The end of the net as we know it? Deep packet inspection and internet governance

Advances in network equipment now allow internet service providers to monitor the content of data packets in real-time and make decisions about how to handle them. If deployed widely this technology, known as deep packet inspection (DPI), has the potential to alter basic assumptions that have underpinned internet governance to date. The article explores the way internet governance is responding to deep packet inspection and the political struggles around it. Avoiding the extremes of technological determinism and social constructivism, it integrates theoretical approaches from the sociology of technology and actor-centered institutionalism into a new framework for technology-aware policy analysis.

[1]  Jonathan S. Turner,et al.  Advanced algorithms for fast and scalable deep packet inspection , 2006, 2006 Symposium on Architecture For Networking And Communications Systems.

[2]  Tarleton Gillespie Wired Shut, Copyright and the Shape of Digital Culture , 2009 .

[3]  Erwin Danneels Disruptive Technology Reconsidered: A Critique and Research Agenda , 2004 .

[4]  Clayton M. Christensen The Innovator's Dilemma: When New Technologies Cause Great Firms to Fail , 2013 .

[5]  Grant A. Jacoby,et al.  Blocking Skype through Deep Packet Inspection , 2009 .

[6]  F. Scharpf Games Real Actors Play: Actor-centered Institutionalism In Policy Research , 1997 .

[7]  Ryan Singel Whistle-Blower Outs NSA Spy Room , 2007 .

[8]  Renate Mayntz,et al.  Die Entwicklung technischer Infrastruktursysteme zwischen Steuerung und Selbstorganisation , 1995 .

[9]  Volker Schneider Staat und technische Kommunikation: Die politische Entwicklung der Telekommunikation in den USA, Japan, Großbritannien, Deutschland, Frankreich und Italien , 1999 .

[10]  Mathias Klang Disruptive Technology: Effects of Technology Regulation on Democracy , 2006 .

[11]  Tim Wu,et al.  Network Neutrality, Broadband Discrimination , 2003, J. Telecommun. High Technol. Law.

[12]  H. Jonathan Chao,et al.  Design and analysis of a multipacket signature detection system , 2007, Int. J. Secur. Networks.

[13]  Philip A.E. Brey,et al.  Artifacts as Social Agents , 2005 .

[14]  Lawrence Lessig,et al.  The future of ideas - the fate of the commons in a connected world , 2002 .

[15]  Ioannis Sourdis Designs and algorithms for packet and content inspection , 2007 .

[16]  Christoph Knill,et al.  Private Actors and the State: Internationalization and Changing Patterns of Governance , 2002 .

[17]  Ronald J. Deibert,et al.  Access Controlled - The Shaping of Power, Rights, and Rule in Cyberspace , 2010, Access Controlled.

[18]  Renate Mayntz,et al.  Akteurzentrierter Institutionalismus in der Technikforschung: Fragestellungen und Erklärungsansätze , 1995 .

[19]  Jerome H. Saltzer,et al.  End-to-end arguments in system design , 1984, TOCS.

[20]  Jon M. Peha,et al.  Dimensions of P2P and digital piracy in a university campus , 2008 .

[21]  John W. Lockwood,et al.  Deep packet inspection using parallel bloom filters , 2004, IEEE Micro.

[22]  Peter Weingart Großtechnische Systeme Ein Paradigma der Verknüpfung von Technikentwicklung und sozialem Wandel , 1994 .

[23]  Ben Wagner Modifying the Data Stream: Deep Packet Inspection and Internet Censorship , 2008 .

[24]  Christopher Rhoads,et al.  Iran's Web Spying Aided By Western Technology , 2009 .

[25]  Lawrence Lessig,et al.  Code and Other Laws of Cyberspace , 1999 .