SlideShare une entreprise Scribd logo
1  sur  25
Regulating Code
Good Governance and Better Regulation in
the Information Age (MIT Press)
Ian Brown (Oxford)
Chris Marsden (Sussex)
@IanBrownOII
#RegulatingCode
John Perry Barlow
A Declaration of the
Independence of Cyberspace
(1996)
response to CDA 1996
(partly struck down in Reno v. ACLU 1997)
‘Governments of the
Industrial World, you weary
giants of flesh and steel, I
come from Cyberspace,
the new home of the Mind.
On behalf of the future, I
ask you of the past to
leave us alone. You are not
welcome among us. You
have no sovereignty where
we gather.’
Regulation and governance
 Internet use now ubiquitous
◦ but governments, legislators and regulatory
agencies falling further behind rapidly
changing Internet technologies and uses
 Critical analysis of regulatory shaping of
―code‖ or technological environment
◦ ‗Code is law‘ and coders operate within
normative framework
◦ More economically efficient and socially just
regulation
◦ Critical socio-technical and socio-legal
approach
Literature
 Previous legal focus on elephant‘s
trunk?
◦ Benkler, Wu, Lessig, Zittrain, Van
Schewick
◦ General US scepticism of govt action
 Ohm‘s Myth of the Super-User
 More empirical view: Mueller (2010),
De Nardis (2009)
◦ Institutional economics and political
science
Prosumers not super-users
 Web 2.0 and related tools make for
active users, not passive consumers
 United States administrative and
academic arguments for self-
regulation may work for geeks, but
what about the other 99%?
 European regulatory space is more
fertile ground to explore prosumerism
as both a market-based and citizen-
oriented regulatory tool
Empirical investigation
 Five case studies and one ‗prior art‘
(encryption, anonymity, security)
◦ Multi-year empirical investigation
◦ Builds on various EC/other studies including
 ‗Self-regulation.info‘ (2001-4), ‗Co-regulation‘ (2006-
8), ‗Towards a Future Internet‘ (2008-10), ‗Privacy
Value Networks‘ (2008-11), ‗Network neutrality‘
(2007-10) ‗Internet science‘ (2012-15)
 Reassesses prior art in view of ‗hard
cases‘
◦ Topics with no organised regulation/self-
regulation
◦ Due to lack of consensus over solutions
Five case study chapters
1. Data protection
◦ Enforcement failures, Privacy by Design
2. Copyright
◦ Capture of law by lobbyists, code solutions
outflank
3. Filtering
◦ Growth of censorship, surprising degree of
freedom – disappearing?
4. Social Networks
◦ Dominance, network effects, corporate social
irresponsibility
5. Smart Pipes
◦ Net neutrality argument, DPI deployment
Towards interoperability as
prosumer law
 Solution in favour of prosumers and
competition:
◦ enhance the competitive production of
public goods
◦ including innovation, public safety, and
fundamental democratic rights
 Key aspect: interoperability (incl.
FRAND)
◦ (Note: this is detailed software
interoperability, not the general
description offered by Gasser/Paltrey
2012)
50 ways to leave Facebook
 Not sufficient to permit data deletion
◦ as that only covers the user‘s tracks.
 Interconnection and interoperability,
◦ more than transparency and
◦ theoretical possibility to switch.
 Ability for prosumers to interoperate to
permit exit
◦ Lower entry barriers tend to lead to increased
consumer welfare
Kroes‘ promise post-Microsoft
 Will ―seriously explore
all options to ensure
that significant market
players cannot just
choose to deny
interoperability.
 ―The Commission
should not need to
run an epic antitrust
case every time
software lacks
interoperability.‖
Euro-Interoperability
Framework
 Response to multi-€bn competition
cases:
◦ Microsoft saga (to 2009), Intel (2009), Apple
(2010), Rambus (2009)
◦ Google (2013?) perhaps Facebook....
◦ Coates (2011: Chapters 5-6)
 Announced by Information Society
Commissioner Neelie Kroes in 2009-
2010
 Bias in favour of interoperability in policy
 Concerns are broader than competition
◦ Include privacy, IPR, security, fundamental
Mandated choice
 Microsoft fined
€561m for ‗browser
choice‘ ―error‖ –
expensive line of
code
 Sky EPG carries
terrestrial channels
on 101-105 due to
―must carry‖ and
―due prominence‖
AVMSD
Do Not Track
 ―I think it‘s right to think about shutting
down the process and saying we just
can‘t agree. We gave it the old college
try. But sometimes you can‘t reach a
negotiated deal.‖ –DNT member
Jonathan Meyer
 Competition
investigation both sides
of Atlantic since 2010:
◦ Settled with US
authorities 3 Jan 2013
◦ Settlement proposal to EC
1 Feb 2013
 Experts have severely
criticized timing and
content of FTC
settlement
 Grimmelman argued: ―If
the final FTC statement
had been any more
favourable to Google, I‘d
be checking the file
metadata to see whether
Google wrote it.‖
Google FTC and EC cases
Source: Google proposal leaked to SearchEngineLand, 25/4/13
Amazon and Kindle
 ―[N]ot only booksellers…but publishers and agents
too run the risk of being excluded due to Amazon‘s
wish to be a book retailer and publisher, and its
aggressive plans to vertically integrate‖
 Amazon.co.uk ―responsible for 95% of [UK] e-book
purchases…92% of the 1.3 million e-readers sold in
the UK before Christmas were Kindles‖
 ―[F]rom data mining [Amazon] know[s] what its
customers buy, when they buy it, what books they
actually read on their Kindles and even which books
are not read in full‖
Tim Godfray (Chief Executive of Booksellers’
Association UK & Ireland), London Book Fair, 15/4/13
Regulating Kindle
 ―Having such a dominant position enables Amazon to
put huge pressure on individual publishers for higher
trade discounts to be given, enabling it to sell books at
much lower prices than competing booksellers.‖
 ―Most Kindle customers—unless they are very tech
savvy—end up buying their e-books from Amazon‘s
Kindle store‖ – Mandated choice of e-bookstore, and
interoperable stores
 ―EPUB3 has just been approved by the International
Publishers Association as the new standard format for
e-books. We believe that steps should be taken to
ensure that in the future all e-book retailers—including
Amazon—should support EPUB3, so that consumers
can read any e-book on any device and are not locked
in to any proprietary system.‖
Tor and DRM
 ―[W]e felt a strong sense that the reading
experience for this tech-savvy, multi-device
owning readership was being inhibited by
DRM, leaving our readers unable to
reasonably and legally transfer ebook files
between all the devices they had.‖
 ―DRM-protected titles are still subject to
piracy, and we believe a great majority of
readers are just as against piracy as
publishers are... As it is, we‘ve seen no
discernible increase in piracy on any of our
titles, despite them being DRM-free for nearly
a year.‖ –Julie Crisp, UK Editorial Director
Economics and Human
Rights
 Interoperability linked to open data, open code,
and arguably to human rights
 Blizzard of Internet governance principles in
2011:
◦ origins in law and economics,
◦ or human rights, but
◦ apparently do not translate one to the other
 This apparent dialogue of the deaf is a
competition policy (Brown and Waelde 2005),
and corporate governance problem
 Urgent task: dialogue between previous discrete expert
fields
◦ ICT growth driver and transformative technology
◦ Equally transformative role in human communication
and dialogue.
Developing study of code
regulation
 Similarities and cross-over with
◦ complexity science
◦ network science
◦ web science/graph theory
 Match Internet regulation to complexity theory
◦ Longstaff (2003), Cherry (2008),
Schneider/Bauer (2007)
 Network science fusion of scientific/
fundamental elements from various
components
 Internet Science? EC Network of Excellence
Questions?
 Book published
March 2013
 ‗Prosumer law‘
article (early
version now on
SSRN)
 Comments
welcome!
Test the existing ‗received
truths‘
1. Self-regulation and minimal state
involvement is most efficient in dynamic
innovative industries;
◦ technology is never neutral in societal impact
◦ network and scale effects drive massive
concentration
2. Self-regulation critically lacks constitutional
checks and balances for the private citizen,
including appeal
3. Multi-stakeholder co-regulation chance to
reconcile the market failures and
constitutional legitimacy failures in self-
regulation
◦ voters will not allow governments to ignore the
Internet.
Approach embraces
complexity
 No easy examples that demonstrate the
'truth' of
◦ technical, political, legal or economic solutions
◦ based on self-, co- or state regulatory
approaches.
◦ Cf. Mansell (2012) Imagining the Internet
 Examine the deficiencies and benefits
◦ Match market and social developments
◦ With human rights concerns
◦ E.g. In fields of privacy and freedom of
expression
 Note: analysis based on Article 19 UDHR not 1st
Amendment
 Most of world uses variants of Article 19
Government and market
failure
 Industry capture of regulators and
legislators,
 Incumbents protect/introduce new
barriers to entry
 Continued exclusion of wider civil society
from the policy discussion – but
◦ tenuous chain of accountability of
participants to voters, shareholders and NGO
stakeholders.
◦ effectiveness, accountability and legitimacy
of these groups in representing the public
interest?
What regulation teaches about
code
 Ex ante and ex post intervention
 Interoperability and open code/data -
procurement
 A biased policy towards open code –
◦ Data open to mash-ups (govt)
◦ Systems interoperable (procurement)
◦ Use of alternatives to market leader (e.g.
Linux)
Prosumer law suggests a more
directed intervention
 Example:
 proposed solution to the problems of
dominant social networking sites,
 to prevent Facebook, Google+ or any
other network
 from erecting a fence around its piece
of the information commons:
 to ensure interoperability with open
standards.

Contenu connexe

Tendances

Ethics in e commerce n it
Ethics in e commerce n itEthics in e commerce n it
Ethics in e commerce n it
amitmitkar
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLI
James Bollen
 
Legal & moral issues in e commerce
Legal & moral issues in e commerceLegal & moral issues in e commerce
Legal & moral issues in e commerce
Damo Ward
 

Tendances (18)

Ethics in e commerce n it
Ethics in e commerce n itEthics in e commerce n it
Ethics in e commerce n it
 
Internet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP InstituteInternet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP Institute
 
Washington's Privacy Tango
Washington's Privacy TangoWashington's Privacy Tango
Washington's Privacy Tango
 
Meetings and the law chicago digital age 050813
Meetings and the law   chicago digital age 050813Meetings and the law   chicago digital age 050813
Meetings and the law chicago digital age 050813
 
Ethical, Social, and Political Issues in E-commerce
Ethical, Social, and Political Issues in E-commerceEthical, Social, and Political Issues in E-commerce
Ethical, Social, and Political Issues in E-commerce
 
Blog Wars at New Media Expo
Blog Wars at New Media ExpoBlog Wars at New Media Expo
Blog Wars at New Media Expo
 
08 Ethics, Law and E-commerce
08 Ethics, Law and E-commerce08 Ethics, Law and E-commerce
08 Ethics, Law and E-commerce
 
DEA: the dangerous downloaders act
DEA: the dangerous downloaders actDEA: the dangerous downloaders act
DEA: the dangerous downloaders act
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLI
 
Net Neutrality 03
Net Neutrality 03Net Neutrality 03
Net Neutrality 03
 
Surveillance Capitalism
Surveillance  CapitalismSurveillance  Capitalism
Surveillance Capitalism
 
Public policy legal issues to privacy
Public policy legal issues to privacyPublic policy legal issues to privacy
Public policy legal issues to privacy
 
Amazon Tax Wars
Amazon Tax WarsAmazon Tax Wars
Amazon Tax Wars
 
Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)
Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)
Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)
 
3 - Social Media and Enterprise
3 - Social Media and Enterprise3 - Social Media and Enterprise
3 - Social Media and Enterprise
 
Legal & moral issues in e commerce
Legal & moral issues in e commerceLegal & moral issues in e commerce
Legal & moral issues in e commerce
 
Rebooting digital identity: how the social web is transforming citizen behavi...
Rebooting digital identity: how the social web is transforming citizen behavi...Rebooting digital identity: how the social web is transforming citizen behavi...
Rebooting digital identity: how the social web is transforming citizen behavi...
 
Big Data and Privacy
Big Data and PrivacyBig Data and Privacy
Big Data and Privacy
 

Similaire à Regulating code

Regulating Code - EUI Workshop
Regulating Code - EUI WorkshopRegulating Code - EUI Workshop
Regulating Code - EUI Workshop
Chris Marsden
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
adampcarr67227
 
Not fudging nudges: What Internet law can teach regulatory scholarship
Not fudging nudges: What Internet law can teach regulatory scholarshipNot fudging nudges: What Internet law can teach regulatory scholarship
Not fudging nudges: What Internet law can teach regulatory scholarship
Chris Marsden
 
Ethics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docx
Ethics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docxEthics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docx
Ethics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docx
SANSKAR20
 
Dcl7301 classi-09092010
Dcl7301 classi-09092010Dcl7301 classi-09092010
Dcl7301 classi-09092010
DCL2701A
 
(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx
mayank272369
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
iallen
 
A professional work environment is one that results in a workplace full of hi...
A professional work environment is one that results in a workplace full of hi...A professional work environment is one that results in a workplace full of hi...
A professional work environment is one that results in a workplace full of hi...
alldesign
 
Cyber Law
Cyber LawCyber Law
Cyber Law
ihah
 

Similaire à Regulating code (20)

Regulating Code - EUI Workshop
Regulating Code - EUI WorkshopRegulating Code - EUI Workshop
Regulating Code - EUI Workshop
 
Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...
Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...
Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...
 
chapter5F.ppt
chapter5F.pptchapter5F.ppt
chapter5F.ppt
 
5362098
53620985362098
5362098
 
5362098
53620985362098
5362098
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
 
Not fudging nudges: What Internet law can teach regulatory scholarship
Not fudging nudges: What Internet law can teach regulatory scholarshipNot fudging nudges: What Internet law can teach regulatory scholarship
Not fudging nudges: What Internet law can teach regulatory scholarship
 
Ethics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docx
Ethics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docxEthics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docx
Ethics for the Digital AgeBy Gry Hasselbalch on 2016-02-05AN.docx
 
Dcl7301 classi-09092010
Dcl7301 classi-09092010Dcl7301 classi-09092010
Dcl7301 classi-09092010
 
“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to Come
“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to Come“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to Come
“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to Come
 
(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx
 
GCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptxGCCS-privacy-PP-final presentation-3-1.pptx
GCCS-privacy-PP-final presentation-3-1.pptx
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
SCL Annual Conference 2019: Regulating social media platforms for interoperab...
SCL Annual Conference 2019: Regulating social media platforms for interoperab...SCL Annual Conference 2019: Regulating social media platforms for interoperab...
SCL Annual Conference 2019: Regulating social media platforms for interoperab...
 
A professional work environment is one that results in a workplace full of hi...
A professional work environment is one that results in a workplace full of hi...A professional work environment is one that results in a workplace full of hi...
A professional work environment is one that results in a workplace full of hi...
 
WIPO: What are Internet Intermediaries and their various types?
WIPO: What are Internet Intermediaries and their various types?WIPO: What are Internet Intermediaries and their various types?
WIPO: What are Internet Intermediaries and their various types?
 
Ethics of electronic marketing
Ethics of electronic marketingEthics of electronic marketing
Ethics of electronic marketing
 
Cyber Law
Cyber LawCyber Law
Cyber Law
 
Big data: Bringing competition policy to the digital era – MANNE – November 2...
Big data: Bringing competition policy to the digital era – MANNE – November 2...Big data: Bringing competition policy to the digital era – MANNE – November 2...
Big data: Bringing competition policy to the digital era – MANNE – November 2...
 

Plus de blogzilla

Plus de blogzilla (20)

Interoperability for SNS competition
Interoperability for SNS competitionInteroperability for SNS competition
Interoperability for SNS competition
 
Transatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgmentTransatlantic data flows following the Schrems II judgment
Transatlantic data flows following the Schrems II judgment
 
Lessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open BankingLessons for interoperability remedies from UK Open Banking
Lessons for interoperability remedies from UK Open Banking
 
Covid exposure apps in England and Wales
Covid exposure apps in England and WalesCovid exposure apps in England and Wales
Covid exposure apps in England and Wales
 
Key issues in data protection policy
Key issues in data protection policyKey issues in data protection policy
Key issues in data protection policy
 
Trusted government access to private sector data
Trusted government access to private sector dataTrusted government access to private sector data
Trusted government access to private sector data
 
Interoperability in the Digital Services Act
Interoperability in the Digital Services ActInteroperability in the Digital Services Act
Interoperability in the Digital Services Act
 
Making effective policy use of academic expertise
Making effective policy use of academic expertiseMaking effective policy use of academic expertise
Making effective policy use of academic expertise
 
Introduction to Cybersecurity for Elections
Introduction to Cybersecurity for ElectionsIntroduction to Cybersecurity for Elections
Introduction to Cybersecurity for Elections
 
Cyber Essentials for Managers
Cyber Essentials for ManagersCyber Essentials for Managers
Cyber Essentials for Managers
 
Privacy and Data Protection in South Africa
Privacy and Data Protection in South AfricaPrivacy and Data Protection in South Africa
Privacy and Data Protection in South Africa
 
Human rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QCHuman rights and the future of surveillance - Lord Anderson QC
Human rights and the future of surveillance - Lord Anderson QC
 
Data science and privacy regulation
Data science and privacy regulationData science and privacy regulation
Data science and privacy regulation
 
Where next for encryption regulation?
Where next for encryption regulation?Where next for encryption regulation?
Where next for encryption regulation?
 
Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?Where next for the Regulation of Investigatory Powers Act?
Where next for the Regulation of Investigatory Powers Act?
 
Regulation and the Internet of Things
Regulation and the Internet of ThingsRegulation and the Internet of Things
Regulation and the Internet of Things
 
Global Cyber Security Capacity Centre
Global Cyber Security Capacity CentreGlobal Cyber Security Capacity Centre
Global Cyber Security Capacity Centre
 
Privacy post-Snowden
Privacy post-SnowdenPrivacy post-Snowden
Privacy post-Snowden
 
Keeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public goodKeeping our secrets? Shaping Internet technologies for the public good
Keeping our secrets? Shaping Internet technologies for the public good
 
The Data Retention Directive: recent developments
The Data Retention Directive: recent developmentsThe Data Retention Directive: recent developments
The Data Retention Directive: recent developments
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 

Regulating code

  • 1. Regulating Code Good Governance and Better Regulation in the Information Age (MIT Press) Ian Brown (Oxford) Chris Marsden (Sussex) @IanBrownOII #RegulatingCode
  • 2. John Perry Barlow A Declaration of the Independence of Cyberspace (1996) response to CDA 1996 (partly struck down in Reno v. ACLU 1997) ‘Governments of the Industrial World, you weary giants of flesh and steel, I come from Cyberspace, the new home of the Mind. On behalf of the future, I ask you of the past to leave us alone. You are not welcome among us. You have no sovereignty where we gather.’
  • 3. Regulation and governance  Internet use now ubiquitous ◦ but governments, legislators and regulatory agencies falling further behind rapidly changing Internet technologies and uses  Critical analysis of regulatory shaping of ―code‖ or technological environment ◦ ‗Code is law‘ and coders operate within normative framework ◦ More economically efficient and socially just regulation ◦ Critical socio-technical and socio-legal approach
  • 4. Literature  Previous legal focus on elephant‘s trunk? ◦ Benkler, Wu, Lessig, Zittrain, Van Schewick ◦ General US scepticism of govt action  Ohm‘s Myth of the Super-User  More empirical view: Mueller (2010), De Nardis (2009) ◦ Institutional economics and political science
  • 5. Prosumers not super-users  Web 2.0 and related tools make for active users, not passive consumers  United States administrative and academic arguments for self- regulation may work for geeks, but what about the other 99%?  European regulatory space is more fertile ground to explore prosumerism as both a market-based and citizen- oriented regulatory tool
  • 6. Empirical investigation  Five case studies and one ‗prior art‘ (encryption, anonymity, security) ◦ Multi-year empirical investigation ◦ Builds on various EC/other studies including  ‗Self-regulation.info‘ (2001-4), ‗Co-regulation‘ (2006- 8), ‗Towards a Future Internet‘ (2008-10), ‗Privacy Value Networks‘ (2008-11), ‗Network neutrality‘ (2007-10) ‗Internet science‘ (2012-15)  Reassesses prior art in view of ‗hard cases‘ ◦ Topics with no organised regulation/self- regulation ◦ Due to lack of consensus over solutions
  • 7. Five case study chapters 1. Data protection ◦ Enforcement failures, Privacy by Design 2. Copyright ◦ Capture of law by lobbyists, code solutions outflank 3. Filtering ◦ Growth of censorship, surprising degree of freedom – disappearing? 4. Social Networks ◦ Dominance, network effects, corporate social irresponsibility 5. Smart Pipes ◦ Net neutrality argument, DPI deployment
  • 8. Towards interoperability as prosumer law  Solution in favour of prosumers and competition: ◦ enhance the competitive production of public goods ◦ including innovation, public safety, and fundamental democratic rights  Key aspect: interoperability (incl. FRAND) ◦ (Note: this is detailed software interoperability, not the general description offered by Gasser/Paltrey 2012)
  • 9. 50 ways to leave Facebook  Not sufficient to permit data deletion ◦ as that only covers the user‘s tracks.  Interconnection and interoperability, ◦ more than transparency and ◦ theoretical possibility to switch.  Ability for prosumers to interoperate to permit exit ◦ Lower entry barriers tend to lead to increased consumer welfare
  • 10. Kroes‘ promise post-Microsoft  Will ―seriously explore all options to ensure that significant market players cannot just choose to deny interoperability.  ―The Commission should not need to run an epic antitrust case every time software lacks interoperability.‖
  • 11. Euro-Interoperability Framework  Response to multi-€bn competition cases: ◦ Microsoft saga (to 2009), Intel (2009), Apple (2010), Rambus (2009) ◦ Google (2013?) perhaps Facebook.... ◦ Coates (2011: Chapters 5-6)  Announced by Information Society Commissioner Neelie Kroes in 2009- 2010  Bias in favour of interoperability in policy  Concerns are broader than competition ◦ Include privacy, IPR, security, fundamental
  • 12. Mandated choice  Microsoft fined €561m for ‗browser choice‘ ―error‖ – expensive line of code  Sky EPG carries terrestrial channels on 101-105 due to ―must carry‖ and ―due prominence‖ AVMSD
  • 13. Do Not Track  ―I think it‘s right to think about shutting down the process and saying we just can‘t agree. We gave it the old college try. But sometimes you can‘t reach a negotiated deal.‖ –DNT member Jonathan Meyer
  • 14.  Competition investigation both sides of Atlantic since 2010: ◦ Settled with US authorities 3 Jan 2013 ◦ Settlement proposal to EC 1 Feb 2013  Experts have severely criticized timing and content of FTC settlement  Grimmelman argued: ―If the final FTC statement had been any more favourable to Google, I‘d be checking the file metadata to see whether Google wrote it.‖ Google FTC and EC cases Source: Google proposal leaked to SearchEngineLand, 25/4/13
  • 15. Amazon and Kindle  ―[N]ot only booksellers…but publishers and agents too run the risk of being excluded due to Amazon‘s wish to be a book retailer and publisher, and its aggressive plans to vertically integrate‖  Amazon.co.uk ―responsible for 95% of [UK] e-book purchases…92% of the 1.3 million e-readers sold in the UK before Christmas were Kindles‖  ―[F]rom data mining [Amazon] know[s] what its customers buy, when they buy it, what books they actually read on their Kindles and even which books are not read in full‖ Tim Godfray (Chief Executive of Booksellers’ Association UK & Ireland), London Book Fair, 15/4/13
  • 16. Regulating Kindle  ―Having such a dominant position enables Amazon to put huge pressure on individual publishers for higher trade discounts to be given, enabling it to sell books at much lower prices than competing booksellers.‖  ―Most Kindle customers—unless they are very tech savvy—end up buying their e-books from Amazon‘s Kindle store‖ – Mandated choice of e-bookstore, and interoperable stores  ―EPUB3 has just been approved by the International Publishers Association as the new standard format for e-books. We believe that steps should be taken to ensure that in the future all e-book retailers—including Amazon—should support EPUB3, so that consumers can read any e-book on any device and are not locked in to any proprietary system.‖
  • 17. Tor and DRM  ―[W]e felt a strong sense that the reading experience for this tech-savvy, multi-device owning readership was being inhibited by DRM, leaving our readers unable to reasonably and legally transfer ebook files between all the devices they had.‖  ―DRM-protected titles are still subject to piracy, and we believe a great majority of readers are just as against piracy as publishers are... As it is, we‘ve seen no discernible increase in piracy on any of our titles, despite them being DRM-free for nearly a year.‖ –Julie Crisp, UK Editorial Director
  • 18. Economics and Human Rights  Interoperability linked to open data, open code, and arguably to human rights  Blizzard of Internet governance principles in 2011: ◦ origins in law and economics, ◦ or human rights, but ◦ apparently do not translate one to the other  This apparent dialogue of the deaf is a competition policy (Brown and Waelde 2005), and corporate governance problem  Urgent task: dialogue between previous discrete expert fields ◦ ICT growth driver and transformative technology ◦ Equally transformative role in human communication and dialogue.
  • 19. Developing study of code regulation  Similarities and cross-over with ◦ complexity science ◦ network science ◦ web science/graph theory  Match Internet regulation to complexity theory ◦ Longstaff (2003), Cherry (2008), Schneider/Bauer (2007)  Network science fusion of scientific/ fundamental elements from various components  Internet Science? EC Network of Excellence
  • 20. Questions?  Book published March 2013  ‗Prosumer law‘ article (early version now on SSRN)  Comments welcome!
  • 21. Test the existing ‗received truths‘ 1. Self-regulation and minimal state involvement is most efficient in dynamic innovative industries; ◦ technology is never neutral in societal impact ◦ network and scale effects drive massive concentration 2. Self-regulation critically lacks constitutional checks and balances for the private citizen, including appeal 3. Multi-stakeholder co-regulation chance to reconcile the market failures and constitutional legitimacy failures in self- regulation ◦ voters will not allow governments to ignore the Internet.
  • 22. Approach embraces complexity  No easy examples that demonstrate the 'truth' of ◦ technical, political, legal or economic solutions ◦ based on self-, co- or state regulatory approaches. ◦ Cf. Mansell (2012) Imagining the Internet  Examine the deficiencies and benefits ◦ Match market and social developments ◦ With human rights concerns ◦ E.g. In fields of privacy and freedom of expression  Note: analysis based on Article 19 UDHR not 1st Amendment  Most of world uses variants of Article 19
  • 23. Government and market failure  Industry capture of regulators and legislators,  Incumbents protect/introduce new barriers to entry  Continued exclusion of wider civil society from the policy discussion – but ◦ tenuous chain of accountability of participants to voters, shareholders and NGO stakeholders. ◦ effectiveness, accountability and legitimacy of these groups in representing the public interest?
  • 24. What regulation teaches about code  Ex ante and ex post intervention  Interoperability and open code/data - procurement  A biased policy towards open code – ◦ Data open to mash-ups (govt) ◦ Systems interoperable (procurement) ◦ Use of alternatives to market leader (e.g. Linux)
  • 25. Prosumer law suggests a more directed intervention  Example:  proposed solution to the problems of dominant social networking sites,  to prevent Facebook, Google+ or any other network  from erecting a fence around its piece of the information commons:  to ensure interoperability with open standards.

Notes de l'éditeur

  1. http://searchengineland.com/googles-new-european-antitrust-serps-heres-what-theyll-look-like-156904
  2. http://www.thebookseller.com/blogs/friend-or-foe.html
  3. http://www.dailydot.com/news/tor-book-publisher-drm-study-piracy/