Flylib.com
Ruling the Root: Internet Governance and the Taming of Cyberspace
Ruling the Root: Internet Governance and the Taming of Cyberspace
ISBN: 0262134128
EAN: 2147483647
Year: 2006
Pages: 110
Authors:
Milton L. Mueller
BUY ON AMAZON
Table of Contents
BackCover
Ruling the Root-Internet Governance and the Taming of Cyberspace
Chapter 1: Introduction: The Problem of the Root
1.1 A Constitutional Moment
1.2 The Root
1.3 Governance
1.4 Institutionalization
1.5 Goals and Plan of the Book
Part I: The Root as Resource
Chapter 2: The Basic Political Economy of Identifiers
2.2 Defining the Space
2.3 Assigning Unique Values
2.4 Governance Arrangements
2.5 An Example: The Ethernet Address Space
2.6 Review of the Framework
Chapter 3: The Internet Name and Address Spaces
3.1 The Internet Address Space
3.1.1 Routers and IP Addresses
3.2 The Internet Name Space
3.3 The DNS Root
3.4 Conclusion
Chapter 4: The Root and Institutional Change: Analytical Framework
4.1 Formation of Property Rights
4.2 Property Rights
4.3 Technological Change, Endowment, and Appropriation
4.4 Institutionalization
4.5 Applying the Framework to Internet Governance
Part II: The Story of the Root
Chapter 5: Growing the Root
5.1 Prehistory
5.2 The Origin of the Root
5.3 Growth and Convergence
5.4 Growth and Governance
5.5 Who Controlled the Root?
Chapter 6: Appropriating the Root: Property Rights Conflicts
6.1 Endowment: Commercial Use and the World Wide Web
6.2 Conflicts over Second-Level Domains
6.2.1 Domain Name Disputes
6.3 Conflicts over Top-Level Domains
6.4 Conflicts over the Root
Chapter 7: The Root in Play
7.1 IAHC and the gTLD-MoU
7.2 Political Reaction to the gTLD-MoU
7.3 Challenges to Network Solutions
7.4 The U.S. Government Intervenes
7.5 The Green Paper and Its Aftermath
Chapter 8: Institutionalizing the Root: The Formation of ICANN
8.1 From Green Paper to White Paper
8.2 The International Forum on the White Paper
Chapter 9: The New Regime
9.1 Redistributing the Riches of .com: Registrar Accreditation
9.2 Branding the Name Space: WHOIS and UDRP
9.3 The Assimilation of Network Solutions
9.4 U.S. Government Policy Authority over the Root
9.5 Representation: Barriers to Entry
9.6 New Top-Level Domains
9.7 Country Codes and National Governments
Part III: Issues and Themes
Chapter 10: ICANN as Global Regulatory Regime
10.1 What ICANN Is Not
10.2 What ICANN Is
10.2.1 Rights to Names
10.3 Forces Affecting ICANN s Future
Chapter 11: Global Rights to Names
11.1 A Web Site by Any Other Name . . .
11.2 Expanding Trademark Rights
11.3 New Rights in Names: WIPO 2
11.4 Free Expression vs. Controlled Vocabulary
11.5 DNS vs. WIPO
Chapter 12: Property Rights and Institutional Change: Some Musings on Theory
12.2 Who Owns the Name Space?
Chapter 13: The Taming of the Net
Selected Acronyms
Notes
Chapter 2: The Basic Political Economy of Identifiers
Chapter 3: The Internet Name and Address Spaces
Chapter 4: The Root and Institutional Change: Analytical Framework
Chapter 5: Growing the Root
Chapter 6: Appropriating the Root: Property Rights Conflicts
Chapter 7: The Root in Play
Chapter 8: Institutionalizing the Root: The Formation of ICANN
Chapter 9: The New Regime
Chapter 10: ICANN as Global Regulatory Regime
Chapter 11: Global Rights to Names
Chapter 12: Property Rights and Institutional Change: Some Musings on Theory
References
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J-K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_R
Index_S
Index_T
Index_U
Index_V-Y
List of Figures
List of Tables
Ruling the Root: Internet Governance and the Taming of Cyberspace
ISBN: 0262134128
EAN: 2147483647
Year: 2006
Pages: 110
Authors:
Milton L. Mueller
BUY ON AMAZON
Inside Network Security Assessment: Guarding Your IT Infrastructure
Laws, Mandates, and Regulations
The Goals and Objectives of a Risk Assessment
Ranking Your Findings
Contents of a Good Report
IT Security Architecture and Framework
Metrics and Models in Software Quality Engineering (2nd Edition)
Relations Diagram
Cost Effectiveness of Phase Defect Removal
Conducting In-Process Quality Assessments
Measuring Process Capability
Software Process Improvement Sequences
Cisco IP Telephony (CIPT) (Authorized Self-Study) (2nd Edition)
Configuring Class of Service
SIP and Cisco CallManager
What Is Cryptography?
Summary
Snort Cookbook
Upgrading Snort on Linux
Logging to a File Quickly
Testing Rules
Excluding from Logging
Detecting Stateless Attacks and Stream Reassembly
C & Data Structures (Charles River Media Computer Engineering)
Introduction to the C Language
Preprocessing
Structures
Problems in Arrays, Searching, Sorting, Hashing
Problems in Linked Lists
Visual Studio Tools for Office(c) Using C# with Excel, Word, Outlook, and InfoPath
Part One. An Introduction to VSTO
Working with the Application Object
Working with the Window Object
Dynamic Controls
Advanced XML Features in Excel
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies