<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "http://jats.nlm.nih.gov/publishing/1.0/JATS-journalpublishing1.dtd">
<!--<?xml-stylesheet type="text/xsl" href="article.xsl"?>-->
<article article-type="research-article" dtd-version="1.0" xml:lang="en"
    xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"
    xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
    <front>
        <journal-meta>
            <journal-id journal-id-type="issn">1744-6716</journal-id>
            <journal-title-group>
                <journal-title>Westminster Papers in Communication and Culture</journal-title>
            </journal-title-group>
            <issn pub-type="epub">1744-6716</issn>
            <publisher>
                <publisher-name>University of Westminster Press</publisher-name>
            </publisher>
        </journal-meta>
        <article-meta>
            <article-id pub-id-type="doi">10.16997/wpcc.214</article-id>
            <article-categories>
                <subj-group>
                    <subject>Research article</subject>
                </subj-group>
            </article-categories>
            <title-group>
                <article-title><italic>Giants, Dwarfs</italic> and Decentralized Alternatives to
                    Internet-based Services: An Issue of Internet Governance</article-title>
            </title-group>
            <contrib-group>
                <contrib contrib-type="author">
                    <name>
                        <surname>Francesca</surname>
                        <given-names>Musiani</given-names>
                    </name>
                    <email>francesca.musiani@gmail.com</email>
                    <xref ref-type="aff" rid="aff-1"/>
                </contrib>
            </contrib-group>
            <aff id="aff-1">Researcher, Institute for Communication Sciences, French National Centre
                for Scientific Research (ISCC-CNRS), Associate researcher, Centre for the Sociology
                of Innovation of MINES ParisTech-PSL, France</aff>
            <pub-date publication-format="electronic" date-type="pub" iso-8601-date="2015-09-15">
                <day>15</day>
                <month>09</month>
                <year>2015</year>
            </pub-date>
            <volume>10</volume>
            <issue>1</issue>
            <fpage>81</fpage>
            <lpage>94</lpage>
            <permissions>
                <copyright-statement>Copyright: &#x00A9; 2015 The Author(s)</copyright-statement>
                <copyright-year>2015</copyright-year>
                <license license-type="open-access"
                    xlink:href="http://creativecommons.org/licenses/by/3.0/">
                    <license-p>This is an open-access article distributed under the terms of the
                        Creative Commons Attribution 3.0 Unported License (CC-BY 3.0), which permits
                        unrestricted use, distribution, and reproduction in any medium, provided the
                        original author and source are credited. See <uri
                            xlink:href="http://creativecommons.org/licenses/by/3.0/"
                            >http://creativecommons.org/licenses/by/3.0/</uri>.</license-p>
                </license>
            </permissions>
            <self-uri xlink:href="http://wpcc.ubiquitypress.com/article/view/wpcc.214/"/>
            <abstract>
                <p>This article discusses some of the results of a five year-long (and on going)
                    investigation of alternative approaches to the design of internet services,
                    based on decentralized network architectures. In particular, the paper focuses
                    on the implications of this research for the study and the practice of internet
                    governance, inasmuch as architectural changes affect the repartition of
                    responsibilities between service providers, content producers, users and network
                    operators; contribute to the shaping of user rights, of the ways to produce and
                    enforce law; reconfigure the boundary between public and private uses of the
                    internet as a global facility. I argue that delving into the tensions between
                    the <italic>dwarfs</italic> and the <italic>giants</italic> of the Net &#8211;
                    between different technical and organizational architectures, and their
                        <italic>political</italic> consequences &#8211; helps us to disengage from
                    what is often a predominantly institutional view of internet governance, and
                    give due emphasis to its less visible, infrastructure-embedded arrangements, its
                    materiality and its practice.</p>
            </abstract>
            <kwd-group>
                <kwd>internet governance</kwd>
                <kwd>decentralization</kwd>
                <kwd>architecture</kwd>
                <kwd>peer-to-peer</kwd>
                <kwd>rights</kwd>
                <kwd>law</kwd>
            </kwd-group>
        </article-meta>
    </front>
    <body>
        <sec>
            <title>1. Introduction<xref ref-type="fn" rid="n1">1</xref></title>
            <p>The principle of decentralization has been one of the cornerstones of the
                internet&#8217;s genesis: the primary objective of the &#8216;network of
                networks&#8217; was indeed to enable communication between heterogeneous and remote
                machines, without mandatory transit points. Today, concentration models dominate,
                around a handful of macro-actors &#8211; <italic>giants</italic> equipped with
                extensive server farms, managing the most part of internet traffic. However, the
                original principle has not been entirely abandoned, and in all areas of application,
                developers explore decentralized alternatives, relying on cooperation between users
                (and their computers). These <italic>dwarfs</italic> of the network form the basis
                of search engines, social networks, storage platforms that allocate resources and
                tasks equally among participants in the network.</p>
            <p>In this paper, I discuss some of the results of a five-year-long (and on-going)
                investigation of alternative, decentralized and peer-to-peer approaches to internet
                services, and of the social and organizational forms they propose (<xref
                    ref-type="bibr" rid="B31">Musiani, 2013a</xref>). To avoid adopting an
                excessively broad focus &#8211; and the impossible mission of summarizing years of
                work into a single paper &#8211; I will focus here, in particular, on discussing the
                implications of this research for the study of internet governance.<xref
                    ref-type="fn" rid="n2">2</xref> As Geoffrey Bowker points out, &#8216;If the
                governance of the internet is a key sociotechnical issue of our times, then we need
                to be able to explore both the choices we have made and the roads not taken. If we
                are to deal with this fundamental political issue of our time, then we need an
                integrated understanding of what is at stake socially and how changes can be made
                technologically&#8217; (<xref ref-type="bibr" rid="B8">Bowker, 2013</xref>).</p>
            <sec>
                <title>1.1. P2P, between widespread infractions and promise of equality</title>
                <p>Peer-to-peer (P2P) is a technology that continues to cause both excitement and
                    anxiety, despite its relatively simple technical definition of computer
                    networking model structured in a decentralized manner, so that communications or
                    exchanges take place between nodes entrusted with an equal responsibility in the
                    system (<xref ref-type="bibr" rid="B37">Schollmeier, 2001</xref>). For a large
                    number of internet users &#8211; since the encounter between P2P and the public,
                    prompted by the file sharing software Napster in 1999 &#8211; this technology is
                    a <italic>de facto</italic> synonym for the (illegal) download of cultural
                    content; for others, it represents the ultimate utopia of techno-egalitarianism,
                    or suggests a more sustainable organizational model for the societies of
                    tomorrow. While it certainly does not, and cannot, wish to neglect the powerful
                    agency of these normative views, my research does not seek to be a further
                    contribution to the already well-established debate on copyright, and on the
                    sharing/stealing dialectic to which P2P now seems to be almost
                    &#8216;naturally&#8217; associated. I have taken as the starting point of my
                    work the basic feature of P2P as a computer network model: the facilitation of
                    direct exchanges of data between equal nodes &#8211; equal in terms of their
                    provision of technical resources to the system as a whole, and of the
                    responsibility assigned to them within its operations.</p>
                <p>My work of the past five years has focused on the development and the
                    appropriation of internet-based services the conception of which integrates a
                    specific design choice: the delegation of the responsibility and the control of
                    data management and flows to the margins, or the periphery, of these networking
                    systems. The necessary operations for the proper functioning of these systems,
                    and their ability to correctly provide the services for which they are intended,
                    technically depend on users, the &#8216;dwarfs&#8217; of the network: their
                    terminals, their computing resources, mobilized in an aggregate manner in order
                    to serve a common purpose.</p>
                <p>Thus, my work is not primarily concerned with the type of service that is most
                    often associated with P2P architecture, file sharing. Rather, it focuses its
                    attention on the &#8216;meeting&#8217; between the choice of developing a P2P
                    technical architecture, and applications such as information retrieval, video
                    streaming, file storage. We are very familiar with these online activities in
                    our daily practice as internet users, under the name of Google, YouTube, Dropbox
                    &#8211; the &#8216;giants&#8217; of information technology, based on a
                    client/server network architecture that sets out a clearly identifiable
                    dichotomy between a server that provides resources, and clients requesting them.
                    My work explores the making of systems that, while serving these same, diverse
                    purposes &#8211; search, networking, storage &#8211; have in common an original
                    feature of their technical architecture, compared to their famous centralized
                    counterparts: all are based on P2P networking technologies.</p>
            </sec>
            <sec sec-type="methods">
                <title>1.2. Approach and methodology</title>
                <p>This work builds on an approach that blends internet studies with science and
                    technology studies (STS) infrastructure studies &#8211; first and foremost
                    &#8211; with a particular attention to methods that Star (<xref ref-type="bibr"
                        rid="B38">1999</xref>) has described as &#8216;ethnography of
                    infrastructure&#8217;. This blend of qualitative methods has proven fruitful and
                    has been formulated in order to shed light on the &#8216;<italic>ballet</italic>
                    between programmers, software and users&#8217; (<xref ref-type="bibr" rid="B1"
                        >Abbate, 2012</xref>) that builds decentralization into internet-based
                    services, and also to further explore the socio-political implications of this
                    distributed and decentralized approach to the technical architecture of internet
                    services. The underlying hypothesis for this method is that the &#8216;lower
                    layers&#8217; of a networked system have, or may have, consequences on the
                    purpose that the system serves, the dynamics that are enacted within it, the
                    techno-legal procedures it entails. Thus, it contributes to shape the present
                    and future of internet governance, enacted not only via institutions but via the
                    sinews of power embedded in the architectures and infrastructures of the
                    internet (<xref ref-type="bibr" rid="B17">DeNardis, 2014</xref>). In the case of
                    the present article, space constraints do not allow to present more than a very
                    limited part of the ethnographic work which spans three chapters in (<xref
                        ref-type="bibr" rid="B32">Musiani, 2013b</xref>); section 3, 3.1 in
                    particular, will give a &#8216;flavour&#8217; of this ethnography. This ensemble
                    of methods, unpacking the discrete, oft-invisible operations and devices that
                    subtend internet-based services, contributes to the disengagement from two
                    equally &#8216;reductionist&#8217; conceptions of the internet: either a
                        <italic>de facto</italic> stranger to the institutional forces of the
                    off-line &#8216;reality&#8217;, or a system that can be entirely assimilated to
                    the codified spaces of traditional politics (<xref ref-type="bibr" rid="B12"
                        >Cheniti, 2009</xref>). Moving away from this dichotomy allows to give
                    emphasis, in the study of internet governance, to its materiality and
                        <italic>practice</italic>: the set of mechanisms that lead the different
                    actors in the technical, political and economic management of the &#8216;network
                    of networks&#8217; to build common knowledge, legitimize some of it as
                    stabilized <italic>facts</italic> of the internet, and shape boundaries able to
                    reconcile the concerns of both experts and users.</p>
                <p>Indeed, when it comes to the design and implementation choices subtending
                    technical architectures, issues of materiality take central stage, intertwined
                    with issues of &#8216;code&#8217; (i.e. computers being &#8216;programmed&#8217;
                    in a specific way). The choice of decentralization, by developers and users
                    alike, entails a number of very &#8216;material&#8217; implications. Firstly, it
                    is about the very <italic>existence</italic> of the system. In decentralized
                    networks, there is no external supporting infrastructure; if domestic computers
                    act as servers, server farms belonging to the &#8216;giants&#8217; can be
                    substantially reduced or don&#8217;t need to exist, potentially, thus organizing
                    the global infrastructure of the internet in a very different manner. Secondly,
                    it has implications for what users&#8217; machines are equipped to do or not,
                    the amount of control that users can exert on them, how they are appropriated by
                    users; e.g., if domestic computers have P2P clients installed on them, they make
                    specific uses of hardware such as Central Processing Units (CPUs) and hard
                    disks, that are different in a classical, centralized &#8216;cloud&#8217;
                    configuration.</p>
            </sec>
        </sec>
        <sec>
            <title>2. Network architecture, &#8216;politics by other means&#8217;</title>
            <p>&#8216;Study an information system and neglect its standards, wires, and settings,
                and you miss equally essential aspects of aesthetics, justice, and change,&#8217;
                once wrote STS scholar Susan Leigh Star (<xref ref-type="bibr" rid="B38">Star, 1999,
                    339</xref>). Indeed, the history of internet innovation suggests that the
                shaping of technical architectures populating the network of networks is, in the
                words of philosopher Bruno Latour, &#8216;politics by other means&#8217; (<xref
                    ref-type="bibr" rid="B22">Latour, 1988, 229</xref>). The ways in which
                architecture is politics, protocols are law, code shapes rights, are explored today
                by a number of different authors in relation to networked media (e.g. <xref
                    ref-type="bibr" rid="B24">Lessig, 1999</xref>; <xref ref-type="bibr" rid="B14"
                    >DeNardis, 2009</xref>); in particular, internet-related research has
                contributed to foster the debate on the intersection and overlap of governance by
                architecture with other forms of governance. This section, while not pretending to
                be exhaustive, discusses some of the most interesting approaches to the
                question.</p>
            <p>Information studies scholar and internet pioneer Philip Agre has addressed the
                relationship between technical architecture and institutions, notably the difference
                between &#8216;architecture as politics&#8217; and &#8216;architecture as a
                substitute for politics&#8217; (<xref ref-type="bibr" rid="B2">Agre, 2003</xref>).
                Defining architectures as the matrixes of concepts (e.g. the distinction between
                clients and servers) designed into technology, and institutions as the matrixes of
                concepts that organise language, rules, job titles, and other social categories in
                particular societal sectors, Agre suggests that the engineering story of rationally
                distributed computation and the political story of institutional change through
                decentralised architecture are not naturally related. They reconfigure and evolve
                constantly, and for these reconfigurations and evolutions to share a common
                direction, they need work: &#8216;Decentralized institutions do not imply
                decentralized architectures, or vice versa. The drive toward decentralized
                architectures need not serve the political purpose of decentralizing society.
                Architectures and institutions inevitably coevolve, and to the extent they can be
                designed, they should be designed together.&#8217; (<xref ref-type="bibr" rid="B2"
                    >Agre, 2003, 42</xref>). Also interested in the relationship between
                architectures and the organization of society, Terje Rasmussen (<xref
                    ref-type="bibr" rid="B33">2003</xref>) has argued that the technical model of
                the internet, and of the systems populating it, point towards central
                characteristics of modern societies. Thus, there is a structural match between the
                development of the internet and the transformation of the societies in which it
                operates. In this account, the technical infrastructure suggests a distributed
                society based on an ability to handle risk rather than central control.</p>
            <p>Working at the crossroads of informatics, economics and law, Barbara van Schewick
                explores the relationship between the architecture of the internet (and its
                applications), with economics and competition structures. Her work seeks to examine
                how changes, notably design choices, in internet architecture affect the economic
                environment for innovation, and evaluates the impact of these changes from the
                perspective of public policy (2010, 2). According to van Schewick, this is a first
                step towards filling a gap in how scholarship understands innovators&#8217;
                decisions to innovate and the economic environment for innovation. After many years
                of research on innovation processes, we understand how these are affected by changes
                in laws, norms, and prices; yet, we lack a similar understanding of how architecture
                and innovation impact each other, perhaps for the intrinsic appeal of architectures
                as purely technical systems (Ibid, 2&#8211;3). Traditionally, she concludes,
                policymakers have used the law to bring about desired economic effects. Architecture
                    <italic>de facto</italic> constitutes an alternative way of influencing economic
                systems, and as such, it is becoming another tool that actors can use to further
                their interests (Ibid, 389).</p>
            <p>The relationship between the design of technical architecture for networked media and
                the making of law has been an increasingly central interdisciplinary preoccupation
                since the late 90s/early 2000s. Early uses of the metaphor &#8216;code is law&#8217;
                can be found in William Mitchell&#8217;s <italic>City of Bits</italic> (1995) and in
                Joel Reidenberg&#8217;s article on <italic>lex informatica</italic>, the formation
                of information policy rules through technology (<xref ref-type="bibr" rid="B34"
                    >1998</xref>). However, legal scholars Yochai Benkler and Lawrence Lessig have
                arguably been the &#8216;scene-setters&#8217; in this field, with their work on
                sharing as a paradigm of economic production in its own right (<xref ref-type="bibr"
                    rid="B6">2004</xref>) and technical architecture as politics (1999),
                respectively. While the former argued for the rise of a &#8216;networked information
                economy&#8217; as a system of &#8216;production, distribution, and consumption of
                information goods characterized by decentralized individual action carried out
                through widely distributed, nonmarket means&#8217; (<xref ref-type="bibr" rid="B7"
                    >Benkler, 2006</xref>), the latter introduced technical architecture as one out
                of the four main (and interconnected) society regulators, the other three being law,
                market and norms. The application of this principle to the text of computer programs
                led to what remains, perhaps, the most famous incarnation of the famous &#8216;code
                is law&#8217; label (<xref ref-type="bibr" rid="B24">Lessig, 1999</xref>).</p>
            <p>Among the scholars that have since been inspired by this line of inquiry, Niva
                Elkin-Koren is especially interesting. In her work (e.g. <xref ref-type="bibr"
                    rid="B19">2006</xref>, <xref ref-type="bibr" rid="B20">2012</xref>),
                architecture is understood as a dynamic parameter in the reciprocal influences of
                law and technology design, in the field of information and communication systems.
                The interrelationship between law and technology often focuses on one single aspect,
                the challenges that emerging technologies pose to the existing legal regime, thereby
                creating a need for further legal reform; however, the author argues, juridical
                measures involving technology both as a target of regulation and as a means of
                enforcement should take into account that the law does not merely respond to new
                technologies, but also shapes them and may affect their design (<xref
                    ref-type="bibr" rid="B19">Elkin-Koren, 2006</xref>). Interestingly, the work of
                Tim Wu adds layers to the conceptualization of code&#8217;s relationship with law,
                moving from Lessig&#8217;s concept that computer code can substitute for law or
                other forms of regulation, to code as an anti-regulatory mechanism tool that certain
                groups will use to their advantage to minimize the costs of law &#8211; the
                possibility of &#8216;using code design as an alternative mechanism of interest
                group behavior&#8217; (<xref ref-type="bibr" rid="B43">Wu, 2003</xref>).</p>
            <sec>
                <title>2.1. Architecture and the future(s) of the internet</title>
                <p>The current trajectories of innovation for the internet are making it
                    increasingly evident by the day: the evolutions (and
                    <italic>in-</italic>volutions) of the network of networks are likely to depend
                    in the medium-to-long term on the topology and the organisational/technical
                    model of internet-based applications, as well as on the infrastructure
                    underlying them (<xref ref-type="bibr" rid="B4">Aigrain, 2011</xref>). This is
                    illustrated by what has been this author&#8217;s main research focus of the past
                    few years: the development of internet-based services &#8211; search engines,
                    storage platforms, video streaming applications &#8211; based on decentralised
                    network architectures (<xref ref-type="bibr" rid="B32">Musiani,
                    2013b</xref>).</p>
                <p>The concept of decentralisation is somehow shaped and inscribed into the very
                    beginnings of the internet &#8211; notably in the organisation and circulation
                    of data packets &#8211; but its current topology integrates this structuring
                    principle only in very limited ways (<xref ref-type="bibr" rid="B26">Minar &amp;
                        Hedlund, 2001</xref>). The limits of the concentrated and centralised
                    urbanism of the internet, which has been predominant since the beginning of its
                    commercial era and its appropriation by the masses, are sometimes highlighted by
                    the same phenomena that have contributed to its widespread success, such as
                    social media (<xref ref-type="bibr" rid="B36">Schafer, Le Crosnier &amp;
                        Musiani, 2011</xref>). While internet users have become, at least
                    potentially, not just consumers but also distributors, sharers and producers of
                    digital content, the network of networks is structured in such a way that large
                    quantities of data are centralised and compressed within specific regions of the
                    internet. At the same time, such data are most suited to a rapid re-diffusion
                    and re-sharing in multiple locations of a network that has now reached an
                    unprecedented level of globalization. The current organisation of internet-based
                    services and the structure of the network that enables their functioning &#8211;
                    with its mandatory passage points, places of storage and trade, required
                    intersections &#8211; raises many questions, in terms of the optimised
                    utilisation of resources, the fluidity, rapidity and effectiveness of electronic
                    exchanges, the security of exchanges, the stability of the network.</p>
                <p>Beyond technology, these questions are deeply social and political, and affect
                    the &#8216;ramifications of possibles&#8217; (<xref ref-type="bibr" rid="B21"
                        >Gai, 2007</xref>) the internet is currently facing for its near-term
                    future. They affect the balance of powers between users and service providers,
                    and impact net neutrality. To what extent can network providers interfere with
                    specific uses? Can the network be optimised for specific uses? By enabling
                    individuals, communities and companies to use the internet in the way that
                    creates the most value for them, changes in architecture are likely to increase
                    or diminish the internet&#8217;s overall value to society. Goals such as user
                    choice, non-discrimination, non-optimisation, may be achieved in a variety of
                    ways according to different designs of network architecture (<xref
                        ref-type="bibr" rid="B41">van Schewick, 2010, 387</xref>). Resorting to
                    decentralised architectures and distributed organisational forms, then,
                    constitutes a different way to address some issues of management of the network,
                    in a perspective of effectiveness, security and digital &#8216;sustainable
                    development&#8217; (better resource management), and of maximisation of its
                    value to society.</p>
                <p>Since the heyday of Napster, which marked the beginning of P2P&#8217;s
                    &#8216;public&#8217; history, decentralized networks have mostly been
                    considered, from a political and legal viewpoint, as a threat for the digital
                    content industry. The most widespread use of such networks being the
                    unauthorized sharing of music or video files, the problem of intellectual
                    property rights has imposed itself as the predominant political and media
                    framing of P2P networks and their uses. However, an equally relevant research
                    question to ask is whether the diversity of P2P appropriations gives way to the
                    construction of a social, political and economic <italic>opportunity</italic>
                    for internet-based services, as well as an <italic>alternative</italic> to the
                    predominant server-based concentration models.</p>
                <p>Thus, the &#8216;stories of P2P&#8217; that my recent research has been concerned
                    with are representatives of a particular category of decentralized systems.
                    Sladder is a British start-up offering a search engine decentralized at multiple
                    levels of its technical architecture, aiming at making affinities and
                    preferences of users a crucial component of query results. Drizzle is a Swiss
                    start-up that once proposed a distributed file storage system, which also
                    includes social networking features.<xref ref-type="fn" rid="n3">3</xref>
                    Delenk, a BitTorrent-based decentralized video streaming system funded by the
                    European Union, is an occasion to observe the political and technical
                    mobilization of P2P as an alternative model for audio-visual services via the
                        internet.<xref ref-type="fn" rid="n4">4</xref> All three projects wish to
                    propose alternatives, based on decentralized or P2P architectures, to online
                    services occupying an important place in the daily lives of internet users. The
                    purposes of these systems are applications such as search, storage, streaming,
                    the same that are provided by the &#8216;big players&#8217; of the internet,
                    such as Google, Dropbox, YouTube. They are designed to meet the same
                    requirements as these services, from the perspective of the end user (who will
                    continue to search for words, store photos, or watch a video), but are built on
                    a different technical platform that leverages the potential of P2P and
                    decentralization.</p>
            </sec>
        </sec>
        <sec>
            <title>3. Architectures shaping user rights: a flavour of ethnography</title>
            <p>Systems based on distributed, decentralized, P2P architectures seek their place today
                in an IT landscape that is mostly one of concentration and removal from users&#8217;
                machines. Sharing, regrouping and stocking information and data in the most popular,
                and widespread, internet services of today means promoting a model in which traffic
                is redirected towards an ensemble of machines, placed under the exclusive and direct
                control of the service provider. Thus, exchanges between users are made by
                &#8216;copying&#8217; data that one wishes to share on one or more external
                terminals, or by giving these machines the permission to index this information. The
                ways in which data circulate, are stored and are written in these machines are, most
                of the times, opaque; moreover, the rights that the service provider acquires on
                such data are often excessive with respect to those maintained by the end user
                &#8211; in oft-unclear ways for users themselves.</p>
            <p>When the operations of data treatment and handling are conducted, partially or
                totally, on users&#8217; terminals directly linked together, this choice of network
                architecture contributes to build specific definitions and implementations of
                privacy protection. It modifies the ways in which the control on informational data
                and the responsibility for their protection are spread out to the users, the service
                providers, the developers who have created the service. Distributed networking
                models challenge &#8216;by architecture&#8217; the extent, the balance and the very
                definition of the rights obtained by service providers on users&#8217; personal
                data, vis-&#224;-vis the rights that users maintain on such data. This often comes
                with a trade-off: on one hand, the user sees her privacy reinforced by the
                possibility of an augmented control on her data, and on the ways in which they are
                treated by the P2P client. However, simultaneously and for the same reasons, her
                responsibility for the actions she undertakes within and by means of the application
                is increased as well, while the provider surrenders voluntarily some of its control
                on the data and content present on the service. The collective dimension of this
                responsibility is also emphasized, and the collective consequences of individual
                infractions highlighted &#8211; regardless of whether the infraction is the storage
                of inappropriate content, the introduction of unreliable information or spam in a
                distributed search index, or a &#8216;selfish&#8217; management of the bandwidth
                shared by a P2P streaming system.</p>
            <p>Three cases of internet services based on a decentralized network architecture
                &#8211; a search engine, a storage platform and a video streaming software, studied
                between 2009 and 2011 &#8211; have shown how a definition of privacy &#8216;by
                design&#8217;, more specifically by architectural design, takes shape in internet
                services (<xref ref-type="bibr" rid="B32">Musiani, 2013b</xref>). With this
                alternative, &#8216;techno-legal&#8217; way of defining privacy, a central role is
                attributed to the constraints and the opportunities of privacy protection that are
                inscribed into the technical model chosen by developers (<xref ref-type="bibr"
                    rid="B35">Schaar, 2010</xref>).</p>
            <p>Sladder, a P2P search engine developed first in Germany, then in the United Kingdom,
                displays a &#8216;six-levels&#8217; distribution model, which must prevent the
                traceability of queries by a central entity. This model is intended to preserve
                personal data within the user&#8217;s own terminal and the P2P client installed on
                it &#8211; unless they are encrypted beforehand, on that very terminal, before they
                leave it. This feature also allows the developers to work towards reducing the
                tension &#8211; which is a priori very difficult to eliminate &#8211; between the
                confidentiality of personal information and the personalization of search queries,
                the latter being the &#8216;added value&#8217; that social dynamics add to the
                search engine, and which is based on the very collection of this personal
                information.</p>
            <p>The case of Delenk, a P2P video streaming tool first developed at a Dutch technical
                university, offers another occasion to follow this tension, as the logic underlying
                the system is that the history of downloads made by a user are shared by default
                with other users so as to nourish the software&#8217;s &#8216;recommendation&#8217;
                algorithm. The solution envisaged by the developers has, once again, to do with an
                idea of &#8216;privacy by architectural design&#8217;, as it builds on the
                decentralized and distributed model to mitigate, in the eyes of users, the
                impression of exposure and revelation of themselves that the system&#8217;s social
                features may provoke: not only can the feature be disabled, but it only sends the
                download history to other users &#8211; it doesn&#8217;t keep the information on any
                server controlled by the service.</p>
            <p>Finally, Drizzle, a (formerly) distributed storage platform developed in Switzerland,
                displayed similar attempts to protect user privacy by architecture. The heart of
                this service was the user&#8217;s terminal, where, thanks to a dedicated P2P client,
                the operations of encryption and fragmentation of stored data took place. These two
                operations &#8211; conducted before any other operation leading to share, download
                or circulate data in the network &#8211; were meant, in the vision of
                Drizzle&#8217;s developers, as evidence given to the users that the service
                provider, regardless of its intentions, did not even possess the technical means to
                break user trust in the system. The following section delves into this case study in
                some more detail.</p>
            <sec>
                <title>3.1. Achieving privacy by design in decentralized storage</title>
                <p>In early 2007, when Drizzle first sees the light, the industry of online data
                    storage &#8211; a service allowing users to store, save and share data on one or
                    several terminals connected to the internet &#8211; is in full development.
                    Google, Amazon, Microsoft and Oracle, to name but a few, propose their storage
                    platforms, each with its specificities and one common denominator: the
                    &#8216;cloud&#8217;. According to this model, the service provider is in charge
                    of both the physical infrastructure and the software. Thus, the service provider
                    hosts applications and data at once &#8211; in a location, and according to
                    modalities, unknown to or at best ambiguous for the user (<xref ref-type="bibr"
                        rid="B29">Mowbray, 2009</xref>). The so-called &#8216;server farms&#8217;
                    proliferate, to support and manage this increasing <italic>remoteness</italic>
                    of data from users and users&#8217; terminals.</p>
                <p>In this context, Drizzle, a small start-up founded by two developers and computer
                    programmers who we will call Dietrich and Kurt, makes an unusual foundational
                    decision: its cloud storage platform will mainly be composed &#8211; alongside
                    more &#8216;classical&#8217; data centres &#8211; of portions of the
                    users&#8217; hard disks, directly linked in a peer-to-peer, decentralised
                    network architecture (Schollmeier, 2001; <xref ref-type="bibr" rid="B39">Taylor
                        &amp; Harrison, 2009</xref>). This choice entails a number of peculiar
                    features. On the one hand, the implementation of a technical process defined as
                    &#8216;encrypted fragmentation&#8217;, which consists in encrypting locally
                    &#8211; on the user&#8217;s computer, and by means of a previously installed
                    Drizzle P2P client &#8211; the content that will be stored. The content is then
                    divided into fragments, duplicated to ensure redundancy, and spread out to the
                    network. In return, users need to accept to &#8216;pool&#8217; &#8211; put at
                    the disposal of other users and their computers &#8211; the computational and
                    material resources necessary for the operations related to the storage of
                    content. As the service&#8217;s terms of use point out: &#8216;The user
                    acknowledges that Drizzle may use processor, bandwidth and hard disk (or other
                    storage media) of his computer for the purpose of storing, encrypting, caching
                    and serving data that has been stored in Drizzle by the user or any other users.
                    The user can specify the extent to which local resources are used in the
                    settings of the Drizzle client software. The amount of resources the user is
                    allowed to use in Drizzle depends on the amount of local resources the user is
                    contributing to Drizzle.&#8217; The interdependent and egalitarian model
                    subtending the platform will allow its users to barter their local disk space
                    with an equivalent space in the decentralised cloud, thereby improving the
                    quality of this storage space, which will become permanently available and
                    accessible.</p>
                <p>By shaping their decentralised storage service, the developers of Drizzle carry
                    on a double experimentation: with the frontier between centralisation and
                    decentralisation, and with sharing modalities that blend peer-to-peer, social
                    networking and the cloud. Drizzle&#8217;s first steps are taken in a community
                    of research and development that tries to counter the social media
                    &#8216;explosion&#8217; by developing P2P systems as an alternative to a variety
                    of internet-based services, including social networks, structured in a
                    centralised manner (<xref ref-type="bibr" rid="B23">Le Fessant, 2009</xref>). In
                    a context of user exposure on social networking sites and cloud-based services,
                    and the increasingly widespread storage of applications and data in locations
                    and ways unknown or at best ambiguous, several developers &#8211; including
                    Drizzle&#8217;s &#8211; identify in a peer-to-peer type of network architecture
                    a possible way of approaching the protection of personal data privacy with a
                    different angle: through the relocation and &#8216;re-appropriation&#8217; of
                    data within the terminals of users, who would be able to host their own profiles
                    and the information they contain (see also <xref ref-type="bibr" rid="B28"
                        >Moglen, 2010</xref>; <xref ref-type="bibr" rid="B3">Aigrain, 2010</xref>,
                        <xref ref-type="bibr" rid="B4">2011</xref>).</p>
                <p>As in the development of Drizzle, a conception of privacy and confidentiality of
                    personal data, which is conceived of and enforced via technical means &#8211;
                    called <italic>privacy by design</italic> (<xref ref-type="bibr" rid="B11"
                        >Cavoukian, 2010</xref>; <xref ref-type="bibr" rid="B35">Schaar,
                    2010</xref>), is at work. This conceptualisation of privacy is defined by means
                    of the constraints and the opportunities linked to the treatment and the
                    location of data, according to the different moments and the variety of
                    operations taking place within the system. In particular, the confidentiality of
                    data (personal data as well as the content stored in the P2P cloud) is defined
                    by the peculiar role and enhanced features attributed to the password that
                    identifies the user <italic>vis-&#224;-vis</italic> the network.</p>
                <p>In Dietrich&#8217;s intentions, the role of the user-selected and
                    user&#8211;generated password for the Drizzle system should have
                    &#8216;stri[cken] the user as soon as he had access to the system for the very
                    first time.&#8217; Indeed, the virtual form that is served to users upon
                    subscription may come as a surprise: it informs that &#8216;We do not know your
                    password as it never leaves your computer. Please, do not forget your password
                    and use, if needed, your password hint.&#8217; The status of the password is
                    thus negotiated, beyond its usual meaning of unique identifier
                        <italic>vis-&#224;-vis</italic> the system, to define, detail and legitimise
                    the process of local encryption and decryption of data within the Drizzle
                    system. This feature comes to symbolise the specificity of Drizzle&#8217;s
                    promise of security and privacy as well as users&#8217; trust, as it becomes the
                    symbol and the graphical representation of the &#8216;local&#8217; dimension of
                    the encryption process &#8211; as it never leaves the computer of the user who
                    created it. The operations, for the most part automatically managed, that are
                    linked to the protection of personal data are thus hosted on the terminals of
                    users. Indeed, this entails a modification of the user&#8217;s role within the
                    service&#8217;s architecture: node among equal nodes, it becomes a server
                    itself, instead of a starting point and a final point for operations that are
                    otherwise conducted on another machine or group of machines.</p>
                <p>Through the attribution of this status to the password, the developers of Drizzle
                    are also proposing an alternative to the balance between the rights exerted by
                    users on their own data and the rights acquired by the service provider on these
                    same data &#8211; a balance that is usually heavily bent on the provider&#8217;s
                    side. However, this reconfiguration in the balance of rights comes with a
                    trade-off. As the password stays with the user and is not sent to the servers
                    controlled by the firm, the latter cannot retrieve the password if needed. Thus,
                    users do not only see their privacy reinforced, but at the same time and for the
                    same reasons, the responsibility for their actions is augmented &#8211; while
                    the service provider renounces some of its control over the content that
                    circulates thanks to the service it manages. The meaning of this
                    &#8216;renunciation&#8217;, Dietrich explains, is double: on the one hand, the
                    Drizzle team wishes to make it evident, almost <italic>translate</italic> into a
                    specific object the user can easily relate to, the &#8216;obscure&#8217; and
                    unfamiliar process of client-side encryption, which is an on going source of
                    controversies and perplexities. On the other hand, it is also a matter of
                    Drizzle&#8217;s business model: the more the firm knows about its users, the
                    more it is mandatory for it to submit the users to regular surveillance and
                    control &#8211; and this requires an investment of material resources and time
                    that, in its first phases of existence, the firm does not have: &#8216;If we can
                    know what is in your account, starting with your password, we have heightened
                    obligations to police the content and to make sure nobody can eavesdrop on the
                    traffic.&#8217;</p>
                <p>The development of Drizzle&#8217;s &#8216;peer-to-peer cloud&#8217; allows to
                    observe how changes in the architectural design of networked services affect
                    data circulation, storage and privacy &#8211; and in doing so, reconfigure the
                    articulation of the &#8216;locality&#8217; and the &#8216;centrality&#8217; in
                    the network (<xref ref-type="bibr" rid="B5">Akrich, 1989: 39</xref>), suggesting
                    a model of decentralised governance &#8216;by architectural design&#8217; for
                    the service. Ultimately, decentralising the cloud leads to a reformulation and
                    &#8216;re-balancing&#8217; of the relationship between the user and the service
                    provider. The local, client-side encryption of data first, and its fragmentation
                    afterwards &#8211; both operations conducted within the P2P client installed by
                    the user, and entirely taking place on his terminal &#8211; are proposed by
                    Drizzle as evidence that the firm, in its own words, &#8216;does not even have
                    the technical means&#8217; to betray the trust of users. In particular, this
                    conception of <italic>privacy by design</italic> takes shape around the
                    password, which remains locally stored in the user&#8217;s P2P client and
                    unknown to the service provider. In doing so, it becomes a form of disengagement
                    of the service provider with respect to security issues, its
                    &#8216;auto-release&#8217; from responsibility: a detail whose importance may
                    seem small at first, but eventually leads to changes in the forms of technical
                    solidarity (<xref ref-type="bibr" rid="B18">Dodier, 1995</xref>) established
                    between users and service provider.</p>
            </sec>
        </sec>
        <sec>
            <title>4. How (de-) centralized architectures matter for internet governance</title>
            <p>The critiques targeting the interdisciplinary, emerging research field of internet
                governance &#8211; from the difficulty of establishing precise definitions, to the
                alleged &#8216;unholy marriages&#8217; with its subject of study &#8211; do not
                jeopardize the validity and the interest of a field that is not only &#8216;in the
                making&#8217;, but interested in an especially dynamic object (<xref ref-type="bibr"
                    rid="B9">Brousseau &amp; Marzouki, 2012</xref>). However, it needs to be
                acknowledged, as Michel van Eeten and Milton Mueller do, that the literature
                describing itself as specialized in the internet governance field often tends to
                focus on a limited number of international institutions and debates about the global
                politics of the internet. The &#8216;internet governance&#8217; qualification does
                not generally apply to the study of a number of activities and daily practices, on
                and with the internet, that play a very important role in the shaping and the
                regulation of the &#8216;network of networks&#8217; (<xref ref-type="bibr" rid="B40"
                    >van Eeten &amp; Mueller, 2013</xref>).</p>
            <p>Paying close attention to the tensions between the dwarfs and the giants of the Net
                &#8211; the tensions between technical and organizational models, and their
                &#8216;political&#8217; consequences &#8211; can contribute, as Tarek Cheniti has
                pointed out, to a disengagement from an all-too-frequent dualist conception of the
                internet as an <italic>a priori</italic> identifiable and rigidly bounded space:
                either a stranger to the institutional forces of the off-line &#8216;reality&#8217;,
                or on the contrary, entirely entrenched behind the codified spaces of traditional
                politics (<xref ref-type="bibr" rid="B12">Cheniti, 2009</xref>). This perspective
                allows to give emphasis in the analysis to the set of mechanisms that lead different
                participants in the technical, political and economic management of the
                &#8216;network of networks&#8217; to build common knowledge, legitimize some of it
                as facts of the internet, and shape limits and boundaries able to reconcile the
                concerns of both experts and users. It helps identifying and presenting different
                versions of the worlds in which notions of governance take place, before defining
                what governance actually is (<xref ref-type="bibr" rid="B44">Ziewitz and Pentzold,
                    2013</xref>).</p>
            <p>Arrangements of technical architecture have always inherently been arrangements of
                power, writes Laura DeNardis (<xref ref-type="bibr" rid="B17">2014</xref>): the
                technical architecture of networked systems does not only affect internet
                governance, but <italic>is</italic> internet governance. This governance by
                architecture, or &#8216;governance by design&#8217; (<xref ref-type="bibr" rid="B13"
                    >De Filippi, Dulong de Rosnay &amp; Musiani, 2013</xref>), has important
                implications at a number of levels, of which the previous section, centred on
                privacy and the ways in which it can be implemented by architectural design, has
                given but one example.</p>
            <p>Changes in architectural design affect the repartition of competences and
                responsibilities between service providers, content producers, users and network
                operators. They affect forms of engagement and <italic>int&#233;ressement</italic>
                    (<xref ref-type="bibr" rid="B10">Callon, 2006</xref>) in networked systems, of
                users first and foremost, but also of other actors concerned by the implementation
                and the operations of internet services. They shape the sustainability of the
                underlying economic models and the technical and legal approaches to the management
                of digital content and personal data. They make visible, in various configurations,
                the forms of interaction between the local and the global, the patterns of
                articulation between the individual and the collective.</p>
            <p>Changes in network architectures contribute to the shaping of user rights, of the
                ways to produce and enforce law, and are reconfigured in return. A number of legal
                issues, that go way beyond copyright (despite having often been reduced to this
                aspect, notably in the case of peer-to-peer systems), are raised by architectural
                configurations of internet services. To preserve the internet&#8217;s &#8216;social
                value&#8217; (<xref ref-type="bibr" rid="B41">van Schewick, 2010</xref>), it is
                important to achieve reliable forms of regulation &#8211; technical, political, or
                both &#8211; without impeding present and future innovation.</p>
            <p>Changes in architectures do, finally, contribute to shift the boundary between public
                and private uses of the internet as a global facility: they are a crucial factor in
                defining intellectual property rights, the right to privacy of users/clients, or
                their rights of access to content. They contribute to define what is a contributor
                in internet-based services, in terms of computing resources required for operating
                the system, and of content.</p>
            <p>In the end, technical architecture appears as one of the strongest, if not the
                strongest, structuring element of internet governance: what is shaped into
                architecture and infrastructure can seldom be undone by institutional negotiation
                and dialogue alone, and institutions find it increasingly complicated to keep up
                with &#8216;creative&#8217; governance by architecture and by infrastructure (see
                    <xref ref-type="bibr" rid="B15">DeNardis, 2012</xref>). In this sense, future
                evolutions of internet governance as a field would do well to fully take into
                account Michel van Eeten and Milton Mueller&#8217;s suggestion to expand to areas
                such as the economics of cybercrime and cybersecurity, network neutrality, content
                filtering and regulation, infrastructure-based copyright enforcement, and
                interconnection arrangements among ISPs (<xref ref-type="bibr" rid="B40">van Eeten
                    &amp; Mueller, 2013</xref>).</p>
            <p>Information and communication technologies, the internet first and foremost, are
                increasingly mobilized to serve broader economic, political and military aims,
                ranging from the theft of strategic data to the hijacking of industrial systems. The
                rise of techniques, devices and infrastructures destined to facilitate digital
                espionage, data collection and aggregation, tracking and surveillance is highlighted
                not only by the recent Snowden revelations, but also by the construction and the
                organization of a dedicated, increasingly widespread and lucrative market. What lies
                under the internet governance label is, in fact, an ensemble of fluidly-contoured
                socio-political and socio-technical controversies, which have in STS-informed
                approaches to network architecture &#8211; its centralization and decentralization
                &#8211; one of the best opportunities to be thoroughly accounted for, richly
                described and extensively analysed.</p>
        </sec>
        <sec>
            <title>5. Conclusions</title>
            <p>If it is possible to design in detail the architecture of the world users interact
                with, it is possible to design the architecture of our global communication
                infrastructure in order to promote specific types of political, economic and legal
                interactions over others (<xref ref-type="bibr" rid="B13">De Filippi et al.,
                    2013</xref>) with important consequences for the ways in which the future
                internet will be governed, and for the extent to which its users will be not only
                customers, but citizens.</p>
            <p>Technical architectures, as argued by several authors discussed in this article, may
                be understood as alternative ways of influencing economic systems, sets of rules,
                communities of practice &#8211; indeed, as the very fabric of user behaviour and
                interaction. They are very &#8216;material&#8217; devices of governance, as well,
                embedded in the reconfigurations of traffic flows, redistribution of computing
                power, rearrangements of storage space, downloads of P2P clients, availability and
                performance of hard disks. The status of every internet user as consumer, sharer,
                producer and possibly manager of digital content is informed by, and shapes in
                return, the technical structure and organisation of the services she has access
                to.</p>
            <p>It is in this sense that network architecture is internet governance: changes in the
                design of the networks subtending internet-based services, and the global internet
                itself, affect the &#8216;politics by other means&#8217; (<xref ref-type="bibr"
                    rid="B22">Latour, 1988: 229</xref>) of the <italic>network of networks</italic>
                &#8211; the balance of rights between users and providers, the capacity of online
                communities to engage in open and direct interaction, the fair competition between
                actors within the internet market.</p>
        </sec>
        <sec>
            <title>Competing Interests</title>
            <p>The author declares that they have no competing interests.</p>
        </sec>
    </body>
    <back>
        <fn-group>
            <fn id="n1">
                <p>This work is supported by the French National Agency for Research (ANR) within
                    the frame of the programme <italic>ADAM &#8211; Architecture distribu&#233;e et
                        applications multim&#233;dias</italic>. An earlier draft of this paper was
                    presented at the Eighth Symposium of the Global Internet Governance Academic
                    Network (GigaNet) in Bali, Indonesia, October 2013.</p>
            </fn>
            <fn id="n2">
                <p>Internet governance today is a lively, emerging field, and its definition
                    relentlessly contested by different groups across political and ideological
                    lines. A &#8216;working definition&#8217; of IG has been provided in the past,
                    after the United Nations-initiated World Summit on the Information Society
                    (WSIS), by the Working Group on Internet Governance &#8211; a definition that
                    has reached wide consensus because of its inclusiveness, but is perhaps too
                    broad to be useful for drawing more precisely the boundaries of the field (<xref
                        ref-type="bibr" rid="B25">Malcolm, 2008</xref>): &#8216;Internet governance
                    is the development and application by Governments, the private sector and civil
                    society, in their respective roles, of shared principles, norms, rules,
                    decision-making procedures, and programmes that shape the evolution and use of
                    the internet&#8217; (<xref ref-type="bibr" rid="B42">WGIG, 2005</xref>). This
                    broad definition implies the involvement of a plurality of actors, and the
                    possibility for them to deploy a plurality of governance mechanisms. IG has been
                    described as a mix of technical coordination, standards, and policies (e.g.
                        <xref ref-type="bibr" rid="B25">Malcolm, 2008</xref> and <xref
                        ref-type="bibr" rid="B30">Mueller, 2010</xref>). See also (<xref
                        ref-type="bibr" rid="B16">DeNardis, 2013</xref>) and (<xref ref-type="bibr"
                        rid="B31">Musiani, 2013a</xref>).</p>
            </fn>
            <fn id="n3">
                <p>The decentralized mechanism subtending the Drizzle system, a trade between local
                    storage space and space in a &#8216;P2P storage cloud&#8217; spread out to the
                    users, was discontinued in September 2011.</p>
            </fn>
            <fn id="n4">
                <p>The names used in the case studies are fictitious.</p>
            </fn>
        </fn-group>
        <ref-list>
            <ref id="B1">
                <label>1</label>
                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Abbate</surname>
                            <given-names>J.</given-names>
                        </name>
                    </person-group>
                    <article-title>L&#8217;histoire de l&#8217;internet au prisme des
                        STS</article-title>
                    <source>Le temps des m&#233;dias</source>
                    <year iso-8601-date="2012">2012</year>
                    <volume>18</volume>
                    <fpage>170</fpage>
                    <lpage>180</lpage>
                    <pub-id pub-id-type="doi">10.3917/tdm.018.0170</pub-id>
                </element-citation>
            </ref>
            <ref id="B2">
                <label>2</label>
                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Agre</surname>
                            <given-names>P.</given-names>
                        </name>
                    </person-group>
                    <article-title>Peer-to-Peer and the promise of internet equality</article-title>
                    <source>Communications of the ACM</source>
                    <year iso-8601-date="2003">2003</year>
                    <volume>46</volume>
                    <issue>2</issue>
                    <fpage>39</fpage>
                    <lpage>42</lpage>
                    <pub-id pub-id-type="doi">10.1145/606272.606298</pub-id>
                </element-citation>
            </ref>
            <ref id="B3">
                <label>3</label>
                <element-citation publication-type="webpage">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Aigrain</surname>
                            <given-names>P.</given-names>
                        </name>
                    </person-group>
                    <article-title>Declouding freedom: reclaiming servers, services and data. In
                        2020 FLOSS Roadmap (2010 Version/3rd Edition)</article-title>
                    <year iso-8601-date="2010">2010</year>
                    <comment>available at
                            <uri>https://flossroadmap.co-ment.com/text/NUFVxf6wwK2/view/</uri>
                        (accessed 13 June 2014).</comment>
                </element-citation>
            </ref>
            <ref id="B4">
                <label>4</label>
                <element-citation publication-type="confproc">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Aigrain</surname>
                            <given-names>P.</given-names>
                        </name>
                    </person-group>
                    <source>Another Narrative</source>
                    <conf-name>Addressing Research Challenges and Other Open Issues session,
                        PARADISO Conference</conf-name>
                    <conf-date>7-9 Sept</conf-date>
                    <year iso-8601-date="2011">2011</year>
                    <conf-loc>Brussels</conf-loc>
                </element-citation>
            </ref>
            <ref id="B5">
                <label>5</label>
                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Akrich</surname>
                            <given-names>M.</given-names>
                        </name>
                    </person-group>
                    <article-title>De la position relative des localit&#233;s: syst&#232;mes
                        &#233;lectriques et r&#233;seaux socio-politiques</article-title>
                    <source>Cahiers du Centre d&#8217;&#201;tudes pour l&#8217;Emploi</source>
                    <year iso-8601-date="1989">1989</year>
                    <volume>32</volume>
                    <fpage>117</fpage>
                    <lpage>166</lpage>
                </element-citation>
            </ref>
            <ref id="B6">
                <label>6</label>
                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Benkler</surname>
                            <given-names>Y.</given-names>
                        </name>
                    </person-group>
                    <article-title>Sharing nicely: on shareable goods and the emergence of sharing
                        as a modality of economic production</article-title>
                    <source>The Yale Law Journal</source>
                    <year iso-8601-date="2004">2004</year>
                    <volume>114</volume>
                    <issue>2</issue>
                    <fpage>273</fpage>
                    <lpage>358</lpage>
                    <pub-id pub-id-type="doi">10.2307/4135731</pub-id>
                </element-citation>
            </ref>
            <ref id="B7">
                <label>7</label>
                <element-citation publication-type="book">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Benkler</surname>
                            <given-names>Y.</given-names>
                        </name>
                    </person-group>
                    <source>The Wealth of Networks: How Social Production Transforms Markets and
                        Freedom</source>
                    <year iso-8601-date="2006">2006</year>
                    <publisher-loc>New Haven, CT</publisher-loc>
                    <publisher-name>Yale University Press</publisher-name>
                </element-citation>
            </ref>
            <ref id="B8">
                <label>8</label>
                <element-citation publication-type="book">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Bowker</surname>
                            <given-names>G. C.</given-names>
                        </name>
                    </person-group>
                    <person-group person-group-type="editor">
                        <name>
                            <surname>Musiani</surname>
                            <given-names>F.</given-names>
                        </name>
                    </person-group>
                    <article-title>Preface</article-title>
                    <source>Nains sans g&#233;ants. Architecture d&#233;centralis&#233;e et services
                        internet</source>
                    <year iso-8601-date="2013">2013</year>
                    <publisher-loc>Paris</publisher-loc>
                    <publisher-name>Presses des Mines</publisher-name>
                    <fpage>7</fpage>
                    <lpage>8</lpage>
                </element-citation>
            </ref>
            <ref id="B9">
                <label>9</label>
                <element-citation publication-type="book">
                    <person-group person-group-type="editor">
                        <name>
                            <surname>Brousseau</surname>
                            <given-names>E.</given-names>
                        </name>
                        <name>
                            <surname>Marzouki</surname>
                            <given-names>M.</given-names>
                        </name>
                        <name>
                            <surname>M&#233;adel</surname>
                            <given-names>C.</given-names>
                        </name>
                    </person-group>
                    <source>Governance, Regulations and Powers on the Internet</source>
                    <year iso-8601-date="2012">2012</year>
                    <publisher-loc>Cambridge</publisher-loc>
                    <publisher-name>Cambridge University Press</publisher-name>
                </element-citation>
            </ref>
            <ref id="B10">
                <label>10</label>
                <element-citation publication-type="book">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Callon</surname>
                            <given-names>M.</given-names>
                        </name>
                    </person-group>
                    <person-group person-group-type="editor">
                        <name>
                            <surname>Akrich</surname>
                            <given-names>M.</given-names>
                        </name>
                        <name>
                            <surname>Callon</surname>
                            <given-names>M.</given-names>
                        </name>
                        <name>
                            <surname>Latour</surname>
                            <given-names>B.</given-names>
                        </name>
                    </person-group>
                    <article-title>Sociologie de l&#8217;acteur-r&#233;seau</article-title>
                    <source>Sociologie de la traduction: textes fondateurs</source>
                    <year iso-8601-date="2006">2006</year>
                    <publisher-loc>Paris</publisher-loc>
                    <publisher-name>Presses des Mines</publisher-name>
                    <fpage>267</fpage>
                    <lpage>276</lpage>
                </element-citation>
            </ref>
            <ref id="B11">
                <label>11</label>
                <element-citation publication-type="journal">
                    <person-group person-group-type="editor">
                        <name>
                            <surname>Cavoukian</surname>
                            <given-names>A.</given-names>
                        </name>
                    </person-group>
                    <article-title>Special issue: Privacy by design: The next generation in the
                        evolution of privacy</article-title>
                    <source>Identity in the Information Society</source>
                    <year iso-8601-date="2010">2010</year>
                    <volume>3</volume>
                    <issue>2</issue>
                </element-citation>
            </ref>
            <ref id="B12">
                <label>12</label>
                <element-citation publication-type="thesis">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Cheniti</surname>
                            <given-names>T.</given-names>
                        </name>
                    </person-group>
                    <source>Global Internet Governance in Practice: Mundane Encounters and Multiple
                        Enactments. Unpublished DPhil Thesis</source>
                    <year iso-8601-date="2009">2009</year>
                    <publisher-name>University of Oxford</publisher-name>
                </element-citation>
            </ref>
            <ref id="B13">
                <label>13</label>
                <element-citation publication-type="confproc">
                    <person-group person-group-type="author">
                        <name>
                            <surname>De Filippi</surname>
                            <given-names>P.</given-names>
                        </name>
                        <name>
                            <surname>Dulong de Rosnay</surname>
                            <given-names>M.</given-names>
                        </name>
                        <name>
                            <surname>Musiani</surname>
                            <given-names>F.</given-names>
                        </name>
                    </person-group>
                    <source>Peer production online communities, distributed architectures and
                        governance by design</source>
                    <conf-name>Communication presented at the Fourth Transforming Audiences
                        Conference</conf-name>
                    <conf-date>September, 3</conf-date>
                    <year iso-8601-date="2013">2013</year>
                    <conf-loc>University of Westminster, London</conf-loc>
                    <comment>PMCid: PMC4089856</comment>
                </element-citation>
            </ref>
            <ref id="B14">
                <label>14</label>
                <element-citation publication-type="book">
                    <person-group person-group-type="author">
                        <name>
                            <surname>DeNardis</surname>
                            <given-names>L.</given-names>
                        </name>
                    </person-group>
                    <source>Protocol Politics: the Globalization of Internet Governance</source>
                    <year iso-8601-date="2009">2009</year>
                    <publisher-loc>Cambridge, MA</publisher-loc>
                    <publisher-name>the MIT Press</publisher-name>
                    <pub-id pub-id-type="doi">10.7551/mitpress/9780262042574.001.0001</pub-id>
                </element-citation>
            </ref>
            <ref id="B15">
                <label>15</label>
                <element-citation publication-type="webpage">
                    <person-group person-group-type="author">
                        <name>
                            <surname>DeNardis</surname>
                            <given-names>L.</given-names>
                        </name>
                    </person-group>
                    <article-title>The turn to infrastructure for internet
                        governance</article-title>
                    <source>Concurring Opinions, 2012</source>
                    <year iso-8601-date="2012">2012</year>
                    <comment>available at
                            <uri>http://www.concurringopinions.com/archives/2012/04/the-turn-to-infrastructure-for-internet-governance.html</uri>
                        (accessed 13 June 2014).</comment>
                </element-citation>
            </ref>
            <ref id="B16">
                <label>16</label>
                <element-citation publication-type="book">
                    <person-group person-group-type="author">
                        <name>
                            <surname>DeNardis</surname>
                            <given-names>L.</given-names>
                        </name>
                    </person-group>
                    <person-group person-group-type="editor">
                        <name>
                            <surname>Dutton</surname>
                            <given-names>W.</given-names>
                        </name>
                    </person-group>
                    <article-title>The Emerging Field of Internet Governance</article-title>
                    <source>Oxford Handbook of Internet Studies</source>
                    <year iso-8601-date="2013">2013</year>
                    <publisher-loc>Oxford</publisher-loc>
                    <publisher-name>Oxford University Press</publisher-name>
                    <pub-id pub-id-type="doi">10.1093/oxfordhb/9780199589074.013.0026</pub-id>
                </element-citation>
            </ref>
            <ref id="B17">
                <label>17</label>
                <element-citation publication-type="book">
                    <person-group person-group-type="author">
                        <name>
                            <surname>DeNardis</surname>
                            <given-names>L.</given-names>
                        </name>
                    </person-group>
                    <source>The Global War for Internet Governance</source>
                    <year iso-8601-date="2014">2014</year>
                    <publisher-loc>New Haven and London</publisher-loc>
                    <publisher-name>Yale University Press</publisher-name>
                    <pub-id pub-id-type="doi">10.12987/yale/9780300181357.001.0001</pub-id>
                </element-citation>
            </ref>
            <ref id="B18">
                <label>18</label>
                <element-citation publication-type="book">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Dodier</surname>
                            <given-names>N.</given-names>
                        </name>
                    </person-group>
                    <source>Les Hommes et les Machines. La conscience collective dans les
                        soci&#233;t&#233;s technicis&#233;es</source>
                    <year iso-8601-date="1995">1995</year>
                    <publisher-loc>Paris</publisher-loc>
                    <publisher-name>M&#233;taili&#233;</publisher-name>
                </element-citation>
            </ref>
            <ref id="B19">
                <label>19</label>
                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Elkin-Koren</surname>
                            <given-names>N.</given-names>
                        </name>
                    </person-group>
                    <article-title>Making technology visible: liability of internet service
                        providers for peer-to-peer traffic</article-title>
                    <source>New York University Journal of Legislation &amp; Public Policy</source>
                    <year iso-8601-date="2006">2006</year>
                    <volume>9</volume>
                    <issue>15</issue>
                    <fpage>15</fpage>
                    <lpage>76</lpage>
                </element-citation>
            </ref>
            <ref id="B20">
                <label>20</label>
                <element-citation publication-type="book">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Elkin-Koren</surname>
                            <given-names>N.</given-names>
                        </name>
                    </person-group>
                    <person-group person-group-type="editor">
                        <name>
                            <surname>Brousseau</surname>
                            <given-names>E.</given-names>
                        </name>
                        <name>
                            <surname>Marzouki</surname>
                            <given-names>M.</given-names>
                        </name>
                        <name>
                            <surname>M&#233;adel</surname>
                            <given-names>C.</given-names>
                        </name>
                    </person-group>
                    <article-title>Governing access to user-generated content: the changing nature
                        of private odering in digital networks</article-title>
                    <source>Governance, Regulations and Powers on the Internet</source>
                    <year iso-8601-date="2012">2012</year>
                    <publisher-loc>Cambridge</publisher-loc>
                    <publisher-name>Cambridge University Press</publisher-name>
                    <pub-id pub-id-type="doi">10.1017/CBO9781139004145.020</pub-id>
                </element-citation>
            </ref>
            <ref id="B21">
                <label>21</label>
                <element-citation publication-type="webpage">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Gai</surname>
                            <given-names>A.-T.</given-names>
                        </name>
                    </person-group>
                    <article-title>Web 3.0: une autre branche pour l&#8217;arbre des
                        possibles</article-title>
                    <source>Transnets</source>
                    <year iso-8601-date="2007">2007</year>
                    <comment>available at
                            <uri>http://pisani.blog.lemonde.fr/2007/02/17/web-30-une-autre-branche-pour-larbre-des-possibles/</uri>
                        (accessed 13 June 2014).</comment>
                </element-citation>
            </ref>
            <ref id="B22">
                <label>22</label>
                <element-citation publication-type="book">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Latour</surname>
                            <given-names>B.</given-names>
                        </name>
                    </person-group>
                    <source>The Pasteurization of France</source>
                    <year iso-8601-date="1988">1988</year>
                    <publisher-loc>Cambridge, MA</publisher-loc>
                    <publisher-name>Harvard University Press</publisher-name>
                    <comment>PMCid: PMC338299.</comment>
                </element-citation>
            </ref>
            <ref id="B23">
                <label>23</label>
                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Le Fessant</surname>
                            <given-names>F.</given-names>
                        </name>
                    </person-group>
                    <article-title>Les r&#233;seaux sociaux au secours des r&#233;seaux
                        pair-&#224;-pair</article-title>
                    <source>D&#233;fense nationale et s&#233;curit&#233; collective</source>
                    <year iso-8601-date="2009">2009</year>
                    <volume>3</volume>
                    <fpage>29</fpage>
                    <lpage>35</lpage>
                </element-citation>
            </ref>
            <ref id="B24">
                <label>24</label>
                <element-citation publication-type="book">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Lessig</surname>
                            <given-names>L.</given-names>
                        </name>
                    </person-group>
                    <source>Code and Other Laws of Cyberspace</source>
                    <year iso-8601-date="1999">1999</year>
                    <publisher-loc>New York</publisher-loc>
                    <publisher-name>Basic Books</publisher-name>
                </element-citation>
            </ref>
            <ref id="B25">
                <label>25</label>
                <element-citation publication-type="book">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Malcolm</surname>
                            <given-names>J.</given-names>
                        </name>
                    </person-group>
                    <source>Multi-Stakeholder Governance and the Internet Governance Forum</source>
                    <year iso-8601-date="2008">2008</year>
                    <publisher-loc>Wembley, WA</publisher-loc>
                    <publisher-name>Terminus Press</publisher-name>
                </element-citation>
            </ref>
            <ref id="B26">
                <label>26</label>
                <element-citation publication-type="book">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Minar</surname>
                            <given-names>N.</given-names>
                        </name>
                        <name>
                            <surname>Hedlund</surname>
                            <given-names>M.</given-names>
                        </name>
                    </person-group>
                    <person-group person-group-type="editor">
                        <name>
                            <surname>Oram</surname>
                            <given-names>A.</given-names>
                        </name>
                    </person-group>
                    <article-title>A network of peers &#8211; peer-to-peer models through the
                        history of the internet</article-title>
                    <source>Peer-to-peer: Harnessing the Power of Disruptive Technologies</source>
                    <year iso-8601-date="2001">2001</year>
                    <fpage>9</fpage>
                    <lpage>20</lpage>
                    <publisher-loc>Sebastopol, CA</publisher-loc>
                    <publisher-name>O&#8217;Reilly</publisher-name>
                </element-citation>
            </ref>
            <ref id="B27">
                <label>27</label>
                <element-citation publication-type="book">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Mitchell</surname>
                            <given-names>W. J.</given-names>
                        </name>
                    </person-group>
                    <source>City of Bits. Space, Place and the Infobahn</source>
                    <year iso-8601-date="1995">1995</year>
                    <publisher-loc>Cambridge, MA</publisher-loc>
                    <publisher-name>the MIT Press</publisher-name>
                </element-citation>
            </ref>
            <ref id="B28">
                <label>28</label>
                <element-citation publication-type="confproc">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Moglen</surname>
                            <given-names>E.</given-names>
                        </name>
                    </person-group>
                    <source>Freedom In The Cloud: Software Freedom, Privacy and Security for Web 2.0
                        and Cloud Computing</source>
                    <conf-name>ISOC Meeting</conf-name>
                    <conf-date>5 February 2010</conf-date>
                    <year iso-8601-date="2010">2010</year>
                    <conf-loc>New York Branch</conf-loc>
                </element-citation>
            </ref>
            <ref id="B29">
                <label>29</label>
                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Mowbray</surname>
                            <given-names>M.</given-names>
                        </name>
                    </person-group>
                    <article-title>The Fog over the Grimpen Mire: Cloud Computing and the
                        Law</article-title>
                    <source>SCRIPTed</source>
                    <year iso-8601-date="2009">2009</year>
                    <volume>6</volume>
                    <issue>1</issue>
                    <fpage>132</fpage>
                    <lpage>146</lpage>
                    <pub-id pub-id-type="doi">10.2966/scrip.060109.132</pub-id>
                </element-citation>
            </ref>
            <ref id="B30">
                <label>30</label>
                <element-citation publication-type="book">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Mueller</surname>
                            <given-names>M.</given-names>
                        </name>
                    </person-group>
                    <source>Networks and States: The Global Politics of Internet Governance</source>
                    <year iso-8601-date="2010">2010</year>
                    <publisher-loc>Cambridge, MA</publisher-loc>
                    <publisher-name>the MIT Press</publisher-name>
                </element-citation>
            </ref>
            <ref id="B31">
                <label>31</label>
                <element-citation publication-type="confproc">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Musiani</surname>
                            <given-names>F.</given-names>
                        </name>
                    </person-group>
                    <source>A Decentralized Domain Name System? User-Controlled Infrastructure as
                        Alternative internet Governance</source>
                    <conf-name>Eighth Media In Transition (MiT8) conference</conf-name>
                    <conf-date>May 3&#8211;5, 2013</conf-date>
                    <year iso-8601-date="2013a">2013a</year>
                    <conf-loc>Cambridge, MA</conf-loc>
                    <conf-sponsor>Massachusetts Institute of Technology</conf-sponsor>
                    <comment>available as draft at
                            <uri>http://web.mit.edu/comm-forum/mit8/papers/Musiani_DecentralizedDNS_MiT8Paper.pdf</uri>
                        (accessed 13 June 2014).</comment>
                </element-citation>
            </ref>
            <ref id="B32">
                <label>32</label>
                <element-citation publication-type="book">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Musiani</surname>
                            <given-names>F.</given-names>
                        </name>
                    </person-group>
                    <source>Nains sans g&#233;ants: architecture d&#233;centralis&#233;e et services
                        internet</source>
                    <year iso-8601-date="2013b">2013b</year>
                    <publisher-loc>Paris</publisher-loc>
                    <publisher-name>Presses des Mines</publisher-name>
                </element-citation>
            </ref>
            <ref id="B33">
                <label>33</label>
                <element-citation publication-type="book">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Rasmussen</surname>
                            <given-names>T.</given-names>
                        </name>
                    </person-group>
                    <person-group person-group-type="editor">
                        <name>
                            <surname>Liest&#248;l</surname>
                            <given-names>G.</given-names>
                        </name>
                        <name>
                            <surname>Morrison</surname>
                            <given-names>A.</given-names>
                        </name>
                        <name>
                            <surname>Rasmussen</surname>
                            <given-names>T.</given-names>
                        </name>
                    </person-group>
                    <chapter-title>On distributed society: the history of the internet as a guide to
                        a sociological understanding of communication and society</chapter-title>
                    <source>Digital Media Revisited: Theoretical and Conceptual Innovation in
                        Digital Domains</source>
                    <year iso-8601-date="2003">2003</year>
                    <publisher-loc>Cambridge, MA</publisher-loc>
                    <publisher-name>MIT Press</publisher-name>
                </element-citation>
            </ref>
            <ref id="B34">
                <label>34</label>
                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Reidenberg</surname>
                            <given-names>J. R.</given-names>
                        </name>
                    </person-group>
                    <article-title>Lex informatica: the formulation of internet policy rules through
                        technology</article-title>
                    <source>Texas Law Review</source>
                    <year iso-8601-date="1998">1998</year>
                    <volume>76</volume>
                    <issue>3</issue>
                </element-citation>
            </ref>
            <ref id="B35">
                <label>35</label>
                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Schaar</surname>
                            <given-names>P.</given-names>
                        </name>
                    </person-group>
                    <article-title>Privacy by Design</article-title>
                    <source>Identity in the Information Society</source>
                    <year iso-8601-date="2010">2010</year>
                    <volume>3</volume>
                    <issue>2</issue>
                    <fpage>267</fpage>
                    <lpage>274</lpage>
                    <pub-id pub-id-type="doi">10.1007/s12394-010-0055-x</pub-id>
                </element-citation>
            </ref>
            <ref id="B36">
                <label>36</label>
                <element-citation publication-type="book">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Schafer</surname>
                            <given-names>V.</given-names>
                        </name>
                        <name>
                            <surname>Le Crosnier</surname>
                            <given-names>H.</given-names>
                        </name>
                        <name>
                            <surname>Musiani</surname>
                            <given-names>F.</given-names>
                        </name>
                    </person-group>
                    <source>La neutralit&#233; de l&#8217;internet, un enjeu de
                        communication</source>
                    <year iso-8601-date="2011">2011</year>
                    <publisher-loc>Paris</publisher-loc>
                    <publisher-name>CNRS Editions/Les Essentiels
                        d&#8217;Herm&#232;s</publisher-name>
                </element-citation>
            </ref>
            <ref id="B37">
                <label>37</label>
                <element-citation publication-type="confproc">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Schollmeier</surname>
                            <given-names>R.</given-names>
                        </name>
                    </person-group>
                    <article-title>A definition of peer-to-peer networking for the classification of
                        peer-to-peer architectures and applications</article-title>
                    <conf-name>Proceedings of the First International Conference on Peer-to-Peer
                        Computing</conf-name>
                    <year iso-8601-date="2001">2001</year>
                    <fpage>27</fpage>
                    <lpage>29</lpage>
                    <pub-id pub-id-type="doi">10.1109/p2p.2001.990434</pub-id>
                </element-citation>
            </ref>
            <ref id="B38">
                <label>38</label>
                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Star</surname>
                            <given-names>S. L.</given-names>
                        </name>
                    </person-group>
                    <article-title>The ethnography of infrastructure</article-title>
                    <source>American Behavioral Scientist</source>
                    <year iso-8601-date="1999">1999</year>
                    <volume>43</volume>
                    <issue>3</issue>
                    <fpage>377</fpage>
                    <lpage>391</lpage>
                    <pub-id pub-id-type="doi">10.1177/00027649921955326</pub-id>
                </element-citation>
            </ref>
            <ref id="B39">
                <label>39</label>
                <element-citation publication-type="book">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Taylor</surname>
                            <given-names>I.</given-names>
                        </name>
                        <name>
                            <surname>Harrison</surname>
                            <given-names>A.</given-names>
                        </name>
                    </person-group>
                    <source>From P2P to Web Services and Grids: Evolving Distributed
                        Communities</source>
                    <year iso-8601-date="2009">2009</year>
                    <edition>Second and Expanded Edition</edition>
                    <publisher-loc>London</publisher-loc>
                    <publisher-name>Springer-Verlag</publisher-name>
                </element-citation>
            </ref>
            <ref id="B40">
                <label>40</label>
                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>van Eeten</surname>
                            <given-names>M.</given-names>
                        </name>
                        <name>
                            <surname>Mueller</surname>
                            <given-names>M.</given-names>
                        </name>
                    </person-group>
                    <article-title>Where is the governance in internet governance?</article-title>
                    <source>New Media &amp; Society</source>
                    <year iso-8601-date="2013">2013</year>
                    <volume>15</volume>
                    <issue>5</issue>
                    <fpage>720</fpage>
                    <lpage>736</lpage>
                    <pub-id pub-id-type="doi">10.1177/1461444812462850</pub-id>
                </element-citation>
            </ref>
            <ref id="B41">
                <label>41</label>
                <element-citation publication-type="book">
                    <person-group person-group-type="author">
                        <name>
                            <surname>van Schewick</surname>
                            <given-names>B.</given-names>
                        </name>
                    </person-group>
                    <source>Internet Architecture and Innovation</source>
                    <year iso-8601-date="2010">2010</year>
                    <publisher-loc>Cambridge, MA</publisher-loc>
                    <publisher-name>the MIT Press</publisher-name>
                </element-citation>
            </ref>
            <ref id="B42">
                <label>42</label>
                <element-citation publication-type="webpage">
                    <person-group person-group-type="author">
                        <collab>Working Group on Internet Governance</collab>
                    </person-group>
                    <source>Report of the Working Group on internet Governance</source>
                    <year iso-8601-date="2005">2005</year>
                    <publisher-loc>Ch&#226;teau de Bossey</publisher-loc>
                    <month>June</month>
                    <comment>available at <uri>http://www.wgig.org/docs/WGIGREPORT.pdf</uri>
                        (accessed 13 June 2014)</comment>
                </element-citation>
            </ref>
            <ref id="B43">
                <label>43</label>
                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Wu</surname>
                            <given-names>T.</given-names>
                        </name>
                    </person-group>
                    <article-title>When code isn&#8217;t law</article-title>
                    <source>Virginia Law Review</source>
                    <year iso-8601-date="2003">2003</year>
                    <volume>89</volume>
                    <pub-id pub-id-type="doi">10.2307/3202374</pub-id>
                </element-citation>
            </ref>
            <ref id="B44">
                <label>44</label>
                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Ziewitz</surname>
                            <given-names>M.</given-names>
                        </name>
                        <name>
                            <surname>Pentzold</surname>
                            <given-names>C.</given-names>
                        </name>
                    </person-group>
                    <article-title>In search of internet governance: performing order in digitally
                        networked environments</article-title>
                    <source>New Media &amp; Society</source>
                    <year iso-8601-date="2013">2013</year>
                    <publisher-name>online pre-publication</publisher-name>
                </element-citation>
            </ref>
        </ref-list>
    </back>
</article>
