{"title":"VPNs as boundary objects of the internet: (mis)trust in the translation(s)","authors":"Luke Heemsbergen, Adam Molnar","doi":"10.14763/2020.4.1513","DOIUrl":null,"url":null,"abstract":"How do we come to trust, use and govern virtual private networks (VPNs)? How do these objects of the internet tack back and forth between metaphor and technical processes as they garner usership and critique? This paper aims to answer these questions by considering VPNs as boundary objects. We follow Susan Leigh Star’s (2010) call to further explore the ‘tacking’ back and forth of boundary objects as both symbolic and technical objects. This is applied within internetspace and governance-space through empirical methods that walkthrough a typical user experience for acquiring VPN services, while also offering a systemic account of the discourse that such a user would experience in coming to understand VPNs and their function. Issue 4 This paper is part of Trust in the system, a special issue of Internet Policy Review guestedited by Péter Mezei and Andreea Verteş-Olteanu.","PeriodicalId":219999,"journal":{"name":"Internet Policy Rev.","volume":"47 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Internet Policy Rev.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.14763/2020.4.1513","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
How do we come to trust, use and govern virtual private networks (VPNs)? How do these objects of the internet tack back and forth between metaphor and technical processes as they garner usership and critique? This paper aims to answer these questions by considering VPNs as boundary objects. We follow Susan Leigh Star’s (2010) call to further explore the ‘tacking’ back and forth of boundary objects as both symbolic and technical objects. This is applied within internetspace and governance-space through empirical methods that walkthrough a typical user experience for acquiring VPN services, while also offering a systemic account of the discourse that such a user would experience in coming to understand VPNs and their function. Issue 4 This paper is part of Trust in the system, a special issue of Internet Policy Review guestedited by Péter Mezei and Andreea Verteş-Olteanu.