The Next Digital Decade: Essays on the Future of the Internet by Berin Szoka & Adam Marcus
Author:Berin Szoka & Adam Marcus
Language: eng
Format: epub
Publisher: TechFreedom
Why Dominant Search Engines & Carriers Deserve More Scrutiny than Dominant Auction Sites & Social Networks
Those skeptical of the administrative state may find this proposal to “watch the watchers” problematic. They think of intermediaries as primarily market actors, to be disciplined by market constraints. However, the development of dominant Web 2.0 intermediaries was itself a product of particular legal choices about the extent of intellectual property rights and the responsibilities of intermediaries made in legislative and judicial decisions in the 1990s. As intermediaries gained power, various entities tried to bring them to heel—including content providers, search engine optimizers, trademark owners, and consumer advocates. In traditional information law, claims under trademark, defamation, and copyright law might have posed serious worries for intermediaries. However, revisions of communications and intellectual property law in the late 1990s provided safe harbors that can trump legal claims sounding in each of these other areas.46 Some basic reporting responsibilities are a small price to pay for continuing enjoyment of such immunities.
An argument for treating internet intermediaries more like regulated entities owes much to the trail-blazing work of legal realists. Among these, Robert Hale’s work on utilities remains especially inspirational.47 Hale developed many of the theoretical foundations of the New Deal, focusing on the ways in which the common law became inadequate as large business entities began ordering increasing proportions of the national economy.48 Hale’s crucial insight was that many of the leading businesses of his day were not extraordinary innovators that “deserved” all the profits they made; rather, their success was dependent on a network of laws and regulation that could easily shift favor from one corporate player to another.49 Hale focused his theoretical work on the utilities of his time, expounding an economic and philosophical justification for imposing public service obligations on them. Regulatory bodies like state utility commissions and the FCC all learned from his work, which showed the inadequacy of private law for handling disputes over infrastructural utilities.
Market advocates may worry that monitoring of search engines and carriers will lead to more extensive surveillance of the affairs of other intermediaries, like social networks and auction platforms. They may feel that competition is working in each of those areas, and should be the foundation of all intermediary policy. However, competition is only one of many tools we can use to encourage responsible and useful intermediaries. We should rely on competition-promotion via markets and antitrust only to the extent that (a) the intermediary in question is an economic (as opposed to cultural or political) force; (b) the “voice” of the intermediary’s user community is strong;50 and (c) competition is likely to be genuine and not contrived. These criteria help us map older debates about platforms onto newer entities.
For search engines and carriers, each of these factors strongly militates in favor of regulatory intervention. Broadband competition has failed to materialize beyond duopoly service for most Americans. There are several reasons to suspect that Google’s dominance of the general purpose search market will continue to grow.51 Just as
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7797)
Grails in Action by Glen Smith Peter Ledbrook(7710)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6714)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6713)
Running Windows Containers on AWS by Marcio Morales(6229)
Kotlin in Action by Dmitry Jemerov(5078)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(4994)
Combating Crime on the Dark Web by Nearchos Nearchou(4582)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4490)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4429)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4252)
The Age of Surveillance Capitalism by Shoshana Zuboff(3968)
Python for Security and Networking - Third Edition by José Manuel Ortega(3822)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3519)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3491)
Learn Wireshark by Lisa Bock(3406)
Mastering Python for Networking and Security by José Manuel Ortega(3366)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3341)
Blockchain Basics by Daniel Drescher(3311)
