The 47th Research Conference on Communications, Information, and Internet Policy will be held from September 20-21, 2019, at American University Washington College of Law Washington, D.C. TPRC is an annual cross-disciplinary conference on communications, information, and Internet policy that convenes researchers and policymakers from law, economics, engineering, computer science, public policy and related fields working in academia, industry, government, and nonprofit organizations around the world.
TPRC is seeking submissions for its 47th conference, including papers, posters, panels, a Student Paper Competition, the Graduate Student Consortium, and for the Charles Benton Early Career Scholar Award. As a recent member of the TPRC Board of Directors, I would like to draw your attention to the conference, and the award for early career researchers.
TPRC and the Benton Foundation have announced the third year of the Charles Benton Early Career Scholar Award, recognizing scholarship in the area of digital inclusion and broadband adoption. This special honor will be awarded at TPRC in 2019 in honour of Charles Benton, a longstanding supporter of TPRC and tireless advocate for media, communications and digital equality. The award recipient will receive US$1,500 and will be recognized at a lunch during the TPRC conference and the winner will receive complimentary registration for the conference.
Applications and nominations can be received for scholars currently enrolled in a degree program or no more than five years from receipt of their most recent degree. Acceptable submissions include:
An original, empirically-based research paper pertaining digital inclusion and/or broadband adoption
A policy proposal for digital inclusion and broadband adoption with a discussion of the justification
An essay on a topic dealing with digital inclusion and/or broadband adoption.
Submissions must be less than 25 double-spaced, typewritten pages, including notes and references and will not have been formally published in a peer reviewed outlet prior to TPRC47.
The recipient will be chosen by a TPRC Board Committee and must attend the conference and agree to work with Benton Foundation’s Executive Editor, Kevin Taglang, to produce a blog article based on the winning submission for benton.org.
Applications: May 31
Notice of Decision: July 15
Blog post: December 31
For questions regarding the Charles Benton Early Career Scholar Award, please contact me at William.Dutton at gmail.com or check out the TPRC conference website at: https://www.tprcweb.com
The editors of the Internet Policy Review are pleased to announce the publication of our newest special issue, bringing together the best policy-oriented papers presented at the 2017 annual conference of the Association of Internet Researchers (AoIR) in Tartu, Estonia. The issue – on the broad theme of networked publics – was edited by guest editor William H. Dutton, Professor of media and information policy at Michigan State University.
The seven papers in the special issue span topics concerning whether and how technology and policy are reshaping access to information, perspectives on privacy and security online, and social and legal perspectives on informed consent of internet users. As explained in the editorial to this issue, taken together, the papers reflect the rise of new policy, regulatory and governance issues around the internet and social media, an ascendance of disciplinary perspectives in what is arguably an interdisciplinary field, and the value that theoretical perspectives from cultural studies, law and the social sciences can bring to internet policy research.
This special issue is the first major release of Internet Policy Review in its fifth anniversary year. The open access journal on internet regulation is a high-quality publication put out by four leading European internet research institutions: The Humboldt Institute for Internet and Society (HIIG), Berlin; the Centre for Creativity, Regulation, Enterprise and Technology (CREATe), Glasgow; the Institut des sciences de la communication (ISCC-CNRS), Paris; the Internet Interdisciplinary Institute (IN3), Barcelona.
The release of this special issue officially kicks off the Internet Policy Review anniversary series of activities, including both an Open Access Minigolf during the Long Night of the Sciences (Berlin) and the IAMCR conference (Eugene, Oregon) in June, a Grand anniversary celebration (Berlin) in September and a participation in the AoIR2018 conference in October (Montreal). For up-to-date information on our planned activities, please kindly access: https://policyreview.info/5years
Papers in this Special Issue of Internet Policy Review
Editorial: Networked publics: multi-disciplinary perspectives on big policy issues
William H. Dutton, Michigan State University
Political topic-communities and their framing practices in the Dutch Twittersphere
Maranke Wieringa, Utrecht University
Daniela van Geenen, University of Applied Sciences Utrecht
Mirko Tobias Schäfer, Utrecht University
Ludo Gorzeman, Utrecht University
Big crisis data: generality-singularity tensions
Karolin Eva Kappler, University of Hagen
Cryptographic imaginaries and the networked public
Sarah Myers West, University of Southern California
Not just one, but many ‘Rights to be Forgotten’
Geert Van Calster, KU Leuven
Alejandro Gonzalez Arreaza, KU Leuven
Elsemiek Apers, Conseil International du Notariat Belge
What kind of cyber security? Theorising cyber security and mapping approaches
Laura Fichtner, University of Hamburg
Algorithmic governance and the need for consumer empowerment in data-driven markets
Stefan Larsson, Lund University
Standard form contracts and a smart contract future
Kristin B. Cornelius, University of California, Los Angeles
It is common to debate the definition and correct implementation of the Chatham House Rule. My issue is with its over-use. It should be used in exceptional cases, rather than being routinized as a norm for managing communication about meetings.
To be clear, the Chatham House Rule (singular) is: “When a meeting, or part thereof, is held under the Chatham House Rule, participants are free to use the information received, but neither the identity nor the affiliation of the speaker(s), nor that of any other participant, may be revealed.”*
One of the central rationales of this rule was to enable more transparency by freeing governmental and other officials to speak without attribution.** Clearly, there are cases in which individuals cannot speak publicly about an issue given their position. Think about the many cases in which news sources do not wish to be identified by journalists. Similar situations arise in meetings, and it is good that The Chatham House Rule exists to use in just such occasions to promote greater transparency.
However, it is arguable that The Chatham House Rule is used in ways that do not promote transparency. For example, it is often misunderstood and used to prevent members of a meeting from conveying information provided at the meeting. Clearly, the original rule left participants ‘free to use the information’, just without identifying the source. This expansion of the Rule runs counter to the aim of the rule’s establishment.
In addition, all too often the Rule is invoked not because the content of a meeting is particularly sensitive, but because it creates a sense of tradition, and an aura of importance. It conveys the message that something important will be discussed at this meeting. However, the function of this is more in marketing a meeting rather than creating a safe setting for revealing secret, confidential, or new information.
A related rationale is that it is just ‘the way we do things’ – the tradition. In this case, there is likely to be no need for less transparency, but a case of blindly following tradition, resulting in information being inadvertently suppressed.
In many ways, the times are making The Chatham House Rule more problematic.
First, history is pushing us toward more transparency, not less. The spirit of the Rule should lead us to apply it only when necessary to open communication, such as around a sensitive issue, not to routinely regulate discussion of what was said in a meeting.
Secondly, the authenticity of information that comes out of a meeting is often enhanced by knowing more information about its source. If a new idea or piece of information is attributed to an individual, that individual can become a first source for authenticating what was said, and for follow up questions.
Thirdly, technical advances are making it less and less realistic to keep the source of information confidential. Leaks, recordings, live blogging and more are making transparency the norm of nearly every meeting. That is, it is better to assume that any meeting is public than to assume any meeting is confidential.
Over a decade ago, I once organized and chaired a meeting that included the UK’s Information Commissioner (the privacy commissioner, if you will), and it was conducted under The Chatham House Rule. At the break, I checked with my IT group about how the recording was going, as we were recording the meeting for preparing a discussion paper to follow. Lo and behold, the meeting was being Webcast! This made for a good laugh by the Commissioner and all when we reconvened, but it also reminded me that everyone should assume the default of a meeting in the digital world is that all is public rather than private.
Finally, there are better ways to handle information in today’s technical and political contexts. Personally, I usually record meetings that are about academic or applied matters, as opposed to meetings about personnel issues, for example. So if we convene a group to discuss a substantive issue, such as a digital policy issue like net neutrality, we let all participants know that presentations and discussions will be recorded. We do not promise that anything will be confidential, as it is not completely under our control, but we promise that our recording will be used primarily for writing up notes of the meeting, and that if anyone is quoted, they will be asked to approve the quote before it is distributed publicly.
Of course, when individuals request that something remains confidential, or confined to those present, then we do everything we can to ensure that confidentiality. (As with The Chatham House Rule, much relies on trust among the participants in a meeting.) But this restriction is the exception, rather than the rule. This process tends to ensure more accurate reports of meetings, enable us to quote individuals, who should get credit or attribution, and support transparency.
The Chatham House Rule was established in 1927 with Chatham House being the UK’s Royal Institute of International Affairs. The worries at that time were more often about encouraging government officials to participate in a discussion about sensitive international concerns by assuring anonymity. Today there are still likely to be occasions when this rule could be useful in bringing people around the table, but that is likely to be exception and not the rule in the era of the Internet, distributed electronic conferencing, and live Tweeting.
** As noted by Chatham House: “The Chatham House Rule originated at Chatham House with the aim of providing anonymity to speakers and to encourage openness and the sharing of information. It is now used throughout the world as an aid to free discussion.” https://www.chathamhouse.org/about/chatham-house-rule
I’ve argued on this blog that the idea of enabling the press to ask questions from outside the White House Press Office, in fact, outside the Washington DC Beltway, was a good idea. Some anecdotal evidence is being reported that the strategy is working. USA Today reported that over 13 White House press briefings, Sean Spicer has taken questions ‘from 32 outside-the-Beltway outlets’. This is a great example of using the Internet to enable more distributed participation. The Washington press is obviously defensive when people complain about the ‘media bubble’ in the briefing room, but the potential for what was once called ‘pack journalism’ is real, and location matters. Geographically distributing contributions is symbolically and materially opening the briefings up to more diversity of viewpoints and issues.
Inevitably, more voices means more competition among the journalists in asking questions. But there are already too many in the room, and why it is fair to give more access to the outlets that can afford to station staff in Washington DC is not clear to me. That said, the Skype seats will always be the cheap seats, and be less likely to get their turn in the question and answer sessions.
Recent Chinese concerns over ‘Twitter Foreign Policy” are just the tip of the iceberg on the ways in which the Internet has been enabling diplomacy to be reconfigured, for better or worse. Over a decade ago, Richard Grant, a diplomat from New Zealand, addressed these issues in a paper I helped him with at the OII. Drawing from Richard’s paper, there are at least five ways in which the Internet and social media are reconfiguring diplomacy:
Changing who participates in diplomacy, creating a degree of openness and transparency, for example through leaks and whistleblowers like Edward Snowden, that puts diplomacy in the public eye, establishing an entire field of “public diplomacy”;
Creating new sources of information for diplomacy, such as when mobile Internet videos become key to what is known about an event of international significance;
Speeding up diplomatic processes in response to the immediacy of news about events in the online world that require more rapid responses in order to be more effective, such as in challenging misinformation;
Pushing diplomacy to be more event-led, when the world knows about events that diplomats cannot ignore; and
Eroding borders, such as enabling diplomats to communicate locally or globally from anywhere at any time.
These transformations do not diminish the need for diplomats to serve a critical role as intermediaries. If anything, the Internet makes it possible for diplomats to be where they need to be to facilitate face-to-face interpersonal communication, making the geography of diplomacy more, rather than less, important. However, it poses serious challenges for adapting diplomacy to a globally digital village, such as how to adapt hierarchical bureaucracies of diplomacy to respond to more agile networks, and how to best ‘join the conversation’ on social media.
Email Disrupting Life at Home? Careful What You Ask For
In France and other nations there is discussion of somehow banning email after 6pm or outside of working hours. For example, see here. Perhaps this could help provide a better work-life balance or prevent households from competing with email for the attention of their family. But this raises not only problems of implementation, but also the reverse – shall we start policing the personal use of communication and information technologies like email in the office?
Implementation would be impossible. You could get email at home or outside of work hours, but also work related Tweets, texts, messages, calls, video calls, WeChats, social media posts, and more. Email is only one avenue into the household, and declining in use relative other social media and other new media. Implementation would also be problematic by what would be a regulatory overreach, with public regulation reaching into the use of media in the households and private companies and NGOs, etc.
But the greatest threat is that this will go both ways. Companies, government departments, NGOs and others will want their employees and managers to stop using electronic media for personal reasons while at work, or during the work day, such as checking on your children, or making reservations, or getting any personal emails.
The first dissertation I supervised on corporate email was in 1980 and one of the key issues in these early days when email was beginning to be used in business instead of telegrams or faxes, was a worry that employees would use email for personal reasons that had nothing to do with work. My response then and now has always been that this should not be a worry. Personal uses of email at work are helpful for the morale and time management of people in the workplace, and – it goes both ways – email will enable employees to handle some business at home. And especially in the early days of email, personal use helped bring business people online, as then and now, many resist the use of online media for business purposes. There is a positive synergy (sorry to use that word) between the use of communication technologies at home and at work – a win-win.
Encourage and teach individuals to manage their time and self-regulate their engagement with work from home and vice versa, but don’t try to regulate something for which no one size fits all.
It was a real honour today to speak with some of the alumni (a new word for Oxford) of the Oxford Internet Institute’s DPhil programme. A number came together to celebrate the 10th anniversary of the DPhil. It began four seemingly long years after I became the OII’s founding director in 2002. So while I have retired from Oxford, it was wonderful to return virtually to congratulate these graduates on their degrees.
The programme, like the OII itself, was hatched through four years of discussions around how the Institute (which is a department at Oxford University) should move into teaching. Immediately after my arrival we began organizing the OII’s Summer Doctoral Programme (SDP), which was an instant success and continues to draw top doctoral students from across the world who want to hone their thesis through an intensive summer programme with other doctoral students focused on Internet studies. The positive experience we had with this programme led us to move quickly to set up the DPhil – and four years is relatively quick in Oxford time.
As I told our alumni, the quality of our doctoral students has been largely responsible for the esteem the OII was able to gain across the university and colleges of Oxford. That and the international visibility of the OII enabled the department to later develop our Masters programme, and continue to attract excellent faculty and students from around the world.
I am certain the OII DPhil programme has and will continue to progress since I left Oxford in 2014, such as in adding such strong faculty as Phil Howard and Gina Neff. However, I believe its early success was supported by four key principles that were part of our founding mission:
First, it was anchored in the social sciences. The OII is a department within the Division of Social Sciences at Oxford, which includes the Law Faculty. In 2002, but even since, this made us relatively unique given that so many universities, particular in the USA, viewed study of the Internet as an aspect of computer sciences and engineering. It is increasingly clear that Internet issues are multidisciplinary, and need a strong social science component that the social sciences should be well equipped to contribute. Many social sciences faculty are moving into Internet studies, which has become a burgeoning field, but the OII planted Internet studies squarely in the social sciences.
Secondly, our DPhil emphasized methods from the beginning. We needed to focus on methods to be respected across the social sciences in Oxford. But also we knew that the OII could actually move the social sciences forward in such areas as online research, later digital social science, and big data analytics as applied to the study of society. The OII did indeed help move the methods in the social sciences at Oxford into the digital age, such as through its work on e-Science and digital social research.
Thirdly, while it is somewhat of a cliché that research and teaching can complement each other, this was always the vision for the OII DPhil programme. And it happened in ways more valuable than we anticipated.
Finally, because Oxford was a green field in the areas of media, information and communication studies, with no legacy departments vying to own Internet studies, we could innovate around Internet studies from a multi-disciplinary perspective. And we found that many of the best students applying to the OII were multidisciplinary in their training even before they arrived, and understood the value of multidisciplinary, problem-focused research and teaching.
As you can see, I found the discussion today to be very stimulating. My 12 years at Oxford remains one of the highlights of my career, but it is so much enhanced by seeing our alumni continue to be engaged with the institute. So many thanks to Dame Stephanie Shirley for endowing the OII, and the many scholars across Oxford University and its Colleges, such as Andrew Graham and Colin Lucas, for their confidence and vision in establishing the OII and making the DPhil programme possible.
Remember, the OII was founded in 2001, shortly after the dotcom bubble burst and at a university that is inherently skeptical of new fields. Today the Internet faces a new wave of criticisms ranging from online bullying to global cyber security, including heightened threats to freedom of expression and privacy online. With politicians worldwide ratcheting up attacks on whistleblowers and social media, claiming undue political influence, threats to the Internet are escalating. This new wave of panic around the Internet and social media will make the OII and other departments focused on Internet studies even more critical in the coming years.