An Endnote on Regulating Cyberspace: Architecture vs Law Author: Graham Greenleaf. Presented by: Oliver Bannatyne, 28 th May 2002.

Slides:



Advertisements
Similar presentations
Relevance of Copyright & Related Rights for SMEs Copyright industries SMEs as user and/or owner/creator Basics and role of copyright Digital age.
Advertisements

Acceptable Use of Computer and Network Resources Jim Conroy Acting Director, Academic Computing Services September 9, 2013.
IGE105 – Communication Technology in a Changing World Dr. Ken Cosh Week 10.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
Ensuring Computer & Data Security. Information Where there is an interactive task within the programme it cannot be completed on- screen. It is suggested.
Strand 1 Social and ethical significance. Reliability and Integrity Reliability ◦Refers the operation of hardware, the design of software, the accuracy.
Computers and Law - Srishti Mehra – Team 2. What is Computer Law? Cross over of a number of legal areas affecting: Design and use of computers and software.
Chapter 17 Controls and Security Measures
Copyright Infringement Carnegie Group Project.
Fair Use Guidelines Mary Galloway Texas Middle School Texarkana Independent School District Prepared by Christy Tidwell.
EDUC 260: Week 13 Hand-in your Position Paper. Overview Administrivia Ethics of computing in classrooms What did we learn in the course? Course evaluations.
Department of Computer Science City College of New York City College of New York Spring 2006 Copyright © 2006 by Abbe Mowshowitz CSc 375 SOCIAL ISSUES.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Unit 28- Website Development Assignment 1- THEORY P3
Wonga example Register Question- What risks do you think businesses face due to IT developments?
1. 2 Technology in Action Technology in Focus: Information Technology Ethics Information Technology Ethics Copyright © 2012 Pearson Education, Inc. Publishing.
 area of law that deals with protecting the rights of those who create original works  Also called as confidential information.  It is called “intellectual”
Final Exam Part 1. Internet Regulation Internet regulation according to internet society states that it is about restricting or controlling certain pieces.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
Identity A legal perspective FIDIS WP2 workshop 2/3 december 2003
This work is licensed under a Creative Commons Attribution-NonCommercial- ShareAlike 3.0 Unported License.Creative Commons Attribution-NonCommercial- ShareAlike.
Introduction to Computer Science
Defining Computer Security cybertechnology security can be thought of in terms of various counter measures: (i) unauthorized access to systems (ii) alteration.
Computer Ethics.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
CHAPTER 9 Using the World Wide Web. OBJECTIVES 1.Describe the Internet and the World Wide Web 2.Define related Internet terms 3.Explain the components.
Information Warfare Playgrounds to Battlegrounds.
Lessig – Code and the Future of Ideas. Code – Intellectual Property Optimal is mix between public and private spaces Many agents can use cyberspace -
Steve Wicker Cornell University 1 TRUST Autumn 2011 Conference.
Digital Citizenship Created By: Kelli Stinson June 2011.
Copyright © Allyn & Bacon 2008 POWER PRACTICE Chapter 11 Issues in Implementing Technology in Schools START This multimedia product and its contents are.
By: Brenna Langham. Netiquette: Some Basic Rules Be careful of the words chosen when writing a statement for others to read! The other person might misinterpret.
Page 1 Battling Botnets: Implications for a Cybercrime Strategy July 8, 2010.
Unit 1 – Improving Productivity. 1.1Why did you use a computer? What other systems / resources could you have used? In my PowerPoint I used a computer.
John Carpenter & lecture & Information Security 2008 Lecture 1: Subject Introduction and Security Fundamentals.
8/2: Managing IT: Security & Ethics Security: Controls –Information Systems controls Input, processing (hardware, software), output, storage –Facility.
Jeopardy: Digital Citizenship Please use presentation mode!
Lecture 6 Title: Web Planning, Designing, Developing for E-Marketing By: Mr Hashem Alaidaros MKT 445.
Law Online: An Introduction Richard Warner Chicago-Kent College of Law
Unit Word Processing Exploring Ethics  Why copyrights are necessary  How to use technology ethically and legally  How to cite online sources You Will.
Information Warfare Playgrounds to Battlegrounds.
Code & Other Laws of Cyberspace Reviewed by Thuy Nguyen November 17 th 2005 By Lawrence Lessig.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Clearing Permissions for my manuscript What do I need to know and what do I do? Emily Hall Rights Manager
Human Rights Act, Privacy in the context of auditing Phil Huggins Chief Technologist, IRM PLC
Cyber Law And Ethics And Ethics.
Ethics Self Imposed Right and Wrong Behavior Described as:
Smart PWNs: An Ethical Analysis of Smart Phone Technology Colin O'Hanlon Josh Schwartz Norman Littlejohn.
9.1 Audience Appreciation
Electronic Business: Concept and Applications Department of Electrical Engineering Gadjah Mada University.
Copyright©2004 South-Western 11 Public Goods and Common Resource.
Privacy. Some Web Science Issues Kieron O’Hara 29 November 2011.
Computer Technology Internet, ethics, and . EthicsInternetMisc.Internet
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Ethical dilemmas arising from information management strategies used by organisations Ethics & Information Systems.
Plagiarism, Fair Use and Copyright Laws
Judicial Training on Data Protection and Privacy Rights
Information Security, Theory and Practice.
Ethical, Social, and Political Issues in E-commerce
Michael Spiegel, Esq Timothy Shimeall, Ph.D.
Session 11: Fair and Acceptable Use and Copyright
ETHICAL & SOCIAL IMPACT OF INFORMATION SYSTEMS
Learning Area 1 Information And Communication Technology and Society
The Legal Framework of the Digital Surveillance Economy Roger Clarke & Angela Daly APSN – Uni Hong Kong – 27 September 2017 Xamax Consultancy,
Internet law Business law.
– Communication Technology in a Changing World
STRUCTURE OF THE CHAPTER
Presentation transcript:

An Endnote on Regulating Cyberspace: Architecture vs Law Author: Graham Greenleaf. Presented by: Oliver Bannatyne, 28 th May 2002

The Context Of The Article. The author is a legal academic writing for lawyers, policymakers, and technologists. The article is a critique of Larry Lessig’s techno-legal philosophy of “Code as Law”. “Code As Law” is a theory of Internet Governance that tries to answer the questions:

The Issues of Internet Governance 1.) Why should Cyberspace be regulated? 2.) By Whom should Cyberspace be regulated? 3.) How should Cyberspace be regulated? This presentation will mainly focus on the third issue, starting with a brief discussion of first issue.

Why Regulate Cyberspace The why issue becomes: Is there a sufficient difference between cyberspace and “realspace” so that the former should be regulated differently to the latter. If the answer is yes, should cyberspace be a A realm of freedom (lightly regulated), or A realm of surveillance (heavily regulated).

Why Regulate Cyberspace? Realm Of Freedom Users are anonymous. Information should be free. The Net is decentralised, and beyond control. The Net is international. Cyberspace is different to ‘realspace’. Realm Of Surveillance Realm Of Surveillance The net pervades modern life. The privacy of users is being abused. The real/digital persona needs protection. To ensure identity of users and data.

Code/Architecture As Law: Regulating Through Architecture Figure 1 - Regulation as a function of four types of constraints (Adapted from G Greenleaf, L Lessig[33])

The Four Constraints On Human Activity 1. Norms, Morality and Self Regulation. 2. Markets. 3. Code/Architecture. 4. Law.

Law as a Direct And Indirect Behavioural Constraint. Law Means – Directly Regulating individual behavior through social compliance/punishment. “Person X must not activity Y, failure to do activity Y causes punishment Z.” 2. Indirectly regulating norms, markets, and the code/architechture.

Non-legal Behavioral Constraints cyberspace Norms, Morality and Self Regulation. Means - These regulate by the the fear of social embarrassment. Example Activity - An containing racist/sexist jokes. Regulator - Monitoring. Greenleaf says: Markets are an ineffective regulator because embarassment lessened by geograhic distance and unlikelihood of getting caught.

Non-legal Behavioral Constraints Cyberspace. Markets Means – Markets are a form of economic regulation. Example Activity – choosing a product. Regulator – “Network Effects” – A product (e.g. ICQ) becomes more valuable to consumers the more users it has using it. Greenleaf says: Markets are another powerful regulator in cyberspace.

Code/Architecture As Law: Regulating Through Architecture Figure 2 - Regulation as a function of four types of constraints (Adapted from G Greenleaf, L Lessig)

Non-legal Behavioral Constraints Cyberspace. Architecture In realspace, Architecture is the physical constraints of nature, which are normally taken for granted since they are non- malleable as a constraint. However, in cyberspace the architecture is different.

The Five Features of Architecture is More 1. Architecture is More than Software -. It includes software, hardware, standards, & human biology (biometrics). Immediacy 2. Architecture has Immediacy as a Constraint -. Changes to the architecture can have direct immediate effect. (i.e. Changing an access control system block users access instantaneously.) High Plasticity Most Architecture has High Plasticity -. The architecture is easily altered.

The Five Features of Architecture 4. The legitimacy of architecture depends on who controls it If architecture/code is law then have the code-writers become the new sovereign? (e.g. like a state, king, or ruler.) Are they are legitimate sovereign? In whose interests are they working? regulation by default 5. Default settings give regulation by default.

An Example To Illustrate – The Robot Exclusion Standard. Internet search engines use robots (webcrawlers) to catalogue websites. These robots have the potential to break copyright and breach privacy. i.e. robots could be unlawful. website owners have “a right not to be indexed”.

An Example To Illustrate – The Robot Exclusion Standard. Copyright law could prevent any site being indexed. (direct regulation.) The Robot Exclusion Protocol (1994) was created to allow website owners to control robot access to the website (indirect regulation through Architecture). The HTML Tag prevents a website from being indexed and explored.

Conclusion & Question? The function of many Computer Security mechanisms is to control behavior by controlling an individual’s permissions and access. As computer security professionals you will often have to make decision about what is and isn’t appropriate in the security architecture. As your decisions will impact upon the rights and freedoms of individuals. Are you ready for this responsibility? How much guidance do you think the lawmakers should give?