{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T00:33:19Z","timestamp":1761006799524,"version":"build-2065373602"},"reference-count":86,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2010,11,18]],"date-time":"2010-11-18T00:00:00Z","timestamp":1290038400000},"content-version":"vor","delay-in-days":686,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc of Assoc for Info"],"published-print":{"date-parts":[[2009,1]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The Internet has come to fill centrally important economic, social, political, and cultural functions during a period in which policy\u2010making, too, has been undergoing significant change. The Internet \u201cRequests for Comments\u201d (RFC) process is both the venue technical decision\u2010making and for the development of Internet governance procedures and institutions. Because this process casts decisions in technical terms, it has largely been without policy scrutiny. This paper offers a preliminary analysis of the RFC discourse for ways in its decision\u2010making contributes to, operationalizes, influences, or conflicts with the laws of geopolitically recognized governments, and for ways in which the discourse itself serves as the means through which the more formal institutions and practices of Internet governance developed. The paper opens with a discussion of the gap between the technical and legal Internet discourse communities. Policy functions filled by Internet RFCs include explicit policy\u2010making, explicit policy analysis, and implicit policy analysis (insights into policy issues that are not expressly discussed but that can be elicited from the texts through policy analysis). As a discourse matrix, the RFCs have several features that enable the conversation to fill additional policy\u2010related functions that include defining the policy subject (the Internet), establishment of Internet design processes, policy implementation programs, conflict and conflict resolution, informal problem resolution, and political analysis.<\/jats:p>","DOI":"10.1002\/meet.2009.1450460254","type":"journal-article","created":{"date-parts":[[2010,1,29]],"date-time":"2010-01-29T15:32:58Z","timestamp":1264779178000},"page":"1-29","source":"Crossref","is-referenced-by-count":2,"title":["Internet RFCs as social policy: Network design from a regulatory perspective"],"prefix":"10.1002","volume":"46","author":[{"given":"Sandra","family":"Braman","sequence":"first","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2010,11,18]]},"reference":[{"key":"e_1_2_6_2_1","unstructured":"Note: A list of the RFC documents cited follows this list of scholarly references."},{"volume-title":"Inventing the Internet.","year":"1999","author":"Abbate J.","key":"e_1_2_6_3_1"},{"key":"e_1_2_6_4_1","doi-asserted-by":"publisher","DOI":"10.2307\/3481318"},{"volume-title":"Best truth: Intelligence in the information age","year":"2000","author":"Berkowitz B. D.","key":"e_1_2_6_5_1"},{"volume-title":"Beyond our control? Confronting the limits of our legal system in the age of cyberspace","year":"2001","author":"Biegel S.","key":"e_1_2_6_6_1"},{"volume-title":"Of bicycles, bakelites, and bulbs: Toward a theory of sociotechnical change","year":"1995","author":"Bijker W. E.","key":"e_1_2_6_7_1"},{"volume-title":"Shaping technology\/Building society: Studies in sociotechnical change","year":"1992","author":"Bijker W.","key":"e_1_2_6_8_1"},{"volume-title":"Science on the run: Information management and industrial geophysics at Schlumberger, 1920\u20101940.","year":"1994","author":"Bowker G. C.","key":"e_1_2_6_9_1"},{"volume-title":"From telecommunications to electronic services: A global spectrum of definitions, boundary lines, and structures","year":"1986","author":"Bruce R. R.","key":"e_1_2_6_10_1"},{"key":"e_1_2_6_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/0160-791X(88)90034-6"},{"key":"e_1_2_6_12_1","first-page":"537","article-title":"Legal and technical standards in digital rights management technology","volume":"74","author":"Burk D. L.","year":"2005","journal-title":"Fordham Law Review"},{"key":"e_1_2_6_13_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0020818300035244"},{"key":"e_1_2_6_14_1","unstructured":"Davidson A. Morris J. &Courtney R.(2002).Strangers in a strange land: Public interest advocacy and Internet standards. Presented to the Telecommunications Policy Research Conference Arlington VA September."},{"volume-title":"Factual fictions","year":"1983","author":"Davis L. J.","key":"e_1_2_6_15_1"},{"volume-title":"War in the age of intelligent machines","year":"1991","author":"De Landa M.","key":"e_1_2_6_16_1"},{"key":"e_1_2_6_17_1","doi-asserted-by":"crossref","DOI":"10.7591\/9781501723681","volume-title":"Military organizations, complex machines: Modernization in the US armed services","author":"Demchak C. C.","year":"1991"},{"key":"e_1_2_6_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-4328-9_11"},{"volume-title":"Darwin among the machines: The evolution of global intelligence","year":"1997","author":"Dyson G.","key":"e_1_2_6_19_1"},{"key":"e_1_2_6_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/11552055_39"},{"volume-title":"New communication technologies and the public interest: Comparative perspectives on policy and research","year":"1986","author":"Ferguson M.","key":"e_1_2_6_21_1"},{"issue":"9","key":"e_1_2_6_22_1","article-title":"User design and the democratization of the mobile phone","volume":"11","author":"Fortunati L.","year":"2006","journal-title":"First Monday"},{"volume-title":"Human values and the design of computer technology","year":"2004","author":"Friedman B.","key":"e_1_2_6_23_1"},{"key":"e_1_2_6_24_1","doi-asserted-by":"publisher","DOI":"10.2307\/1373113"},{"key":"e_1_2_6_25_1","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/5658.001.0001"},{"volume-title":"The constitution of society: Outline of the theory of structuration","year":"1984","author":"Giddens A.","key":"e_1_2_6_26_1"},{"key":"e_1_2_6_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0308-5961(00)00005-7"},{"key":"e_1_2_6_28_1","first-page":"5","volume-title":"Using history to teach computer science and related disciplines","author":"Haigh T.","year":"2004"},{"key":"e_1_2_6_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11077-005-1763-1"},{"key":"e_1_2_6_30_1","doi-asserted-by":"publisher","DOI":"10.1177\/016224399602100402"},{"volume-title":"The irony of regulatory reform","year":"1989","author":"Horwitz R.","key":"e_1_2_6_31_1"},{"volume-title":"The development of a national information infrastructure","year":"1994","author":"Kahin B.","key":"e_1_2_6_32_1"},{"volume-title":"Public access to the Internet","year":"1997","author":"Kahin B.","key":"e_1_2_6_33_1"},{"volume-title":"Computer and Internet use among people with disabilities","year":"2000","author":"Kaye H. S.","key":"e_1_2_6_34_1"},{"key":"e_1_2_6_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/356802.356806"},{"volume-title":"Computerization and controversy: Value conflicts and social choices","year":"1996","author":"Kling R.","key":"e_1_2_6_36_1"},{"issue":"4","key":"e_1_2_6_37_1","doi-asserted-by":"crossref","DOI":"10.22230\/cjc.2005v30n4a1636","article-title":"Networks and layers: Technocultural encodings of the World Wide Web","volume":"30","author":"Langlois G. M.","year":"2005","journal-title":"Canadian Journal of Communication"},{"key":"e_1_2_6_38_1","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780199256044.001.0001"},{"issue":"3","key":"e_1_2_6_39_1","first-page":"12","article-title":"Austrian telecom policy: Current issues","volume":"12","author":"Latzer M.","year":"1989","journal-title":"Transnational Data Report"},{"volume-title":"Actor network theory and after","year":"1999","author":"Law J.","key":"e_1_2_6_40_1"},{"key":"e_1_2_6_41_1","doi-asserted-by":"publisher","DOI":"10.2307\/3102759"},{"volume-title":"Code and other laws of cyberspace","year":"1999","author":"Lessig L.","key":"e_1_2_6_42_1"},{"volume-title":"The Bell system and regional business: The telephone in the South, 1877\u20101920","year":"1989","author":"Lipartito K.","key":"e_1_2_6_43_1"},{"volume-title":"Big book of lightweight directory access protocol (LDAP) RFCs","year":"2000","author":"Loshin P.","key":"e_1_2_6_44_1"},{"volume-title":"The new telecommunications: A political economy of network evolution","year":"1993","author":"Mansell R.","key":"e_1_2_6_45_1"},{"key":"e_1_2_6_46_1","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780198289418.001.0001","volume-title":"Communication by design: The politics of information and communication technologies","author":"Mansell R.","year":"1996"},{"volume-title":"Organizations","year":"1963","author":"March J. G.","key":"e_1_2_6_47_1"},{"key":"e_1_2_6_48_1","unstructured":"Morris J.&Davidson A.(2003).Policy impact assessments: Considering the public interest in Internet standards development. Presented to the Telecommunications Policy Research Conference Alexandria VA September."},{"volume-title":"Ruling the root: Internet governance and the taming of cyberspace","year":"2002","author":"Mueller M. L.","key":"e_1_2_6_49_1"},{"key":"e_1_2_6_50_1","unstructured":"Mueller M. L.&Chango M.(2007).The DNS as a tool for global identity policy: WHOIS ICANN and global internet governance. Presented to the Telecommunications Policy Research Conference Arlington VA September."},{"key":"e_1_2_6_51_1","doi-asserted-by":"publisher","DOI":"10.2307\/3101118"},{"key":"e_1_2_6_52_1","doi-asserted-by":"publisher","DOI":"10.1016\/0308-5961(94)90002-7"},{"volume-title":"The computerization of society","year":"1980","author":"Nora S.","key":"e_1_2_6_53_1"},{"key":"e_1_2_6_54_1","doi-asserted-by":"publisher","DOI":"10.2307\/3250927"},{"key":"e_1_2_6_55_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30233-9_1"},{"key":"e_1_2_6_56_1","series-title":"Erasmus Research Institute of Management Report Series ERS\u20102002\u201078\u2010LIS","volume-title":"A business evaluation of the next generation Ipv6 protocol in fixed and mobile communication services: An analytical study and calculation","author":"Pau L.\u2010F.","year":"2002"},{"volume-title":"Diplomacy, war and technology since 1870","year":"1984","author":"Pearton M.","key":"e_1_2_6_57_1"},{"key":"e_1_2_6_58_1","unstructured":"Pircher W.(1987).Tours through the back\u2010country of imperfectly informed society. In Slack & Fejes pp.63\u201377."},{"key":"e_1_2_6_59_1","doi-asserted-by":"crossref","DOI":"10.4159\/9780674042216","volume-title":"Technologies of freedom","author":"Pool I. de S.","year":"1983"},{"key":"e_1_2_6_60_1","first-page":"159","volume-title":"Global telecommunications networks: Strategic considerations","author":"Qvortrup L.","year":"1988"},{"key":"e_1_2_6_61_1","doi-asserted-by":"crossref","unstructured":"Ramachandran A. Feamster N. &Vempala S.(2007).Filtering spam with behavioral blacklisting. Presented to the 14th ACM Conference on Computer and Communications Security Alexandria pp.342\u2013351.","DOI":"10.1145\/1315245.1315288"},{"key":"e_1_2_6_62_1","first-page":"553","article-title":"Lex informatica: The formulation of information policy through technology","volume":"76","author":"Reidenberg J. R.","year":"1998","journal-title":"Texas Law Review"},{"key":"e_1_2_6_63_1","doi-asserted-by":"publisher","DOI":"10.2307\/2649970"},{"issue":"1","key":"e_1_2_6_64_1","first-page":"19","article-title":"The Integrated Services Digital Network: Issues and options for the future","volume":"24","author":"Rutkowski A.","year":"1983","journal-title":"Jurimetrics Journal"},{"key":"e_1_2_6_65_1","doi-asserted-by":"crossref","unstructured":"Saklikar S.&Saha S.(2007).Identity federation for VoIP\u2010based services. Presented to DIM '07 Fairfax VA November.","DOI":"10.1145\/1314403.1314414"},{"volume-title":"Casting the Net: From ARPANET to INTERNET and beyond","year":"1995","author":"Salus P. H.","key":"e_1_2_6_66_1"},{"issue":"2","key":"e_1_2_6_67_1","article-title":"Ubiquitous device personalization and use: The next generation of IP multimedia communications","volume":"3","author":"Schacham R.","year":"2007","journal-title":"ACM Transactions on Multimedia Computing, Communications and Applications"},{"key":"e_1_2_6_68_1","first-page":"547","article-title":"Theories of cyber\u2010sociology: Communicating culture through codes","volume":"12","author":"Schlesinger E.","year":"2004","journal-title":"Cardozo Journal of International and Comparative Law"},{"key":"e_1_2_6_69_1","doi-asserted-by":"crossref","unstructured":"Schneiderman B.&Rose A.(1995).Social impact statements: Engaging public participation in information technology design. InProceedings Symposium on Computers and the Quality of Life pp.90\u201396. Philadelphia PA: Association of Computing Machinery.","DOI":"10.1145\/238339.238378"},{"key":"e_1_2_6_70_1","doi-asserted-by":"crossref","unstructured":"Shah R. C.&Kesan J. P.(2004).Recipes for cookies: The role of institutions in shaping the development of communication technologies. Illinois Public Law Research Paper No. 04\u201014.","DOI":"10.2139\/ssrn.565041"},{"key":"e_1_2_6_71_1","first-page":"815","article-title":"The layers principle: Internet architecture and the law","volume":"79","author":"Solum L. B.","year":"2004","journal-title":"Notre Dame Law Review"},{"key":"e_1_2_6_72_1","doi-asserted-by":"publisher","DOI":"10.1177\/00027649921955326"},{"key":"e_1_2_6_73_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.7.1.111"},{"issue":"3","key":"e_1_2_6_74_1","doi-asserted-by":"crossref","first-page":"107","DOI":"10.6017\/ital.v24i3.3370","article-title":"Design considerations for multilingual web sites","volume":"24","author":"Starr J.","year":"2005","journal-title":"Information Technology and Libraries"},{"key":"e_1_2_6_75_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511808418"},{"key":"e_1_2_6_76_1","unstructured":"Taylor R.(2006 April 7).China wrestles with online gamers BBC News news.bbc.co.uk\/go\/pr\/fr\/\u2010\/2\/hi\/programmes\/click_online\/4887236.stm."},{"issue":"9","key":"e_1_2_6_77_1","article-title":"Beyond management: Considering participatory design and governance in player culture","volume":"11","author":"Taylor T. L.","year":"2006","journal-title":"First Monday"},{"key":"e_1_2_6_78_1","first-page":"205","volume-title":"Information, computer and communications policies for the 80s","author":"Tengelin V.","year":"1981"},{"key":"e_1_2_6_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/332833.332837"},{"volume-title":"Watching the watchers: The coordination of federal privacy policy","year":"1989","author":"Trubow G.","key":"e_1_2_6_80_1"},{"key":"e_1_2_6_81_1","doi-asserted-by":"crossref","unstructured":"Tuomi I.(2004).Economic productivity in the knowledge society: A critical review of productivity theory and the impacts of ICT First Monday.","DOI":"10.5210\/fm.v9i7.1159"},{"key":"e_1_2_6_82_1","first-page":"151","volume-title":"Race in cyberspace","author":"Warschauer M.","year":"2000"},{"volume-title":"Crime and the computer","year":"1991","author":"Wasik M. J.","key":"e_1_2_6_83_1"},{"key":"e_1_2_6_84_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.telpol.2005.06.012"},{"key":"e_1_2_6_85_1","first-page":"19","volume-title":"The whale and the reactor","author":"Winner L.","year":"1986"},{"key":"e_1_2_6_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/1195716.1195722"},{"key":"e_1_2_6_87_1","first-page":"387","article-title":"The origins of ccTLD policymaking","volume":"12","author":"Yu P. K.","year":"2004","journal-title":"Cardozo Journal of International and Comparative Law"}],"container-title":["Proceedings of the American Society for Information Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fmeet.2009.1450460254","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fmeet.2009.1450460254","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/meet.2009.1450460254","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T10:17:36Z","timestamp":1760955456000},"score":1,"resource":{"primary":{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/10.1002\/meet.2009.1450460254"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,1]]},"references-count":86,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2009,1]]}},"alternative-id":["10.1002\/meet.2009.1450460254"],"URL":"https:\/\/doi.org\/10.1002\/meet.2009.1450460254","archive":["Portico"],"relation":{},"ISSN":["0044-7870","1550-8390"],"issn-type":[{"type":"print","value":"0044-7870"},{"type":"electronic","value":"1550-8390"}],"subject":[],"published":{"date-parts":[[2009,1]]}}}