17.01.2015 Views

Download - Future of the Internet – And how to stop it.

Download - Future of the Internet – And how to stop it.

Download - Future of the Internet – And how to stop it.

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

The Lessons <strong>of</strong> Wikipedia 129<br />

alized codes <strong>of</strong> honor may be prone <strong>to</strong> higher levels <strong>of</strong> honesty in academic<br />

work—and benef<strong>it</strong> from a greater sense <strong>of</strong> camaraderie grounded in shared values.<br />

More generally, order may remain when people see <strong>the</strong>mselves as a part <strong>of</strong> a<br />

social system, a group <strong>of</strong> people—more than utter strangers but less than<br />

friends—w<strong>it</strong>h some overlap in outlook and goals. Whatever counts as a satisfying<br />

explanation, we see that sometimes <strong>the</strong> absence <strong>of</strong> law has not resulted in<br />

<strong>the</strong> absence <strong>of</strong> order. 9 Under <strong>the</strong> right circumstances, people will behave char<strong>it</strong>ably<br />

<strong>to</strong>ward one ano<strong>the</strong>r in <strong>the</strong> comparative absence or enforcement <strong>of</strong> rules<br />

that would o<strong>the</strong>rwise compel that char<strong>it</strong>y.<br />

In modern cyberspace, an absence <strong>of</strong> rules (or at least enforcement) has led<br />

both <strong>to</strong> a generative blossoming and <strong>to</strong> a new round <strong>of</strong> challenges at multiple<br />

layers. If <strong>the</strong> <strong>Internet</strong> and <strong>it</strong>s users experience a crisis <strong>of</strong> abuse—behaviors that<br />

artfully explo<strong>it</strong> <strong>the</strong> twin premises <strong>of</strong> trust and procrastination—<strong>it</strong> will be<br />

tempting <strong>to</strong> approach such challenges as ones <strong>of</strong> law and jurisdiction. This ruleand-sanction<br />

approach frames <strong>the</strong> project <strong>of</strong> cyberlaw by asking <strong>how</strong> public author<strong>it</strong>ies<br />

can find and restrain those <strong>it</strong> deems <strong>to</strong> be bad ac<strong>to</strong>rs online. Answers<br />

<strong>the</strong>n look <strong>to</strong> entry points w<strong>it</strong>hin networks and endpoints that can facil<strong>it</strong>ate<br />

control. As <strong>the</strong> previous chapter explained, those points will be te<strong>the</strong>red appliances<br />

and s<strong>of</strong>tware-as-service—functional, fashionable, but non-generative or<br />

only contingently generative. 10<br />

The “unsafe is safe” experiment highlights a different approach, one potentially<br />

as powerful as trad<strong>it</strong>ional rule and sanction, w<strong>it</strong>hout <strong>the</strong> sacrifice <strong>of</strong> generativ<strong>it</strong>y<br />

entailed by <strong>the</strong> usual means <strong>of</strong> regulation effected through points <strong>of</strong><br />

control, such as <strong>the</strong> appliancization described earlier in this book. When people<br />

can come <strong>to</strong> take <strong>the</strong> welfare <strong>of</strong> one ano<strong>the</strong>r seriously and possess <strong>the</strong> <strong>to</strong>ols<br />

<strong>to</strong> readily assist and lim<strong>it</strong> each o<strong>the</strong>r, even <strong>the</strong> most precise and well-enforced<br />

rule from a trad<strong>it</strong>ional public source may be less effective than that uncompelled<br />

goodwill. Such an approach reframes <strong>the</strong> project <strong>of</strong> cyberlaw <strong>to</strong> ask:<br />

What are <strong>the</strong> technical <strong>to</strong>ols and social structures that inspire people <strong>to</strong> act humanely<br />

online How might <strong>the</strong>y be available <strong>to</strong> help restrain <strong>the</strong> damage that<br />

malevolent outliers can wreak How can we arrive at credible judgments about<br />

what counts as humane and what counts as malevolent These questions may<br />

be particularly helpful <strong>to</strong> answer while cyberspace is still in <strong>it</strong>s social infancy, <strong>it</strong>s<br />

<strong>to</strong>ols for group cohesion immature, and <strong>the</strong> att<strong>it</strong>udes <strong>of</strong> many <strong>of</strong> <strong>it</strong>s users still in<br />

an early phase which treats <strong>Internet</strong> usage as ei<strong>the</strong>r a <strong>to</strong>ol <strong>to</strong> augment existing<br />

relationships or as a gateway <strong>to</strong> an undifferentiated library <strong>of</strong> information from<br />

indifferent sources. Such an a<strong>to</strong>mistic conception <strong>of</strong> cyberspace naturally pro-

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!