10,391
Views
121
CrossRef citations to date
0
Altmetric
Original Articles

HIDDEN LEVERS OF INTERNET CONTROL

An infrastructure-based theory of Internet governance

Pages 720-738 | Received 02 Dec 2011, Accepted 17 Jan 2012, Published online: 16 Feb 2012

References

  • Abbate , J. 1999 . Inventing the Internet , Cambridge : MIT Press .
  • Amazon (2010) ‘Amazon statement regarding WikiLeaks’, Press Release, [Online] Available at: http://aws.amazon.com/message/65348/ (31 January 2012).
  • Balkin , J. 2008 . The future of free expression in a digital age . Pepperdine Law Review , 36 : 427 – 444 .
  • Bendrath, R. & Mueller, M. (2010) ‘The end of the net as we know it? Deep packet inspection and internet governance’, [Online] Available at: http://ssrn.com/abstract=1653259 (11 August 2011).
  • Benkler, Y. (2011) ‘A free irresponsible press: WikiLeaks and the battle over the soul of the networked fourth estate’, Harvard Civil Rights-Civil Liberties Law Review, [Online] Available at: http://harvardcrcl.org/wp-content/uploads/2011/08/Benkler.pdf (1 November 2011).
  • boyd , d. and Hargittai , E. 2010 . Facebook privacy settings: who cares? . First Monday , 15 ( 8 ) : 13 – 21 .
  • Castells , M. 2007 . Communication, power and counter-power in the network society . International Journal of Communication , 1 : 238 – 266 .
  • Deibert , R. , Palfrey , J. , Rohozinski , R. and Zittrain , J. 2010 . Accessed Controlled: The Shaping of Power, Rights and Rule in Cyberspace , Cambridge : MIT Press .
  • DeNardis , L. 2009 . Protocol Politics: The Globalization of Internet Governance , Cambridge : MIT Press .
  • DeNardis, L. (2010) ‘The privatization of internet governance’, presented at the Fifth Annual Meeting of the Global Internet Governance Academic Network (GigaNet), Vilnius, Lithuania, September 2010, [Online] Available at: http://tinyurl.com/7wt47zn (4 January 2010).
  • DeNardis , L. 2011 . Opening Standards – The Global Politics of Interoperability , Edited by: DeNardis , L. Cambridge : MIT Press .
  • Dutton , W. and Peltu , M. 2007 . The emerging internet governance mosaic: connecting the pieces . Information Polity , 12 ( 1–2 ) : 63 – 81 .
  • Elinson, Z. & Walter, S. (2011, 17 July) ‘Latest BART shooting prompts new discussion of reforms’, New York Times, [Online] Available at: http://www.nytimes.com/2011/07/17/us/17bcbart.html?pagewanted=all (5 September, 2011).
  • Feenberg , A. 1999 . Questioning Technology , London : Routledge .
  • Felten, E. (July 2006) ‘Nuts and bolts of network neutrality’, Woodrow Wilson School of Public and International Affairs, Princeton University, [Online] Available at: http://itpolicy.princeton.edu/pub/neutrality.pdf (11 November 2011).
  • Geist, M. (2001) ‘Fair.com?: an examination of the allegations of systemic unfairness in the ICANN UDRP’, [Online] Available at: http://ssrn.com/abstract=280630 (29 November 2011).
  • Ghosh, R. (2005) ‘An economic basis for open standards’, [Online] Available at: http://flosspols.org/deliverables/FLOSSPOLSD04-openstandards-v6.pdf (2 July 2011).
  • Gillespie , T. 2010 . The politics of “platforms” . New Media & Society , 12 ( 3 ) : 347 – 364 .
  • Grimmelmann, J. (2007) ‘Don't censor search’, 117 Yale Law Journal Pocket Part 48m.
  • Lessig , L. 1999 . Code and Other Laws of Cyberspace , New York : Basic Books .
  • Morris, J. & Davidson, A. (2003) ‘Policy impact assessments: considering the public interest in internet standards development’, 31st Research Conference on Communication, Information and Internet Policy, [Online] Available at: http://www.cdt.org/publications/pia.pdf (29 November 2011).
  • Mueller , M. 2002 . Ruling the Root: Internet Governance and the Taming of Cyberspace , Cambridge : MIT Press .
  • Mueller , M. 2010 . Networks and States: The Global Politics of Internet Governance , Cambridge : MIT Press .
  • Nissenbaum, H. (2001) ‘How computer systems embody values’, IEEE Computer, Vol. 34, no. 3, pp. 118–120.
  • Ohm, P. (2009) ‘The rise and fall of invasive ISP surveillance’, University of Illinois Law Review, University of Colorado Law Legal Studies Research Paper No. 08-22.
  • OpenNet Initiative Bulletin (2005) ‘Nepal: internet down, media censorship imposed’, Bulletin, [Online] Available at: http://opennet.net/blog/2005/02/nepal-internet-down-media-censorship-imposed (1 November 2011).
  • OpenNet Initiative Bulletin (2007) ‘Pulling the plug: a technical review of the internet shutdown in Burma’, Report, [Online] Available at: http://opennet.net/sites/opennet.net/files/ONI_Bulletin_Burma_2007.pdf (1 November 2011).
  • Paré , D. 2003 . Internet Governance in Transition: Who is the Master of This Domain , Oxford : Roman and Littlefield Publishers .
  • PayPal (2010) ‘PayPal statement regarding WikiLeaks’, Press Release, [Online] Available at: https://www.thepaypalblog.com/2010/12/paypal-statement-regarding-wikileaks/ (3 December 2010).
  • Seltzer , W. 2011 . Exposing the flaws of censorship by domain name . IEEE Security and Privacy , 9 ( 1 ) : 83 – 87 .
  • Solove , D. 2007 . The Future of Reputation: Gossip, Rumor, and Privacy on the Internet , New Haven : Yale University Press .
  • Vaidhyanathan , S. 2011 . The Googlization of Everything (and Why We Should Worry) , Berkeley and Los Angeles : University of California Press .
  • Winner , L. 1980 . Do artifacts have politics? . Daedalus , 109 : 121 – 136 .
  • Wu , T. and Yoo , C. 2007 . Keeping the internet neutral?: Tim Wu and Christopher Yoo debate . Federal Communications Law Journal , 59 ( 3 ) [Online] Available at: http://ssrn.com/abstract=953989 (31 January 2012)
  • Yu , P. 2010 . The graduated response . Florida Law Review , 62 : 1395 – 1396 .
  • Zittrain , J. 2008 . The Future of the Internet and How to Stop it , New Haven : Yale University Press .
  • Zuckerman , E. 2010 . “ Intermediary censorship ” . In Access Controlled: The Shaping of Power, Rights and Rule in Cyberspace , Edited by: Deibert , R. , Palfrey , J. , Rohozinski , R. and Zittrain , J. Cambridge : MIT Press .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.