347 research outputs found

    The Changing Patterns of Internet Usage

    Get PDF
    Symposium: Essays from Time Warner Cable\u27s Research Program on Digital Communications

    A Portrait of the Internet as a Young Man

    Get PDF
    In brief, the core theory of Jonathan Zittrain’s1 2008 book The Future of the Internet - and How to Stop It is this: good laws, norms, and code are needed to regulate the Internet, to prevent bad laws, norms, and code from compromising its creative capabilities and fettering its fecund flexibility. A far snarkier if less alliterative summary would be “We have to regulate the Internet to preserve its open, unregulated nature.” Zittrain posits that either a substantive series of unfortunate Internet events or one catastrophic one will motivate governments to try to regulate cyberspace in a way that promotes maximum stability, which will inhibit or possibly even preclude future technological innovations that rely on open access to the tools and systems that comprise the Internet. To head this off, he calls for a “transition to a networking infrastructure that is more secure yet roughly as dynamic as the current one,” which will be achieved by collaborative efforts, “a 21st century international Manhattan Project which brings together people of good faith in government, academia, and the private sector for the purpose of shoring up the miraculous information technology grid that is too easy to take for granted and whose seeming self-maintenance has led us into an undue complacence.” Zittrain uses brief, informal accounts of past events to build two main theories that dominate the book. First, he claims that open access, which he calls generativity, is under threat by a trend toward closure, which he refers to as tetheredness, which is counterproductively favored by proprietary entities. Though consumers prefer openness and the autonomy it confers, few take advantage of the opportunities it provides, and therefore undervalue it and too readily cede it in favor of the promise of security that tetheredness brings. Second, he argues that if the Internet is to find salvation it will be by the grace of “true netizens,” volunteers acting collectively in good faith to cultivate positive social norms online. Zittrain is a creative thinker and entertaining speaker, and his book is engaging and informative in much the same ways that his talks are, loaded with pop culture references and allegorical tales about technology and the once and future Internet. Zittrain uses numerous anecdotes to support his dual hypotheses, exhaustively affirming that open innovative tools and systems are essential for online life to flourish, and his contention that the Internet is exceedingly vulnerable to bad actors (a proposition I have never seen another cyberlaw scholar seriously question). But he isn’t very clear about the specific attributes of laws or regulations that could effectively foster enhanced security without impairing dynamism. He also seems to have a discomfitingly elitist view about who should be making policy decisions about the Internet’s future: like-minded, self-appointed, and knowledgeable volunteers with the time, interest, and expertise to successfully maneuver sectors of the Internet into the form or direction he thinks best

    Assessing Alternative Compensation Models for Online Content Consumption

    Get PDF

    Preface

    Get PDF

    The role of non-state actors in regime formation: Case study on Internet governance.

    Get PDF
    Many scholars argue that the Internet is a symbol of globalization and avoidance of state control. The Internet governance negotiations, which aims to establish an international regime for the Internet, is conducted through a multi-stakeholder setting associated with extensive involvement of non-state actors. This has been viewed as an indicator for a \u27diminishing state role\u27 in international relations; particularly, formation of international regimes. This study indicates that the role of states does not diminish in regime formation. States, especially great powers, are the main actors that set international principles, norms, rules and decision-making procedures. They create regimes in order to regulate international behavior as to global sectors, including the Internet. States deliberately enable certain non-state actors to participate in regime formation and governance of some global sectors, based on conscious perception of the utility and usefulness of such participation

    Law and Information Platforms

    Get PDF

    Digital Architecture as Crime Control

    Get PDF
    This paper explains how theories of realspace architecture inform the prevention of computer crime. Despite the prevalence of the metaphor, architects in realspace and cyberspace have not talked to one another. There is a dearth of literature about digital architecture and crime altogether, and the realspace architectural literature on crime prevention is often far too soft for many software engineers. This paper will suggest the broad brushstrokes of potential design solutions to cybercrime, and in the course of so doing, will pose severe criticisms of the White House\u27s recent proposals on cybersecurity. The paper begins by introducing four concepts of realspace crime prevention through architecture. Design should: (1) create opportunities for natural surveillance, meaning its visibility and susceptibility to monitoring by residents, neighbors, and bystanders; (2) instill a sense of territoriality so that residents develop proprietary attitudes and outsiders feel deterred from entering a private space; (3) build communities and avoid social isolation; and (4) protect targets of crime. There are digital analogues to each goal. Natural-surveillance principles suggest new virtues of open-source platforms, such as Linux, and territoriality outlines a strong case for moving away from digital anonymity towards psuedonymity. The goal of building communities will similarly expose some new advantages for the original, and now eroding, end-to-end design of the Internet. An understanding of architecture and target prevention will illuminate why firewalls at end points will more effectively guarantee security than will attempts to bundle security into the architecture of the Net. And, in total, these architectural lessons will help us chart an alternative course to the federal government\u27s tepid approach to computer crime. By leaving the bulk of crime prevention to market forces, the government will encourage private barricades to develop - the equivalent of digital gated communities - with terrible consequences for the Net in general and interconnectivity in particular

    O papel dos Pontos de Troca de Tráfego em políticas e regulação da banda larga

    Get PDF
    Novos investimentos em infraestrutura de redes de transporte (backbones) para a internet e a necessidade de trocar tráfego com backbones existentes, tanto na modalidade de trânsito como na de peering, indicam a crescente relevância de um elemento-chave nessa arquitetura – o Ponto de Troca de Tráfego (PTT). Há muito poucos PTT disponíveis hoje em dia, principalmente se considerado o vertiginoso crescimento no número de sistemas autônomos anunciados. Os PTT implantados por redes de pesquisa demonstram que um acréscimo expressivo no número desses pontos teria o efeito de melhorar a topologia da internet, aumentar a conectividade, reduzir a latência e o custo de troca de tráfego. Adicionalmente, os PTT podem ser o local mais eficiente para a oferta de determinados serviços. Este trabalho aborda as possibilidades de ação regulatória para estimular a implementação dos PTT e para assegurar que seus benefícios sejam amplamente compartilhados
    corecore