, 2021. – reference: 41. Ibid. – reference: 45. Faraj, Kwon, and Watts, 185. – reference: Zuboff, Shoshana. “Big Other: Surveillance Capitalism and the Prospects of an Information Civilization.”Journal of Information Technology30, no. 1 (2015): 75–89. – reference: 49. McQuillan and Walden. – reference: 3. Mueller and Badiei. – reference: 60. Su and Postel. – reference: 6. Smith; Marx. – reference: 20. Koops and Leenes. – reference: 21. Ibid. – reference: 30. Veblen. – reference: 35. Mueller and Badiei. – reference: 38. Ibid. – reference: Rice, Ronald. “Network Analysis and Computer-Mediated Communication Systems.” In Advances in Social Network Analysis: Research in the Social and Behavioral Sciences, edited by JosephGalaskiewicz and StanleyWasserman, 167. United Kingdom: Sage Publications, 1994. – reference: 56. Bowers and Gross. – reference: 58. Handley, 120. – reference: Shannon, Claude. “A Mathematical Theory of Communication.”The Bell System Technical Journal27, no. 3 (1948): 379–423. – reference: Bowers, Karen, and PhillGross, eds. Proceedings of the Twelfth Internet Engineering Task Force. March1989. https://www.ietf.org/proceedings/12.pdf. Accessed May 5, 2021. – reference: IETF Meeting Proceeding: Internetworking Working Group. 1988, Reston, VA. https://www.ietf.org/proceedings/11.pdf. Accessed May 5, 2021. – reference: 54. IETF Meeting Proceeding: Internetworking Working Group. – reference: Working Party on the Protection of Individuals with regard to the Processing of Personal Data. First Annual Report (Report no. XV/5025/97-final-EN corr). Brussels: WP3, European Commission, 1997. – reference: McQuillan, John, and DavidC. Walden. “The ARPA Network Design Decisions.”Computer Networks1, no. 5 (1977): 243–89. – reference: Russell, Andrew. Open Standards and the Digital Age. Cambridge: Cambridge University Press, 2014. – reference: 36. DeNardis, “Hidden Levers of Internet Control.” – reference: 52. Russell and Schafer; Fidler. – reference: 67. “Bylaws for Internet Corporation for Assigned Names and Numbers.” – reference: 43. Westergard. – reference: 65. Cerf. – reference: 46. Rosen. – reference: 55. Caesar et al. – reference: 68. This law has been mentioned on the .DK registry website; “Danish Act on Internet Domains.” – reference: Fidler, Bradley. “The Evolution of Internet Routing: Technical Roots of the Network Society.”Internet Histories3, no. 3–4 (2019): 364–87. – reference: Pinch, Trevor, and FrankTrocco. Analog Days. Cambridge: Harvard University Press, 2004. – reference: Putnam, Robert. “Elite Transformation in Advanced Industrial Societies: An Empirical Assessment of the Theory of Technocracy.”Comparative Political Studies10, no. 3 (1977): 383–412. – reference: Rosen, Eric. Exterior Gateway Protocol (EGP): RFC 0827. Internet Engineering Task Force. 1982. https://www.rfc-editor.org/info/rfc827. Accessed May 5, 2021. – reference: 5. Boyle; Shapin and Schaffer. – reference: 44. Oever and Cath, 11. – reference: Cisco. “Cisco Systems Customer Service Newsletter.”1989. https://weare.cisco.com/c/dam/r/weare/assets/files/packet-winter89.pdf. Accessed May 5, 2021. – reference: Latour, Bruno, and SteveWoolgar. Laboratory Life: The Construction of Scientific Facts. New Jersey: Princeton University Press, 1986. – reference: Smith, Adam. An Inquiry into the Nature and Causes of the Wealth of Nations: In 2 Vol. London: Allason, 1819. – reference: Westergard, Björn. “Do Computers Follow Rules Once Followed by Workers?”IEEE Annals of the History of Computing39, no. 4 (2017): 5–8. – reference: 23. Akin; Sadowski and Selinger. – reference: 13. Bowker and Star. – reference: Harrenstein, Ken, and VicWhite. NICNAME/WHOIS, RFC 812. Internet Engineering Task Force. 1982. https://tools.ietf.org/html/rfc812. Accessed May 5, 2021. – reference: 63. Several hierarchical databases, such as ANSI SQL, were popular. – reference: Reidenberg, Joel. “Lex Informatica: The Formulation of Information Policy Rules through Technology.”Texas Law Review76 (1997): 553–593. – reference: Lougheed, Kirk, and YakovRekhter. Border Gateway Protocol (BGP): RFC 1105. Internet Engineering Task Force. 1989. https://www.rfc-editor.org/info/rfc1105. Accessed May 5, 2021. – reference: Mueller, Milton L. Ruling the Root: Internet Governance and the Taming of Cyberspace. Cambridge, MA: MIT Press, 2002. – reference: 39. Ibid. – reference: 10. Hughes; Latour and Woolgar; Kranakis, Bijker, and Pinch; Pinch and Trocco. – reference: Handley, Mark. “Why the Internet Only Just Works.”BT Technology Journal24, no. 3 (2006): 120. – reference: Su, Zaw-Sing, and JohnPostel. The Domain Naming Convention for Internet User Applications: RFC 819. Internet Engineering Task Force. 1982. https://www.rfc-editor.org/info/rfc819. Accessed May 5, 2021. – reference: 16. Anttiroiko. – reference: Mueller, Milton L., and FarzanehBadiei. “Requiem for a Dream: On Advancing Human Rights via Internet Architecture.”Policy & Internet11, no. 1 (2019): 61–83. – reference: 42. Keen. – reference: Keen, Steve. Debunking Economics: The Naked Emperor Dethroned?London: Zed Books Ltd., 2011. – reference: 27. Mueller and Badiei. – reference: Leiner, Barry M., VintonG. Cerf, DavidD. Clark, RobertE. Kahn, LeonardKleinrock, DanielC. Lynch, JonPostel, LarryG. Roberts, and StephenWolff. “Brief History of the Internet.”Internet Society, 1997. https://www.internetsociety.org/internet/history-internet/brief-history-internet/. Accessed May 5, 2021. – reference: 17. Working Party on the Protection of Individuals with regard to the Processing of Personal Data. – reference: 37. Ten Oever and Cath. – reference: Abbate, Janet. “From ARPANET to Internet: A History of ARPA-Sponsored Computer Networks, 1966–1988.” PhD diss., University of Pennsylvania, 1994, https://repository.upenn.edu/dissertations/AAI9503730 (AAI9503730). Accessed May 5, 2021. – reference: Ten Oever , Niels, and CorrineCath. Research into Human Rights Protocol Considerations: RFC8280. Internet Engineering Task Force. 2017. https://doi.org/10.17487/RFC8280. Accessed May 5, 2021. – reference: 47. Lougheed and Rekhter. – reference: 24. Sadowski and Selinger. – reference: 32. Shapin and Schaffer. – reference: 40. Mueller and Badiei. – reference: Internet Research Task Force. “Human Rights Protocol Considerations.”2015. https://datatracker. ietf.org/rg/hrpc/about/. Accessed May 5, 2021. – reference: 9. See also, Conway. – reference: 50. Fidler. – reference: 66. Harrenstein and White. – reference: 64. Haigh and Priestley. – reference: Haigh, Thomas, and MarkPriestley. “Innovators Assemble: Ada Lovelace, Walter Isaacson, and the Superheroines of Computing.”Communications of the ACM58, no. 9 (2015): 20–27. – reference: 11. Rice; Rogers. – reference: Simon, Craig. “Launching the DNS War: Dot-Com Privatization and the Rise of Global Internet Governance.” PhD diss., University of Miami, 2006. http://scholarlyrepository.miami.edu/dissertations/2484. Accessed May 5, 2021. – reference: 51. Rosen. – reference: 29. Lessig. – reference: Brand, Stewart. How Buildings Learn: What Happens After They're Built. New York: Penguin Random House, 1995. – reference: 18. Koops and Leenes. – reference: DeNardis, Laura. “Hidden Levers of Internet Control: An Infrastructure-Based Theory of Internet Governance.”Information, Communication & Society15, no. 5 (2012): 720–38. – reference: 12. Nissenbaum; Ackerman, Darrell, and Weitzner; Warnier, Dechesne, and Brazier, 431-445. – reference: DK Hostmaster. Protocol Politics: The Globalization of Internet Governance. Cambridge, MA: MIT Press, 2009. – reference: Cerf, Vint. IAB Recommendations for the Development of Internet Network Management Standards: RFC 1052. Internet Engineering Task Force. 1988. https://doi.org/10.17487/RFC1052. Accessed May 5, 2021. – reference: 8. Kranakis, Bijker, and Pinch. – reference: 26. Vinsel. – reference: Marx, Karl. Capital: A Critique of Political Economy. Translated by DavidFernbach. London: Penguine, 1990. – reference: 2. Ten Oever and Cath. – reference: 7. Weber. – reference: Rogers, Everett. Communication Technology. New York: Simon and Schuster, 1986. – reference: 62. Mueller. – volume-title: Communication Technology year: 1986 ident: 2022070120324238300_r45 – volume: 14 start-page: 28 issue: 4 year: 1968 ident: 2022070120324238300_r14 article-title: “How Do Committees Invent?” publication-title: Datamation – volume: 35 start-page: 519 issue: 4 year: 1945 ident: 2022070120324238300_r24 article-title: “The Use of Knowledge in Society.” publication-title: American Economic Review – ident: 2022070120324238300_r13 – ident: 2022070120324238300_r61 – volume: 24 start-page: 120 issue: 3 year: 2006 ident: 2022070120324238300_r22 article-title: “Why the Internet Only Just Works.” publication-title: BT Technology Journal – start-page: 167 volume-title: Advances in Social Network Analysis: Research in the Social and Behavioral Sciences year: 1994 ident: 2022070120324238300_r44 – ident: 2022070120324238300_r54 doi: 10.17487/rfc0819 – volume-title: Debunking Economics: The Naked Emperor Dethroned? year: 2011 ident: 2022070120324238300_r28 – ident: 2022070120324238300_r46 doi: 10.17487/rfc0827 – ident: 2022070120324238300_r26 – volume: 11 start-page: 61 issue: 1 year: 2019 ident: 2022070120324238300_r39 article-title: “Requiem for a Dream: On Advancing Human Rights via Internet Architecture.” publication-title: Policy & Internet doi: 10.1002/poi3.190 – volume-title: How Buildings Learn: What Happens After They're Built year: 1995 ident: 2022070120324238300_r8 – volume: 59 start-page: 899 issue: 4 year: 2018 ident: 2022070120324238300_r20 article-title: “Financial and Administrative Infrastructure for the Early Internet: Network Maintenance at the Defense Information Systems Agency.” publication-title: Technology and Culture doi: 10.1353/tech.2018.0090 – volume-title: Privacy in Context: Technology, Policy, and the Integrity of Social Life year: 2009 ident: 2022070120324238300_r40 – start-page: 15 year: 2005 ident: 2022070120324238300_r10 article-title: “Design and Implementation of a Routing Control Platform.” publication-title: Proceedings of the 2nd Conference on Symposium on Networked Systems Design & Implementation—Volume 2 – ident: 2022070120324238300_r9 – volume-title: Networks of Power: Electrification in Western Society, 1880–1930 year: 1983 ident: 2022070120324238300_r25 – volume: 39 start-page: 5 issue: 4 year: 2017 ident: 2022070120324238300_r60 article-title: “Do Computers Follow Rules Once Followed by Workers?” publication-title: IEEE Annals of the History of Computing – ident: 2022070120324238300_r12 doi: 10.17487/rfc1052 – volume-title: Leviathan and the Air-Pump: Hobbes, Boyle, and the Experimental Life year: 2011 ident: 2022070120324238300_r51 – volume-title: Protocol Politics: The Globalization of Internet Governance year: 2009 ident: 2022070120324238300_r17 – ident: 2022070120324238300_r1 – ident: 2022070120324238300_r52 – volume-title: Economy and Society: An Outline of Interpretive Sociology year: 1978 ident: 2022070120324238300_r59 – ident: 2022070120324238300_r5 – volume-title: Capital: A Critique of Political Economy year: 1990 ident: 2022070120324238300_r36 – volume: 10 start-page: 383 issue: 3 year: 1977 ident: 2022070120324238300_r42 article-title: “Elite Transformation in Advanced Industrial Societies: An Empirical Assessment of the Theory of Technocracy.” publication-title: Comparative Political Studies doi: 10.1177/001041407701000305 – volume: 55 start-page: 880 year: 2014 ident: 2022070120324238300_r48 article-title: “In the Shadow of ARPANET and Internet: Louis Pouzin and the Cyclades Network in the 1970s.” publication-title: Technology and Culture doi: 10.1353/tech.2014.0096 – start-page: 431 volume-title: Handbook of Ethics, Values, and Technological Design: Sources, Theory, Values and Application Domains year: 2015 ident: 2022070120324238300_r58 doi: 10.1007/978-94-007-6970-0_17 – ident: 2022070120324238300_r11 – volume: 30 start-page: 75 issue: 1 year: 2015 ident: 2022070120324238300_r62 article-title: “Big Other: Surveillance Capitalism and the Prospects of an Information Civilization.” publication-title: Journal of Information Technology doi: 10.1057/jit.2015.5 – ident: 2022070120324238300_r57 – volume-title: New Experiments Physico-Mechanicall, Touching the Spring of the Air, and Its Effect year: 1662 ident: 2022070120324238300_r7 – volume: 1 start-page: 243 issue: 5 year: 1977 ident: 2022070120324238300_r37 article-title: “The ARPA Network Design Decisions.” publication-title: Computer Networks – volume: 76 start-page: 553 year: 1997 ident: 2022070120324238300_r43 article-title: “Lex Informatica: The Formulation of Information Policy Rules through Technology.” publication-title: Texas Law Review – volume-title: Constructing a Bridge: An Exploration of Engineering Culture, Design, and Research in Nineteenth-Century France and America year: 1997 ident: 2022070120324238300_r30 – volume: 16 start-page: 167 issue: 2–4 year: 2001 ident: 2022070120324238300_r2 article-title: “Privacy in Context.” publication-title: Human–Computer Interaction – volume: 3 start-page: 364 issue: 3–4 year: 2019 ident: 2022070120324238300_r19 article-title: “The Evolution of Internet Routing: Technical Roots of the Network Society.” publication-title: Internet Histories – volume-title: Analog Days year: 2004 ident: 2022070120324238300_r41 – volume-title: An Inquiry into the Nature and Causes of the Wealth of Nations: In 2 Vol year: 1819 ident: 2022070120324238300_r53 – ident: 2022070120324238300_r15 doi: 10.1080/1369118X.2012.659199 – volume: 28 start-page: 159 issue: 2 year: 2014 ident: 2022070120324238300_r29 article-title: “Privacy Regulation Cannot Be Hardcoded. A Critical Comment on the ‘Privacy by Design’ Provision in Data-Protection Law.” publication-title: International Review of Law, Computers & Technology doi: 10.1080/13600869.2013.801589 – ident: 2022070120324238300_r35 doi: 10.17487/rfc1105 – volume-title: Code: And Other Laws of Cyberspace year: 2009 ident: 2022070120324238300_r34 – ident: 2022070120324238300_r33 – ident: 2022070120324238300_r16 – volume-title: Laboratory Life: The Construction of Scientific Facts year: 1986 ident: 2022070120324238300_r32 – volume: 27 start-page: 379 issue: 3 year: 1948 ident: 2022070120324238300_r50 article-title: “A Mathematical Theory of Communication.” publication-title: The Bell System Technical Journal doi: 10.1002/j.1538-7305.1948.tb01338.x – volume-title: Open Standards and the Digital Age year: 2014 ident: 2022070120324238300_r47 – volume-title: The Place of Science in Modern Civilisation and Other Essays year: 1919 ident: 2022070120324238300_r56 – volume: 16 start-page: 1 issue: 11 year: 2015 ident: 2022070120324238300_r4 article-title: “Castells’ Network Concept and Its Connections to Social, Economic and Political Network Analyses.” publication-title: Journal of Social Structure – ident: 2022070120324238300_r55 doi: 10.17487/RFC8280 – volume: 17 start-page: 185 issue: 2 year: 2004 ident: 2022070120324238300_r18 article-title: “Contested Artifact: Technology Sensemaking, Actor Networks, and the Shaping of the Web Browser.” publication-title: Information Technology & People – ident: 2022070120324238300_r23 – volume: 38 start-page: 161 year: 2014 ident: 2022070120324238300_r49 article-title: “Creating a Taxonomic Tool for Technocracy and Applying It to Silicon Valley.” publication-title: Technology in Society doi: 10.1016/j.techsoc.2014.05.001 – volume-title: Sorting Things Out: Classification and Its Consequences year: 2000 ident: 2022070120324238300_r6 – ident: 2022070120324238300_r27 – volume-title: Technocracy and the American Dream: The Technocrat Movement, 1900–1941 year: 1977 ident: 2022070120324238300_r3 – volume: 58 start-page: 20 issue: 9 year: 2015 ident: 2022070120324238300_r21 article-title: “Innovators Assemble: Ada Lovelace, Walter Isaacson, and the Superheroines of Computing.” publication-title: Communications of the ACM doi: 10.1145/2804228 – volume-title: The Structure of Scientific Revolution year: 2012 ident: 2022070120324238300_r31 – volume-title: Ruling the Root: Internet Governance and the Taming of Cyberspace year: 2002 ident: 2022070120324238300_r38 |
| SSID | ssj0000456308 |
| Score | 2.1723955 |
| Snippet | This article discusses the shortcomings of value in design approach to protect human rights on the Internet. It argues that Internet protocols do not single... |
| SourceID | crossref jstor dukeupress |
| SourceType | Enrichment Source Index Database Publisher |
| StartPage | 376 |
| SubjectTerms | Government human rights IETF infrastructure Internet protocols Law Public Policy |
| Title | The Would-Be Technocracy: Evaluating Efforts to Direct and Control Social Change with Internet Protocol Design |
| URI | https://doi.org/10.5325/jinfopoli.11.2021.0376 https://www.jstor.org/stable/10.5325/jinfopoli.11.2021.0376 |
| Volume | 11 |
| WOSCitedRecordID | wos000673436300003&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 2158-3897 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000456308 issn: 2381-5892 databaseCode: DOA dateStart: 20110101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Nb9MwGLa6waEXBAXEBkM-TNzSNbUT29zYtAokNPUwxG6RYzuoqEqrNhvbfh6_jNcf-SidVHbgklZWbKV5nvr98PuB0HEuE5B7aR7lYzGOaKySiGtOorQYsSLlMaFUumYT7OKCX12Jaa_3u86FuZmzsuS3t2L5X6GGMQDbps4-Au5mURiA7wA6XAF2uP4z8N9t4-ro1ATPuVpJ5So7nYfa3uUP21LZHRaA7um3PXeMcBYi10PWrs898M5a7zs0lc0tqBbAH9irmuiPbfU2VGR19Fq64sPOvdtJTAxR2lM57LgjTm0ImoswmMjVvSxN466ezHTIWrTn__V5dHBYjOO_gj-mIEDWd3OwE2bSa9RbSZHtHmgViijhvl3e0PixOOER6FlsYxOPO7swYWlHoFOX0r0lKxLiGj_9tGP2NYDwGNrHHY6a6Rt1uHdN2UNPxiwRomPWO22A2gpsrjFi_Vt8orpd7OThpTZ0pL4N7792UdGbMbNOA7p8jp4FbPEnT7kXqGfKAeq3zZoHaO-r_DVARyEXBn_AX1oS4CBFXqISGIprhuIOQz_ilp848BNXC-z5iYGfOPATe35iz09s-YlrfuKan9jz8xX6Njm_PPschbYfkSIxrUArKAQRiqo8ZRrMcTHKcyEZhU8K6iwrQG5oqZi27hUTS53oRGqixjIndKQVeY32y0Vp3iAcE57nRhtCRE5TnXNhuGa8GAmbYV3wA5TULzpToSa-bc0yz8A2tgBlDUBgKmcWoMwCdIBOmnlLXxVm54yoxTFbL9XO-48d1M3yD992-Mhl36J--5d8h_ar1bU5Qk_VTTVbr9475v4Bl1zQtA |
| linkProvider | Directory of Open Access Journals |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=The+Would-Be+Technocracy%3A+Evaluating+Efforts+to+Direct+and+Control+Social+Change+with+Internet+Protocol+Design&rft.jtitle=Journal+of+information+policy+%28University+Park%2C+Pa.%29&rft.au=Badiei%2C+Farzaneh&rft.au=Fidler%2C+Bradley&rft.date=2021-12-01&rft.pub=Pennsylvania+State+University+Press&rft.issn=2381-5892&rft.eissn=2158-3897&rft.volume=11&rft.spage=376&rft.epage=402&rft_id=info:doi/10.5325%2Fjinfopoli.11.2021.0376&rft.externalDocID=10.5325%2Fjinfopoli.11.2021.0376 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2381-5892&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2381-5892&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2381-5892&client=summon |