An Endnote on Regulating Cyberspace: Architecture vs Law?
(1988) University of New South Wales Law Journal 21(2): 593
27 Pages Posted: 12 Dec 2012
Date Written: December 11, 1998
Abstract
This 1998 article is an early analysis and application of Lessig's theory of cyberspace regulation. It is placed in the context of the (then) evolving nature of cyberspace and theories about it, from early 'digital libertarianism', to more dystopian views, to a proposal for the need for 'digital realism'. Five aspects of Lessig's 'code', and their significance, are discussed. Six illustrative examples of 'code' as regulation, drawn in part from Australian law, are considered: anonymity, cookies, spam black holes, P3P, Robot exclusion, and ECMS.
The contents of the article are as follows: I. INTRODUCTION: KING CANUTE’S COMEBACK II. THE EVOLVING NATURE OF CYBERSPACE A. A Realm of Freedom? - The Myths of Digital Libertarianism B. A Realm of Surveillance? - A Dystopian View of Cyberspace III. THEORIES OF CYBERSPACE REGULATION - DIGITAL REALISM NEEDED IV. CYBERSPACE REGULATION AS A FUNCTION OF FOUR CONSTRAINTS A. Norms, Morality and Self-Regulation B. Markets C. ‘Code’, ‘Nature’ and ‘Architecture’ D. Law - Direct and Indirect Regulation V. FIVE FEATURES OF CYBERSPACE ARCHITECTURE AS REGULATION A. Architecture is More than Software B. Architecture has Immediacy as a Constraint C. Most Architecture has High Plasticity D. The Legitimacy of Architecture Depends on Who Controls It E. Default Settings Give Regulation by Default VI. REGULATION BY AND OF CYBERSPACE ARCHITECTURE - ILLUSTRATIVE EXAMPLES A. Building Anonymity into Architecture B. Cookies - Caller ID with Hidden Opt-Out C. Mandatory Surveillance Code - Interceptability and Decryption Ability D. Spam Black Holes - Is Law Safe for ‘Return To Sender’ Architecture? E. Platform For Privacy Preferences (P3P) - What Can Protocols Achieve? F. Stopping Searching - Robot Exclusion Standards G. Electronic Copyright Management Systems (ECMS) - ‘IP Phone Home’ H. Copyright Circumvention Devices - Protecting Architecture
Keywords: cyberspace regulation, code, Lessig, Australia, anonymity, cookies, spam black holes, P3P, Robot exclusion, ECMS
Suggested Citation: Suggested Citation
Do you have negative results from your research you’d like to share?
Recommended Papers
-
Anti-Terrorism Laws and Data Retention: War is Over?
By Yaman Akdeniz and Clive Walker
-
The Regulation of Technology: Policy Tools and Policy Actors
By Charles D. Raab and Paul De Hert
-
Policing Diversity in the Digital Age: Maintaining Order in Virtual Communities
By David S. Wall and Matthew L. Williams