{"id":61757,"date":"2019-08-20T10:00:25","date_gmt":"2019-08-20T08:00:25","guid":{"rendered":"https:\/\/www.hiig.de\/?p=61757"},"modified":"2023-03-28T17:10:01","modified_gmt":"2023-03-28T15:10:01","slug":"mit-normen-gegen-internet-fragmentierung","status":"publish","type":"post","link":"https:\/\/www.hiig.de\/en\/mit-normen-gegen-internet-fragmentierung\/","title":{"rendered":"How an online order fights fragmentation"},"content":{"rendered":"\n<p><i><span style=\"font-weight: 400;\">The internet will not break apart. While centrifugal forces contribute to the emergence of normative froth, frictions and fractures, technical invariants of the internet exercise defragmentation forces. But that\u2019s not all. As <\/span><\/i><b><i>Matthias C. Kettemann <\/i><\/b><i><span style=\"font-weight: 400;\">explains, a normative turn has taken place on the internet which has led to the emergence of normative order of the internet.&nbsp; <\/span><\/i><\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p>Recently, Daniel Lambach <a href=\"https:\/\/www.hiig.de\/en\/the-internet-is-already-fragmented\/\">argued<\/a> here that cyberspace was not right now \u201cin danger of breaking apart\u201d but that a \u201csubstantially more destructive kind of fragmentation\u201d was possible. I will add to his interesting take on territorializing cyberspace by providing a different approach to solving the challenges of fragmentation.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Forces of disorder<\/strong><\/h2>\n\n\n\n<p>Every (legal) order has chaotic tendencies. The lack of formal institutions (such as in national law) or decentralized control through states (such as the rules of international law) make the internet especially prone to normative disorder. I have identified three phenomena of disorder:<\/p>\n\n\n\n<p>(1) <em>Normative froth<\/em> is present when a number of different norms are applicable to similar situations without clear indications that one norm is preferred. During the period 2012-2015 many internet governance stakeholders developed similar norms (\u2018principles\u2019) risking duplication, confusion and the de-valuing of existing (and more authoritative texts). In that, an exercise in norm-making can have anti-normative effects, just as attempts to introduce a new standard to supplant existing ones may results in just another standard.<\/p>\n\n\n\n<p>(2) <em>Normative frictions<\/em> are more serious norm conflicts that go beyond non- hierarchical coexistence of duplicative or slightly varied norms. Examples include diverging national judgments on factually similar issues or when states introduce regulation that is not responsive to similar challenges in neighbouring jurisdictions.<\/p>\n\n\n\n<p>(3) <em>Normative fractures<\/em> evidence a larger problem of rule on the internet and include substantial conflicts (of norms, practices or even trust) that can lead to disorder. Fractures have appeared, for instance, in the normative treatment of cyberwar, with some states arguing for and others against inclusion of the cyberattacks into the logic of the UN Charta\u2019s Chapter VII. This has even led to the breakdown of an important UN-led exercise in developing shared understandings of the meaning of international law on the internet. Further fractures, as this study shows, have appeared with regard to normative approaches between human rights-oriented states and sovereignty-oriented states that seek more governmental control of the internet, nationalize telecommunications providers, provide for data localization laws and apply strong penalties to online dissent (or filter dissenting speech). But this is not all.<\/p>\n\n\n\n<p>Technical, commercial and governmental fragmentation of the internet are real threats. Technical fragmentation impedes the full interoperability of the underlying internet infrastructure. Commercial fragmentation is caused by business practices constraining or preventing internet universality. Political-legal, or governmental, fragmentation includes policies, laws and judgments that inhibit the free flow of information regardless of frontiers.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>There shall be order<\/strong><\/h2>\n\n\n\n<p>But that\u2019s not the end. First, I have identified countervailing technical forces (\u2018internet invariants\u2019), such as the addressing system, the root server architecture and the common protocols. These are the foundation of a technical defragmentation pull that, second, the law \u2013 through the normative turn \u2013 realizes through norms.<\/p>\n\n\n\n<p>In my research I have established that a normative order has emerged on the internet that conceptually encompasses normative activities by all actors on all regulatory levels (national and international legal-political spheres and private spaces). The order is selective in that it does not seek to regulate all fact patterns with a connection to the internet, but only those that evidence a (1) material (non-trivial) connection between the regulatory question and the internet as a network of networks (2) in the normative sense.<\/p>\n\n\n\n<p>The normative order of the internet encompasses norm-generative processes and includes, through its processes, normatively relevant action by all actors. These actors develop normative expectations, which are debated, contested and realized on the basis of shared principles within the order.<\/p>\n\n\n\n<p>The normative order of the internet is a legitimate order, with its legitimacy proceduralized through normative processes that include all actors. As shown, the order is also legitimate in abstract because it is a necessary order. States alone cannot by themselves regulate the internet. International law provides a regulatory frame but is not detailed enough to regulate emerging online threats and technological challenges. Transnational arrangements remain too technical and vague to solve questions of distribution of basic goods.<\/p>\n\n\n\n<p>Taken together, however, the order\u2019s norms secure the internet as a critical infrastructural resource in itself and&nbsp; for other essential infrastructures.<\/p>\n\n\n\n<p>Each field of norms within the order \u2013 international law, national law, transnational normative arrangements \u2013 is legitimized either through traditional normative processes or by its integration into national legal orders. Each actor group is legitimized directly or indirectly and transfers this legitimacy potential to the normative outcome, which is often \u2013 additionally \u2013 epistemically legitimate. The normative order itself is legitimate as a necessary order to ensure protection of and from the internet. The process of justifying the order is narrativized. As any order participant has a right to justification against norms and practices generally-reciprocally, the normative order of the internet is an order of justification.<\/p>\n\n\n\n<p>There are undoubtedly forces favouring fragmentation on the Internet. However, I argue that the internet has taken a normative turn and that order, rather than fear of disorder, should and will shape policy debates.<\/p>\n<div class=\"shariff shariff-align-flex-start shariff-widget-align-flex-start\"><ul class=\"shariff-buttons theme-round orientation-horizontal buttonsize-medium\"><li class=\"shariff-button linkedin shariff-nocustomcolor\" style=\"background-color:#1488bf\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fwww.hiig.de%2Fen%2Fmit-normen-gegen-internet-fragmentierung%2F\" title=\"Share on LinkedIn\" aria-label=\"Share on LinkedIn\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#0077b5; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 27 32\"><path fill=\"#0077b5\" d=\"M6.2 11.2v17.7h-5.9v-17.7h5.9zM6.6 5.7q0 1.3-0.9 2.2t-2.4 0.9h0q-1.5 0-2.4-0.9t-0.9-2.2 0.9-2.2 2.4-0.9 2.4 0.9 0.9 2.2zM27.4 18.7v10.1h-5.9v-9.5q0-1.9-0.7-2.9t-2.3-1.1q-1.1 0-1.9 0.6t-1.2 1.5q-0.2 0.5-0.2 1.4v9.9h-5.9q0-7.1 0-11.6t0-5.3l0-0.9h5.9v2.6h0q0.4-0.6 0.7-1t1-0.9 1.6-0.8 2-0.3q3 0 4.9 2t1.9 6z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button bluesky shariff-nocustomcolor\" style=\"background-color:#84c4ff\"><a href=\"https:\/\/bsky.app\/intent\/compose?text=How%20an%20online%20order%20fights%20fragmentation https%3A%2F%2Fwww.hiig.de%2Fen%2Fmit-normen-gegen-internet-fragmentierung%2F  via @hiigberlin.bsky.social\" title=\"Share on Bluesky\" aria-label=\"Share on Bluesky\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#0085ff; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"20\" height=\"20\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 20 20\"><path class=\"st0\" d=\"M4.89,3.12c2.07,1.55,4.3,4.71,5.11,6.4.82-1.69,3.04-4.84,5.11-6.4,1.49-1.12,3.91-1.99,3.91.77,0,.55-.32,4.63-.5,5.3-.64,2.3-2.99,2.89-5.08,2.54,3.65.62,4.58,2.68,2.57,4.74-3.81,3.91-5.48-.98-5.9-2.23-.08-.23-.11-.34-.12-.25,0-.09-.04.02-.12.25-.43,1.25-2.09,6.14-5.9,2.23-2.01-2.06-1.08-4.12,2.57-4.74-2.09.36-4.44-.23-5.08-2.54-.19-.66-.5-4.74-.5-5.3,0-2.76,2.42-1.89,3.91-.77h0Z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button mailto shariff-nocustomcolor\" style=\"background-color:#a8a8a8\"><a href=\"mailto:?body=https%3A%2F%2Fwww.hiig.de%2Fen%2Fmit-normen-gegen-internet-fragmentierung%2F&subject=How%20an%20online%20order%20fights%20fragmentation\" title=\"Send by email\" aria-label=\"Send by email\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#999; color:#fff\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 32 32\"><path fill=\"#999\" d=\"M32 12.7v14.2q0 1.2-0.8 2t-2 0.9h-26.3q-1.2 0-2-0.9t-0.8-2v-14.2q0.8 0.9 1.8 1.6 6.5 4.4 8.9 6.1 1 0.8 1.6 1.2t1.7 0.9 2 0.4h0.1q0.9 0 2-0.4t1.7-0.9 1.6-1.2q3-2.2 8.9-6.1 1-0.7 1.8-1.6zM32 7.4q0 1.4-0.9 2.7t-2.2 2.2q-6.7 4.7-8.4 5.8-0.2 0.1-0.7 0.5t-1 0.7-0.9 0.6-1.1 0.5-0.9 0.2h-0.1q-0.4 0-0.9-0.2t-1.1-0.5-0.9-0.6-1-0.7-0.7-0.5q-1.6-1.1-4.7-3.2t-3.6-2.6q-1.1-0.7-2.1-2t-1-2.5q0-1.4 0.7-2.3t2.1-0.9h26.3q1.2 0 2 0.8t0.9 2z\"\/><\/svg><\/span><\/a><\/li><\/ul><\/div>","protected":false},"excerpt":{"rendered":"<p>The internet will not break apart. While centrifugal forces contribute to the emergence of normative froth, frictions and fractures, technical invariants of the internet exercise defragmentation forces. But that\u2019s not all. As Matthias C. Kettemann explains, a normative turn has taken place on the internet which has led to the emergence of normative order of&hellip;<\/p>\n","protected":false},"author":248,"featured_media":61753,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1579,224],"tags":[],"class_list":["post-61757","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ftif-plattformen-governance","category-policy-and-law"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How an online order fights fragmentation &#8211; Digital Society Blog<\/title>\n<meta name=\"description\" content=\"In cyberspace, a &quot;much more destructive way of fragmentation&quot; is possible. Daniel Lambach writes about the territorialization of cyberspace:\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hiig.de\/en\/mit-normen-gegen-internet-fragmentierung\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How an online order fights fragmentation &#8211; Digital Society Blog\" \/>\n<meta property=\"og:description\" content=\"In cyberspace, a &quot;much more destructive way of fragmentation&quot; is possible. Daniel Lambach writes about the territorialization of cyberspace:\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hiig.de\/en\/mit-normen-gegen-internet-fragmentierung\/\" \/>\n<meta property=\"og:site_name\" content=\"HIIG\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-20T08:00:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-28T15:10:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2019\/08\/jeff-frenette-Y_AWfh0kGT4-unsplash-Cropped.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"4016\" \/>\n\t<meta property=\"og:image:height\" content=\"2259\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Matthias C. Kettemann\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Matthias C. Kettemann\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How an online order fights fragmentation &#8211; Digital Society Blog","description":"In cyberspace, a \"much more destructive way of fragmentation\" is possible. Daniel Lambach writes about the territorialization of cyberspace:","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hiig.de\/en\/mit-normen-gegen-internet-fragmentierung\/","og_locale":"en_US","og_type":"article","og_title":"How an online order fights fragmentation &#8211; Digital Society Blog","og_description":"In cyberspace, a \"much more destructive way of fragmentation\" is possible. Daniel Lambach writes about the territorialization of cyberspace:","og_url":"https:\/\/www.hiig.de\/en\/mit-normen-gegen-internet-fragmentierung\/","og_site_name":"HIIG","article_published_time":"2019-08-20T08:00:25+00:00","article_modified_time":"2023-03-28T15:10:01+00:00","og_image":[{"width":4016,"height":2259,"url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2019\/08\/jeff-frenette-Y_AWfh0kGT4-unsplash-Cropped.jpg","type":"image\/jpeg"}],"author":"Matthias C. Kettemann","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Matthias C. Kettemann","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hiig.de\/en\/mit-normen-gegen-internet-fragmentierung\/#article","isPartOf":{"@id":"https:\/\/www.hiig.de\/en\/mit-normen-gegen-internet-fragmentierung\/"},"author":{"name":"Matthias C. Kettemann","@id":"https:\/\/www.hiig.de\/#\/schema\/person\/f622d3b43c6580bf1a9f6c445a262c78"},"headline":"How an online order fights fragmentation","datePublished":"2019-08-20T08:00:25+00:00","dateModified":"2023-03-28T15:10:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hiig.de\/en\/mit-normen-gegen-internet-fragmentierung\/"},"wordCount":877,"publisher":{"@id":"https:\/\/www.hiig.de\/#organization"},"image":{"@id":"https:\/\/www.hiig.de\/en\/mit-normen-gegen-internet-fragmentierung\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2019\/08\/jeff-frenette-Y_AWfh0kGT4-unsplash-Cropped.jpg","articleSection":["Ftif Platform governance","Policy and Law"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.hiig.de\/en\/mit-normen-gegen-internet-fragmentierung\/","url":"https:\/\/www.hiig.de\/en\/mit-normen-gegen-internet-fragmentierung\/","name":"How an online order fights fragmentation &#8211; Digital Society Blog","isPartOf":{"@id":"https:\/\/www.hiig.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hiig.de\/en\/mit-normen-gegen-internet-fragmentierung\/#primaryimage"},"image":{"@id":"https:\/\/www.hiig.de\/en\/mit-normen-gegen-internet-fragmentierung\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2019\/08\/jeff-frenette-Y_AWfh0kGT4-unsplash-Cropped.jpg","datePublished":"2019-08-20T08:00:25+00:00","dateModified":"2023-03-28T15:10:01+00:00","description":"In cyberspace, a \"much more destructive way of fragmentation\" is possible. Daniel Lambach writes about the territorialization of cyberspace:","breadcrumb":{"@id":"https:\/\/www.hiig.de\/en\/mit-normen-gegen-internet-fragmentierung\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hiig.de\/en\/mit-normen-gegen-internet-fragmentierung\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hiig.de\/en\/mit-normen-gegen-internet-fragmentierung\/#primaryimage","url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2019\/08\/jeff-frenette-Y_AWfh0kGT4-unsplash-Cropped.jpg","contentUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2019\/08\/jeff-frenette-Y_AWfh0kGT4-unsplash-Cropped.jpg","width":4016,"height":2259,"caption":"There must be order |\u00a0HIIG"},{"@type":"BreadcrumbList","@id":"https:\/\/www.hiig.de\/en\/mit-normen-gegen-internet-fragmentierung\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hiig.de\/en\/"},{"@type":"ListItem","position":2,"name":"How an online order fights fragmentation"}]},{"@type":"WebSite","@id":"https:\/\/www.hiig.de\/#website","url":"https:\/\/www.hiig.de\/","name":"HIIG","description":"Alexander von Humboldt Institute for Internet and Society","publisher":{"@id":"https:\/\/www.hiig.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hiig.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.hiig.de\/#organization","name":"HIIG","url":"https:\/\/www.hiig.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hiig.de\/#\/schema\/logo\/image\/","url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2019\/06\/hiig.png","contentUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2019\/06\/hiig.png","width":320,"height":80,"caption":"HIIG"},"image":{"@id":"https:\/\/www.hiig.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.hiig.de\/#\/schema\/person\/f622d3b43c6580bf1a9f6c445a262c78","name":"Matthias C. Kettemann"}]}},"_links":{"self":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/61757","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/users\/248"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/comments?post=61757"}],"version-history":[{"count":9,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/61757\/revisions"}],"predecessor-version":[{"id":61996,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/61757\/revisions\/61996"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/media\/61753"}],"wp:attachment":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/media?parent=61757"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/categories?post=61757"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/tags?post=61757"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}