Abstract
Providing an environment for electronic commerce involves complex, technical questions that need to be addressed and understood by decision making bodies. This paper studies one attempt to support electronic commerce at the national level. It looks at the Regulation of Investigatory Powers Bill in the UK and focuses on the political actions of those seeking to amend the Bill in Parliament. After presenting the situation, the paper analyzes the actions in terms of a due process model of political action. The paper presents the results of this analysis and reflects on the implications for theory and practice.
The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-0-387-35489-7_33
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Anderson, J. R. “The Eternity Service,” Pragocrypt’96,1997 (archived athttp://www.cl.cam . ac.uk/users/rj a l 4/eternity/etemity.html).
Angell, I. O. The New Barbarian Manifesto: How to Survive the Information Age, London: Kogan Page, 2000.
BCC. The Economic Impact of the Regulation of Investigatory Powers Bill: An Independent Report Prepared for the British Chambers of Commerce,London: British Chambers of Commerce, 2000 (archived at http://is.lse.ac.uk/Research/BCC RIPA.pdf).
Blaze, M., Diffie, W., Rivest, R., Schneier, B., Shimomura, T., Thompson, E., and Wiener, M. Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security: A Report by an Ad Hoc Group of Cryptographers and Computer Scientists,1996 (rchived at http://www.counterpane.com/keylength.html).
Borsook, P. Cyberselfish: A Ccritical Romp Through the Terribly Libertarian World of High-Tech, London: Little, Brown and Company, 2000.
Brown, I., and Gladman, B. Technically Inept: Ineffective Against Criminals While Undermining the Privacy, Safety and Security of Honest Citizens and Businesses,Foundation for Information Policy Research, 2000 (archived at http://www.fipr.org/rip/RlPcounter measures.htm).
Burns, J., Eaglesham, J., and Shrimsley, R. “NATIONAL NEWS: Straw Attacks Critics of e-mail Intercept Bill,” Financial Times, June 15, 2000, p. 6.
Callon, M. (ed.). The Laws of the Markets, Oxford: Blackwell, 1998.
Car Free Cities. About Car Free Cities,1998 (archived at http://www.edc.eu.int/cfc/).
Checkland, P. Systems Thinking, Systems Practice, Chichester, England: Wiley, 1981.
Clarke, C. “Letter to the Editor: Crime and the Net.,” The Daily Telegraph, July 13, 2000.
Clayton, R. Speech at Scrambling for Safety 2000,2000 (archived at http://www.fipr.org/ sfs2000/).
Collins, H., and Pinch, T. The Golem: What You Sshould Know About Science (2nd Edition), Cambridge: Canto, 1998.
Cooren, F. The Organizing Property of Communication, Amsterdam: John Benjamins, 2000.
Davies, S. “How Your Privacy Could Soon RIP: Simon Davies Fears Government Plans for Online Surveillance Will Devastate E-commerce,” The Daily Telegraph, July 12, 2000.
Dewey, J. The Public and Its Problems: An Essay in Political Inquiry, Chicago: Gateway Books, 1946.
Dooley, B. A., and Plesser, R. L. The Legal Standard for Government Tracing of Internet Communications: The Misuse of Pen Register Court Orders for Real-Time Acquisition of Transactional Information,Commercial Internet Exchange Association, 2000 (archived at http://www.cix.org/WhitePaper.pdf).
DTI. Licensing of Trusted Third Parties for the Provision of Encryption Services Public Consultation Paper on Detailed Proposals for Legislation,London: Department of Trade and Industry, 1997 (archived at http://www.fipr.org/polarch/ttp.html).
Eaglesham, J. “WORLD NEWS: UK: `E-snooping’ Measure Pits Government Against Apprehensive Business Leaders,” Financial Times, June 23, 2000, p. 11.
EPA. Global Warming: Actions, Transportation,Environmental Protection Agency, 2000a (archived athttp://www.epa.gov /globalwarming/actions/transport/index.html).
EPA. Global Warming: Emissions,Environmental Protection Agency, 2000b (archived at http://www.epa.gov/globa]warming/emissions/index.html).
Everts, S. Gender and Technology: Empowering Women, Engendering Development, London: Zed Books, 1998.
Hall, S. “Email Spy Laws Costly and Undemocratic,” Guardian Unlimited,September 20, 2000 (archived at http://www.guardianunlimited.co.uk/Archive/Article/0,4273,4065743,00.htm).
Hansard. “House of Commons 6’ March, 2000 (Second Reading),” 2000a.
Hansard. “House of Lords 13ih July, 2000 (Report Stage),” 2000b.
Hansard. “House of Lords 19” July, 2000 (Third Reading),” 2000c.
Hansard. “House of Lords 28tj June, 2000 (Committee Stage),” 2000d.
Hirst, C. “Business: Blair Pledge on e-mail Snooping,” Independent on Sunday, July 2, 2000.
Home Office. Myths and Misunderstandings,Home Office, 2000a (archived at http://www.homeoffice.gov.uk/ripa/myths.htm).
Home Office. Regulation of Investigatory Powers Page,Home Office, 2000b, (archived athttp://www.homeoffice.gov.uk /ripa/ripact.htm).
IETF. RFC 1984: Statement on Cryptographic Technology and the Internet: Status: Informational,Internet Architecture Board and Internet Engineering Task Force, 1996, (archived at http://www.ietf.org/rfc/rfc 1984.txt?number-1984).
IETF. RFC 2804 Policy on Wiretapping: Status: Informational,Internet Architecture Board and Internet Engineering Task Force, 2000, (archived at http://www.ietf.org/rfc/rfc2804. txt?number=2804).
Introna, L. D., and Nissenbaum, H. “Shaping the Web: Why the Politics of Search Engines Matters,” Information Society (16:3), 2000, pp. 169–185.
ISPA. Response to the Smith Group Report for the Home Office on Technical and Cost Issues Associated with Interception of the Internet,Internet Service Providers Association, 2000 (archived at http://www.fipr.org/rip/ISPA_response_Smith_19.6.2000.htm).
Kyng, M., and Mathiassen, L. “Systems Development and Trade Union Activities,” in Information Society: For Richer for Poorer, N. Bjorn-Andersen, M. Earl, O. Holst, and E, Mumford (eds.), Amsterdam: North Holland, 1982.
Latour, B. Politiques de la nature. Comment faire entrer les sciences en démocratie, Paris: La Découverte, 1999.
Latour, B. “Socrates’ and Callicles’ Settlement-or, the Invention of the Impossible Body Politic,” Configurations (5:2), 1997, pp. 189–240.
Latour, B. “Where Are the Missing Masses? The Sociology of a Few Mundane Artifacts,” in Shaping Technology/Building Society: Studies in Sociotechnical Change, W. E. Bijker and J. Law (eds.), Cambridge, MA: The MIT Press, 1992, pp. 225–258.
Law, J., and Hassard, J. (eds.). Actor Network and After, Oxford: Blackwell, 1998.
Markus, M. L. “Power, Politics and MIS Implementation,” Communications of the ACM(26:6), 1983, pp. 430–444.
Mathieson, S. “A Year in the Life of an E-minister,” VNU Business Publications Limited, September 22, 2000 (archived at http://www.vnunet.com/Features/1111447).
McMaster, T., Vidgen, R. T., and Wastell, D. G. “Networks of Association and Due Process in IS Development,” in Information Systems: Current Issues and Future Changes, T. J. Larsen, L. Levine, and J. I. DeGross (eds.), Laxenburg, Austria: IFIP Press, 1999.
Mumford, E. Designing Secretaries: The Participative Design of a Word Processing System, Manchester: Manchester Business School, 1983.
National Research Council. Realizing the Information Future: The Internet and Beyond,National Academy of Sciences, 1994 (archived at http://www.nap.edu/readingroom/books/rtif/. Office of the e-Envoy. e-Commerce,2000 (archived at http://www.e-envoy.gov.uk/2000/ strategy/strategy.htm).
Pouloudi, A., and Whitley, E. A. “Stakeholder Identification in Inter-organizational Systems: Gaining Insights for Drug Use Management Systems,” European Journal of Information Systems (6: 1 ), 1997, pp. 1–14.
Pouloudi, A., and Whitley, E. A. “Representing Human and Non-human Stakeholders: On Speaking with Authority,” in Organizational and Social Perspectives on Information Technology, R. Baskerville, J. Stage, and J. I. DeGross (eds.), Boston: Kluwer Academic Publishers, 2000.
RIP. The Regulation ofInvestigatory Powers Act,Her Majesty’s Stationary Office, 2000 (archived at http://www.hmso.gov.uk/acts/acts2000/20000023.htm).
Rhode, L. “UK e-mail Law Reaches U,S.,” Infoworld, September 4, 2000, pp. 28–29.
Rose, N., and Miller, P. “Political Power Beyond the State: Problematics of Government,” British Journal of Sociology (43:2), 1992, pp. 173–205.
Sheriff, L. “Lib Dems Go Against RIP Bill,” The Register,September 20, 2000 (archived at http://www.theregister.co.uk/content/6/13405.html).
Silverstone, R., and Mansell, R. “The Politics of Information and Communication Technologies,” in Communication by Design: The Politics of Information and Communication Technologies,R. Mansell and R. Silverstone (eds.), Oxford: Oxford University Press, 1996., pp. 213–228.
Smith Group. Technical and Cost Issues Associated with Interception of Communications at Certain Communication Service Providers,The Smith Group Limited, 2000 (archived at http://www.homeoffice.gov.uk/ripa/techcost.pdf).
Straw, J. “Letter to the Editor: RIP Bill is Tightly Drafted to Protect Us All,” Financial Times, June 19, 2000.
Tringham, M. “Fury Over Law on e-mail, Premier Executive,” The Times, June 22, 2000.
U.S. Department of Commerce. Falling Through the Net: Toward Digital Inclusion—A Report on Americans ‘ Access to Technology Tools,U.S. Department of Commerce, Economic and Statistics Administration, and National Telecommunications and Information Administration, 2000 (archived at http://www.ecommerce.gov/PressRelease/fttn00.pdf).
Wallace, J., and Mangan, M. Sex, Laws and Cyberspace, New York: Owl Books, 1997.
West, J. “Utopianism and National Competitiveness in Technology Rhetoric: The Case of Japan’s Information Infrastructure,” The Information Society (12:3), 1996, pp. 251–272.
White House. Statement of the Vice President, The White House, Office of the Vice President, 1996.
Whitley, E. A. “Habermas and the Non-humans: Towards a Critical Theory for the New Collective,” in Proceedings of the Critical Management Studies Conference,C. H. J. Gilson, I. Grugulis, and H. Willmott (eds.), Manchester School of Management, July 14–16, 1999. (archived at http://www.mngt.waikato.ac.nz/ejrot/cmsconference/documents/ Information%20Tech/Habermas%20and%20the%20non-humans.pdf).
Winner, L. Autonomous Technology: Technics-Out-of-Control as a Theme in Political Thought,” Cambridge, MA: The MIT Press, 1977.
Wintour, P. “Policy and Politics: Internet Spy Bill Set at Pounds 20m.,” The Guardian, July 7, 2000, p. 15.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Whitley, E.A., Hosein, I. (2001). Doing Politics Around Electronic Commerce: Opposing the Regulation of Investigatory Powers Bill. In: Russo, N.L., Fitzgerald, B., DeGross, J.I. (eds) Realigning Research and Practice in Information Systems Development. IFIP — The International Federation for Information Processing, vol 66. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35489-7_28
Download citation
DOI: https://doi.org/10.1007/978-0-387-35489-7_28
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-6366-9
Online ISBN: 978-0-387-35489-7
eBook Packages: Springer Book Archive