The Would-Be Technocracy: Evaluating Efforts to Direct and Control Social Change with Internet Protocol Design

This article discusses the shortcomings of value in design approach to protect human rights on the Internet. It argues that Internet protocols do not single handedly mitigate human rights on the Internet and in order to measure their impact, they need to be put in context. In other words, instead of...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:Journal of information policy (University Park, Pa.) Ročník 11; s. 376 - 402
Hlavní autoři: Badiei, Farzaneh, Fidler, Bradley
Médium: Journal Article
Jazyk:angličtina
Vydáno: Pennsylvania State University Press 01.12.2021
Témata:
ISSN:2381-5892, 2158-3897
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract This article discusses the shortcomings of value in design approach to protect human rights on the Internet. It argues that Internet protocols do not single handedly mitigate human rights on the Internet and in order to measure their impact, they need to be put in context. In other words, instead of design determinism, contextual analysis of Internet technologies that involve Internet protocols should take place.
AbstractList This article discusses the shortcomings of value in design approach to protect human rights on the Internet. It argues that Internet protocols do not single handedly mitigate human rights on the Internet and in order to measure their impact, they need to be put in context. In other words, instead of design determinism, contextual analysis of Internet technologies that involve Internet protocols should take place.
Author Badiei, Farzaneh
Fidler, Bradley
Author_xml – sequence: 1
  givenname: Farzaneh
  surname: Badiei
  fullname: Badiei, Farzaneh
  organization: Yale Law School, New Haven, US
– sequence: 2
  givenname: Bradley
  surname: Fidler
  fullname: Fidler, Bradley
  organization: Stevens Institute of Technology, Hoboken, US
BookMark eNqFkEtLAzEUhYNUsNb-BcleZsxjnuJG26qFgoIVl0MmyXRSx2RIMkr_vTNUuhCkd3Pu4nz3cc7BSBstAbjEKIwpia-3SlemNY0KMQ4JIjhENE1OwJjgOAtolqejvqcZDuIsJ2dg6twW9RXFCUXZGOh1LeG76RoR3Eu4lrzWhlvGdzdw8cWajnmlN3BRVcZ6B72Bc2Ul95BpAWdGe2sa-Gq4Yg2c1UxvJPxWvoZL7aXV0sMXa7zhvWkundroC3BascbJ6a9OwNvDYj17ClbPj8vZ3SrgFEc-oLjKac4jXiapyPMkR2WZszTqNcoISSsUU8F4KjClmcRMxCJmgnLCShohwekE3O7ncmucs7IquPL9L8PFTDUFRsUQX3GIr8C4GOIrhvh6PPmDt1Z9Mrs7Dl7twa3zxh6of93R3i26D9m1VjpXuJYfW_IDNribjQ
CitedBy_id crossref_primary_10_21615_cesder_7666
crossref_primary_10_4000_terminal_8221
Cites_doi 10.17487/rfc0819
10.17487/rfc0827
10.1002/poi3.190
10.1353/tech.2018.0090
10.17487/rfc1052
10.1177/001041407701000305
10.1353/tech.2014.0096
10.1007/978-94-007-6970-0_17
10.1057/jit.2015.5
10.1080/1369118X.2012.659199
10.1080/13600869.2013.801589
10.17487/rfc1105
10.1002/j.1538-7305.1948.tb01338.x
10.17487/RFC8280
10.1016/j.techsoc.2014.05.001
10.1145/2804228
ContentType Journal Article
Copyright This work is licensed under Creative Commons Attribution CC-BY-NC-ND.
Copyright_xml – notice: This work is licensed under Creative Commons Attribution CC-BY-NC-ND.
DBID JFNAL
AAYXX
CITATION
DOI 10.5325/jinfopoli.11.2021.0376
DatabaseName JSTOR Journals Open Access
CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
CrossRef

DeliveryMethod fulltext_linktorsrc
Discipline Government
Library & Information Science
Law
EISSN 2158-3897
EndPage 402
ExternalDocumentID 10_5325_jinfopoli_11_2021_0376
10.5325/jinfopoli.11.2021.0376
GroupedDBID 4S
5VS
AAFWJ
ABIFP
ACGFO
ADALM
ADBBV
AEGXH
AEUPB
AFPKN
AIAGR
ALMA_UNASSIGNED_HOLDINGS
ARCSS
BCNDV
EBS
EJD
GROUPED_DOAJ
JFNAL
KQ8
M~E
OK1
RNS
TUS
UDIET
ZWISI
.4S
H13
AAYXX
CITATION
ID FETCH-LOGICAL-c314t-31f939c4cb67d99690bb9a7490b48227f053dac7d1338e1ad5d5ad3c2ab340dc3
ISICitedReferencesCount 1
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000673436300003&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 2381-5892
IngestDate Sat Nov 29 06:48:05 EST 2025
Tue Nov 18 22:00:06 EST 2025
Thu May 29 13:17:24 EDT 2025
Tue Aug 02 12:39:43 EDT 2022
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Language English
License This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c314t-31f939c4cb67d99690bb9a7490b48227f053dac7d1338e1ad5d5ad3c2ab340dc3
OpenAccessLink http://dx.doi.org/10.5325/jinfopoli.11.2021.0376
PageCount 27
ParticipantIDs crossref_citationtrail_10_5325_jinfopoli_11_2021_0376
crossref_primary_10_5325_jinfopoli_11_2021_0376
jstor_primary_jinfopoli_11_2021_0376
dukeupress_spc_10_5325_jinfopoli_11_2021_0376
PublicationCentury 2000
PublicationDate 20211201
PublicationDateYYYYMMDD 2021-12-01
PublicationDate_xml – month: 12
  year: 2021
  text: 20211201
  day: 1
PublicationDecade 2020
PublicationTitle Journal of information policy (University Park, Pa.)
PublicationYear 2021
Publisher Pennsylvania State University Press
Publisher_xml – name: Pennsylvania State University Press
References Reidenberg, Joel. “Lex Informatica: The Formulation of Information Policy Rules through Technology.”Texas Law Review76 (1997): 553–593.
Haigh, Thomas, and MarkPriestley. “Innovators Assemble: Ada Lovelace, Walter Isaacson, and the Superheroines of Computing.”Communications of the ACM58, no. 9 (2015): 20–27.
15. Latour and Woolgar.
20. Koops and Leenes.
50. Fidler.
Hayek, Friedrich August. “The Use of Knowledge in Society.”American Economic Review35, no. 4 (1945): 519–30.
42. Keen.
Pinch, Trevor, and FrankTrocco. Analog Days. Cambridge: Harvard University Press, 2004.
DK Hostmaster. “Danish Act on Internet Domains.”https://www.dk-hostmaster.dk/en/danish- act-internet-domains. Accessed May 5, 2021.
12. Nissenbaum; Ackerman, Darrell, and Weitzner; Warnier, Dechesne, and Brazier, 431-445.
3. Mueller and Badiei.
55. Caesar et al.
Rosen, Eric. Exterior Gateway Protocol (EGP): RFC 0827. Internet Engineering Task Force. 1982. https://www.rfc-editor.org/info/rfc827. Accessed May 5, 2021.
18. Koops and Leenes.
53. Cisco.
10. Hughes; Latour and Woolgar; Kranakis, Bijker, and Pinch; Pinch and Trocco.
11. Rice; Rogers.
41. Ibid.
44. Oever and Cath, 11.
Westergard, Björn. “Do Computers Follow Rules Once Followed by Workers?”IEEE Annals of the History of Computing39, no. 4 (2017): 5–8.
Internet Corporation for Assigned Names and Numbers (ICANN). “Bylaws for Internet Corporation for Assigned Names and Numbers.” Section 1.1.i, ICANN. https://www.icann.org/resources/pages/governance/bylaws-en/#article1. Accessed May 5, 2021.
DK Hostmaster. Protocol Politics: The Globalization of Internet Governance. Cambridge, MA: MIT Press, 2009.
25. Zuboff.
54. IETF Meeting Proceeding: Internetworking Working Group.
Hughes, Thomas Parke. Networks of Power: Electrification in Western Society, 1880–1930. Baltimore: Johns Hopkins University Press, 1983.
38. Ibid.
46. Rosen.
51. Rosen.
Kranakis, Eda, BijkerWiebe, and TrevorPinch. Constructing a Bridge: An Exploration of Engineering Culture, Design, and Research in Nineteenth-Century France and America. Cambridge: MIT Press, 1997.
Caesar, Matthew, DonaldCaldwell, NickFeamster, JenniferRexford, AmanShaikh, and Jacobusvan der Merwe. “Design and Implementation of a Routing Control Platform.” In Proceedings of the 2nd Conference on Symposium on Networked Systems Design & Implementation—Volume 2, 15–28. 2005.
47. Lougheed and Rekhter.
Rogers, Everett. Communication Technology. New York: Simon and Schuster, 1986.
35. Mueller and Badiei.
65. Cerf.
57. Russell.
Mueller, Milton L., and FarzanehBadiei. “Requiem for a Dream: On Advancing Human Rights via Internet Architecture.”Policy & Internet11, no. 1 (2019): 61–83.
52. Russell and Schafer; Fidler.
Akin, William. Technocracy and the American Dream: The Technocrat Movement, 1900–1941. Berkley: University of California Press, 1977.
Lessig, Lawrence. Code: And Other Laws of Cyberspace. 2nd ed. New York: Basic Books, 2009.
Working Party on the Protection of Individuals with regard to the Processing of Personal Data. First Annual Report (Report no. XV/5025/97-final-EN corr). Brussels: WP3, European Commission, 1997.
5. Boyle; Shapin and Schaffer.
Brand, Stewart. How Buildings Learn: What Happens After They're Built. New York: Penguin Random House, 1995.
Zuboff, Shoshana. “Big Other: Surveillance Capitalism and the Prospects of an Information Civilization.”Journal of Information Technology30, no. 1 (2015): 75–89.
Rice, Ronald. “Network Analysis and Computer-Mediated Communication Systems.” In Advances in Social Network Analysis: Research in the Social and Behavioral Sciences, edited by JosephGalaskiewicz and StanleyWasserman, 167. United Kingdom: Sage Publications, 1994.
6. Smith; Marx.
36. DeNardis, “Hidden Levers of Internet Control.”
Abbate, Janet. “From ARPANET to Internet: A History of ARPA-Sponsored Computer Networks, 1966–1988.” PhD diss., University of Pennsylvania, 1994, https://repository.upenn.edu/dissertations/AAI9503730 (AAI9503730). Accessed May 5, 2021.
19. Cavoukian.
66. Harrenstein and White.
Smith, Adam. An Inquiry into the Nature and Causes of the Wealth of Nations: In 2 Vol. London: Allason, 1819.
17. Working Party on the Protection of Individuals with regard to the Processing of Personal Data.
Simon, Craig. “Launching the DNS War: Dot-Com Privatization and the Rise of Global Internet Governance.” PhD diss., University of Miami, 2006. http://scholarlyrepository.miami.edu/dissertations/2484. Accessed May 5, 2021.
48. Fidler.
33. Russell; Leiner et al.
Handley, Mark. “Why the Internet Only Just Works.”BT Technology Journal24, no. 3 (2006): 120.
Boyle, Robert. New Experiments Physico-Mechanicall, Touching the Spring of the Air, and Its Effect. Oxford, UK: Miles Flesher for Richard Davis, 1662.
45. Faraj, Kwon, and Watts, 185.
Shapin, Steven, and SimonSchaffer. Leviathan and the Air-Pump: Hobbes, Boyle, and the Experimental Life. New Jersey: Princeton University Press, 2011.
63. Several hierarchical databases, such as ANSI SQL, were popular.
13. Bowker and Star.
58. Handley, 120.
Mueller, Milton L. Ruling the Root: Internet Governance and the Taming of Cyberspace. Cambridge, MA: MIT Press, 2002.
Su, Zaw-Sing, and JohnPostel. The Domain Naming Convention for Internet User Applications: RFC 819. Internet Engineering Task Force. 1982. https://www.rfc-editor.org/info/rfc819. Accessed May 5, 2021.
Weber, Max. Economy and Society: An Outline of Interpretive Sociology. Vol. 1. Berkeley: University of California Press, 1978.
31. Kuhn.
Bowker, Geoffrey, and SusanLeigh Star. Sorting Things Out: Classification and Its Consequences. Cambridge: MIT Press, 2000.
IETF Meeting Proceeding: Internetworking Working Group. 1988, Reston, VA. https://www.ietf.org/proceedings/11.pdf. Accessed May 5, 2021.
Bowers, Karen, and PhillGross, eds. Proceedings of the Twelfth Internet Engineering Task Force. March1989. https://www.ietf.org/proceedings/12.pdf. Accessed May 5, 2021.
64. Haigh and Priestley.
Fidler, Bradley. “The Evolution of Internet Routing: Technical Roots of the Network Society.”Internet Histories3, no. 3–4 (2019): 364–87.
67. “Bylaws for Internet Corporation for Assigned Names and Numbers.”
Vinsel, Lee. “You’re Doing It Wrong: Notes on Criticism and Technology Hype.” Medium. February1, 2021. https://sts-news.medium.com/youre-doing-it-wrong-notes-on-criticism-and-technology-hype-18b08b4307e5. Accessed May 5, 2021.
Fidler, Bradley, and AndrewL. Russell. “Financial and Administrative Infrastructure for the Early Internet: Network Maintenance at the Defense Information Systems Agency.”Technology and Culture59, no. 4 (2018): 899–924.
Sadowski, Jathan, and EvanSelinger. “Creating a Taxonomic Tool for Technocracy and Applying It to Silicon Valley.”Technology in Society38 (2014): 161–68.
49. McQuillan and Walden.
Faraj, Samer, DowanKwon, and StephanieWatts. “Contested Artifact: Technology Sensemaking, Actor Networks, and the Shaping of the Web Browser.”Information Technology & People17, no. 2 (2004): 185.
Harrenstein, Ken, and VicWhite. NICNAME/WHOIS, RFC 812. Internet Engineering Task Force. 1982. https://tools.ietf.org/html/rfc812. Accessed May 5, 2021.
4. Shannon, 379–423.
68. This law has been mentioned on the .DK registry website; “Danish Act on Internet Domains.”
Shannon, Claude. “A Mathematical Theory of Communication.”The Bell System Technical Journal27, no. 3 (1948): 379–423.
Anttiroiko, Ari-Veikko. “Castells’ Network Concept and Its Connections to Social, Economic and Political Network Analyses.”Journal of Social Structure16, no. 11 (2015): 1–18.
Kuhn, Thomas. The Structure of Scientific Revolution. 4th ed. Chicago: University of Chicago Press, 2012.
Putnam, Robert. “Elite Transformation in Advanced Industrial Societies: An Empirical Assessment of the Theory of Technocracy.”Comparative Political Studies10, no. 3 (1977): 383–412.
2. Ten Oever and Cath.
21. Ibid.
23. Akin; Sadowski and Selinger.
29. Lessig.
Keen, Steve. Debunking Economics: The Naked Emperor Dethroned?London: Zed Books Ltd., 2011.
Cerf, Vint. IAB Recommendations for the Development of Internet Network Management Standards: RFC 1052. Internet Engineering Task Force. 1988. https://doi.org/10.17487/RFC1052. Accessed May 5, 2021.
Leiner, Barry M., VintonG. Cerf, DavidD. Clark, RobertE. Kahn, LeonardKleinrock, DanielC. Lynch, JonPostel, LarryG. Roberts, and StephenWolff. “Brief History of the Internet.”Internet Society, 1997. https://www.internetsociety.org/internet/history-internet/brief-history-internet/. Accessed May 5, 2021.
22. Hayek; Putnam.
26. Vinsel.
Ackerman, Mark, TrevorDarrell, and DanielJ. Weitzner. “Privacy in Context.”Human–Computer Interaction16, no. 2–4 (2001): 167–76.
Koops, Bert-Jaap, and RonaldLeenes. “Privacy Regulation Cannot Be Hardcoded. A Critical Comment on the ‘Privacy by Design’ Provision in Data-Protection Law.”International Review of Law, Computers & Technology28, no. 2 (2014): 159–71.
Lougheed, Kirk, and YakovRekhter. Border Gateway Protocol (BGP): RFC 1105. Internet Engineering Task Force. 1989. https://www.rfc-editor.org/info/rfc1105. Accessed May 5, 2021.
Veblen, Thorstein. The Place of Science in Modern Civilisation and Other Essays. New York: B.W. Huebsch, 1919.
62. Mueller.
Marx, Karl. Capital: A Critique of Political Economy. Translated by DavidFernbach. London: Penguine, 1990.
Cavoukian, Ann. “Privacy by Design: The 7 Foundational Principles.”Information and Privacy Commissioner of Ontario, Canada. Last revised January1, 2011. https://iapp.org/media/pdf/resource_center/pbd_implement_7found_principles.pdf. Accessed May 5, 2021.
Cisco. “Cisco Systems Customer Service Newsletter.”1989. https://weare.cisco.com/c/dam/r/weare/assets/files/packet-winter89.pdf. Accessed May 5, 2021.
14. Ibid., 32.
Russell, Andrew. Open Standards and the Digital Age. Cambridge: Cambridge University Press, 2014.
Ten Oever , Niels, and CorrineCath. Research into Human Rights Protocol Considerations: RFC8280. Internet Engineering Task Force. 2017. https://doi.org/10.17487/RFC8280. Accessed May 5, 2021.
27. Mueller and Badiei.
37. Ten Oever and Cath.
Russell, Andrew, and ValerieSchafer. “In
2022070120324238300_r5
(2022070120324238300_r45) 1986
(2022070120324238300_r43) 1997; 76
2022070120324238300_r1
(2022070120324238300_r25) 1983
2022070120324238300_r61
(2022070120324238300_r36) 1990
2022070120324238300_r9
(2022070120324238300_r62) 2015; 30
2022070120324238300_r13
2022070120324238300_r57
(2022070120324238300_r37) 1977; 1
2022070120324238300_r11
2022070120324238300_r55
2022070120324238300_r12
2022070120324238300_r15
2022070120324238300_r16
(2022070120324238300_r42) 1977; 10
(2022070120324238300_r4) 2015; 16
(2022070120324238300_r40) 2009
(2022070120324238300_r8) 1995
(2022070120324238300_r2) 2001; 16
(2022070120324238300_r3) 1977
(2022070120324238300_r29) 2014; 28
(2022070120324238300_r31) 2012
2022070120324238300_r23
(2022070120324238300_r38) 2002
(2022070120324238300_r32) 1986
2022070120324238300_r26
(2022070120324238300_r53) 1819
2022070120324238300_r27
(2022070120324238300_r51) 2011
(2022070120324238300_r14) 1968; 14
(2022070120324238300_r24) 1945; 35
(2022070120324238300_r18) 2004; 17
(2022070120324238300_r20) 2018; 59
(2022070120324238300_r60) 2017; 39
(2022070120324238300_r21) 2015; 58
(2022070120324238300_r22) 2006; 24
(2022070120324238300_r49) 2014; 38
2022070120324238300_r35
2022070120324238300_r33
(2022070120324238300_r41) 2004
(2022070120324238300_r59) 1978
(2022070120324238300_r28) 2011
DK Hostmaster (2022070120324238300_r17) 2009
(2022070120324238300_r34) 2009
(2022070120324238300_r44) 1994
(2022070120324238300_r58) 2015
(2022070120324238300_r10) 2005
(2022070120324238300_r39) 2019; 11
(2022070120324238300_r50) 1948; 27
(2022070120324238300_r30) 1997
2022070120324238300_r54
2022070120324238300_r52
(2022070120324238300_r19) 2019; 3
2022070120324238300_r46
(2022070120324238300_r47) 2014
(2022070120324238300_r6) 2000
(2022070120324238300_r48) 2014; 55
(2022070120324238300_r7) 1662
(2022070120324238300_r56) 1919
References_xml – reference: Koops, Bert-Jaap, and RonaldLeenes. “Privacy Regulation Cannot Be Hardcoded. A Critical Comment on the ‘Privacy by Design’ Provision in Data-Protection Law.”International Review of Law, Computers & Technology28, no. 2 (2014): 159–71.
– reference: Akin, William. Technocracy and the American Dream: The Technocrat Movement, 1900–1941. Berkley: University of California Press, 1977.
– reference: Kuhn, Thomas. The Structure of Scientific Revolution. 4th ed. Chicago: University of Chicago Press, 2012.
– reference: Sadowski, Jathan, and EvanSelinger. “Creating a Taxonomic Tool for Technocracy and Applying It to Silicon Valley.”Technology in Society38 (2014): 161–68.
– reference: Weber, Max. Economy and Society: An Outline of Interpretive Sociology. Vol. 1. Berkeley: University of California Press, 1978.
– reference: 4. Shannon, 379–423.
– reference: 59. Abbate.
– reference: Vinsel, Lee. “You’re Doing It Wrong: Notes on Criticism and Technology Hype.” Medium. February1, 2021. https://sts-news.medium.com/youre-doing-it-wrong-notes-on-criticism-and-technology-hype-18b08b4307e5. Accessed May 5, 2021.
– reference: Lessig, Lawrence. Code: And Other Laws of Cyberspace. 2nd ed. New York: Basic Books, 2009.
– reference: Internet Corporation for Assigned Names and Numbers (ICANN). “Bylaws for Internet Corporation for Assigned Names and Numbers.” Section 1.1.i, ICANN. https://www.icann.org/resources/pages/governance/bylaws-en/#article1. Accessed May 5, 2021.
– reference: Warnier, Martijn, FrancienDechesne, and FrancesBrazier. “Design for the Value of Privacy.” In Handbook of Ethics, Values, and Technological Design: Sources, Theory, Values and Application Domains, edited by Jeroenvan den Hoven, Pieter E.Vermaas, and Ibovan de Poel, 431–45. Dordrecht: Springer, 2015.
– reference: 14. Ibid., 32.
– reference: Bowker, Geoffrey, and SusanLeigh Star. Sorting Things Out: Classification and Its Consequences. Cambridge: MIT Press, 2000.
– reference: 22. Hayek; Putnam.
– reference: Shapin, Steven, and SimonSchaffer. Leviathan and the Air-Pump: Hobbes, Boyle, and the Experimental Life. New Jersey: Princeton University Press, 2011.
– reference: 19. Cavoukian.
– reference: Boyle, Robert. New Experiments Physico-Mechanicall, Touching the Spring of the Air, and Its Effect. Oxford, UK: Miles Flesher for Richard Davis, 1662.
– reference: 25. Zuboff.
– reference: Fidler, Bradley, and AndrewL. Russell. “Financial and Administrative Infrastructure for the Early Internet: Network Maintenance at the Defense Information Systems Agency.”Technology and Culture59, no. 4 (2018): 899–924.
– reference: 57. Russell.
– reference: Hughes, Thomas Parke. Networks of Power: Electrification in Western Society, 1880–1930. Baltimore: Johns Hopkins University Press, 1983.
– reference: 1. Lessig; DeNardis, Protocol Politics.
– reference: 28. Reidenberg.
– reference: Anttiroiko, Ari-Veikko. “Castells’ Network Concept and Its Connections to Social, Economic and Political Network Analyses.”Journal of Social Structure16, no. 11 (2015): 1–18.
– reference: 48. Fidler.
– reference: Conway, Melvin. “How Do Committees Invent?”Datamation14, no. 4 (1968): 28–31.
– reference: Kranakis, Eda, BijkerWiebe, and TrevorPinch. Constructing a Bridge: An Exploration of Engineering Culture, Design, and Research in Nineteenth-Century France and America. Cambridge: MIT Press, 1997.
– reference: Hayek, Friedrich August. “The Use of Knowledge in Society.”American Economic Review35, no. 4 (1945): 519–30.
– reference: 53. Cisco.
– reference: 61. Simon; Fidler and Russell.
– reference: Faraj, Samer, DowanKwon, and StephanieWatts. “Contested Artifact: Technology Sensemaking, Actor Networks, and the Shaping of the Web Browser.”Information Technology & People17, no. 2 (2004): 185.
– reference: Caesar, Matthew, DonaldCaldwell, NickFeamster, JenniferRexford, AmanShaikh, and Jacobusvan der Merwe. “Design and Implementation of a Routing Control Platform.” In Proceedings of the 2nd Conference on Symposium on Networked Systems Design & Implementation—Volume 2, 15–28. 2005.
– reference: 31. Kuhn.
– reference: Nissenbaum, Helen. Privacy in Context: Technology, Policy, and the Integrity of Social Life. Palo Alto: Stanford University Press, 2009.
– reference: DK Hostmaster. “Danish Act on Internet Domains.”https://www.dk-hostmaster.dk/en/danish- act-internet-domains. Accessed May 5, 2021.
– reference: Russell, Andrew, and ValerieSchafer. “In the Shadow of ARPANET and Internet: Louis Pouzin and the Cyclades Network in the 1970s.”Technology and Culture55 (2014): 880–907.
– reference: Ackerman, Mark, TrevorDarrell, and DanielJ. Weitzner. “Privacy in Context.”Human–Computer Interaction16, no. 2–4 (2001): 167–76.
– reference: 34. Internet Research Task Force.
– reference: 15. Latour and Woolgar.
– reference: Veblen, Thorstein. The Place of Science in Modern Civilisation and Other Essays. New York: B.W. Huebsch, 1919.
– reference: 33. Russell; Leiner et al.
– reference: Cavoukian, Ann. “Privacy by Design: The 7 Foundational Principles.”Information and Privacy Commissioner of Ontario, Canada. Last revised January1, 2011. https://iapp.org/media/pdf/resource_center/pbd_implement_7found_principles.pdf. Accessed May 5, 2021.
– reference: 41. Ibid.
– reference: 45. Faraj, Kwon, and Watts, 185.
– reference: Zuboff, Shoshana. “Big Other: Surveillance Capitalism and the Prospects of an Information Civilization.”Journal of Information Technology30, no. 1 (2015): 75–89.
– reference: 49. McQuillan and Walden.
– reference: 3. Mueller and Badiei.
– reference: 60. Su and Postel.
– reference: 6. Smith; Marx.
– reference: 20. Koops and Leenes.
– reference: 21. Ibid.
– reference: 30. Veblen.
– reference: 35. Mueller and Badiei.
– reference: 38. Ibid.
– reference: Rice, Ronald. “Network Analysis and Computer-Mediated Communication Systems.” In Advances in Social Network Analysis: Research in the Social and Behavioral Sciences, edited by JosephGalaskiewicz and StanleyWasserman, 167. United Kingdom: Sage Publications, 1994.
– reference: 56. Bowers and Gross.
– reference: 58. Handley, 120.
– reference: Shannon, Claude. “A Mathematical Theory of Communication.”The Bell System Technical Journal27, no. 3 (1948): 379–423.
– reference: Bowers, Karen, and PhillGross, eds. Proceedings of the Twelfth Internet Engineering Task Force. March1989. https://www.ietf.org/proceedings/12.pdf. Accessed May 5, 2021.
– reference: IETF Meeting Proceeding: Internetworking Working Group. 1988, Reston, VA. https://www.ietf.org/proceedings/11.pdf. Accessed May 5, 2021.
– reference: 54. IETF Meeting Proceeding: Internetworking Working Group.
– reference: Working Party on the Protection of Individuals with regard to the Processing of Personal Data. First Annual Report (Report no. XV/5025/97-final-EN corr). Brussels: WP3, European Commission, 1997.
– reference: McQuillan, John, and DavidC. Walden. “The ARPA Network Design Decisions.”Computer Networks1, no. 5 (1977): 243–89.
– reference: Russell, Andrew. Open Standards and the Digital Age. Cambridge: Cambridge University Press, 2014.
– reference: 36. DeNardis, “Hidden Levers of Internet Control.”
– reference: 52. Russell and Schafer; Fidler.
– reference: 67. “Bylaws for Internet Corporation for Assigned Names and Numbers.”
– reference: 43. Westergard.
– reference: 65. Cerf.
– reference: 46. Rosen.
– reference: 55. Caesar et al.
– reference: 68. This law has been mentioned on the .DK registry website; “Danish Act on Internet Domains.”
– reference: Fidler, Bradley. “The Evolution of Internet Routing: Technical Roots of the Network Society.”Internet Histories3, no. 3–4 (2019): 364–87.
– reference: Pinch, Trevor, and FrankTrocco. Analog Days. Cambridge: Harvard University Press, 2004.
– reference: Putnam, Robert. “Elite Transformation in Advanced Industrial Societies: An Empirical Assessment of the Theory of Technocracy.”Comparative Political Studies10, no. 3 (1977): 383–412.
– reference: Rosen, Eric. Exterior Gateway Protocol (EGP): RFC 0827. Internet Engineering Task Force. 1982. https://www.rfc-editor.org/info/rfc827. Accessed May 5, 2021.
– reference: 5. Boyle; Shapin and Schaffer.
– reference: 44. Oever and Cath, 11.
– reference: Cisco. “Cisco Systems Customer Service Newsletter.”1989. https://weare.cisco.com/c/dam/r/weare/assets/files/packet-winter89.pdf. Accessed May 5, 2021.
– reference: Latour, Bruno, and SteveWoolgar. Laboratory Life: The Construction of Scientific Facts. New Jersey: Princeton University Press, 1986.
– reference: Smith, Adam. An Inquiry into the Nature and Causes of the Wealth of Nations: In 2 Vol. London: Allason, 1819.
– reference: Westergard, Björn. “Do Computers Follow Rules Once Followed by Workers?”IEEE Annals of the History of Computing39, no. 4 (2017): 5–8.
– reference: 23. Akin; Sadowski and Selinger.
– reference: 13. Bowker and Star.
– reference: Harrenstein, Ken, and VicWhite. NICNAME/WHOIS, RFC 812. Internet Engineering Task Force. 1982. https://tools.ietf.org/html/rfc812. Accessed May 5, 2021.
– reference: 63. Several hierarchical databases, such as ANSI SQL, were popular.
– reference: Reidenberg, Joel. “Lex Informatica: The Formulation of Information Policy Rules through Technology.”Texas Law Review76 (1997): 553–593.
– reference: Lougheed, Kirk, and YakovRekhter. Border Gateway Protocol (BGP): RFC 1105. Internet Engineering Task Force. 1989. https://www.rfc-editor.org/info/rfc1105. Accessed May 5, 2021.
– reference: Mueller, Milton L. Ruling the Root: Internet Governance and the Taming of Cyberspace. Cambridge, MA: MIT Press, 2002.
– reference: 39. Ibid.
– reference: 10. Hughes; Latour and Woolgar; Kranakis, Bijker, and Pinch; Pinch and Trocco.
– reference: Handley, Mark. “Why the Internet Only Just Works.”BT Technology Journal24, no. 3 (2006): 120.
– reference: Su, Zaw-Sing, and JohnPostel. The Domain Naming Convention for Internet User Applications: RFC 819. Internet Engineering Task Force. 1982. https://www.rfc-editor.org/info/rfc819. Accessed May 5, 2021.
– reference: 16. Anttiroiko.
– reference: Mueller, Milton L., and FarzanehBadiei. “Requiem for a Dream: On Advancing Human Rights via Internet Architecture.”Policy & Internet11, no. 1 (2019): 61–83.
– reference: 42. Keen.
– reference: Keen, Steve. Debunking Economics: The Naked Emperor Dethroned?London: Zed Books Ltd., 2011.
– reference: 27. Mueller and Badiei.
– reference: Leiner, Barry M., VintonG. Cerf, DavidD. Clark, RobertE. Kahn, LeonardKleinrock, DanielC. Lynch, JonPostel, LarryG. Roberts, and StephenWolff. “Brief History of the Internet.”Internet Society, 1997. https://www.internetsociety.org/internet/history-internet/brief-history-internet/. Accessed May 5, 2021.
– reference: 17. Working Party on the Protection of Individuals with regard to the Processing of Personal Data.
– reference: 37. Ten Oever and Cath.
– reference: Abbate, Janet. “From ARPANET to Internet: A History of ARPA-Sponsored Computer Networks, 1966–1988.” PhD diss., University of Pennsylvania, 1994, https://repository.upenn.edu/dissertations/AAI9503730 (AAI9503730). Accessed May 5, 2021.
– reference: Ten Oever , Niels, and CorrineCath. Research into Human Rights Protocol Considerations: RFC8280. Internet Engineering Task Force. 2017. https://doi.org/10.17487/RFC8280. Accessed May 5, 2021.
– reference: 47. Lougheed and Rekhter.
– reference: 24. Sadowski and Selinger.
– reference: 32. Shapin and Schaffer.
– reference: 40. Mueller and Badiei.
– reference: Internet Research Task Force. “Human Rights Protocol Considerations.”2015. https://datatracker. ietf.org/rg/hrpc/about/. Accessed May 5, 2021.
– reference: 9. See also, Conway.
– reference: 50. Fidler.
– reference: 66. Harrenstein and White.
– reference: 64. Haigh and Priestley.
– reference: Haigh, Thomas, and MarkPriestley. “Innovators Assemble: Ada Lovelace, Walter Isaacson, and the Superheroines of Computing.”Communications of the ACM58, no. 9 (2015): 20–27.
– reference: 11. Rice; Rogers.
– reference: Simon, Craig. “Launching the DNS War: Dot-Com Privatization and the Rise of Global Internet Governance.” PhD diss., University of Miami, 2006. http://scholarlyrepository.miami.edu/dissertations/2484. Accessed May 5, 2021.
– reference: 51. Rosen.
– reference: 29. Lessig.
– reference: Brand, Stewart. How Buildings Learn: What Happens After They're Built. New York: Penguin Random House, 1995.
– reference: 18. Koops and Leenes.
– reference: DeNardis, Laura. “Hidden Levers of Internet Control: An Infrastructure-Based Theory of Internet Governance.”Information, Communication & Society15, no. 5 (2012): 720–38.
– reference: 12. Nissenbaum; Ackerman, Darrell, and Weitzner; Warnier, Dechesne, and Brazier, 431-445.
– reference: DK Hostmaster. Protocol Politics: The Globalization of Internet Governance. Cambridge, MA: MIT Press, 2009.
– reference: Cerf, Vint. IAB Recommendations for the Development of Internet Network Management Standards: RFC 1052. Internet Engineering Task Force. 1988. https://doi.org/10.17487/RFC1052. Accessed May 5, 2021.
– reference: 8. Kranakis, Bijker, and Pinch.
– reference: 26. Vinsel.
– reference: Marx, Karl. Capital: A Critique of Political Economy. Translated by DavidFernbach. London: Penguine, 1990.
– reference: 2. Ten Oever and Cath.
– reference: 7. Weber.
– reference: Rogers, Everett. Communication Technology. New York: Simon and Schuster, 1986.
– reference: 62. Mueller.
– volume-title: Communication Technology
  year: 1986
  ident: 2022070120324238300_r45
– volume: 14
  start-page: 28
  issue: 4
  year: 1968
  ident: 2022070120324238300_r14
  article-title: “How Do Committees Invent?”
  publication-title: Datamation
– volume: 35
  start-page: 519
  issue: 4
  year: 1945
  ident: 2022070120324238300_r24
  article-title: “The Use of Knowledge in Society.”
  publication-title: American Economic Review
– ident: 2022070120324238300_r13
– ident: 2022070120324238300_r61
– volume: 24
  start-page: 120
  issue: 3
  year: 2006
  ident: 2022070120324238300_r22
  article-title: “Why the Internet Only Just Works.”
  publication-title: BT Technology Journal
– start-page: 167
  volume-title: Advances in Social Network Analysis: Research in the Social and Behavioral Sciences
  year: 1994
  ident: 2022070120324238300_r44
– ident: 2022070120324238300_r54
  doi: 10.17487/rfc0819
– volume-title: Debunking Economics: The Naked Emperor Dethroned?
  year: 2011
  ident: 2022070120324238300_r28
– ident: 2022070120324238300_r46
  doi: 10.17487/rfc0827
– ident: 2022070120324238300_r26
– volume: 11
  start-page: 61
  issue: 1
  year: 2019
  ident: 2022070120324238300_r39
  article-title: “Requiem for a Dream: On Advancing Human Rights via Internet Architecture.”
  publication-title: Policy & Internet
  doi: 10.1002/poi3.190
– volume-title: How Buildings Learn: What Happens After They're Built
  year: 1995
  ident: 2022070120324238300_r8
– volume: 59
  start-page: 899
  issue: 4
  year: 2018
  ident: 2022070120324238300_r20
  article-title: “Financial and Administrative Infrastructure for the Early Internet: Network Maintenance at the Defense Information Systems Agency.”
  publication-title: Technology and Culture
  doi: 10.1353/tech.2018.0090
– volume-title: Privacy in Context: Technology, Policy, and the Integrity of Social Life
  year: 2009
  ident: 2022070120324238300_r40
– start-page: 15
  year: 2005
  ident: 2022070120324238300_r10
  article-title: “Design and Implementation of a Routing Control Platform.”
  publication-title: Proceedings of the 2nd Conference on Symposium on Networked Systems Design & Implementation—Volume 2
– ident: 2022070120324238300_r9
– volume-title: Networks of Power: Electrification in Western Society, 1880–1930
  year: 1983
  ident: 2022070120324238300_r25
– volume: 39
  start-page: 5
  issue: 4
  year: 2017
  ident: 2022070120324238300_r60
  article-title: “Do Computers Follow Rules Once Followed by Workers?”
  publication-title: IEEE Annals of the History of Computing
– ident: 2022070120324238300_r12
  doi: 10.17487/rfc1052
– volume-title: Leviathan and the Air-Pump: Hobbes, Boyle, and the Experimental Life
  year: 2011
  ident: 2022070120324238300_r51
– volume-title: Protocol Politics: The Globalization of Internet Governance
  year: 2009
  ident: 2022070120324238300_r17
– ident: 2022070120324238300_r1
– ident: 2022070120324238300_r52
– volume-title: Economy and Society: An Outline of Interpretive Sociology
  year: 1978
  ident: 2022070120324238300_r59
– ident: 2022070120324238300_r5
– volume-title: Capital: A Critique of Political Economy
  year: 1990
  ident: 2022070120324238300_r36
– volume: 10
  start-page: 383
  issue: 3
  year: 1977
  ident: 2022070120324238300_r42
  article-title: “Elite Transformation in Advanced Industrial Societies: An Empirical Assessment of the Theory of Technocracy.”
  publication-title: Comparative Political Studies
  doi: 10.1177/001041407701000305
– volume: 55
  start-page: 880
  year: 2014
  ident: 2022070120324238300_r48
  article-title: “In the Shadow of ARPANET and Internet: Louis Pouzin and the Cyclades Network in the 1970s.”
  publication-title: Technology and Culture
  doi: 10.1353/tech.2014.0096
– start-page: 431
  volume-title: Handbook of Ethics, Values, and Technological Design: Sources, Theory, Values and Application Domains
  year: 2015
  ident: 2022070120324238300_r58
  doi: 10.1007/978-94-007-6970-0_17
– ident: 2022070120324238300_r11
– volume: 30
  start-page: 75
  issue: 1
  year: 2015
  ident: 2022070120324238300_r62
  article-title: “Big Other: Surveillance Capitalism and the Prospects of an Information Civilization.”
  publication-title: Journal of Information Technology
  doi: 10.1057/jit.2015.5
– ident: 2022070120324238300_r57
– volume-title: New Experiments Physico-Mechanicall, Touching the Spring of the Air, and Its Effect
  year: 1662
  ident: 2022070120324238300_r7
– volume: 1
  start-page: 243
  issue: 5
  year: 1977
  ident: 2022070120324238300_r37
  article-title: “The ARPA Network Design Decisions.”
  publication-title: Computer Networks
– volume: 76
  start-page: 553
  year: 1997
  ident: 2022070120324238300_r43
  article-title: “Lex Informatica: The Formulation of Information Policy Rules through Technology.”
  publication-title: Texas Law Review
– volume-title: Constructing a Bridge: An Exploration of Engineering Culture, Design, and Research in Nineteenth-Century France and America
  year: 1997
  ident: 2022070120324238300_r30
– volume: 16
  start-page: 167
  issue: 2–4
  year: 2001
  ident: 2022070120324238300_r2
  article-title: “Privacy in Context.”
  publication-title: Human–Computer Interaction
– volume: 3
  start-page: 364
  issue: 3–4
  year: 2019
  ident: 2022070120324238300_r19
  article-title: “The Evolution of Internet Routing: Technical Roots of the Network Society.”
  publication-title: Internet Histories
– volume-title: Analog Days
  year: 2004
  ident: 2022070120324238300_r41
– volume-title: An Inquiry into the Nature and Causes of the Wealth of Nations: In 2 Vol
  year: 1819
  ident: 2022070120324238300_r53
– ident: 2022070120324238300_r15
  doi: 10.1080/1369118X.2012.659199
– volume: 28
  start-page: 159
  issue: 2
  year: 2014
  ident: 2022070120324238300_r29
  article-title: “Privacy Regulation Cannot Be Hardcoded. A Critical Comment on the ‘Privacy by Design’ Provision in Data-Protection Law.”
  publication-title: International Review of Law, Computers & Technology
  doi: 10.1080/13600869.2013.801589
– ident: 2022070120324238300_r35
  doi: 10.17487/rfc1105
– volume-title: Code: And Other Laws of Cyberspace
  year: 2009
  ident: 2022070120324238300_r34
– ident: 2022070120324238300_r33
– ident: 2022070120324238300_r16
– volume-title: Laboratory Life: The Construction of Scientific Facts
  year: 1986
  ident: 2022070120324238300_r32
– volume: 27
  start-page: 379
  issue: 3
  year: 1948
  ident: 2022070120324238300_r50
  article-title: “A Mathematical Theory of Communication.”
  publication-title: The Bell System Technical Journal
  doi: 10.1002/j.1538-7305.1948.tb01338.x
– volume-title: Open Standards and the Digital Age
  year: 2014
  ident: 2022070120324238300_r47
– volume-title: The Place of Science in Modern Civilisation and Other Essays
  year: 1919
  ident: 2022070120324238300_r56
– volume: 16
  start-page: 1
  issue: 11
  year: 2015
  ident: 2022070120324238300_r4
  article-title: “Castells’ Network Concept and Its Connections to Social, Economic and Political Network Analyses.”
  publication-title: Journal of Social Structure
– ident: 2022070120324238300_r55
  doi: 10.17487/RFC8280
– volume: 17
  start-page: 185
  issue: 2
  year: 2004
  ident: 2022070120324238300_r18
  article-title: “Contested Artifact: Technology Sensemaking, Actor Networks, and the Shaping of the Web Browser.”
  publication-title: Information Technology & People
– ident: 2022070120324238300_r23
– volume: 38
  start-page: 161
  year: 2014
  ident: 2022070120324238300_r49
  article-title: “Creating a Taxonomic Tool for Technocracy and Applying It to Silicon Valley.”
  publication-title: Technology in Society
  doi: 10.1016/j.techsoc.2014.05.001
– volume-title: Sorting Things Out: Classification and Its Consequences
  year: 2000
  ident: 2022070120324238300_r6
– ident: 2022070120324238300_r27
– volume-title: Technocracy and the American Dream: The Technocrat Movement, 1900–1941
  year: 1977
  ident: 2022070120324238300_r3
– volume: 58
  start-page: 20
  issue: 9
  year: 2015
  ident: 2022070120324238300_r21
  article-title: “Innovators Assemble: Ada Lovelace, Walter Isaacson, and the Superheroines of Computing.”
  publication-title: Communications of the ACM
  doi: 10.1145/2804228
– volume-title: The Structure of Scientific Revolution
  year: 2012
  ident: 2022070120324238300_r31
– volume-title: Ruling the Root: Internet Governance and the Taming of Cyberspace
  year: 2002
  ident: 2022070120324238300_r38
SSID ssj0000456308
Score 2.1723955
Snippet This article discusses the shortcomings of value in design approach to protect human rights on the Internet. It argues that Internet protocols do not single...
SourceID crossref
jstor
dukeupress
SourceType Enrichment Source
Index Database
Publisher
StartPage 376
SubjectTerms Government
human rights
IETF
infrastructure
Internet protocols
Law
Public Policy
Title The Would-Be Technocracy: Evaluating Efforts to Direct and Control Social Change with Internet Protocol Design
URI https://doi.org/10.5325/jinfopoli.11.2021.0376
https://www.jstor.org/stable/10.5325/jinfopoli.11.2021.0376
Volume 11
WOSCitedRecordID wos000673436300003&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  customDbUrl:
  eissn: 2158-3897
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000456308
  issn: 2381-5892
  databaseCode: DOA
  dateStart: 20110101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Nb9MwGLa6waEXBAXEBkM-TNzSNbUT29zYtAokNPUwxG6RYzuoqEqrNhvbfh6_jNcf-SidVHbgklZWbKV5nvr98PuB0HEuE5B7aR7lYzGOaKySiGtOorQYsSLlMaFUumYT7OKCX12Jaa_3u86FuZmzsuS3t2L5X6GGMQDbps4-Au5mURiA7wA6XAF2uP4z8N9t4-ro1ATPuVpJ5So7nYfa3uUP21LZHRaA7um3PXeMcBYi10PWrs898M5a7zs0lc0tqBbAH9irmuiPbfU2VGR19Fq64sPOvdtJTAxR2lM57LgjTm0ImoswmMjVvSxN466ezHTIWrTn__V5dHBYjOO_gj-mIEDWd3OwE2bSa9RbSZHtHmgViijhvl3e0PixOOER6FlsYxOPO7swYWlHoFOX0r0lKxLiGj_9tGP2NYDwGNrHHY6a6Rt1uHdN2UNPxiwRomPWO22A2gpsrjFi_Vt8orpd7OThpTZ0pL4N7792UdGbMbNOA7p8jp4FbPEnT7kXqGfKAeq3zZoHaO-r_DVARyEXBn_AX1oS4CBFXqISGIprhuIOQz_ilp848BNXC-z5iYGfOPATe35iz09s-YlrfuKan9jz8xX6Njm_PPschbYfkSIxrUArKAQRiqo8ZRrMcTHKcyEZhU8K6iwrQG5oqZi27hUTS53oRGqixjIndKQVeY32y0Vp3iAcE57nRhtCRE5TnXNhuGa8GAmbYV3wA5TULzpToSa-bc0yz8A2tgBlDUBgKmcWoMwCdIBOmnlLXxVm54yoxTFbL9XO-48d1M3yD992-Mhl36J--5d8h_ar1bU5Qk_VTTVbr9475v4Bl1zQtA
linkProvider Directory of Open Access Journals
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=The+Would-Be+Technocracy%3A+Evaluating+Efforts+to+Direct+and+Control+Social+Change+with+Internet+Protocol+Design&rft.jtitle=Journal+of+information+policy+%28University+Park%2C+Pa.%29&rft.au=Badiei%2C+Farzaneh&rft.au=Fidler%2C+Bradley&rft.date=2021-12-01&rft.pub=Pennsylvania+State+University+Press&rft.issn=2381-5892&rft.eissn=2158-3897&rft.volume=11&rft.spage=376&rft.epage=402&rft_id=info:doi/10.5325%2Fjinfopoli.11.2021.0376&rft.externalDocID=10.5325%2Fjinfopoli.11.2021.0376
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2381-5892&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2381-5892&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2381-5892&client=summon