中立金字塔:在网络上分配权力的政策框架

Juan Ortiz Freuler
{"title":"中立金字塔:在网络上分配权力的政策框架","authors":"Juan Ortiz Freuler","doi":"10.2139/ssrn.3802263","DOIUrl":null,"url":null,"abstract":"The internet used to be considered as a catalyst of positive social change. Yet such claims have become rare. Structured as a document for action in four steps, this report seeks to provide a rough compass for those trying to understand the underlying causes of much of what is problematic with the internet and the web today. I argue that paying attention to who shapes internet traffic (and how) is crucial. It will allow us to understand the connection between issues often considered unrelated (such as net neutrality and misinformation), as well as to anticipate challenges that are yet to emerge. <br><br>Step 1: Understanding the context: How the internet came to be seated on the defendant’s bench.<br>Here I describe how the inventors and developers of the internet and the web upheld the principle of decentralization to ensure the network was robust in the face of failure, and how this sparked hope for systematically excluded groups that had long been marginalized from public debate. I then describe four types of problems for which the web is often considered responsible, and explain the subset of these that I believe can be resolved through digital policies, narrowing the scope of this report to the issue of centralization.<br><br>Step 2: Understanding the present and future risks triggered by a centralized information system.<br>Here I describe how the internet and the web have been centralized. I explain how, given the characteristics of the process of centralization, the ongoing deployment of connected devices (also known as internet of things), as well as the growing developments in the fields of augmented reality and virtual reality are likely going to fuel the process of centralization further. Lastly, focusing on search and person-to-person communications, I explore the types of risks centralization poses to the present and future of our political system.<br><br>Step 3: Deploying the Neutrality Pyramid framework in order to redistribute power. <br>Here I present the Neutrality Pyramid, a framework around which we can rally to neutralize the process of centralization and reduce the scope of power of the incumbent gatekeepers. After explaining how and why the framework builds upon and extends the definition of net neutrality to other layers of the stack, I describe the technological, regulatory and activist actions taking place around the globe to forward and enforce the principles of net neutrality, device neutrality, platform neutrality and personal control over personal data.<br><br>Step 4: Enabling robust public deliberation towards a positive agenda.<br>I go beyond negative actions and explain how the Neutrality Pyramid can enable the development of a positive agenda. I explain that even though the neutrality principle presupposes a hands-off approach, it does include a set of exceptions enshrined by law. I argue that we should leverage the process of defining such exceptions as a means to ensure the institutions of democracy play a role in guiding the process of development of the internet, and I suggest some of the key questions public officials need to put forward. This section then discusses the development of public infrastructure and services as a way to bake democratic institutions into the growing digital sphere.<br><br>In the Conclusion, I outline the backdrop of weakened governments and global institutions of governance in which the upcoming debates regarding digital policy will take place, and the challenges the cold war discourse, with its militaristic undertones, poses in this context. <br>","PeriodicalId":431314,"journal":{"name":"ERPN: Regulation (Other) (Sub-Topic)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"The Neutrality Pyramid: A Policy Framework to Distribute Power Over the Net\",\"authors\":\"Juan Ortiz Freuler\",\"doi\":\"10.2139/ssrn.3802263\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The internet used to be considered as a catalyst of positive social change. Yet such claims have become rare. Structured as a document for action in four steps, this report seeks to provide a rough compass for those trying to understand the underlying causes of much of what is problematic with the internet and the web today. I argue that paying attention to who shapes internet traffic (and how) is crucial. It will allow us to understand the connection between issues often considered unrelated (such as net neutrality and misinformation), as well as to anticipate challenges that are yet to emerge. <br><br>Step 1: Understanding the context: How the internet came to be seated on the defendant’s bench.<br>Here I describe how the inventors and developers of the internet and the web upheld the principle of decentralization to ensure the network was robust in the face of failure, and how this sparked hope for systematically excluded groups that had long been marginalized from public debate. I then describe four types of problems for which the web is often considered responsible, and explain the subset of these that I believe can be resolved through digital policies, narrowing the scope of this report to the issue of centralization.<br><br>Step 2: Understanding the present and future risks triggered by a centralized information system.<br>Here I describe how the internet and the web have been centralized. I explain how, given the characteristics of the process of centralization, the ongoing deployment of connected devices (also known as internet of things), as well as the growing developments in the fields of augmented reality and virtual reality are likely going to fuel the process of centralization further. Lastly, focusing on search and person-to-person communications, I explore the types of risks centralization poses to the present and future of our political system.<br><br>Step 3: Deploying the Neutrality Pyramid framework in order to redistribute power. <br>Here I present the Neutrality Pyramid, a framework around which we can rally to neutralize the process of centralization and reduce the scope of power of the incumbent gatekeepers. After explaining how and why the framework builds upon and extends the definition of net neutrality to other layers of the stack, I describe the technological, regulatory and activist actions taking place around the globe to forward and enforce the principles of net neutrality, device neutrality, platform neutrality and personal control over personal data.<br><br>Step 4: Enabling robust public deliberation towards a positive agenda.<br>I go beyond negative actions and explain how the Neutrality Pyramid can enable the development of a positive agenda. I explain that even though the neutrality principle presupposes a hands-off approach, it does include a set of exceptions enshrined by law. I argue that we should leverage the process of defining such exceptions as a means to ensure the institutions of democracy play a role in guiding the process of development of the internet, and I suggest some of the key questions public officials need to put forward. This section then discusses the development of public infrastructure and services as a way to bake democratic institutions into the growing digital sphere.<br><br>In the Conclusion, I outline the backdrop of weakened governments and global institutions of governance in which the upcoming debates regarding digital policy will take place, and the challenges the cold war discourse, with its militaristic undertones, poses in this context. <br>\",\"PeriodicalId\":431314,\"journal\":{\"name\":\"ERPN: Regulation (Other) (Sub-Topic)\",\"volume\":\"34 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-03-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"ERPN: Regulation (Other) (Sub-Topic)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.2139/ssrn.3802263\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"ERPN: Regulation (Other) (Sub-Topic)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2139/ssrn.3802263","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

互联网曾经被认为是积极社会变革的催化剂。然而,这样的说法已经很少见了。这份报告分为四个步骤,旨在为那些试图理解当今互联网和网络问题的根本原因的人提供一个粗略的指南。我认为关注谁塑造了互联网流量(以及如何塑造)是至关重要的。它将使我们了解通常被认为不相关的问题(如网络中立性和错误信息)之间的联系,以及预测尚未出现的挑战。第一步:理解背景:互联网是如何坐在被告席上的。在这里,我描述了互联网和网络的发明者和开发者是如何坚持去中心化的原则,以确保网络在面对失败时仍然强大,以及这如何为长期被排除在公共辩论之外的系统排斥群体带来了希望。然后,我描述了网络通常被认为是负责任的四种类型的问题,并解释了我认为可以通过数字政策解决的这些问题的子集,将本报告的范围缩小到集中问题。第二步:了解集中式信息系统引发的当前和未来风险。在这里,我描述了互联网和网络是如何被集中起来的。我解释了鉴于集中化过程的特点,连接设备(也称为物联网)的持续部署,以及增强现实和虚拟现实领域的不断发展,如何可能进一步推动集中化过程。最后,聚焦于搜索和人与人之间的交流,我探讨了集中化对我们政治制度的现在和未来构成的风险类型。步骤3:部署中立金字塔框架,以便重新分配权力。在这里,我提出了中立金字塔,这是一个框架,我们可以围绕它团结起来,以中和集权的过程,并减少现任看门人的权力范围。在解释了框架如何以及为什么建立在网络中立性的定义之上并将其扩展到堆栈的其他层之后,我描述了全球范围内正在发生的技术,监管和激进行动,以转发和执行网络中立性,设备中立性,平台中立性和个人控制个人数据的原则。第四步:促使公众对积极议程进行积极的审议。我将超越消极行为,解释中立金字塔如何能够推动积极议程的发展。我解释说,尽管中立原则以不干涉的方式为前提,但它确实包括法律规定的一系列例外情况。我认为,我们应该利用定义这些例外的过程,作为确保民主制度在指导互联网发展过程中发挥作用的一种手段,我还提出了一些政府官员需要提出的关键问题。本节接着讨论公共基础设施和服务的发展,以此将民主制度融入日益增长的数字领域。在结束语中,我概述了政府和全球治理机构被削弱的背景,即将进行的关于数字政策的辩论将在此背景下进行,以及带有军国主义色彩的冷战话语在此背景下构成的挑战。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
The Neutrality Pyramid: A Policy Framework to Distribute Power Over the Net
The internet used to be considered as a catalyst of positive social change. Yet such claims have become rare. Structured as a document for action in four steps, this report seeks to provide a rough compass for those trying to understand the underlying causes of much of what is problematic with the internet and the web today. I argue that paying attention to who shapes internet traffic (and how) is crucial. It will allow us to understand the connection between issues often considered unrelated (such as net neutrality and misinformation), as well as to anticipate challenges that are yet to emerge.

Step 1: Understanding the context: How the internet came to be seated on the defendant’s bench.
Here I describe how the inventors and developers of the internet and the web upheld the principle of decentralization to ensure the network was robust in the face of failure, and how this sparked hope for systematically excluded groups that had long been marginalized from public debate. I then describe four types of problems for which the web is often considered responsible, and explain the subset of these that I believe can be resolved through digital policies, narrowing the scope of this report to the issue of centralization.

Step 2: Understanding the present and future risks triggered by a centralized information system.
Here I describe how the internet and the web have been centralized. I explain how, given the characteristics of the process of centralization, the ongoing deployment of connected devices (also known as internet of things), as well as the growing developments in the fields of augmented reality and virtual reality are likely going to fuel the process of centralization further. Lastly, focusing on search and person-to-person communications, I explore the types of risks centralization poses to the present and future of our political system.

Step 3: Deploying the Neutrality Pyramid framework in order to redistribute power.
Here I present the Neutrality Pyramid, a framework around which we can rally to neutralize the process of centralization and reduce the scope of power of the incumbent gatekeepers. After explaining how and why the framework builds upon and extends the definition of net neutrality to other layers of the stack, I describe the technological, regulatory and activist actions taking place around the globe to forward and enforce the principles of net neutrality, device neutrality, platform neutrality and personal control over personal data.

Step 4: Enabling robust public deliberation towards a positive agenda.
I go beyond negative actions and explain how the Neutrality Pyramid can enable the development of a positive agenda. I explain that even though the neutrality principle presupposes a hands-off approach, it does include a set of exceptions enshrined by law. I argue that we should leverage the process of defining such exceptions as a means to ensure the institutions of democracy play a role in guiding the process of development of the internet, and I suggest some of the key questions public officials need to put forward. This section then discusses the development of public infrastructure and services as a way to bake democratic institutions into the growing digital sphere.

In the Conclusion, I outline the backdrop of weakened governments and global institutions of governance in which the upcoming debates regarding digital policy will take place, and the challenges the cold war discourse, with its militaristic undertones, poses in this context.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信