An aspirational syllabus for myself (a) to inform my work for the ARTICLE 19 Internet of Rights Fellowship and (b) to catch me up after a decade away from network culture. Sources and inspirations include:
* [Critical Infrastructure Lab](https://www.criticalinfralab.net/category/reading-group/)
- [DATACTIVE](https://data-activism.net/publications/)
## Censorship
* [ ] Deibert et al. (eds.) (2008), *Access Denied: The Practice and Policy of Global Internet Filtering*
* [ ] Deibert et al. (eds.) (2010), *Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace*
## Culture
* [ ] de la Bellacasa, "'Nothing Comes without Its World': Thinking with Care"
* [ ] Britton and Pritchhard, ["For CS"](https://interactions.acm.org/blog/view/for-cs)
* [ ] Daub, *What Tech Calls Thinking*
* [ ] Deibert, *Parchment, Printing, and Hypermedia*
* [ ] Lorusso, ["The User Condition: Computer Agency and Behavior"](https://theusercondition.computer/)
* [ ] Murtaugh, ["Becoming Sponge: Sustaining Practice through Protocols of Web Publishing"](https://march.international/becoming-sponge-sustaining-practice-through-protocols-of-web-publishing/)
* [ ] Rocha, ["A Catalog of Formats for Digital Discomfort"](https://interactions.acm.org/blog/view/for-cs)
* [ ] Seu (ed.), *Cyberfeminism Index*
* [ ] Stocker and Schöpf (eds.), [*Ars Electronica 2003: The Language of Our Time*](https://monoskop.org/images/d/dd/Ars_Electronica_2003_Code_The_Language_of_Our_Time_2003.pdf)
* [ ] Tarnoff, *The Making of the Tech Worker Movement*
## Digital rights
- [ ] ["Digital Rights Primer"](https://wiki.digitalrights.community/index.php?title=Digital_Rights_Primer)
- [ ] Association for Progressive Communications (2023), ["Internet Rights Charter"](https://www.apc.org/en/pubs/about-apc/apc-internet-rights-charter)
- [ ] United States Department of Homeland Security (2012), [“The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research”](https://www.dhs.gov/sites/default/files/publications/CSD-MenloPrinciplesCORE-20120803_1.pdf)
### Intellectual property
- [ ] Aoki and Boyle (2006), *Bound by Law: Tales from the Public Domain*[^1]
## Governance
- [ ] Burrell et al. (eds.) (2024), [*Keywords of the Datafied State*](https://datasociety.net/wp-content/uploads/2024/09/DS_Keywords-of-the-Datafied-State_04242024.pdf)
* [ ] Deibert (2020), *Reset: Reclaiming the Internet for Civil Society*
* [ ] Douzet (2004), ["Understanding Cyberspace with Geopolitics"](https://www.cairn-int.info/journal-herodote-2014-1-page-3.htm)
- [ ] O'Hara and Hall (2021), *Four Internets: Data, Geopolitics, and the Governance of Cyberspace*
- [ ] Schneider (2024), *Governable Spaces: Democratic Design for Online Life*
## Infrastructure
* [ ] *Policy and Internet* 11.1, ["Internet Architecture and Human Rights"](https://onlinelibrary.wiley.com/toc/19442866/2019/11/1)
* [ ] de Sola Pool (1984), *Technologies of Freedom*
* [ ] Galloway, *Protocol: How Control Exists after Decentralization*
* [ ] Hu, *A Prehistory of the Cloud*
* [ ] McFadden, ["A Taxonomy of Internet Consolidation"](https://datatracker.ietf.org/doc/draft-mcfadden-consolidation-taxonomy/)
* [ ] Munn, *Countering the Cloud: Thinking With and Against Data Infrastructures*
* [ ] de Rosnay and Tréguer, eds., [*Telecommunications Reclaimed*](https://www.netcommons.eu/?q=telecommunications-reclaimed)
* [ ] Saldana et al. (2016), ["Alternative Network Deployments: Taxonomy, Characterization, Technologies, and Architectures"](https://datatracker.ietf.org/doc/rfc7962/) (RFC 7962)
## Standards-development organizations
* [ ] Baron and Kanevsakaia, ["Competition for Leadership Positions in Standards Development Organizations"](https://www.iab.org/wp-content/IAB-uploads/2021/11/Baron.pdf)
* [ ] Baron and Larouche, ["The European Standardisation System at a Crossroads"](https://cerre.eu/publications/the-european-standardisation-system-at-a-crossroads/)
* [ ] Cath (2021), ["Changing Minds and Machines: A Case Study of Human Rights Advocacy in the Internet Engineering Task Force"](https://corinnecath.com/wp-content/uploads/2021/09/CathCorinne-Thesis-DphilInformationCommunicationSocialSciences.pdf)
* [ ] Cath (2021), [“The Technology We Choose to Create: Human Rights Advocacy in the Internet Engineering Task Force“](https://www.sciencedirect.com/science/article/abs/pii/S0308596121000483)
* [ ] Cath (2023), ["Loud Men Talking Loudly: Exclusionary Cultures of Internet Governance"](https://criticalinfralab.net/wp-content/uploads/2023/06/LoudMen-CorinneCath-CriticalInfraLab.pdf)
* [ ] Cath (ed., 2023), *Eaten by the Internet*
* [ ] Crocker (1993), ["Making Standards the IETF Way"](https://dl.acm.org/doi/10.1145/174683.174689)
* [ ] Dawkins (ed.) (2014), ["An IRTF Primer for IETF Participants"](https://datatracker.ietf.org/doc/rfc7418/) (RFC 7418)
* [ ] Denardis (2009), *Protocol Politics: The Globalization of Internet Governance*
* [ ] Doty, ["Analyzing IETF Data: Changing Affiliations"](https://www.iab.org/wp-content/IAB-uploads/2021/11/Doty.pdf)
* [ ] Doty (2020), [*Enacting Privacy in Internet Standards*](https://npdoty.name/writing/enacting-privacy/)
* [ ] Eggert, ["Who Is the Average IETF Participant?"](https://www.iab.org/wp-content/IAB-uploads/2021/11/Eggert.pdf)
* [ ] Guerra and Knodel, [draft-guerra-feminism](https://datatracker.ietf.org/doc/draft-guerra-feminism/)
* [ ] Hardaker and Bartlett, ["Identifying Temporal Trends in IETF Participation"](https://datatracker.ietf.org/doc/draft-guerra-feminism/)
* [ ] Krishnamurthy (2019), ["Are Internet Protocols the New Human Rights Protocols? Understanding 'RFC 8280—Research into Human Rights Protocol Considerations'"](https://www.cambridge.org/core/journals/business-and-human-rights-journal/article/abs/are-internet-protocols-the-new-human-rights-protocols-understanding-rfc-8280-research-into-human-rights-protocol-considerations/7D5806883819F215E0843A93F32881D7)
* [ ] Le, [position paper](https://www.iab.org/wp-content/IAB-uploads/2021/11/Doty.pdf)
* [ ] Milan and ten Oever, ["Coding and Encoding Rights in Internet Infrastructure"](https://policyreview.info/articles/analysis/coding-and-encoding-rights-internet-infrastructure)
* [ ] Office of the United Nations High Commissioner for Human Rights (2023), ["Human Rights and Technical Standard-setting Processes for New and Emerging Digital Technologies"](https://www.ohchr.org/sites/default/files/documents/hrbodies/hrcouncil/sessions-regular/session53/advance-versions/A_HRC_53_42_AdvanceEditedVersion.docx)
* [ ] Resnick, ["On Consensus and Humming in the IETF"](https://datatracker.ietf.org/doc/rfc7282/) (RFC 7282)
- [ ] Teleanu (2021), ["The Geopolitics of Digital Standards: China's Role in Standard-Setting Organizations"](https://www.diplomacy.edu/wp-content/uploads/2021/12/Geopolitics-of-digital-standards-Dec-2021.pdf)
* [ ] ten Oever, ["Productive Contestation, Civil Society, and Global Governance: Human Rights as a Boundary Object in ICANN"](https://onlinelibrary.wiley.com/doi/10.1002/poi3.172)
* [ ] ten Oever, ["'This Is Not How We Imagined It': Technological Affordances, Internet Drives, and the Internet Architecture Imaginary"](https://journals.sagepub.com/doi/full/10.1177/1461444820929320)
* [ ] ten Oever, ["Up to Whose Standards?"](https://www.standardsuniversity.org/e-magazine/october-2018-volume-9-issue-3-privacy-freedom-human-rights/up-to-whose-standards/)
* [ ] ten Oever and Beraldo, ["Routes to Rights: Internet Architecture and Values in Times of Ossification and Commercialization''](https://data-activism.net/wordpress/wp-content/uploads/2015/11/p28-ten_oever.pdf)
* [ ] ten Oever (2019), ["Notes on Networking Standards and Politics"](https://datatracker.ietf.org/doc/draft-irtf-hrpc-political/)
* [ ] Varon et al., [*Net of Rights*](https://hrpc.io)
## Surveillance
- [ ] Diffe and Landau (2007), *Privacy on the Line: The Politics of Wiretapping and Encryption*[^1]
- [ ] Donner (1981), *The Age of Surveillance: The Aims and Methods of America's Political Intelligence System*[^1]
- [ ] Duan and Grimmelman (2024), ["Content Moderation on End-to-end-Encrypted Systems: A Legal Analysis"](https://georgetownlawtechreview.org/content-moderation-on-end-to-end-encrypted-systems-a-legal-analysis/GLTR-01-2024/)
* [ ] Farrell et al. (2023), ["Reflections on Ten Years Past the Snowden Revelations"](https://datatracker.ietf.org/doc/rfc9446/) (RFC 9446)
* [ ] Hong, *Technologies of Speculation: The Limits of Knowledge in a Data-Driven Society*
* [ ] Lyon (2007), *Surveillance Studies: An Overview*
* [ ] Tanczer et al., ["Online Surveillance, Censorship, and Encryption in Academia"](https://discovery.ucl.ac.uk/id/eprint/10080268/)
[^1]: Rogaway (2015), ["The Moral Character of Cryptographic Work"](https://web.cs.ucdavis.edu/~rogaway/papers/moral-fn.pdf)