{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T15:55:20Z","timestamp":1777478120437,"version":"3.51.4"},"reference-count":80,"publisher":"SAGE Publications","issue":"3","license":[{"start":{"date-parts":[[2007,6,1]],"date-time":"2007-06-01T00:00:00Z","timestamp":1180656000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Information Science"],"published-print":{"date-parts":[[2007,6]]},"abstract":"<jats:p> Organizations, national governments and supranational bodies have all been active in formulating measures to regulate access to internet content. This paper reports the findings of a documentary analysis of such measures adopted over a 10-year period by the European Union. The investigation took place from a perspective of concern for the potential impact of such initiatives on freedom of expression and freedom of enquiry. On a theoretical level, the study adopted Lessig's models of direct and indirect regulation as an analytical framework. The Habermasian concept of the erosion of the Public Sphere was used as an analogy for the issues posed by the regulation of speech on the internet. It is argued that the findings of the study suggest that the democratizing potential of the internet is indeed being constrained by measures imposed in an attempt to control the perceived dangers posed by the medium. <\/jats:p>","DOI":"10.1177\/0165551506072163","type":"journal-article","created":{"date-parts":[[2007,3,24]],"date-time":"2007-03-24T00:08:48Z","timestamp":1174694928000},"page":"360-376","source":"Crossref","is-referenced-by-count":9,"title":["Controlling the net: European approaches to content and access regulation"],"prefix":"10.1177","volume":"33","author":[{"given":"Louise","family":"Cooke","sequence":"first","affiliation":[{"name":"Department of Information Science, Loughborough University, Loughborough, UK,"}]}],"member":"179","published-online":{"date-parts":[[2007,6,1]]},"reference":[{"key":"atypb1","doi-asserted-by":"publisher","DOI":"10.4324\/9780203417713"},{"key":"atypb2","doi-asserted-by":"publisher","DOI":"10.1177\/0920203X0301700203"},{"key":"atypb3","doi-asserted-by":"publisher","DOI":"10.1080\/10361140220148188"},{"key":"atypb4","doi-asserted-by":"publisher","DOI":"10.2307\/20050069"},{"issue":"2","key":"atypb5","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1353\/apr.2003.0022","volume":"27","author":"G.L. Taubman","year":"2003","journal-title":"Asian Perspective [S. Korea]"},{"key":"atypb6","volume-title":"Laws of Cyberspace","author":"L. Lessig, Code","year":"1999"},{"key":"atypb7","doi-asserted-by":"publisher","DOI":"10.1177\/016555159602200102"},{"key":"atypb8","doi-asserted-by":"crossref","unstructured":"I. Rowlands and P. Turner, Models and frameworks for information policy work. In: I. Rowlands (ed.), Understanding Information Policy (Bowker Saur, London, 1997) 83\u20148.","DOI":"10.1515\/9783110959680.83"},{"key":"atypb9","volume-title":"Areopagitica: for the Liberty of Unlicensed Printing","author":"J. Milton","year":"1973"},{"key":"atypb10","author":"J. Habermas","year":"1989","journal-title":"Polity"},{"key":"atypb11","volume-title":"Habermas: a Critical Introduction","author":"W. Outhwaite","year":"1994"},{"key":"atypb12","volume-title":"Power and Rule in Modern Society","author":"M. Dean, Governmentality","year":"1999"},{"key":"atypb13","volume-title":"Folk Devils and Moral Panic: the Creation of the Mods and Rockers","author":"S. Cohen","year":"1980"},{"key":"atypb14","unstructured":"A. Newey, Freedom of expression: censorship in private hands. In: Liberty (eds), Liberating Cyberspace: Civil Liberties, Human Rights and the Internet (Pluto, London, 1999) 13\u201443."},{"key":"atypb15","doi-asserted-by":"crossref","DOI":"10.4159\/9780674042216","volume-title":"Technologies of Freedom: on Free Speech in an Electronic Age","author":"I. de Sola Pool","year":"1983"},{"key":"atypb16","unstructured":"N. Moore, Introduction . In: I. Rowlands and S. Vogel, Information Policies: a Sourcebook (Taylor Graham, London , 1991) 1\u20145."},{"key":"atypb17","volume-title":"Citizen Activism in the Age of the Internet","author":"K.A. Hill","year":"1998"},{"key":"atypb18","doi-asserted-by":"publisher","DOI":"10.1080\/136911899359745"},{"key":"atypb19","volume-title":"The Internet and Society","author":"J. Slevin","year":"2000"},{"key":"atypb20","doi-asserted-by":"crossref","unstructured":"S. Davies, A year after 9\/11: where are we now? Communications of the ACM 45(9) (2002) 35\u20149.","DOI":"10.1145\/567498.567499"},{"key":"atypb21","unstructured":"Office for National Statistics, 2004 e-commerce Survey of Business (2005). Available at: www.statistics.gov.uk\/downloads\/theme_economy\/ecommerce_report_2004.pdf (accessed 6 January 2006)."},{"issue":"4","key":"atypb22","first-page":"530","volume":"53","author":"S.E. Ebersole","year":"2005","journal-title":"Library Trends"},{"key":"atypb23","doi-asserted-by":"publisher","DOI":"10.4324\/9780203448632"},{"key":"atypb24","volume-title":"Voices from the Sky","author":"A.C. Clarke","year":"1965"},{"key":"atypb25","volume-title":"The Power of Identity","author":"M. Castells","year":"1997"},{"key":"atypb26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-322-89613-1"},{"key":"atypb27","author":"R. Woolnough","year":"2001","journal-title":"Times Higher Education Supplement"},{"key":"atypb28","doi-asserted-by":"crossref","unstructured":"K.C. Laudon, Ethical concepts and information technology, Communications of the ACM 38(12) (1995) 33\u20149.","DOI":"10.1145\/219663.219677"},{"key":"atypb29","unstructured":"D. Wall, Policing the Internet: maintaining law and order on the cyberbeat. In: Y. Akdeniz, C. Walker and D. Wall (eds), The Internet, Law and Society (Pearson, Harlow, 2000) 154\u201474."},{"key":"atypb30","unstructured":"D. Burt, In defence of filtering, American Libraries 28(7) (1997) 46\u20147."},{"key":"atypb31","doi-asserted-by":"publisher","DOI":"10.1086\/scr.1997.3109741"},{"key":"atypb32","doi-asserted-by":"crossref","unstructured":"H. Auld, Filters work: get over it, American Libraries 34(2) (2003) 38\u201442.","DOI":"10.1097\/00006247-200302000-00013"},{"key":"atypb33","volume-title":"Datamonitor, Internet Filtering: Preventing Porn and Pushing Productivity","year":"2002"},{"issue":"2","key":"atypb34","first-page":"41","volume":"34","author":"J.B. Pierce","year":"2003","journal-title":"American Libraries"},{"issue":"7","key":"atypb35","first-page":"56","volume":"19","author":"J.D. Lasica","year":"1997","journal-title":"American Journalism Review"},{"key":"atypb36","volume":"56","author":"P. Fine","year":"2001","journal-title":"Times Higher Education Supplement"},{"key":"atypb37","volume-title":"Free Speech Perspectives on Internet Content Controls","author":"Epic, Filters","year":"2001"},{"issue":"4","key":"atypb38","first-page":"555","volume":"53","author":"J. Frechette","year":"2005","journal-title":"Library Trends"},{"key":"atypb39","volume-title":"Recommender systems, Communications of the ACM","author":"P. Resnick","year":"1997"},{"key":"atypb40","volume-title":"Fahrenheit 451.2: Is Cyberspace Burning? How Rating and Blocking Proposals May Torch Free Speech on the Internet","author":"Aclu","year":"1997"},{"key":"atypb41","doi-asserted-by":"crossref","unstructured":"C.R. Sunstein, Democracy and filtering , Communications of the ACM 47(12) (2004) 57\u20149.","DOI":"10.1145\/1035134.1035166"},{"issue":"1","key":"atypb42","first-page":"3","volume":"31","author":"D. Stoker","year":"1999","journal-title":"Journal of Librarianship and Information Science"},{"key":"atypb43","volume-title":"The Control Revolution: How the Internet is Putting Individuals in Charge and Changing the World We Know","author":"A.L. Shapiro","year":"1999"},{"key":"atypb44","first-page":"501","volume":"113","author":"L. Lessig","year":"1999","journal-title":"Law Journal"},{"key":"atypb45","volume-title":"Europe and the Global Information Society: Recommendations to the European Council High Level Group on the Information Society","author":"M. Bangemann","year":"1994"},{"key":"atypb46","doi-asserted-by":"crossref","unstructured":"B. Mahon, European information policy: the role of institutional factors. In: I. Rowlands (ed.), Understanding Information Policy (Bowker Saur, London, 1997) 101\u201413.","DOI":"10.1515\/9783110959680.101"},{"key":"atypb47","volume-title":"The Wired World: an Introduction to the Theory and Practice of the Information Society","author":"J. Dearnley","year":"2001"},{"key":"atypb48","unstructured":"A. Charlesworth , The governance of the Internet in Europe. In: Y. Akdeniz, C. Walker and D. Wall (eds) The Internet, Law and Society (Pearson, Harlow, 2000) 47\u20148."},{"key":"atypb49","unstructured":"P. Campbell and E. Machet, European policy on regulation of content on the Internet. In: Liberty (eds), Liberating Cyberspace: Civil Liberties, Human Rights and the Internet (Pluto, London, 1999) 140\u201458."},{"issue":"96","key":"atypb50","first-page":"395","author":"European Commission","journal-title":"COM"},{"key":"atypb51","unstructured":"P. Cincera, The European Union content regulation in the converged communication environment . In: K.A. Eliassen and M. Sjovaag (eds), European Union Telecommunications Liberalisation (Routledge, London , 1999) 74\u201490."},{"key":"atypb52","volume-title":"Treaty on European Union, Cm.1394","author":"European Commission","year":"1992"},{"key":"atypb53","unstructured":"Y. Akdeniz and C. Walker, Whisper who dares: encryption, privacy rights and the new world disorder. In: Y. Akdeniz, C. Walker and D. Wall, The Internet, Law and Society (Pearson, Harlow, 2000) 317\u201448."},{"issue":"96","key":"atypb54","first-page":"487","author":"European Commission","journal-title":"COM"},{"key":"atypb55","first-page":"1","volume":"336","author":"European Parliament","year":"1999","journal-title":"Official Journal of the European Communities L"},{"key":"atypb56","volume-title":"Judgement of the Munich court in the Compuserve case: translation and commentary","author":"C. Kuner","year":"2006"},{"key":"atypb57","volume-title":"The Laws of the Internet","author":"C. Gringras","year":"2003"},{"issue":"96","key":"atypb58","first-page":"483","author":"European Commission","journal-title":"COM"},{"key":"atypb59","volume-title":"Illegal and harmful content on the Internet: interim report on initiatives in EU Member States with respect to combating illegal and harmful content on the Internet","author":"European Commission","year":"1997"},{"issue":"97","key":"atypb60","first-page":"570","author":"European Commission","year":"1997","journal-title":"COM"},{"key":"atypb61","volume-title":"Convention for the Protection of Human Rights and Fundamental Freedoms","author":"Council of Europe","year":"1950"},{"key":"atypb62","volume-title":"Response to the Green Paper on the Protection of Minors and Human Dignity in Audiovisual and Information Services","author":"Legal and Advisory Board","year":"1997"},{"key":"atypb63","first-page":"341","author":"European Commission","year":"2004","journal-title":"COM"},{"key":"atypb64","first-page":"9","author":"European Parliament","year":"1998","journal-title":"News: the Week"},{"key":"atypb65","first-page":"18","author":"European Parliament","year":"1998","journal-title":"Session News: Strasbourg Briefing"},{"key":"atypb66","first-page":"152","author":"European Commission","year":"2002","journal-title":"COM"},{"key":"atypb67","volume-title":"Protection of Children on the Internet","author":"European Economic and Social Committee","year":"2003"},{"key":"atypb68","unstructured":"European Commission, Decision No. 115\/2003\/EC of the European Parliament and of the Council amending Decision No. 276\/1999\/EC adopting Multiannual Community Action Plan on Promoting Safer Use of the Internet by Combating Illegal and Harmful Content on Global Networks, Official Journal of the European Union L162 (2003) 1."},{"key":"atypb69","volume-title":"Decision No 854\/2005\/EC of the European Parliament and of the Council of 11 May 2005 establishing a Multiannual Community Programme on Promoting Safer Use of the Internet and New Online Technologies","author":"European Commission","year":"2005"},{"key":"atypb70","unstructured":"European Parliament, Council, Commission , Interinstitutional Agreement on better law-making, Official Journal of the European Union C321 (2003) 1."},{"issue":"1","key":"atypb71","volume":"9","author":"L. Senden","year":"2005","journal-title":"Electronic Journal of Comparative Law"},{"key":"atypb72","doi-asserted-by":"crossref","unstructured":"J.R. Reidenberg , Governing networks and rule-making in cyberspace . In: B. Kahin and C. Nesson, Borders in Cyberspace (MIT Press, Cambridge, MA, 1997) 84\u2014105.","DOI":"10.7551\/mitpress\/1648.003.0005"},{"key":"atypb73","volume-title":"The Governance of Privacy: Policy Instruments in Global Perspective","author":"C.J. Bennett","year":"2006"},{"key":"atypb74","volume-title":"The Emerging Internet Governance Mosaic: Connecting the Pieces","author":"W.H. Dutton","year":"2005"},{"key":"atypb75","volume-title":"The Social Shaping of Technology","author":"D. MacKenzie","year":"1999"},{"key":"atypb76","volume-title":"17th BILETA Annual Conference","author":"I. Hosein"},{"key":"atypb77","doi-asserted-by":"publisher","DOI":"10.1080\/000713100358453"},{"issue":"9","key":"atypb78","first-page":"457","volume":"100","year":"1998","journal-title":"Library Association Record"},{"key":"atypb79","author":"R. Collins","year":"1996","journal-title":"Polity"},{"key":"atypb80","doi-asserted-by":"publisher","DOI":"10.1533\/9781780631837"}],"container-title":["Journal of Information Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/0165551506072163","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/0165551506072163","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,2]],"date-time":"2025-03-02T14:52:02Z","timestamp":1740927122000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/0165551506072163"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,6]]},"references-count":80,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2007,6]]}},"alternative-id":["10.1177\/0165551506072163"],"URL":"https:\/\/doi.org\/10.1177\/0165551506072163","relation":{},"ISSN":["0165-5515","1741-6485"],"issn-type":[{"value":"0165-5515","type":"print"},{"value":"1741-6485","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,6]]}}}