The TPRC is seeking to select up to 6 TPRC Junior Fellows – early-career researchers engaged in research on the Internet, telecommunication and media policy in the digital age. Please nominate individuals whom you think might make outstanding fellows. Those who have wond student paper awards at the TPRC conference as well as those who served Benton Award winners could be candidates, but we are open to anyone you feel to have the potential to do outstanding research on key issues for the TPRC, and engage other early-career researchers in our activities.
The TPRC Junior Fellows Program was designed in part to award excellence but also tobring new members into the TPRC community. Those appointed will be honoured and serve as ambassadors for TPRC, working pro bono and appointed to two-year terms by the Board. Junior Fellows will be emerging scholars with good connections to their peers, including but not limited to successful TPRC paper presenters and alumni of the Graduate Student Consortium and Benton Award.
TPRC hopes that Junior Fellows will help broaden the TPRC community, and improve the participation of underrepresented groups, such as young academics, certain disciplines not traditionally involved in telecom research who are engaged in new media and digitial policy, and those engaged in new research areas, as well as those who bring greater diversity to our community, including women, minorities, and under-represented groups.
The TPRC Board anticipates that Fellows will disseminate information about TPRC on their personal networks, and identify and engage 1-1 with prospective attendees and encourage them to participate in TPRC. In return, TPRC will recognize Fellows on the TPRC web site, and publicly welcome new appointees during the conference, and provide material and mentoring to support their outreach mission. Of course, the Early Career Fellows will be able to list this service on their resumes. Each Fellow will have a designated Board liaison, who will check in periodically to discuss support needed and progress made. TPRC will aim to support your career.
We’re looking for people that meet as many of the following criteria as possible. None of them are required qualifications; we don’t expect that anyone will check all the boxes.
From under-represented groups, including women and minorities
Working in new research areas and those under-represented at TPRC
Academic talent and promise
Good network of contacts, e.g. active on social media
The 47th Research Conference on Communications, Information, and Internet Policy will be held from September 20-21, 2019, at American University Washington College of Law Washington, D.C. TPRC is an annual cross-disciplinary conference on communications, information, and Internet policy that convenes researchers and policymakers from law, economics, engineering, computer science, public policy and related fields working in academia, industry, government, and nonprofit organizations around the world.
TPRC is seeking submissions for its 47th conference, including papers, posters, panels, a Student Paper Competition, the Graduate Student Consortium, and for the Charles Benton Early Career Scholar Award. As a recent member of the TPRC Board of Directors, I would like to draw your attention to the conference, and the award for early career researchers.
TPRC and the Benton Foundation have announced the third year of the Charles Benton Early Career Scholar Award, recognizing scholarship in the area of digital inclusion and broadband adoption. This special honor will be awarded at TPRC in 2019 in honour of Charles Benton, a longstanding supporter of TPRC and tireless advocate for media, communications and digital equality. The award recipient will receive US$1,500 and will be recognized at a lunch during the TPRC conference and the winner will receive complimentary registration for the conference.
Applications and nominations can be received for scholars currently enrolled in a degree program or no more than five years from receipt of their most recent degree. Acceptable submissions include:
An original, empirically-based research paper pertaining digital inclusion and/or broadband adoption
A policy proposal for digital inclusion and broadband adoption with a discussion of the justification
An essay on a topic dealing with digital inclusion and/or broadband adoption.
Submissions must be less than 25 double-spaced, typewritten pages, including notes and references and will not have been formally published in a peer reviewed outlet prior to TPRC47.
The recipient will be chosen by a TPRC Board Committee and must attend the conference and agree to work with Benton Foundation’s Executive Editor, Kevin Taglang, to produce a blog article based on the winning submission for benton.org.
Applications: May 31
Notice of Decision: July 15
Blog post: December 31
For questions regarding the Charles Benton Early Career Scholar Award, please contact me at William.Dutton at gmail.com or check out the TPRC conference website at: https://www.tprcweb.com
The editors of the Internet Policy Review are pleased to announce the publication of our newest special issue, bringing together the best policy-oriented papers presented at the 2017 annual conference of the Association of Internet Researchers (AoIR) in Tartu, Estonia. The issue – on the broad theme of networked publics – was edited by guest editor William H. Dutton, Professor of media and information policy at Michigan State University.
The seven papers in the special issue span topics concerning whether and how technology and policy are reshaping access to information, perspectives on privacy and security online, and social and legal perspectives on informed consent of internet users. As explained in the editorial to this issue, taken together, the papers reflect the rise of new policy, regulatory and governance issues around the internet and social media, an ascendance of disciplinary perspectives in what is arguably an interdisciplinary field, and the value that theoretical perspectives from cultural studies, law and the social sciences can bring to internet policy research.
This special issue is the first major release of Internet Policy Review in its fifth anniversary year. The open access journal on internet regulation is a high-quality publication put out by four leading European internet research institutions: The Humboldt Institute for Internet and Society (HIIG), Berlin; the Centre for Creativity, Regulation, Enterprise and Technology (CREATe), Glasgow; the Institut des sciences de la communication (ISCC-CNRS), Paris; the Internet Interdisciplinary Institute (IN3), Barcelona.
The release of this special issue officially kicks off the Internet Policy Review anniversary series of activities, including both an Open Access Minigolf during the Long Night of the Sciences (Berlin) and the IAMCR conference (Eugene, Oregon) in June, a Grand anniversary celebration (Berlin) in September and a participation in the AoIR2018 conference in October (Montreal). For up-to-date information on our planned activities, please kindly access: https://policyreview.info/5years
Papers in this Special Issue of Internet Policy Review
Editorial: Networked publics: multi-disciplinary perspectives on big policy issues
William H. Dutton, Michigan State University
Political topic-communities and their framing practices in the Dutch Twittersphere
Maranke Wieringa, Utrecht University
Daniela van Geenen, University of Applied Sciences Utrecht
Mirko Tobias Schäfer, Utrecht University
Ludo Gorzeman, Utrecht University
Big crisis data: generality-singularity tensions
Karolin Eva Kappler, University of Hagen
Cryptographic imaginaries and the networked public
Sarah Myers West, University of Southern California
Not just one, but many ‘Rights to be Forgotten’
Geert Van Calster, KU Leuven
Alejandro Gonzalez Arreaza, KU Leuven
Elsemiek Apers, Conseil International du Notariat Belge
What kind of cyber security? Theorising cyber security and mapping approaches
Laura Fichtner, University of Hamburg
Algorithmic governance and the need for consumer empowerment in data-driven markets
Stefan Larsson, Lund University
Standard form contracts and a smart contract future
Kristin B. Cornelius, University of California, Los Angeles
It is common to debate the definition and correct implementation of the Chatham House Rule. My issue is with its over-use. It should be used in exceptional cases, rather than being routinized as a norm for managing communication about meetings.
To be clear, the Chatham House Rule (singular) is: “When a meeting, or part thereof, is held under the Chatham House Rule, participants are free to use the information received, but neither the identity nor the affiliation of the speaker(s), nor that of any other participant, may be revealed.”*
One of the central rationales of this rule was to enable more transparency by freeing governmental and other officials to speak without attribution.** Clearly, there are cases in which individuals cannot speak publicly about an issue given their position. Think about the many cases in which news sources do not wish to be identified by journalists. Similar situations arise in meetings, and it is good that The Chatham House Rule exists to use in just such occasions to promote greater transparency.
However, it is arguable that The Chatham House Rule is used in ways that do not promote transparency. For example, it is often misunderstood and used to prevent members of a meeting from conveying information provided at the meeting. Clearly, the original rule left participants ‘free to use the information’, just without identifying the source. This expansion of the Rule runs counter to the aim of the rule’s establishment.
In addition, all too often the Rule is invoked not because the content of a meeting is particularly sensitive, but because it creates a sense of tradition, and an aura of importance. It conveys the message that something important will be discussed at this meeting. However, the function of this is more in marketing a meeting rather than creating a safe setting for revealing secret, confidential, or new information.
A related rationale is that it is just ‘the way we do things’ – the tradition. In this case, there is likely to be no need for less transparency, but a case of blindly following tradition, resulting in information being inadvertently suppressed.
In many ways, the times are making The Chatham House Rule more problematic.
First, history is pushing us toward more transparency, not less. The spirit of the Rule should lead us to apply it only when necessary to open communication, such as around a sensitive issue, not to routinely regulate discussion of what was said in a meeting.
Secondly, the authenticity of information that comes out of a meeting is often enhanced by knowing more information about its source. If a new idea or piece of information is attributed to an individual, that individual can become a first source for authenticating what was said, and for follow up questions.
Thirdly, technical advances are making it less and less realistic to keep the source of information confidential. Leaks, recordings, live blogging and more are making transparency the norm of nearly every meeting. That is, it is better to assume that any meeting is public than to assume any meeting is confidential.
Over a decade ago, I once organized and chaired a meeting that included the UK’s Information Commissioner (the privacy commissioner, if you will), and it was conducted under The Chatham House Rule. At the break, I checked with my IT group about how the recording was going, as we were recording the meeting for preparing a discussion paper to follow. Lo and behold, the meeting was being Webcast! This made for a good laugh by the Commissioner and all when we reconvened, but it also reminded me that everyone should assume the default of a meeting in the digital world is that all is public rather than private.
Finally, there are better ways to handle information in today’s technical and political contexts. Personally, I usually record meetings that are about academic or applied matters, as opposed to meetings about personnel issues, for example. So if we convene a group to discuss a substantive issue, such as a digital policy issue like net neutrality, we let all participants know that presentations and discussions will be recorded. We do not promise that anything will be confidential, as it is not completely under our control, but we promise that our recording will be used primarily for writing up notes of the meeting, and that if anyone is quoted, they will be asked to approve the quote before it is distributed publicly.
Of course, when individuals request that something remains confidential, or confined to those present, then we do everything we can to ensure that confidentiality. (As with The Chatham House Rule, much relies on trust among the participants in a meeting.) But this restriction is the exception, rather than the rule. This process tends to ensure more accurate reports of meetings, enable us to quote individuals, who should get credit or attribution, and support transparency.
The Chatham House Rule was established in 1927 with Chatham House being the UK’s Royal Institute of International Affairs. The worries at that time were more often about encouraging government officials to participate in a discussion about sensitive international concerns by assuring anonymity. Today there are still likely to be occasions when this rule could be useful in bringing people around the table, but that is likely to be exception and not the rule in the era of the Internet, distributed electronic conferencing, and live Tweeting.
** As noted by Chatham House: “The Chatham House Rule originated at Chatham House with the aim of providing anonymity to speakers and to encourage openness and the sharing of information. It is now used throughout the world as an aid to free discussion.” https://www.chathamhouse.org/about/chatham-house-rule
I’ve argued on this blog that the idea of enabling the press to ask questions from outside the White House Press Office, in fact, outside the Washington DC Beltway, was a good idea. Some anecdotal evidence is being reported that the strategy is working. USA Today reported that over 13 White House press briefings, Sean Spicer has taken questions ‘from 32 outside-the-Beltway outlets’. This is a great example of using the Internet to enable more distributed participation. The Washington press is obviously defensive when people complain about the ‘media bubble’ in the briefing room, but the potential for what was once called ‘pack journalism’ is real, and location matters. Geographically distributing contributions is symbolically and materially opening the briefings up to more diversity of viewpoints and issues.
Inevitably, more voices means more competition among the journalists in asking questions. But there are already too many in the room, and why it is fair to give more access to the outlets that can afford to station staff in Washington DC is not clear to me. That said, the Skype seats will always be the cheap seats, and be less likely to get their turn in the question and answer sessions.
Recent Chinese concerns over ‘Twitter Foreign Policy” are just the tip of the iceberg on the ways in which the Internet has been enabling diplomacy to be reconfigured, for better or worse. Over a decade ago, Richard Grant, a diplomat from New Zealand, addressed these issues in a paper I helped him with at the OII. Drawing from Richard’s paper, there are at least five ways in which the Internet and social media are reconfiguring diplomacy:
Changing who participates in diplomacy, creating a degree of openness and transparency, for example through leaks and whistleblowers like Edward Snowden, that puts diplomacy in the public eye, establishing an entire field of “public diplomacy”;
Creating new sources of information for diplomacy, such as when mobile Internet videos become key to what is known about an event of international significance;
Speeding up diplomatic processes in response to the immediacy of news about events in the online world that require more rapid responses in order to be more effective, such as in challenging misinformation;
Pushing diplomacy to be more event-led, when the world knows about events that diplomats cannot ignore; and
Eroding borders, such as enabling diplomats to communicate locally or globally from anywhere at any time.
These transformations do not diminish the need for diplomats to serve a critical role as intermediaries. If anything, the Internet makes it possible for diplomats to be where they need to be to facilitate face-to-face interpersonal communication, making the geography of diplomacy more, rather than less, important. However, it poses serious challenges for adapting diplomacy to a globally digital village, such as how to adapt hierarchical bureaucracies of diplomacy to respond to more agile networks, and how to best ‘join the conversation’ on social media.
Email Disrupting Life at Home? Careful What You Ask For
In France and other nations there is discussion of somehow banning email after 6pm or outside of working hours. For example, see here. Perhaps this could help provide a better work-life balance or prevent households from competing with email for the attention of their family. But this raises not only problems of implementation, but also the reverse – shall we start policing the personal use of communication and information technologies like email in the office?
Implementation would be impossible. You could get email at home or outside of work hours, but also work related Tweets, texts, messages, calls, video calls, WeChats, social media posts, and more. Email is only one avenue into the household, and declining in use relative other social media and other new media. Implementation would also be problematic by what would be a regulatory overreach, with public regulation reaching into the use of media in the households and private companies and NGOs, etc.
But the greatest threat is that this will go both ways. Companies, government departments, NGOs and others will want their employees and managers to stop using electronic media for personal reasons while at work, or during the work day, such as checking on your children, or making reservations, or getting any personal emails.
The first dissertation I supervised on corporate email was in 1980 and one of the key issues in these early days when email was beginning to be used in business instead of telegrams or faxes, was a worry that employees would use email for personal reasons that had nothing to do with work. My response then and now has always been that this should not be a worry. Personal uses of email at work are helpful for the morale and time management of people in the workplace, and – it goes both ways – email will enable employees to handle some business at home. And especially in the early days of email, personal use helped bring business people online, as then and now, many resist the use of online media for business purposes. There is a positive synergy (sorry to use that word) between the use of communication technologies at home and at work – a win-win.
Encourage and teach individuals to manage their time and self-regulate their engagement with work from home and vice versa, but don’t try to regulate something for which no one size fits all.