tag:blogger.com,1999:blog-45414271248383944312024-02-08T03:09:51.570-08:00Regulating CodeGood Governance and Better Regulation in the Information Age: http://mitpress.mit.edu/books/regulating-codechrishttp://www.blogger.com/profile/01894132626803555691noreply@blogger.comBlogger186125tag:blogger.com,1999:blog-4541427124838394431.post-13126584461546415522024-01-15T16:15:00.000-08:002024-01-15T16:15:06.157-08:00Decade on - a retro/perspective<p> Here's our <a href="https://www.youtube.com/watch?v=bMBXbI1-imw" target="_blank">conversation from October 2023</a>, enjoy.</p>chrishttp://www.blogger.com/profile/01894132626803555691noreply@blogger.com0tag:blogger.com,1999:blog-4541427124838394431.post-37017470249654144882018-05-21T12:29:00.001-07:002018-05-21T12:29:11.639-07:00Tech Platforms and the Knowledge Problem - Frank Pasquale<a href="https://americanaffairsjournal.org/2018/05/tech-platforms-and-the-knowledge-problem/">Tech Platforms and the Knowledge Problem - American Affairs Journal</a>: "Law can help resolve these tensions. Competition laws take aim at the functional sovereignty of large tech platforms, and antitrust authorities should have blocked Facebook’s purchases of Instagram and WhatsApp, instead of letting its juggernaut of domination over communication roll up entities capable of providing alternative modes of association online. Ten, twenty, or one hundred social networks could eventually emerge, if competition law were properly enforced, and interoperability standards could assure smooth connections among confederations of social networks, just as AT&T, T-Mobile, and Verizon customers can all talk to one another seamlessly. If that diversity emerged, we could worry less about a few persons in Silicon Valley essentially serving as a world Supreme Court deciding which expression is appropriate for a so-called global community.<br /><br />
When industrial giants can’t be broken up, there are still many ways to neutralize their power. Utility-style regulation mitigates the worst failures of absentee owners, as well as the caprices of the powerful. The state can require Google to carry certain content on YouTube, just as it has required cable networks to include local news. Moreover, whenever policymakers are afraid that firms like Google, Amazon, or Uber are taking too large a cut of transactions, they can take a page out of the playbook of insurance regulators, which often limit insurers to taking 15 to 20 percent of premiums (the rest must be spent on health care). That kind of limit recognizes the infrastructure-like quality of these firms’ services." <a href="https://chrome.google.com/webstore/detail/pengoopmcjnbflcjbmoeodbmoflcgjlk" style="font-size: 13px;">'via Blog this'</a>chrishttp://www.blogger.com/profile/01894132626803555691noreply@blogger.com3tag:blogger.com,1999:blog-4541427124838394431.post-39271325438133053772018-05-21T12:12:00.001-07:002018-05-21T12:12:45.723-07:00On 20th anniversary of Microsoft antitrust, US Treasury Secretary call for Google probe • The Register<a href="https://www.theregister.co.uk/2018/05/21/on_20th_anniversary_of_microsoft_antitrust_treasury_secretary_says_its_time_to_take_a_look_at_google/">On 20th anniversary of Microsoft antitrust, US Treasury Secretary call for Google probe • The Register</a>: "So are we finally at the same point we were in 1998 when, after years of complaints about Microsoft abusing its market power, the authorities are finally willing to overcome their free-market bias and ignore the healthy campaign contributions to act on behalf of the American people?<br /><br />
We will have to see, but it feels fairly similar right now. It is not the same of course: no one is forcing people to use Facebook, and, as Google is fond of saying, a competing search engine is just a click away. But at the same time, Facebook has its code on just about every major website, and Google pays companies billions of dollars to make sure it is the default search engine.<br /><br />
Things change but that same sense of a company doing something obviously wrong because no one is in any position to stop is very much present.<br /><br />
When you have mainstream TV shows and cabinet secretaries chiming in, it may be a sign that the tide has turned.<br />
<br />
Oh, and Google removed its "don't be evil" motto and philosophy from its website at some point in the past few weeks. Just saying."<br /><br />
<br /><br />
<a href="https://chrome.google.com/webstore/detail/pengoopmcjnbflcjbmoeodbmoflcgjlk" style="font-size: 13px;">'via Blog this'</a>chrishttp://www.blogger.com/profile/01894132626803555691noreply@blogger.com0tag:blogger.com,1999:blog-4541427124838394431.post-78855123737703830792018-02-23T13:00:00.001-08:002018-02-23T13:00:52.432-08:00The FTC's Controversial Battle To Force Companies To Protect Your Data<a href="https://webcache.googleusercontent.com/search?q=cache:_PwRaZTdyFwJ:https://www.forbes.com/sites/kashmirhill/2014/08/21/the-ftcs-controversial-battle-to-force-companies-to-protect-your-data/+&cd=1&hl=en&ct=clnk&gl=us">The FTC's Controversial Battle To Force Companies To Protect Your Data</a>: "The FTC recently brought in Andrea Matwyshyn, an Internet security lawyer and law professor, who has been attending Defcon for a decade, as a senior policy advisor. It was her idea to run the robocall contest at Defcon this year. “The Internet of Things is bringing code into very personal aspects of our lives – into our homes and into our bodies,” she said. “When our medical devices, our cars, our homes, the gadgets we interact with are non-transparent agents of our trust, it’s increasingly important to consumers that there is transparent security and trust expectations for governance of their data.”"<br /><br />
Four years ago and still the best thing the FTC has ever done...<a href="https://chrome.google.com/webstore/detail/pengoopmcjnbflcjbmoeodbmoflcgjlk" style="font-size: 13px;">'via Blog this'</a>chrishttp://www.blogger.com/profile/01894132626803555691noreply@blogger.com0tag:blogger.com,1999:blog-4541427124838394431.post-51750946747281857072017-12-12T10:14:00.001-08:002017-12-12T10:14:19.672-08:00Another toothless wonder? Why the UK.gov's data ethics centre needs clout • The Register<a href="https://www.theregister.co.uk/2017/11/24/another_toothless_wonder_why_the_ukgovs_data_ethics_centre_needs_some_clout/">Another toothless wonder? Why the UK.gov's data ethics centre needs clout • The Register</a>: "Again, aside from the fact it would be refreshing to see the government choose someone who isn't a white man pushing 50 for this kind of role, it would breathe a bit of life into the body, and increase its reputation among those watching, if the government looked outside the usual pool of suspects.<br /><br />
"There are a lot of examples of similar, private, bodies in the US, many of which are led by female tech execs," said Veale, such as danah boyd's Data & Society. "It would be good to have that kind of fresh person, rather than a senior civil servant or a one-day-a-month academic."<br /><br />
Because fundamentally, it doesn't matter how well the centre's piece fits into the data reg jigsaw if no one listens to what it says.<br />
<br />
If it ends up as just another fusty academic unit lacking the requisite backbone to speak truth to power, it will have been a wasted effort and a wasted opportunity. " <a href="https://chrome.google.com/webstore/detail/pengoopmcjnbflcjbmoeodbmoflcgjlk" style="font-size: 13px;">'via Blog this'</a>chrishttp://www.blogger.com/profile/01894132626803555691noreply@blogger.com0tag:blogger.com,1999:blog-4541427124838394431.post-79695904213870887592017-12-08T10:09:00.001-08:002017-12-08T10:09:07.875-08:00Electrospaces.net: INCENSER, or how NSA and GCHQ are tapping internet cables<a href="https://electrospaces.blogspot.co.uk/2014/11/incenser-or-how-nsa-and-gchq-are.html">Electrospaces.net: INCENSER, or how NSA and GCHQ are tapping internet cables</a>: "The secret GCHQ documents about these cable tapping operations only refer to the cooperating telecommunications provider with the cover name GERONTIC. The real name is protected by STRAP 2 dissemination restrictions. But nonetheless, German media already revealed that GERONTIC is Cable & Wireless last year. <br />
<br />
In july 2012, Cable & Wireless Worldwide was taken over by Vodafone for 1.04 billion pounds, but according to the GCHQ documents, the covername GERONTIC was continued, and was seen active until at least April 2013.<br /><br />
According to the press reports, GCHQ had access to 63 undersea internet cables, 29 of which with the help of GERONTIC. This accounted for about 70% of the total amount of internet data that GCHQ had access to in 2009.<br />
<br />
Cable & Wireless was involved in these 29 cables, either because it had Direct Cable Ownership (DCO), an Indefeasible Right of Use (IRU) or Leased Capacity (LC). Besides that, the GCHQ Cable Master List from 2009 lists GERONTIC also as a landing partner for the following nine cables" <a href="https://chrome.google.com/webstore/detail/pengoopmcjnbflcjbmoeodbmoflcgjlk" style="font-size: 13px;">'via Blog this'</a>chrishttp://www.blogger.com/profile/01894132626803555691noreply@blogger.com0tag:blogger.com,1999:blog-4541427124838394431.post-47790875659720675732017-10-23T15:25:00.001-07:002017-10-23T15:25:20.645-07:00Not Being Evil: How Law and Computer Science Can Work Together to Improve Society<div dir="ltr" style="text-align: left;" trbidi="on">
<!--[if gte mso 9]><xml>
<o:OfficeDocumentSettings>
<o:AllowPNG/>
</o:OfficeDocumentSettings>
</xml><![endif]--><br />
<!--[if gte mso 9]><xml>
<w:WordDocument>
<w:View>Normal</w:View>
<w:Zoom>0</w:Zoom>
<w:TrackMoves/>
<w:TrackFormatting/>
<w:PunctuationKerning/>
<w:ValidateAgainstSchemas/>
<w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
<w:IgnoreMixedContent>false</w:IgnoreMixedContent>
<w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
<w:DoNotPromoteQF/>
<w:LidThemeOther>EN-GB</w:LidThemeOther>
<w:LidThemeAsian>X-NONE</w:LidThemeAsian>
<w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript>
<w:Compatibility>
<w:BreakWrappedTables/>
<w:SnapToGridInCell/>
<w:WrapTextWithPunct/>
<w:UseAsianBreakRules/>
<w:DontGrowAutofit/>
<w:SplitPgBreakAndParaMark/>
<w:EnableOpenTypeKerning/>
<w:DontFlipMirrorIndents/>
<w:OverrideTableStyleHps/>
</w:Compatibility>
<m:mathPr>
<m:mathFont m:val="Cambria Math"/>
<m:brkBin m:val="before"/>
<m:brkBinSub m:val="--"/>
<m:smallFrac m:val="off"/>
<m:dispDef/>
<m:lMargin m:val="0"/>
<m:rMargin m:val="0"/>
<m:defJc m:val="centerGroup"/>
<m:wrapIndent m:val="1440"/>
<m:intLim m:val="subSup"/>
<m:naryLim m:val="undOvr"/>
</m:mathPr></w:WordDocument>
</xml><![endif]--><!--[if gte mso 9]><xml>
<w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true"
DefSemiHidden="true" DefQFormat="false" DefPriority="99"
LatentStyleCount="267">
<w:LsdException Locked="false" Priority="0" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Normal"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="heading 1"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9"/>
<w:LsdException Locked="false" Priority="39" Name="toc 1"/>
<w:LsdException Locked="false" Priority="39" Name="toc 2"/>
<w:LsdException Locked="false" Priority="39" Name="toc 3"/>
<w:LsdException Locked="false" Priority="39" Name="toc 4"/>
<w:LsdException Locked="false" Priority="39" Name="toc 5"/>
<w:LsdException Locked="false" Priority="39" Name="toc 6"/>
<w:LsdException Locked="false" Priority="39" Name="toc 7"/>
<w:LsdException Locked="false" Priority="39" Name="toc 8"/>
<w:LsdException Locked="false" Priority="39" Name="toc 9"/>
<w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption"/>
<w:LsdException Locked="false" Priority="10" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Title"/>
<w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font"/>
<w:LsdException Locked="false" Priority="11" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtitle"/>
<w:LsdException Locked="false" Priority="22" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Strong"/>
<w:LsdException Locked="false" Priority="20" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Emphasis"/>
<w:LsdException Locked="false" Priority="59" SemiHidden="false"
UnhideWhenUsed="false" Name="Table Grid"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text"/>
<w:LsdException Locked="false" Priority="1" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="No Spacing"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 1"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 1"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 1"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 1"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision"/>
<w:LsdException Locked="false" Priority="34" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="List Paragraph"/>
<w:LsdException Locked="false" Priority="29" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Quote"/>
<w:LsdException Locked="false" Priority="30" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Quote"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 1"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 1"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 1"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 1"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 1"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 2"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 2"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 2"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 2"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 2"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 2"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 2"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 2"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 3"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 3"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 3"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 3"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 3"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 3"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 3"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 3"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 3"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 4"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 4"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 4"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 4"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 4"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 4"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 4"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 4"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 4"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 5"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 5"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 5"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 5"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 5"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 5"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 5"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 5"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 5"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 6"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 6"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 6"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 6"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 6"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 6"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 6"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 6"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 6"/>
<w:LsdException Locked="false" Priority="19" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis"/>
<w:LsdException Locked="false" Priority="21" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis"/>
<w:LsdException Locked="false" Priority="31" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference"/>
<w:LsdException Locked="false" Priority="32" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Reference"/>
<w:LsdException Locked="false" Priority="33" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Book Title"/>
<w:LsdException Locked="false" Priority="37" Name="Bibliography"/>
<w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading"/>
</w:LatentStyles>
</xml><![endif]--><!--[if gte mso 10]>
<style>
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-parent:"";
mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
mso-para-margin-top:0cm;
mso-para-margin-right:0cm;
mso-para-margin-bottom:10.0pt;
mso-para-margin-left:0cm;
line-height:115%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri","sans-serif";
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-fareast-language:EN-US;}
</style>
<![endif]-->
<br />
<div class="MsoNormal">
<b style="mso-bidi-font-weight: normal;"><span style="font-size: 12.0pt; line-height: 115%; mso-bidi-font-size: 11.0pt;"></span></b>The Internet – if not all it’s 50,000+ Autonomous Systems -
has become a giant surveillance machine, though we can reasonably disagree on
causes, motives and whether it is public or private regulators who are the
greater risk to individual privacy and liberty [1]. There is no longer any
question of whether the Internet is losing its special ‘unregulable’ status,
but <u>when and how</u> laws will change the status quo ante. In this column I
explore the various means by which lawyers can be helped by computer scientists
to stop the (inevitable) collateral damage to innovation when the unstoppable
force of legislation hits the irresistible innovation of the Internet. I will
explore some current controversies (fake news, net neutrality, platform
regulation more generally) from an international perspective. The conclusion is
familiar: lawyers and computer scientists need each other to prevent a
disastrous retrenchment towards splintered national-regional Intranets. To
avoid that, we need to be intellectually pragmatic in pursuing what may be a
mutually disagreeable aim: minimal legislative reform to get the politicians
off our backs. The alternatives are to allow libertarian advocates to so enrage
politicans, that severe over-regulation results.
</div>
<div class="MsoNormal">
Regulation should first do no harm. That is easy to state,
difficult to achieve, when legislation is the clumsiest version of the engineering
principle of the ‘Birmingham Screwdriver’: to a legislator, every problem looks
like a new Bill will solve it, and worse, to an international lawyer every
problem looks like a new Convention or Treaty is needed. Yet in reality, all
that the lumbering Frankenstein’s monster that is law can achieve, is to
enforce against a few bad actors to prevent the most egregious over-reaching by
companies and users. More negatively, the worst law can do is over-legislate in
the interests of monopolies old and new to prevent technological progress
(consider the infamous example: a man carrying a red flag in front of the first
motor vehicles, which protected stagecoaches and railways from innovative
competition<a href="https://www.blogger.com/blogger.g?blogID=4541427124838394431#_ftn1" name="_ftnref1" style="mso-footnote-id: ftn1;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><span class="MsoFootnoteReference"><span style="font-family: "Baskerville Old Face","serif"; font-size: 10.0pt; line-height: 115%; mso-ansi-language: EN-GB; mso-bidi-font-family: "Times New Roman"; mso-bidi-font-size: 11.0pt; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-no-proof: yes;">[1]</span></span></span></span></a>) [2].</div>
<div class="MsoNormal">
As an independent policy advisor to governments for the last
twenty years, I have spent a great deal of that time advising on how little
governments can do effectively in steering towards better self-regulation by
the industry, as well as how bad the unintended consequences of more ‘heroic’
policy interventions can be. I have also had to continually advise in favour of
independent scientific evidence gathering and against the plaintive cries of
corporate and public safety advocates’ claims that the sky is falling in.
Twenty years ago, it was ‘porn!’ ‘Napster copytheft!’ ‘telecoms merger
monopolies’ ‘free Wifi!’ ‘cybertheft’; now it is more likely ‘revenge porn!’
‘fake news!’ ‘cyber threats: darknets and Bitcoin’ ‘net neutrality!’ ‘AI and
the singularity!’<span style="mso-spacerun: yes;"> </span>The time-limited and
dynamic ‘truth’ (or at least second-best solution) has always lain in the
expert opinion that was not clamouring for attention like so many Chicken
Littles – but reaching those experts requires patience and focus on the part of
often distracted policymakers. So here’s how to make it easier for them. I will
base the methods on current controversies, as these case studies help us see
what goes wrong in law enforcement and how to (partially) remedy that bad
law-making.</div>
<div class="MsoNormal">
‘Fake news’ is the heartfelt cry of politicians who feel
wronged by the online media. The existential threat to those who rely on public
acclaim to sell products, buy voters and otherwise advertise their wares is
that we do not listen to them. Ad blocking and filter bubbles have made
consumers and voters harder to reach. Industrial scale behavioural profiling
and viral marketing via Twitter bots are a new method to so do. The expansion
of social networking and smartphones means that new methods of communication
are necessary, and consumers-voters are filtering out content they don’t like.
That is not new – it applied to the tabloid newspapers methods of ‘yellow’
journalism, radio news and telegraph-suppplied newswires a hundred years ago.
Unfortunately, the failure to adopt a universal public service model then meant
the public was inflamed by irresponsible commercial media into a series of wars
for the first time made global by the same communications means (telegraphs, railways,
radio, long distance reliable air and maritime transport) that enabled the mass
media. Today, the calls for fake news regulation pay no regard to both
historians of technology and legal historians who can advise on public service
media. Twitter and Facebook offer parallels to Hearst newspapers and Goebbels’
radio broadcasts. </div>
<div class="MsoNormal">
It is high time for an interdisciplinary project exploring
how to avoid the same disastrous outcomes. Computer technology is a tool for
the powerful; that insight is not new but politicians are ignoring the previous
generations of transformative technology and our attempts to marshall them.
More obviously, politicians are not using the tools of behavoural insight to
explore how best to regulate fake news and social networking: evolutionary
economics and behavioural neuroscience tells us how we become addicted to
social media, yet legislators do not consult the experts to explore how our
‘Dunbar number’ affects our behaviour in fundamental ways [3].</div>
<div class="MsoNormal">
Net neutrality is a ludicrously simplified slogan for a
highly complex engineering task: how to permit sufficient permission-free
innovation in the network. The over-politicised doomsayers on both sides fail
to mention what is becoming abundantly clear: policy can only partially steer
traffic management practices. Net neutrality can do no more than prevent large
telecoms companies continuing ‘evil’ policies such as blocking Skype and WhatsApp
or throttling back video traffic their subscribers want to see. Net neutrality
cannot stop innovation by telecoms companies (whose own corporate histories
show a somewhat chequered relationship with IP network deployment). Regulators
are simply not that competent, even if they had the resources and will to carry
out laws to the letter, which they do not. Hysterical public interest
over-reactions and/or paid-economist skyfall predictions have become boring
even to those making them. Minimal rules made sensibly by technically
proficient people are achieving quietly what millions of emails to regulators
and legislators cannot: conduct rules to stop telecoms companies behaving in
evil ways while giving them the latitude to experiment where not harmful to the
public Internet. Note that common carriage was a rather successful way of
delivering public (alongside private andbusiness) communications services in
previous technologies. More scientific exploration of the limited effects of
such policies would be rather useful. An example of regulators trying to do
this in a non-confrontational manner is the extensive work produced by the Body
of European Regulators of Electronic Communications.</div>
<div class="MsoNormal">
Platform regulation is the canard thrown into the net
neutrality debate by those telcos. If you regulate us, they say, you should
also regulate the giant monopolies of Google, Amazon – and even their sometime
friends at Apple and Facebook. Politicians get very confused by this, and ask:
what is the difference between platforms and networks? Journalists <span style="mso-spacerun: yes;"> </span>confuse their readers by referring to all
those companies as ISPs – even though access networks perform fundamental and
entirely different functions than social networks or search engines. The very
high public profiles of Twitter and Snap cause issues, as they are by no means
monopolies. Google was eventually fined in July 2017 for antitrust violations
because of the links between its search engine and shooping platform – though
it took a new more technologically literate European Competition Commissioner
to understand the problem first investigated in 2009, and how it influenced
unfair competition. Google avoided an adverse outcome for eight years – kudos
to the company’s lawyers for delaying even longer than Microsoft under European
investigation (that saga began in 1998 with enforcement in 2004: Case T-201/04).</div>
<div class="MsoNormal">
You might wonder how legislators can even begin to discuss
complex laws when they don’t know the difference between an IAP and ISP? Well,
here’s some news for you – in Europe all these terms have ‘society’ attached to
them. An access provider (telco) is an ‘Electronic Communications Service
Provider’ (ECSP), distinct from an Information Society Service Provider (ISSP).
Lawyers often fail to master these terms. If you were wondering: ‘Information
Society’ was Europe’s rhetorical counterpoint to Al Gore’s ‘Information
Superhighway’ (ask your parents).</div>
<div class="MsoNormal">
The ‘singularity’ is another chaotic non-problem demanding a
legislative non-solution. If lawyers and politicians do not know what a
platform is, imagine how little they understand Artificial Intelligence (AI). What
they do understand is that platforms such as Amazon, Uber and AirBnB are
displacing many manual workers into zero-hours non-contract non-union jobs.
Creative destruction sounds theoretical until it happens to you, the ‘roadkill
on the Information Superhighway’. I tell my cyberlaw students that they will be
the last lawyers employed, programmnig ethics into our future robot overlords
right before they become self-aware. The legislative inquiries into AI – as
previously with drones, Internet of Things, blockchains, smart power meters and
so on – are actually inquiries into the changing nature of employment and thus
voting blocs. This concentrates the legislative mind almost as fast as fake
news. It also poses a fundamental challenge to computer scientists: politicians
are no longer panicked by Internet disruption, but to contagion of offline
industries. </div>
<div class="MsoNormal">
E-commerce runs the risk of becoming a dirty word especially
in Europe, where mass youth unemployment and an ageing workforce means IT
skills are in short supply, especially in Parliaments. Google- or
Uber-sponsored promising untold riches from driverless vehicles fall on deaf
ears: autonomous robots do not vote. Venture capitalists suporting libertarian
business plans based on usurping heavily regulated public transport systems and
short-term rental accomodation are poisoning the well for more legitimate
businesses, not just in liberal New York and Berlin but in many places. The
idea that blockchain can support smart self-enforcing self-auditing contracts,
and thus displace lawyers and accountants, sends shudders through the
professions. This is a red flag to those advising governments as well as those
legislating [4].</div>
<div class="MsoNormal">
If AI, platform regulation, blockchains et al signal a
desire to slow down the pace of innovation by government, what rational answer
can be sold to government? The first essential is to prevent platforms becoming
liable as publishers, by whatever legitimate means necessary. If that means accepting
fines for failure to take down fake content or revenge porn, so be it. If that
means accepting a user ombudsman as suggested in new proposed English
legislation, so be it. If that means recruiting more content checkers to remove
content faster, that may be overdue. If it means accepting that global
platforms need to conform to European rules on hate speech (for instance Nazi
content), that legal battle was lost by Yahoo! in the French<i style="mso-bidi-font-style: normal;"> Tribunal de Grand Instance</i> 17 years ago<a href="https://www.blogger.com/blogger.g?blogID=4541427124838394431#_ftn2" name="_ftnref2" style="mso-footnote-id: ftn2;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><span class="MsoFootnoteReference"><span style="font-family: "Baskerville Old Face","serif"; font-size: 10.0pt; line-height: 115%; mso-ansi-language: EN-GB; mso-bidi-font-family: "Times New Roman"; mso-bidi-font-size: 11.0pt; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-no-proof: yes;">[2]</span></span></span></span></a>
(as discussed by previous columns in this series, including Geist and
Reidenberg).</div>
<div class="MsoNormal">
What more can be done? For US companies, an existential
crisis awaits. Europe sets the global standards for regulation of content,
notably in data protection and hate speech. The United Kingdom government,
formerly the ‘unsinkable aircraft carrier’ lobbying in Brussels for US Internet
companies, is ‘Brexiting’ the European Union by March 2019. Already, the
decisive power relationship in European law has swung to Germany and France.
Regulation will increase, and Anglo-American companies increasinlgy recognise
that and are embracing a French term: co-regulation. What that means is
diluting government control of the Internet by ensuring a compromise based on
industry self-regulation, but with oversight by users and by government
regulators [5]. </div>
<div class="MsoNormal">
If that sounds messy and unprincipled, it is. Examples
include domain name oversight by ICANN. Governments have sponsored industry
standards not only in Europe but globally via hosting and supporting the World
Wide Web Consortium with industry. Crudely, it is the compromise computer
scientists have to live with. Totalitarian regimes want to use the threat of terrorism
and cyber-crime to replace self-regulation with direct and often draconian
control. Co-regulation is the best alternative. Areas for cooperation between
law and computer science can actually flourish in co-regulatory institutions,
because the best of them engineer a deliberative evidence-driven
expert-friendly process [6]. It can curb the worst excesses of both corporate
and government control. If we cooperate to make these processes work, it’s the
best chance we have of preventing a much worse system of control emerging.</div>
<div class="MsoNormal">
<b style="mso-bidi-font-weight: normal;">Chris Marsden
(c.marsden@sussex.ac.uk) is Professor of Law at the University of Sussex,
Brighton, UK.</b></div>
<div class="MsoNormal">
<b style="mso-bidi-font-weight: normal;">The argument in this
column is further explored in the final chapters of author’s recent book <i style="mso-bidi-font-style: normal;">Network Neutrality: From Policy to Law to
Regulation</i> (Manchester University Press, 2017).</b></div>
<div class="MsoNormal">
[1] Brown, I. and Marsden, C. Regulating Code: Good
Governance and Better Regulation in the Information Age (2013) MIT Press,
Cambridge MA.</div>
<div class="MsoNormal">
[2] Marsden, C. ‘Technology and the Law’ in ‘International
Encyclopedia of Digital Communication & Society’ (2015) Wiley-Blackwell,
DOI: 10.1002/9781118767771.wbiedcs138</div>
<div class="MsoNormal">
[3] Pollett, T. V., Roberts, S., and Dunbar, R.I.M. Use of
social network sites and instant messaging does not lead to increased offline
social network size, or to emotionally closer relationships with offline network
members (2011) Cyberpsychology, Behavior and Social Networking 14: 253-258.</div>
<div class="MsoNormal">
[4] Guadamuz A. and Marsden, C. Blockchains not Bitcoin:
Distributed Ledger Technology, Computers and Law, Issue 2 (2016)
http://www.scl.org/site.aspx?i=ed46568</div>
<div class="MsoNormal">
[5] Marsden, C. Internet Co-regulation: European Law,
Regulatory Governance and Legitimacy in Cyberspace (2011) Cambridge University
Press, Cambridge, UK</div>
<div class="MsoNormal">
<span style="mso-spacerun: yes;"> </span>[6] Marsden, C.
Zevenbergen, B., Marzouki, M., Bygrave, L., Morando, F., Powell, A., Turk, Z.,
and Salamatian, K. Deliverable 4.3: Final Report on Regulation, Governance and
Standards (2015) European Internet Science Consortium at http://www.internet-science.eu/groups/governance-regulation-and-standards</div>
<div style="mso-element: footnote-list;">
<br clear="all" />
<hr align="left" size="1" width="33%" />
<div id="ftn1" style="mso-element: footnote;">
<div class="MsoFootnoteText">
<a href="https://www.blogger.com/blogger.g?blogID=4541427124838394431#_ftnref1" name="_ftn1" style="mso-footnote-id: ftn1;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><span class="MsoFootnoteReference"><span style="font-family: "Baskerville Old Face","serif"; font-size: 10.0pt; line-height: 115%; mso-ansi-language: EN-GB; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-no-proof: yes;">[1]</span></span></span></span></a>
United Kingdom: Locomotives Act 1865 s.3 (An Act for farther regulating the use
of Locomotives on Turnpike and other roads for Agricultural and other purposes:
28 & 29 Vic. Chapter lxxxiii)</div>
</div>
<div id="ftn2" style="mso-element: footnote;">
<div class="MsoFootnoteText">
<a href="https://www.blogger.com/blogger.g?blogID=4541427124838394431#_ftnref2" name="_ftn2" style="mso-footnote-id: ftn2;" title=""><span class="MsoFootnoteReference"><span style="mso-special-character: footnote;"><span class="MsoFootnoteReference"><span style="font-family: "Baskerville Old Face","serif"; font-size: 10.0pt; line-height: 115%; mso-ansi-language: EN-GB; mso-bidi-font-family: "Times New Roman"; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin; mso-no-proof: yes;">[2]</span></span></span></span></a>
Confirmed in Yahoo! Inc. v. La Ligue Contre Le Racisme et L’antisemitisme.
L’Union Des Etudiants Juifs De France, 433 F.3d 1199 (9th Cir. 2006);
http://bit.ly/2f8Oi59</div>
</div>
</div>
</div>
chrishttp://www.blogger.com/profile/01894132626803555691noreply@blogger.com0tag:blogger.com,1999:blog-4541427124838394431.post-52951286744009274012017-06-04T08:05:00.001-07:002017-06-04T08:05:55.456-07:00May's statement on the London Bridge terror attack<a href="https://www.politicshome.com/news/uk/home-affairs/terrorism/news/86456/read-theresa-mays-full-statement-london-bridge-terror">READ Theresa May's FULL statement on the London Bridge terror attack | PoliticsHome.com</a>: "Second we cannot allow this ideology the safe space it needs to breed. Yet that is precisely what the internet and the big companies that provide internet-based services provide. We need to work with allied democratic governments to reach international agreements that regulate cyberspace to prevent the spread of extremist and terrorism planning and we need to do everything we can at home to reduce the risk of extremism online." <a href="https://chrome.google.com/webstore/detail/pengoopmcjnbflcjbmoeodbmoflcgjlk" style="font-size: 13px;">'via Blog this'</a>chrishttp://www.blogger.com/profile/01894132626803555691noreply@blogger.com1tag:blogger.com,1999:blog-4541427124838394431.post-35680862282211617482017-04-19T12:14:00.001-07:002017-04-19T12:14:13.227-07:00Facebook and the Cost of Monopoly – Stratechery by Ben Thompson<a href="https://stratechery.com/2017/facebook-and-the-cost-of-monopoly/">Facebook and the Cost of Monopoly – Stratechery by Ben Thompson</a>: "The problem is that Facebook isn’t simply a social network: the service is a three-sided market — users, content providers, and advertisers — and while the basis of Facebook’s dominance is in the network effects that come from connecting all of those users, said dominance has seeped to those other sides.<br /><br />
Content providers are an obvious example: Facebook passed Google as the top traffic driver back in 2015, and as of last fall drove over 40% of traffic for the average site, even after an algorithm change that reduced publisher reach.<br />
<br />
So is that a monopoly when it comes to the content provider market? I would argue yes, thanks to the monopoly framework above.<br /><br />
Note that once again we are in a situation where there is not a clear price: no content provider pays Facebook to post a link (although they can obviously make said link into an advertisement). However, Facebook does, at least indirectly, make money from that content: the more users find said content engaging, the more time they will spend on Facebook, which means the more ads they will see." <a href="https://chrome.google.com/webstore/detail/pengoopmcjnbflcjbmoeodbmoflcgjlk" style="font-size: 13px;">'via Blog this'</a>chrishttp://www.blogger.com/profile/01894132626803555691noreply@blogger.com0tag:blogger.com,1999:blog-4541427124838394431.post-11463002552072405472017-01-12T05:28:00.001-08:002017-01-12T05:28:34.248-08:00UK fails to gag press over ID of ex-spy at centre of Trump dossier claims<a href="http://arstechnica.co.uk/tech-policy/2017/01/trump-dossier-claims-ex-mi6-spy-d-notice/">UK fails to gag press over ID of ex-spy at centre of Trump dossier claims | Ars Technica UK</a>: "The D-notice first came into play in 1912, two years before World War I broke out, when Whitehall mandarins decided that an organisation should be created that addressed matters of national interest. Members of the press were included on the advisory panel, and they remain so to do this day.<br /><br />
However, the makeup has changed a little: the likes of Google representatives have sat on the committee, for example. Though, the US ad giant withdrew its voluntary support in light of Edward Snowden's damning disclosures about the NSA.<br /><br />
Historically, publishers and editors have largely responded in kind to the frightfully polite requests from the MoD. Members of the committee have long argued that it doesn't amount to censorship from the British government, instead insisting that they are simply exercising restraint with stories that may, on reflection, damage national security. But Vallance and his predecessors can only gently nudge the press to consider the sensitive material they have in their possession before publishing it." <a href="https://chrome.google.com/webstore/detail/pengoopmcjnbflcjbmoeodbmoflcgjlk" style="font-size: 13px;">'via Blog this'</a>chrishttp://www.blogger.com/profile/01894132626803555691noreply@blogger.com0tag:blogger.com,1999:blog-4541427124838394431.post-74781574138665790352016-11-16T11:03:00.001-08:002016-11-16T11:03:37.914-08:00Mark Zuckerberg Is in Denial - New York Times<a href="http://www.nytimes.com/2016/11/15/opinion/mark-zuckerberg-is-in-denial.html?smid=tw-share&_r=0">Mark Zuckerberg Is in Denial - The New York Times</a>: "Only Facebook has the data that can exactly reveal how fake news, hoaxes and misinformation spread, how much there is of it, who creates and who reads it, and how much influence it may have. Unfortunately, Facebook exercises complete control over access to this data by independent researchers.<br /><br />
It’s as if tobacco companies controlled access to all medical and hospital records.<br /><br />
These are not easy problems to solve, but there is a lot Facebook could do. When the company decided it wanted to reduce spam, it established a policy that limited its spread. If Facebook had the same kind of zeal about fake news, it could minimize its spread, too.<br />
<br />
If anything, Facebook has been moving in the wrong direction.<br /><br />
It recently fired its (already too few) editors responsible for weeding out fake news from its trending topics section. Unsurprisingly, the section was then flooded with even more spurious articles." <a href="https://chrome.google.com/webstore/detail/pengoopmcjnbflcjbmoeodbmoflcgjlk" style="font-size: 13px;">'via Blog this'</a>chrishttp://www.blogger.com/profile/01894132626803555691noreply@blogger.com0tag:blogger.com,1999:blog-4541427124838394431.post-23705715366608926812016-06-16T15:13:00.001-07:002016-06-16T15:13:37.074-07:00Net neutrality in Europe: Net Neutrality and Control of the Internet: MIT Pr...<a href="http://chrismarsden.blogspot.com/2016/06/net-neutrality-and-control-of-internet.html?spref=bl">Net neutrality in Europe: Net Neutrality and Control of the Internet: MIT Pr...</a>: Net Neutrality and Control of the Internet | The MIT Press : "Net neutrality is the private censorship of our communications by our IAP...chrishttp://www.blogger.com/profile/01894132626803555691noreply@blogger.com0tag:blogger.com,1999:blog-4541427124838394431.post-73552462268552618142016-06-13T10:16:00.001-07:002016-06-13T10:16:06.479-07:00Evaluating the privacy properties of telephone metadata<a href="http://www.pnas.org/content/113/20/5536">Evaluating the privacy properties of telephone metadata</a>: "Evaluating the privacy properties of telephone metadata<br />
Jonathan Mayera,b,1, Patrick Mutchlera, and John C. Mitchella<br />
Author Affiliations<br />
<br />
Edited by Cynthia Dwork, Microsoft Research Silicon Valley, Mountain View, CA, and approved March 1, 2016 (received for review April 27, 2015): <span style="background-color: white; color: #111111; font-family: Arial, sans-serif; font-size: 14px; font-weight: bolder; line-height: 18.2px;">Transactional information is remarkably revelatory</span><br /><br />
<abbr class="site-title" style="border: 0px; color: #222222; display: inline; font-family: inherit; font-size: inherit; font-style: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline-style: none; padding: 0px; text-align: inherit; vertical-align: baseline;" title="PNAS">Proc. Natl. Acad. Sci. USA</abbr><span style="background-color: white; color: #222222; font-family: Arial, sans-serif; font-size: 14px; line-height: 18.2px;"> </span><span class="cit-print-date" style="border: 0px; color: #222222; display: inline; font-family: inherit; font-size: inherit; font-style: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline-style: none; padding: 0px; text-align: inherit; vertical-align: baseline;">2016 </span><span class="cit-vol" style="border: 0px; color: #222222; display: inline; font-family: inherit; font-size: inherit; font-style: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline-style: none; padding: 0px; text-align: inherit; vertical-align: baseline;">113 </span><span class="cit-issue" style="border: 0px; color: #222222; display: inline; font-family: inherit; font-size: inherit; font-style: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline-style: none; padding: 0px; text-align: inherit; vertical-align: baseline;"><span class="cit-sep cit-sep-before-article-issue" style="border: 0px; display: inline; font-family: inherit; font-size: inherit; font-style: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline-style: none; padding: 0px; text-align: inherit; vertical-align: baseline;">(</span>20<span class="cit-sep cit-sep-after-article-issue" style="border: 0px; display: inline; font-family: inherit; font-size: inherit; font-style: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline-style: none; padding: 0px; text-align: inherit; vertical-align: baseline;">)</span> </span><span class="cit-pages" style="border: 0px; color: #222222; display: inline; font-family: inherit; font-size: inherit; font-style: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline-style: none; padding: 0px; text-align: inherit; vertical-align: baseline;"><span class="cit-first-page" style="border: 0px; display: inline; font-family: inherit; font-size: inherit; font-style: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline-style: none; padding: 0px; text-align: inherit; vertical-align: baseline;">5467</span><span class="cit-sep" style="border: 0px; display: inline; font-family: inherit; font-size: inherit; font-style: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline-style: none; padding: 0px; text-align: inherit; vertical-align: baseline;">-</span><span class="cit-last-page" style="border: 0px; display: inline; font-family: inherit; font-size: inherit; font-style: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline-style: none; padding: 0px; text-align: inherit; vertical-align: baseline;">5469</span></span>" <a href="https://chrome.google.com/webstore/detail/pengoopmcjnbflcjbmoeodbmoflcgjlk" style="font-size: 13px;">'via Blog this'</a>chrishttp://www.blogger.com/profile/01894132626803555691noreply@blogger.com0tag:blogger.com,1999:blog-4541427124838394431.post-26145914720357419022016-06-13T10:08:00.001-07:002016-06-13T10:08:54.139-07:00After Snowden, there is clear evidence of a paradigmatic shift in journalist-source relations<a href="https://www.journalism.co.uk/news-commentary/after-snowden-there-is-clear-evidence-of-a-paradigmatic-shift-in-journalist-source-relations/s6/a644750/">After Snowden, there is clear evidence of a paradigmatic shift in journalist-source relations | Comments from media industry experts</a>: "No oversight agency revealed the MI5-MI6 rift over rendition. The Parliament’s Intelligence and Security Committee (ISC) is the main intelligence oversight body, yet in its report from February 2013, immediately before Snowden, there was no mention of GCHQ exponential move to collect data in bulk.<br /><br />
It was Snowden’s leaks that revealed GCHQ has the potential for mass surveillance. Oversight bodies are reactive and, as the leading US intelligence academic Loch K Johnson observed, over time, they tend to go native with their charges." <a href="https://chrome.google.com/webstore/detail/pengoopmcjnbflcjbmoeodbmoflcgjlk" style="font-size: 13px;">'via Blog this'</a>chrishttp://www.blogger.com/profile/01894132626803555691noreply@blogger.com0tag:blogger.com,1999:blog-4541427124838394431.post-91085238440631340142016-05-24T15:57:00.001-07:002016-05-24T15:57:38.437-07:00Case C-582/14, Breyer – seeing the logs from the trees in privacy law: EU Law Radar<a href="http://eulawradar.com/case-c-58214-breyer-seeing-the-logs-from-the-trees-in-privacy-law/?platform=hootsuite">Case C-582/14, Breyer – seeing the logs from the trees in privacy law | EU Law Radar</a>: "The Advocate General’s Opinion is not yet available in English but my unofficial translation of his conclusion reads:<br /><br />
1. Pursuant to Article 2(a) of the Directive, a dynamic IP address with which a user has gained access to a website from a supplier of electronic media services constitutes personal data when an internet service provider has the supplementary details which, together with the dynamic IP address, make it possible to identify the user.<br /><br />
2. Article 7(f) of the Directive must therefore be interpreted to mean that the aim of guaranteeing the proper working of the electronic media service can in principle be considered to be a legitimate interest that justifies the processing of the aforementioned personal data providing that that interest prevails over the interest or the fundamental rights of the person concerned. A national provision which does not allow that legitimate interest to be taken into account is incompatible with that Article." <a href="https://chrome.google.com/webstore/detail/pengoopmcjnbflcjbmoeodbmoflcgjlk" style="font-size: 13px;">'via Blog this'</a>chrishttp://www.blogger.com/profile/01894132626803555691noreply@blogger.com0tag:blogger.com,1999:blog-4541427124838394431.post-47432352426567073892016-05-17T01:20:00.001-07:002016-05-17T01:20:17.007-07:00How the U.S. Could Regulate Facebook - Zittrain<a href="http://www.theatlantic.com/technology/archive/2016/05/how-could-the-us-regulate-facebook/482382/">How the U.S. Could Regulate Facebook - The Atlantic</a>: "Congress could also insist that certain standards had to be upheld during curation. In the early 1990s, Congress began requiring cable companies to offer a broadcast station (like the local ABC or NBC affiliate) if the signal from that station’s antenna reached a cable subscriber’s home. The courts eventually upheld this “must carry” provision because it was “content neutral”—it regulated speech without abridging the meaning or political view.<br /><br />
But Zittrain said there may be an even more promising way to keep Facebook from acting against its users’ interest. In an unpublished paper that he is writing with Jack Balkin, a Constitutional law professor at Yale Law School, Zittrain recommends that certain massive repositories of user data—like Apple, Facebook, and Google—be offered a chance to declare themselves “information fiduciaries.” An information fiduciary would owe certain protections to its users, closing the “disconnect between the level of trust we place in [online services] and the level of trust in fact owed to us,” according to the paper.<br />
<br />
The key to this idea? Facebook might opt into this regulation itself." <a href="https://chrome.google.com/webstore/detail/pengoopmcjnbflcjbmoeodbmoflcgjlk" style="font-size: 13px;">'via Blog this'</a>chrishttp://www.blogger.com/profile/01894132626803555691noreply@blogger.com0tag:blogger.com,1999:blog-4541427124838394431.post-32331398263531497432016-05-13T00:01:00.001-07:002016-05-13T00:01:14.793-07:00Facebook Needs to Grow Up<a href="http://nymag.com/selectall/2016/05/facebook-needs-to-grow-up.html">Facebook Needs to Grow Up</a>: "Unsurprisingly, Facebook has been unwilling to increase its transparency as it increases its power. It’s not obligated to, but it would be nice for a company with the reach and ubiquity of a public institution to have a clear sense of purpose beyond sheer growth, and an explanation of how its products serve that purpose." <a href="https://chrome.google.com/webstore/detail/pengoopmcjnbflcjbmoeodbmoflcgjlk" style="font-size: 13px;">'via Blog this'</a>chrishttp://www.blogger.com/profile/01894132626803555691noreply@blogger.com0tag:blogger.com,1999:blog-4541427124838394431.post-87633917535499451142016-05-11T05:14:00.001-07:002016-05-11T05:14:27.461-07:00FRAND is no friend: How to make EU tech standards compatible with open source<a href="http://arstechnica.co.uk/tech-policy/2016/05/eu-tech-standards-why-frand-not-compatible-with-open-source/">FRAND is no friend: How to make EU tech standards compatible with open source | Ars Technica UK</a>: "Given this fact that FRAND is simply not compatible with open source, how did it come to pass that the European Commission should put FRAND licensing at the very heart of its new ICT standardisation strategy?<br /><br />
After my article about the apparent decision by the European Commission to shut open source out in this way, I managed to talk to someone senior who had been involved in the process. It took me about half an hour to get across why exactly FRAND licensing was incompatible with open source, but in the end the person I was talking to recognised that there was in fact a serious problem.<br /><br />
I've also heard through other channels that people within the Commission were rather taken aback by my analysis, since they too were not aware of the huge problem the new Digital Single Market policy would represent for free software. They were under the impression that the references to supporting open source elsewhere in that policy was enough.<br /><br />
This overlooks the fundamental role that licensing plays in open source, and naïvely assumes that things can somehow be tweaked to allow FRAND compatibility. But as I've described, that's simply not the case." <a href="https://chrome.google.com/webstore/detail/pengoopmcjnbflcjbmoeodbmoflcgjlk" style="font-size: 13px;">'via Blog this'</a>chrishttp://www.blogger.com/profile/01894132626803555691noreply@blogger.com0tag:blogger.com,1999:blog-4541427124838394431.post-73569228214896064572016-05-11T05:13:00.001-07:002016-05-11T05:13:38.402-07:00Swedish Radio website blocked in Russia - Radio Sweden<a href="http://sverigesradio.se/sida/artikel.aspx?programid=2054&artikel=6367309">Swedish Radio website blocked in Russia - Radio Sweden | Sveriges Radio</a>: "Russia has interpreted Radio Sweden's article as having been propaganda promoting suicide, forbidden under Russian law, and in a letter to Sveriges Radio's listener services, Russia's Federal Service for Supervision in the Sphere of Telecom, Information Technologies and Mass Communications,<br /><br />
ROSKOMNADZOR, wrote threatening to block access to Swedish Radio's website unless the article was removed. It wasn't.<br />
<br />
Thomas Rotermund, the head of security at Swedish Radio, told Radio Sweden's Russian department that it does not appear as though the site has been widely blocked in Russia. " <a href="https://chrome.google.com/webstore/detail/pengoopmcjnbflcjbmoeodbmoflcgjlk" style="font-size: 13px;">'via Blog this'</a>chrishttp://www.blogger.com/profile/01894132626803555691noreply@blogger.com0tag:blogger.com,1999:blog-4541427124838394431.post-39565983641490932242016-05-10T02:38:00.001-07:002016-05-10T02:38:17.636-07:00Adblocking: advertising 'accounts for half of data used to read articles'<a href="http://www.theguardian.com/media/2016/mar/16/ad-blocking-advertising-half-of-data-used-articles?CMP=Share_AndroidApp_Tweet">Adblocking: advertising 'accounts for half of data used to read articles' | Media | The Guardian</a>: "The small-scale study looked at six unnamed “popular publishers”, both with and without an adblocker, and found that anywhere between 18% and 79% of the data downloaded was from ads.<br />
<br />
In addition, anywhere between 6% and 68% of the downloaded data was from JavaScript, which is used to deliver more interactive elements of both editorial and advertising on pages." <a href="https://chrome.google.com/webstore/detail/pengoopmcjnbflcjbmoeodbmoflcgjlk" style="font-size: 13px;">'via Blog this'</a>chrishttp://www.blogger.com/profile/01894132626803555691noreply@blogger.com0tag:blogger.com,1999:blog-4541427124838394431.post-61168771748343575932016-05-08T03:06:00.001-07:002016-05-08T03:06:59.584-07:00OffData: a prosumer law agency to govern big data in the public interest<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="MsoNormal">
<span style="color: #1f497d; font-family: "Calibri","sans-serif"; font-size: 11.0pt; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-theme-font: minor-bidi; mso-hansi-theme-font: minor-latin; mso-themecolor: dark2;">Chris is speaking at the <a href="http://spblegalforum.com/en/2016_RoundTable_4_5__">St Petersburg International Legal Forum 19 May</a>:</span></div>
<div class="MsoNormal">
<span style="color: #1f497d; font-family: "Calibri","sans-serif"; font-size: 11.0pt; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: "Times New Roman"; mso-bidi-theme-font: minor-bidi; mso-hansi-theme-font: minor-latin; mso-themecolor: dark2;">I will discuss the regulation of big data. Big data has the ability to
transform the regulation of the economy and the governance of society. Collection
as well as processing of such data can include sensitive personal data, with as
little as two matching items <a href="http://www.computerworld.com/article/2954505/security/researchers-improve-de-anonymization-attacks-for-sites-hiding-on-tor.html">enabling de-anonymisation</a>. Bulk automated data
collection also infringes European laws on data protection. If regulation of
big data collection and processing lags severely behind business processes, so
also <a href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2612562">competition law faces existential crises</a> dealing with big data curators.
<a href="https://www.theguardian.com/technology/2016/may/02/google-microsoft-pact-antitrust-surveillance-capitalism">Search engines and social media platforms</a>, <a href="http://www.wired.com/2016/05/facebook-trying-create-ai-can-create-ai/">amongst others</a>, have such a huge
trawl of data that they are able to “pick winners” among sectoral competitors
in for instance retail and transportation, in what is becoming known as <a href="http://peterfletcher.com.au/2008/06/12/surveillance-and-the-capitalist-state-giddens/">"surveillance capitalism"</a>. Governments also increasingly rely
on these big data brokers to support services, <a href="http://www.theregister.co.uk/2016/04/29/google_transparency_project/?mt=1462697202661">compromising regulatory independence</a>. What is needed is a more<a href="http://www.bookforum.com/blog/15987"> holistic regulatory framework</a> to help
govern big data in the public interest and permit users to take back individual
and collective control of their data: a prosumer law agency ‘OffData’.<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: inherit;"><span style="color: #1f497d;">{See earliest </span><span style="background-color: white; color: #666666; line-height: 26px;">Giddens, A. (1995). Surveillance and the capitalist state. In </span><span style="background-color: white; box-sizing: border-box; color: #666666; font-style: italic; line-height: 26px;">A contemporary critique of historical materialism</span><span style="background-color: white; color: #666666; line-height: 26px;">, 2nd Edn. Houndmills, Basingstoke: Macmillan</span><span style="color: #1f497d;">}</span></span></div>
</div>
chrishttp://www.blogger.com/profile/01894132626803555691noreply@blogger.com0tag:blogger.com,1999:blog-4541427124838394431.post-80411864181281060642016-04-26T04:53:00.001-07:002016-04-26T04:53:51.178-07:00Other web browsers are available: The EC case against Google<a href="https://competitionpolicy.wordpress.com/2016/04/26/other-web-browsers-are-available-the-ec-case-against-google/">Other web browsers are available: The EC case against Google | Competition Policy blog</a>: "The investigation by DG Competition may want to distinguish between tying that excludes rivals from the market and tying that allows a customer to install an alternative app but where customer psychology may prevent him or her from doing so. On the surface this case appears to be the latter.<br /><br />
The EC may also need to consider two possible twists that make the Google case different from the earlier Microsoft case.<br /><br />
First, Google is likely to be dominant in both the tying and the tied market. According to the European Commission’s factsheet that accompanies the Statement of Objections, Google’s share of the search market in most Member States is 90% or more.<br /><br />
Microsoft, by contrast, was dominant in the tying, upstream, market but not in the tied, downstream market. Indeed, normally we would expect a vertically integrated firm that is dominant upstream to leverage that dominance into a downstream market where it isn’t dominant to foreclose competition and gain a dominant position.<br /><br />
If Google were found to be dominant at both levels would this make any difference to the case?" <a href="https://chrome.google.com/webstore/detail/pengoopmcjnbflcjbmoeodbmoflcgjlk" style="font-size: 13px;">'via Blog this'</a>chrishttp://www.blogger.com/profile/01894132626803555691noreply@blogger.com0tag:blogger.com,1999:blog-4541427124838394431.post-75700280368020511812016-04-19T01:01:00.001-07:002016-04-19T01:01:44.011-07:00Mac's musings:How risky is your IoT?<a href="http://drdrmc.blogspot.co.uk/">Mac's musings</a>: "Privacy risks<br /><br />
Privacy risks are present everywhere where we have sensing technologies in IoT. It will often be possible to correlate the sensing with an individual’s activities.<br />
You can expect to see this data used in unexpected ways – the court case involving FitBit data is a sign of a trend where IoT data can be used as evidence of a person’s innocence or guilt.<br /><br />
Mitigations could include strong encryption, ephemeral data or only maintaining statistical and aggregated data in the longer term.<br /><br />
Many IoT devices also have the ability to actuate and affect the physical world – so what could possibly go wrong? Human safety checks are absent when moving to automation in IoT. We will need to design with safety in mind as everyday domestic objects become known killers – whether automatic door openers or even something as mundane as a venetian blind.<br /><br />
Picking up the theme of care for the elderly in their homes, again from a previous blog, we also start to see the need for resilience in our IoT designs. A particularly dangerous episode for many elderly people is a power outage – from the heating stopping, to lack of lighting, leading to increased risk of falls or other accidents.<br /><br />
Resilient IoT design<br /><br />
A resilient IoT design would include several hours of protected power supply for the sensors and router; backup communications using 3G as the ADSL or cable modem may not be available to access the internet (fixed line telecoms operators are required to have the phone service available during a power outage, not the broadband); and the ability to act independently of internet servers to raise alarms, so that operations are maintained when there are network and server failures or DDOS attacks on the infrastructure.<br /><br />
To build an IoT we trust we must first learn to handle the risks. Importantly, while showing damages in privacy cases has proven hard, the rise in citizens injured by devices will rapidly lead to product liability cases." <a href="https://chrome.google.com/webstore/detail/pengoopmcjnbflcjbmoeodbmoflcgjlk" style="font-size: 13px;">'via Blog this'</a>chrishttp://www.blogger.com/profile/01894132626803555691noreply@blogger.com0tag:blogger.com,1999:blog-4541427124838394431.post-12267548291037688602016-04-18T03:52:00.001-07:002016-04-18T03:52:47.151-07:00Prof. Patrick Dunleavy - The Republic of Blogs (5)<iframe allowfullscreen="" frameborder="0" height="270" src="https://www.youtube.com/embed/352YRRn43Gc" width="480"></iframe><br /><br />
<span style="background-color: white; color: #333333; font-family: Roboto, arial, sans-serif; font-size: 13px; line-height: 17px;">After a long period of monopolising academic discourse, European universities went into decline as classical scholasticism, which was primarily inward and backward looking, gave way to the ideas of Enlightenment. Intellectual development moved outside the walled gardens of academia, because enlightenment thinkers shifted their various discourses into the realm of correspondence, creating a Republic of Letters. Prof. Dunleavy argues that we are currently experiencing a similar shift towards a Republic of Blogs that enlarges communication, debate and evidence beyond the halls of universities. Academic research is changing, academic publishing is moving towards a new paradigm of advancing ideas outside the confines of the traditional academic publishing model. Orthodox journals will soon be understood as tombstones: end of debate certificates. In particular:</span><br /><br />
<br style="background-color: white; color: #333333; font-family: Roboto, arial, sans-serif; font-size: 13px; line-height: 17px;" /><span style="background-color: white; color: #333333; font-family: Roboto, arial, sans-serif; font-size: 13px; line-height: 17px;">Micro-blogging is not only replacing traditional news media, but becoming a tool for finding and disseminating ideas and research (active research surveillance) </span><span style="background-color: white; color: #333333; font-family: Roboto, arial, sans-serif; font-size: 13px; line-height: 17px;">Well edited blogs are becoming core communication tools and vehicles for HE debate; while the less traditional format encourages a writing style that invites debate from academics and lay persons alike, thus cutting across ranks, locations and academic status. </span><span style="background-color: white; color: #333333; font-family: Roboto, arial, sans-serif; font-size: 13px; line-height: 17px;">Working papers and online journals are now key, immediately accessible evidence and theory/methods development sources.</span><span style="background-color: white; color: #333333; font-family: Roboto, arial, sans-serif; font-size: 13px; line-height: 17px;">More details available here: </span><a class="yt-uix-sessionlink " data-sessionlink="ei=ObwUV5aNKtKnWpPbrsgJ" data-url="http://clt.lse.ac.uk/events/networkED-seminar-series-05.php" href="http://clt.lse.ac.uk/events/networkED-seminar-series-05.php" rel="nofollow" style="background: rgb(255, 255, 255); border: 0px; color: #167ac6; cursor: pointer; font-family: Roboto, arial, sans-serif; font-size: 13px; line-height: 17px; margin: 0px; padding: 0px; text-decoration: none;" target="_blank">http://clt.lse.ac.uk/events/networkED...</a>chrishttp://www.blogger.com/profile/01894132626803555691noreply@blogger.com0tag:blogger.com,1999:blog-4541427124838394431.post-68189206600570235042016-04-18T03:38:00.000-07:002016-04-18T03:38:12.447-07:00Digital Single market plans published - EC interoperability agenda for 2017 onwards<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="MsoNormal">
<a href="http://www.openforumeurope.org/latest-ofe-news/"><b><u>DSM package</u></b> of 18 April</a>,
contains 4 Communications (Standardisation, Cloud, IoT and eGovernment Action
Plan). All these will setup the agenda for months to come.<o:p></o:p></div>
<div class="MsoNormal">
On <b><u>Standards</u></b> it
will specifically refer to the new Priority ICT standardisation Plan to which
we have contributed and introduce an EU catalogue for Standards. There will
also be a link to the revision of the European Interoperability Framework <b>(EIF)</b>
which has just gone out for consultation. <o:p></o:p></div>
<div class="MsoNormal">
On <b><u>Cloud</u></b>,
the focus is on the creation of a European Science Cloud, on high investments
to create exascale infrastructures and also on the free flow of data initiative
(FFDI). The FFDI inception report should be published any day now and the
impact assessment together with the legislative proposal should be published
end of November. <o:p></o:p></div>
<div class="MsoNormal">
The <b><u>copyright
reform</u></b> is ongoing, with the legislative proposal now expected in
October 2016 (previsouly June 2016). For now, another public consultation has
been launched, covering the anciallary copyright and freedom of panorama
(deadline 15 June).<o:p></o:p></div>
<br />
<div class="MsoNormal">
On <b><u>cybersecurity</u></b>,
we have replied to the public consultation which closed in March and have also
sent a letter to the relevant EC representatives (both docs are in our Library).
For now, that the GDPR and NIS were agreed, the discussion is all around
blockchain and virtual currencies, with the EP being in the process of adopting
an own initiative report (led by ECON committee) with their key points on the
topic. A public consultation on the ePrivacy Directive is about to open every
day now. ENISA is now focusing on the transposition of
the NIS Directive providing guidelines to Member States. On GDPR, several means
to assess its impact have been put in place at national level.</div>
</div>
chrishttp://www.blogger.com/profile/01894132626803555691noreply@blogger.com0