MA dissertation. University of Oxford, Oxford, UK. Cardoso, F. United Nations. DeNardis, L. Dery, D. Agenda setting and problem definition. Doolin, B. Narratives of change: Discourse, technology and organization. Dourish, P. Dunne, A. Epstein, D. Flichy, P.
Cambridge, Mass. Flyverbom, M. Cheltenham, UK: Edward Elgar. Greenberg, A.
New York: Plume. Hess, D. Technology-and product-oriented movements: Approximating social movement studies and science and technology studies. Hintz, A. At the margins of Internet governance: grassroots tech groups and communication policy. Hoffmann, J. New York: Routledge. Jasanoff, S. JSF Resea, R. Human rights in the global information society. Kingdon, J. New York: Longman. Law, J.
The Turn To Infrastructure In Internet Governance
Power, Discretion and Strategy. Law Ed. London: Routledge. Organization, Narrative and Strategy. Parker Eds. MacKenzie, D. Buckingham and Philadelphia: Open University Press. McCharty, D. Milan, S. Howley Ed.
Thousand Oaks, CA: Sage. Mol, A. Durham and London: Duke University Press. Mueller, M. The Global Politics of Internet Governance. Musiani, F. Musiani, D. Cogburn, L. Levinson Eds. Basingstoke, UK: Palgrave Macmillan. Padovani, C. Parks, L. Goldberg Eds. Pavan, E. Lanham, MA: Lexington Books. Raymond, M. Multistakeholderism: Anatomy of an Inchoate Global Institution. By shaping their decentralised storage service, the developers of Drizzle carry on a double experimentation: with the frontier between centralisation and decentralisation, and with sharing modalities that blend peer-to-peer, social networking and the cloud.
As in the development of Drizzle, a conception of privacy and confidentiality of personal data, which is conceived of and enforced via technical means — called privacy by design Cavoukian, ; Schaar, , is at work. This conceptualisation of privacy is defined by means of the constraints and the opportunities linked to the treatment and the location of data, according to the different moments and the variety of operations taking place within the system. Please, do not forget your password and use, if needed, your password hint.
The operations, for the most part automatically managed, that are linked to the protection of personal data are thus hosted on the terminals of users. However, this reconfiguration in the balance of rights comes with a trade-off. As the password stays with the user and is not sent to the servers controlled by the firm, the latter cannot retrieve the password if needed.
Table of contents
Thus, users do not only see their privacy reinforced, but at the same time and for the same reasons, the responsibility for their actions is augmented — while the service provider renounces some of its control over the content that circulates thanks to the service it manages. However, it needs to be acknowledged, as Michel van Eeten and Milton Mueller do, that the literature describing itself as specialized in the internet governance field often tends to focus on a limited number of international institutions and debates about the global politics of the internet.
It helps identifying and presenting different versions of the worlds in which notions of governance take place, before defining what governance actually is Ziewitz and Pentzold, Arrangements of technical architecture have always inherently been arrangements of power, writes Laura DeNardis : the technical architecture of networked systems does not only affect internet governance, but is internet governance.
Changes in architectural design affect the repartition of competences and responsibilities between service providers, content producers, users and network operators. They shape the sustainability of the underlying economic models and the technical and legal approaches to the management of digital content and personal data.
They make visible, in various configurations, the forms of interaction between the local and the global, the patterns of articulation between the individual and the collective. Changes in network architectures contribute to the shaping of user rights, of the ways to produce and enforce law, and are reconfigured in return. A number of legal issues, that go way beyond copyright despite having often been reduced to this aspect, notably in the case of peer-to-peer systems , are raised by architectural configurations of internet services.
They contribute to define what is a contributor in internet-based services, in terms of computing resources required for operating the system, and of content. Information and communication technologies, the internet first and foremost, are increasingly mobilized to serve broader economic, political and military aims, ranging from the theft of strategic data to the hijacking of industrial systems.
The rise of techniques, devices and infrastructures destined to facilitate digital espionage, data collection and aggregation, tracking and surveillance is highlighted not only by the recent Snowden revelations, but also by the construction and the organization of a dedicated, increasingly widespread and lucrative market. What lies under the internet governance label is, in fact, an ensemble of fluidly-contoured socio-political and socio-technical controversies, which have in STS-informed approaches to network architecture — its centralization and decentralization — one of the best opportunities to be thoroughly accounted for, richly described and extensively analysed.
If it is possible to design in detail the architecture of the world users interact with, it is possible to design the architecture of our global communication infrastructure in order to promote specific types of political, economic and legal interactions over others De Filippi et al. Technical architectures, as argued by several authors discussed in this article, may be understood as alternative ways of influencing economic systems, sets of rules, communities of practice — indeed, as the very fabric of user behaviour and interaction.
The status of every internet user as consumer, sharer, producer and possibly manager of digital content is informed by, and shapes in return, the technical structure and organisation of the services she has access to. This broad definition implies the involvement of a plurality of actors, and the possibility for them to deploy a plurality of governance mechanisms. IG has been described as a mix of technical coordination, standards, and policies e. Malcolm, and Mueller, See also DeNardis, and Musiani, a. Abbate, J. Agre, P. Peer-to-Peer and the promise of internet equality.
Aigrain, P. Declouding freedom: reclaiming servers, services and data. Akrich, M. Benkler, Y. Sharing nicely: on shareable goods and the emergence of sharing as a modality of economic production. Bowker, G. Musiani, F. Paris: Presses des Mines, pp. Brousseau, E.
Governance, Regulations and Powers on the Internet. Cambridge: Cambridge University Press. Callon, M. Sociologie de la traduction: textes fondateurs. Cavoukian, A. Special issue: Privacy by design: The next generation in the evolution of privacy. Identity in the Information Society 3 2. Cheniti, T. Unpublished DPhil Thesis. University of Oxford. De Filippi, P.
BE THE FIRST TO KNOW
Peer production online communities, distributed architectures and governance by design , Communication presented at the Fourth Transforming Audiences Conference. DeNardis, L. Protocol Politics: the Globalization of Internet Governance. The turn to infrastructure for internet governance. Dutton, W. The Emerging Field of Internet Governance.
Laura DeNardis - Google Scholar Citations
Oxford Handbook of Internet Studies. The Global War for Internet Governance. Dodier, N. Les Hommes et les Machines. Elkin-Koren, N. I am very interested in more info on adopting HR values in engineering applications. You mentioned that privacy and other principles were integral in developing protocols. Which ones? And developed by who IETF? I feel greatly excited about the future of internet governance by your revelations and facts about the so envisaged prospects for the global community..
It will be great day when the governance by internet will rule the entire world. As per the rules I feel your comments to control the root file of internet network will be duly resolved by proper infrastructural efforts by the internet engineers. As per the recognition of the internet governance more efforts in making realize the potential of governance will help the political and social circles to adopt the course of internet governance. Click here to cancel reply.
Email Address. Facebook Facebook. Alternative internet s : Governance by internet infrastructure.