SlideShare a Scribd company logo
Regulating Code
Good Governance and Better Regulation in
the Information Age (MIT Press)
Ian Brown (Oxford)
Chris Marsden (Sussex)
@IanBrownOII
#RegulatingCode
John Perry Barlow
A Declaration of the
Independence of Cyberspace
(1996)
response to CDA 1996
(partly struck down in Reno v. ACLU 1997)
‘Governments of the
Industrial World, you weary
giants of flesh and steel, I
come from Cyberspace,
the new home of the Mind.
On behalf of the future, I
ask you of the past to
leave us alone. You are not
welcome among us. You
have no sovereignty where
we gather.’
Regulation and governance
 Internet use now ubiquitous
◦ but governments, legislators and regulatory
agencies falling further behind rapidly
changing Internet technologies and uses
 Critical analysis of regulatory shaping of
―code‖ or technological environment
◦ ‗Code is law‘ and coders operate within
normative framework
◦ More economically efficient and socially just
regulation
◦ Critical socio-technical and socio-legal
approach
Literature
 Previous legal focus on elephant‘s
trunk?
◦ Benkler, Wu, Lessig, Zittrain, Van
Schewick
◦ General US scepticism of govt action
 Ohm‘s Myth of the Super-User
 More empirical view: Mueller (2010),
De Nardis (2009)
◦ Institutional economics and political
science
Prosumers not super-users
 Web 2.0 and related tools make for
active users, not passive consumers
 United States administrative and
academic arguments for self-
regulation may work for geeks, but
what about the other 99%?
 European regulatory space is more
fertile ground to explore prosumerism
as both a market-based and citizen-
oriented regulatory tool
Empirical investigation
 Five case studies and one ‗prior art‘
(encryption, anonymity, security)
◦ Multi-year empirical investigation
◦ Builds on various EC/other studies including
 ‗Self-regulation.info‘ (2001-4), ‗Co-regulation‘ (2006-
8), ‗Towards a Future Internet‘ (2008-10), ‗Privacy
Value Networks‘ (2008-11), ‗Network neutrality‘
(2007-10) ‗Internet science‘ (2012-15)
 Reassesses prior art in view of ‗hard
cases‘
◦ Topics with no organised regulation/self-
regulation
◦ Due to lack of consensus over solutions
Five case study chapters
1. Data protection
◦ Enforcement failures, Privacy by Design
2. Copyright
◦ Capture of law by lobbyists, code solutions
outflank
3. Filtering
◦ Growth of censorship, surprising degree of
freedom – disappearing?
4. Social Networks
◦ Dominance, network effects, corporate social
irresponsibility
5. Smart Pipes
◦ Net neutrality argument, DPI deployment
Towards interoperability as
prosumer law
 Solution in favour of prosumers and
competition:
◦ enhance the competitive production of
public goods
◦ including innovation, public safety, and
fundamental democratic rights
 Key aspect: interoperability (incl.
FRAND)
◦ (Note: this is detailed software
interoperability, not the general
description offered by Gasser/Paltrey
2012)
50 ways to leave Facebook
 Not sufficient to permit data deletion
◦ as that only covers the user‘s tracks.
 Interconnection and interoperability,
◦ more than transparency and
◦ theoretical possibility to switch.
 Ability for prosumers to interoperate to
permit exit
◦ Lower entry barriers tend to lead to increased
consumer welfare
Kroes‘ promise post-Microsoft
 Will ―seriously explore
all options to ensure
that significant market
players cannot just
choose to deny
interoperability.
 ―The Commission
should not need to
run an epic antitrust
case every time
software lacks
interoperability.‖
Euro-Interoperability
Framework
 Response to multi-€bn competition
cases:
◦ Microsoft saga (to 2009), Intel (2009), Apple
(2010), Rambus (2009)
◦ Google (2013?) perhaps Facebook....
◦ Coates (2011: Chapters 5-6)
 Announced by Information Society
Commissioner Neelie Kroes in 2009-
2010
 Bias in favour of interoperability in policy
 Concerns are broader than competition
◦ Include privacy, IPR, security, fundamental
Mandated choice
 Microsoft fined
€561m for ‗browser
choice‘ ―error‖ –
expensive line of
code
 Sky EPG carries
terrestrial channels
on 101-105 due to
―must carry‖ and
―due prominence‖
AVMSD
Do Not Track
 ―I think it‘s right to think about shutting
down the process and saying we just
can‘t agree. We gave it the old college
try. But sometimes you can‘t reach a
negotiated deal.‖ –DNT member
Jonathan Meyer
 Competition
investigation both sides
of Atlantic since 2010:
◦ Settled with US
authorities 3 Jan 2013
◦ Settlement proposal to EC
1 Feb 2013
 Experts have severely
criticized timing and
content of FTC
settlement
 Grimmelman argued: ―If
the final FTC statement
had been any more
favourable to Google, I‘d
be checking the file
metadata to see whether
Google wrote it.‖
Google FTC and EC cases
Source: Google proposal leaked to SearchEngineLand, 25/4/13
Amazon and Kindle
 ―[N]ot only booksellers…but publishers and agents
too run the risk of being excluded due to Amazon‘s
wish to be a book retailer and publisher, and its
aggressive plans to vertically integrate‖
 Amazon.co.uk ―responsible for 95% of [UK] e-book
purchases…92% of the 1.3 million e-readers sold in
the UK before Christmas were Kindles‖
 ―[F]rom data mining [Amazon] know[s] what its
customers buy, when they buy it, what books they
actually read on their Kindles and even which books
are not read in full‖
Tim Godfray (Chief Executive of Booksellers’
Association UK & Ireland), London Book Fair, 15/4/13
Regulating Kindle
 ―Having such a dominant position enables Amazon to
put huge pressure on individual publishers for higher
trade discounts to be given, enabling it to sell books at
much lower prices than competing booksellers.‖
 ―Most Kindle customers—unless they are very tech
savvy—end up buying their e-books from Amazon‘s
Kindle store‖ – Mandated choice of e-bookstore, and
interoperable stores
 ―EPUB3 has just been approved by the International
Publishers Association as the new standard format for
e-books. We believe that steps should be taken to
ensure that in the future all e-book retailers—including
Amazon—should support EPUB3, so that consumers
can read any e-book on any device and are not locked
in to any proprietary system.‖
Tor and DRM
 ―[W]e felt a strong sense that the reading
experience for this tech-savvy, multi-device
owning readership was being inhibited by
DRM, leaving our readers unable to
reasonably and legally transfer ebook files
between all the devices they had.‖
 ―DRM-protected titles are still subject to
piracy, and we believe a great majority of
readers are just as against piracy as
publishers are... As it is, we‘ve seen no
discernible increase in piracy on any of our
titles, despite them being DRM-free for nearly
a year.‖ –Julie Crisp, UK Editorial Director
Economics and Human
Rights
 Interoperability linked to open data, open code,
and arguably to human rights
 Blizzard of Internet governance principles in
2011:
◦ origins in law and economics,
◦ or human rights, but
◦ apparently do not translate one to the other
 This apparent dialogue of the deaf is a
competition policy (Brown and Waelde 2005),
and corporate governance problem
 Urgent task: dialogue between previous discrete expert
fields
◦ ICT growth driver and transformative technology
◦ Equally transformative role in human communication
and dialogue.
Developing study of code
regulation
 Similarities and cross-over with
◦ complexity science
◦ network science
◦ web science/graph theory
 Match Internet regulation to complexity theory
◦ Longstaff (2003), Cherry (2008),
Schneider/Bauer (2007)
 Network science fusion of scientific/
fundamental elements from various
components
 Internet Science? EC Network of Excellence
Questions?
 Book published
March 2013
 ‗Prosumer law‘
article (early
version now on
SSRN)
 Comments
welcome!
Test the existing ‗received
truths‘
1. Self-regulation and minimal state
involvement is most efficient in dynamic
innovative industries;
◦ technology is never neutral in societal impact
◦ network and scale effects drive massive
concentration
2. Self-regulation critically lacks constitutional
checks and balances for the private citizen,
including appeal
3. Multi-stakeholder co-regulation chance to
reconcile the market failures and
constitutional legitimacy failures in self-
regulation
◦ voters will not allow governments to ignore the
Internet.
Approach embraces
complexity
 No easy examples that demonstrate the
'truth' of
◦ technical, political, legal or economic solutions
◦ based on self-, co- or state regulatory
approaches.
◦ Cf. Mansell (2012) Imagining the Internet
 Examine the deficiencies and benefits
◦ Match market and social developments
◦ With human rights concerns
◦ E.g. In fields of privacy and freedom of
expression
 Note: analysis based on Article 19 UDHR not 1st
Amendment
 Most of world uses variants of Article 19
Government and market
failure
 Industry capture of regulators and
legislators,
 Incumbents protect/introduce new
barriers to entry
 Continued exclusion of wider civil society
from the policy discussion – but
◦ tenuous chain of accountability of
participants to voters, shareholders and NGO
stakeholders.
◦ effectiveness, accountability and legitimacy
of these groups in representing the public
interest?
What regulation teaches about
code
 Ex ante and ex post intervention
 Interoperability and open code/data -
procurement
 A biased policy towards open code –
◦ Data open to mash-ups (govt)
◦ Systems interoperable (procurement)
◦ Use of alternatives to market leader (e.g.
Linux)
Prosumer law suggests a more
directed intervention
 Example:
 proposed solution to the problems of
dominant social networking sites,
 to prevent Facebook, Google+ or any
other network
 from erecting a fence around its piece
of the information commons:
 to ensure interoperability with open
standards.

More Related Content

What's hot

Ethics in e commerce n it
Ethics in e commerce n itEthics in e commerce n it
Ethics in e commerce n itamitmitkar
 
Internet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP InstituteInternet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP Institute
Internet Law Center
 
Meetings and the law chicago digital age 050813
Meetings and the law   chicago digital age 050813Meetings and the law   chicago digital age 050813
Meetings and the law chicago digital age 050813
DMAI's Destinations Showcase
 
Ethical, Social, and Political Issues in E-commerce
Ethical, Social, and Political Issues in E-commerceEthical, Social, and Political Issues in E-commerce
Ethical, Social, and Political Issues in E-commerce
Nor Ayuzi Deraman
 
Blog Wars at New Media Expo
Blog Wars at New Media ExpoBlog Wars at New Media Expo
Blog Wars at New Media Expo
Internet Law Center
 
08 Ethics, Law and E-commerce
08 Ethics, Law and E-commerce08 Ethics, Law and E-commerce
08 Ethics, Law and E-commerce
monchai sopitka
 
DEA: the dangerous downloaders act
DEA: the dangerous downloaders actDEA: the dangerous downloaders act
DEA: the dangerous downloaders act
rcorrigan
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIJames Bollen
 
Net Neutrality 03
Net Neutrality 03Net Neutrality 03
Net Neutrality 03
Colin_Mitchell
 
Surveillance Capitalism
Surveillance  CapitalismSurveillance  Capitalism
Surveillance Capitalism
Ken Berkun
 
Public policy legal issues to privacy
Public policy legal issues to privacyPublic policy legal issues to privacy
Public policy legal issues to privacy
Muneeb Ahmed
 
Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)
Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)
Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)
Adam Thierer
 
3 - Social Media and Enterprise
3 - Social Media and Enterprise3 - Social Media and Enterprise
3 - Social Media and Enterprise
Raymond Gao
 
Legal & moral issues in e commerce
Legal & moral issues in e commerceLegal & moral issues in e commerce
Legal & moral issues in e commerceDamo Ward
 
Rebooting digital identity: how the social web is transforming citizen behavi...
Rebooting digital identity: how the social web is transforming citizen behavi...Rebooting digital identity: how the social web is transforming citizen behavi...
Rebooting digital identity: how the social web is transforming citizen behavi...
Patrick McCormick
 
Big Data and Privacy
Big Data and PrivacyBig Data and Privacy
Big Data and Privacy
mjsale781
 

What's hot (18)

Ethics in e commerce n it
Ethics in e commerce n itEthics in e commerce n it
Ethics in e commerce n it
 
Internet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP InstituteInternet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP Institute
 
Washington's Privacy Tango
Washington's Privacy TangoWashington's Privacy Tango
Washington's Privacy Tango
 
Meetings and the law chicago digital age 050813
Meetings and the law   chicago digital age 050813Meetings and the law   chicago digital age 050813
Meetings and the law chicago digital age 050813
 
Ethical, Social, and Political Issues in E-commerce
Ethical, Social, and Political Issues in E-commerceEthical, Social, and Political Issues in E-commerce
Ethical, Social, and Political Issues in E-commerce
 
Blog Wars at New Media Expo
Blog Wars at New Media ExpoBlog Wars at New Media Expo
Blog Wars at New Media Expo
 
08 Ethics, Law and E-commerce
08 Ethics, Law and E-commerce08 Ethics, Law and E-commerce
08 Ethics, Law and E-commerce
 
DEA: the dangerous downloaders act
DEA: the dangerous downloaders actDEA: the dangerous downloaders act
DEA: the dangerous downloaders act
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLI
 
Net Neutrality 03
Net Neutrality 03Net Neutrality 03
Net Neutrality 03
 
Surveillance Capitalism
Surveillance  CapitalismSurveillance  Capitalism
Surveillance Capitalism
 
Public policy legal issues to privacy
Public policy legal issues to privacyPublic policy legal issues to privacy
Public policy legal issues to privacy
 
Amazon Tax Wars
Amazon Tax WarsAmazon Tax Wars
Amazon Tax Wars
 
Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)
Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)
Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)
 
3 - Social Media and Enterprise
3 - Social Media and Enterprise3 - Social Media and Enterprise
3 - Social Media and Enterprise
 
Legal & moral issues in e commerce
Legal & moral issues in e commerceLegal & moral issues in e commerce
Legal & moral issues in e commerce
 
Rebooting digital identity: how the social web is transforming citizen behavi...
Rebooting digital identity: how the social web is transforming citizen behavi...Rebooting digital identity: how the social web is transforming citizen behavi...
Rebooting digital identity: how the social web is transforming citizen behavi...
 
Big Data and Privacy
Big Data and PrivacyBig Data and Privacy
Big Data and Privacy
 

Similar to Regulating code

Regulating Code - EUI Workshop
Regulating Code - EUI WorkshopRegulating Code - EUI Workshop
Regulating Code - EUI WorkshopChris Marsden
 
Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...
Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...
Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...
Chris Marsden
 
chapter5F.ppt
chapter5F.pptchapter5F.ppt
chapter5F.ppt
amreena6
 
5362098
53620985362098
5362098
AditiVeda1
 
5362098
53620985362098
5362098
AditiVeda1
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
adampcarr67227
 
Not fudging nudges: What Internet law can teach regulatory scholarship
Not fudging nudges: What Internet law can teach regulatory scholarshipNot fudging nudges: What Internet law can teach regulatory scholarship
Not fudging nudges: What Internet law can teach regulatory scholarship
Chris Marsden
 
Ethics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docx
Ethics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docxEthics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docx
Ethics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docx
SANSKAR20
 
Dcl7301 classi-09092010
Dcl7301 classi-09092010Dcl7301 classi-09092010
Dcl7301 classi-09092010DCL2701A
 
“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to Come
“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to Come“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to Come
“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to Come
Mercatus Center
 
(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx
mayank272369
 
GCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptxGCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptx
MuhammadAbdullah311866
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethicsiallen
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
Charles Mok
 
SCL Annual Conference 2019: Regulating social media platforms for interoperab...
SCL Annual Conference 2019: Regulating social media platforms for interoperab...SCL Annual Conference 2019: Regulating social media platforms for interoperab...
SCL Annual Conference 2019: Regulating social media platforms for interoperab...
Chris Marsden
 
A professional work environment is one that results in a workplace full of hi...
A professional work environment is one that results in a workplace full of hi...A professional work environment is one that results in a workplace full of hi...
A professional work environment is one that results in a workplace full of hi...
alldesign
 
WIPO: What are Internet Intermediaries and their various types?
WIPO: What are Internet Intermediaries and their various types?WIPO: What are Internet Intermediaries and their various types?
WIPO: What are Internet Intermediaries and their various types?
Shane Coughlan
 
Ethics of electronic marketing
Ethics of electronic marketingEthics of electronic marketing
Ethics of electronic marketing
gaurav jain
 
Cyber Law
Cyber LawCyber Law
Cyber Lawihah
 
Big data: Bringing competition policy to the digital era – MANNE – November 2...
Big data: Bringing competition policy to the digital era – MANNE – November 2...Big data: Bringing competition policy to the digital era – MANNE – November 2...
Big data: Bringing competition policy to the digital era – MANNE – November 2...
OECD Directorate for Financial and Enterprise Affairs
 

Similar to Regulating code (20)

Regulating Code - EUI Workshop
Regulating Code - EUI WorkshopRegulating Code - EUI Workshop
Regulating Code - EUI Workshop
 
Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...
Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...
Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...
 
chapter5F.ppt
chapter5F.pptchapter5F.ppt
chapter5F.ppt
 
5362098
53620985362098
5362098
 
5362098
53620985362098
5362098
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
 
Not fudging nudges: What Internet law can teach regulatory scholarship
Not fudging nudges: What Internet law can teach regulatory scholarshipNot fudging nudges: What Internet law can teach regulatory scholarship
Not fudging nudges: What Internet law can teach regulatory scholarship
 
Ethics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docx
Ethics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docxEthics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docx
Ethics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docx
 
Dcl7301 classi-09092010
Dcl7301 classi-09092010Dcl7301 classi-09092010
Dcl7301 classi-09092010
 
“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to Come
“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to Come“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to Come
“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to Come
 
(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx
 
GCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptxGCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptx
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
SCL Annual Conference 2019: Regulating social media platforms for interoperab...
SCL Annual Conference 2019: Regulating social media platforms for interoperab...SCL Annual Conference 2019: Regulating social media platforms for interoperab...
SCL Annual Conference 2019: Regulating social media platforms for interoperab...
 
A professional work environment is one that results in a workplace full of hi...
A professional work environment is one that results in a workplace full of hi...A professional work environment is one that results in a workplace full of hi...
A professional work environment is one that results in a workplace full of hi...
 
WIPO: What are Internet Intermediaries and their various types?
WIPO: What are Internet Intermediaries and their various types?WIPO: What are Internet Intermediaries and their various types?
WIPO: What are Internet Intermediaries and their various types?
 
Ethics of electronic marketing
Ethics of electronic marketingEthics of electronic marketing
Ethics of electronic marketing
 
Cyber Law
Cyber LawCyber Law
Cyber Law
 
Big data: Bringing competition policy to the digital era – MANNE – November 2...
Big data: Bringing competition policy to the digital era – MANNE – November 2...Big data: Bringing competition policy to the digital era – MANNE – November 2...
Big data: Bringing competition policy to the digital era – MANNE – November 2...
 

More from blogzilla

Interoperability for SNS competition
Interoperability for SNS competitionInteroperability for SNS competition
Interoperability for SNS competition
blogzilla
 
Transatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgmentTransatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgment
blogzilla
 
Lessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open BankingLessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open Banking
blogzilla
 
Covid exposure apps in England and Wales
Covid exposure apps in England and WalesCovid exposure apps in England and Wales
Covid exposure apps in England and Wales
blogzilla
 
Key issues in data protection policy
Key issues in data protection policyKey issues in data protection policy
Key issues in data protection policy
blogzilla
 
Trusted government access to private sector data
Trusted government access to private sector dataTrusted government access to private sector data
Trusted government access to private sector data
blogzilla
 
Interoperability in the Digital Services Act
Interoperability in the Digital Services ActInteroperability in the Digital Services Act
Interoperability in the Digital Services Act
blogzilla
 
Making effective policy use of academic expertise
Making effective policy use of academic expertiseMaking effective policy use of academic expertise
Making effective policy use of academic expertise
blogzilla
 
Introduction to Cybersecurity for Elections
Introduction to Cybersecurity for ElectionsIntroduction to Cybersecurity for Elections
Introduction to Cybersecurity for Elections
blogzilla
 
Cyber Essentials for Managers
Cyber Essentials for ManagersCyber Essentials for Managers
Cyber Essentials for Managers
blogzilla
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africa
blogzilla
 
Human rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCHuman rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QC
blogzilla
 
Data science and privacy regulation
Data science and privacy regulationData science and privacy regulation
Data science and privacy regulation
blogzilla
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?
blogzilla
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?
blogzilla
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Things
blogzilla
 
Global Cyber Security Capacity Centre
Global Cyber Security Capacity CentreGlobal Cyber Security Capacity Centre
Global Cyber Security Capacity Centre
blogzilla
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowden
blogzilla
 
Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public good
blogzilla
 
The Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsThe Data Retention Directive: recent developments
The Data Retention Directive: recent developments
blogzilla
 

More from blogzilla (20)

Interoperability for SNS competition
Interoperability for SNS competitionInteroperability for SNS competition
Interoperability for SNS competition
 
Transatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgmentTransatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgment
 
Lessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open BankingLessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open Banking
 
Covid exposure apps in England and Wales
Covid exposure apps in England and WalesCovid exposure apps in England and Wales
Covid exposure apps in England and Wales
 
Key issues in data protection policy
Key issues in data protection policyKey issues in data protection policy
Key issues in data protection policy
 
Trusted government access to private sector data
Trusted government access to private sector dataTrusted government access to private sector data
Trusted government access to private sector data
 
Interoperability in the Digital Services Act
Interoperability in the Digital Services ActInteroperability in the Digital Services Act
Interoperability in the Digital Services Act
 
Making effective policy use of academic expertise
Making effective policy use of academic expertiseMaking effective policy use of academic expertise
Making effective policy use of academic expertise
 
Introduction to Cybersecurity for Elections
Introduction to Cybersecurity for ElectionsIntroduction to Cybersecurity for Elections
Introduction to Cybersecurity for Elections
 
Cyber Essentials for Managers
Cyber Essentials for ManagersCyber Essentials for Managers
Cyber Essentials for Managers
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africa
 
Human rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCHuman rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QC
 
Data science and privacy regulation
Data science and privacy regulationData science and privacy regulation
Data science and privacy regulation
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Things
 
Global Cyber Security Capacity Centre
Global Cyber Security Capacity CentreGlobal Cyber Security Capacity Centre
Global Cyber Security Capacity Centre
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowden
 
Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public good
 
The Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsThe Data Retention Directive: recent developments
The Data Retention Directive: recent developments
 

Recently uploaded

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 

Recently uploaded (20)

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 

Regulating code

  • 1. Regulating Code Good Governance and Better Regulation in the Information Age (MIT Press) Ian Brown (Oxford) Chris Marsden (Sussex) @IanBrownOII #RegulatingCode
  • 2. John Perry Barlow A Declaration of the Independence of Cyberspace (1996) response to CDA 1996 (partly struck down in Reno v. ACLU 1997) ‘Governments of the Industrial World, you weary giants of flesh and steel, I come from Cyberspace, the new home of the Mind. On behalf of the future, I ask you of the past to leave us alone. You are not welcome among us. You have no sovereignty where we gather.’
  • 3. Regulation and governance  Internet use now ubiquitous ◦ but governments, legislators and regulatory agencies falling further behind rapidly changing Internet technologies and uses  Critical analysis of regulatory shaping of ―code‖ or technological environment ◦ ‗Code is law‘ and coders operate within normative framework ◦ More economically efficient and socially just regulation ◦ Critical socio-technical and socio-legal approach
  • 4. Literature  Previous legal focus on elephant‘s trunk? ◦ Benkler, Wu, Lessig, Zittrain, Van Schewick ◦ General US scepticism of govt action  Ohm‘s Myth of the Super-User  More empirical view: Mueller (2010), De Nardis (2009) ◦ Institutional economics and political science
  • 5. Prosumers not super-users  Web 2.0 and related tools make for active users, not passive consumers  United States administrative and academic arguments for self- regulation may work for geeks, but what about the other 99%?  European regulatory space is more fertile ground to explore prosumerism as both a market-based and citizen- oriented regulatory tool
  • 6. Empirical investigation  Five case studies and one ‗prior art‘ (encryption, anonymity, security) ◦ Multi-year empirical investigation ◦ Builds on various EC/other studies including  ‗Self-regulation.info‘ (2001-4), ‗Co-regulation‘ (2006- 8), ‗Towards a Future Internet‘ (2008-10), ‗Privacy Value Networks‘ (2008-11), ‗Network neutrality‘ (2007-10) ‗Internet science‘ (2012-15)  Reassesses prior art in view of ‗hard cases‘ ◦ Topics with no organised regulation/self- regulation ◦ Due to lack of consensus over solutions
  • 7. Five case study chapters 1. Data protection ◦ Enforcement failures, Privacy by Design 2. Copyright ◦ Capture of law by lobbyists, code solutions outflank 3. Filtering ◦ Growth of censorship, surprising degree of freedom – disappearing? 4. Social Networks ◦ Dominance, network effects, corporate social irresponsibility 5. Smart Pipes ◦ Net neutrality argument, DPI deployment
  • 8. Towards interoperability as prosumer law  Solution in favour of prosumers and competition: ◦ enhance the competitive production of public goods ◦ including innovation, public safety, and fundamental democratic rights  Key aspect: interoperability (incl. FRAND) ◦ (Note: this is detailed software interoperability, not the general description offered by Gasser/Paltrey 2012)
  • 9. 50 ways to leave Facebook  Not sufficient to permit data deletion ◦ as that only covers the user‘s tracks.  Interconnection and interoperability, ◦ more than transparency and ◦ theoretical possibility to switch.  Ability for prosumers to interoperate to permit exit ◦ Lower entry barriers tend to lead to increased consumer welfare
  • 10. Kroes‘ promise post-Microsoft  Will ―seriously explore all options to ensure that significant market players cannot just choose to deny interoperability.  ―The Commission should not need to run an epic antitrust case every time software lacks interoperability.‖
  • 11. Euro-Interoperability Framework  Response to multi-€bn competition cases: ◦ Microsoft saga (to 2009), Intel (2009), Apple (2010), Rambus (2009) ◦ Google (2013?) perhaps Facebook.... ◦ Coates (2011: Chapters 5-6)  Announced by Information Society Commissioner Neelie Kroes in 2009- 2010  Bias in favour of interoperability in policy  Concerns are broader than competition ◦ Include privacy, IPR, security, fundamental
  • 12. Mandated choice  Microsoft fined €561m for ‗browser choice‘ ―error‖ – expensive line of code  Sky EPG carries terrestrial channels on 101-105 due to ―must carry‖ and ―due prominence‖ AVMSD
  • 13. Do Not Track  ―I think it‘s right to think about shutting down the process and saying we just can‘t agree. We gave it the old college try. But sometimes you can‘t reach a negotiated deal.‖ –DNT member Jonathan Meyer
  • 14.  Competition investigation both sides of Atlantic since 2010: ◦ Settled with US authorities 3 Jan 2013 ◦ Settlement proposal to EC 1 Feb 2013  Experts have severely criticized timing and content of FTC settlement  Grimmelman argued: ―If the final FTC statement had been any more favourable to Google, I‘d be checking the file metadata to see whether Google wrote it.‖ Google FTC and EC cases Source: Google proposal leaked to SearchEngineLand, 25/4/13
  • 15. Amazon and Kindle  ―[N]ot only booksellers…but publishers and agents too run the risk of being excluded due to Amazon‘s wish to be a book retailer and publisher, and its aggressive plans to vertically integrate‖  Amazon.co.uk ―responsible for 95% of [UK] e-book purchases…92% of the 1.3 million e-readers sold in the UK before Christmas were Kindles‖  ―[F]rom data mining [Amazon] know[s] what its customers buy, when they buy it, what books they actually read on their Kindles and even which books are not read in full‖ Tim Godfray (Chief Executive of Booksellers’ Association UK & Ireland), London Book Fair, 15/4/13
  • 16. Regulating Kindle  ―Having such a dominant position enables Amazon to put huge pressure on individual publishers for higher trade discounts to be given, enabling it to sell books at much lower prices than competing booksellers.‖  ―Most Kindle customers—unless they are very tech savvy—end up buying their e-books from Amazon‘s Kindle store‖ – Mandated choice of e-bookstore, and interoperable stores  ―EPUB3 has just been approved by the International Publishers Association as the new standard format for e-books. We believe that steps should be taken to ensure that in the future all e-book retailers—including Amazon—should support EPUB3, so that consumers can read any e-book on any device and are not locked in to any proprietary system.‖
  • 17. Tor and DRM  ―[W]e felt a strong sense that the reading experience for this tech-savvy, multi-device owning readership was being inhibited by DRM, leaving our readers unable to reasonably and legally transfer ebook files between all the devices they had.‖  ―DRM-protected titles are still subject to piracy, and we believe a great majority of readers are just as against piracy as publishers are... As it is, we‘ve seen no discernible increase in piracy on any of our titles, despite them being DRM-free for nearly a year.‖ –Julie Crisp, UK Editorial Director
  • 18. Economics and Human Rights  Interoperability linked to open data, open code, and arguably to human rights  Blizzard of Internet governance principles in 2011: ◦ origins in law and economics, ◦ or human rights, but ◦ apparently do not translate one to the other  This apparent dialogue of the deaf is a competition policy (Brown and Waelde 2005), and corporate governance problem  Urgent task: dialogue between previous discrete expert fields ◦ ICT growth driver and transformative technology ◦ Equally transformative role in human communication and dialogue.
  • 19. Developing study of code regulation  Similarities and cross-over with ◦ complexity science ◦ network science ◦ web science/graph theory  Match Internet regulation to complexity theory ◦ Longstaff (2003), Cherry (2008), Schneider/Bauer (2007)  Network science fusion of scientific/ fundamental elements from various components  Internet Science? EC Network of Excellence
  • 20. Questions?  Book published March 2013  ‗Prosumer law‘ article (early version now on SSRN)  Comments welcome!
  • 21. Test the existing ‗received truths‘ 1. Self-regulation and minimal state involvement is most efficient in dynamic innovative industries; ◦ technology is never neutral in societal impact ◦ network and scale effects drive massive concentration 2. Self-regulation critically lacks constitutional checks and balances for the private citizen, including appeal 3. Multi-stakeholder co-regulation chance to reconcile the market failures and constitutional legitimacy failures in self- regulation ◦ voters will not allow governments to ignore the Internet.
  • 22. Approach embraces complexity  No easy examples that demonstrate the 'truth' of ◦ technical, political, legal or economic solutions ◦ based on self-, co- or state regulatory approaches. ◦ Cf. Mansell (2012) Imagining the Internet  Examine the deficiencies and benefits ◦ Match market and social developments ◦ With human rights concerns ◦ E.g. In fields of privacy and freedom of expression  Note: analysis based on Article 19 UDHR not 1st Amendment  Most of world uses variants of Article 19
  • 23. Government and market failure  Industry capture of regulators and legislators,  Incumbents protect/introduce new barriers to entry  Continued exclusion of wider civil society from the policy discussion – but ◦ tenuous chain of accountability of participants to voters, shareholders and NGO stakeholders. ◦ effectiveness, accountability and legitimacy of these groups in representing the public interest?
  • 24. What regulation teaches about code  Ex ante and ex post intervention  Interoperability and open code/data - procurement  A biased policy towards open code – ◦ Data open to mash-ups (govt) ◦ Systems interoperable (procurement) ◦ Use of alternatives to market leader (e.g. Linux)
  • 25. Prosumer law suggests a more directed intervention  Example:  proposed solution to the problems of dominant social networking sites,  to prevent Facebook, Google+ or any other network  from erecting a fence around its piece of the information commons:  to ensure interoperability with open standards.

Editor's Notes

  1. http://searchengineland.com/googles-new-european-antitrust-serps-heres-what-theyll-look-like-156904
  2. http://www.thebookseller.com/blogs/friend-or-foe.html
  3. http://www.dailydot.com/news/tor-book-publisher-drm-study-piracy/