Advertisement

Global Expression Governance: The Norms of a Global Regime

  • Ben Wagner
Chapter
Part of the Law, Governance and Technology Series book series (LGTS, volume 28)

Abstract

If the ‘global default exists as was argued in previous chapters, which norms define this regime? The following chapter will attempt to sketch out the three key norms that keep reappearing in the international debate on freedom of expression before attempting to provide an overarching analysis of how the normative regimes and governance interact. Based on the previous analysis it has become evident that three key narratives keep returning to debates on freedom of expression: children, memory and sexuality. The analysis in turn will then explore aspects of social and political theory – based in particular on Michelle Foucault – in attempting to understand how and why these narratives have become so prominent and what role both play in wider debates on governing the Internet.

Keywords

Child Abuse Child Sexual Abuse Child Pornography Wide Debate Great Agency 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Bibliography

  1. Arthur, Charles. 2012. Facebook’s nudity and violence guidelines are laid bare|technology|the guardian. The Guardian. Retrieved July 25, 2015 http://www.theguardian.com/technology/2012/feb/21/facebook-nudity-violence-censorship-guidelines.
  2. Ashenden, Samantha. 2004. Governing child aexual abuse: negotiating the boundaries of public and private, law and science. London: Psychology Press.Google Scholar
  3. Attwood, Feona, et al. 2012. Engaging with the bailey review: Blogging, academia and authenticity. Psychology and Sexuality 3(1): 69–94.CrossRefGoogle Scholar
  4. Badran, Margot. 1998. Unifying women: Feminist pasts and presents in Yemen. Gender & History 10(3): 498–518.CrossRefGoogle Scholar
  5. Bailey, Reg. 2011. Letting children be children: Report of an independent review of the commercialisation and sexualisation of childhood, Cm 8078 20. London: TSO.Google Scholar
  6. Barker, Meg. 2002. The evil that men, women and children do. The Psychologist 15(11): 568–571.Google Scholar
  7. Barker, M., and R. Duschinsky. 2012. Sexualisation’s four faces: Sexualisation and gender stereotyping in the bailey review. Gender and Education 24(3): 303–310.CrossRefGoogle Scholar
  8. Best, Joel, and Kathleen A. Bogle. 2014. Kids gone wild: From rainbow parties to sexting, understanding the hype over teen sex. New York: New York University Press.Google Scholar
  9. Bhattacharyya, Gargi. 2002. Sexuality and society: An introduction. New York: Routledge.Google Scholar
  10. Brey, P. 2005. Artifacts as social agents. In Inside the politics of technology: Agency and normativity in the co-production of technology and society, ed. Hans Harbers, 61–84. Amsterdam: Amsterdam University Press.Google Scholar
  11. Bryce, J. 2010. Online sexual exploitation of young people. In Handbook of Internet crime, ed. Yvonne Jewkes and Majid Yar, 320–342. Cullompton: Willan.Google Scholar
  12. Burris, A. 2014. Hell hath no fury like a woman Porned: Revenge porn and the need for a federal nonconsensual pornography statute. Florida Law Review Google Scholar
  13. Caprioli, Mary. 2005. Primed for violence: The role of gender inequality in predicting internal conflict. International Studies Quarterly 49(2): 161–178.CrossRefGoogle Scholar
  14. Chen, Adrian. 2012. Inside facebook’s outsourced anti-porn and Gore Brigade, where ‘camel toes’ are more offensive than ‘crushed heads.’ Gawker. Retrieved July 31, 2015 http://gawker.com/5885714/inside-facebooks-outsourced-anti-porn-and-gore-brigade-where-camel-toes-are-more-offensive-than-crushed-heads.
  15. Chernyavskaya, Alexandra. 2015. Children’s rights in the digital age. Londen School of Economics. Retrieved July 31, 2015 http://www.lse.ac.uk/media@lse/events/Childrens-Rights-in-the-Digital-Age.aspx.
  16. Chun, Wendy Hui Kyong. 2006. Control and freedom: Power and paranoia in the age of fiber optics. Cambridge, MA: MIT Press.Google Scholar
  17. Chun, Wendy Hui Kyong. 2011. Programmed visions: Software and memory. Cambridge, MA: MIT Press.CrossRefGoogle Scholar
  18. Citron, D.K., and M.A. Franks. 2014. Criminalizing revenge porn. Wake Forest Law Review.Google Scholar
  19. Clanchy, M. 1979. From memory to written record, England, 1066–1307. Cambridge: Harvard University Press.Google Scholar
  20. Costin, Lela B., and Lela B. Costin Howard Jacob Karger David Stoesz. 1997. The politics of child abuse in America. Oxford University Press, Incorporated.Google Scholar
  21. Danielewicz-Betz, Anna. 2013. Cyberspace othering and marginalisation in the context of Saudi Arabian culture: A socio-pragmatic perspective. Lodz Papers in Pragmatics 9(2): 275–299.CrossRefGoogle Scholar
  22. Davis, Kevin, and Angelina Fisher. 2012. Governance by indicators: Global power through classification and rankings. Oxford: Oxford University Press.CrossRefGoogle Scholar
  23. Dellavalle, R.P., and E.J. Hester. 2003. Going, going, gone: Lost internet references. Science-New York … (October):787–788.Google Scholar
  24. Duschinsky, R., and M. Barker. 2013. Doing the möbius strip: The politics of the Bailey Review. Sexualities 16(5–6): 730–742.CrossRefGoogle Scholar
  25. Foucault, Michel. 2012a. The birth of the clinic. London: Routledge.Google Scholar
  26. Foucault, Michel. 2012b. The history of sexuality: An introduction. New York: Knopf Doubleday Publishing Group.Google Scholar
  27. Franks, Mary Anne. 2014. UCLA LAW REVIEW how to feel like a woman, or why punishment is a drag. UCLA Law Review 566: 566–605.Google Scholar
  28. Goldsmith, Jack L., and Wu Tim. 2006. Who controls the Internet? Illusions of a borderless world. New York: Oxford University Press.Google Scholar
  29. Habermas, Jürgen. 1962. Strukturwandel Der Öffentlichkeit : Untersuchungen Zu Einer Kategorie Der Bürgerlichen Gesellschaft. Neuwied/Berlin: Luchterhand.Google Scholar
  30. Habermas, J. 1991. The structural transformation of the public sphere: An inquiry into a category of bourgeois society. Cambridge, MA: MIT Press.Google Scholar
  31. Hacking, Ian. 1991. The making and molding of child abuse. Critical Inquiry 17(2): 253–288.CrossRefGoogle Scholar
  32. Hacking, Ian. 1993. World-making by kind-making: Child abuse for example. In How classification works: Nelson Goodman among the social sciences, ed. Mary Douglas, David L. Hull, and Nelson Goodman, 256. Edinburgh: Edinburgh University Press.Google Scholar
  33. Haskins, E. 2007. Between archive and participation: Public memory in a digital age. Rhetoric Society Quarterly 37: 401–422.CrossRefGoogle Scholar
  34. Hatem, M. 1994. The paradoxes of state feminism in Egypt. In Women and politics worldwide, ed. Barbara J. Nelson and Najama Caudhuri, 226–242. New Haven: Yale University Press.Google Scholar
  35. Hutton, P.H. 1998. Mentalities, matrix of memory. Historia 43: 7–23.Google Scholar
  36. Jenkins, Philip. 2001a. Beyond tolerance: Child pornography on the internet. New York: New York University Press.Google Scholar
  37. Jenkins, Philip. 2001b. How Europe discovered it’s sex offender crisis. In How claims spread : Cross-national diffusion of social problems, ed. Joel Best. New York: Aldine de Gruyter.Google Scholar
  38. Jenkins, Philip. 2009. Failure to launch: Why do some social issues fail to detonate moral panics? British Journal of Criminology 49(1): 35–47.CrossRefGoogle Scholar
  39. Jensen, Sune Qvotrup. 2011. Othering, identity formation and agency. Qualitative Studies 2(2): 63–78.Google Scholar
  40. Jewkes, Y. 2010. Much Ado about nothing? Representations and realities of online soliciting of children. Journal of Sexual Aggression 16(1): 5–18.CrossRefGoogle Scholar
  41. Jones, Lisa M., Kimberly J. Mitchell, and David Finkelhor. 2012. Online harassment in context: Trends from three youth internet safety surveys (2000, 2005, 2010). Psychology of Violence 3(1): 53–69.CrossRefGoogle Scholar
  42. Kempe, C. Henry. 1962. The battered-child syndrome. JAMA 181(1): 17.CrossRefGoogle Scholar
  43. Koshar, R. 1998. Germany’s transient pasts: Preservation and national memory in the twentieth century. Chapel Hill: University of North Carolina Press.Google Scholar
  44. Krieger, Nancy. 2003. Does racism harm health? Did child abuse exist before 1962? On explicit questions, critical science, and current controversies: An ecosocial perspective. American Journal of Public Health 93(2): 194–199.CrossRefGoogle Scholar
  45. Livingstone, Sonia. 2014. Digital media and children’s rights. LSE Media Policy Project. Retrieved http://blogs.lse.ac.uk/mediapolicyproject/2014/09/12/sonia-livingstone-digital-media-and-childrens-rights/.
  46. Lynch, Margaret A. 1985. Child abuse before Kempe: An historical literature review. Child Abuse & Neglect 9(1): 7–15.CrossRefGoogle Scholar
  47. Mansell, Robin. 2012. Imagining the internet: Communication, innovation, and governance. Oxford: Oxford University Press.Google Scholar
  48. Mayer-Schönberger, Viktor. 2009. Delete: The virtue of forgetting in the digital age. Princeton: Princeton University Press.Google Scholar
  49. McVeigh, Tracy. 2015. Internet filters block websites of sex abuse charities. The Guardian. Retrieved June 25, 2015. http://www.theguardian.com/technology/2015/jan/24/internet-filters-block-sex-abuse-charities.
  50. Meyer, Anneke. 2010. Evil monsters and cunning perverts: Representing and regulating the dangerous paedophile. In Popular culture, crime and social control, ed. Mathieu Deflem. Bingley: Emerald.Google Scholar
  51. Michaelson, E.J., and W. Goldschmidt. 1971. Female roles and male dominance among peasants. Southwestern Journal of Anthropology 27(4): 330–352.CrossRefGoogle Scholar
  52. Mitchell, K. 2003. Monuments, memorials, and the politics of memory. Urban Geography 24: 442–459.CrossRefGoogle Scholar
  53. Nakhleh, Khalil, and Elia Zureik. 1980. The sociology of the Palestinians. New York: St. Martin’s Press.Google Scholar
  54. Newberger, E.H., and R. Bourne. 1978. The medicalization and legalization of child abuse. The American Journal of Orthopsychiatry 48(4): 593–607.CrossRefGoogle Scholar
  55. Ng’atigwa, F.X. 2014. ‘Othering’ and ‘others’ in religious radio broadcasts in Tanzania: Cases from radio Maria Tanzania and Radio Imaan. Journal of Religion and Popular Culture 26(2): 230.CrossRefGoogle Scholar
  56. Noman, Helmi, and Jillian C. York. 2011. West censoring east: The use of Western technologies by middle east censors, 2010–2011.Google Scholar
  57. Parmar, M. 2014. Memorialising 40 years since Idi Amin’s expulsion: Digital ‘memory Mania’to the ‘right to be forgotten.’. South Asian Popular Culture 12: 1–14.CrossRefGoogle Scholar
  58. Powles, Julia, and Enrique Chaparro. 2015. How Google determined our right to be forgotten. The Guardian. Retrieved July 28, 2015 http://www.theguardian.com/technology/2015/feb/18/the-right-be-forgotten-google-search.
  59. Quayle, E. 2010. Child pornography. In Handbook of Internet crime, ed. Yvonne Jewkes and Majid Yar, 343–367. Cullompton: Willan.Google Scholar
  60. Robbins, Martin. 2013. Cameron’s internet filter goes far beyond porn – And that was always the plan. New Statesman. Retrieved June 25, 2015 http://www.newstatesman.com/politics/2013/12/camerons-internet-filter-goes-far-beyond-porn-and-was-always-plan.
  61. Robinson, K.H. 2013. Innocence, knowledge and the construction of childhood: The contradictory nature of sexuality and censorship in children’s contemporary lives. London: Routledge.Google Scholar
  62. Schilt, K., and L. Westbrook. 2009. Doing gender, doing heteronormativity: ‘Gender normals’, transgender people, and the social maintenance of heterosexuality. Gender & Society 23(4): 440–464.CrossRefGoogle Scholar
  63. Schrader, A.M., and K. Wells. 2004. Queer perspectives on social responsibility in Canadian schools and libra. School Libraries in Canada 24: 9.Google Scholar
  64. Schrover, Marlou, and Deirdre M. Moloney. 2014. In Gender, migration and categorisation: Making distinctions between migrants in western countries, 1945–2010, ed. Marlou Schrover and Deirdre M. Moloney. Amsterdam: Amsterdam University Press.Google Scholar
  65. Shah, Nishant. 2015. Sluts ‘r’ us: Intersections of gender, protocol and agency in the digital age. First Monday 20(4).Google Scholar
  66. Sturken, M. 1997. Tangled memories: The Vietnam war, the AIDS epidemic, and the politics of remembering. Berkeley: University of California Press.Google Scholar
  67. Sweney, Mark. 2011. ParentPort website to help tackle fears over sexualisation of children. Guardian. Retrieved October 12, 2011 http://www.guardian.co.uk/media/2011/oct/11/parentport-website-tackle-fears-sexualisation.
  68. Tong, R. 1982. Feminism, pornography and censorship. Social Theory and Practice 8: 1–17.CrossRefGoogle Scholar
  69. Wagner, Ben. 2012. Push-button-autocracy in Tunisia: Analysing the role of internet infrastructure, institutions and international markets in creating a Tunisian censorship regime. Telecommunications Policy 36(6).Google Scholar
  70. Wang, Z. 2008. National humiliation, history education, and the politics of historical memory: Patriotic education Campaign in China. International Studies Quarterly 52: 783–806.CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  • Ben Wagner
    • 1
  1. 1.Centre for Internet & Human RightsEuropean University ViadrinaFrankfurtGermany

Personalised recommendations