{"title":"作者回应:对非法交易数据的反应反映了关于全球数据安全风险的争论","authors":"","doi":"10.1353/asp.2023.a903873","DOIUrl":null,"url":null,"abstract":"Author's Response:Reactions to Trafficking Data Reflect Debates about Global Data Security Risk Aynne Kokas (bio) Global data governance is highly fragmented, and policy debates about it reflect intense disagreements about the expected role of corporations, the state, and civil society. The impact of data governance practices remains unsettled both within and across nations. Most central to these policy debates, and at the core of how new technologies develop domestically and internationally, is the notion of what constitutes risk and how best to prevent or mitigate it—by either taking a precautionary approach to data governance or attempting to abate data governance problems once they occur. I feel fortunate to engage in this debate. A major focus of my book Trafficking Data: How China Is Winning the Battle for Digital Sovereignty is on how the United States, China, and other developed digital economies perceive and respond to risks differently. Whereas Trafficking Data urges a precautionary approach, the reviews of this book reflect the robust debate about when and how to address the risks inherent in our increasingly digital world. I want to thank Emily S. Weinstein, Kendra Schaefer, Paul Triolo, and Asia Policy for the opportunity to engage on the book's themes with thinkers from the academic research, consulting, and think tank worlds. The issues that Trafficking Data raises concern many people, from journalists and regulators to investors and everyday citizens. Writing about U.S.-China relations in the current moment presents a challenge due, at least in part, to heightened domestic tensions in both countries. Using critiques of the United States' data governance system first, followed by critiques of China's approach, Trafficking Data argues that both approaches exploit users in their own distinctive ways. Indeed, interactions between the tech and data oversight practices of China and the United States present a worst-case scenario for users globally. [End Page 175] One area of seeming agreement among all three reviewers and the book is the importance of more comprehensive data oversight in the United States. Disagreement about what this might look like and the appropriate level of risk underscores one of the central points of the book and, indeed, in contemporary debates about data governance: Should countries follow an approach based on risk regulation or precautionary principles when responding to data gathering, integration, and movement?1 That is, does it make more sense to prepare for potential harm or to make policies that respond to harms that have already occurred or are knowable? This is not just a difference among specialists on China's tech policy; it is a raging debate among tech analysts more broadly. Policymakers that rely on the precautionary principle, which is most common in European lawmaking, do not wait for harm to happen or for uncertainty to be resolved.2 Rather, this approach recommends, at minimum, to avoid inaction on potential risks and, at maximum, to regulate \"until it is clear that there is no danger of serious harm.\"3 In Japan, Australia, India, and other U.S. allies and partners, there are also clear policy efforts in place to address risks of data transfer with precaution. In contrast, risk-based regulation, which is more common in the U.S. context and responsible for the current U.S. regime of surveillance capitalism, is more accepting of both known and unknown risks in exchange for economic and social benefits.4 In the book's introduction, it is no coincidence that I discuss data trafficking in relation to climate policy, one of the areas that pioneered precautionary policymaking. In climate policy, Europe, Japan, Australia, and other U.S. allies and partners have also taken a different path from the United States, acting to protect their citizens from risks rather than waiting for those risks to materialize before pursuing mitigation. This debate between precautionary and risk-based regulation in data oversight is at the core of not just U.S.-China tech relations but how the United States and other countries respond to a whole host of new technologies, from generative artificial intelligence to bioengineering, in which risks are significant but unpredictable. Although I appreciate points from two of the reviewers that the full risks posed...","PeriodicalId":53442,"journal":{"name":"Asia Policy","volume":null,"pages":null},"PeriodicalIF":1.3000,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Author's Response: Reactions to Trafficking Data Reflect Debates about Global Data Security Risk\",\"authors\":\"\",\"doi\":\"10.1353/asp.2023.a903873\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Author's Response:Reactions to Trafficking Data Reflect Debates about Global Data Security Risk Aynne Kokas (bio) Global data governance is highly fragmented, and policy debates about it reflect intense disagreements about the expected role of corporations, the state, and civil society. The impact of data governance practices remains unsettled both within and across nations. Most central to these policy debates, and at the core of how new technologies develop domestically and internationally, is the notion of what constitutes risk and how best to prevent or mitigate it—by either taking a precautionary approach to data governance or attempting to abate data governance problems once they occur. I feel fortunate to engage in this debate. A major focus of my book Trafficking Data: How China Is Winning the Battle for Digital Sovereignty is on how the United States, China, and other developed digital economies perceive and respond to risks differently. Whereas Trafficking Data urges a precautionary approach, the reviews of this book reflect the robust debate about when and how to address the risks inherent in our increasingly digital world. I want to thank Emily S. Weinstein, Kendra Schaefer, Paul Triolo, and Asia Policy for the opportunity to engage on the book's themes with thinkers from the academic research, consulting, and think tank worlds. The issues that Trafficking Data raises concern many people, from journalists and regulators to investors and everyday citizens. Writing about U.S.-China relations in the current moment presents a challenge due, at least in part, to heightened domestic tensions in both countries. Using critiques of the United States' data governance system first, followed by critiques of China's approach, Trafficking Data argues that both approaches exploit users in their own distinctive ways. Indeed, interactions between the tech and data oversight practices of China and the United States present a worst-case scenario for users globally. [End Page 175] One area of seeming agreement among all three reviewers and the book is the importance of more comprehensive data oversight in the United States. Disagreement about what this might look like and the appropriate level of risk underscores one of the central points of the book and, indeed, in contemporary debates about data governance: Should countries follow an approach based on risk regulation or precautionary principles when responding to data gathering, integration, and movement?1 That is, does it make more sense to prepare for potential harm or to make policies that respond to harms that have already occurred or are knowable? This is not just a difference among specialists on China's tech policy; it is a raging debate among tech analysts more broadly. Policymakers that rely on the precautionary principle, which is most common in European lawmaking, do not wait for harm to happen or for uncertainty to be resolved.2 Rather, this approach recommends, at minimum, to avoid inaction on potential risks and, at maximum, to regulate \\\"until it is clear that there is no danger of serious harm.\\\"3 In Japan, Australia, India, and other U.S. allies and partners, there are also clear policy efforts in place to address risks of data transfer with precaution. In contrast, risk-based regulation, which is more common in the U.S. context and responsible for the current U.S. regime of surveillance capitalism, is more accepting of both known and unknown risks in exchange for economic and social benefits.4 In the book's introduction, it is no coincidence that I discuss data trafficking in relation to climate policy, one of the areas that pioneered precautionary policymaking. In climate policy, Europe, Japan, Australia, and other U.S. allies and partners have also taken a different path from the United States, acting to protect their citizens from risks rather than waiting for those risks to materialize before pursuing mitigation. This debate between precautionary and risk-based regulation in data oversight is at the core of not just U.S.-China tech relations but how the United States and other countries respond to a whole host of new technologies, from generative artificial intelligence to bioengineering, in which risks are significant but unpredictable. Although I appreciate points from two of the reviewers that the full risks posed...\",\"PeriodicalId\":53442,\"journal\":{\"name\":\"Asia Policy\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":1.3000,\"publicationDate\":\"2023-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Asia Policy\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1353/asp.2023.a903873\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Asia Policy","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1353/asp.2023.a903873","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
摘要
作者回应:对非法交易数据的反应反映了对全球数据安全风险的争论。全球数据治理是高度分散的,关于它的政策辩论反映了对公司、国家和公民社会预期角色的强烈分歧。数据治理实践的影响在国家内部和国家之间仍然不确定。这些政策辩论的最核心,也是新技术如何在国内和国际上发展的核心,是什么构成风险以及如何最好地预防或减轻风险的概念——要么采取预防性的数据治理方法,要么在数据治理问题发生时试图减轻它们。能参与这场辩论,我感到很幸运。我的书《贩运数据:中国如何赢得数字主权之战》的一个主要焦点是美国、中国和其他发达数字经济体如何以不同的方式感知和应对风险。虽然《贩运数据》敦促采取预防措施,但本书的评论反映了关于何时以及如何应对日益数字化的世界所固有风险的激烈辩论。我要感谢Emily S. Weinstein、Kendra Schaefer、Paul Triolo和Asia Policy让我有机会与来自学术研究、咨询和智库界的思想家就本书的主题进行交流。贩卖数据引发了许多人的关注,从记者、监管机构到投资者和普通公民。当前撰写中美关系的文章面临挑战,至少在一定程度上是由于两国国内紧张局势的加剧。《贩运数据》首先对美国的数据治理体系提出批评,然后对中国的方法提出批评,认为这两种方法都以自己独特的方式剥削用户。事实上,中国和美国的技术和数据监管实践之间的互动为全球用户带来了最坏的情况。三位审稿人和这本书似乎在一个方面达成了一致,那就是在美国进行更全面的数据监管的重要性。关于这可能是什么样子以及适当的风险水平的分歧强调了本书的一个中心观点,事实上,在当代关于数据治理的辩论中:在应对数据收集、整合和移动时,各国应该遵循基于风险监管或预防原则的方法?也就是说,是为潜在的危害做准备更有意义,还是制定政策应对已经发生或已知的危害更有意义?这不仅是中国科技政策专家之间的分歧;在更广泛的科技分析师中,这是一场激烈的辩论。政策制定者依靠预防原则,这在欧洲立法中是最常见的,他们不会坐等伤害发生或不确定性得到解决相反,这种方法建议,至少要避免对潜在风险不采取行动,最多要进行监管,“直到明确没有严重危害的危险为止”。在日本、澳大利亚、印度和其他美国的盟友和合作伙伴,也有明确的政策努力来预防数据传输的风险。相比之下,基于风险的监管在美国更常见,并对美国当前的监控资本主义制度负责,它更接受已知和未知的风险,以换取经济和社会效益在本书的前言中,我讨论了与气候政策相关的数据贩运,这并非巧合,气候政策是预防性政策制定的先驱之一。在气候政策方面,欧洲、日本、澳大利亚以及美国的其他盟友和合作伙伴也采取了与美国不同的做法,采取行动保护本国公民免受风险影响,而不是等到风险出现后再寻求缓解措施。在数据监管方面,预防性监管和基于风险的监管之间的争论不仅是美中科技关系的核心,也是美国和其他国家如何应对从可再生人工智能到生物工程等一系列新技术的核心,这些技术的风险很大,但不可预测。尽管我很欣赏其中两位评论者的观点,他们认为这带来的全部风险……
Author's Response: Reactions to Trafficking Data Reflect Debates about Global Data Security Risk
Author's Response:Reactions to Trafficking Data Reflect Debates about Global Data Security Risk Aynne Kokas (bio) Global data governance is highly fragmented, and policy debates about it reflect intense disagreements about the expected role of corporations, the state, and civil society. The impact of data governance practices remains unsettled both within and across nations. Most central to these policy debates, and at the core of how new technologies develop domestically and internationally, is the notion of what constitutes risk and how best to prevent or mitigate it—by either taking a precautionary approach to data governance or attempting to abate data governance problems once they occur. I feel fortunate to engage in this debate. A major focus of my book Trafficking Data: How China Is Winning the Battle for Digital Sovereignty is on how the United States, China, and other developed digital economies perceive and respond to risks differently. Whereas Trafficking Data urges a precautionary approach, the reviews of this book reflect the robust debate about when and how to address the risks inherent in our increasingly digital world. I want to thank Emily S. Weinstein, Kendra Schaefer, Paul Triolo, and Asia Policy for the opportunity to engage on the book's themes with thinkers from the academic research, consulting, and think tank worlds. The issues that Trafficking Data raises concern many people, from journalists and regulators to investors and everyday citizens. Writing about U.S.-China relations in the current moment presents a challenge due, at least in part, to heightened domestic tensions in both countries. Using critiques of the United States' data governance system first, followed by critiques of China's approach, Trafficking Data argues that both approaches exploit users in their own distinctive ways. Indeed, interactions between the tech and data oversight practices of China and the United States present a worst-case scenario for users globally. [End Page 175] One area of seeming agreement among all three reviewers and the book is the importance of more comprehensive data oversight in the United States. Disagreement about what this might look like and the appropriate level of risk underscores one of the central points of the book and, indeed, in contemporary debates about data governance: Should countries follow an approach based on risk regulation or precautionary principles when responding to data gathering, integration, and movement?1 That is, does it make more sense to prepare for potential harm or to make policies that respond to harms that have already occurred or are knowable? This is not just a difference among specialists on China's tech policy; it is a raging debate among tech analysts more broadly. Policymakers that rely on the precautionary principle, which is most common in European lawmaking, do not wait for harm to happen or for uncertainty to be resolved.2 Rather, this approach recommends, at minimum, to avoid inaction on potential risks and, at maximum, to regulate "until it is clear that there is no danger of serious harm."3 In Japan, Australia, India, and other U.S. allies and partners, there are also clear policy efforts in place to address risks of data transfer with precaution. In contrast, risk-based regulation, which is more common in the U.S. context and responsible for the current U.S. regime of surveillance capitalism, is more accepting of both known and unknown risks in exchange for economic and social benefits.4 In the book's introduction, it is no coincidence that I discuss data trafficking in relation to climate policy, one of the areas that pioneered precautionary policymaking. In climate policy, Europe, Japan, Australia, and other U.S. allies and partners have also taken a different path from the United States, acting to protect their citizens from risks rather than waiting for those risks to materialize before pursuing mitigation. This debate between precautionary and risk-based regulation in data oversight is at the core of not just U.S.-China tech relations but how the United States and other countries respond to a whole host of new technologies, from generative artificial intelligence to bioengineering, in which risks are significant but unpredictable. Although I appreciate points from two of the reviewers that the full risks posed...
期刊介绍:
Asia Policy is a peer-reviewed scholarly journal presenting policy-relevant academic research on the Asia-Pacific that draws clear and concise conclusions useful to today’s policymakers.