Flylib.com
Ruling the Root: Internet Governance and the Taming of Cyberspace
Ruling the Root: Internet Governance and the Taming of Cyberspace
ISBN: 0262134128
EAN: 2147483647
Year: 2006
Pages: 110
Authors:
Milton L. Mueller
BUY ON AMAZON
Table of Contents
BackCover
Ruling the Root-Internet Governance and the Taming of Cyberspace
Chapter 1: Introduction: The Problem of the Root
1.1 A Constitutional Moment
1.2 The Root
1.3 Governance
1.4 Institutionalization
1.5 Goals and Plan of the Book
Part I: The Root as Resource
Chapter 2: The Basic Political Economy of Identifiers
2.2 Defining the Space
2.3 Assigning Unique Values
2.4 Governance Arrangements
2.5 An Example: The Ethernet Address Space
2.6 Review of the Framework
Chapter 3: The Internet Name and Address Spaces
3.1 The Internet Address Space
3.1.1 Routers and IP Addresses
3.2 The Internet Name Space
3.3 The DNS Root
3.4 Conclusion
Chapter 4: The Root and Institutional Change: Analytical Framework
4.1 Formation of Property Rights
4.2 Property Rights
4.3 Technological Change, Endowment, and Appropriation
4.4 Institutionalization
4.5 Applying the Framework to Internet Governance
Part II: The Story of the Root
Chapter 5: Growing the Root
5.1 Prehistory
5.2 The Origin of the Root
5.3 Growth and Convergence
5.4 Growth and Governance
5.5 Who Controlled the Root?
Chapter 6: Appropriating the Root: Property Rights Conflicts
6.1 Endowment: Commercial Use and the World Wide Web
6.2 Conflicts over Second-Level Domains
6.2.1 Domain Name Disputes
6.3 Conflicts over Top-Level Domains
6.4 Conflicts over the Root
Chapter 7: The Root in Play
7.1 IAHC and the gTLD-MoU
7.2 Political Reaction to the gTLD-MoU
7.3 Challenges to Network Solutions
7.4 The U.S. Government Intervenes
7.5 The Green Paper and Its Aftermath
Chapter 8: Institutionalizing the Root: The Formation of ICANN
8.1 From Green Paper to White Paper
8.2 The International Forum on the White Paper
Chapter 9: The New Regime
9.1 Redistributing the Riches of .com: Registrar Accreditation
9.2 Branding the Name Space: WHOIS and UDRP
9.3 The Assimilation of Network Solutions
9.4 U.S. Government Policy Authority over the Root
9.5 Representation: Barriers to Entry
9.6 New Top-Level Domains
9.7 Country Codes and National Governments
Part III: Issues and Themes
Chapter 10: ICANN as Global Regulatory Regime
10.1 What ICANN Is Not
10.2 What ICANN Is
10.2.1 Rights to Names
10.3 Forces Affecting ICANN s Future
Chapter 11: Global Rights to Names
11.1 A Web Site by Any Other Name . . .
11.2 Expanding Trademark Rights
11.3 New Rights in Names: WIPO 2
11.4 Free Expression vs. Controlled Vocabulary
11.5 DNS vs. WIPO
Chapter 12: Property Rights and Institutional Change: Some Musings on Theory
12.2 Who Owns the Name Space?
Chapter 13: The Taming of the Net
Selected Acronyms
Notes
Chapter 2: The Basic Political Economy of Identifiers
Chapter 3: The Internet Name and Address Spaces
Chapter 4: The Root and Institutional Change: Analytical Framework
Chapter 5: Growing the Root
Chapter 6: Appropriating the Root: Property Rights Conflicts
Chapter 7: The Root in Play
Chapter 8: Institutionalizing the Root: The Formation of ICANN
Chapter 9: The New Regime
Chapter 10: ICANN as Global Regulatory Regime
Chapter 11: Global Rights to Names
Chapter 12: Property Rights and Institutional Change: Some Musings on Theory
References
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J-K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_R
Index_S
Index_T
Index_U
Index_V-Y
List of Figures
List of Tables
Ruling the Root: Internet Governance and the Taming of Cyberspace
ISBN: 0262134128
EAN: 2147483647
Year: 2006
Pages: 110
Authors:
Milton L. Mueller
BUY ON AMAZON
Metrics and Models in Software Quality Engineering (2nd Edition)
Be Careful with Correlation
Ishikawas Seven Basic Tools
Exponential Distribution and Reliability Growth Models
Criteria for Model Evaluation
In-Process Metrics for Software Testing
The Complete Cisco VPN Configuration Guide
Overview of VPNs
Cisco VPN Client Interface
Summary
ISAKMP/IKE Phase 2 Data Connections
ISAKMP/IKE Phase 1 Connections
C & Data Structures (Charles River Media Computer Engineering)
C Operators
Arrays
Storage of Variables
Linked Lists
Problems in Linked Lists
Cisco Voice Gateways and Gatekeepers
Case Study: Configuring SIP Between a Gateway and CallManager 5.x
Troubleshooting Digit Manipulation
Hunt Groups
Configuring SRST
Sample Applications
101 Microsoft Visual Basic .NET Applications
Building Windows Forms User Interfaces
Interacting with the Operating System
GDI+
Securing Applications
Coding Conventions
Quartz Job Scheduling Framework: Building Open Source Enterprise Applications
Configuring Datasources for JobStoreCMT
Using Quartz with J2EE
Configuring Quartz to Use Clustering
What Is Workflow?
Configuring the JobStoreTX JobStore
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies