{"id":1974,"date":"2012-04-10T17:06:08","date_gmt":"2012-04-10T17:06:08","guid":{"rendered":"http:\/\/hiig.df-kunde.de\/\/?page_id=1974"},"modified":"2018-04-13T09:01:00","modified_gmt":"2018-04-13T07:01:00","slug":"constitutional-theory-and-internet-law","status":"publish","type":"page","link":"https:\/\/www.hiig.de\/en\/symp\/constitutional-theory-and-internet-law\/","title":{"rendered":"Workshop: Constitutional Theory and Internet Law"},"content":{"rendered":"<p>What we can observe is a growing web of legal norms that regulate governance aspects of the Internet. Some of these norms are legally binding; other are closer to what some scholars call soft law. In order to take stock of these developments, what are the patterns of legalization in the internet?<\/p>\n<p><strong>The draft paper<\/strong><\/p>\n<p>The aim of the paper is to propose such an explorative typology that can bring some systematic order into the plurality of Internet norms. The framework built by the author Osvaldo Sald\u00edas in his conference paper may not be exhaustive, but it already sheds some light into future challenges that society should expect.<\/p>\n<p><strong>The workshop<\/strong><\/p>\n<p>The workshop set out the prospective types provided in the paper which are (a) positivation of soft law; (b) legalization through complementarity; c) pure legalization; and d) conflicting legalization. The results reveal that different types of Internet norms also contain a considerable potential for mutual conflicts. Whenever this occurs, we will have to make some significant choices related to the prevalence of certain social goods over other. Since the Internet environment is not a democratic republic, we cannot resort to significant procedural rules that could ordinarily prescribe hierarchies. However, the results of my typology also seems to suggest that there is considerable room for ordering principles and values according to deliberative arrangements or public reasoning. Although research on Internet governance has provided valuable insights into actors, processes, and interests, the time seems right to focus on the proto-legal order that is already in place. The normative question is already waiting for us: How should we deal with this nascent web of Internet laws? The paper claims that unless we shut down the Internet, we will have to engage in dialogue about the \u201cc\u201d word; \u201cc\u201d as in constitution.<\/p>\n<p>The workshop was chaired by Prof. Kim Lane Sheppele. A response on the paper were given by Prof. Christoph M\u00f6llers and Prof. Franz Mayer.<\/p>\n<p><strong>Discussion &amp; remarks<\/strong><\/p>\n<p>The presentation of the paper resulted in a lively discussion and interesting remarks of new persepectives. The discussion surrounded questions and concepts of constitutionalism and the soft law approach, the role of the nation state in emerging multi-stakeholder environments and means of private rule-making.<\/p>\n<div class=\"shariff shariff-align-flex-start shariff-widget-align-flex-start\"><ul class=\"shariff-buttons theme-round orientation-horizontal buttonsize-medium\"><li class=\"shariff-button linkedin shariff-nocustomcolor\" style=\"background-color:#1488bf\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fwww.hiig.de%2Fen%2Fsymp%2Fconstitutional-theory-and-internet-law%2F\" title=\"Share on LinkedIn\" aria-label=\"Share on LinkedIn\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#0077b5; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 27 32\"><path fill=\"#0077b5\" d=\"M6.2 11.2v17.7h-5.9v-17.7h5.9zM6.6 5.7q0 1.3-0.9 2.2t-2.4 0.9h0q-1.5 0-2.4-0.9t-0.9-2.2 0.9-2.2 2.4-0.9 2.4 0.9 0.9 2.2zM27.4 18.7v10.1h-5.9v-9.5q0-1.9-0.7-2.9t-2.3-1.1q-1.1 0-1.9 0.6t-1.2 1.5q-0.2 0.5-0.2 1.4v9.9h-5.9q0-7.1 0-11.6t0-5.3l0-0.9h5.9v2.6h0q0.4-0.6 0.7-1t1-0.9 1.6-0.8 2-0.3q3 0 4.9 2t1.9 6z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button bluesky shariff-nocustomcolor\" style=\"background-color:#84c4ff\"><a href=\"https:\/\/bsky.app\/intent\/compose?text=Workshop%3A%20Constitutional%20Theory%20and%20Internet%20Law https%3A%2F%2Fwww.hiig.de%2Fen%2Fsymp%2Fconstitutional-theory-and-internet-law%2F  via @hiigberlin.bsky.social\" title=\"Share on Bluesky\" aria-label=\"Share on Bluesky\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#0085ff; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"20\" height=\"20\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 20 20\"><path class=\"st0\" d=\"M4.89,3.12c2.07,1.55,4.3,4.71,5.11,6.4.82-1.69,3.04-4.84,5.11-6.4,1.49-1.12,3.91-1.99,3.91.77,0,.55-.32,4.63-.5,5.3-.64,2.3-2.99,2.89-5.08,2.54,3.65.62,4.58,2.68,2.57,4.74-3.81,3.91-5.48-.98-5.9-2.23-.08-.23-.11-.34-.12-.25,0-.09-.04.02-.12.25-.43,1.25-2.09,6.14-5.9,2.23-2.01-2.06-1.08-4.12,2.57-4.74-2.09.36-4.44-.23-5.08-2.54-.19-.66-.5-4.74-.5-5.3,0-2.76,2.42-1.89,3.91-.77h0Z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button mailto shariff-nocustomcolor\" style=\"background-color:#a8a8a8\"><a href=\"mailto:?body=https%3A%2F%2Fwww.hiig.de%2Fen%2Fsymp%2Fconstitutional-theory-and-internet-law%2F&subject=Workshop%3A%20Constitutional%20Theory%20and%20Internet%20Law\" title=\"Send by email\" aria-label=\"Send by email\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#999; color:#fff\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 32 32\"><path fill=\"#999\" d=\"M32 12.7v14.2q0 1.2-0.8 2t-2 0.9h-26.3q-1.2 0-2-0.9t-0.8-2v-14.2q0.8 0.9 1.8 1.6 6.5 4.4 8.9 6.1 1 0.8 1.6 1.2t1.7 0.9 2 0.4h0.1q0.9 0 2-0.4t1.7-0.9 1.6-1.2q3-2.2 8.9-6.1 1-0.7 1.8-1.6zM32 7.4q0 1.4-0.9 2.7t-2.2 2.2q-6.7 4.7-8.4 5.8-0.2 0.1-0.7 0.5t-1 0.7-0.9 0.6-1.1 0.5-0.9 0.2h-0.1q-0.4 0-0.9-0.2t-1.1-0.5-0.9-0.6-1-0.7-0.7-0.5q-1.6-1.1-4.7-3.2t-3.6-2.6q-1.1-0.7-2.1-2t-1-2.5q0-1.4 0.7-2.3t2.1-0.9h26.3q1.2 0 2 0.8t0.9 2z\"\/><\/svg><\/span><\/a><\/li><\/ul><\/div>","protected":false},"excerpt":{"rendered":"<p>What we can observe is a growing web of legal norms that regulate governance aspects of the Internet. Some of these norms are legally binding; other are closer to what some scholars call soft law. In order to take stock of these developments, what are the patterns of legalization in the internet? The draft paper&hellip;<\/p>\n","protected":false},"author":23,"featured_media":0,"parent":7449,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-1974","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Workshop: Constitutional Theory and Internet Law &#8211; HIIG<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hiig.de\/en\/symp\/constitutional-theory-and-internet-law\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Workshop: Constitutional Theory and Internet Law &#8211; HIIG\" \/>\n<meta property=\"og:description\" content=\"What we can observe is a growing web of legal norms that regulate governance aspects of the Internet. Some of these norms are legally binding; other are closer to what some scholars call soft law. In order to take stock of these developments, what are the patterns of legalization in the internet? The draft paper&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hiig.de\/en\/symp\/constitutional-theory-and-internet-law\/\" \/>\n<meta property=\"og:site_name\" content=\"HIIG\" \/>\n<meta property=\"article:modified_time\" content=\"2018-04-13T07:01:00+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Workshop: Constitutional Theory and Internet Law &#8211; HIIG","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hiig.de\/en\/symp\/constitutional-theory-and-internet-law\/","og_locale":"en_US","og_type":"article","og_title":"Workshop: Constitutional Theory and Internet Law &#8211; HIIG","og_description":"What we can observe is a growing web of legal norms that regulate governance aspects of the Internet. Some of these norms are legally binding; other are closer to what some scholars call soft law. In order to take stock of these developments, what are the patterns of legalization in the internet? The draft paper&hellip;","og_url":"https:\/\/www.hiig.de\/en\/symp\/constitutional-theory-and-internet-law\/","og_site_name":"HIIG","article_modified_time":"2018-04-13T07:01:00+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.hiig.de\/en\/symp\/constitutional-theory-and-internet-law\/","url":"https:\/\/www.hiig.de\/en\/symp\/constitutional-theory-and-internet-law\/","name":"Workshop: Constitutional Theory and Internet Law &#8211; HIIG","isPartOf":{"@id":"https:\/\/www.hiig.de\/#website"},"datePublished":"2012-04-10T17:06:08+00:00","dateModified":"2018-04-13T07:01:00+00:00","breadcrumb":{"@id":"https:\/\/www.hiig.de\/en\/symp\/constitutional-theory-and-internet-law\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hiig.de\/en\/symp\/constitutional-theory-and-internet-law\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.hiig.de\/en\/symp\/constitutional-theory-and-internet-law\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hiig.de\/en\/"},{"@type":"ListItem","position":2,"name":"Berlin Symposium on Internet and Society","item":"https:\/\/www.hiig.de\/en\/symp\/"},{"@type":"ListItem","position":3,"name":"Workshop: Constitutional Theory and Internet Law"}]},{"@type":"WebSite","@id":"https:\/\/www.hiig.de\/#website","url":"https:\/\/www.hiig.de\/","name":"HIIG","description":"Alexander von Humboldt Institute for Internet and Society","publisher":{"@id":"https:\/\/www.hiig.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hiig.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.hiig.de\/#organization","name":"HIIG","url":"https:\/\/www.hiig.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hiig.de\/#\/schema\/logo\/image\/","url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2019\/06\/hiig.png","contentUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2019\/06\/hiig.png","width":320,"height":80,"caption":"HIIG"},"image":{"@id":"https:\/\/www.hiig.de\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/pages\/1974","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/users\/23"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/comments?post=1974"}],"version-history":[{"count":10,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/pages\/1974\/revisions"}],"predecessor-version":[{"id":9421,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/pages\/1974\/revisions\/9421"}],"up":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/pages\/7449"}],"wp:attachment":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/media?parent=1974"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}