[email protected]: Toward a Critical Theory of Cyberspace A

Total Page:16

File Type:pdf, Size:1020Kb

Habermas@Discourse.Net: Toward a Critical Theory of Cyberspace A University of Miami Law School University of Miami School of Law Institutional Repository Articles Faculty and Deans 2003 [email protected]: Toward a Critical Theory of Cyberspace A. Michael Froomkin University of Miami School of Law, [email protected] Follow this and additional works at: https://repository.law.miami.edu/fac_articles Part of the Internet Law Commons, Jurisprudence Commons, and the Law and Society Commons Recommended Citation A. Michael Froomkin, [email protected]: Toward a Critical Theory of Cyberspace, 116 Harv. L. Rev. 749 (2003). This Article is brought to you for free and open access by the Faculty and Deans at University of Miami School of Law Institutional Repository. It has been accepted for inclusion in Articles by an authorized administrator of University of Miami School of Law Institutional Repository. For more information, please contact [email protected]. VOLUME 116 JANUARY 2003 NUMBER 3 HARVARD LAW REVIEW ARTICLES [email protected]: TOWARD A CRITICAL THEORY OF CYBERSPACE A. Michael Froomkin TABLE OF CONTENTS IN TR O D UC T IO N ............................................................................................................................... 751 I. H ABERM AS ON D ISCOURSE THEORY ...................................................................................... 757 A . Critica l T h eory ..................................................................................................................... 761 B . S u bstantive C riteria............................................................................................................ 764 C. Discourse Ethics and PracticalD iscourses...................................................................... 767 II. THE INTERNET STANDARDS PROCESS: A DISCOURSE ABOUT DISCOURSE ..................... 777 A. W hat Is the In ternet? .......................................................................................................... 778 B. A Short Social and InstitutionalHistory of Internet Standard-Making...................... 782 1. T he Prehistoric Period: 1968-1972 ............................................................................... 783 2. Form alization B egins: 1972- 1986 ................................................................................. 785 3. IETF Formed, Further Formalization: 1986-1992 ..................................................... 786 4. Institutionalization and Legitim ation: 1992-1995 ...................................................... 787 (a) The Internet Architecture Board (IAB) ................................................................. 788 (b) The Internet Engineering Task Force (IETF) ...................................................... 792 5. The Internet Standard Creation Process Today (1996-Present) ................................ 794 III. THE INTERNET STANDARDS PROCESS AS A CASE STUDV IN DISCOURSE ETHICS ......... 796 A. The IETF StandardsProcess as the Best PracticalDiscourse ....................................... 798 B. Counter: The IETF Standards Process Is Too Male and Monolingual To Be the "B est" P ractical Discourse .............................................................................................. 805 C. Counter. It's Too Specialized To Matter ............................................................................ 8o8 1. The Claim that the IETF Is "Technical" and Thus Outside the "Public Sphere".. 8o8 2. The IETF Debates Whether an RFC Is "Law ..................................................... 812 D. Can the IETF Example Be Generalized?..................................................................... 815 IV. APPLICATIONS: CRITIQUES OF INTERNET STANDARDS FORMED O UT SID E T H E IE T F .................................................................................. ....................... 8 18 A. N oninstitutionalStandard-M aking .................................................................................. 819 B. Socializationand the Reproduction of Non-Hierarchy.............................................. 82o 749 750 HARVARD LAW REVIEW [Vol. I16:749 C. Delegation: The Usenet Example ....................................................................................... 821 1. Mass Revenge/Vigilante Justice: The Usenet Spam Problem and Its (Partial) Solution ............................................................................................................................ 825 2. T he U senet D eath Penalty ............................................................................................ 829 D. R esponses to E m ail Span ................................................................................................... 831 E. M arket-Induced Standardization...................................................................................... 835 F ICAN N : The Creation of a N ew Governance Institution................................................. 838 1. W hy ICA N N M atters ..................................................................................................... 842 2. ICAN N 's Legitim ation Crisis ....................................................................................... 844 3. Learning from ICA NN .................................................................................................. 852 V. T ECHNOLOGIES FOR D EM OCRACY ......................................................................................... 855 A. H ardwarefor Dem ocracy .................................................................................................... 858 B. W eblogs and B logs ................................................................................................................ 859 C. W iki Webs and Other Collaborative Drafting Tools ...................................................... 88o D. Slash and Other Collaborative Filtering Tools ................................................................. 863 E. From Open Government to Community DeliberationTools ............................................ 867 VI. CONCLUSION ........................................................................................................................... 871 [email protected]: TOWARD A CRITICAL THEORY OF CYBERSPACE A. Michael Froomkin* INTRODUCTION In what has been called "a monumental achievement ...that pro- vides a systematic account of major issues in contemporary jurispru- dence, constitutional theory, political and social philosophy, and the theory of democracy,"' Jiirgen Habermas has proposed a discourse eth- ics as the basis for testing the legitimacy of legal institutions. Haber- mas seeks to identify and explain a method for justifying valid law and legal institutions, or at least the procedures necessary to make le- gitimate law. His approach blends an abstract theory of justice with a sociological theory of law that is grounded in empirical observations.' Attempting to bring moral philosophy into the realm of political sci- ence, Habermas seeks nothing less than to describe a system that can validate moral choices, notably those about how society should be or- ganized. Habermas proposes a way to identify norms that are pre- sumptively legitimate because they were reached according to morally justified procedures. In so doing, Habermas directly confronts the most difficult obstacles to moralizing about social organization, includ- ing the fact/value distinction,3 false consciousness,4 and the injustices * Professor of Law, University of Miami School of Law. This paper had a long gestation for a piece concerning the Internet, during which I accumulated debts to an unusually large number of helpful readers, more than I dare list here. Previous drafts also benefited from discourse at the Georgetown University Law Center (2ooi), a Stanford Law School faculty colloquium (2ooo), the conference on Culture & the Humanities (Winston-Salem, 1999), and - under another title - the I7th IVR World Congress: Challenges to Law at the End of the 2oth Century (Bologna, 1995) and the Law and Society Association Annual Meeting (Toronto, '995). Caroline Bradley has had to put up with it from the start, and for that and everything else, no thanks suffice. 1 Michel Rosenfeld, Law as Discourse: Bridging the Gap Between Democracy and Rights, io8 HARV. L. REV. 1163, j164 (1995) (reviewing JURGEN HABERMAS, BETWEEN FACTS AND NORMS: CONTRIBUTIONS TO A DISCOURSE THEORY OF LAW AND DEMOCRACY (William Rehg trans., 1995) [hereinafter BETWEEN FACTS AND NORMS]). 2 See id. 3 See, e.g., JORGEN HABERMAS, MORAL CONSCIOUSNESS AND COMMUNICATIVE ACTION 176-77 (Christian Lenhardt & Shierry Weber Nicholsen trans., i9go) [hereinafter MORAL CONSCIOUSNESS]. 4 False consciousness is the "holding of beliefs that are contrary to one's personal or group interest and which thereby contribute to the maintenance of the disadvantaged position of the self or the group." John T. Jost & Mahzarin R. Banaji, The Role of Stereotyping in System- Justificationand the Productionof False Consciousness, 33 BRIT. J. SOC. PSYCHOL. 1, 3 (994). HARVARD LAW REVIEW [Vol. 116:749 and imbalances caused by unequal distributions of power and knowl- edge. The outcome of this inquiry is of enormous relevance to the con- struction and legitimacy of the legal system,' especially because Habermas argues that only a social system that guarantees basic civil rights and enables meaningful participation by all those affected by a decision can make legitimate decisions. In the spirit of Habermas's project of linking
Recommended publications
  • Maximum Internet Security: a Hackers Guide - Networking - Intrusion Detection
    - Maximum Internet Security: A Hackers Guide - Networking - Intrusion Detection Exact Phrase All Words Search Tips Maximum Internet Security: A Hackers Guide Author: Publishing Sams Web Price: $49.99 US Publisher: Sams Featured Author ISBN: 1575212684 Benoît Marchal Publication Date: 6/25/97 Pages: 928 Benoît Marchal Table of Contents runs Pineapplesoft, a Save to MyInformIT consulting company that specializes in Internet applications — Now more than ever, it is imperative that users be able to protect their system particularly e-commerce, from hackers trashing their Web sites or stealing information. Written by a XML, and Java. In 1997, reformed hacker, this comprehensive resource identifies security holes in Ben co-founded the common computer and network systems, allowing system administrators to XML/EDI Group, a think discover faults inherent within their network- and work toward a solution to tank that promotes the use those problems. of XML in e-commerce applications. Table of Contents I Setting the Stage 1 -Why Did I Write This Book? 2 -How This Book Will Help You Featured Book 3 -Hackers and Crackers Sams Teach 4 -Just Who Can Be Hacked, Anyway? Yourself Shell II Understanding the Terrain Programming in 5 -Is Security a Futile Endeavor? 24 Hours 6 -A Brief Primer on TCP/IP 7 -Birth of a Network: The Internet Take control of your 8 -Internet Warfare systems by harnessing the power of the shell. III Tools 9 -Scanners 10 -Password Crackers 11 -Trojans 12 -Sniffers 13 -Techniques to Hide One's Identity 14 -Destructive Devices IV Platforms
    [Show full text]
  • Religion, Ethics, and Poetics in a Tamil Literary Tradition
    Tacit Tirukku#a#: Religion, Ethics, and Poetics in a Tamil Literary Tradition The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters Citation Smith, Jason William. 2020. Tacit Tirukku#a#: Religion, Ethics, and Poetics in a Tamil Literary Tradition. Doctoral dissertation, Harvard Divinity School. Citable link https://nrs.harvard.edu/URN-3:HUL.INSTREPOS:37364524 Terms of Use This article was downloaded from Harvard University’s DASH repository, and is made available under the terms and conditions applicable to Other Posted Material, as set forth at http:// nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of- use#LAA ! ! ! ! ! !"#$%&!"#$%%$&'('& ()*$+$,-.&/%0$#1.&"-2&3,)%$#1&$-&"&!"4$*&5$%)6"67&!6"2$%$,-& ! ! "!#$%%&'()($*+!,'&%&+(&#! -.! /)%*+!0$11$)2!32$(4! (*! 54&!6)781(.!*9!:)';)'#!<$;$+$(.!374**1! $+!,)'($)1!9819$112&+(!*9!(4&!'&=8$'&2&+(%! 9*'!(4&!#&>'&&!*9! <*7(*'!*9!54&*1*>.! $+!(4&!%8-?&7(!*9! 54&!3(8#.!*9!@&1$>$*+! :)';)'#!A+$;&'%$(.! B)2-'$#>&C!D)%%)748%&((%! ",'$1!EFEF! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! G!EFEF!/)%*+!0$11$)2!32$(4! "11!'$>4(%!'&%&';&#H! ! ! ! ! ! <$%%&'()($*+!"#;$%*'I!J'*9&%%*'!6')+7$%!KH!B1**+&.!! ! ! !!/)%*+!0$11$)2!32$(4! ! !"#$%&!"#$%%$&'('&()*$+$,-.&/%0$#1.&"-2&3,)%$#1&$-&"&!"4$*&5$%)6"67&!6"2$%$,-! ! "-%(')7(! ! ! 54$%!#$%%&'()($*+!&L)2$+&%!(4&!!"#$%%$&'(C!)!,*&2!7*2,*%&#!$+!5)2$1!)'*8+#!(4&!9$9(4! 7&+(8'.!BHMH!(4)(!$%!(*#).!)(('$-8(&#!(*!)+!)8(4*'!+)2&#!5$'8;)NN8;)'H!54&!,*&2!7*+%$%(%!*9!OCPPF! ;&'%&%!)'')+>&#!$+(*!OPP!74),(&'%!*9!(&+!;&'%&%!&)74C!Q4$74!)'&!(4&+!#$;$#&#!$+(*!(4'&&!(4&2)($7!
    [Show full text]
  • Nancy Wilson Ross
    Nancy Wilson Ross: An Inventory of Her Papers at the Harry Ransom Center Descriptive Summary Creator: Ross, Nancy Wilson, 1901-1986 Title: Nancy Wilson Ross Papers Dates: 1913-1986 Extent: 261.5 document boxes, 12 flat boxes, 18 card boxes, 7 galley folders (138 linear feet) Abstract: The papers of this American writer encompass her entire literary career and include manuscript drafts, extensive correspondence, and subject files reflecting her interest in Eastern cultures. Call Number: Manuscript Collection MS-03616 Language: English Access Open for research Administrative Information Acquisition Purchase, 1972 (R5717) Provenance Ross's first shipment of materials to the Ransom Center accompanied her husband Stanley Young's papers, and consisted of Ross's literary output to 1975, including manuscripts, publications, and research materials. The second, posthumous shipment contained manuscripts created since 1974, and all her correspondence, personal, and financial files, as well as files concerning the estate of Stanley Young. Processed by Rufus Lund, 1992-93; completed by Joan Sibley, 1994 Processing note: Materials from the 1975 and 1986 shipments are grouped following Ross's original order, with the exception of pre-1970, special, and current correspondence which were interfiled during processing. An index of selected correspondents follows at the end of this inventory. Repository: Harry Ransom Center, The University of Texas at Austin Ross, Nancy Wilson, 1901-1986 Manuscript Collection MS-03616 2 Ross, Nancy Wilson, 1901-1986 Manuscript Collection MS-03616 Biographical Sketch Nancy Wilson was born in Olympia, Washington, on November 22, 1901. She graduated from the University of Oregon in 1924, and married Charles W.
    [Show full text]
  • Beyond the Principles of Bioethics: Facing the Consequences of Fundamental Moral Disagreement
    DOI: http://dx.doi.org/10.5007/1677-2954.2012v11n1p13 BEYOND THE PRINCIPLES OF BIOETHICS: FACING THE CONSEQUENCES OF FUNDAMENTAL MORAL DISAGREEMENT H. TRISTRAM ENGELHARDT (Rice Universtiy / USA) ABSTRACT Given intractable secular moral pluralism, the force and significance of the four principles (autonomy, beneficence, non-maleficence, and justice) of Tom Beauchamp and James Childress must be critically re-considered. This essay examines the history of the articulation of these four principles of bioethics, showing why initially there was an illusion of a common morality that led many to hold that the principles could give guidance across cultures. But there is no one sense of the content or the theoretical justification of these principles. In addition, a wide range of secular moral and bioethical choices has been demoralized into lifestyle choices; the force of the secular moral point of view has also been deflated, thus compounding moral pluralism. It is the political generation of the principles that provides a common morality in the sense of an established morality. The principles are best understood as embedded not in a common morality, sensu stricto, but in that morality that is established at law and public policy in a particular polity. Although moral pluralism is substantive and intractable at the level of moral content, in a particular polity a particular morality and a particular bioethics can be established, regarding which health care ethics consultants can be experts. Public morality and bioethics are at their roots a political reality. Keywords: Bioethics. Pluralism. Moral disagreement. Ethical particularism. RESUMO Dado o pluralismo moral secular intratável, a força e o significado dos quatro princípios (autonomia, beneficência, não maleficência e justiça) de Tom Beauchamp e James Childress precisam ser reconsiderados criticamente.
    [Show full text]
  • Network Working Group N. Freed Request for Comments: 2049 Innosoft Obsoletes: 1521, 1522, 1590 N
    Network Working Group N. Freed Request for Comments: 2049 Innosoft Obsoletes: 1521, 1522, 1590 N. Borenstein Category: Standards Track First Virtual November 1996 Multipurpose Internet Mail Extensions (MIME) Part Five: Conformance Criteria and Examples Status of this Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract STD 11, RFC 822, defines a message representation protocol specifying considerable detail about US-ASCII message headers, and leaves the message content, or message body, as flat US-ASCII text. This set of documents, collectively called the Multipurpose Internet Mail Extensions, or MIME, redefines the format of messages to allow for (1) textual message bodies in character sets other than US-ASCII, (2) an extensible set of different formats for non-textual message bodies, (3) multi-part message bodies, and (4) textual header information in character sets other than US-ASCII. These documents are based on earlier work documented in RFC 934, STD 11, and RFC 1049, but extends and revises them. Because RFC 822 said so little about message bodies, these documents are largely orthogonal to (rather than a revision of) RFC 822. The initial document in this set, RFC 2045, specifies the various headers used to describe the structure of MIME messages. The second document defines the general structure of the MIME media typing system and defines an initial set of media types.
    [Show full text]
  • A Zahlensysteme
    A Zahlensysteme Außer dem Dezimalsystem sind das Dual-,dasOktal- und das Hexadezimalsystem gebräuchlich. Ferner spielt das Binär codierte Dezimalsystem (BCD) bei manchen Anwendungen eine Rolle. Bei diesem sind die einzelnen Dezimalstellen für sich dual dargestellt. Die folgende Tabelle enthält die Werte von 0 bis dezimal 255. Be- quemlichkeitshalber sind auch die zugeordneten ASCII-Zeichen aufgeführt. dezimal dual oktal hex BCD ASCII 0 0 0 0 0 nul 11111soh 2102210stx 3113311etx 4 100 4 4 100 eot 5 101 5 5 101 enq 6 110 6 6 110 ack 7 111 7 7 111 bel 8 1000 10 8 1000 bs 9 1001 11 9 1001 ht 10 1010 12 a 1.0 lf 11 101 13 b 1.1 vt 12 1100 14 c 1.10 ff 13 1101 15 d 1.11 cr 14 1110 16 e 1.100 so 15 1111 17 f 1.101 si 16 10000 20 10 1.110 dle 17 10001 21 11 1.111 dc1 18 10010 22 12 1.1000 dc2 19 10011 23 13 1.1001 dc3 20 10100 24 14 10.0 dc4 21 10101 25 15 10.1 nak 22 10110 26 16 10.10 syn 430 A Zahlensysteme 23 10111 27 17 10.11 etb 24 11000 30 18 10.100 can 25 11001 31 19 10.101 em 26 11010 32 1a 10.110 sub 27 11011 33 1b 10.111 esc 28 11100 34 1c 10.1000 fs 29 11101 35 1d 10.1001 gs 30 11110 36 1e 11.0 rs 31 11111 37 1f 11.1 us 32 100000 40 20 11.10 space 33 100001 41 21 11.11 ! 34 100010 42 22 11.100 ” 35 100011 43 23 11.101 # 36 100100 44 24 11.110 $ 37 100101 45 25 11.111 % 38 100110 46 26 11.1000 & 39 100111 47 27 11.1001 ’ 40 101000 50 28 100.0 ( 41 101001 51 29 100.1 ) 42 101010 52 2a 100.10 * 43 101011 53 2b 100.11 + 44 101100 54 2c 100.100 , 45 101101 55 2d 100.101 - 46 101110 56 2e 100.110 .
    [Show full text]
  • Who Governs the Internet? the Emerging Policies, Institutions, and Governance of Cyberspace
    City University of New York (CUNY) CUNY Academic Works All Dissertations, Theses, and Capstone Projects Dissertations, Theses, and Capstone Projects 2013 Who Governs the Internet? The Emerging Policies, Institutions, and Governance of Cyberspace Robert J. Domanski The Graduate Center, City University of New York How does access to this work benefit ou?y Let us know! More information about this work at: https://academicworks.cuny.edu/gc_etds/1481 Discover additional works at: https://academicworks.cuny.edu This work is made publicly available by the City University of New York (CUNY). Contact: [email protected] i WHO GOVERNS THE INTERNET? THE EMERGING POLICIES, INSTITUTIONS, AND GOVERNANCE OF CYBERSPACE by ROBERT J. DOMANSKI A dissertation submitted to the Graduate Faculty in Political Science in partial fulfillment of the requirements for the degree of Doctor of Philosophy, The City University of New York 2013 ii © 2013 ROBERT J. DOMANSKI All Rights Reserved iii This manuscript has been read and accepted for the Graduate Faculty in Political Science in satisfaction of the dissertation requirement for the degree of Doctor of Philosophy. Donna Kirchheimer 8/5/2013 Date Chair of Examining Committee Joe Rollins 8/5/2013 Date Executive Officer Stephen Brier Andrew Rich Charles Tien Sarah Zelikovitz Supervisory Committee THE CITY UNIVERSITY OF NEW YORK iv Abstract WHO GOVERNS THE INTERNET? THE EMERGING POLICIES, INSTITUTIONS, AND GOVERNANCE OF CYBERSPACE by Robert J. Domanski Sponsor: Professor Donna Kirchheimer There remains a widespread perception among both the public and elements of academia that the Internet is “ungovernable”. However, this idea, as well as the notion that the Internet has become some type of cyber-libertarian utopia, is wholly inaccurate.
    [Show full text]
  • Usenet News HOWTO
    Usenet News HOWTO Shuvam Misra (usenet at starcomsoftware dot com) Revision History Revision 2.1 2002−08−20 Revised by: sm New sections on Security and Software History, lots of other small additions and cleanup Revision 2.0 2002−07−30 Revised by: sm Rewritten by new authors at Starcom Software Revision 1.4 1995−11−29 Revised by: vs Original document; authored by Vince Skahan. Usenet News HOWTO Table of Contents 1. What is the Usenet?........................................................................................................................................1 1.1. Discussion groups.............................................................................................................................1 1.2. How it works, loosely speaking........................................................................................................1 1.3. About sizes, volumes, and so on.......................................................................................................2 2. Principles of Operation...................................................................................................................................4 2.1. Newsgroups and articles...................................................................................................................4 2.2. Of readers and servers.......................................................................................................................6 2.3. Newsfeeds.........................................................................................................................................6
    [Show full text]
  • Eszter Babarczy: Community Based Trust on the Internet
    PTE BTK Nyelvtudományi Doktori Iskola Kommunikáció Doktori Program Babarczy Eszter: Community Based Trust on the Internet Doktori értekezés Témavezető: Horányi Özséb egyetemi tanár 2011. 1 Community-based trust on the internet Tartalom Introduction .................................................................................................................................................. 3 II. A very brief history of the internet ........................................................................................................... 9 Early Days ............................................................................................................................................... 11 Mainstream internet .............................................................................................................................. 12 The internet of social software .............................................................................................................. 15 III Early trust related problems and solutions ............................................................................................ 20 Trading .................................................................................................................................................... 20 Risks of and trust in content ....................................................................................................................... 22 UGC and its discontents: Wikipedia ......................................................................................................
    [Show full text]
  • NBAR2 Standard Protocol Pack 1.0
    NBAR2 Standard Protocol Pack 1.0 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 © 2013 Cisco Systems, Inc. All rights reserved. CONTENTS CHAPTER 1 Release Notes for NBAR2 Standard Protocol Pack 1.0 1 CHAPTER 2 BGP 3 BITTORRENT 6 CITRIX 7 DHCP 8 DIRECTCONNECT 9 DNS 10 EDONKEY 11 EGP 12 EIGRP 13 EXCHANGE 14 FASTTRACK 15 FINGER 16 FTP 17 GNUTELLA 18 GOPHER 19 GRE 20 H323 21 HTTP 22 ICMP 23 IMAP 24 IPINIP 25 IPV6-ICMP 26 IRC 27 KAZAA2 28 KERBEROS 29 L2TP 30 NBAR2 Standard Protocol Pack 1.0 iii Contents LDAP 31 MGCP 32 NETBIOS 33 NETSHOW 34 NFS 35 NNTP 36 NOTES 37 NTP 38 OSPF 39 POP3 40 PPTP 41 PRINTER 42 RIP 43 RTCP 44 RTP 45 RTSP 46 SAP 47 SECURE-FTP 48 SECURE-HTTP 49 SECURE-IMAP 50 SECURE-IRC 51 SECURE-LDAP 52 SECURE-NNTP 53 SECURE-POP3 54 SECURE-TELNET 55 SIP 56 SKINNY 57 SKYPE 58 SMTP 59 SNMP 60 SOCKS 61 SQLNET 62 SQLSERVER 63 SSH 64 STREAMWORK 65 NBAR2 Standard Protocol Pack 1.0 iv Contents SUNRPC 66 SYSLOG 67 TELNET 68 TFTP 69 VDOLIVE 70 WINMX 71 NBAR2 Standard Protocol Pack 1.0 v Contents NBAR2 Standard Protocol Pack 1.0 vi CHAPTER 1 Release Notes for NBAR2 Standard Protocol Pack 1.0 NBAR2 Standard Protocol Pack Overview The Network Based Application Recognition (NBAR2) Standard Protocol Pack 1.0 is provided as the base protocol pack with an unlicensed Cisco image on a device.
    [Show full text]
  • The Internet Is a Semicommons
    GRIMMELMANN_10_04_29_APPROVED_PAGINATED 4/29/2010 11:26 PM THE INTERNET IS A SEMICOMMONS James Grimmelmann* I. INTRODUCTION As my contribution to this Symposium on David Post’s In Search of Jefferson’s Moose1 and Jonathan Zittrain’s The Future of the Internet,2 I’d like to take up a question with which both books are obsessed: what makes the Internet work? Post’s answer is that the Internet is uniquely Jeffersonian; it embodies a civic ideal of bottom-up democracy3 and an intellectual ideal of generous curiosity.4 Zittrain’s answer is that the Internet is uniquely generative; it enables its users to experiment with new uses and then share their innovations with each other.5 Both books tell a story about how the combination of individual freedom and a cooperative ethos have driven the Internet’s astonishing growth. In that spirit, I’d like to suggest a third reason that the Internet works: it gets the property boundaries right. Specifically, I see the Internet as a particularly striking example of what property theorist Henry Smith has named a semicommons.6 It mixes private property in individual computers and network links with a commons in the communications that flow * Associate Professor, New York Law School. My thanks for their comments to Jack Balkin, Shyam Balganesh, Aislinn Black, Anne Chen, Matt Haughey, Amy Kapczynski, David Krinsky, Jonathon Penney, Chris Riley, Henry Smith, Jessamyn West, and Steven Wu. I presented earlier versions of this essay at the Commons Theory Workshop for Young Scholars (Max Planck Institute for the Study of Collective Goods), the 2007 IP Scholars conference, the 2007 Telecommunications Policy Research Conference, and the December 2009 Symposium at Fordham Law School on David Post’s and Jonathan Zittrain’s books.
    [Show full text]
  • Internet... the Final Frontier. an Ethnographic Account. Exploring the Cultural Space of the Net from the Inside. Mit CD-Rom
    Schriftenreihe der Abteilung "Organisation und Technikgenese" des Forschungsschwerpunktes Technik-Arbeit-Umwelt am Wissenschaftszentrum Berlin für Sozialforschung FS II 2000- Internet… The Final Frontier: An Ethnographic Account Exploring the cultural space of the Net from the inside Sabine Helmers, Ute Hoffmann & Jeanette Hofmann Projektgruppe Kulturraum Internet http://duplox.wz-berlin.de Institute for Social Sciences Technical University Berlin and Social Science Research Center Berlin (WZB) Reichpietschufer 50, D-10785 Berlin Telefon (030) 25491-0, Fax (030) 25491-684 Abstract The research project "The Internet as a space for interaction", which completed its mission in Autumn 1998, studied the constitutive features of network culture and network organisation. Special emphasis was given to the dynamic interplay of technical and social conventions regarding both the Net's organisation as well as its change. The ethnographic perspective chosen studied the Internet from the inside. Research concentrated upon three fields of study: the hegemonial operating technology of net nodes (UNIX) the network's basic transmission technology (the Internet Protocol IP) and a popular communication service (Usenet). The project's final report includes the results of the three branches explored. Drawing upon the development in the three fields it is shown that changes that come about on the Net are neither anarchic nor arbitrary. Instead, the decentrally organised Internet is based upon technically and organisationally distributed forms of coordination
    [Show full text]