Published on October 7, 2007
Introduction to Policy IMT550 – Executive MSIM : Introduction to Policy IMT550 – Executive MSIM Dr. Karine Barzilai-Nahon [email protected] Authority: Authority The ability to control legitimately State Authority – the ability of the state to control legitimately by having a monopole on the means of violence and obtain obedience. For example – by regulating Argumentation for Authority: Argumentation for Authority Traditional Argument Charismatic Argument Rational-Legal Argument Stable functioning - Requires legitimate obedience Regulation: Regulation Regulation is a mechanism to create: Management and revision (+ stability) Control Information Regulation: Information Regulation State Regulation of Information: State Regulation of Information Directing behavior through procedure of legislation Examples In Pennsylvania – 2002 – a statute that puts content providers in danger to be convicted if they don’t block access to child pornography sites Homeland security act Intra-state regulation of Information: Intra-state regulation of Information Treaties and international agreements that aim to direct behavior while looking beyond the territorial boundary Creating technological standards by intra-governmental bodies Examples The Treaty for Cybercrime - status WSIS Self-Regulation of Information: Self-Regulation of Information Directing behavior through procedure of delegation of responsibilities to private or semi-private bodies. Example RBLs (Realtime Blackhole Lists) Public and Private regulation of Information: Public and Private regulation of Information Public regulation – regulation on a sector while having a governmental involvement. Directing arrangements that are designed by professionals and representatives of public organizations, and are enforced because of their authority in their professional communities while having a governmental direction. (e.g. - CIPA - Children Internet Protection Act) Private regulation - directing through procedures and internal policies or self-regulation by individuals or arrangements that are designed by private entities and are enforced due to their authority in their local communities.(e.g - P3P) Regulation of Information: Regulation of Information Libertarian stream Prevent a state regulation Technology create norms Variation - self-regulation mechanisms can provide the proper protection Self-Regulation of Information: Self-Regulation of Information The claim now was that government could not regulate cyberspace, that cyberspace was essentially and unavoidably, free. Governments could threaten, but behavior could not be controlled; laws could be passed, but they would be meaningless” Lessig Lawrence (1999), Code and other laws of cyberspace More regulation models: More regulation models Dystopian View that emphasize full regulation “Net Federalism” Approach Lessig approach of Code and the four constraints Barzilai-Nahon gatekeeping approach Gatekeepers in a Networked Environment: Gatekeepers in a Networked Environment Gatekeeping – Process of controlling information as it moves through a gate. Activities include selection, addition, withholding, display, channeling, shaping, manipulation, repetition, timing, localization, integration, disregard and deletion of information. Gatekeeping Mechanism – Tool or technology used to carry out the process of gatekeeping.