{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T11:44:24Z","timestamp":1750765464292,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":130,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T00:00:00Z","timestamp":1655683200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000870","name":"John D. and Catherine T. MacArthur Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000870","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,6,21]]},"DOI":"10.1145\/3531146.3533137","type":"proceedings-article","created":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T14:27:10Z","timestamp":1655735230000},"page":"726-742","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Making the Unaccountable Internet: The Changing Meaning of Accounting in the Early ARPANET"],"prefix":"10.1145","author":[{"given":"A. Feder","family":"Cooper","sequence":"first","affiliation":[{"name":"Department of Computer Science, Cornell University, USA"}]},{"given":"Gili","family":"Vidan","sequence":"additional","affiliation":[{"name":"Department of Information Science, Cornell University, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,6,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2012.33"},{"volume-title":"Inventing the Internet","author":"Abbate Janet","key":"e_1_3_2_1_2_1","unstructured":"Janet Abbate. 1999. Inventing the Internet. MIT Press, Cambridge, MA, USA."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-017-1116-3"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","unstructured":"P. Almquist and F. Kastenholz. 1994. Towards Requirements for IP Routers. RFC 1716. https:\/\/doi.org\/10.17487\/RFC1716","DOI":"10.17487\/RFC1716"},{"key":"e_1_3_2_1_5_1","unstructured":"Alexander Anderson. 1990. Oral history interview with Alexander A. McKenzie. https:\/\/hdl.handle.net\/11299\/107489 Retrieved from the University of Minnesota Digital Conservancy."},{"volume-title":"The Internet before Commercialization","author":"Aspray William","key":"e_1_3_2_1_6_1","unstructured":"William Aspray and Paul\u00a0E. Ceruzzi. 2008. The Internet before Commercialization. The MIT Press, Cambridge, MA, USA, 9\u201343."},{"key":"e_1_3_2_1_7_1","first-page":"6","article-title":"Teaching Students About Responsible Use of Computers","volume":"32","author":"Project Athena","year":"1989","unstructured":"Athena Project. 1989. Teaching Students About Responsible Use of Computers. Communications of the ACM 32, 6 (June 1989), 704.","journal-title":"Communications of the ACM"},{"key":"e_1_3_2_1_8_1","volume-title":"Bootstrapping: Douglas Engelbart, Coevolution, and the Origins of Personal Computing","author":"Bardini Thierry","year":"2001","unstructured":"Thierry Bardini. 2001. Bootstrapping: Douglas Engelbart, Coevolution, and the Origins of Personal Computing. Stanford University Press, USA."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","unstructured":"Abhay Bhushan. 1972. File Transfer Protocol. RFC 354. https:\/\/doi.org\/10.17487\/RFC0354","DOI":"10.17487\/RFC0354"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","unstructured":"Abhay\u00a0K. Bhushan. 1972. Comments on the File Transfer Protocol. RFC 385. https:\/\/doi.org\/10.17487\/RFC0385","DOI":"10.17487\/RFC0385"},{"key":"e_1_3_2_1_11_1","unstructured":"Wiebe\u00a0E. Bijker Thomas\u00a0P. Hughes and Trevor\u00a0J. Pinch. (Eds.). 1987. The Social construction of technological systems: New directions in the sociology and history of technology. MIT Press Cambridge Mass."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/383034.383037"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-0386.2007.00378.x"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","unstructured":"R. Braden and J. Postel. 1987. Requirements for Internet gateways. RFC 1009. https:\/\/doi.org\/10.17487\/RFC1009","DOI":"10.17487\/RFC1009"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","unstructured":"Robert\u00a0T. Braden Dr. David\u00a0D. Clark and Scott Shenker. 1994. Integrated Services in the Internet Architecture: an Overview. RFC 1633. https:\/\/doi.org\/10.17487\/RFC1633","DOI":"10.17487\/RFC1633"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1080\/13691180903473814"},{"key":"e_1_3_2_1_17_1","first-page":"1969","article-title":"The Framing Years","author":"Braman Sandra","year":"2011","unstructured":"Sandra Braman. 2011. The Framing Years: Policy Fundamentals in the Internet Design Process, 1969-1979. The Information Society 27, 5 (2011), 295\u2013310.","journal-title":"Policy Fundamentals in the Internet Design Process"},{"key":"e_1_3_2_1_18_1","volume-title":"Laying the path: Governance in early internet design","author":"Braman Sandra","year":"2013","unstructured":"Sandra Braman. 2013. Laying the path: Governance in early internet design. Info (Cambridge, England) 15, 6 (2013), 63\u201383."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","unstructured":"Hans-Werner Braun. 1989. Models of policy based routing. RFC 1104. https:\/\/doi.org\/10.17487\/RFC1104","DOI":"10.17487\/RFC1104"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/99508.99558"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","unstructured":"Bob Bressler. 1973. Free file transfer. RFC 487. https:\/\/doi.org\/10.17487\/RFC0487","DOI":"10.17487\/RFC0487"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/9384.001.0001"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1476936.1477024"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","unstructured":"Vint Cerf. 1988. IAB recommendations for the development of Internet network management standards. RFC 1052. https:\/\/doi.org\/10.17487\/RFC1052","DOI":"10.17487\/RFC1052"},{"key":"e_1_3_2_1_25_1","volume-title":"The Internet History. 7\u201310. https:\/\/archive.computerhistory.org\/resources\/access\/text\/2017\/11\/102646703-05-01-acc.pdf Accessed","author":"Cerf Vint","year":"2022","unstructured":"Vint Cerf. 1989. Reqieum for the ARPANET. In The Internet History. 7\u201310. https:\/\/archive.computerhistory.org\/resources\/access\/text\/2017\/11\/102646703-05-01-acc.pdf Accessed January 9, 2022."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1974.1092259"},{"key":"e_1_3_2_1_27_1","first-page":"62","article-title":"Privacy Harms","volume":"102","author":"Citron Danielle\u00a0Keats","year":"2022","unstructured":"Danielle\u00a0Keats Citron and Daniel\u00a0J. Solove. 2022. Privacy Harms. Boston University Law Review 102 (2022), 62.","journal-title":"Boston University Law Review"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/52324.52336"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","unstructured":"Dave Clark. 1989. Policy routing in Internet protocols. RFC 1102. https:\/\/doi.org\/10.17487\/RFC1102","DOI":"10.17487\/RFC1102"},{"key":"e_1_3_2_1_30_1","volume-title":"Untangling Attribution. Proceedings of A Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for US Policy (10","author":"Clark David","year":"2011","unstructured":"David Clark and Susan Landau. 2011. Untangling Attribution. Proceedings of A Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for US Policy (10 2011), 25\u201340."},{"key":"e_1_3_2_1_31_1","volume-title":"Designing an Internet","author":"Clark D.","unstructured":"David\u00a0D. Clark. 2018. Designing an Internet(1st ed.). The MIT Press, Cambridge, MA, USA.","edition":"1"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3465416.3483289"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","unstructured":"A.\u00a0Feder Cooper Emanuel Moss Benjamin Laufer and Helen Nissenbaum. 2022. Accountability in an Algorithmic Society: Relationality Responsibility and Robustness in Machine Learning. https:\/\/doi.org\/10.48550\/ARXIV.2202.05338","DOI":"10.48550\/ARXIV.2202.05338"},{"key":"e_1_3_2_1_34_1","first-page":"6","article-title":"CPSR Statement on the Computer Virus","volume":"32","author":"CPSR.","year":"1989","unstructured":"CPSR. 1989. CPSR Statement on the Computer Virus. Communications of the ACM 32, 6 (June 1989), 699.","journal-title":"Communications of the ACM"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","unstructured":"D. Crocker N. Neigus J. Feinler and J. Iseli. 1973. ARPANET users interest working group meeting. RFC 585. https:\/\/doi.org\/10.17487\/RFC0585","DOI":"10.17487\/RFC0585"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC0075"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","unstructured":"S. Crocker S. Carr and V. Cerf. 1970. New Host-Host Protocol. RFC 33. https:\/\/doi.org\/10.17487\/RFC0033","DOI":"10.17487\/RFC0033"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","unstructured":"G. Deloche. 1969. Implementation of the Host - Host Software Procedures in GORDO. RFC 11. https:\/\/doi.org\/10.17487\/RFC0011","DOI":"10.17487\/RFC0011"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/MAHC.2015.29"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC0082"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","unstructured":"Deborah Estrin. 1989. Policy requirements for inter Administrative Domain routing. RFC 1125. https:\/\/doi.org\/10.17487\/RFC1125","DOI":"10.17487\/RFC1125"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/116030.116036"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1989.36293"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","unstructured":"Larry Garlick. 1976. Out-of-Band Control Signals in a Host-to-Host Protocol. RFC 721. https:\/\/doi.org\/10.17487\/RFC0721","DOI":"10.17487\/RFC0721"},{"key":"e_1_3_2_1_45_1","unstructured":"Timnit Gebru Jamie Morgenstern Briana Vecchione Jennifer\u00a0Wortman Vaughan Hanna\u00a0M. Wallach Hal\u00a0Daum\u00e9 III and Kate Crawford. 2018. Datasheets for Datasets. http:\/\/arxiv.org\/abs\/1803.09010"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1177\/0306312706056047"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444809342738"},{"key":"e_1_3_2_1_48_1","volume-title":"Goldsmith and Tim Wu","author":"L.","year":"2006","unstructured":"Jack\u00a0L. Goldsmith and Tim Wu. 2006. Who Controls the Internet?: Illusions of a Borderless World. Oxford University Press, Oxford, UK."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3371934.3371962"},{"volume-title":"How the Internet Became Commercial: Innovation, Privatization, and the Birth of a New Network","author":"Greenstein Shane","key":"e_1_3_2_1_50_1","unstructured":"Shane Greenstein. 2015. How the Internet Became Commercial: Innovation, Privatization, and the Birth of a New Network. Princeton University Press, Princeton, NJ."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","unstructured":"Sally Hambridge and Albert Lunde. 1999. DON\u2019T SPEW A Set of Guidelines for Mass Unsolicited Mailings and Postings (spam*). RFC 2635. https:\/\/doi.org\/10.17487\/RFC2635","DOI":"10.17487\/RFC2635"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","unstructured":"S. Hares and D. Katz. 1989. Administrative Domains and Routing Domains: A model for routing in the Internet. RFC 1136. https:\/\/doi.org\/10.17487\/RFC1136","DOI":"10.17487\/RFC1136"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","unstructured":"J. Heafner and E. Harslem. 1971. Service center standards for remote usage: A user\u2019s view. RFC 231. https:\/\/doi.org\/10.17487\/RFC0231","DOI":"10.17487\/RFC0231"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/1476936.1477021"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","unstructured":"Bob Hinden. 1983. Host Monitoring Protocol. RFC 869. https:\/\/doi.org\/10.17487\/RFC0869","DOI":"10.17487\/RFC0869"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","unstructured":"Paul Holbrook and Joyce\u00a0K. Reynolds. 1991. Site Security Handbook. RFC 1244. https:\/\/doi.org\/10.17487\/RFC1244","DOI":"10.17487\/RFC1244"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC2626"},{"key":"e_1_3_2_1_58_1","first-page":"6","article-title":"Ethics and the Internet","volume":"32","author":"Board Internet Activities","year":"1989","unstructured":"Internet Activities Board. 1989. Ethics and the Internet. Communications of the ACM 32, 6 (June 1989), 710.","journal-title":"Communications of the ACM"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","unstructured":"Internet Activities Board. 1989. Ethics and the Internet. RFC 1087. https:\/\/doi.org\/10.17487\/RFC1087","DOI":"10.17487\/RFC1087"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","unstructured":"ISO. 1983. ISO Transport Protocol specification. RFC 892. https:\/\/doi.org\/10.17487\/RFC0892","DOI":"10.17487\/RFC0892"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","unstructured":"ISO. 1984. Protocol for providing the connectionless mode network services. RFC 926. https:\/\/doi.org\/10.17487\/RFC0926","DOI":"10.17487\/RFC0926"},{"volume-title":"States of Knowledge: The Co-Production of Science and the Social Order","author":"Jasanoff Sheila","key":"e_1_3_2_1_62_1","unstructured":"Sheila Jasanoff. 2004. States of Knowledge: The Co-Production of Science and the Social Order. Routledge, Abingdon, Oxon."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","unstructured":"Paul\u00a0R. Johnson and Robert\u00a0H. Thomas. 1975. Maintenance of duplicate databases. RFC 677. https:\/\/doi.org\/10.17487\/RFC0677","DOI":"10.17487\/RFC0677"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442188.3445905"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","unstructured":"Robert Kahn. 1971. Host accounting and administrative procedures. RFC 136. https:\/\/doi.org\/10.17487\/RFC0136","DOI":"10.17487\/RFC0136"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","unstructured":"P. Karp. 1971. Categorization and guide to NWG\/RFCs. RFC 100. https:\/\/doi.org\/10.17487\/RFC0100","DOI":"10.17487\/RFC0100"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.2371-9621.2021.tb00010.x"},{"key":"e_1_3_2_1_68_1","first-page":"82","article-title":"The Facebook Oversight Board: Creating an Independent Institution to Adjudicate Online Free Expression","volume":"129","author":"Klonick Kate","year":"2020","unstructured":"Kate Klonick. 2020. The Facebook Oversight Board: Creating an Independent Institution to Adjudicate Online Free Expression. Yale Law Journal 129(2020), 82. Issue 2418.","journal-title":"Yale Law Journal"},{"key":"e_1_3_2_1_69_1","first-page":"40","article-title":"A User\u2019s Guide to Section 230, and a Legislator\u2019s Guide to Amending It (or Not)","volume":"37","author":"Kosseff Jeff","year":"2022","unstructured":"Jeff Kosseff. 2022. A User\u2019s Guide to Section 230, and a Legislator\u2019s Guide to Amending It (or Not). Berkeley Technology Law Journal 37 (2022), 40. Issue 2.","journal-title":"Berkeley Technology Law Journal"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442188.3445937"},{"key":"e_1_3_2_1_71_1","first-page":"633","article-title":"Accountable Algorithms","volume":"165","author":"Kroll A.","year":"2017","unstructured":"Joshua\u00a0A. Kroll, Joanna Huey, Solon Barocas, Edward\u00a0W. Felten, Joel\u00a0R. Reidenberg, David\u00a0G. Robinson, and Harlan Yu. 2017. Accountable Algorithms. University of Pennsylvania Law Review 165 (2017), 633\u2013705. Issue 633.","journal-title":"University of Pennsylvania Law Review"},{"volume-title":"We have never been modern","author":"Latour Bruno","key":"e_1_3_2_1_72_1","unstructured":"Bruno Latour. 1993. We have never been modern. Harvard University Press, Cambridge, Mass."},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","unstructured":"Barry Leiner. 1988. Critical issues in high bandwidth networking. RFC 1077. https:\/\/doi.org\/10.17487\/RFC1077","DOI":"10.17487\/RFC1077"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","unstructured":"Barry\u00a0M. Leiner. 1987. Implementation plan for interagency research Internet. RFC 1015. https:\/\/doi.org\/10.17487\/RFC1015","DOI":"10.17487\/RFC1015"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","unstructured":"Barry\u00a0M. Leiner. 1987. Network requirements for scientific research: Internet task force on scientific computing. RFC 1017. https:\/\/doi.org\/10.17487\/RFC1017","DOI":"10.17487\/RFC1017"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629607.1629613"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/253671.253741"},{"key":"e_1_3_2_1_78_1","volume-title":"Code version 2.0 ([","author":"Lessig Lawrence","unstructured":"Lawrence Lessig. 2006. Code version 2.0 ([2nd ed.]. ed.). Basic Books, New York.","edition":"2"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/1460833.1460847"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","unstructured":"Mike Little. 1989. Goals and functional requirements for inter-autonomous system routing. RFC 1126. https:\/\/doi.org\/10.17487\/RFC1126","DOI":"10.17487\/RFC1126"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","unstructured":"K. Lougheed and Y. Rekhter. 1989. Border Gateway Protocol (BGP). RFC 1105. https:\/\/doi.org\/10.17487\/RFC1105","DOI":"10.17487\/RFC1105"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/1464291.1464336"},{"volume-title":"Black software: The Internet and racial justice, from the AfroNet to Black Lives Matter","author":"McIlwain D.","key":"e_1_3_2_1_83_1","unstructured":"Charlton\u00a0D. McIlwain. 2020. Black software: The Internet and racial justice, from the AfroNet to Black Lives Matter. Oxford University Press, New York, NY."},{"key":"e_1_3_2_1_84_1","volume-title":"Internet Daemons: Digital Communications Possessed","author":"McKelvey Fenwick","year":"2018","unstructured":"Fenwick McKelvey. 2018. Internet Daemons: Digital Communications Possessed. University of Minnesota Press, USA."},{"volume-title":"Cybernetic revolutionaries: Technology and politics in Allende\u2019s Chile","author":"Medina Eden","key":"e_1_3_2_1_85_1","unstructured":"Eden Medina. 2011. Cybernetic revolutionaries: Technology and politics in Allende\u2019s Chile. MIT Press, Cambridge, Mass."},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","unstructured":"R. Merryman. 1973. UCSD-CC Server-FTP facility. RFC 532. https:\/\/doi.org\/10.17487\/RFC0532","DOI":"10.17487\/RFC0532"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442188.3445935"},{"volume-title":"Email and the Everyday: Stories of Disclosure, Trust, and Digital Labor","author":"Milne Esther","key":"e_1_3_2_1_88_1","unstructured":"Esther Milne. 2021. Email and the Everyday: Stories of Disclosure, Trust, and Digital Labor. MIT Press, Cambridge."},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287560.3287596"},{"key":"e_1_3_2_1_90_1","volume-title":"Assembling Accountability: Algorithmic Impact Assessment for the Public Interest. SSRN preprint.","author":"Moss Emanuel","year":"2021","unstructured":"Emanuel Moss, Elizabeth\u00a0Anne Watkins, Ranjit Singh, Madeleine\u00a0Clare Elish, and Jacob Metcalf. 2021. Assembling Accountability: Algorithmic Impact Assessment for the Public Interest. SSRN preprint."},{"key":"e_1_3_2_1_91_1","first-page":"6","article-title":"NSF Poses Code of Networking Ethics","volume":"32","author":"National Science Foundation.","year":"1989","unstructured":"National Science Foundation. 1989. NSF Poses Code of Networking Ethics. Communications of the ACM 32, 6 (June 1989), 688.","journal-title":"Communications of the ACM"},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1177\/0162243915598056"},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02639315"},{"key":"e_1_3_2_1_94_1","doi-asserted-by":"crossref","unstructured":"Internet\u00a0Hall of Fame. 2013. Barry Leiner. https:\/\/www.internethalloffame.org\/inductees\/barry-leiner","DOI":"10.15273\/pnsis.v47i1.3384"},{"key":"e_1_3_2_1_95_1","doi-asserted-by":"publisher","unstructured":"M.A. Padlipsky. 1973. Tentative proposal for a Unified User Level Protocol. RFC 451. https:\/\/doi.org\/10.17487\/RFC0451","DOI":"10.17487\/RFC0451"},{"key":"e_1_3_2_1_96_1","doi-asserted-by":"publisher","unstructured":"M. Padlipsky. 1974. Specification of the Unified User-Level Protocol. RFC 666. https:\/\/doi.org\/10.17487\/RFC0666","DOI":"10.17487\/RFC0666"},{"key":"e_1_3_2_1_97_1","doi-asserted-by":"publisher","unstructured":"M.\u00a0A. Padlipsky. 1973. Feast or famine? A response to two recent RFC\u2019s about network information. RFC 531. https:\/\/doi.org\/10.17487\/RFC0531","DOI":"10.17487\/RFC0531"},{"key":"e_1_3_2_1_98_1","doi-asserted-by":"publisher","unstructured":"M.\u00a0A. Padlipsky. 1973. Two solutions to a file transfer access problem. RFC 505. https:\/\/doi.org\/10.17487\/RFC0505","DOI":"10.17487\/RFC0505"},{"key":"e_1_3_2_1_99_1","doi-asserted-by":"publisher","unstructured":"M.\u00a0A. Padlipsky. 1973. What is \u201dFree\u201d?RFC 491. https:\/\/doi.org\/10.17487\/RFC0491","DOI":"10.17487\/RFC0491"},{"volume-title":"How not to network a nation: The uneasy history of the Soviet internet","author":"Peters Benjamin","key":"e_1_3_2_1_100_1","unstructured":"Benjamin Peters. 2008. How not to network a nation: The uneasy history of the Soviet internet. MIT Press, Cambridge, Massachusetts."},{"key":"e_1_3_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC0369"},{"key":"e_1_3_2_1_102_1","doi-asserted-by":"publisher","unstructured":"K.T. Pogran. 1973. Un-muddling \u201dfree file transfer\u201d. RFC 501. https:\/\/doi.org\/10.17487\/RFC0501","DOI":"10.17487\/RFC0501"},{"key":"e_1_3_2_1_103_1","doi-asserted-by":"crossref","unstructured":"David\u00a0G Post. 2009. In search of Jefferson\u2019s moose: Notes on the state of cyberspace. Oxford University Press Oxford ; New York.","DOI":"10.1093\/oso\/9780195342895.001.0001"},{"key":"e_1_3_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc0077"},{"key":"e_1_3_2_1_105_1","doi-asserted-by":"publisher","unstructured":"J. Postel. 1981. Internet Control Message Protocol. RFC 777. https:\/\/doi.org\/10.17487\/RFC0777","DOI":"10.17487\/RFC0777"},{"key":"e_1_3_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC0808"},{"key":"e_1_3_2_1_107_1","doi-asserted-by":"publisher","unstructured":"Jonathan\u00a0B. Postel. 1980. Internet Message Protocol. RFC 759. https:\/\/doi.org\/10.17487\/RFC0759","DOI":"10.17487\/RFC0759"},{"key":"e_1_3_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.1145\/3351095.3372873"},{"key":"e_1_3_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.1145\/1810891.1810906"},{"key":"e_1_3_2_1_110_1","doi-asserted-by":"publisher","unstructured":"Joyce\u00a0K. Reynolds. 1989. Helminthiasis of the Internet. RFC 1135. https:\/\/doi.org\/10.17487\/RFC1135","DOI":"10.17487\/RFC1135"},{"key":"e_1_3_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.1145\/800001.811680"},{"key":"e_1_3_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.1145\/1476936.1477020"},{"key":"e_1_3_2_1_113_1","doi-asserted-by":"publisher","unstructured":"Eric\u00a0C. Rosen. 1982. Exterior Gateway Protocol (EGP). RFC 827. https:\/\/doi.org\/10.17487\/RFC0827","DOI":"10.17487\/RFC0827"},{"key":"e_1_3_2_1_114_1","doi-asserted-by":"publisher","DOI":"10.1109\/MAHC.2006.42"},{"volume-title":"Open Standards and the Digital Age: History, Ideology, and Networks","author":"Russell L.","key":"e_1_3_2_1_115_1","unstructured":"Andrew\u00a0L. Russell. 2014. Open Standards and the Digital Age: History, Ideology, and Networks. Cambridge University Press, Cambridge."},{"key":"e_1_3_2_1_116_1","doi-asserted-by":"publisher","DOI":"10.1145\/357401.357402"},{"key":"e_1_3_2_1_117_1","volume-title":"Framing Computer Security and Privacy","author":"Slayton Rebecca","year":"1967","unstructured":"Rebecca Slayton. 2016. Framing Computer Security and Privacy, 1967\u20131992. Association for Computing Machinery and Morgan & Claypool, 287\u2013330."},{"key":"e_1_3_2_1_118_1","doi-asserted-by":"publisher","unstructured":"Bob Thomas. 1973. Distributed resources workshop announcement. RFC 504. https:\/\/doi.org\/10.17487\/RFC0504","DOI":"10.17487\/RFC0504"},{"volume-title":"From Counterculture to Cyberculture: Stewart Brand, the Whole Earth Network, and the Rise of Digital Utopianism","author":"Turner Fred","key":"e_1_3_2_1_119_1","unstructured":"Fred Turner. 2006. From Counterculture to Cyberculture: Stewart Brand, the Whole Earth Network, and the Rise of Digital Utopianism. University of Chicago Press, Chicago, IL, USA."},{"key":"e_1_3_2_1_120_1","doi-asserted-by":"publisher","DOI":"10.1145\/3465416.3483294"},{"key":"e_1_3_2_1_121_1","doi-asserted-by":"publisher","unstructured":"U. Warrier and L. Besaw. 1989. Common Management Information Services and Protocol over TCP\/IP (CMOT). RFC 1095. https:\/\/doi.org\/10.17487\/RFC1095","DOI":"10.17487\/RFC1095"},{"key":"e_1_3_2_1_122_1","doi-asserted-by":"publisher","unstructured":"R. Watson. 1973. Some thoughts on system design to facilitate resource sharing. RFC 592. https:\/\/doi.org\/10.17487\/RFC0592","DOI":"10.17487\/RFC0592"},{"key":"e_1_3_2_1_123_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC0101"},{"key":"e_1_3_2_1_124_1","doi-asserted-by":"publisher","DOI":"10.1145\/1349026.1349043"},{"key":"e_1_3_2_1_125_1","doi-asserted-by":"publisher","unstructured":"James\u00a0E. White. 1971. Network specifications for UCSB\u2019s Simple-Minded File System. RFC 122. https:\/\/doi.org\/10.17487\/RFC0122","DOI":"10.17487\/RFC0122"},{"key":"e_1_3_2_1_126_1","doi-asserted-by":"publisher","unstructured":"James\u00a0E. White. 1973. Responses to critiques of the proposed mail protocol. RFC 555. https:\/\/doi.org\/10.17487\/RFC0555","DOI":"10.17487\/RFC0555"},{"key":"e_1_3_2_1_127_1","doi-asserted-by":"publisher","DOI":"10.1145\/3351095.3372833"},{"key":"e_1_3_2_1_128_1","volume-title":"Engineering rules: Global standard setting since","author":"Yates JoAnne","year":"1880","unstructured":"JoAnne Yates. 2019. Engineering rules: Global standard setting since 1880. Johns Hopkins University Press, Baltimore, Maryland."},{"volume-title":"The Future of the Internet\u2013And How to Stop It","author":"Zittrain Jonathan","key":"e_1_3_2_1_129_1","unstructured":"Jonathan Zittrain. 2008. The Future of the Internet\u2013And How to Stop It. Yale University Press, USA."},{"key":"e_1_3_2_1_130_1","volume-title":"The Virtues of Procrastination. https:\/\/www.internetimpossible.org\/virtues-of-procrastination\/ Accessed","author":"Zittrain Jonathan","year":"2022","unstructured":"Jonathan Zittrain. 2014. The Virtues of Procrastination. https:\/\/www.internetimpossible.org\/virtues-of-procrastination\/ Accessed January 21, 2022."}],"event":{"name":"FAccT '22: 2022 ACM Conference on Fairness, Accountability, and Transparency","sponsor":["ACM Association for Computing Machinery"],"location":"Seoul Republic of Korea","acronym":"FAccT '22"},"container-title":["2022 ACM Conference on Fairness Accountability and Transparency"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3531146.3533137","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3531146.3533137","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:02:08Z","timestamp":1750186928000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3531146.3533137"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,20]]},"references-count":130,"alternative-id":["10.1145\/3531146.3533137","10.1145\/3531146"],"URL":"https:\/\/doi.org\/10.1145\/3531146.3533137","relation":{},"subject":[],"published":{"date-parts":[[2022,6,20]]},"assertion":[{"value":"2022-06-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}