Cyberspace Self-Governance: a Skeptical View from Liberal Democratic Theory

Total Page:16

File Type:pdf, Size:1020Kb

Cyberspace Self-Governance: a Skeptical View from Liberal Democratic Theory Cyberspace Self-Governance: A Skeptical View from Liberal Democratic Theory Neil Weinstock Netanelt TABLE OF CONTENTS Introduction ...............................................................................................398 I. Liberal Democracy ............................................................................. 407 II. The Cyberian Claim of Liberal Perfection ......................................... 410 A. Cyberpopulism ............................................................................ 412 1. The Cyberpopulist Claim ...................................................... 412 2. Critique of the Cyberpopulist Claim .................................... 415 a. The Populist Mischaracterization ................................... 415 b. Popular Will ................................................................... 416 i. Plebiscites Inadequately Reflect Popular W ill .......................................................................... 417 ii. Representative Government May Better Reflect Popular Will ................................................ 419 c. Tyranny of the Majority ................................................ 421 i. Unanimous Consent ................................................ 422 ii. Ease of Exit .............................................................. 425 d. Summary (and Caveat) ................................................... 427 B. Cybersyndicalism ........................................................................ 427 1. The Cybersyndicalist Claim ................................................ 427 2. Critique of the Cybersyndicalist Claim ................................ 429 C. Cyberanarchism ........................................................................... 433 1. The Cyberanarchist Claim .................................................... 433 2. Critique of the Cyberanarchist Claim ................................... 435 Copyright © 2000 Neil Weinstock Netanel. t Arnold, White & Durkee Centennial Professor of Law, University of Texas School of Law. Please send comments to: [email protected]. My thanks to the following persons, whose comments on earlier drafts of this Article and related subject matter greatly contributed to its development: Lynn Baker, Niva Elkin-Koren, Mark Lemley, Eben Moglen, David Post, Ran Saban, Eli Salzberger, Paul Schwartz, Steve Ratner, Charlie Silver, Eugene Volokh, and Jonathan Weinberg. My thanks also to Alisa Ullian for her research assistance, and to participants at the University of Haifa and Hebrew University law faculty colloquia and the Tel-Aviv University Faculty of Law Conference on Law, Technology, and Information, at which I presented parts of this Article. 396 CALIFORNIA LAW REVIEW [Vol. 88:395 a. Individual Autonomy (as Consumer Sovereignty) in Cyberspace ................................................................. 435 i. M eaningful Choice ................................................... 435 ii. M obility ................................................................... 439 b. Cyberanarchy Versus Liberal Democracy ...................... 443 i. Inconsistencies Between Markets and Liberal Dem ocracy ............................................................... 443 ii. Illiberal Externalities ................................................ 444 D . Sum m ary ..................................................................................... 446 III. The Cyberian Claim of Community Autonomy ................................ 446 IV . State Regulation ................................................................................. 452 A . Status Discrim ination .................................................................. 453 B. Content Discrim ination ............................................................... 460 1. The Promotion of Expressive Diversity ................................ 461 2. Filtering ................................................................................. 465 3. Self-Help Censorship ............................................................ 470 C. The Appropriation of Personal Information ................................ 473 D . Unequal Access ........................................................................... 480 V . W hy the State? .................................................. ................................. 483 VI. The Cyberians' International Claims ................................................. 489 A . Foreign Governm ent Interference ............................................... 489 B. International Organizations ......................................................... 496 Conclusion ................................................................................................ 497 20001 CYBERSPACE SELF-GOVERNANCE Cyberspace Self-Governance: A Skeptical View from Liberal Democratic Theory Neil Weinstock Netanel The idea that cyberspace should be presumptively self-governing has resounded in thoughtful scholarshipand has coloredfederal rhetoric and policy regarding electronic commerce. In this Article, ProfessorNetanel critiques a central prong of the argument for cyberspace self- governance: The claim that a self-governing cyberspace, which its advo- cates see as a shining example of "bottom-up private ordering," would more fully realize liberal democratic ideals than does nation-state repre- sentative democracy. Although granting that this claim poses an intriguing challenge to traditional liberal democratic theory, Professor Netanel argues that it ultimately fails. He contends, indeed, that an untrammeled cyberspace would ultimately prove inimical to the ideals of liberal democ- racy. It would free majorities to trample upon minorities and serve as a breeding ground for invidious status discrimination, narrowcastingand mainstreaming content selection, systematic invasions of privacy, and gross inequalities in the distribution of basic requisitesfor citizenship in the information age. Accordingly, ProfessorNetanel concludes, selective government regulation of cyberspace is warranted to protect and promote liberal democratic ideals. Governments derive their just powers from the consent of the governed. You have neither solicited nor received ours. We did not invite you. You do not know us, nor do you know our world. Cyberspace does not lie within your borders. Do not think that you can build it, as though it were a public construction project. You cannot. It is an act of nature and it grows itself through our collective actions. -John Perry Barlow, A Declarationof the Independence of Cyberspace' 1. John Perry Barlow, A Declarationof the Independence of Cyberspace (visited Dec. 25, 1999) <http://www.eff.orgt-barlow/Declaration-Final.html>. CALIFORNIA LAW REVIEW [Vol. 88:395 INTRODUCTION John Perry Barlow's impassioned call for cyberspace independence cannot be dismissed as the mere theatrical whimsy of a former lyricist for the Grateful Dead. The idea that cyberspace should be presumptively self-governing has resounded in thoughtful scholarship.2 It has also colored federal policy regarding electronic commerce. A 1997 Presidential Directive, which heralded the dramatic withdrawal of the United States government from significant portions of Internet administration,3 instructs federal agencies to "recognize the unique qualities of the Internet, including its decentralized nature and its tradition of bottom-up govern- ance."4 2. See, e.g., David R. Johnson & David Post, Law and Borders-The Rise of Law in Cyberspace, 48 STAN. L. REv. 1367, 1367 (1996) [hereinafter Johnson & Post, Law and Borders]; David G. Post, Anarchy, State, and the Internet: An Essay on Law-Making in Cyberspace, 1995 J. ONLINE L. art. 3 (visited Sept. 10, 1998) <http://www.wm.edu/law/publications/joI/post.html> [hereinafter Post, Anarchy]; David Post & David R. Johnson, The New 'Civic Virtue' of the Internet,in THE EMERGING INTERNET 23 (Institute for Information Studies 1998), available at (visited Sept. 28, 1998) <http://www.cli.org/paper4.htm> [hereinafter Post & Johnson, Civic Virtue]. Commentators who have made similar arguments include Llewellyn Joseph Gibbons, No Regulation, Government Regulation, or Self-Regulation: Social Enforcement or Social Contracting for Governance in Cyberspace, 6 CORNELL J.L. & PUB. POL'Y 475 (1997); I. Trotter Hardy, The ProperLegal Regime for "Cyberspace," 55 U. PITT. L. REv. 993 (1994) (contending that in the absence of some compelling social reason to the contrary, rules of conduct in cyberspace should be governed by self-help, custom, and contract of cyberspace participants); Henry H. Perritt, Jr., CyberspaceSelf-Government: Town Hall Democracy or Rediscovered Royalism?, 12 BERKELEY TECH. L.J. 413, 419-20 (1997) (contending that as a general rule "self-governance is desirable for electronic communities"); Edward J. Valauskas, Lex Networkia: Understanding the Internet Community, FIRST MONDAY (Oct. 7, 1996) <http://www.firstmonday.dk/issuesrissue4/valauskas/index.html> (calling for formalization of Internet self-governance). 3. Since its inception, the Internet domain name system has been administered by the United States government through contract. In June 1998, the Clinton Administration announced that, as part of its overall policy of promoting Internet self-regulation, it would turn over responsibility for such administration to a new nonprofit corporation. See National Telecomms. and Info. Admin., U.S. Dep't of Commerce, Statement of Policy on Management of Internet Names and Addresses, 63 Fed. Reg. 31,741
Recommended publications
  • Theft in the Digital: Can You Steal Virtual Property?
    Theft in the Digital: Can you Steal Virtual Property? Wayne Rumbles* I. Introduction This article explores issues arising around the theft of virtual property. It first explains a number of perhaps counter intuitive concepts vital to the understanding of the importance of extending ‘real world’ criminal law and criminal liability to conduct inside virtual worlds such as World of Warcraft or Second Life. This article focuses on theft of virtual property and explores how other jurisdictions are developing responses to this issue. It then develops an analysis of the operation of ‘real world’ New Zealand criminal law rules around theft, in the context of the evolution of virtual property. II. Understanding Virtual Worlds At first glance the virtual world universe, with its multitude of virtual realms, may seem like nothing but a place for virtual play, a place to which our teenage sons and daughters disappear when they should be cleaning their room. Online multiplayer computer simulated environments have come along way since Habitat was launched in 1988, on the Commodore 64 platform running through the online service QuantumLink.1 Today these worlds are interactive 3D or 2D virtual environments, which provide social spaces accessed via the Internet and accommodate millions of human users. Users interact in this world through avatars, which are computer generated representations, and acquire virtual property of one sort or another through their avatars. The number, complexity and diversity of these worlds continue to develop at a steadily increasing pace. There are still many uncertainties in the development of virtual worlds, however what is certain is that they will continue to grow and absorb aspects of our social interaction on the web.
    [Show full text]
  • Fact Sheet 27
    Fact Sheet – State and Local Government PRESELECTION BALLOTS This fact sheet relates to registered political parties that conduct preselection ballots for candidates in state or local government elections. The Electoral Commission of Queensland (ECQ) is responsible for overseeing the conduct of preselection ballots under Part 9 of the Electoral Act 1992 (EA). What is a preselection ballot? If part or whole of the preselection process involves conducting a ballot of party Preselection is the process by which a members, the party’s constitution must political party chooses an individual to also include a rule that requires that a become a candidate endorsed by the party preselection ballot must satisfy the general for a particular election. Depending on the principles of free and democratic elections. rules in the political party’s constitution, a The general principles are set out in party may conduct a preselection ballot as section 76(2) of the EA. part, or whole, of the preselection process. Part 9 of the EA requires the party’s A preselection ballot involves members of registered officer to provide the ECQ with the political party voting for their preferred written notice at least 7 days before voting candidate in a ballot. A party member will in a preselection ballot is to be held, and to vote in the ballot in their capacity as a notify the ECQ of all preselection ballots member of the political party, rather than held for candidates in a state election as a member of a committee of the party. within 30 days after polling day for the election.
    [Show full text]
  • No Room for Debate the National Constituent Assembly and the Crumbling of the Rule of Law in Venezuela
    No Room for Debate The National Constituent Assembly and the Crumbling of the Rule of Law in Venezuela July 2019 Composed of 60 eminent judges and lawyers from all regions of the world, the International Commission of Jurists promotes and protects human rights through the Rule of Law, by using its unique legal expertise to develop and strengthen national and international justice systems. Established in 1952 and active on the five continents, the ICJ aims to ensure the progressive development and effective implementation of international human rights and international humanitarian law; secure the realization of civil, cultural, economic, political and social rights; safeguard the separation of powers; and guarantee the independence of the judiciary and legal profession. ® No Room for Debate - The National Constituent Assembly and the Crumbling of the Rule of Law in Venezuela © Copyright International Commission of Jurists Published in July 2019 The International Commission of Jurists (ICJ) permits free reproduction of extracts from any of its publications provided that due acknowledgment is given and a copy of the publication carrying the extract is sent to its headquarters at the following address: International Commission of Jurists P.O. Box 91 Rue des Bains 33 Geneva Switzerland No Room for Debate The National Constituent Assembly and the Crumbling of the Rule of Law in Venezuela This report was written by Santiago Martínez Neira, consultant to the International Commission of Jurists. Carlos Ayala, Sam Zarifi and Ian Seiderman provided legal and policy review. This report was written in Spanish and translated to English by Leslie Carmichael. 2 TABLE OF CONTENTS Executive Summary ...............................................................................................
    [Show full text]
  • Author and Activist Lawrence Lessig
    Big Money Bulletin Author and reform activist Lawrence Lessig Inside to headline WDC annual meeting on May 2 Harvard University professor and campaign finance reform crusader Page 2 Lawrence Lessig will be the keynote speaker for the Democracy Supreme Court drops another bomb Campaign’s annual membership meeting to be held on Friday, May 2. Wisconsin communities move to amend Lessig is the author of Republic, Lost: How Money Corrupts Congress Page 3 — And a Plan to Stop It and founder of the national group Rootstrikers. Change in leadership coming at WDC He is the driving force behind the New Hampshire Rebellion that started Less for voters, more for lobbyists with a 185-mile walk across the state and now is working to make sure that every federal candidate in the 2016 primaries is asked one question: Page 4 “How are YOU going to end the system of corruption in Washington, Kissing the ring in Vegas D.C.?” Lessig also is well known for his dynamic TED talks. TED stands for Technology, Entertainment and Design and is a nonprofit devoted to spreading ideas, usually in the form of short, powerful talks of 18 minutes or less. Started in 1984, the group’s mission is promoted through conferences and videos in more than 100 languages that cover topics from science to April 2014 business to global issues. Edition No. 89 This year’s WDC membership meeting is being held at Madison’s Barrymore Theatre, located at 2090 Atwood Avenue on the city’s near east side. On the Web: Registration will begin at 5:30 p.m., with the evening’s program starting www.wisdc.org at 6.
    [Show full text]
  • A Letter to the FCC [PDF]
    Before the FEDERAL COMMUNICATIONS COMMISSION Washington, DC 20554 In the Matter of ) ) Amendment of Part 0, 1, 2, 15 and 18 of the ) ET Docket No. 15­170 Commission’s Rules regarding Authorization ) Of Radio frequency Equipment ) ) Request for the Allowance of Optional ) RM­11673 Electronic Labeling for Wireless Devices ) Summary The rules laid out in ET Docket No. 15­170 should not go into effect as written. They would cause more harm than good and risk a significant overreach of the Commission’s authority. Specifically, the rules would limit the ability to upgrade or replace firmware in commercial, off­the­shelf home or small­business routers. This would damage the compliance, security, reliability and functionality of home and business networks. It would also restrict innovation and research into new networking technologies. We present an alternate proposal that better meets the goals of the FCC, not only ensuring the desired operation of the RF portion of a Wi­Fi router within the mandated parameters, but also assisting in the FCC’s broader goals of increasing consumer choice, fostering competition, protecting infrastructure, and increasing resiliency to communication disruptions. If the Commission does not intend to prohibit the upgrade or replacement of firmware in Wi­Fi ​ ​ devices, the undersigned would welcome a clear statement of that intent. Introduction We recommend the FCC pursue an alternative path to ensuring Radio Frequency (RF) compliance from Wi­Fi equipment. We understand there are significant concerns regarding existing users of the Wi­Fi ​ spectrum, and a desire to avoid uncontrolled change. However, we most strenuously advise against prohibiting changes to firmware of devices containing radio components, and furthermore advise against allowing non­updatable devices into the field.
    [Show full text]
  • Why Random Selection Is a Better Method for Choosing Independent High Court Judges
    Research and Development Note Why random selection is a better method for choosing independent High Court Judges 5 Dec, 2020 Pierre-Étienne Vandamme Université libre de Bruxelles [email protected] Donald Bello Hutt University of Valladolid [email protected] Follow these and additional works at http://www.newdemocracy.com.au * newDemocracy is an independent, non-partisan research and development organisation. We aim to discover, develop, demonstrate, and promote complementary alternatives which will restore trust in public decision making. These R&D notes are discoveries and reflections that we are documenting in order to share what we learn and stimulate further research and development. Research and Development Note Why random selection is a better method for choosing independent High Court Judges What is the question? How should high court judges be selected? Why does it matter? The recent debates about the replacement of Ruth Bader Ginsburg, former member of the US Supreme Court, a few days before the Presidential election have raised again the question of the best method for selecting supreme court or constitutional court judges. Is it desirable to have such a politicized designation process? Does it preserve the separation of powers? This issue, which we examined in more detail in a recent publication summarized here, is part of a broader discussion on the legitimacy of an institution which has gained political power in many countries. As this institution gains power, normative questions about its legitimacy become increasingly pressing, and selection methods are one of the key aspects of this problem. Besides, many countries are experiencing a shift of power to the executive, threatening the separation of powers.
    [Show full text]
  • CNN/WMUR/UNH Tracking Poll -1- January/February, 2016 1
    Conducted by the University of New Hampshire Survey Center Interviews with 914 adults in New Hampshire conducted by land line and cellular telephone on January 27-30, 2016 including 409 who say they plan to vote in the Republican presidential primary and 347 respondents who say they plan to vote in the Democratic presidential primary. The margin of sampling error for results based on Republican primary voters is plus or minus 4.8 percentage points and for results based on Democratic primary voters is plus or minus 5.3 percentage points. EMBARGOED FOR RELEASE: Sunday, January 31 at 6:00 p.m. CNN/WMUR/UNH Tracking Poll -1- January/February, 2016 1. (UNDECLARED / INDEPENDENT LIKELY VOTERS ONLY) “"Which Presidential primary election do you think you will vote in ... the Republican Primary or the Democratic Primary?" PROBE: “As of RIGHT NOW, which primary do you think you will vote in?” Dec. Jan. Jan. 2015 13-18 27-30 REPUBLICAN PRIMARY 48% 44% 47% DEMOCRATIC PRIMARY 38% 48% 42% UNDECIDED 14% 8% 11% CNN/WMUR/UNH Tracking Poll -2- January/February, 2016 2. (REPUBLICAN PRIMARY VOTERS ONLY:) “Have you definitely decided who you will vote for in the New Hampshire primary … are you leaning toward someone … or have you considered some candidates but are still trying to decide?” June Sept Dec Jan Jan. 2015 2015 2015 13-18 27-30 DEFINITELY DECIDED 8% 13% 18% 31% 39% LEANING TOWARD SOMEONE 17% 28% 26% 26% 24% STILL TRYING TO DECIDE 75% 59% 56% 43% 37% 3. (REPUBLICAN PRIMARY VOTERS ONLY:) "I’m going to read you the names of the candidates who are either running or considering running for the Republican nomination.
    [Show full text]
  • Violent Victimization in Cyberspace: an Analysis of Place, Conduct, Perception, and Law
    Violent Victimization in Cyberspace: An Analysis of Place, Conduct, Perception, and Law by Hilary Kim Morden B.A. (Hons), University of the Fraser Valley, 2010 Thesis submitted in Partial Fulfillment of the Requirements for the Degree of Master of Arts IN THE SCHOOL OF CRIMINOLOGY FACULTY OF ARTS AND SOCIAL SCIENCES © Hilary Kim Morden 2012 SIMON FRASER UNIVERSITY Summer 2012 All rights reserved. However, in accordance with the Copyright Act of Canada, this work may be reproduced, without authorization, under the conditions for “Fair Dealing.” Therefore, limited reproduction of this work for the purposes of private study, research, criticism, review and news reporting is likely to be in accordance with the law, particularly if cited appropriately. Approval Name: Hilary Kim Morden Degree: Master of Arts (School of Criminology) Title of Thesis: Violent Victimization in Cyberspace: An Analysis of Place, Conduct, Perception, and Law Examining Committee: Chair: Dr. William Glackman, Associate Director Graduate Programs Dr. Brian Burtch Senior Supervisor Professor, School of Criminology Dr. Sara Smyth Supervisor Assistant Professor, School of Criminology Dr. Gregory Urbas External Examiner Senior Lecturer, Department of Law Australian National University Date Defended/Approved: July 13, 2012 ii Partial Copyright Licence iii Abstract The anonymity, affordability, and accessibility of the Internet can shelter individuals who perpetrate violent acts online. In Canada, some of these acts are prosecuted under existing criminal law statutes (e.g., cyber-stalking, under harassment, s. 264, and cyber- bullying, under intimidation, s. 423[1]). However, it is unclear whether victims of other online behaviours such as cyber-rape and organized griefing have any established legal recourse.
    [Show full text]
  • Site Finder and Internet Governance
    345 Site Finder and Internet Governance Jonathan Weinberg* 347 INTRODUCTION 348 PART 1. 354 PART 2. 361 PART 3. 366 PART 4. 375 CONCLUSION Copyright © 2004 by Jonathan Weinberg. * Professor of Law, Wayne State University. I am grateful to Michael Froomkin, Mark Lemley, David Maher, Milton Mueller, and Jessica Litman for their comments, and to Susan Crawford and Bret Fausett for answer- ing questions along the way. None of them, of course, is responsible for anything I say here. This essay reflects developments taking place through 30 November 2003. 347 Site Finder and Internet Governance Jonathan Weinberg INTRODUCTION ON SEPTEMBER 15, 2003, VeriSign, Inc.—the company that operates the data- bases that allow internet users to reach any internet resource ending in “.com” or “.net”—introduced a new service it called Site Finder. Less than three weeks later, after widespread protest from the technical community, at least three law- suits, and a stern demand from ICANN (the Internet Corporation for Assigned Names and Numbers, which has undertaken responsibility for managing the internet domain name space), VeriSign agreed to shut Site Finder down.1 In between those dates the internet community saw a passionate debate over the roles of ICANN, VeriSign, and the internet’s technical aristocracy in managing the domain name space. VeriSign has charged that its opponents’ reactions were the product of “obsolete thinking” that would disable it from “build[ing] a commercial busi- ness.”2 ICANN, for its part, is seeking to enact a procedure under which top-level domain name registry operators such as VeriSign must seek ICANN’s approval before offering new services or taking any “significant actions that...could affect the operational stability, reliability, security or global interoperability of...the Internet.”3 Some see fault on all sides: “It’s hard to say,” writes one commenta- tor, “in this case who is being more anti-competitive, ICANN or VeriSign.”4 In this essay, I will try to unpack the Site Finder story.
    [Show full text]
  • To the Members of the Senate Judiciary Committee: We, The
    To the members of the Senate Judiciary Committee: We, the undersigned, have played various parts in building a network called the Internet. We wrote and debugged the software; we defined the standards and protocols that talk over that network. Many of us invented parts of it. We're just a little proud of the social and economic benefits that our project, the Internet, has brought with it. We are writing to oppose the Committee's proposed new Internet censorship and copyright bill. If enacted, this legislation will risk fragmenting the Internet's global domain name system (DNS ), create an environment of tremendous fear and uncertainty for technological innovation, and seriously harm the credibility of the United States in its role as a steward of key Internet infrastructure. In exchange for this, the bill will introduce censorship that will simultaneously be circumvented by deliberate infringers while hampering innocent parties' ability to communicate. All censorship schemes impact speech beyond the category they were intended to restrict, but this bill will be particularly egregious in that regard because it causes entire domains to vanish from the Web, not just infringing pages or files. Worse, an incredible range of useful, law-abiding sites can be blacklisted under this bill. These problems will be enough to ensure that alternative name-lookup infrastructures will come into widespread use, outside the control of US service providers but easily used by American citizens. Errors and divergences will appear between these new services and the current global DNS, and contradictory addresses will confuse browsers and frustrate the people using them.
    [Show full text]
  • Faculty Research Working Papers Series
    Faculty Research Working Papers Series Napster's Second Life? - The Regulatory Challenges of Virtual Worlds Viktor Mayer-Schönberger and John Crowley September 2005 RWP05-052 The views expressed in the KSG Faculty Research Working Paper Series are those of the author(s) and do not necessarily reflect those of the John F. Kennedy School of Government or Harvard University. Copyright belongs to the author(s). Papers may be downloaded for personal use only. Napster’s Second Life? The Regulatory Challenges of Virtual Worlds+ Viktor Mayer-Schönberger* & John Crowley‡ Imagine a world with millions of people communicating and transacting. Imagine a world just like ours except that is it made entirely of bits, not atoms. Ten years ago, John Perry Barlow imagined such a radical world – cyberspace.1 He saw people interacting without the constraints of national rules. They would be independent from regulatory fiat and unbound by the mandates of Washington, Paris, London, Berlin or Beijing. His vision relied on information traveling a global network at lightning speed, with content living off server farms in nations with little regulation, weak enforcement, or both. In this world of global regulatory arbitrage2, organizations could relocate their servers to jurisdictional safe havens overnight. 3 They might pop up in exotic places like Aruba4 or + We thank Urs Gasser, Raph Koster, David Lazer, Beth Noveck, Cory Ondrejka, and John Palfrey, who have read the manuscript and provided most valuable feedback. We gratefully acknowledge the research assistance of Malte Ziewitz. * Associate Professor of Public Policy, John F. Kennedy School of Government, Harvard University. ‡ Technologist and freelance consultant for the John F.
    [Show full text]
  • A Zahlensysteme
    A Zahlensysteme Außer dem Dezimalsystem sind das Dual-,dasOktal- und das Hexadezimalsystem gebräuchlich. Ferner spielt das Binär codierte Dezimalsystem (BCD) bei manchen Anwendungen eine Rolle. Bei diesem sind die einzelnen Dezimalstellen für sich dual dargestellt. Die folgende Tabelle enthält die Werte von 0 bis dezimal 255. Be- quemlichkeitshalber sind auch die zugeordneten ASCII-Zeichen aufgeführt. dezimal dual oktal hex BCD ASCII 0 0 0 0 0 nul 11111soh 2102210stx 3113311etx 4 100 4 4 100 eot 5 101 5 5 101 enq 6 110 6 6 110 ack 7 111 7 7 111 bel 8 1000 10 8 1000 bs 9 1001 11 9 1001 ht 10 1010 12 a 1.0 lf 11 101 13 b 1.1 vt 12 1100 14 c 1.10 ff 13 1101 15 d 1.11 cr 14 1110 16 e 1.100 so 15 1111 17 f 1.101 si 16 10000 20 10 1.110 dle 17 10001 21 11 1.111 dc1 18 10010 22 12 1.1000 dc2 19 10011 23 13 1.1001 dc3 20 10100 24 14 10.0 dc4 21 10101 25 15 10.1 nak 22 10110 26 16 10.10 syn 430 A Zahlensysteme 23 10111 27 17 10.11 etb 24 11000 30 18 10.100 can 25 11001 31 19 10.101 em 26 11010 32 1a 10.110 sub 27 11011 33 1b 10.111 esc 28 11100 34 1c 10.1000 fs 29 11101 35 1d 10.1001 gs 30 11110 36 1e 11.0 rs 31 11111 37 1f 11.1 us 32 100000 40 20 11.10 space 33 100001 41 21 11.11 ! 34 100010 42 22 11.100 ” 35 100011 43 23 11.101 # 36 100100 44 24 11.110 $ 37 100101 45 25 11.111 % 38 100110 46 26 11.1000 & 39 100111 47 27 11.1001 ’ 40 101000 50 28 100.0 ( 41 101001 51 29 100.1 ) 42 101010 52 2a 100.10 * 43 101011 53 2b 100.11 + 44 101100 54 2c 100.100 , 45 101101 55 2d 100.101 - 46 101110 56 2e 100.110 .
    [Show full text]