2019
DOI: 10.1002/poi3.200
|View full text |Cite
|
Sign up to set email alerts
|

Internet Architecture and Human Rights: Beyond the Human Rights Gap

Abstract: Internet architecture and infrastructure are generally not at the top of the concerns of end users, and the overlying logical arrangements of root services, domain names, and protocols remain largely invisible to its users. Recent developments, however—including massive user data leakages, hacks targeting social networking service providers, and behavioral micro‐targeting—have turned a spotlight on Internet governance defined broadly, and its relationship with civil liberties and human rights. The articles in … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 17 publications
(13 citation statements)
references
References 38 publications
0
12
0
1
Order By: Relevance
“…It is interesting that in spite of the fact that the development of user rights is very active now, opinions are expressed that the user has very few opportunities to protect his rights [15].…”
Section: Resultsmentioning
confidence: 99%
“…It is interesting that in spite of the fact that the development of user rights is very active now, opinions are expressed that the user has very few opportunities to protect his rights [15].…”
Section: Resultsmentioning
confidence: 99%
“…Social media companies have already been identified as a necessary recruit for combatting gender-based abuse (see Dragiewicz et al, 2018; Suzor et al, 2019), but operating system developers also have a privileged position in mediating social relationships, and so should also be added to this list of responsible agents. There is an established literature and momentum for “privacy by design” or “human rights by design” approaches that underline the connections between IT infrastructure and security outcomes for individuals or groups (see, for example, Langheinrich, 2001; Suzor et al, 2019; Zalnieriute & Milan, 2019); it is necessary that operating-system design in smartphones is similarly regarded as critical to the safety of victims of family violence.…”
Section: Discussion: Implications For Strategies Of Protection For VImentioning
confidence: 99%
“…Como es normal y cotidiano en los sistemas de administración occidentalizados, estos giran en torno al sistema privado o privatizado, donde los principales activos urbanos tales como la energía y las comunicaciones se encuentran regidas por consorcios privados, y algo similar es lo relacionado con la accesibilidad a los datos y sus limitaciones, tanto a escala como en volumen (Zhao, 2017); pero que en relación a los procesos de gestión documentaria en las agencias públicas se puede acceder bajo un enfoque determinado por parámetros de una gestión urbana integrada y coordinada en tiempo y espacio, tal como lo expusieron Ovando et al (2018). También cabe resaltar sobre este punto que en el contexto de la gobernanza digital se han implementado una serie de trasuntos relacionados al plano neoliberal (Nosthoff & Maschewski, 2019;Zalnieriute & Milan, 2019;Pérez & Foronda, 2018;a Schou & Hjelholt, 2018;Gil-García, Dawes & Pardo, 2017;Sixin, Yayuan, Jiang & Yue, 2017;Marland, Lewis & Flanagan, 2016). La neoliberalización de las políticas digitales se sustenta en el rol proactivo del Estado en la transformación de su política y políticas, principalmente a través del empleo de instrumentos de medición e indicadores (Giannone & Santaniello, 2018).…”
Section: Gobernanza Desde El Contexto Digitalunclassified