Abstract
This chapter looks at how the ability of the Internet to control communications has changed in the past two decades. The chapter is loosely modelled on the structure of the Internet itself, where information passes through a chain of control points. In doing so it looks at ‘the ability to control Internet content’ which is termed here ‘disciplinary capacity.’ It then looks at Internet accessibility devices, the domain name system, Internet service providers and more broadly Internet networks, online service providers and Internet hosts. In conclusion, it argues that the discussed shifts in the Internet ecosystem since the mid-1990s have brought with them a gradual increase in the disciplinary capacity of the Internet.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
The statistics are based on https://en.wikipedia.org/wiki/File:AppleAppStoreStatistics.png which is believed to accurately represent the number of Apps in the Apple App Store.
- 2.
Interview with DPI vendor in Paris, July 2011.
- 3.
Further details about IDPF and Cleanfeed can be found in Chapter IV and Chapter V.
- 4.
For further details see: https://cihr.eu/wp-content/uploads/2014/06/TNV417Tunis-IXP.pdf.
- 5.
- 6.
- 7.
- 8.
For further information on these statistics please see Chapter V on private regulation.
- 9.
Figure 3.5 was developed by the author.
- 10.
To ‘hash’ is a technical term that refers to the creation of a digital signature to identify a specific file more easily.
Bibliography
Andersson, J. 2009. For the good of the net: The pirate Bay as a strategic sovereign. Culture Machine 10: 64–108.
Bartels, H. 2009. Die Piratenpartei: Entstehung, Forderungen Und Perspektiven Der Bewegung. Berlin: Contumax.
Bendrath, Ralf, and Milton Mueller. 2011. The end of the net as we know it? Deep packet inspection and internet governance. New Media & Society 13(7): 1142–1160.
Benkler, Yochai. 2011. Free irresponsible press: Wikileaks and the battle over the soul of the networked fourth estate, A. Harvard Civil Rights-Civil Liberties Law Review 46: 311–397.
Bergvall-Kåreborn, B., and Debra Howcroft. 2011. Mobile applications development on Apple and Google platforms. Communications of the Association for Information Systems 29(1).
Bond, C.S. 2004. Web users’ information retrieval methods and skills. Online Information Review.
Braman, Sandra, and Stephanie Roberts. 2003. Advantage ISP: Terms of service as media law. New Media & Society 5(3): 422–448.
Brenkert, George G. 2010. Corporate control of information: Business and the freedom of expression. Business and Society Review 115(1): 121–145.
Bright, Jon, and Ben Wagner. 2011. Analysing the expression governance process. In Government and the internet: Participation, expression and control, ed. San Domenico di Fiesole. Italy: European University Institute.
comScore. 2012. U.S. Digital future in focus 2012: Key insights from 2011 and what they mean for the coming year. Reston, VA: comScore, Inc.
Cottle, Simon. 2011. Media and the Arab uprisings of 2011: Research notes. Journalism 12(5): 647–659.
Daly, Angela. 2010. The legality of deep packet inspection. SSRN eLibrary.
De Vey Mestdagh, C.N.J., and R.W. Rijgersberg. 2007. Rethinking accountability in cyberspace: A new perspective on ICANN. International Review of Law, Computers & Technology 21(1): 27–38.
Deibert, Ronald, John G. Palfrey, Rafal Rohozinski, and Jonathan Zittrain. 2008. Access denied: The practice and policy of global internet filtering. Cambridge, MA: MIT Press.
Deibert, Ronald, John G. Palfrey, Rafal Rohozinski, and Jonathan Zittrain. 2010. Access controlled: The shaping of power, rights, and rule in cyberspace. Cambridge, MA.: MIT Press.
Denardis, Laura. 2008. Architecting civil liberties. In Global internet governance academic network annual meeting. Hyderabad (Andra Pradesh), India: GIGANET.
Denardis, Laura. 2012, September. Hidden levers of internet control. Information, Communication & Society 15: 37–41.
Diaz, Jesus. 2010. It’s time to declare war against apple’s censorship. Gizmodo. Retrieved October 27, 2012, http://gizmodo.com/5490310/its-time-to-declare-war-against-apples-censorship.
Doctorow, Cory. 2012. The coming war on general computation. BoingBoing. Retrieved October 27, 2012, http://boingboing.net/2012/01/10/lockdown.html.
Dunbar, T. 2012. Combating online trademark and copyright infringement: ICE and DOJ domain name seizures new tools In The government’s efforts to combat online IP. Pace IP, Sports & Entertainment Law Forum.
Edelman, B. 2011. Bias in search results?: Diagnosis and response. Indian Journal of Law and Technology 7: 16–32.
Experian Marketing Services. 2013. The 2013 digital marketer: Life is the channel. New York: Experian Marketing Services.
Feenberg, Andrew. 1999. Questioning technology. London: Routledge.
Fiveash, Kelly. 2012. Pirate Bay and its users violate labels’ copyright – judge. The Register. Retrieved October 27, 2012, http://www.theregister.co.uk/2012/02/20/the_pirate_bay_infringes_copyright/.
Foucault, Michel. 1977. Discipline and punish: The birth of the prison. 1st americ. New York: Pantheon Books.
Friendly, M. 2013. Out of our sight: The constitutional and jurisdictional implications of domain name seizure. University of Miami Law Review.
Gebauer, Matthias, and Frank Patalong. 2010. Medien Auf Dem iPhone: Aufstand Gegen Apples App-Zensur. Spiegel Online. Retrieved October 27, 2012, http://www.spiegel.de/netzwelt/web/medien-auf-dem-iphone-aufstand-gegen-apples-app-zensur-a-679750.html.
Gillespie, Tarleton. 2007. Wired shut: Copyright and the shape of digital culture. Cambridge MA: MIT Press.
Google. 2011. Google transparency report. Google. Retrieved December 17, 2011, https://www.google.com/transparencyreport/.
Hally, C.J., and K.A. Koch. 2004. Virtual address bar user interface control. EP Patent (EP1469377).
Hally, J.C., K.A. Koch, and M.R. Ligameri. 2007. Virtual address bar user interface control. US Patent (EP1469377).
Hamilton, Stuart. 2005. To what extent Can libraries ensure free, equal and unhampered access to internet-accessible information resources from a global perspective? Copenhagen: Department of Library and Information Management Royal School of Library and Information Science.
Hoboken, J.V.J. van. 2012. Search engine freedom: On the implications of the right to freedom of expression for the legal governance of web search engines. Amsterdam: University of Amsterdam (UvA).
Hodkinson, Chris, Geoffrey Kiel, and Janet R. Mccoll-Kennedy. 2000. Consumer web search behaviour: Diagrammatic illustration of wayfinding on the web. International Journal of Human-Computer Studies 52(5): 805–830.
Johnson, David R., and David G. Post. 1996. Law and borders – The rise of law in cyberspace. First Monday 1(1): 1367–1402.
Johnson, David R., David G. Post, and Marc Rotenberg. 2013. Facebook, governance, and virtual representation. The Volokh Conspiracy. Retrieved http://www.volokh.com/2013/01/03/facebook-governance-and-virtual-representation/.
Katona, Zsolt, Peter Pal Zubcsek, and Miklos Sarvary. 2011. Network effects and personal influences: The diffusion of an online social network. Journal of Marketing Research 48(3): 425–443.
Kitchin, R., and M. Dodge. 2011. Code/space software and everyday life. Cambridge, MA: MIT Press.
Klang, Mathias. 2006. Disruptive technology: Effects of technology regulation on democracy. Göteborg: Department of Applied Information Technology, Göteborg University.
Kovacevich, Adam. 2009. Google public policy blog: Google’s approach to competition. Google public policy blog. Retrieved October 27, 2012, http://googlepublicpolicy.blogspot.de/2009/05/googles-approach-to-competition.html.
Kranzberg, M. 1986. Technology and history: ‘Kranzberg’s laws.’. Technology and Culture 27(3): 544–560.
Lake, Eli. 2009. Siemens risks losses due to Iran ties – Washington Times. Retrieved October 5, 2010, http://www.washingtontimes.com/news/2009/jul/17/siemens-risks-losses-due-to-iran-ties/.
Lametti, David. 2012. The cloud: Boundless digital potential or enclosure 3.0? SSRN Electronic Journal.
Lazonder, A.W. 2000. Exploring novice users’ training needs in searching information on the WWW. Journal of Computer Assisted Learning 16(4): 326–335.
Lessig, Lawrence. 2006. Code: Version 2.0. [2nd ed.]. New York: Basic Books.
Li, M. 2009. Pirate party and the pirate bay: How the pirate Bay influences Sweden and international copyright relations. Pace International Law Review 21(1): 281–308.
Lipsman, Andrew. 2011. A look back in time… at the most visited web domains of 1996! comScore Voices. Retrieved October 27, 2012, http://blog.comscore.com/2011/07/most_visited_domains_1996.html.
MacKinnon, Rebecca. 2012. Consent of the networked: The world-wide struggle for internet freedom. New York: Basic Books.
Manjoo, Farhad. 2009. The unrecognizable internet of 1996. Slate Magazine. Retrieved October 27, 2012, http://www.slate.com/articles/technology/technology/2009/02/jurassic_web.html.
Marsden, Christopher T. 2010. Net neutrality: Towards a co-regulatory solution ebook (Google eBook). A&C Black.
McIntyre, T.J. 2012. Child abuse images and cleanfeeds: Assessing internet blocking systems. In Research handbook on governance of the internet, ed. Brown Ian. Cheltenham: Edward Elgar.
Mueller, Milton. 2004. Ruling the root: Internet governance and the taming of cyberspace. Cambridge, MA: MIT Press.
Mueller, Milton. 2010. Networks and states: The global politics of internet governance. Cambridge, MA: MIT Press.
Mueller, Milton. 2011. DPI technology from the standpoint of internet governance studies: An introduction. Syracuse: Syracuse University.
Mueller, Milton, and Hadi Asghari. 2012. Deep packet inspection and bandwidth management: Battles over BitTorrent in Canada and the United States. Telecommunications Policy 36(6): 462–475.
Mueller, Milton, Andreas Kuehn, and S.M. Santoso. 2012. Policing the network: Using DPI for copyright enforcement. Surveillance & Society 9(4): 348–364.
Niedermayer, Oskar (ed.). 2013. Die Piratenpartei. Wiesbaden: Springer Fachmedien Wiesbaden.
Oblinger, D., and J. Oblinger. 2005. Is it age or IT: First steps toward understanding the net generation. In Educating the net generation. Boulder: Educause
Orlowski, Andrew. 2010. Facebook: Privatising the internet, One poke at a time • The register. The Register. Retrieved June 7, 2011, http://www.theregister.co.uk/2010/11/16/facebook_embrace_and_extend_email_hubris/.
Orlowski, Andrew. 2011. Film studios Thrash BT in newzbin site-block test case. The Register. Retrieved July 29, 2011, http://www.theregister.co.uk/2011/07/28/site_blocking_bt_and_newzbin2/.
Pan, B. et al. 2007. In google we trust: Users’ decisions on rank, position, and relevance. Journal of Computer-Mediated Communication 12: 801–823.
Pantea, Smaranda. 2012. How do consumers use internet? Evidence from the Nielsen clickstream dataset. In IPTS –CONNECT/F4 “Major findings” sessions. Brussels/Belgium: European Commission.
Parsons, Christopher. 2009. Deep packet inspection in perspective: Tracing its lineage and surveillance potentials. Kingston: Queen’s University.
Patterson, M. 2012. Google and search enging market power. Fordham Law Legal Studies Research Paper.
Pew Research Center’s Internet & American Life Project. 2013. What internet users do on a typical day. Pew Research. Retrieved August 25, 2013, http://www.pewinternet.org/Trend-Data-(Adults)/Online-Activities-Daily.aspx.
Plesco, Ron, and Phyllis Schneck. 2010. Criminal public-private partnerships: Why can’t we do that. Georgetown Journal of International Affairs 11: 151–154.
Pomfret, James. 2009. Technician guilty in Edison Chen sex pictures trial. Victoria News. Retrieved December 17, 2011, http://www.vicnews.com/entertainment/television/43998412.html.
Rao, Bharat, Bojan Angelov, and Oded Nov. 2006. Fusion of disruptive technologies. European Management Journal 24(2–3): 174–188.
Reidenberg, Joel. 1996. Governing networks and rule-making in cyberspace. Emory Law Journal 45(3).
Sellars, A. 2011. Seized sites: The In Rem forfeiture of copyright-infringing domain names. Available at SSRN 1835604.
Shea, Ammon. 2010. The phone book: The curious history of the book that everyone uses but no one reads. New York: Perigee Book.
Stanley, J.E. 2011. Max mosley and the english right to privacy. Washington University Global Studies Law Review 10(3): 641.
Stronge, Aideen J., Wendy a. Rogers, and Arthur D. Fisk. 2006. Web-based information search and retrieval: Effects of strategy use and age on search success. Human Factors: The Journal of the Human Factors and Ergonomics Society 48(3): 434–446.
Suarez-Villa, Luis. 2009. Technocapitalism: A critical perspective on technological innovation and corporatism. Philadelphia: Temple University Press.
Taylor, Arthur. 2012. A study of the information search behaviour of the millennial generation. Information Research: An International Electronic Journal 17(1): 20.
Thomas, J.A. 2011. Fifteen years of fame: The declining relevance of domain names in the enduring conflict between trademark and free speech rights. John Marshall Review of Intellectual Property Law 11(1): 1.
Thomes, Tim Paul. 2011. An Economic Analysis of Online Streaming: How the Music Industry Can Generate Revenues from Cloud Computing. SSRN Electronic Journal. doi: 10.2139/ssrn.1866228.
Touloumis, T. 2009. Buccaneers and Bucks from the internet: Pirate Bay and the entertainment industry. Seton Hall Journal of Sport Law 19(1): 253–281.
Waddington, P. 1994. Liberty and order: Public order policing in a capital city. London: UCL Press.
Wagner, Ben. 2011. ‘I Have Understood You’: The co-evolution of expression and control on the internet, television and mobile phones during the Jasmine Revolution in Tunisia. International Journal of Communication 5(2011): 1295–1302.
Wagner, Ben. 2012. Push-button-autocracy in Tunisia: Analysing the role of internet infrastructure, institutions and international markets in creating a Tunisian censorship regime. Telecommunications Policy 36(6): 484–492.
Wagner, Mitch. 2010. Dear steve jobs: Questions about censorship, satire, iPad accessories. Computerworld. Retrieved October 27, 2012, http://blogs.computerworld.com/16114/steve_jobs_app_store_censorship.
Wu, Tim. 2010. The master switch: The rise and fall of information empires, 1st ed. New York: Knopf.
Wu, Tim. 2012. When censorship makes sense: How YouTube should police hate speech. The New Republic. Retrieved October 27, 2012, (http://www.tnr.com/blog/plank/107404/when-censorship-makes-sense-how-youtube-should-police-hate-speech#).
Xie, Irisxi, and Soohyung Joo. 2012. Factors affecting the selection of search tactics: Tasks, knowledge, process, and systems. Information Processing & Management 48(2): 254–270.
York, Jillian C. 2010. Policing content in the quasi-public sphere. Boston: Open Net Initiative Bulletin. Berkman Center. Harvard University.
Zhang, C., and P. Dhungel. 2011. Unraveling the Bittorrent ecosystem. IEEE Transactions on Parallel and Distributed Systems 22: 1164–1177.
Zittrain, Jonathan. 2008. The future of the internet and how to stop it. New Haven [Conn.]: Yale University Press.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Wagner, B. (2016). Internet Technologies Increasing Ability to Control: The Development of Disciplinary Capacity in the Past Two Decades. In: Global Free Expression - Governing the Boundaries of Internet Content. Law, Governance and Technology Series, vol 28. Springer, Cham. https://doi.org/10.1007/978-3-319-33513-1_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-33513-1_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-33511-7
Online ISBN: 978-3-319-33513-1
eBook Packages: Law and CriminologyLaw and Criminology (R0)