Introduction: Regulation&Code Blog

Dustin Lee
2 min readDec 11, 2016

Hello, welcome to my Regulation&Code Blog!

I am personally interested in everything related to technology, and especially IT security. My blog will specifically focus on how the current regulation and code structure implemented to regulate people’s behavior is faulty. There are several elements that comes into play when regulating an individual’s behavior, including cost, law, norms, and structure. This can also be said for the behaviors online. Regulation and Code works as a structure within the cyberspace, and is therefore not enforced to those within. Rather, they provide as a motivation to keep the rules, not having any tangible effects to those breaking them. However, given that law enforcement is not so much prevalent in different social platforms, the focus on the structure, self-regulatory codes, is emphasized on Internet. The blog posts will argue how the balance between, especially, the code and the law needs to be achieved to solve the problem of misconducts.

The First blog post talks about a recent news on a backdoor incident in a certain phone software. While the software has been pervasively distributed among customers, the backdoor retrieved their personal information without their consent. The downfall caused by the lack of regulatory codes for the providers is emphasized from this post.

The second blog post regards the backdoors discovered in the software distributed by Jupiter Networks with possible relationship to the US government. Different from the first post, this post will casts greater scale of doubt, the US government, which sheds light on the need for a solution with a greater scale of code.

The third blog post is about the side effect of the lack of punishment-based policies compared to that of the code. Due to the lack of enforcement committed to activities online, people with specific goals and motivations are rather unaffected by the self-regulatory codes, and commits misconducts that are blameworthy for its discriminatory tone.

The fourth blog post is about the validity of such balance in the context of monetary transaction. Given that such type of sensitive information also occurs online, it is more important to understand that the misbalance, specifically the lack of law enforcements along with the amount of code, can cause consequences that are far worse than expected.

Work Cited:

Lessig, Lawrence. “Chapter 7.” Code: Version 2.0. Place of Publication Not Identified: SoHo, 2010. N. pag. Print.

--

--