Skip to main content

Internet Technologies Increasing Ability to Control: The Development of Disciplinary Capacity in the Past Two Decades

  • Chapter
  • First Online:
Global Free Expression - Governing the Boundaries of Internet Content

Part of the book series: Law, Governance and Technology Series ((LGTS,volume 28))

  • 735 Accesses

Abstract

This chapter looks at how the ability of the Internet to control communications has changed in the past two decades. The chapter is loosely modelled on the structure of the Internet itself, where information passes through a chain of control points. In doing so it looks at ‘the ability to control Internet content’ which is termed here ‘disciplinary capacity.’ It then looks at Internet accessibility devices, the domain name system, Internet service providers and more broadly Internet networks, online service providers and Internet hosts. In conclusion, it argues that the discussed shifts in the Internet ecosystem since the mid-1990s have brought with them a gradual increase in the disciplinary capacity of the Internet.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The statistics are based on https://en.wikipedia.org/wiki/File:AppleAppStoreStatistics.png which is believed to accurately represent the number of Apps in the Apple App Store.

  2. 2.

    Interview with DPI vendor in Paris, July 2011.

  3. 3.

    Further details about IDPF and Cleanfeed can be found in Chapter IV and Chapter V.

  4. 4.

    For further details see: https://cihr.eu/wp-content/uploads/2014/06/TNV417Tunis-IXP.pdf.

  5. 5.

    See https://www.pch.net/home/index.php.

  6. 6.

    See https://www.pch.net/technology/operations.php.

  7. 7.

    See https://www.euro-ix.net/resources-list-of-ixps.

  8. 8.

    For further information on these statistics please see Chapter V on private regulation.

  9. 9.

    Figure 3.5 was developed by the author.

  10. 10.

    To ‘hash’ is a technical term that refers to the creation of a digital signature to identify a specific file more easily.

Bibliography

  • Andersson, J. 2009. For the good of the net: The pirate Bay as a strategic sovereign. Culture Machine 10: 64–108.

    Google Scholar 

  • Bartels, H. 2009. Die Piratenpartei: Entstehung, Forderungen Und Perspektiven Der Bewegung. Berlin: Contumax.

    Google Scholar 

  • Bendrath, Ralf, and Milton Mueller. 2011. The end of the net as we know it? Deep packet inspection and internet governance. New Media & Society 13(7): 1142–1160.

    Article  Google Scholar 

  • Benkler, Yochai. 2011. Free irresponsible press: Wikileaks and the battle over the soul of the networked fourth estate, A. Harvard Civil Rights-Civil Liberties Law Review 46: 311–397.

    Google Scholar 

  • Bergvall-Kåreborn, B., and Debra Howcroft. 2011. Mobile applications development on Apple and Google platforms. Communications of the Association for Information Systems 29(1).

    Google Scholar 

  • Bond, C.S. 2004. Web users’ information retrieval methods and skills. Online Information Review.

    Google Scholar 

  • Braman, Sandra, and Stephanie Roberts. 2003. Advantage ISP: Terms of service as media law. New Media & Society 5(3): 422–448.

    Article  Google Scholar 

  • Brenkert, George G. 2010. Corporate control of information: Business and the freedom of expression. Business and Society Review 115(1): 121–145.

    Article  Google Scholar 

  • Bright, Jon, and Ben Wagner. 2011. Analysing the expression governance process. In Government and the internet: Participation, expression and control, ed. San Domenico di Fiesole. Italy: European University Institute.

    Google Scholar 

  • comScore. 2012. U.S. Digital future in focus 2012: Key insights from 2011 and what they mean for the coming year. Reston, VA: comScore, Inc.

    Google Scholar 

  • Cottle, Simon. 2011. Media and the Arab uprisings of 2011: Research notes. Journalism 12(5): 647–659.

    Article  Google Scholar 

  • Daly, Angela. 2010. The legality of deep packet inspection. SSRN eLibrary.

    Google Scholar 

  • De Vey Mestdagh, C.N.J., and R.W. Rijgersberg. 2007. Rethinking accountability in cyberspace: A new perspective on ICANN. International Review of Law, Computers & Technology 21(1): 27–38.

    Article  Google Scholar 

  • Deibert, Ronald, John G. Palfrey, Rafal Rohozinski, and Jonathan Zittrain. 2008. Access denied: The practice and policy of global internet filtering. Cambridge, MA: MIT Press.

    Google Scholar 

  • Deibert, Ronald, John G. Palfrey, Rafal Rohozinski, and Jonathan Zittrain. 2010. Access controlled: The shaping of power, rights, and rule in cyberspace. Cambridge, MA.: MIT Press.

    Google Scholar 

  • Denardis, Laura. 2008. Architecting civil liberties. In Global internet governance academic network annual meeting. Hyderabad (Andra Pradesh), India: GIGANET.

    Google Scholar 

  • Denardis, Laura. 2012, September. Hidden levers of internet control. Information, Communication & Society 15: 37–41.

    Google Scholar 

  • Diaz, Jesus. 2010. It’s time to declare war against apple’s censorship. Gizmodo. Retrieved October 27, 2012, http://gizmodo.com/5490310/its-time-to-declare-war-against-apples-censorship.

  • Doctorow, Cory. 2012. The coming war on general computation. BoingBoing. Retrieved October 27, 2012, http://boingboing.net/2012/01/10/lockdown.html.

  • Dunbar, T. 2012. Combating online trademark and copyright infringement: ICE and DOJ domain name seizures new tools In The government’s efforts to combat online IP. Pace IP, Sports & Entertainment Law Forum.

    Google Scholar 

  • Edelman, B. 2011. Bias in search results?: Diagnosis and response. Indian Journal of Law and Technology 7: 16–32.

    Google Scholar 

  • Experian Marketing Services. 2013. The 2013 digital marketer: Life is the channel. New York: Experian Marketing Services.

    Google Scholar 

  • Feenberg, Andrew. 1999. Questioning technology. London: Routledge.

    Google Scholar 

  • Fiveash, Kelly. 2012. Pirate Bay and its users violate labels’ copyright – judge. The Register. Retrieved October 27, 2012, http://www.theregister.co.uk/2012/02/20/the_pirate_bay_infringes_copyright/.

  • Foucault, Michel. 1977. Discipline and punish: The birth of the prison. 1st americ. New York: Pantheon Books.

    Google Scholar 

  • Friendly, M. 2013. Out of our sight: The constitutional and jurisdictional implications of domain name seizure. University of Miami Law Review.

    Google Scholar 

  • Gebauer, Matthias, and Frank Patalong. 2010. Medien Auf Dem iPhone: Aufstand Gegen Apples App-Zensur. Spiegel Online. Retrieved October 27, 2012, http://www.spiegel.de/netzwelt/web/medien-auf-dem-iphone-aufstand-gegen-apples-app-zensur-a-679750.html.

  • Gillespie, Tarleton. 2007. Wired shut: Copyright and the shape of digital culture. Cambridge MA: MIT Press.

    Google Scholar 

  • Google. 2011. Google transparency report. Google. Retrieved December 17, 2011, https://www.google.com/transparencyreport/.

  • Hally, C.J., and K.A. Koch. 2004. Virtual address bar user interface control. EP Patent (EP1469377).

    Google Scholar 

  • Hally, J.C., K.A. Koch, and M.R. Ligameri. 2007. Virtual address bar user interface control. US Patent (EP1469377).

    Google Scholar 

  • Hamilton, Stuart. 2005. To what extent Can libraries ensure free, equal and unhampered access to internet-accessible information resources from a global perspective? Copenhagen: Department of Library and Information Management Royal School of Library and Information Science.

    Google Scholar 

  • Hoboken, J.V.J. van. 2012. Search engine freedom: On the implications of the right to freedom of expression for the legal governance of web search engines. Amsterdam: University of Amsterdam (UvA).

    Google Scholar 

  • Hodkinson, Chris, Geoffrey Kiel, and Janet R. Mccoll-Kennedy. 2000. Consumer web search behaviour: Diagrammatic illustration of wayfinding on the web. International Journal of Human-Computer Studies 52(5): 805–830.

    Article  Google Scholar 

  • Johnson, David R., and David G. Post. 1996. Law and borders – The rise of law in cyberspace. First Monday 1(1): 1367–1402.

    Article  Google Scholar 

  • Johnson, David R., David G. Post, and Marc Rotenberg. 2013. Facebook, governance, and virtual representation. The Volokh Conspiracy. Retrieved http://www.volokh.com/2013/01/03/facebook-governance-and-virtual-representation/.

  • Katona, Zsolt, Peter Pal Zubcsek, and Miklos Sarvary. 2011. Network effects and personal influences: The diffusion of an online social network. Journal of Marketing Research 48(3): 425–443.

    Article  Google Scholar 

  • Kitchin, R., and M. Dodge. 2011. Code/space software and everyday life. Cambridge, MA: MIT Press.

    Book  Google Scholar 

  • Klang, Mathias. 2006. Disruptive technology: Effects of technology regulation on democracy. Göteborg: Department of Applied Information Technology, Göteborg University.

    Google Scholar 

  • Kovacevich, Adam. 2009. Google public policy blog: Google’s approach to competition. Google public policy blog. Retrieved October 27, 2012, http://googlepublicpolicy.blogspot.de/2009/05/googles-approach-to-competition.html.

  • Kranzberg, M. 1986. Technology and history: ‘Kranzberg’s laws.’. Technology and Culture 27(3): 544–560.

    Article  Google Scholar 

  • Lake, Eli. 2009. Siemens risks losses due to Iran ties – Washington Times. Retrieved October 5, 2010, http://www.washingtontimes.com/news/2009/jul/17/siemens-risks-losses-due-to-iran-ties/.

  • Lametti, David. 2012. The cloud: Boundless digital potential or enclosure 3.0? SSRN Electronic Journal.

    Google Scholar 

  • Lazonder, A.W. 2000. Exploring novice users’ training needs in searching information on the WWW. Journal of Computer Assisted Learning 16(4): 326–335.

    Article  Google Scholar 

  • Lessig, Lawrence. 2006. Code: Version 2.0. [2nd ed.]. New York: Basic Books.

    Google Scholar 

  • Li, M. 2009. Pirate party and the pirate bay: How the pirate Bay influences Sweden and international copyright relations. Pace International Law Review 21(1): 281–308.

    Google Scholar 

  • Lipsman, Andrew. 2011. A look back in time… at the most visited web domains of 1996! comScore Voices. Retrieved October 27, 2012, http://blog.comscore.com/2011/07/most_visited_domains_1996.html.

  • MacKinnon, Rebecca. 2012. Consent of the networked: The world-wide struggle for internet freedom. New York: Basic Books.

    Google Scholar 

  • Manjoo, Farhad. 2009. The unrecognizable internet of 1996. Slate Magazine. Retrieved October 27, 2012, http://www.slate.com/articles/technology/technology/2009/02/jurassic_web.html.

  • Marsden, Christopher T. 2010. Net neutrality: Towards a co-regulatory solution ebook (Google eBook). A&C Black.

    Google Scholar 

  • McIntyre, T.J. 2012. Child abuse images and cleanfeeds: Assessing internet blocking systems. In Research handbook on governance of the internet, ed. Brown Ian. Cheltenham: Edward Elgar.

    Google Scholar 

  • Mueller, Milton. 2004. Ruling the root: Internet governance and the taming of cyberspace. Cambridge, MA: MIT Press.

    Google Scholar 

  • Mueller, Milton. 2010. Networks and states: The global politics of internet governance. Cambridge, MA: MIT Press.

    Book  Google Scholar 

  • Mueller, Milton. 2011. DPI technology from the standpoint of internet governance studies: An introduction. Syracuse: Syracuse University.

    Google Scholar 

  • Mueller, Milton, and Hadi Asghari. 2012. Deep packet inspection and bandwidth management: Battles over BitTorrent in Canada and the United States. Telecommunications Policy 36(6): 462–475.

    Article  Google Scholar 

  • Mueller, Milton, Andreas Kuehn, and S.M. Santoso. 2012. Policing the network: Using DPI for copyright enforcement. Surveillance & Society 9(4): 348–364.

    Google Scholar 

  • Niedermayer, Oskar (ed.). 2013. Die Piratenpartei. Wiesbaden: Springer Fachmedien Wiesbaden.

    Google Scholar 

  • Oblinger, D., and J. Oblinger. 2005. Is it age or IT: First steps toward understanding the net generation. In Educating the net generation. Boulder: Educause

    Google Scholar 

  • Orlowski, Andrew. 2010. Facebook: Privatising the internet, One poke at a time • The register. The Register. Retrieved June 7, 2011, http://www.theregister.co.uk/2010/11/16/facebook_embrace_and_extend_email_hubris/.

  • Orlowski, Andrew. 2011. Film studios Thrash BT in newzbin site-block test case. The Register. Retrieved July 29, 2011, http://www.theregister.co.uk/2011/07/28/site_blocking_bt_and_newzbin2/.

  • Pan, B. et al. 2007. In google we trust: Users’ decisions on rank, position, and relevance. Journal of Computer-Mediated Communication 12: 801–823.

    Google Scholar 

  • Pantea, Smaranda. 2012. How do consumers use internet? Evidence from the Nielsen clickstream dataset. In IPTS –CONNECT/F4 “Major findings” sessions. Brussels/Belgium: European Commission.

    Google Scholar 

  • Parsons, Christopher. 2009. Deep packet inspection in perspective: Tracing its lineage and surveillance potentials. Kingston: Queen’s University.

    Google Scholar 

  • Patterson, M. 2012. Google and search enging market power. Fordham Law Legal Studies Research Paper.

    Google Scholar 

  • Pew Research Center’s Internet & American Life Project. 2013. What internet users do on a typical day. Pew Research. Retrieved August 25, 2013, http://www.pewinternet.org/Trend-Data-(Adults)/Online-Activities-Daily.aspx.

  • Plesco, Ron, and Phyllis Schneck. 2010. Criminal public-private partnerships: Why can’t we do that. Georgetown Journal of International Affairs 11: 151–154.

    Google Scholar 

  • Pomfret, James. 2009. Technician guilty in Edison Chen sex pictures trial. Victoria News. Retrieved December 17, 2011, http://www.vicnews.com/entertainment/television/43998412.html.

  • Rao, Bharat, Bojan Angelov, and Oded Nov. 2006. Fusion of disruptive technologies. European Management Journal 24(2–3): 174–188.

    Article  Google Scholar 

  • Reidenberg, Joel. 1996. Governing networks and rule-making in cyberspace. Emory Law Journal 45(3).

    Google Scholar 

  • Sellars, A. 2011. Seized sites: The In Rem forfeiture of copyright-infringing domain names. Available at SSRN 1835604.

    Google Scholar 

  • Shea, Ammon. 2010. The phone book: The curious history of the book that everyone uses but no one reads. New York: Perigee Book.

    Google Scholar 

  • Stanley, J.E. 2011. Max mosley and the english right to privacy. Washington University Global Studies Law Review 10(3): 641.

    Google Scholar 

  • Stronge, Aideen J., Wendy a. Rogers, and Arthur D. Fisk. 2006. Web-based information search and retrieval: Effects of strategy use and age on search success. Human Factors: The Journal of the Human Factors and Ergonomics Society 48(3): 434–446.

    Article  Google Scholar 

  • Suarez-Villa, Luis. 2009. Technocapitalism: A critical perspective on technological innovation and corporatism. Philadelphia: Temple University Press.

    Google Scholar 

  • Taylor, Arthur. 2012. A study of the information search behaviour of the millennial generation. Information Research: An International Electronic Journal 17(1): 20.

    Google Scholar 

  • Thomas, J.A. 2011. Fifteen years of fame: The declining relevance of domain names in the enduring conflict between trademark and free speech rights. John Marshall Review of Intellectual Property Law 11(1): 1.

    Google Scholar 

  • Thomes, Tim Paul. 2011. An Economic Analysis of Online Streaming: How the Music Industry Can Generate Revenues from Cloud Computing. SSRN Electronic Journal. doi: 10.2139/ssrn.1866228.

  • Touloumis, T. 2009. Buccaneers and Bucks from the internet: Pirate Bay and the entertainment industry. Seton Hall Journal of Sport Law 19(1): 253–281.

    Google Scholar 

  • Waddington, P. 1994. Liberty and order: Public order policing in a capital city. London: UCL Press.

    Google Scholar 

  • Wagner, Ben. 2011. ‘I Have Understood You’: The co-evolution of expression and control on the internet, television and mobile phones during the Jasmine Revolution in Tunisia. International Journal of Communication 5(2011): 1295–1302.

    Google Scholar 

  • Wagner, Ben. 2012. Push-button-autocracy in Tunisia: Analysing the role of internet infrastructure, institutions and international markets in creating a Tunisian censorship regime. Telecommunications Policy 36(6): 484–492.

    Article  Google Scholar 

  • Wagner, Mitch. 2010. Dear steve jobs: Questions about censorship, satire, iPad accessories. Computerworld. Retrieved October 27, 2012, http://blogs.computerworld.com/16114/steve_jobs_app_store_censorship.

  • Wu, Tim. 2010. The master switch: The rise and fall of information empires, 1st ed. New York: Knopf.

    Google Scholar 

  • Wu, Tim. 2012. When censorship makes sense: How YouTube should police hate speech. The New Republic. Retrieved October 27, 2012, (http://www.tnr.com/blog/plank/107404/when-censorship-makes-sense-how-youtube-should-police-hate-speech#).

    Google Scholar 

  • Xie, Irisxi, and Soohyung Joo. 2012. Factors affecting the selection of search tactics: Tasks, knowledge, process, and systems. Information Processing & Management 48(2): 254–270.

    Article  Google Scholar 

  • York, Jillian C. 2010. Policing content in the quasi-public sphere. Boston: Open Net Initiative Bulletin. Berkman Center. Harvard University.

    Google Scholar 

  • Zhang, C., and P. Dhungel. 2011. Unraveling the Bittorrent ecosystem. IEEE Transactions on Parallel and Distributed Systems 22: 1164–1177.

    Google Scholar 

  • Zittrain, Jonathan. 2008. The future of the internet and how to stop it. New Haven [Conn.]: Yale University Press.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Wagner, B. (2016). Internet Technologies Increasing Ability to Control: The Development of Disciplinary Capacity in the Past Two Decades. In: Global Free Expression - Governing the Boundaries of Internet Content. Law, Governance and Technology Series, vol 28. Springer, Cham. https://doi.org/10.1007/978-3-319-33513-1_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-33513-1_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-33511-7

  • Online ISBN: 978-3-319-33513-1

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics