Author:
Finnemore Martha,Hollis Duncan B.
Abstract
On February 16, 2016, a U.S. court ordered Apple to circumvent the security features of an iPhone 5C used by one of the terrorists who committed the San Bernardino shootings. Apple refused. It argued that breaking encryption for one phone could not be done without undermining the security of encryption more generally. It made a public appeal for “everyone to step back and consider the implications” of having a “back door” key to unlock any phone—which governments (and others) could deploy to track users or access their data. The U.S. government eventually withdrew its suit after the F.B.I. hired an outside party to access the phone. But the incident sparked a wide-ranging debate over the appropriate standards of behavior for companies like Apple and for their customers in constructing and using information and communication technologies (ICTs). That debate, in turn, is part of a much larger conversation. Essential as the Internet is, “rules of the road” for cyberspace are often unclear and have become the focus of serious conflicts.
Publisher
Cambridge University Press (CUP)
Subject
Law,Political Science and International Relations
Reference203 articles.
1. Cybersecurity Won’t Be the Biggest Deal at China’s World Internet Conference;Sacks;Fortune,2015
2. Nonconsensual International Lawmaking;Helfer;U. Ill. L. Rev.,2008
3. An international ban on anti-personnel mines: History and negotiation of the “Ottawa treaty”
4. The Idea Of An Overlapping Consensus
5. A Theory of Framing and Opinion Formation in Competitive Elite Environments;Chong;J. Comm.,2007
Cited by
227 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献