Download - Future of the Internet â And how to stop it.
Download - Future of the Internet â And how to stop it.
Download - Future of the Internet â And how to stop it.
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
The Lessons <strong>of</strong> Wikipedia 129<br />
alized codes <strong>of</strong> honor may be prone <strong>to</strong> higher levels <strong>of</strong> honesty in academic<br />
work—and benef<strong>it</strong> from a greater sense <strong>of</strong> camaraderie grounded in shared values.<br />
More generally, order may remain when people see <strong>the</strong>mselves as a part <strong>of</strong> a<br />
social system, a group <strong>of</strong> people—more than utter strangers but less than<br />
friends—w<strong>it</strong>h some overlap in outlook and goals. Whatever counts as a satisfying<br />
explanation, we see that sometimes <strong>the</strong> absence <strong>of</strong> law has not resulted in<br />
<strong>the</strong> absence <strong>of</strong> order. 9 Under <strong>the</strong> right circumstances, people will behave char<strong>it</strong>ably<br />
<strong>to</strong>ward one ano<strong>the</strong>r in <strong>the</strong> comparative absence or enforcement <strong>of</strong> rules<br />
that would o<strong>the</strong>rwise compel that char<strong>it</strong>y.<br />
In modern cyberspace, an absence <strong>of</strong> rules (or at least enforcement) has led<br />
both <strong>to</strong> a generative blossoming and <strong>to</strong> a new round <strong>of</strong> challenges at multiple<br />
layers. If <strong>the</strong> <strong>Internet</strong> and <strong>it</strong>s users experience a crisis <strong>of</strong> abuse—behaviors that<br />
artfully explo<strong>it</strong> <strong>the</strong> twin premises <strong>of</strong> trust and procrastination—<strong>it</strong> will be<br />
tempting <strong>to</strong> approach such challenges as ones <strong>of</strong> law and jurisdiction. This ruleand-sanction<br />
approach frames <strong>the</strong> project <strong>of</strong> cyberlaw by asking <strong>how</strong> public author<strong>it</strong>ies<br />
can find and restrain those <strong>it</strong> deems <strong>to</strong> be bad ac<strong>to</strong>rs online. Answers<br />
<strong>the</strong>n look <strong>to</strong> entry points w<strong>it</strong>hin networks and endpoints that can facil<strong>it</strong>ate<br />
control. As <strong>the</strong> previous chapter explained, those points will be te<strong>the</strong>red appliances<br />
and s<strong>of</strong>tware-as-service—functional, fashionable, but non-generative or<br />
only contingently generative. 10<br />
The “unsafe is safe” experiment highlights a different approach, one potentially<br />
as powerful as trad<strong>it</strong>ional rule and sanction, w<strong>it</strong>hout <strong>the</strong> sacrifice <strong>of</strong> generativ<strong>it</strong>y<br />
entailed by <strong>the</strong> usual means <strong>of</strong> regulation effected through points <strong>of</strong><br />
control, such as <strong>the</strong> appliancization described earlier in this book. When people<br />
can come <strong>to</strong> take <strong>the</strong> welfare <strong>of</strong> one ano<strong>the</strong>r seriously and possess <strong>the</strong> <strong>to</strong>ols<br />
<strong>to</strong> readily assist and lim<strong>it</strong> each o<strong>the</strong>r, even <strong>the</strong> most precise and well-enforced<br />
rule from a trad<strong>it</strong>ional public source may be less effective than that uncompelled<br />
goodwill. Such an approach reframes <strong>the</strong> project <strong>of</strong> cyberlaw <strong>to</strong> ask:<br />
What are <strong>the</strong> technical <strong>to</strong>ols and social structures that inspire people <strong>to</strong> act humanely<br />
online How might <strong>the</strong>y be available <strong>to</strong> help restrain <strong>the</strong> damage that<br />
malevolent outliers can wreak How can we arrive at credible judgments about<br />
what counts as humane and what counts as malevolent These questions may<br />
be particularly helpful <strong>to</strong> answer while cyberspace is still in <strong>it</strong>s social infancy, <strong>it</strong>s<br />
<strong>to</strong>ols for group cohesion immature, and <strong>the</strong> att<strong>it</strong>udes <strong>of</strong> many <strong>of</strong> <strong>it</strong>s users still in<br />
an early phase which treats <strong>Internet</strong> usage as ei<strong>the</strong>r a <strong>to</strong>ol <strong>to</strong> augment existing<br />
relationships or as a gateway <strong>to</strong> an undifferentiated library <strong>of</strong> information from<br />
indifferent sources. Such an a<strong>to</strong>mistic conception <strong>of</strong> cyberspace naturally pro-