Skip to main content
Skip to content
Case File
d-36461House OversightOther

Reading list for a digital policy introductory course

Date
November 11, 2025
Source
House Oversight
Reference
House Oversight #024259
Pages
1
Persons
0
Integrity
No Hash Available

Summary

The document only provides a syllabus of public readings on internet governance and does not mention any individuals, transactions, or allegations that could serve as investigative leads. Lists academic and policy texts on internet architecture, regulation, and the right to be forgotten. Includes URLs and perma.cc archives for source verification.

This document is from the House Oversight Committee Releases.

View Source Collection

Tags

internet-governanceeducationhouse-oversightdigital-policyreading-list
Ask AI about this document

Search 264K+ documents with AI-powered analysis

Extracted Text (OCR)

EFTA Disclosure
Text extracted via OCR from the original document. May contain errors from the scanning process.
Reading Assignments Day 1: Introduction Welcome! We aspire to the implausible: a nine-day introduction to the unusual dynamics of the world’s digital space, sufficient for a strategic understanding of what makes it difficult (but far from impossible) to regulate or shape; who’s trying to do it nonetheless; and how such efforts have fared over the past twenty years, with an eye towards lessons for influencing the space and the behavior within it today. In addition to offering some frameworks for thinking about Internet architecture and policy, and the curious open and generative nature of the phenomenon, we will delve into the net as a contingently global phenomenon, and the way that complicates regulation by traditional sovereigns. Our case study will be the current debates around implementation of Europe’s “right to be forgotten” in search engine results. As you complete the readings, you might see how you'd answer the question of what a state like France’s view should be towards the scope of its RTBF regulation, and whether the kind of “zoning” described in the Cato Institute article from thirteen years ago (!), is realizable and desirable. Readings: e C.P. Snow, “The Rede Lecture: The Two Cultures,” (1959) pages 1-9 http://s-f-walker.org.uk/pubsebooks/2cultures/Rede-lecture-2-cultures.pdf archived at https://perma.cc/XB6F-N9K8. e John Perry Barlow, “A Declaration of the Independence of Cyberspace,” Electronic Frontier Foundation (February 8, 1996) https:/Awww.eff.org/cyberspace-independence archived at https://perma.cc/H2CZ-N2EX. e Locke, Levine, Searles, & Weinberger, The Cluetrain Manifesto: 95 Theses (1999) http://www.cluetrain.com/book/95-theses.html archived at https://perma.cc/2BLT-6ZEL. e Jonathan Zittrain, The Future of the Internet and How to Stop It. New Haven: 2008 https://dash.harvard.edu/bitstream/handle/1/4455262/Zittrain Future%200f%20the%201 nternet.pdf?sequence=1 archived at https://perma.cc/NM9D-7Y2V. o Read pages 1-5, 7-9, 57-61, 63-65, 67-71. e Yochai Benkler, The Wealth of Networks. New Haven: 2006. http://www.benkler.org/Benkler_Wealth Of Networks.pdf archived at https://perma.cc/BC4A-96KP. o Read pages 154 (beginning “Imagine a world”) - 161 Jurisdiction e Jonathan Zittrain, “Be Careful What You Ask For: Reconciling a Global Internet and Local Law,” WHO RULES THE NET?, Cato Institute (2003) http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/2003-03.pdf archived at https://perma.cc/3JE9-GM3R.

Forum Discussions

This document was digitized, indexed, and cross-referenced with 1,400+ persons in the Epstein files. 100% free, ad-free, and independent.

Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.