Loading…
The Research Conference on Communications, Information and Internet Policy
September 16-17, 2022
Friday, September 16
 

8:00am EDT

Registration and Coffee
WCL parking code for reduced parking:  805355

Friday September 16, 2022 8:00am - 9:00am EDT
Claudio Grossman Hall WCL, 4300 Nebraska Ave, Washington, DC

9:00am EDT

Need for Speed: Broadband and Student Achievement
Link to full paper

Abstract
This paper leverages granular data on fixed broadband access, and links it with administrative data from North Carolina public schools to assess how exposure to fiber broadband affects student standardized test scores. I implement difference-in-differences estimators that exploit within-student variation in high-speed broadband availability and find that exposure to high-speed broadband increases student math and reading test scores by on average 0.4 and 0.1 percent of a standard deviation respectively, however, these effects grow over time such that 6 years of exposure increase test scores by 2.3 and 1.1 percent of standard deviation. Furthermore, I explore potential mechanisms that could explain my results. In particular, I present evidence that fiber increased usage of supplementary educational materials (e.g. Khan Academy) and rule out income effects. In addition, I show that individuals that do not take up fiber might still benefit through increased firm competition.


Authors
CC

Cole Campbell

University of Illinois at Chicago

Discussants
avatar for John Horrigan

John Horrigan

Senior Fellow, Benton Institute for Broadband & Society
I have done extensive work on tech adoption, including barriers to adoption, as well as exploring the impacts of online connectivity. I have done this at the Pew Research Center, the FCC (National Broadband Plan), and as a consultant. I work in DC, but am a proud resident of Baltimore... Read More →


Friday September 16, 2022 9:00am - 9:31am EDT
Room Y403 WCL, 4300 Nebraska Ave, Washington, DC

9:00am EDT

The Economics of Privacy: Examining the Intersection between the Issue of Maximizing the Economic Profits and the Legal Repercussions of Surveilling Muslims through the Case of the Muslim Pro App
Link to full paper

Abstract
Scholarly criticism on the subject of government security agencies’ surveillance and privacy invasion in the United Stated has centered mostly on legal analyses related to court cases or privacy issues of general U.S. citizens. However, scholars have forgotten about the problem of privacy breaches related to government security agencies’ surveillance of American Muslims. Also, the economic benefit of the digital media platform companies resulting from selling American Muslims’ private data is considered a subject very little examined by researchers. This article explores the economic benefits and the long-term effects on revenues resulting from the new trend of selling American Muslims’ private data through digital platforms such as Muslim Pro. Also, this paper brings to the attention of economics scholars the issue of the new way of maximizing the economic profits of the digital platform businesses through selling Muslims’ private data to the government security agencies. Further, this article discusses the repercussions of the legal issues of the recent reports of government security agencies’ surveillance on Muslims through taking advantage of the private data of the Muslim prayer application Muslim Pro, which has been downloaded 50 million times, mostly by accounts belonging to Muslims.


Authors
AA

Ahmed Alrawi

Penn State University

Discussants

Friday September 16, 2022 9:00am - 9:31am EDT
Room NT08 WCL, 4300 Nebraska Ave, Washington, DC

9:00am EDT

A Digital Privacy Divide: How Privacy Concerns Reinforce Inequalities Online
Link to full paper

Abstract
A substantial body of research has failed to find a clear and direct relationship between privacy attitudes and behavior. Concerns over computers, the internet and privacy do not clearly translate to the behavior of users, giving rise to the idea of a privacy paradox. Other studies have challenged the idea of a paradox. Our analysis of UK data sought to discern whether conflicting findings about this paradox can be explained by individual characteristics that moderate the relationship between privacy attitudes and behavior. Based on a representative sample of adults in the UK in 2019, prior to the COVID-19 pandemic, our findings tend to reinforce the presence of relationships between concerns and behavior that counter the expectations of a privacy paradox. At the same time, we also find a weak but meaningful pattern of demographic characteristics that do moderate responses to privacy concerns. The findings suggest that those most marginal to internet use, such as seniors, are the most likely to be disaffected by concerns over privacy. For example, those who do not use the internet in the UK are among the more concerned over privacy. In such ways, fears over privacy might be directly affecting behavior but in ways that are exacerbating digital divides in the UK. The discussion supports approaches to this privacy-disconnection tradeoff through approaches to privacy awareness that avoid generating fear among the public and internet users.


Authors
avatar for William Dutton

William Dutton

Quello Professor, University of Oxford
My colleagues and I recently completed a study of search and politics, and I continue to work on my concept of The Fifth Estate. Happy to speak with anyone about any aspect of Internet studies, that very much includes study of social media and society.
avatar for Grant Blank

Grant Blank

Survey Research Fellow, Oxford Internet Institute
I am a sociologist currently working on projects on privacy, echo chambers, and digital inequality. I am happy to talk about anything related to social and cultural aspects of the internet and social media.
EK

Egle Karpauskaite

Oxford University

Discussants
JP

James Prieger

Pepperdine University


Friday September 16, 2022 9:00am - 9:31am EDT
Room Y402 WCL, 4300 Nebraska Ave, Washington, DC

9:00am EDT

Free Speech, Platforms & The Fake News Problem
Link to full paper

Abstract
How should a platform or a society address the problem of fake news? The spread of misinformation is ancient, complex, yet ubiquitous in media concerning elections, vaccinations, and global climate policy. After examining key attributes of “fake news” and of current solutions, this article presents design tradeoffs for curbing fake news. The challenges are not restricted to truth or to scale alone. Surprisingly, there exist boundary cases when a just society is better served by a mechanism that allows lies to pass, even as there are alternate boundary cases when a just society should put friction on truth. Harm reflects an interplay of lies, decision error, scale, and externalities. Using mechanism design, this article then proposes three tiers of solutions: (1) those that are legal and business model compatible, so firms should adopt them (2) those that are legal but not business model compatible, so firms need compulsion to adopt them, and (3) those that require changes to bad law.

The first set of solutions, grounded in choice architecture, seek to alter information sets available to those affected by misinformation. By enabling transparency into not simply the content and sources but also the distribution and destination, the system provides effective means for counter narratives that are infeasible under current transparency proposals.

The second set of solutions, based in externality economics, considers how to protect free speech while updating Section 230. Revisions have faced two main critiques: one, that holding platforms actionable for false speech would cause them to take down user speech, and two, that ambiguity in individual messages makes judgement of false speech infeasible at scale. Whistleblower testimony before congress emphasized platform amplification of content in pursuit of engagement. A targeted solution, therefore, can separate original speech from amplified speech, generously protecting the former while reverse amplifying the latter. The posting and even discovery of false speech is protected even as amplification is unprotected. The second element uses scale as an advantage. Rather than vet every message, the system takes only statistical samples. The Central Limit Theorem guarantees that establishing the presence of misinformation in amplified speech is feasible to any level of desired accuracy simply by taking larger samples.

The third set of solutions imports insights of antitrust jurisprudence into free speech jurisprudence.  The paradox of antitrust before 1978 was that legal decisions, intended to protect consumers and free markets, artificially raised prices by protecting inefficient firms from consequences of competition.  Free speech rulings vigorously protect speakers on the basis of enabling a free market of ideas. Overzealous protection of those pushing false facts, however, prevents the market from clearing itself.  No government intervention is required.  Rather, it simply needs to step aside in such cases as WASHLITE v Fox News, where numerous false stories that covid is no worse than flu and that vaccines do not work have been causally implicated in thousands of unnecessary deaths. The free speech paradox is that legal decisions intended to protect citizens and free idea markets can achieve the opposite, artificially raising harms and cluttering the market with false facts.


Authors
avatar for Marshall Van Alstyne

Marshall Van Alstyne

Boston University / MIT

Discussants
EN

Eli Noam

Columbia University


Friday September 16, 2022 9:00am - 9:31am EDT
Room NT01 WCL, 4300 Nebraska Ave, Washington, DC

9:00am EDT

Why Has Multilateral Space and Spectrum Resource Management Become More Difficult?
Link to full paper

Abstract
This paper explains why the coordination of satellite orbits and spectrum use among nations have become more contentious and less routine. The potential for greater risks, delays, and conflicts occurs, despite treaty-level commitments to promote the peaceful uses of outer space and efficient and equitable access to radio spectrum and satellite orbits. Heretofore, specialized sectors of the United Nations (“UN”) have worked effectively in forging multilateral consensus on these matters.

Since the onset of artificial satellite technology, the UN has created five space-related treaties covering such issues such as freedom of exploration, liability for damage caused by space objects, the prevention of harmful interference with space activities and the environment, the notification and registration of space activities, exploitation of natural resources in outer space and the settlement of disputes. The International Telecommunication Union (“ITU”), a specialized agency of the UN, has largely achieved the goal of preventing harmful signal interference, formulating technical standards promoting equipment compatibility, and establishing uniform operational rules of the road. Until now, month long ITU spectrum planning conferences have reached closure on both mundane and critical matters, albeit at a slow and methodical pace.

The paper will explain how several chronic and emerging factors present challenges to the successful record of multilateral consensus building on space and spectrum issues. The likelihood of collisions of spacecraft with other objects, including space debris and harmful signal interference has increased, because then United States has opted to make domestic satellite rules and frequency allocations in advance of final ITU consideration. Additionally, China and Russia have sought tan expansion of the ITU’s mission to include elements of Internet governance that could promote balkanization of Internet access and legitimize efforts by individual nations to surveil and control access to broadband networks.

   The paper assesses whether and how UN agencies can continue to establish timely and effective policies and procedures for reducing space debris and the potential for spacecraft collisions, and preventing harmful signal interference.  The paper concludes that China, Russia, and the U.S., should renew efforts to promote collegiality, consensus building, and longstanding, shared goals.


Authors
avatar for Rob Frieden

Rob Frieden

Professor, The Pennsylvania State University
Rob Frieden serves as an educator, researcher, grant seeker and consultant in the law, regulation, and business of broadband networks, cybersecurity, electronic commerce, intellectual property, the Internet of Things, privacy, regulatory reform, satellites, and spectrum management. He... Read More →

Discussants
SO

Sarah Oh Lam

Technology Policy Institute


Friday September 16, 2022 9:00am - 9:31am EDT
Room NT07 WCL, 4300 Nebraska Ave, Washington, DC

9:31am EDT

The Profitability of Flat-Price Broadband with an Over-The-Top Subscription Content Product – Benefits from Cooperation
Link to full paper

Abstract
There is no doubt that streaming content services add great value to the internet ecosystem but how the investment to enable these services and the arising revenue should be split is a persistent dilemma (Stocker & Knieps 2021). The purpose of this paper is to investigate, in a discrete model, the effect on the broadband market when an over-the-top subscription content product is introduced. Does it necessarily increase or decrease profitability of the broadband product when it (a) boosts the utility of broadband but (b) imposes additional costs to deliver the broadband service? The short answer is – it depends. We introduce a model with a small number of consumers to show how the outcomes depend on the structure of the consumer valuations. The different scenarios that we choose to illustrate this, demonstrate that in many cases the broadband and content providers can jointly benefit from coordination on how the content product is priced. This coordination might involve a financial consideration, of course. This is in contrast with the case where the broadband provider attempts to unilaterally reprice its product to reflect the increased cost of delivering the content product – which is not always possible.


Authors
BH

Bronwyn Howell

Victoria University of Wellington
PH

Petrus H. Potgieter

Univeristy of South Africa University of South Africa, Department of Decision Sciences

Discussants
avatar for John Horrigan

John Horrigan

Senior Fellow, Benton Institute for Broadband & Society
I have done extensive work on tech adoption, including barriers to adoption, as well as exploring the impacts of online connectivity. I have done this at the Pew Research Center, the FCC (National Broadband Plan), and as a consultant. I work in DC, but am a proud resident of Baltimore... Read More →


Friday September 16, 2022 9:31am - 10:02am EDT
Room Y403 WCL, 4300 Nebraska Ave, Washington, DC

9:31am EDT

The Role of Transaction Cost Engineering in Standards Adoption: Evidence from Internet Security
Link to full paper

Abstract
The growing economic importance of technical standards has heightened the need for a better understanding of why they succeed or fail. While existing literature has scrutinized the role of public governance, particularly in the realms of regulation, antitrust, and intellectual property, to date legal scholars have largely overlooked the role of private organizational and contractual lawyering in determining the path of technical standardization.

In this Article, we explore this dimension through a case study of the effects of private organizational governance and contracting practices on the fortunes of a nascent Internet security standard. The standard, known as Resource Public Key Infrastructure (“RPKI”), is designed to increase the trustworthiness of information about Internet routing. Through analysis of private organizational and contractual documents, semi-structured interviews with participants in the Internet operations industry, and attendance and participation in key industry conferences, we gained an embedded perspective on the role that private lawyering played in shaping would-be adopters’ perceptions and decisions regarding the technical standard.

According to our interviewees, contract and organizational bureaucracy mattered greatly. Notably, we found that the terms of contractual agreements prevented some potential adopters from experimenting with the technology and deterred others from proposing that their organizations adopt the technology. This was due to the perceived costs of involving organizational lawyers in technology-adoption decisions. In addition, contract terms deterred actors from increasing the functional value of the standard via complementary innovation and the development of complementary information services. Remarkably, even the basic mechanisms for presenting and assenting to contract terms chilled prospects for adoption. Regarding organization, we found that stark differences of governance and mission between key North American and European nonprofits contributed to different patterns of adoption. Taken together, these findings reveal the continuing importance of old-school transaction-cost engineering even in the most technical realms of Internet operation and standardization.


Authors
CY

Christopher Yoo

University of Pennsylvania
DW

David Wishnick

Georgetown University Law Center

Discussants

Friday September 16, 2022 9:31am - 10:02am EDT
Room NT08 WCL, 4300 Nebraska Ave, Washington, DC

9:31am EDT

The Impact of Broadband on Poverty Reduction in Rural Ecuador
Link to full papers

Abstract
This study examines the impact of broadband deployment on labor income and employment (in both level and composition) in rural Ecuador. The analysis spans the 2011 to 2019 period, during which the share of rural households covered by high-speed broadband increased from 14.5% to 83%. The empirical strategy exploits variations in the timing of network deployment, as well as the fact that several rural areas remained unserved by 2019. To estimate impact, the study uses a semi-parametric alternative to the standard two-way fixed-effects (TWFE) estimator proposed by Callaway and Sant’Anna (2021). Overall, the findings indicate that broadband deployment in rural areas is associated with measurable gains in labor income and employment. Our income model estimates range from an increase of 14% to 21% above the expected level had broadband not been deployed in these areas. The impact estimates on employment are more modest, ranging from 3% to 5% (depending on the specification) above the mean employment level over the study period. Additionally, our results corroborate that ICTs help diversify employment opportunities, as the share of agricultural employment falls in the connected areas. The findings also suggest that the economic benefits associated with broadband favor younger workers, presumably because their skills better match the newly created jobs.


Authors
HG

Hernan Galperin

University of Southern California
RK

Raul Katz

Telecom Advisory Services/Columbia Business School
RV

Ramiro Valincia

Telecom Advisory Services

Discussants
JP

James Prieger

Pepperdine University


Friday September 16, 2022 9:31am - 10:02am EDT
Room Y402 WCL, 4300 Nebraska Ave, Washington, DC

9:31am EDT

Hide and Seek the Truth? – Anonymity and Transparency in the Digital Age
Link to full paper

Abstract
Conventional free speech theory and doctrine treats anonymity, the ability to disseminate information without disclosing one's identity, as crucial to the promotion of free speech, and to securing a viable system of free expression. Anonymity has been tied to speakers’ autonomy over the content of their speech, including how they present their identities to others; to the encouragement of expression in circumstances where individuals would not otherwise participate in public discussion for fear of being ridiculed, harassed, or retaliated against; and to the support valuable institutions such as whistle-blowing, voting, and political engagement. However, the rise of mediated interpersonal and “mass-personal” communications, which allow for anonymization of messaging at a mass scale have led to the abuse of anonymity. Anonymity has become in itself a shield from accountability in the commission of wrongs (e.g. cyber-bullying, harassment, defamation), and perhaps most importantly – undermines the very rationales of a principle of free speech, such as the quest for truth and the promotion of collective self-government. We believe this requires taking a closer look at the value of anonymity, and its relation to a principle of free speech in the age of digital technologies. In this study, we encounter the advantages and disadvantages of anonymity in the era of mediated social networking. We present the arguments that had created such constructs as journalist source privileges and closed-door court sessions and the justification for those constructs in the traditional media field. We then demonstrate how the rise in electronic communications in general and social-networking in particular have allowed anonymity to become a tool of disinformation, which is often malicious. Building upon the theory of "media transparency," which we developed in the early days of the contemporary internet-based media environment we present the case for a nuanced approach to anonymity that takes into account both the need to uncover social ills and the obligation to engage in responsible social discourse.


Authors
avatar for Amit Schejter

Amit Schejter

Ben-Gurion University of the Negev
MY

Moran Yemini

Center for Cyber, Law and Policy, University of Haifa; Information Society Project, Yale Law School; Digital Life Initiative, Cornell Tech

Discussants
EN

Eli Noam

Columbia University


Friday September 16, 2022 9:31am - 10:02am EDT
Room NT01 WCL, 4300 Nebraska Ave, Washington, DC

9:31am EDT

Mitigating conflict situations in spectrum sharing: A localized and decentralized governance approach.
Link to full paper

Abstract
As spectrum sharing matures, usage conflict situations (e.g., harmful interference) remain a common concern. To deal with the challenges associated with conflict situations, multiple solutions have been proposed. Examples of approaches to mitigate conflict situations include the creation of exclusion and coordination zones, the development of spectrum coordinators (e.g., SAS), or the implementation of sensing-based mechanisms. Nonetheless, most of these solutions are designed as ``one-size-fits-all'' or global solutions. In this paper, we propose a local analysis of conflict situations in spectrum sharing settings through the design, development, and deployment of polycentric and self-governance systems. We have created a multi-tiered spectrum sharing model to analyze such systems using Agent-Based Modeling, Common-Pool Resource frameworks, and the core definitions of Radio Environment Maps (REMs).


Authors
avatar for Pedro Bustamante

Pedro Bustamante

Assistant Teaching Professor, University of Pittsburgh - School of Information Sciences, Carnegie Mellon University

Discussants
SO

Sarah Oh Lam

Technology Policy Institute


Friday September 16, 2022 9:31am - 10:02am EDT
Room NT07 WCL, 4300 Nebraska Ave, Washington, DC

10:06am EDT

The Public Good and Public Attitudes Toward Data Sharing through IoT
Link to full paper

Abstract
The Internet of Things has created a wealth of new data that is expected to deliver important benefits for IoT users and for society, including for the public good. Much of the literature has focused on data collection through individual adoption of IoT devices, and big data collection by companies with accompanying fears of data misuse. While citizens also increasingly produce data as they move about in public spaces, less is known about citizen support for data collection in smart city environments, or for data sharing for a variety of public-regarding purposes. Through a nationally representative survey of over 2,000 respondents as well as interviews, we explore the willingness of citizens to share their data with different parties and in various circumstances, using the contextual integrity framework, the literature on the 'publicness' of organizations, and public value creation. We describe the results of the survey across different uses, for data sharing from devices and for data collection in public spaces. We conduct multivariate regression to predict individual characteristics that influence attitudes toward use of IoT data for public purposes. Across different contexts, from half to 2/3 of survey respondents were willing to share data from their own IoT devices for public benefits, and 80-93% supported the use of sensors in public places for a variety of collective benefits. Yet government is less trusted with this data than other organizations with public purposes, such as universities, nonprofits and health care institutions. Trust in government, among other factors, was significantly related to data sharing and support for smart city data collection. Cultivating trust through transparent and responsible data stewardship will be important for future use of IoT data for public good.


Authors
avatar for Karen Mossberger

Karen Mossberger

Professor, Arizona State University
I'm Director of the Center on Technology, Data and Society at Arizona State University.  I am interested in digital inequality, digital government, and the impacts of broadband use for communities.  Two new 2021 books from Oxford University Press - "Choosing the Future:  Technology... Read More →
SK

Seong K. Cho

Duke Kunshan University
PC

Pauline Cheong

Arizona State University

Discussants
avatar for John Horrigan

John Horrigan

Senior Fellow, Benton Institute for Broadband & Society
I have done extensive work on tech adoption, including barriers to adoption, as well as exploring the impacts of online connectivity. I have done this at the Pew Research Center, the FCC (National Broadband Plan), and as a consultant. I work in DC, but am a proud resident of Baltimore... Read More →


Friday September 16, 2022 10:06am - 10:40am EDT
Room Y403 WCL, 4300 Nebraska Ave, Washington, DC

10:06am EDT

Rethinking Peltzman’s Economic Model of Regulation Through Ownership Consolidation and Digitized Media Communication Landscapes
Link to full paper

Abstract
Applying Peltzman’s (1976) economic regulatory model, this paper examines how increasing media consolidation and political polarization in the United States today has impacted the outcomes of a recent high profile FCC decision. It suggests how changes in adversarial group sizes (an effect of media consolidation) impacts the equilibrium outcomes in the mathematical model, and how these predictions are confirmed (or not) in the actual outcomes of FCC decisions. Adversarial groups and their positions in each case are identified based on a reading of the filings in the FCC notice of proposed rulemaking (NPRM) process. Through the application of the FCC as a regulator of media and telecommunications, I integrate the cultural, political and economic aspects of society that make the field of media economics uniquely distinct - as described by Picard (2018). Perhaps most significantly, I propose that decreasing group size in the field of media due to mass consolidation continues to tilt the balance of power in the Stiglerian market for regulation towards industry.


Authors
SF

Sydney Forde

Doctoral Candidate, Penn State University

Discussants

Friday September 16, 2022 10:06am - 10:40am EDT
Room NT08 WCL, 4300 Nebraska Ave, Washington, DC

10:06am EDT

Internet Inequity in Chicago: Adoption, Affordability, and Availability
Link to full paper

Abstract
Lack of access to high-quality Internet connectivity affects how people participate in all aspects of life, from education to work to recreation; disparities in Internet access thus carry over into many other aspects of life. Historically, the discussions on Internet inequity centers mainly around the rural vs. urban divide in the United States. The Covid-19 pandemic has also brought the prevalence of Internet inequity in urban areas to the broader collective attention. To further the study of this issue, this paper characterizes the state of Internet equity in Chicago, focusing on different dimensions of Internet equity, including availability, affordability, and adoption. To this end, we combine multiple existing datasets to understand the digital divide in Chicago and the contributing factors. Our findings show disparity in broadband adoption rates across neighborhoods in Chicago: Broadband adoption varies between 58--93\% across community areas, with low access areas mostly concentrated in South and West Chicago. Furthermore, adoption rates are positively correlated with income and education level and negatively correlated with age. The former highlights the need to provide affordable Internet access, while the latter suggests introducing technology training programs, especially for the elderly. We also find disparity in broadband availability---with the number of ISP options in a census block significantly varying across the city, indicating infrastructure equity issues.


Authors
TM

TARUN MANGLA

University of Chicago
UP

Udit Paul

University of California
AG

Arpit Gupta

University of California Santa Barbara
NM

Nicole Marwell

University of Chicago
NF

Nick Feamster

University of Chicago

Discussants
JP

James Prieger

Pepperdine University


Friday September 16, 2022 10:06am - 10:40am EDT
Room Y402 WCL, 4300 Nebraska Ave, Washington, DC

10:06am EDT

Behind Every Good Lie is a Grain of Truth: Deriving Identity-Based Demand for Disinformation in Moldova and Taiwan Using GIS Applications
Link to full paper

Abstract
Using existing literature on demographic segmentation and communications theory, this paper proposes a framework using geographic information system (GIS) applications to identify areas where a constituencies’ willingness to exchange loyalty for disinformation is expected to be salient within the spatially bounded constraints of post-imperial polities. The model derives demand potential from the presence of conglomerate identity groups and vote preference for Russian and Chinese-backed candidates during contentious presidential elections periods. Whereas voting patterns provide tangible examples of committed action, various factors of identity converge in meaningful ways to capture a constituency’s willingness to consistently exchange loyalty for information that ignores facts and realities if ‘inconvenient’ truths threaten their identity or way of life. It is at the intersection of these dimensions that in-depth disinformation analysis and interventions are warranted.



Authors
KK

Katherine Kurata

Research Assistant, Tufts University - The Fletcher School of Law and Diplomacy

Discussants
EN

Eli Noam

Columbia University


Friday September 16, 2022 10:06am - 10:40am EDT
Room NT01 WCL, 4300 Nebraska Ave, Washington, DC

10:06am EDT

Spectrum Rights in Outer Space: Interference Management for Mega-constellations
Link to full paper

Abstract
The rapid increase in low earth orbiting, non-Geostationary (NGSO) communication satellites raises concerns related to the coordination of radio frequency access across competing NGSO systems. Responding to an April 2020 petition by SpaceX, the FCC issued a Notice of Proposed Rulemaking NPRM (FCC 21-123) aimed at updating its NGSO spectrum sharing rules in the relevant frequencies (which involve ten distinct bands between 10 and 51 GHz).2 In this paper, we examine the rights regime proposed by the FCC and, guided by empirical evidence, propose alternatives that may better resolve the challenges confronted. Spectrum policy for satellite systems has been a topic for regulators for several decades, and the new satellite system, radio technologies, and spectrum sharing approaches make the topic ripe for reconsideration.

Currently, NGSO Fixed Satellite Service (FSS) spectrum is allocated in processing rounds to qualified applicants without explicit protection for incumbents having rights issued in prior rounds. FCC rules first encourage co-frequency operators in certain bands to resolve interference privately (self-governance); failing coordination agreement, the Commission imposes a “1/n rule”. Under the 1/n approach, if the level of interference (“system noise temperature”) rises above a specified level due to the entry of additional wireless users, then access rights to the band(s) in question will be segmented, each of the n systems given accessto 1/n of the allocated band. This creates a number of implications, including: (1) a potential disincentive to invest in these services given the insecurity of existing access rights; and (2) opportunities to force fragmentation, hobbling competitors’ bandwidth access. This rule also assumes that rival systems value spectrum usage equally, which is unlikely. As a result, alternative approaches may be more economically efficient than the 1/n rule.

Recent innovations in coordinating spectrum sharing, such as database-mediated access or sensing-based approaches, could be relevant here and merit examination in the NGSO context.
 Because the FCC’s NPRM proposes to protect systems from prior rounds from those in subsequent rounds, it creates a tiered rights structure similar in some ways to CBRS; services now deployed under this regime may illustrate regulatory options for NGSOs. Finally, we examine the utility of congestion metrics such as interference to noise ratio (I/N), and “system noise temperature” as a basis for the 1/n rule.


Authors
avatar for Pedro Bustamante

Pedro Bustamante

Assistant Teaching Professor, University of Pittsburgh - School of Information Sciences, Carnegie Mellon University
RB

Randall Berry

Northwestern University
DG

Dongning Guo

Northwestern University
MH

Michael Honig

Northwestern University
TH

Tom Hazlett

Clemson University
avatar for Whitney Lohmeyer

Whitney Lohmeyer

Faculty, Olin College of Engineering
IM

Ilia Murtazashvili

University of Pittsburgh
SP

Scott Palo

University of Colorado, Boulder
MW

Martin Weiss

University of Pittsburgh

Discussants
SO

Sarah Oh Lam

Technology Policy Institute


Friday September 16, 2022 10:06am - 10:40am EDT
Room NT07 WCL, 4300 Nebraska Ave, Washington, DC

10:40am EDT

Coffee Break sponsored by The Brattle Group
Friday September 16, 2022 10:40am - 11:05am EDT
Claudio Grossman Hall WCL, 4300 Nebraska Ave, Washington, DC

11:05am EDT

Broadband Labels: Performance and Network Management
Link to full paper

Abstract
In 2016, the FCC offered broadband providers a safe harbor for certain disclosures required under the Open Internet transparency rule, if the broadband provider disclosed on FCC-designated broadband labels accurate information about broadband commercial terms, performance, and network management. The Restoring Internet Freedom Order eliminated this safe harbor. However, the 2021 Infrastructure Investment and Jobs Act will require ISPs to display these broadband labels, and directs the FCC to update them. The FCC issued a Notice of Proposed Rulemaking, asking in part if it should add and/or remove information from the 2016 broadband labels.

Comments filed in response to the NPRM reveal several disagreements between stakeholders about what the performance and network management sections of the broadband labels should disclose. Very few of these arguments are grounded in any data or analysis. In this paper, I analyze these disagreements.

Several ISPs assert that packet loss is an esoteric metric. I demonstrate that packet loss has been one of the three fundamental network performance metrics ever since the Internet began. I also demonstrate that the quality of interactive applications such as video conferencing is dependent on speed, delay, and packet loss, and that this has been understood for many decades. Some ISPs assert that packet loss cannot be decreased without decreasing throughput or increasing latency. I show that there is no such inherent tradeoff, that this has been repeatedly proven mathematically, and that this has been widely understood for many decades.

Several ISPs argue that network performance should not be measured during peak usage periods, because they assert that peak usage period network performance has little relevance to customers’ typical experiences. I analyze very large sets of measurement data, and show that there is a large variation in mobile network performance between the peak usage period and off-peak usage periods.

One trade association argues that mobile broadband providers should be allowed to disclose an “expected” speed range that is not based on actual measured speeds. I examine such past disclosures of expected speeds, and I show that these expected speeds were far off from the actual measured speeds.

One stakeholder suggests that disclosures about blocking, throttling, or paid prioritization practices are irrelevant and/or confusing, and that the broadband label should not include them. I give examples of application-specific throttling, and I suggest simple disclosures of these application-specific practices that are relevant and useful.

One trade association argues that disclosure about subscriber-triggered network practices do not convey meaningful information to consumers, and that the broadband label should not include them. I give examples of subscriber-triggered throttling, and I suggest simple disclosures of these subscriber-triggered practices that are relevant and useful.

In addition, I propose several improvements to the 2016 labels.  First, I use large sets of measurement data to demonstrate that there is a large variation in mobile network performance metrics, and I propose specific percentiles that convey this variation.  Second, I discuss the routes over which network performance may be measured, and propose requirements about these routes.


Authors
avatar for Scott Jordan

Scott Jordan

University of California Irvine

Discussants
avatar for David Reed

David Reed

University of Colorado Boulder


Friday September 16, 2022 11:05am - 11:36am EDT
Room Y402 WCL, 4300 Nebraska Ave, Washington, DC

11:05am EDT

Research on Community Networks: What’s Old is New Again
Link to full paper

Abstract
The importance of access to telecommunications in Indigenous communities and developing regions has been recognized since the 1970’s, when voice telephony was being extended via microwave and geostationary satellites to these regions. Criteria for access ranged from a public telephone in every village (Alaska) to a telephone within an hour’s walk (the ITU’s Maitland Commission, for developing regions).

With technological evolution, the definition of “basic service” also evolved from voice service to voice plus limited data, to broadband. Technologies now include smart phones with high speed mobile networks, fiber optics, and a variety of satellites including LEOs, as well as fixed wireless networks. Also, whether by necessity or choice, some communities have built and operated networks themselves, leading to a variety of community-generated innovations.

During the past 50 years, a key research question has remained “What difference did it make?” How did access to these various technologies and services result in changes in economic activities, access to social services, political engagement and cultural and linguistic preservation? These questions remain important today as governments and development banks fund expansions or upgrades of broadband infrastructure in Indigenous and developing regions.
Yet with a renewed emphasis on infrastructure funding, there has been little attention to other factors that could enhance or reduce the benefits of broadband for previously unserved or underserved communities. Among these are: • Sustainability: Challenges in both remote and developing regions can include extensive distances and challenging terrain as well as small and/or low-income populations. Will the new broadband services remain viable for providers and affordable for users in terms of operational revenue or subsidies? Is the network designed with sufficient capacity for future needs?
• Engagement: Acceptance and adoption of new services may be influenced by participation in community selection and project planning. Were community members consulted on proposed broadband services, facilities, construction, etc.? Does the implementation and operation plan meet the community’s needs and aspirations? Are community members involved in monitoring and evaluation of services?
• Digital skills: Economic impact may depend on creation of local jobs. Are local people trained and hired to install and maintain the facilities?

Effective utilization of new services may require new skills. Is there a digital literacy strategy to ensure that residents understand how to use broadband services and to handle problems such as fake content and threats to privacy?

This paper addresses these three themes including analysis of successful strategies as well as barriers to sustainability and adoption that barriers that remain to be overcome. It also includes findings from recent research by the authors on Indigenous community networks in the U.S. and Canada, and research in progress on impacts of community networks in developing regions.

The methodologies discussed in the field research incorporate questions and techniques that can be traced to earlier evaluation research on the impact of access to rural telephony and telecenters (community Internet access), now updated to reflect current usage and to incorporate technologies such as tablets, mobile phones and analytical software.

The paper thus addresses both recent research on community broadband networks and reflections on lessons from earlier research on community networks to complement the retrospective theme of TPRC’s 50th anniversary.


Authors
HH

Heather Hudson

U of Alaska Anchorage/U of San Francisco

Discussants
avatar for Christos Makridis

Christos Makridis

Stanford University
Christos serves as a Senior Adviser for the National Artificial Intelligence Institute at the Department of Veterans Affairs, a Research Professor at the W. P. Carey School of Business in Arizona State University, a Digital Fellow at the Initiative at the Digital Economy in the MIT... Read More →


Friday September 16, 2022 11:05am - 11:36am EDT
Room Y403 WCL, 4300 Nebraska Ave, Washington, DC

11:05am EDT

Interoperability in Digital Markets
Link to full paper

Abstract
To ensure contestability and fairness in digital markets, policy makers worldwide discuss whether interoperability obligations are an appropriate regulatory tool to achieve these goals. Thereby, interoperability is often not narrowly defined, and can range from forms of data portability to complete standardisation of interfaces so that consumers can interact across the boundaries of a given service. In this report, we adopt a wide view on interoperability obligations in the context of digital markets that is not confined to the narrow contexts of previous or ongoing competition law cases or the specific interoperability provisions discussed in the Digital Markets Act (DMA). This allows us to derive a more general framework on the scope and effect of interoperability as a regulatory instrument for digital markets that can feed back into the ongoing policy considerations.
We first define different notions of interoperability precisely and highlight that from an economic perspective the differentiation into horizontal and vertical interoperability is crucial. Horizontal interoperability refers to the ability of products and services at the same level of the digital value chain to “work together”. An example is the ability to send a text message from one messenger service to another. The key feature of horizontal interoperability is that it allows sharing direct network effects. By contrast, vertical interoperability allows services that are at different levels of the digital value chain to work together. An example is a possibility to run different app stores on the same operating system or to allow alternative identification service providers when accessing a digital service or website. The key feature of vertical interoperability is that it allows to mix-and-match system components. Horizontal and vertical interoperability are thus structurally very different, and their economic assessment is very different. They should thus not be confused in the policy debate.

Our first central insight is that mandated horizontal interoperability is likely a harmful remedy in digital markets, as it tends to enshrine existing incumbency, limits the firms’ innovation and differentiation capabilities, and requires enduring regulation. The main reason for this assessment is that in the dynamic context of digital markets, services compete and differentiate themselves by innovating concerning new features, which runs counter to attempts to standardize services. Interoperability, by contrast, requires standardisation and a relatively steady environment. Thus, only a low level of interoperability can be achieved for digital services. This is dangerous because consumers will still gravitate to the larger network to take advantage of the full richness of features. At the same time, horizontal interoperability lowers the incentives of consumers to multi-home services, which is a powerful driver for contestability. We therefore strongly advise against mandating horizontal interoperability in digital markets, where innovation is occurring frequently and multi-homing of services is typically easy to achieve with low transaction costs. In reverse, this means that policy makers should scrutinize and enforce against attempts of digital incumbents to limit consumers' ability to multi-home.

Our second central insight is that vertical interoperability is indeed a powerful instrument for regulating digital bottlenecks, but should be considered only when a digital gatekeeper is vertically integrated, and if there is evidence that vertical integration leads to discrimination or foreclosure of complementors that would not have occurred in the absence of vertical integration. Mandated vertical interoperability should require gatekeepers to provide ‘equivalence of input’ to non-integrated complementors. That is, whichever interfaces the integrated platform offers to its downstream service should also be offered to third-party complementors on a non-discriminatory basis. Concerns of the hosting platform about security and integrity can in principle be addressed through a licensing regime with oversight by a trusted third party. Concerns for innovation incentives of the hosting platform can in principle be addressed through an appropriate access pricing regime. However, the implementation of vertical interoperability obligations requires the regulator to make difficult and complex trade-offs, and implementation will likely take considerable time and requires careful deliberation.

Vertical interoperability offers innovative complementors an entry point to an ecosystem stack that they are not able to replicate. For efficient and innovative complementors, this can be a stepping stone, which enables niche entry and growth by new firms. The ultimate measuring rod for the success of a vertical interoperability regulation is whether such new complementors could establish themselves as vital competitors in the digital market, innovate and have ventured into other parts of the digital value chain (ecosystem stack), eventually not requiring vertical access to the regulated bottleneck anymore. In this sense, a successful vertical interoperability regulation is transient.
The Commission's proposal for the DMA foresees only vertical interoperability obligations for gatekeepers, albeit only for ancillary services, app stores and side-loading of apps. However, the EP’s amendments also include horizontal interoperability obligations for messenger services and social networks. In light of our findings, we suggest not to include horizontal interoperability obligations in the DMA. Moreover, to make the DMA more future proof, we suggest that the application scope for vertical interoperability obligations should be widened also beyond ‘ancillary services’ and the specific case of vertical interoperability for apps and app stores. However, vertical interoperability cannot apply immediately to gatekeepers, and must be specified with respect to technical and economic access conditions on a case-by-case basis, because it involves complex trade-offs. From experience with access regulation, the implementation of vertical interoperability, i.e., the necessary case-by-case deliberations on trade-offs (e.g., with respect to access pricing), will likely take years and not months in the complex settings of digital markets. Hence, while the DMA may provide the legal basis for such interventions in digital markets, the implementation of vertical integration provisions is likely to take much longer than the six months that the DMA currently foresees for its Article 6 provisions.


Authors
MB

Marc Bourreau

Telecom ParisTech
JK

Jan Kraemer

University of Passau; Center on Regulation in Europe (CERRE)

Discussants
SE

Silvia Elaluf-Calderwood

Florida International University


Friday September 16, 2022 11:05am - 11:36am EDT
Room NT08 WCL, 4300 Nebraska Ave, Washington, DC

11:05am EDT

À la Carte Cable: A Regulatory Solution to the Disinformation Subsidy
Link to full paper

Abstract
Although “fake news” is as old as mass media itself, concerns over disinformation have reached a fever pitch in our current media environment. Online media outlets’ heavy reliance on user-generated content has altered the traditional gatekeeping functions and professional standards associated with traditional news organizations. The ideal of objectivity-focused informational content has largely been substituted for a realist acceptance of the power and popularity of opinion-driven “news.” This shift is starkly visible now: mainstream news media outlets knowingly spread hoaxes, conspiracy theories, and the like.

This current state of affairs is not some freak accident. The Supreme Court’s First Amendment jurisprudence has led us here. For example, the Court’s decision in Reno v. ACLU subjects government regulation of online speech to strict scrutiny review, hamstringing nearly any attempt at regulation (much less censorship) of online speech by the government. Similarly, content regulation of televised media is covered by the First Amendment’s capacious protections. And while broadcast media was once heavily regulated for content, the FCC’s adoption of deregulation resulted in the eventual repeal of a range of content limitations and requirements for licensees.

Designing a content-neutral scheme to directly regulate media content is not only a complex legal problem, it is likely a non-starter. State actors are (rightly) unable to censor or remove content based on the ideological leanings of the content, and media disinformation directly implicates political speech about controversial topics. In an era where cross-platform news media is ubiquitous, the legal status quo has effectively ensured media platforms have near-total discretion to control—or more accurately, not control—the truthfulness of disseminated content.

However, a market-based, bottom-up approach to content regulation could end-run the problems that plague government regulation of cable media. Industry research has suggested that cable “news” outlets generate more revenue from per-subscriber fees applied by cable companies than from advertising carried by those channels. In terms of cable news, per-channel costs are the highest costs in a monthly cable bill. This means that more than eighty million cable subscribers subsidize content that attracts fewer than two million viewers daily, including misinformation.

This paper posits “à la carte” cable packaging as a solution to the subsidy of disinformation. Cable subscribers are forced to buy programming channels even when they would rather not. This is particularly troubling in the case of news information because subscribers who wish to receive some programming are forced to subsidize other news content that may be objectionable. The resulting system of reverse compelled speech means that news organizations keep their subsidy while advocating against the interests of those footing the bill. Eliminating this involuntary subsidy flips the status quo on its head by making trustworthiness part of the bottom line, incentivizing prudent news self-regulation in an entirely content-neutral manner.


Authors
CT

Christopher Terry

Hubbard School of Journalism and Mass Communication
SS

Stephen Schmitz

University of Minnesota Law School
JS

John Stack

University of Minnesota - Twin Cities, School of Law
ES

Eve Sando

University of Minnesota Law School
EJ

Eliezer Joseph Silberberg

University of Minnesota Law School

Discussants
JL

Jonathan Levy

Retired from FCC


Friday September 16, 2022 11:05am - 11:36am EDT
Room NT01 WCL, 4300 Nebraska Ave, Washington, DC

11:05am EDT

Auctions and Mobile Market Competition: Evidence from European 4G Auctions
Link to full paper

Abstract
This paper examines the effects of spectrum auctions on mobile market competition. A simple theoretical model suggests that bigger incumbents will acquire more spectrum in auction to preempt after-market competitors. We use novel data from European 4G spectrum auctions to present suggestive evidence of this effect. Exploiting cross-country differences in the timing of auctions, we find that low band (sub-1GHz) auctions increase concentration, increase prices, and reduce investment in 4G coverage.


Authors
DE

Daniel Ershov

University of Toulouse 1- Toulouse School of Economics (TSE)
DS

David Salant

Toulouse School of Economics

Discussants

Friday September 16, 2022 11:05am - 11:36am EDT
Room NT07 WCL, 4300 Nebraska Ave, Washington, DC

11:36am EDT

Understanding the metrics of Internet broadband access: How much is enough?
Link to full paper

Abstract
Typical offerings of wireline broadband access are tiered according to the maximum speed the user will be able to achieve. Speed tiers have emerged as an approach to segment the market, but leave consumers with a puzzle. What speed tier will be sufficient for their needs?

A recent law now requires that providers of broadband access describe their product offerings in a uniform way, using a format that is modeled on a nutrition label. The labeling includes a specification of pricing, and also several performance parameters, in particular downstream and upstream speeds, latency and packet loss rates. The implication of giving this information to consumers is that the consumer will be able to make sense of it. However, in our view these numbers will just increase the degree of puzzlement, because there is no context to interpret them. Measures of technical performance can only be understood in the context of their impact of the quality of the user experience.

One element of a real nutrition label that is missing from the proposed broadband nutrition label is an analog to the Daily Value (DV), which allows the purchaser of a food product to roughly compare the nutritional value of the product to their overall daily requirements. Without some companion to the broadband nutrition label that gives consumers some baseline against which to compare the numbers, we think the reporting of performance numbers may do more harm than good. We believe that the FCC, which is responsible for the design of the broadband nutrition label, must augment the broadband label with some analog to the DV, which we call the Satisfactory Service Level, or SSL. The reported values, to be effective, should be simple enough for consumers to understand, meaningful, and independently verifiable.

In this paper, we draw on data about application performance, including models of application requirements and actual measurements of performance, to shed light on the question of “how much is enough”. Our goal is to give some insight, in a form useful to non-technical readers, of how to interpret metrics such as latency, and suggest how an SSL might be structured. We explain why the answer to the question of “how much is enough” is not always simple, and suggest how the FCC might balance the objectives of simplicity, providing meaningful information, and allow independent verification.


Authors
DC

David Clark

MIT CSAIL
avatar for Sara Wedeman

Sara Wedeman

Senior Research Consultant, MIT CSAIL
I began my career as a clinical psychologist around the time when the public Internet was born (simultaneously attended business school at Wharton). I then spent well over a decade working in banking, then Strategy Management Consulting, where I found the advanced statistical methods... Read More →

Discussants
avatar for David Reed

David Reed

University of Colorado Boulder


Friday September 16, 2022 11:36am - 12:07pm EDT
Room Y402 WCL, 4300 Nebraska Ave, Washington, DC

11:36am EDT

Broadband Voucher Programs: Evaluating the Alabama Broadband Connectivity Program
Link to full paper

Abstract
There is an emerging debate on effective subsidy mechanisms to help low-income households connect to broadband. The majority of broadband consumer subsidy programs in the U.S. are rebates administered through Internet Service Providers (ISPs). Direct-to-consumer voucher subsidies have been widely applied to non-broadband means-tested programs and are argued to improve consumer choice and increase competition, yet there is limited application for broadband. This paper contributes to this debate by evaluating the Alabama Broadband Connectivity for Students program (ABC) – which to our knowledge is the only digital inclusion program using direct-to-consumer vouchers that has been implemented in the U.S.. We find that ABC participation rate rises with lower median income, more Black and more Hispanic populations, suggesting that the program reached households that were most in need of assistance with broadband adoption. Additionally, we find that ABC participation is a positive predictor of participation in the Emergency Broadband Benefit program, suggesting outreach using trusted messengers and previous experience with broadband is beneficial.


Authors
avatar for Erezi Ogbo

Erezi Ogbo

Assistant Professor, North Carolina Central University

Discussants
avatar for Christos Makridis

Christos Makridis

Stanford University
Christos serves as a Senior Adviser for the National Artificial Intelligence Institute at the Department of Veterans Affairs, a Research Professor at the W. P. Carey School of Business in Arizona State University, a Digital Fellow at the Initiative at the Digital Economy in the MIT... Read More →


Friday September 16, 2022 11:36am - 12:07pm EDT
Room Y403 WCL, 4300 Nebraska Ave, Washington, DC

11:36am EDT

Vertical Control Change and Platform Organization under Network Externalities
Link to full paper

Abstract
In this paper, we examine how the introduction of network externalities impact an open and vertically integrated platform’s post-merger contractual relationship with third-party sellers distributing through its marketplace. Regardless of whether the platform uses linear contracts or two-part tariffs, we find that, provided these contracts are public, the platform has no incentive to exclude its non-integrated rivals and that the latter’s market share rises as network effects gain importance. Vertical integration serves as a commitment device that open platforms can use to convince potential users (e.g., consumers and developers) that their ecosystem will be large and compelling. Interestingly, when the open platform competes with a closed rival, i.e., with a fully integrated ecosystem, it may find it profitable to subsidize independent third-party sellers to strategically steer demand away from the competing ecosystem. These results have novel managerial implications on the incentives of a platform to open up its ecosystem to third-party sellers, as well as for the regulation of vertical integration in the presence of network effect and when different platforms operate alternative business models.


Authors
SS

Shiva Shekhar

Tilburg University - Tilburg University School of Economics and Management; Compass Lexecon; University of Passau
JP

Jorge Padilla

Compass lexecon
SP

Salvatore Piccolo

Compass Lexecon

Discussants
SE

Silvia Elaluf-Calderwood

Florida International University


Friday September 16, 2022 11:36am - 12:07pm EDT
Room NT08 WCL, 4300 Nebraska Ave, Washington, DC

11:36am EDT

Preserving Human Rights Across the Digital Domain
Link to full paper

Abstract
Digital human rights are under threat. The U.S. and China are vying for dominance across the digital domain. Each represents allies with shared fundamental values. Alternative governance models are being advanced, reflecting divergent understandings of “human rights”, one as universal and the other as situational. The language of the U.N.’s 1948 “Universal Declaration of Human Rights” (UDHR) is being inverted. Tethering rights to the U.N.’s “Sustainable Development Goals 2030” (SDGs) grounds them concretely in common interests.

The “telecommunications” sector now embraces a wide range of digital technologies, applications, content and capacities (the “Digital Domain”). Control of this space implicates core values. The U.S. approach is based on “Western” values of democracy, free trade, open markets, equality, and rule of law. It favors individual rights. The China bloc takes a communitarian, command economy, hierarchical approach, valuing security and social harmony over individual liberty. Both are seeking Digital Domain dominance to gain control of growing flows of “data” to fuel innovation and growth.

The nexus is the U.N., the ITU, and affiliated bodies. UNSG Guterres is offering a new approach. His 2020 “Roadmap for Digital Cooperation” and 2021 Report, “Our Common Agenda” aim to capture the benefits of stakeholder inputs while respecting the positions of Member-states. He has called for a “Summit of the Future” in 2023 to seek a “Global Digital Compact” proposing “a more inclusive and networked multilateralism” with “sovereignty reimagined”. At the same time, multiple stakeholder forums will be engaged.

The UDHR sets out 30 basic human rights. Its authors believed that human rights are “inherent, inalienable, and applicable to all human beings”. However, their “universal” language is being qualified by the China bloc to reverse the notion that “human rights” are “universal” but instead are conditional and situational. Each nation should be free to define “human rights” as it sees fit. The SDGs embody objective targets for advancing the non-instrumental goal of human well-being, a proxy for human rights. They create opportunities for identification of common interests (e.g., health, climate, water, hunger, etc.) which can lead to collaborations and promote international flows of data.

The paper will: i) Describe and compare alternative Digital Domain governance strategies, balancing the flow of data with security and social stability; ii) Describe and compare Digital Domain proposals’ normative foundations with special attention to human rights; iii) Describe the role of the U.N., ITU and other entities in shaping a new approach to the sovereignty-stakeholder dynamic; iv) Introduce the role of the UDHR; v) Propose links between the UDHR and SDGs to strengthen human rights through shared interests.

This paper is an analysis, in the field of policy studies, of a contested information policy principle, digital human rights. It is qualitative not quantitative. It relies primarily on documentary sources such as books and periodicals, and online sources such as documents, government reports, general and specialized periodicals, academic literature, websites, blogs and data bases. The paper is intended to advance the global discourse promoting digital human rights.


Authors
avatar for Richard Taylor

Richard Taylor

Palmer Chair/Prof. TC and Law Emeritus, Penn State University
Richard D. Taylor is emeritus professor of Telecommunications Studies and Law at Penn State and co-Editor-in-Chief of the Journal of Information Policy.  In spring 2015, after 26 years, he retired from Penn State, then served as Distinguished Professor in Residence at the University... Read More →

Discussants
JL

Jonathan Levy

Retired from FCC


Friday September 16, 2022 11:36am - 12:07pm EDT
Room NT01 WCL, 4300 Nebraska Ave, Washington, DC

11:36am EDT

Understanding Spectrum Prices in Recent Upper Mid-Band FCC Auctions
Link to full paper

Abstract
The 2021 C-Band Auction (FCC Auction 107) raised over $81 billion in proceeds, almost double the amount of the next highest-grossing FCC auction and more than double experts’ estimates of auction revenues. This auction has altered the worldview on the value of spectrum. We are in a new equilibrium, brought about by 5G and the Internet of Things (IoT) as they transform the wireless landscape. This auction’s value “surprise” can be attributed to two channels – band/auction specific factors and a change in overall spectrum value. The first channel is composed of factors specific to the C-Band spectrum, such as its “sweet-spot” frequency location in the upper mid-band with an optimum mix of coverage and capacity, as well as aspects specific to the timing and events of the auction, such as Verizon’s need to eliminate its deficit in 5G spectrum compared to its competitors. The second channel, the “sea-level change” in spectrum value, is the focus of this paper. This sea-level change was confirmed by the results of the second mid-band auction – the 3.45 GHz, which raised about 27% of the C-Band auction’s proceeds for about 35% of the spectrum, despite coordination requirements that will make several licenses more difficult for bidders to use.

In this paper, we use a combination of empirical modeling and a review of advancements in wireless technology to gain insight into the “surprise,” decomposing the components of the C-Band value into the prior expectation, the value increase due to band-specific characteristics, and the value increase due to an overall increase in spectrum value.  On average, we find that the sea-level effect accounts for a 42% uplift in C-Band spectrum value, which is 43% of the surprise, while the frequency effect or Goldilocks effect accounts for a 50% uplift in C-Band spectrum, or 57% of the C-Band surprise.


Authors
PS

Paroma Sanyal

The Brattle Group
YP

Yongjoon Paek

The Brattle Group
RT

Ryan Taylor

The Brattle Group
AL

Austin Lajoie

The Brattle Group
avatar for Coleman Bazelon

Coleman Bazelon

Principal, The Brattle Group

Discussants

Friday September 16, 2022 11:36am - 12:07pm EDT
Room NT07 WCL, 4300 Nebraska Ave, Washington, DC

12:07pm EDT

Rural Consumer Internet Perspectives: A Hard Look at Quality and Policy
Link to full paper

Abstract
Digital connectedness has grown markedly over the last ten years. However, digital deserts, particularly in rural areas, remain. Likewise, data documenting this phenomenon exists, though internet throughput at the household level and its connections to consumer satisfaction are understudied. This lacuna in scholarship is primarily due to the lack of robust data collected from individual households. This study aims to further our understanding of these dynamics by leveraging a unique high-resolution dataset of internet throughput speeds connected to demographic and satisfaction survey data. This dataset offers an unprecedented picture of the connections between internet performance, demographics, location, and household satisfaction.

The dataset was created using two collection mechanisms. First, a modified Raspberry Pi, dubbed a Quantitative Throughput (QT) unit, is affixed to the household's primary internet connection. Through this process, ping data, download, and upload speeds were collected every five minutes for one week from approximately 250 rural households. Second, the device prompts the user to complete a survey, collecting demographic information and satisfaction indices of various aspects of their internet service. This combination of internet throughput data linked to household demographics and internet satisfaction allows for analyzing the connection between internet performance and consumer satisfaction at the hitherto understudied household level.
We establish several unexpected trends in the data. Surprisingly, we find no correlation between throughput speed, performance, and household cost. However, we find the importance of the internet service provider (ISP) and type of internet connection media affecting overall satisfaction. Likewise, the spatial patterns that emerge from the data are closely linked to individual ISP accessibility. Certain ISPs and types of service perform significantly better, as evidenced by higher throughput metrics and overall reported satisfaction on the survey data. These results are confirmed using spatial clustering algorithms, which predominately group households by mode of delivery and ISP despite neither variable being used in the sorting process.

Our findings suggest that certain broadband delivery methods provide markedly lower degrees of satisfaction and performance. This, combined with the dearth of competition in many rural areas, create pockets of low performance and satisfaction. Crucially, these areas of lower performance and satisfaction are not linked to any intrinsic aspects of rurality, such as population density or demographics; we often see markedly different numbers within relatively small geographic areas. Instead, they result from contingencies of ISP service and delivery mode.

Considering this finding and our findings that consumer cost and throughput are unlinked, we suggest a closer look at FCC policies that are agnostic towards the mode of delivery. An attempt to integrate performance metrics and consumer satisfaction into the FCC structure of subsidies is perhaps warranted to protect consumer interests. Otherwise, a policy of ostensive neutrality towards the mode of delivery is, in effect, accepting lower levels of household satisfaction.


Authors
AH

Angela Hollman

Cyber Systems, Associate Professor, University of Nebraska Kearney
TO

Tim Obermier

University of Nebraska at Kearney
JA

Jesse Andrews

University of Nebraska at Kearney

Discussants
avatar for David Reed

David Reed

University of Colorado Boulder


Friday September 16, 2022 12:07pm - 12:45pm EDT
Room Y402 WCL, 4300 Nebraska Ave, Washington, DC

12:07pm EDT

Smart Contracts: Myths and Implications for Economics and Financial Regulation
Link to full paper

Abstract
This paper seeks to situate an understanding of the long-term implications of Smart Contract (SC) technologies as a cluster of technologies that together with AI (shorthand for software applications) and 5G (shorthand for networked ICTs) will prove important for enabling a future wherein any task may be automated. Although the 'any task can be automated' future is far off and AI, 5G, and SC technologies are still evolving rapidly, this paper argues for timely consideration of the policy implications for SCs. Like those other technologies and to a perhaps even greater extent, SC technologies (which include cryptocurrencies, blockchain, and smart contracts as distinct elements) have been the focus of excessive hype that has given rise in the academic and mass media press to misconceptions about what is important about SCs that this paper seeks to identify and dispel. In an effort to start to understand the challenges and likely trajectory for SC regulation, this paper focuses on FINTECH and the policy challenges that are emerging there related to SCs. The overall conclusion is that lots more needs to be done, and while it is clear that SCs will play an important role in FINTECH’s future and the regulation of that future will require significant focused research attention, it is unclear how useful such research will be as a template for addressing the challenges that will emerge as SCs migrate to other sectors where the economic implications are expected to be much larger. The paper concludes with the authors speculations about were key trends in SC technologies seem to be going.


Authors
avatar for William Lehr

William Lehr

Massachusetts Institute of Technology

Discussants
avatar for Christos Makridis

Christos Makridis

Stanford University
Christos serves as a Senior Adviser for the National Artificial Intelligence Institute at the Department of Veterans Affairs, a Research Professor at the W. P. Carey School of Business in Arizona State University, a Digital Fellow at the Initiative at the Digital Economy in the MIT... Read More →


Friday September 16, 2022 12:07pm - 12:45pm EDT
Room Y403 WCL, 4300 Nebraska Ave, Washington, DC

12:08pm EDT

A Critique of the “Surveillance Capitalism” Thesis: Toward a digital political economy
Link to full paper

Abstract
'Surveillance capitalism' (SC) has emerged as a master frame for analyzing digital policy issues. By providing a convenient hook upon which to hang widespread dissatisfaction with 'Big Tech' and other problematic features of the digital economy, SC has become a popular take on the political economy of the digital age. Legislators, policy makers and journalists often echo its language and analytical constructs. But how solid is its intellectual grounding? Despite its popularity, the theories and assumptions underlying SC have received very little critical scrutiny. There has been vigorous debate over certain policy and legislative measures loosely based on the thesis, but none that challenges the total framework. This paper attempts to fill that gap. It situates Zuboff's (2019) book in political economy theory; summarizes six key propositions of the SC thesis; then challenges those propositions.


Authors
avatar for Milton Mueller

Milton Mueller

Professor, Georgia Institute of Technology
Milton Mueller is the O.G. of I.G. He directs the Internet Governance Project, a center for research and engagement on global Internet governance. Mueller's books Will the Internet Fragment? (Polity, 2017), Networks and States: The global politics of Internet governance (MIT Press... Read More →

Discussants
SE

Silvia Elaluf-Calderwood

Florida International University


Friday September 16, 2022 12:08pm - 12:45pm EDT
Room NT08 WCL, 4300 Nebraska Ave, Washington, DC

12:08pm EDT

Reckless Associations
Link to full paper

Abstract
This Article provides a theoretical foundation and practical guide for a new form of liability that has proven necessary in the Internet era: the tort of Reckless Association. This tort would hold de facto leaders of informal networks responsible when radicalized members of the network cause physical harm to others. Recent prosecutions of the leaders of the Oath Keepers and other white supremacists who organized the Charlottesville protest, and rumblings of a similar prosecution against Donald Trump, demonstrate that there is a public appetite for this form of legal responsibility. To date, these prosecutions proceed on theories of incitement or conspiracy, but those doctrines are poor fits for cultural leaders, like Trump, whose media habits have created a drumbeat for increasingly paranoid thinking and action while also studiously avoiding making discrete statements that fit the heightened requirements of incitement.

Rather than forcing these cases into the old vessels, courts should recognize a new form of secondary liability for de facto leaders whose conduct within a social network has influenced, in a causal sense, the decision of network members to commit violence against individuals outside the network. This form of liability was not needed until recently because the risk that associations will devolve into dysfunction and paranoia are much greater in the Internet era than in previous information ecosystems. Moreover, this form of liability was not practical until recently because the evidence necessary to prove causation and mental state—a network analysis that relies very little on the content of speech—was not previously available. Finally, this form of liability, while certainly covered by the First Amendment, should pass constitutional scrutiny because it is narrowly tailored to harm and blameworthiness.


Authors
JB

Jane Bambauer

University of Arizona - James E. Rogers College of Law
SM

Saura Masconale

The University of Arizona Department of Political Economy and Moral Science; Center for the Philosophy of Freedom
SS

Simone Sepe

University of Arizona - James E. Rogers College of Law; University of Toulouse 1 - Université Toulouse 1 Capitole; Toulouse School of Economics; European Corporate Governance Institute (ECGI); American College of Governance Counsel

Discussants
JL

Jonathan Levy

Retired from FCC


Friday September 16, 2022 12:08pm - 12:45pm EDT
Room NT01 WCL, 4300 Nebraska Ave, Washington, DC

12:08pm EDT

Auction 107 (C-Band): Policy Overview and Closing Bid Price Analysis of Expedited Access due to $9.7B in Accelerated Relocation Payments to Incumbent Satellite Operators
Link to full paper

Abstract
With the advent of 5G technology, C-Band spectrum (3.7 - 4.2 GHz) has become a valuable resource for mobile phone service providers as it supports a favorable balance between high data rates and propagation distance1. To increase the amount of spectrum available for 5G technology development in the United States, Federal Communication Commission (FCC) Chairman Ajit Pai released the Facilitate America’s Superiority in 5G Technology Plan (5G FAST Plan) under President Trump’s directive. In accordance with the 5G FAST Plan, the FCC issued the 3.7 GHz Report and Order (the Plan), which detailed a proposal for clearing and allotting portions of C-Band for 5G use through Auction 107. This paper covers the mechanics of Auction 107 (C-Band), evaluates the effects of the FCC’s authorization of $9.7B in Accelerated Relocation Payments and $3B - $5B in relocation reimbursements from winning bidders for expedited access to spectrum, and presents a policy overview regarding the payments and payment process. Ultimately, the authors find that bidders were willing to pay, on average, 15% more for licenses available two years earlier. To elaborate, under the Plan, incumbent non-mobile users, mainly fixed satellite service (FSS) operators, must relocate all existing services by late 2023 to the upper 200 MHz of C-Band (4000 - 4200 MHz) in exchange for compensation2. Auction 107 (C-Band) forwent a reverse auction, the standard method of price discovery for voluntarily clearing occupied spectrum, and instead utilized Accelerated Relocation Payments in addition to relocation reimbursements to expedite access to contiguous portions of C-band spectrum. Mobile operators bid $81.2B total despite having to additionally pay Accelerated Relocation Payments and relocation costs, making Auction 107 (C-Band) the highest grossing spectrum auction to date3. In Auction 107, five licenses (Category A) were made available two years earlier than nine licenses (Category BC) in each of 46 of the top fifty most populous Partial Economic Areas (PEAs), which are FCC-defined service areas. Category A (3.7 - 3.8 GHz) licenses’ closing bid prices were, on average, 15.0% greater than their delayed counterparts in Category BC (3.8 - 3.98 GHz), with 90.0% of Category A licenses having higher closing bid prices. In evaluating the process and outcome of Auction 107, the authors aim to offer valuable statistics to inform and improve future FCC auction mechanics and policy.



Authors
JA

J. Armand Musey

Summit Ridge Group, LLC
avatar for Whitney Lohmeyer

Whitney Lohmeyer

Faculty, Olin College of Engineering
PB

Pranavi Boyalakuntla

Olin College of Engineering
GA

Gati Aher

Olin College of Engineering
GM

Grant Miner

Olin College of Engineering
YM

Yuxiang Mao

Olin College of Engineering
PP

Phillip Post

Olin College of Engineering
avatar for Lilo Heinrich

Lilo Heinrich

Student, Olin College of Engineering
Senior at Olin College majoring in Engineering with a focus in Computing, seeking Aerospace/Robotics Software Engineering Internship for Fall 2023. Resume on my LinkedIn.

Discussants

Friday September 16, 2022 12:08pm - 12:45pm EDT
Room NT07 WCL, 4300 Nebraska Ave, Washington, DC

12:45pm EDT

Lunch and "A Walk Down Memory Lane"
Snippets on the history of TPRC. Stories of policy changes for 50 years.


Friday September 16, 2022 12:45pm - 2:15pm EDT
Claudio Grossman Hall WCL, 4300 Nebraska Ave, Washington, DC

2:15pm EDT

Financing mechanisms for community-owned internet infrastructure
The panel will discuss the ecosystem of financial sustainability strategies that community networks have employed in recent years to bridge the digital divide in their communities.

The panel will cover the spectrum of financing mechanisms – from fully commercial sources of capital to blended finance and targeted government subsidies to community grants – with case studies that highlight approaches from both rural communities in the global North and developing countries in the global South.
Moderator: Ben Matranga, Connectivity Capital
Panelists:
Jane Coffin, Connect Humanity
Steve Song, Association for Progressive Communications (APC)
Jim Forster, Connectivity Capital
Carlos Rey-Moreno, Association for Progressive Communications (APC)

Moderators
avatar for Ben Matranga

Ben Matranga

Managing Partner, Connectivity Capital
Connectivity Capital is an impact investment firm focused on expanding Internet access in developing countries. Connectivity Capital manages the world’s first impact investment fund that identifies, invests in, and partners with market leading Internet Service Providers (ISPs) that... Read More →

Authors
AL

Adriana Labardini

Association for Progressive Communications
AM

Anoop Magendra

Connectivity Capital

Panelists
JC

Jane Coffin

Connect Humanity
JP

Juan Peirano

Internet Society


Friday September 16, 2022 2:15pm - 3:45pm EDT
Room NT08 WCL, 4300 Nebraska Ave, Washington, DC

2:15pm EDT

Public Policy for the Metaverse: Competition, Innovation, and Protections
The metaverse has been emerging for 20 years but accelerated in late 2021 when Facebook changed its name to Meta. In the metaverse, seemingly anything is possible. You can work, engage in immersive games, repair equipment, hold meetings, or visit museums with friends scattered across the globe. The metaverse is emerging from the convergence of online industries, including gaming, social media, fintech, cryptocurrency, and business computing. There are wide ranging opinions as to the advantages and challenges that each type of legacy industry faces in the metaverse. But this space is rapidly evolving, and it has outpaced controls and social norms that regulate behavior. As such, in some areas of the metaverse there is a growing dark side: the presence of unacceptable behaviors, including harassment, financial fraud, unchecked gambling, and data exploitation. This panel will help TPRC participants understand how the metaverse is evolving, the competitive and regulatory forces shaping it, and the dark side. Questions for the panel include: How is the metaverse evolving? What are the market forces? What types of companies will succeed, and which might fade into history? Who should determine the rules for metaverse platforms? What should service providers be allowed to know about their users and how can they use that information? What are the risks for children and other vulnerable groups, and what protections should be in place for them?

Moderators
MJ

Mark Jamison

University of Florida

Authors
avatar for Marjory Blumenthal

Marjory Blumenthal

MSBlumenthal, LLC
TPRC veteran w/Internet and cybersecurity interests, expanded to automated vehicles, safety, and other issues relating to uses of AI, mobile, IOT...

Panelists
avatar for Juan Londoño

Juan Londoño

AR/VR Policy Analyst, ITIF
avatar for Christos Makridis

Christos Makridis

Stanford University
Christos serves as a Senior Adviser for the National Artificial Intelligence Institute at the Department of Veterans Affairs, a Research Professor at the W. P. Carey School of Business in Arizona State University, a Digital Fellow at the Initiative at the Digital Economy in the MIT... Read More →


Friday September 16, 2022 2:15pm - 3:45pm EDT
Room NT01 WCL, 4300 Nebraska Ave, Washington, DC

2:15pm EDT

The future of reverse auctions
In 2010, the National Broadband Plan called for the FCC to use competitive bidding to award universal service fund (USF) support to bring broadband to high cost areas. Over the next decade, the FCC conducted four reverse auctions that awarded close to $11 billion: the Mobility Fund Phase I auction (Auction 901), the Tribal Mobility Fund Phase I auction (Auction 902), the Connect America Fund Phase I auction (Auction 903), and the Rural Digital Opportunity Fund auction (Auction 904). The FCC’s reverse auction program evolved as each auction built upon lessons learned from prior auctions while incorporating emerging policy considerations. Not surprisingly, each auction has supporters and detractors, most recently Auction 904, which was conducted in 2020. And each auction has been the focus of research examining the efficiencies that were realized and how the Commission’s design choices affected auction outcomes. Looking forward, $42.5 billion in broadband funding will be distributed through NTIA’s Broadband, Equity, Access, and Development (BEAD) program, which requires states and territories to use a competitive selection process. Some have called for this unprecedented amount of funding to be allocated using reverse auctions to maximize the impact of these funds. This panel brings together researchers that have examined FCC reverse auctions, former FCC staff that implemented and designed these auctions, and commentators on broadband deployment programs to discuss and debate the future of using reverse auctions to award broadband funding.

Moderators
Authors
SO

Sarah Oh Lam

Technology Policy Institute
CR

Cullen Robbins

Nebraska Public Service Commission
PS

Paroma Sanyal

The Brattle Group

Panelists
avatar for Alex Minard

Alex Minard

VP & State Legislative Counsel, NCTA


Friday September 16, 2022 2:15pm - 3:45pm EDT
Room NT07 WCL, 4300 Nebraska Ave, Washington, DC

3:45pm EDT

Coffee Break sponsored by Stand Together Trust
Friday September 16, 2022 3:45pm - 4:05pm EDT
Claudio Grossman Hall WCL, 4300 Nebraska Ave, Washington, DC

4:05pm EDT

The Dynamic Effects of Competition on Investment: the Case of the European Mobile Communications Industry
Link to full paper

Abstract
We evaluate the impact of competition on investments in Europe’s mobile communications market during the 2011-2021 period. There are stark and sustained differences in market outcomes between three- and four-player markets in Europe, and economic theory suggests these could be partly explained by the dynamic effects of competition on the ability and incentives to invest by market players. We find strong evidence that market concentration in Europe is below optimal levels that would maximise investments, especially in four-player markets. The dispersion of fixed costs and assets among a greater number of players can result in diseconomies of scale and a less efficient use of resources. We also find evidence that investment incentives to improve quality and innovate are lower in markets with lower concentration indices and profit margins.


Authors
avatar for Kalvin Bahia

Kalvin Bahia

Principal Economist, GSMA
Working as an Economist in GSMA Intelligence, I am responsible for producing economic and statistical analysis on regulation, competition, spectrum and development topics. Before joining the GSMA, I worked as a competition and regulatory economist at the UK telecoms regulator (Ofcom... Read More →

Discussants

Friday September 16, 2022 4:05pm - 4:36pm EDT
Room Y403 WCL, 4300 Nebraska Ave, Washington, DC

4:05pm EDT

Onlining in the Time of Covid: Broadband Infrastructure and U.S. School District Policy During the Pandemic
Link to full paper

Abstract
This study documents the relationship between broadband infrastructure quality and U.S. public school district decisions to move classes to a fully remote learning platform during the 2020-2021 school year, amidst the Covid pandemic. The apparent learning loss that occurred among primary and secondary students with the disruption to in-person learning during the pandemic has been widely reported; less well publicized was a significant narrowing in the “digital divide” for reliable at-home internet access for student educational use that occurred. I establish some basic facts about internet availability and use in K-12 education during the first pandemic school year. Chief among these is that reliable access to internet for educational purposes in households expanded substantially throughout the United States during the 2020-21 school year, driven by a massive device and internet subscription distribution to student families by school systems (in turn funded by large Federal subsidies distributed through pandemic relief programs). Estimation of a reduced form linear probability model suggests that pre-pandemic broadband quality played a statistically and substantively significant role in determining when school districts responded to the pandemic with a fully remote online learning model during 2020-21.


Authors
KF

Kenneth Flamm

LBJ School of Public Affairs, University of Texas at Austin

Discussants
avatar for Rafi Goldberg

Rafi Goldberg

Senior Policy Advisor, Digital Equity, NTIA


Friday September 16, 2022 4:05pm - 4:36pm EDT
Room NT08 WCL, 4300 Nebraska Ave, Washington, DC

4:05pm EDT

CANCELLED: Opening Schrödinger’s Box: An Independent Assessment of Applications and Regulatory Implications of Quantum Technology
Authors
JV

Joran van Apeldoorn

University of Amsterdam
JV

Joris van Hoboken

University of Amsterdam
GG

Geoff Gordon

The Asser Institute

Discussants
MR

Madelyn Rose Sanfilippo

University of Illinois - Champaign Urbana


Friday September 16, 2022 4:05pm - 4:36pm EDT
Room Y402 WCL, 4300 Nebraska Ave, Washington, DC

4:05pm EDT

Becoming an Internet Policy Conference: A Retrospective on TPRC
Link to full paper

Abstract
The period from the mid-1990s to the mid-2000s saw major transformation of information and communication infrastructure, thanks to the commercialization of the Internet backbone. In the same period TPRC took major steps to evolve from a narrower focus on conventional telecommunications and information policy to “the research conference on communications, information, and Internet policy.” The transition might have been inevitable, but it was neither automatic nor easy. Through the lens of my own interdisciplinary work on Internet policy during this period and my concurrent and intersecting TPRC activity, this paper describes an arc of change that began at the 1994 TPRC. By the 2005 TPRC, the success of a sometimes awkward evolution process (for the treatment of Internet policy issues at TPRC) was epitomized by a panel discussing the merits of “net neutrality.” That term arose from the kinds of analyses typical of TPRC, engaging social sciences and law. It reflects interpretations of, aspirations for, and sometimes misunderstandings of the Internet’s technical architecture. Although the net neutrality controversy was motivated by perhaps predictable consequences of Internet commercialization and growth, it also served as a threshold issue for addressing implications of scale in a context shaped by network effects. Those implications continue to feed issues addressed by TPRC, although the rhetoric (e.g., “big tech”) has changed along with the circumstances. This retrospective addresses TPRC’s pivot to the Internet. It combines description, interpretation and commentary, and reflections on what this history might bode for newer TPRC chapters as such concepts as metaverses and Web3 progress from today’s hype to tomorrow’s new versions of the Internet.


Authors
avatar for Marjory Blumenthal

Marjory Blumenthal

MSBlumenthal, LLC
TPRC veteran w/Internet and cybersecurity interests, expanded to automated vehicles, safety, and other issues relating to uses of AI, mobile, IOT...

Discussants
CG

Carolyn Gideon

Asst Prof Int'l Communication and Tech Policy, Fletcher School, Tufts University


Friday September 16, 2022 4:05pm - 4:36pm EDT
Room NT07 WCL, 4300 Nebraska Ave, Washington, DC

4:36pm EDT

The Standardisation of Lawful Interception Technologies in the 3GPP: Interrogating 5G and Surveillance Amid US-China Competition
Link to full paper

Abstract
In this article we show that the 5G competition between the United States and Western Europe versus China is not reflected in the standardisation of lawful intercept in the world’s leading telecommunications standardisation body, the 3rd Generation Partnership Project (3GPP).

Guided by three concepts of infrastructure as a site and tool of political contestation, economic protectionism, and the territorialization of cyberspace, we develop a novel approach to the study of Internet governance and standard-setting processes that leverages web scraping and computer-assisted document set discovery software tools. We bring these methods into conversation with theoretical approaches from material media studies, science and technology studies, and international relations. While European and United States governments do standardise surveillance technologies, the Chinese government does not do this in the 3GPP.

This fuels distrust in 5G technologies. We propose further integration of China in standardisation could function as a trust-building measure.


Authors
CB

Christoph Becker

University of Amsterdam
avatar for Niels ten Oever

Niels ten Oever

Researcher, University of Amsterdam
Niels ten Oever has designed and implemented freedom of expression projects in the Horn of Africa, the Middle East and Northern Africa, Brazil and Afghanistan and worked on global internet governance issues in ICANN and the IETF. Niels started off working on radio when he got bitten... Read More →
RN

Riccardo Nanni

University of Bologna

Discussants
MR

Madelyn Rose Sanfilippo

University of Illinois - Champaign Urbana


Friday September 16, 2022 4:36pm - 5:07pm EDT
Room Y402 WCL, 4300 Nebraska Ave, Washington, DC

4:36pm EDT

History of TPRC Conference Research and Structure: 1972-2022
Link to full paper

Abstract
The TPRC community has been gathering annually since 1972, and over the past fifty years has evolved significantly; however, the primary focus of TPRC as an organization has remained the same: to promote interdisciplinary scholarship on current and emerging communications issues around the world. This research uses conference programs from 1972 through 2021 to attempt to quantify the research interests over the decades and to illustrate the degree to which the TPRC community has been on the forefront of the communications industry’s development in the broadest sense.


Authors
avatar for Janice Hauge

Janice Hauge

University of North Texas

Discussants
CG

Carolyn Gideon

Asst Prof Int'l Communication and Tech Policy, Fletcher School, Tufts University


Friday September 16, 2022 4:36pm - 5:07pm EDT
Room NT07 WCL, 4300 Nebraska Ave, Washington, DC

4:36pm EDT

Benchmarks or Equity? A New Approach to Measuring Internet Performance
Link to full paper

Abstract
A longstanding approach to measuring Internet performance is to directly compare throughput against pre-defined benchmarks (e.g., 25 megabits per second downstream, 3 megabits per second upstream). In this paper, we advocate, develop, and demonstrate a different approach: rather than focusing on whether speeds meet a particular threshold, we develop techniques to determine whether a variety of Internet performance metrics (including throughput, latency, and loss rate) are comparable across geographies.

We define these metrics and apply them across a longitudinal dataset of Internet performance measurements comprising approximately 30 neighborhoods across the City of Chicago. The metrics we define show some geographical disparities, indicating that such comparative metrics may be promising for studying questions of equitable Internet access across neighborhoods.


Authors
RS

Ranya Sharma

University of Chicago
TM

TARUN MANGLA

University of Chicago
JS

James Saxon

University of Chicago/Center for Data and Computing
MR

Marc Richardson

University of Chicago
NF

Nick Feamster

University of Chicago
NM

Nicole Marwell

University of Chicago

Discussants

Friday September 16, 2022 4:36pm - 5:08pm EDT
Room Y403 WCL, 4300 Nebraska Ave, Washington, DC

4:37pm EDT

Behind the Pandemic: Using Covid to Understand the Digital Divide within Spain
Link to full paper

Abstract
In a seemingly digitised world, it is sometimes forgotten that we do not all enjoy the same level of access to ICTs, as access to devices and the skills needed to maximise their use vary. The impact of Covid-19 has demonstrated that this digital divide still exists in Spain. Differences occur for a variety of reasons, as access to and use of ICTs is shaped by geography, gender, employment, age, etc. With this in mind, this paper explores the digital divide in Spain and attempts to characterise the digital divide that occurs across the country using data from two national surveys conducted in 2021. We illustrate the multi-faceted nature of the digital divide in Spain, and suggest areas where policies need to be developed that reduce the barriers that Spanish people experience when using ICTs.


Authors
JW

Jason Whalley

Northumbria University
CG

Covadonga Gijón

UNED - Universidad Nacional de Educación a Distancia

Discussants
avatar for Rafi Goldberg

Rafi Goldberg

Senior Policy Advisor, Digital Equity, NTIA


Friday September 16, 2022 4:37pm - 5:08pm EDT
Room NT08 WCL, 4300 Nebraska Ave, Washington, DC

5:07pm EDT

What's In a Label?
Link to full paper

Abstract
In today’s world, product labels are ubiquitous. Consumers rarely make purchases without consulting labels. A common thread with these labels is they are governed by regulatory bodies who mandate, verify, and enforce reporting standards so consumers may easily understand the products. Product labels therefore are important tools for consumer protection. However, one extremely significant product that is consumed on a daily basis, broadband internet service, comes without standardized labels. Economists have examined the presence (and absence) of standardized labels through the lens of information economics, that studies the extent to which markets and their players process and convey information The literature highlights that information is imperfect, obtaining information is costly, and that there are important asymmetries of information. This paper explores these issues in the context of broadband labels. We conclude that despite the vast quantities of information available about broadband prices and service characteristics (and possibly because of it), consumer broadband labels remain an important tool for consumer protection. This is especially true given how important broadband has become during the Pandemic era. However, the costs and benefits of the types and amounts of information disclosed and the clarity underlying the reported price and performance metrics will need to be carefully considered before the labels are adopted.


Authors
PS

Paroma Sanyal

The Brattle Group
avatar for Coleman Bazelon

Coleman Bazelon

Principal, The Brattle Group
DG

Divya Goel

The Brattle Group

Discussants

Friday September 16, 2022 5:07pm - 5:40pm EDT
Room Y403 WCL, 4300 Nebraska Ave, Washington, DC

5:07pm EDT

Digital Inequality and COVID-19 Knowledge
Link to full paper

Abstract
As digital inequality research has shown, people incorporate digital media into their lives in different ways and these often reflect their socioeconomic positions. During the initial COVID-19 lockdowns, at a time when information could mean the difference between life and death, information inequalities were of paramount significance. This paper compares survey data from three countries (United States, Italy, Switzerland) collected in April 2020 to examine how markers of digital inequality (autonomy of use, Internet skills) linked to understanding the virus. Findigns show that those of more privileged digital dispositions were more knowledgeable about COVID-19. These results hold even when controlling for sociodemographic background such as age, gender, education, income, race/ethnicity (in the US), metropolitan status, and disability. The findings are also robust to political ideology.


Authors
EH

Eszter Hargittai

University of Zurich

Discussants
avatar for Rafi Goldberg

Rafi Goldberg

Senior Policy Advisor, Digital Equity, NTIA


Friday September 16, 2022 5:07pm - 5:40pm EDT
Room NT08 WCL, 4300 Nebraska Ave, Washington, DC

5:07pm EDT

Learning from the neighbors: The diffusion of state broadband policies in United States (1991-2021)
Link to full paper

Abstract
This project will examine how state broadband policies diffused among the states in the United States over the last 30-year period utilizing a network approach and a recently released dataset, the State Broadband Explorer curated by the Pew Charitable Trusts’s Broadband Initiates (2019). The 835 state broadband policies in the United States (until January 2021) have been categorized into six main themes: broadband programs, competition and regulation, definitions, funding and financing, infrastructure access and legislative intent.


Authors
avatar for Grant Blank

Grant Blank

Survey Research Fellow, Oxford Internet Institute
I am a sociologist currently working on projects on privacy, echo chambers, and digital inequality. I am happy to talk about anything related to social and cultural aspects of the internet and social media.
KJ

Krishna Jayakar

Penn State University

Discussants
CG

Carolyn Gideon

Asst Prof Int'l Communication and Tech Policy, Fletcher School, Tufts University


Friday September 16, 2022 5:07pm - 5:40pm EDT
Room NT07 WCL, 4300 Nebraska Ave, Washington, DC

5:08pm EDT

Building An Authentication Infrastructure — Designing a Two Factor Authentication Hardware Token with Form Factor that Encourages Engagement
Link to full paper

Abstract
The death of the password has been projected for decades, by a range of highly qualified experts. Yet passwords remain the dominant authentication technology. The dominance of passwords results in chronic vulnerability to social engineering. In this work we explore the reason for the lack of adoption of hardware security tokens that are considered best in class for authentication speed and security.
In this three step evaluation we provided hardware tokens to students at Indiana University and then surveyed their reasons for use or non-use. These results aligned with previous work, indicating that the previously hypothesized solutions with similar results would be applicable.
Following this we applied the Research Through Design(RtD) method(Zimmerman and Forlizzi, 2014 [32], Zimmerman et al., 2007 [33], Zimmerman et al.,2010 [34]) to design, prototype, and test a hardware security token based on previous work. We evaluated the prototype using the wizard of oz (Dahlbäck et al., 1993 [8]) technique during a pilot study of 7 participants. We found that the larger form factor and being able to attach the device to the smart phone did not result in a lower perceived cost of motivation of use. We also found that the biometric sensor is generally perceived to be more secure. Based on these interviews we conclude that drivers of lack of adoption goes beyond form factor, specifically lack of adoption is grounded in participant perception of low risk of account takeover. In addition, the ability to share authentication for mutual support and caregiving is identified as a strength of passwords.
We close with a discussion, based on the survey of the literature and the design changes recommended in previous works, that design alone is inadequate for universal adoption of secure hardware authentication.  We argue for integrating risk communication; beyond this, recognition that sharing of passwords can be a social good. The ability to enroll multiple keys for one account enables shared account practices with family and household settings: sharing Netflix accounts, assisting less technical parents, and managing shared household resources. We predict that strictly technical solutions may be inadequate, but rather that awareness, risk communication, and communication about the relationship between one-time password (OTP) hardware and account management are critical.  We suggest that zero trust architectures that undermine or conflict with social practices may face similar friction in consumer applications.


Authors
SD

Sanchari Das

University of Denver
avatar for L. Jean Camp

L. Jean Camp

Indiana University Bloomington- School of Informatics and Computing
JA

Jacob Abbott

Indiana University Bloomington - School of Informatics, Computing, and Engineering
ZZ

Zitao Zhang

Indiana University Bloomington, School of Informatics and Computing

Discussants
MR

Madelyn Rose Sanfilippo

University of Illinois - Champaign Urbana


Friday September 16, 2022 5:08pm - 5:40pm EDT
Room Y402 WCL, 4300 Nebraska Ave, Washington, DC

5:45pm EDT

A General Model of (Internet) Governance
Friday September 16, 2022 5:45pm - 6:15pm EDT
Claudio Grossman Hall WCL, 4300 Nebraska Ave, Washington, DC

5:45pm EDT

Employee Technology Skill Gaps in the Great Resignation
Link to full paper
AbstractA business’ ability to find employees with the right technical skills is critical to increasing efficiency and remaining competitive. When businesses cannot find employees with the necessary technical acumen, it represents a labor market failure. This failure can be addressed through education and training programs that improve human capital by providing technology training. The benefit of such programs, however, is determined by the presence of these skills gaps. To that end, it is necessary to determine how businesses perceive the fit between their current needs and the skills of their current and future employees.

To answer this question, this study examines survey data collected from 959 businesses across a selection of small communities in Texas, Ohio, and Michigan during the period identified as “The Great Resignation” (February 2021 through February 2022). Using data collected through online surveys, this study measures how businesses perceive their current and potential workforce relative to their needs for employees with appropriate technical and digital skills. Cross-tabulating results by business location, sector, number of employees, and annual revenue show differences in how well business establishments believe that the technology skills of their employees match the technology needs of the business.

Initial analyses indicate that across business sizes and sectors, there is a perceived gap between the technical skills that employees now possess, versus the technical skills needed by employers. Identifying where these gaps exist can help target digital training programs to best fill the niches where these skills gaps persist.

Authors
CM

Chris McGovern

Connected Nation
EF

Eric Frederick

Connected Nation


Friday September 16, 2022 5:45pm - 6:15pm EDT
Claudio Grossman Hall WCL, 4300 Nebraska Ave, Washington, DC

5:45pm EDT

In Search of a Common Spectrum Vocabulary: Spectrum Sharing and Interference Taxonomies
Authors
GS

Graham Stevenson

U. of Colorado Silicon Flatirons
EM

Eloise Morris

U. of Colorado Dept. of Computer Science


Friday September 16, 2022 5:45pm - 6:15pm EDT
Claudio Grossman Hall WCL, 4300 Nebraska Ave, Washington, DC

5:45pm EDT

Looking Back, Looking Forward: The Evolution and Societal Impact of the Internet and Social Media, from TPRC25 to TPRC50 and Beyond
Link to full paper
AbstractThe internet was commercialized in 1994, shortly before TPRC25. At that time there were some 70 million users, mostly in developed countries, and the personal computer was the main device for accessing the internet. Today there are some 4.9 billion internet users in 200 jurisdictions; the mobile phone is the world’s most widely used communications device; and the ubiquitous smartphone has become the most common means of accessing the internet and using its applications and services, including social media platforms.

The growth of social media over the last 20 years has paralleled that of the internet as a whole. Today there are an estimated 4.6 billion social media users worldwide, almost 95% of total internet users. The most popular platforms, like Facebook, YouTube, WhatsApp, Instagram and Twitter, count their regular users in the billions and hundreds of millions. On average, these users spend 2.5 hours on social media each day.

The internet has transformed our economy and society. The enormous socio-economic benefits derived from its use have largely been appropriated over the last 25 years. When the COVID-19 pandemic struck in 2020, creating the most serious global health crisis in a century, it triggered major new uses which brought out the best of the internet. Tele-education, Tele-medicine, E-Commerce and Online Payments are now perceived widely as essential services. The power and reach of social media platforms have also increased greatly, as has their ability to provide communications to disadvantaged groups.

However, the internet was never designed for secure commercial and social use at a global scale. It developed outside the kinds of legal and regulatory frameworks that governed the growth of previous communication technologies. A global “network of networks” with intelligence at the edges, it does not respect national jurisdictions and lacks a robust governance structure at the applications and content layers. Consequently, the negative developments or “Dark Side” are steadily increasing in scale and scope.

The pandemic exacerbated some of the internet’s worst aspects: an upsurge in hacking, identity theft, cyber-crime, etc. More serious is the social cost resulting from an erosion of trust and confidence in institutions and governments, caused by the unconstrained use of social media to express extreme views, harass political opponents, propagate “alternative facts” and conspiracy theories. Many countries are experiencing the enormous negative impacts of these developments on the political discourse that is the lifeblood of democratic societies.

The benefits, costs and trade-offs related to the internet and its use need to be understood better. The challenge here is to draw a line between unrestrained freedom of speech and controlling mis/disinformation, that may be “legal” but detrimental to the public interest. Who decides, using what criteria? This may require a mix of new laws “with teeth” that engage users, platform providers and regulators (e.g. the UK Online Safety Bill), along with broad-based education in digital literacy, civics and socially appropriate usage.

Currently there are no entities that can govern and enforce acceptable behavior across the global internet. In April 2022 the US, EU and some other countries came up with a Declaration for the Future of the Internet. What is needed is a multi-stakeholder, ecosystem approach where all actors will see it in their self-interest to create and participate in a secure and trusted global internet. The UN suggests that it can provide a platform for all stakeholders such as governments, the private sector and civil society, to deliberate the provision of universal digital access and a global, trusted internet. The TPRC could also play a role in providing an impartial and scholarly forum, in which the pros and cons of a variety of such ideas and initiatives could be discussed and debated.

UN initiatives related to the Internet started with the World Summit on the Information Society (WSIS) 2003/2005 and the Tunis Agenda. They continued with WSIS + 10 in New York (2015); a WSIS + 20 is planned for 2025.

In 2020 the UN General Assembly made a Declaration to “Improve Digital cooperation and ensure safe and affordable digital access for all”. The UN Secretary General’s 2021 Report “Our Common Agenda” proposed a “Summit of the Future” in 2023. The SG proposed that the UN, Governments, the private sector and civil society could come together to prepare a multi-stakeholder digital technology track for the Summit. The goal would be to agree on a Global Digital Compact to “outline shared principles for an open, free and secure digital future for all”. Issues to be discussed could include: avoiding fragmentation of the internet, and promoting a trustworthy internet by introducing accountability criteria.

Authors
PN

Prabir Neogi

ICT Consultant, Carleton University
I am a retired Canadian public servant who worked for the Government of Canada for 35 years (1977 - 2012), and a TPRC "old hand". I attended my first TPRC in 1979, and have attended the Conference regularly since 1992.My broad areas of interest are: Broadband communications (both... Read More →
AC

Arthur Cordell

Carleton University
DM

Don MacLean

ICT Consultant


Friday September 16, 2022 5:45pm - 6:15pm EDT
Claudio Grossman Hall WCL, 4300 Nebraska Ave, Washington, DC

5:45pm EDT

Mapping skill-based technology stacks to regional innovation clusters: Uncovering the patterns from the ICT industry and the digital economy landscape
Authors
JL

Jisoo Lee

Seoul National University
JL

Jaehyun Lee

Seoul National University
JK

Jungho Kim

Seoul National University
JH

Junsoek Hwang

Seoul National University


Friday September 16, 2022 5:45pm - 6:15pm EDT
Claudio Grossman Hall WCL, 4300 Nebraska Ave, Washington, DC

5:45pm EDT

Plus ca change, plus c'est la meme chose: Why Universal Access and Digital Divide Policy Issues have persisted over the last 50 years
Link to full paper
AbstractAt TPRC25 a speaker noted that Universal Access to Basic Services at Affordable Cost was a major policy issue during the 1st TPRC in 1972; it and the Digital Divide continued to be an important issue in 1997. He predicted that these issues would persist and be discussed at TPRC50. In this paper the authors explore why these issues have persisted and cite some solutions that have been proposed.

Universal Access means access at affordable cost, primarily by individuals and households, to communications networks and defined basic services. The issue persists over time because the goalposts shift; the definition of Universal Access is broadened due to technological progress and changing societal needs and expectations. Due to the COVID-19 pandemic, Tele-education, Tele-medicine, E-Commerce and Online Payments are now widely perceived as essential services. Broadband internet is now seen as the “electricity” of the 21st century, a societal need as important as access to reliable electricity and clean drinking water.

In 1972 the norm for Universal Access was POTS (Plain Old Telephone Service), delivered via the PSTN (Public Switched Telephone Network); a typical household with a rotary dial telephone connected via a wireline local loop to the Telco’s analogue, narrow-band, switched telephone network, which provided local calling service and access to long distance services. In 2022, Universal Access is defined as broadband access to the internet, using a smartphone, tablet or personal computer, connecting via a digital, packet-switched, wireless mobile communications network or high bandwidth wireline network.

According to the International Telecommunications Union (ITU), in 2021 broadband wireless network access was available to some 85% of the global population, and there were some 6.5 billion active mobile broadband subscriptions. There were some 4.9 billion internet users in 200 jurisdictions across the world. The mobile phone is now the world’s most widely used communications device; the ubiquitous smartphone has become the device of choice and most common means of accessing the internet and using its applications and services, including social media platforms. However, the ability to connect to the internet remains profoundly unequal across the world. Some 2.9 billion people are still unconnected to the internet; 96% of the unconnected live in Developing and Least Developed Countries (ITU).

Important Digital Divides persist for broadband internet, both geographical and in adoption and use. Geographical urban/rural divides exist because of limitations of the rural network infrastructure. Some 30 million Americans live in areas lacking a broadband infrastructure that provides minimally acceptable speeds; a considerable number do not use broadband internet because it costs them too much. With the Rural Electrification Act of 1936 as a precedent, the Infrastructure Act of 2021 will narrow the digital divide and help ensure that every American has access to reliable, high-speed internet, through an investment of some $45B in broadband infrastructure deployment. Eligible funding recipients include telecommunications companies, technology companies, electric utilities and utility cooperatives; they are obliged to offer a low-cost plan as a funding condition. The legislation will also help to lower prices for internet service, allowing more Americans to make full use of internet access.

Digital Divides in the adoption and use of broadband internet by disadvantaged groups (e.g. low income, lacking necessary digital skills) are more difficult to tackle, because they often require demand side measures. Affordability issues have usually been addressed via the provision of targeted subsidies for internet access and basic services; the FCC’s $14.2B Affordable Connectivity Program is an example. However, the lack of digital skills and perceived benefits remains an important factor in limiting the ability to use the internet.

In 2020 the UN General Assembly made a Declaration to “Improve Digital cooperation and ensure safe and affordable digital access for all”. The UN Secretary General’s 2021 Report “Our Common Agenda” proposed a “Summit of the Future” in 2023. The SG proposed that the UN, Governments, private sector and civil society could come together to prepare a multi-stakeholder digital technology track for the Summit. The goal would be to agree on a Global Digital Compact to “outline shared principles for an open, free and secure digital future for all”.

In closing, the authors think that issues related to Universal Access and Digital Divides between Digital “Haves” and “Have-nots” will persist, due to changes in technology and societal expectations, and predict that they will continue to be discussed at TPRC75.


Authors
PN

Prabir Neogi

ICT Consultant, Carleton University
I am a retired Canadian public servant who worked for the Government of Canada for 35 years (1977 - 2012), and a TPRC "old hand". I attended my first TPRC in 1979, and have attended the Conference regularly since 1992.My broad areas of interest are: Broadband communications (both... Read More →
AC

Arthur Cordell

Carleton University
DM

Don MacLean

ICT Consultant


Friday September 16, 2022 5:45pm - 6:15pm EDT
Claudio Grossman Hall WCL, 4300 Nebraska Ave, Washington, DC

5:45pm EDT

5:45pm EDT

Poster Reception - CASH BAR
Friday Poster reception is a CASH bar (no credit cards!)

Friday September 16, 2022 5:45pm - 6:30pm EDT
Claudio Grossman Hall WCL, 4300 Nebraska Ave, Washington, DC

6:45pm EDT

Dinner and Keynote
Remarks by Amit Schejter, TPRC Chair
Panel Introduction by Rudy Brioche

Panelists

Friday September 16, 2022 6:45pm - 8:45pm EDT
Claudio Grossman Hall WCL, 4300 Nebraska Ave, Washington, DC

7:00pm EDT

Reflections on the impact of Telecommunications Policy Research Conferences
In the 50 years since the first TPRC, the industry has undergone a sea change; the landscape has altered dramatically with new players, new technologies and transformed regulatory practices. Initially the concerns were telephony and media issues, primarily cable television services. Now the internet dominates with concerns about e-commerce, privacy, social media, infrastructure and all the underlying problems of competition, investment, trade and market shaping. Earlier issues have faded. The early conferences had significant influence on policy with transformative issues such as privatization addressed in the very first conference. In subsequent years, not just the telephone companies but other state owned enterprises were privatized. In the early years, only a few academics discussed the sale of electromagnetic spectrum or competition as a substitute for regulation – ideas that are now common place. Few could have imagined the breaking up of AT&T in 1972. The TPRC at first focused on a narrow scope of economic issues but later included legal dimensions. In the following years the meetings were much broader as the interrelated relevance of many topics became clear such as comparative international experiences, social and cultural impacts, ethics, systems architecture, financial models, technical functionalities, security and even geopolitical rivalries. While policy papers had been written by others long before 1972, TPRC was and is a conference which attempts to connect policymakers with academic research – and researchers with issues confronting policymakers. These conferences have pushed federal and state agencies to hire more economists and for policymakers to listen to their arguments. It has encouraged graduate students to become involved in communications studies. This panel will reflect on the impact and history over the last fifty years of TPRC and address the future of research in these areas.  
Two panel members were involved with the first TPRC conference and have been active in communications policy in government and industry as well as within the academy over the past 50 years. They will opine on the impact of research on policy and that of policy on research. The history of the nexus between policy and research is examined by another panel member. Another panel member will discuss the application of the policies, in particular privatization: what worked, what did not and what was omitted. The last member will examine current and future issues based on experiences reviewing and awarding research grants.  
Panel: 
  • Introduction/Overview: Research’s impact on policy:  James Alleman, University of Colorado – Boulder. Chair
  • Policy’s impact on research:  Gerry Faulhaber, Wharton School of the University of Pennsylvania.  
  • The nexus of research and policy: a historical perspective: Jonathan Liebenau, London School of Economics
  • Guns, Graft and Sex: How the Sometime Messy Road To Telecoms Privatizations Led to Macroeconomic Success:  Judith O’Neil, Nakhota.
  • Research Funding: next generation internet:  Loretta Anania* European Commission
     

Authors
avatar for James Alleman

James Alleman

Professor Emeritus, University Colorado - Boulder
James Alleman is Professor Emeritus at the University of Colorado – Boulder and a Senior Fellow and Director of Research at Columbia Institute of Tele-Information (CITI), Columbia Business School, Columbia University.Dr. Alleman was Visiting Professor CIMBA Italy, Paderno del Grappa... Read More →
JL

Jonathan Liebenau

London School of Economics

Panelists
LA

Loretta Anania

Officer, Next Generation Internet, European Commission
GF

Gerry Faulhaber

University of Pennsylvania
JO

Judith O'Neill

Nakota, LLC


Friday September 16, 2022 7:00pm - 8:15pm EDT
Claudio Grossman Hall WCL, 4300 Nebraska Ave, Washington, DC

8:30pm EDT

50th Anniversary Gala Dessert Reception sponsored by the American Library Association
Friday September 16, 2022 8:30pm - 9:30pm EDT
Claudio Grossman Hall WCL, 4300 Nebraska Ave, Washington, DC
 
Saturday, September 17
 

8:00am EDT

Registration and Continental Breakfast
Saturday September 17, 2022 8:00am - 9:00am EDT
Claudio Grossman Hall WCL, 4300 Nebraska Ave, Washington, DC

9:00am EDT

The Spatiality of Connectivity: a Spatial Analysis of Public Wi-Fi Locations in New York City
Link to full paper

Abstract
This paper examines the spatial distribution of Wi-Fi hotspots in New York City and investigates whether this distribution mitigates broadband access disparities between digitally marginalized areas and the rest of the city. Specifically, it utilizes the Spatially Aware Technology Utilization Model to investigate whether public Wi-Fi deployment reinforces (or compensates for) existing gaps in broadband infrastructures via spatial econometrics.


Authors
avatar for Ryan Wang

Ryan Wang

Ph.D. candidate, Penn State University
I am a Ph. D. candidate majoring in Mass Communications and minoring in Social Data Analytics at Penn State University. My main research interests are two-folded: (1) how digital infrastructure influences political polarization within the U.S. context; (2) how social media facilitates... Read More →

Discussants
SW

Scott Wallsten

President and Sr Fellow, Technology Policy Institute


Saturday September 17, 2022 9:00am - 9:31am EDT
Room Y402 WCL, 4300 Nebraska Ave, Washington, DC

9:00am EDT

Economic Impact of Asymmetric Paid Peering: Implications of the Netflix vs. SK Broadband Dispute
Link to full paper

Abstract

In April 2020, Netflix, Inc. and its Korean subsidiary Netflix Services Korea Ltd. filed a lawsuit against SK Broadband, Inc., seeking confirmation that there were no obligations to bear network costs. On June 25, 2021, however, the Seoul Central District Court rejected Netflix's argument that no such obligation existed and instead issued a ruling acknowledging the existence of an obligation to negotiate fees. Netflix subsequently appealed the decision, and at the time of writing this paper, the dispute was still going on. This study thus provides an overview of the case, discusses its relationship with the net neutrality debate, and analyzes what the outcome of the case means in terms of efficient resource allocation within the broadband ecosystem, using a rather simple model.

The model analysis revealed that if players are given the freedom to set their own prices, the effect of introducing paid peering is neutral with respect to resource allocation; however, when that freedom is impaired by an external force, for example, price regulations or net neutrality obligations, the introduction of paid peering generates benefits for the introducing players and their customers, but it also results in damage to overall social welfare. In addition, this study shows that paid peering can be used as a means of internalizing externalities when the external economies of network/content investment are considered.

These arguments are expected to make a theoretical contribution to the debate on shifting the economic burden of network infrastructure to over-the-top players.


Authors
TJ

Toshiya Jitsuzumi

Chuo University

Discussants
PP

Petrus Potgieter

University of South Africa


Saturday September 17, 2022 9:00am - 9:31am EDT
Room Y403 WCL, 4300 Nebraska Ave, Washington, DC

9:00am EDT

Entity of the State: The Transparency of Restricting Telecommunications Firms as Threats to America’s National Security
Link to full paper

Abstract
This paper analyzes recent American regulations regarding international telecommunications firms that have been restricted from doing business in the United States, as apparent threats to national security. The paper will include policy-oriented research into the relevant legislation, plus more theoretical research on the framing of geopolitical disputes and the transparency of the resulting regulatory actions.

There has been some suspicion from journalists and government watchdogs that such restrictions are politically motivated, with dramatic claims of national security threats leading to non-transparent trade regulations. This paper discusses the framing of geopolitical disputes and their impact on trade policy in the telecommunications sector. The paper then explores the accusations of national security risks, whether those are valid, and how this affects the American telecommunications market.


Authors
avatar for Benjamin W. Cramer

Benjamin W. Cramer

Pennsylvania State University

Discussants
EB

Erik Bohlin

Chalmers


Saturday September 17, 2022 9:00am - 9:31am EDT
Room NT08 WCL, 4300 Nebraska Ave, Washington, DC

9:00am EDT

The Patchwork of State Data Privacy Laws and Competition and Opportunity in Digital Markets
Link to full paper

Abstract
What is the impact of the state patchwork of data privacy laws on competition? Will a federal privacy law have a pro-competitive effect?

This paper will seek to examine what impact, if any, this emerging patchwork has on competition and more particularly on smaller players' ability to remain competitive.

To do so, the paper discusses existing economic and legal research on the impact of data privacy laws at various levels on small and mid-size players. From a qualitative perspective, this will include examining the existing literature around compliance costs and the impact of GDPR on investment in small players and the market share of large players. It will also examine potential costs associated with the burdens of increased risks and litigation on the firm’s likely behavior around regulatory arbitrage in the absence of a federal standard.

The paper concludes that a federal data privacy law could have pro-competitive effects by enabling smaller players to overcome the barriers state level fragmentation may cause. However, federal policymakers must learn lessons from the impact of GDPR to avoid privacy laws that would make it more difficult for smaller players in a variety of industries to use data in beneficial ways that allow them to compete with larger players.


Authors
Discussants
avatar for Dhanaraj Thakur

Dhanaraj Thakur

Center for Democracy and Technology
Dhanaraj Thakur is Research Director at the Center for Democracy & Technology, where he leads research that advances human rights and civil liberties online. His most recent research examines automated content moderation, disinformation race and gender, and content analysis in end-to-end... Read More →


Saturday September 17, 2022 9:00am - 9:31am EDT
Room NT01 WCL, 4300 Nebraska Ave, Washington, DC

9:00am EDT

Spectrum Sovereignty on Tribal Lands: Assessing the DIGITAL Reservations Act
Link to full paper

Abstract
The Federal Communications Commission currently has unlimited authority over governance of electromagnetic spectrum on sovereign tribal lands in the United States. This monocentric system, with spectrum governed exclusively by the FCC, essentially eliminates opportunities for tribal governments to develop innovative ways to manage spectrum to close the digital divide on Tribal lands, to choose how much of spectrum is available for commercial, public, or community use, and eliminates ability of tribes to fully control revenue from spectrum on tribal lands. The Deploying the Internet by Guaranteeing Indian Tribes Autonomy over Licensing (DIGITAL) Reservations Act envisions a new path for spectrum governance which affirms self-management and self-governance of spectrum on tribal lands. In this paper, we consider the extent to which the DIGITAL Reservations Act contrasts with current spectrum governance in the United States. We argue that the DIGITAL Reservations Act envisions a polycentric system of spectrum governance and that it is a workable system of spectrum governance that acknowledges tribal sovereignty over one of its most valuable assets.


Authors
IM

Ilia Murtazashvili

University of Pittsburgh
MW

Martin Weiss

University of Pittsburgh

Discussants
RL

Roslyn Layton

Strand Consult


Saturday September 17, 2022 9:00am - 9:31am EDT
Room NT07 WCL, 4300 Nebraska Ave, Washington, DC

9:31am EDT

Delivering Affordable Universal Broadband: Exploring the Global Investment Needs of Broadband Infrastructure to Achieve Target 9c of the Sustainable Development Goals
Link to full paper

Abstract
Broadband Internet connectivity is essential for economic development and is part of the United Nations’ 2030 Sustainable Development Goals. This study estimates country-specific investment needs in mobile cellular 4G infrastructure to achieve wide-area universal mobile broadband connectivity, using a novel approach that factors in each country’s projected demographics, geography, and economic characteristics. We find that the cost of universal mobile broadband amounts to necessary investment of $388 billion, equating to less than 0.1 percent in advanced economies, approximately 0.6 percent in emerging market economies, to over 5 percent in low-income countries.


Authors
avatar for Edward Oughton

Edward Oughton

Assistant Professor, George Mason University

Discussants
SW

Scott Wallsten

President and Sr Fellow, Technology Policy Institute


Saturday September 17, 2022 9:31am - 10:03am EDT
Room Y402 WCL, 4300 Nebraska Ave, Washington, DC

9:31am EDT

Best Practices for Collecting Speed Test Data
Link to full paper

Abstract
In an effort to expand Internet access, local and federal policymakers have sought to use speed test data to determine where to allocate funding. However, drawing accurate and meaningful conclusions about Internet Service Provider (ISP) network performance from speed test data requires careful consideration of the test conditions under which the data was collected. This paper provides a set of recommendations for gathering and analyzing a single speed test measurement. Our recommendations are based on our own analysis of speed test data collected from in-lab, controlled experiments, as well as from a six month long deployment across 77 households in Chicago. Based on the results of our analysis, we suggest that the client-server latency, the client device, and the access medium (wireless vs. wired) be logged for each test. These three metadata can be used later to assess the accuracy or utility of the speed test. We also propose that running “paired tests” (running two different speed tests in succession) can help mitigate the effects of test conditions for which we can’t measure, such as server load or upstream congestion. Such paired tests are most beneficial for households subscribed to download speeds greater than 500 Mbps.


Authors
KM

Kyle MacMillan

University of Chicago
TM

TARUN MANGLA

University of Chicago
MR

Marc Richardson

University of Chicago
NF

Nick Feamster

University of Chicago

Discussants
PP

Petrus Potgieter

University of South Africa


Saturday September 17, 2022 9:31am - 10:03am EDT
Room Y403 WCL, 4300 Nebraska Ave, Washington, DC

9:31am EDT

Beyond Digital Protectionism? Comparing Personal Data Regulation Frameworks in China, India, and South Korea
Link to full paper

Abstract
Personal data is increasingly a site of political and economic contestation. In recent years, states around the world have adopted personal data protection regulations while asserting distinct data governance frameworks based on human rights, innovation, economic opportunity, cybersecurity, and privacy rights. Some of these regulations also promote data localization by restricting cross-border data transfers. Some actors have criticized these regulations as protectionist, while others have defended them for advancing digital sovereignty.

What can we learn from mapping the regulatory landscape of personal data protection laws by considering their sociocultural and geopolitical contexts? In other words, what are the specific values and conceptualizations about data that are advanced with actually existing personal data protection regulations? This paper answers these questions through a textured comparative analysis of personal data protection regulations across three Asian states: China, India, and South Korea. It provides a comparative policy analysis of personal data protection laws in each state and then pursues a critical evaluation of “protectionism” and “sovereignty” in each context by examining specific interests, values, and normative assumptions.

This paper argues that personal data protection regulations must be understood in each state’s specific conceptualization of privacy, relationship to major tech platforms, and approach to citizen-state relations. These findings carry implications for evaluating data protection regulations within specific contexts and not within a simple binary distinction between an open and a fragmented internet.


Authors
avatar for Rohan Grover

Rohan Grover

University of Southern California
KJ

Kyooeun Jang

University of Southern California Annenberg School for Communication and Journalism
LW

Li Wen Su

University of Southern California Annenberg School for Communication and Journalism

Discussants
avatar for Dhanaraj Thakur

Dhanaraj Thakur

Center for Democracy and Technology
Dhanaraj Thakur is Research Director at the Center for Democracy & Technology, where he leads research that advances human rights and civil liberties online. His most recent research examines automated content moderation, disinformation race and gender, and content analysis in end-to-end... Read More →


Saturday September 17, 2022 9:31am - 10:03am EDT
Room NT01 WCL, 4300 Nebraska Ave, Washington, DC

9:31am EDT

Using Spectrum Allocations to Address Indigenous Policy Obligations: The Case of New Zealand
Link to full paper

Abstract
Radio spectrum is fundamental to the operation of wireless communications services. In order to allocate radio spectrum for different services, spectrum is regulated via national laws, coordinated by an international body, the International Telecommunications Union (ITU). For the most part, national (state) governments undertake the legal definition and allocation of spectrum. The most common method of allocation is auction, where competing parties bid for the rights to use specific bundles of spectrum, ensuring that the spectrum goes to the users and uses where it is most commercially valuable (Crandall, 1998). Alternatively it is 'gifted' to winners of a 'beauty contest' using predetermined government-specified criteria in order to meet other policy objectives (Prat & Valletti, 2000). Sometimes, spectrum can be reserved for particular government policies or other redistributive agendas (Howell & Potgieter, 2022). In February 2022, the New Zealand Government announced that a yet-to-be-formed 'Māori Spectrum Entity' would “receive an ongoing allocation of 20 percent of future national commercial spectrum allocations, at no cost.” This is in addition to the 25 percent of spectrum designated for 5G technology (mid-band, 3.4-3.8GHz) under the Māori Spectrum Working Group agreement. The policy is novel as it creates a perpetual obligation rather than simply a one-off transfer. The Māori people are the indigenous people in New Zealand. The 1840 Treaty of Waitangi signed between the British Crown and Māori tribal leaders granted the tribes “exclusive and undisturbed possession of their lands and estates, forests, fisheries and other properties.” (Te Ara, 2022). Māori tribal leaders have asserted that since they exercised control over the air above their lands in 1840, they are entitled to a share of the spectrum within it. This controversial claim was supported by a Waitangi Tribunal (special court) hearing (Wai 776, 1999). Further support for the policy derives from New Zealand’s obligations as a signatory to the United Nations Declaration on the Rights of Indigenous Peoples. In this paper, we use comparative policy analysis to examine perpetual allocation of spectrum at no cost to tribal interests while at the same time selling spectrum at positive cost to industry parties, against the espoused objectives of both industry and other policies. While wealth and control is transferred from the Crown to the tribal entity, meeting various legal treaty obligations, it is not clear that the tribal entity faces the same incentives as the firms paying positive sums to deploy the spectrum in the most socially-useful manner. That is, meeting legal obligations may abrogate economic ones.


Authors
BH

Bronwyn Howell

Victoria University of Wellington
XT

Xin Tang

Victoria University of Wellington

Discussants
RL

Roslyn Layton

Strand Consult


Saturday September 17, 2022 9:31am - 10:03am EDT
Room NT07 WCL, 4300 Nebraska Ave, Washington, DC

9:32am EDT

Digital Sovereignty and Resilience
Link to full paper

Abstract
Resilience in communication networks has been a field of study for decades. However, resilience has been studied by assuming that network actors are benign. Increasingly, digital sovereignty, where nation states and territories exercise jurisdiction over data residing or flowing in geographical areas in their control, is playing a role in the thinking of network design. In this paper, we scan some of the issues surrounding digital sovereignty and examine its interaction with traditional approaches to resilience. We describe some open problems in the area, such as developing a sovereignty metric that can interact with availability metrics in communication networks.


Authors
DT

David Tipper

Professor, University of Pittsburgh
PK

Prashant Krishnamurthy

University of Pittsburgh

Discussants
EB

Erik Bohlin

Chalmers


Saturday September 17, 2022 9:32am - 10:03am EDT
Room NT08 WCL, 4300 Nebraska Ave, Washington, DC

10:03am EDT

Use It or What?
Link to full paper

Abstract
'Use it or what?' explores the development and application of 'use it or lose it' as a regulatory approach in the context of Canadian spectrum policy. The research for this paper shows this hypothetical penalty has been repeatedly announced and promoted by Canadian governments, regulators, public advocates, and even industry, though it is highly questionable if it has ever been used. This paper asks if there is any substance to 'use it or lose it' policies or if it has simply become a rhetorical device for regulators and politicians who wish to appear authoritative?


Authors
avatar for Gregory Taylor

Gregory Taylor

University of Calgary

Discussants
RL

Roslyn Layton

Strand Consult


Saturday September 17, 2022 10:03am - 10:40am EDT
Room NT07 WCL, 4300 Nebraska Ave, Washington, DC

10:04am EDT

Internets: The changing role of Internet Protocols in evolving broadband technologies
Link to full paper

Abstract
Transmission Control Protocol/Internet Protocol (TCP/IP) as the public internet of the last three decades has been resilient with each generation of broadband infrastructure. Since 2018, however, it has been argued at the International Telecommunication Union (ITU) that the lag and latency of TCP/IP will not prove resilient for global internet-connected technological innovation and development within the tail end of 5G, nor suffice through 6G and beyond. The ITU’s Focus Group, Network 2030, developed in 2018 and published their findings across the ITU’s Standardization Sector (ITU-T) Study Group 13 in 2019, found that a post-2030 global internet environment will be characteristic of multiple public internets, or otherwise championed as 'ManyNets'. Within multiple public internets, this would result in a seismic shift within internet governance as the interconnection of multiple internets would result in the dismantling of the end-to-end principle. This study aims to determine how the multiple internets era may occur and the key stakeholders championing such a shift within global internet infrastructure. This study answered the research question, 'What are the contemporary political and economic power dynamics involved in the transport layer of the internet?'

Tracing conversations surrounding 'ManyNets’ and the Network 2030 ITU-T Focus Group, this research followed the published scientific academic literature, public policy interventions at global telecommunications standardization bodies, non-governmental organization responding white papers, newspaper articles, corporate blog posts, conference presentations, and Request for Comments (RFC) documents of involved stakeholders to map the political dimensions of the push for multiple public internets. Analysis of this data from ITU-T publications, Internet Engineering Task Force (IETF) RFCs, and the aforementioned responding primary documents, found China’s New Internet Protocol (New IP) as the most prominently debated emerging Internet Protocol proposed in 2019, however, that the United States has also been funding three additional Internet Protocols in research and development since 2009 to overcome the shortcomings of TCP/IP for the multiple public internets era. As the findings of this paper demonstrates, multiple public internets will become a standardized entity, which will dismantle the end-to-end principle of one Internet Protocol, while also centralizing internet-mediated information transport when specified countries choose which internets to allow within their borders. This research is novel as it is the first study to analyze New IP and this ITU-T proposed global internet governance shift within the next decade from an infrastructure lens, as well contemporized the analysis of New IP with other global Internet Protocol initiatives and developments. It addresses contemporary calls within global communications policy proposals for limitations within internet fragmentation, otherwise known as ‘splinternet.’


Authors
avatar for Dana Cramer

Dana Cramer

PhD Student, Ryerson University
Dana is a second-year PhD Student. Her research focuses on the political economy of Internet Protocols. Her work traces global internet governance, internet infrastructure, and standardization for Network2030. She has published on topics of broadband and telecommunications policy... Read More →

Discussants
SW

Scott Wallsten

President and Sr Fellow, Technology Policy Institute


Saturday September 17, 2022 10:04am - 10:40am EDT
Room Y402 WCL, 4300 Nebraska Ave, Washington, DC

10:04am EDT

Are the Settlement-Free Peering Policy Requirements for ISPs and CDNs Based on Network Costs?
Link to full paper

Abstract
Peering is an interconnection arrangement between two networks for the purpose of exchanging traffic between these networks and their customers. Two networks will agree to settlement-free peering if this arrangement is superior for both parties compared to alternative arrangements including paid peering or transit. The conventional wisdom is that two networks agree to settlement-free peering if they receive an approximately equal value from the arrangement. Historically, settlement-free peering was only common amongst tier-1 networks, and these networks commonly require peering at a minimum specified number of interconnection points and only when the traffic ratio is within specified bounds. However, the academic literature does not explain how these requirements relate to the value to each network. More recently, settlement-free peering and paid peering have become common between ISPs and CDNs.

In this paper, we construct a network cost model to understand the rationality of common requirements on the number and location of interconnection points. We also wish to understand if it is rational to apply these requirements to interconnection between an ISP and a CDN. We construct a model of ISP traffic-sensitive network costs. We consider an ISP that offers service across the US. We parameterize the model using statistics about the population and locations of people in the contiguous US. We consider peering at the locations of the largest interconnection points in the US. We model traffic-sensitive network costs in the ISP’s backbone network, middle-mile networks, and access networks. These costs are thus functions of routing policies, distances, and traffic volumes.

To qualify for settlement-free peering, large ISPs commonly require peering at a minimum of 4 to 8 mutually agreeable interconnection points. The academic literature provides little insight into this requirement or how it is related to cost. We show that the traffic-sensitive network cost decreases as the number of interconnection points increases, but with decreasing returns. The requirement to peer at 4 to 8 interconnection points is thus rational, and requiring interconnection at more than 8 points is of little value.

Finally, we turn to interconnection between an ISP and a CDN. Large ISPs often assert that CDNs should meet the same requirements on the number of interconnection points and traffic ratio to qualify for settlement-free peering. We show that if the CDN delivers traffic to the ISP locally, then a requirement to interconnect at a minimum number of interconnection points is rational, but a limit on the traffic ratio is not rational. We also show that if the CDN delivers traffic using hot potato routing, the ISP is unlikely to perceive sufficient value to offer settlement-free peering.



Authors
AN

Ali Nikkhah

University of California Irvine
avatar for Scott Jordan

Scott Jordan

University of California Irvine

Discussants
PP

Petrus Potgieter

University of South Africa


Saturday September 17, 2022 10:04am - 10:40am EDT
Room Y403 WCL, 4300 Nebraska Ave, Washington, DC

10:04am EDT

Enforcement Discretion in Tech Policy: A fuzzy-set qualitative comparative analysis (fsQCA) across data protection authorities post GDPR
Link to full paper

Abstract
This paper examines how tech regulators apply their discretion in policy enforcement. Studies on the growing role of the state in governing risks from technology and the difficulty to design policies to control unintended consequences do not usually consider policy enforcement processes, that shape how policies come to life and potentially create regulatory arbitrages for firms. To answer these gaps, this paper builds a novel typology to measure and compare policy enforcement discretion. Based on survey responses from 18 Data Protection Authorities (DPAs), interviews, and secondary sources, this study clusters regulatory agencies based on their captured enforcement strategies, analyzes cross-national variations in enforcement discretion, and investigates misalignments between enforcement strategy and actions. Using fuzzy set Qualitative Comparative Analysis (fsQCA), this study tests how bureaucratic and political contexts – organizational capacities, budget sources, and issue saliency – impact enforcement choices and direct tech policy enforcement. I find that almost half of studied agencies reflect highly deterrent strategy, but for many, lack of resources and expertise inhibits the translation of strategy into practice. This study provides a starting point for understanding the national impacts of EU’s General Data Protection Regulation (GDPR) and adds empirical support for theorizing about enforcement strategies in the age of promising privacy laws on paper. By highlighting an often-neglected aspect in the way technology outpaces the law, this study shows how privacy gatekeepers are far from being equipped for their mission, creating regulatory arbitrage for firms across Europe.


Authors
IS

Ido Sivan-Sevilla

Assistant Professor, University of Maryland, College Park

Discussants
avatar for Dhanaraj Thakur

Dhanaraj Thakur

Center for Democracy and Technology
Dhanaraj Thakur is Research Director at the Center for Democracy & Technology, where he leads research that advances human rights and civil liberties online. His most recent research examines automated content moderation, disinformation race and gender, and content analysis in end-to-end... Read More →


Saturday September 17, 2022 10:04am - 10:40am EDT
Room NT01 WCL, 4300 Nebraska Ave, Washington, DC

10:40am EDT

Coffee Break sponsored by The Brattle Group
Saturday September 17, 2022 10:40am - 11:05am EDT
Claudio Grossman Hall WCL, 4300 Nebraska Ave, Washington, DC

11:05am EDT

Digital Disregard: A Case for Amending Quebec’s Children Advertising Legislation
Link to full paper

Abstract
Often touted for its progressive legislation, the province of Quebec, Canada, prohibited all advertising to children under 13 in 1980, making it the first wide-reaching advertising ban of its kind. Outlined in the provincial government's Consumer Protection Act (CPA) under Sections 248 and 249, three criteria are provided to determine whether advertisements qualify as targeting children. These include the intended purpose, the manner of presenting the advertisement, and when and where it is shown.

While these standards lend themselves to the regulation of more traditional advertising on mediums such as print and broadcast, it is more difficult to apply such standards to digital technologies, such as video games that incorporate microtransactions, the additional for-purchase material within the game itself. Video game advertising falls within two categories; the external promotion of the game through commercials and print advertisements, and the increasingly utilized internal promotion of microtransaction. In some situations, such microtransactions act as the video games' primary source of revenue, surpassing profits made through product placement and game sales.

Quebec is unique in its progressive adoption of a legal framework to regulate advertising, as other Canadian provinces and most western nations rely solely on self-regulated advertising standards. In this paper, we explore the limitations of the existing Québécois legislation on children's advertising based on its inability to address digital media requirements through a case study analysis of the online football simulation video game FIFA 22.

The FIFA series, a product of Electronic Arts (EA), is infamous for promoting microtransactions within its paid platform in exchange for largely cosmetic features. In the Canadian legal landscape, EA has drawn criticism for its manipulative and exploitative use of loot boxes, a form of randomized microtransactions comparable to gambling, in the past. Such appeals are particularly concerning when used on children, a demographic included in the games' rating of “E” for everyone (which encompasses children ages 6 and up). FIFA, widely available in the Quebec market with this heedless rating, exposes children to the potential harms of both advertising and gambling and thus goes against criteria laid out by the CPA. Because of this, we propose that increasingly popular internal advertising within FIFA and similar games have been left unchecked under the current Québécois legislation.

As such, this paper seeks to establish the need for amendments to the Quebec Consumer Protection Act by 1) emphasizing the scale to which the video game industry has disregarded Québécois child advertising regulations through a case study analysis; 2) introducing a variety of ways that other nations have addressed the unique and covert advertising approaches used in video games, such as the United Kingdom’s Advertising Standards Authority (ASA), which divides how in-game versus externally advertised items are regulated; and 3) breaking down how similar, often self-regulatory approaches can be applied through amendments to Quebec’s existing advertising regulation.


Authors
ES

Erika Solis

Penn State
SF

Sydney Forde

Doctoral Candidate, Penn State University
YB

Yasemin Beykont

Penn State University

Discussants
avatar for Roxana Barrantes

Roxana Barrantes

Professor, Pontificia Universidad Catolica del Peru PUCP
Economics. ICT appropriation and use.


Saturday September 17, 2022 11:05am - 11:36am EDT
Room Y403 WCL, 4300 Nebraska Ave, Washington, DC

11:05am EDT

A Game of Quality Competition Among ISPs
Link to full paper

Abstract:
Understanding the effects of competition among Internet service providers on the availability and quality of broadband is important for policies aimed at decreasing the digital divide. To improve this understanding, I develop and estimate a structural model of vertical differentiation using geographical data on providers’ broadband deployment and speed. The model allows me to identify the effects of competition while accounting for strategic behavior as well as to identify the fixed costs associated with entry and product quality adjustments. My results indicate that (1) firms are more likely to enter and offer high speed service in larger, denser, and wealthier markets, (2) firms tend not to differentiate within markets, and (3) fixed costs of entry are large. I use these parameter estimates to conduct counterfactual simulations in which I vary the degree of competition and the size of entry costs. I find (1) holding costs constant, providers would slightly increase quality if they behaved as monopolists, and (2) holding competition constant, large reductions in entry costs are required to induce firms to substantially increase quality.

Authors
AK

Andrew Kearns

Northeastern University

Discussants

Saturday September 17, 2022 11:05am - 11:36am EDT
Room Y402 WCL, 4300 Nebraska Ave, Washington, DC

11:05am EDT

My Browser is not a Billboard: Experimental Evidence on Ad-blocking Adoption and Users' Acquisition of Information
Link to full paper

Abstract
Ad-avoidance technologies such as ad-blocking devices in browsers have become mainstream tools in recent years and escaped their role as niche applications that are only for the technically savvy. While technical impacts of those tools are well researched, their effects on actual consumer behavior is not. In an experimental setting this study provides first evidence on the effect of ad-blocking on users’ ability to acquire information in the form of an online reading task. We find that ad-blocking leads to more effort being exerted and increases social welfare by reducing inefficient searching. Additionally, ad-blocking induces users’ visit duration on websites to be more elastic in the experienced intensity of advertisements, making the competitive environment among publishers more intense.


Authors
NF

Niklas Fourberg

Wissenschaftliches Institut für Infrastruktur und Kommunikationsdienste (WIK), Heinrich Heine University Dusseldorf-Dusseldorf Institute for Competition Economics (DICE)
ST

Serpil Tas

Wissenschaftliches Institut für Infrastruktur und Kommunikationsdienste (WIK)

Discussants
JC

Jean Camp

Indiana University


Saturday September 17, 2022 11:05am - 11:36am EDT
Room NT01 WCL, 4300 Nebraska Ave, Washington, DC

11:05am EDT

Privacy Risks in the Internet of Things: The Impact of Ambiguity Aversion on Transparency Choices
Link to full paper

Abstract
Transparency is viewed as an essential prerequisite for consumers to make informed privacy decisions in digital markets. However, it remains an open research question whether and when individuals actually prefer transparency about privacy risks when given a chance to avoid it. We investigate this question with a randomized controlled online experiment based on an Ellsberg-type design, where subjects repeatedly choose between risk and ambiguity while facing the threat of an actual disclosure of their personal data. We find empirical support for ambiguity preferences as a novel behavioral mechanism underlying people's transparency choices in privacy contexts. In particular, we find that most individuals avoid ambiguity and prefer transparency for low likelihood privacy losses. However, this pattern reverses for high likelihood losses and when subjects perceive data disclosure as a gain. Most notably, a significant share of people seek ambiguity and thus prefer to avoid transparency when facing high likelihood privacy risks.


Authors
avatar for Nikolai Sachs

Nikolai Sachs

University of Passau
DS

Daniel Schnurr

University of Passau

Discussants
avatar for Marcela Gomez

Marcela Gomez

Director of Research Analytics, University of Pittsburgh


Saturday September 17, 2022 11:05am - 11:36am EDT
Room NT08 WCL, 4300 Nebraska Ave, Washington, DC

11:05am EDT

Dispelling Revisionist Myths Regarding Spectrum Property Rights in the 1920s
Link to full paper

Abstract
When assessing past legislation and policies, one must consider the constraints and incentives facing decisionmakers. Failures to understand such constraints have resulted in the creation of a myth that property rights and spectrum markets would have been superior to the regulatory system of the Radio Act of 1927. The author explores the relative efficiency implications of Federal Radio Commission regulation under the Radio Act of 1927 and a system of spectrum property rights. He observes that discussions of hypothetical spectrum property rights in the 1920s fail to take into account (1) the vast differences between the radio propagation conditions in the radio spectrum in use then and propagation in the bulk of the radio spectrum today and (2) technical limitations of equipment at that time. Propagation conditions in the AM band make interference a diffuse problem. A single radio transmitter can impair reception of many other stations—some hundreds of miles away; consequently, market transactions would have had to involve many parties. Hypothetical property rights systems also fail to consider directly the utility of the listening audience—the group responsible for more than 90% of the investment in the AM radio broadcasting system in 1927. The author concludes that spectrum property rights would have resulted in more radio service in urban areas, substantial loss of rural service, and diminished consumer welfare.


Authors
Discussants

Saturday September 17, 2022 11:05am - 11:36am EDT
Room NT07 WCL, 4300 Nebraska Ave, Washington, DC

11:36am EDT

Your Mileage May Vary or Performance You Can Count On: What Should Broadband Consumer Labels Measure?
Link to full paper

Abstract
The FCC-proposed broadband consumer labels are designed to enable quality and price transparency, and thus competition, for residential broadband services. Key quality indicators for residential networks are download and upload speeds, typically the only quality-of-service differentiator disclosed at the time of purchase. Even as speed remains the most-commonly accepted quality-of-service indicator, its use in advertisements has been problematic. Often, the fine print indicates “up to” speeds, and the terms of service often disclaim any warranties on the speed advertised. Actual achieved speeds can vary significantly depending on the measurement methodology and on how the statistical variation in speeds across time and space is represented. We have compared several different ways of measuring speed and performance using the most recent FCC Measuring Broadband America (MBA) data, from 'classical' measures such as mean and median, to percentiles and the MBA 80/80 consistency metric. Our results show that well-performing networks can offer speeds close to or above their advertised number almost all the time and across all of their measurement locations, with 5th percentile measurements differing only marginally from the median or 80/80 speeds. Therefore, we argue that leaving the measurement method of speed to providers will likely lead to the use of the most favorable speed metric possible, particularly since the format will confer a notion of government-approved legitimacy on the numbers presented. Low-percentile cut-off metrics reward high-quality networks, without having to disclose hard-to-understand metrics such as packet loss, and makes it far less likely that a new customer finds themselves residing in a service territory with unreliable service.


Authors
HS

Henning Schulzrinne

Columbia University
avatar for Andreas Carlos Freund

Andreas Carlos Freund

Columbia University
WJ

Walter Johnston

Danu Consulting

Discussants


Saturday September 17, 2022 11:36am - 12:07pm EDT
Room Y402 WCL, 4300 Nebraska Ave, Washington, DC

11:36am EDT

Positive or zero-sum game: When privacy by design meets dark patterns
Link to full paper

Abstract
One of the foundational principles of Privacy by Design (PbD) is the 'Full functionality – positive-sum, not zero-sum'. Lately, we see many debates on privacy vs security, privacy vs data empowerment etc., while these are important debates, this principle states privacy should be a full functionality where technologies don’t trade-off privacy at the cost of others. But is the positive-sum game suggested through PbD possible when businesses resort to dark patterns? This paper tries to answer this question by discussing the business perspective of the dark patterns, which is less discussed in the literature. The paper tries to bring out the business purpose and incentives behind dark patterns. The paper also discusses the consumer perspective, i.e., harms created through dark patterns, to contour the business purpose. By juxtaposing and analyzing these perspectives, the paper shows that there might be a trade-off necessary for reaching optimality which is privacy respecting but less lucrative for businesses – a zero-sum game.




Authors
avatar for Kamesh Shekar

Kamesh Shekar

The Dialogue
Kamesh Shekar leads the Privacy and Data Governance Vertical at The Dialogue and was a Fellow at the Internet Society. His area of research covers informational privacy, surveillance technology, intermediary liability, safe harbour, issue of mis/disinformation on social media, AI... Read More →
avatar for Karthik Venkatesh

Karthik Venkatesh

1L J.D. Candidate, Villanova Charles Widger School of Law
I am currently a J.D. Candidate at Villanova University Charles Widger School of Law.I am a qualified attorney, licensed to practice in India. In my earlier role, I advised and implemented legislative interventions for a Senator in India. Post the stint with the senator, I worked... Read More →

Discussants
JC

Jean Camp

Indiana University


Saturday September 17, 2022 11:36am - 12:07pm EDT
Room NT01 WCL, 4300 Nebraska Ave, Washington, DC

11:36am EDT

Regulation of Radio Frequency Communications: The Untold History of “Harmful Interference”
Link to full paper

Abstract
This paper reviews the origins of a key, universal concept used in the international and domestic (United States) regulation of radio frequency communications: “harmful interference.” It also explores the etymology of the term “interference” and related terms as they evolved from the earliest days of wireless spectrum regulation. These terms and their official definitions are often criticized as cryptic, vague, amorphous, and ambiguous, resulting in excessive regulatory uncertainty and delays. Several technical experts frustrated with the current definitions have attempted to suggest alternative concepts and approaches to defining or quantifying interference. Others have defended the “flexible” definition of “harmful interference.” However, no one has explored the original meaning of these key concepts in the context of the regulation of radio frequency communications.

This paper digs deep into primary sources including international treaty documents, their original translation (and potential mistranslation) from the official language (French), and the deliberations of technical committees and national regulators. The paper starts with today’s interference terminology as embodied in the longstanding regulatory definitions, then traces their roots from international treaties (some of which were lost in translation) and U.S. Navy reports of the early 1900s. We reveal the evolutionary path through the 1940s to the 1970s and 1980s when the current definitions were solidified by international and domestic regulators. Understanding the original purposes, context, and usage of these definitions shed light on modern-day critiques and misuses of the vocabulary. This leads to follow-up research efforts that should explore the interpretations and applications of these concepts with, for example, the century-old, principal ex ante approach to avoiding “harmful interference”: the international and domestic Table of Frequency Allocations.


Authors
avatar for Carl Frank

Carl Frank

Telecommunications Policy Specialist, National Telecommunications and Information Administration
ICANN and ITU; High-tech competition law; global internet governance.
avatar for Peter Tenhula

Peter Tenhula

Senior Fellow, Spectrum Policy Initiative, Silicon Flatirons, University of Colorado

Discussants

Saturday September 17, 2022 11:36am - 12:07pm EDT
Room NT07 WCL, 4300 Nebraska Ave, Washington, DC

11:37am EDT

Impact of Municipal and Cooperative Internet Provision on Broadband Entry and Competition
Link to full paper

Abstract
The broadband market is unique for municipal (government-owned) and cooperative (member-owned) competitors. Their participation, however, raises conflict of interest concerns. Both municipalities and cooperatives are owners of utility poles that are an essential input for broadband deployment. Internet service providers (ISPs) must lease pole attachment space. While most investor-owned (i.e., private) pole attachment rates are regulated, municipal and cooperative pole owners are exempt by Section 224 of the Telecommunications Act. This paper studies the differential competitive effects of municipal and cooperative ISPs, on broadband entry and quality at the census block level. As part of this analysis, we additionally add to existing literature by designing a method to clean the Federal Communications Commission’s (FCC) Form 477 broadband data, building a geographic dataset for municipal and cooperative non-ISP service areas in Illinois, and developing a novel geographic entry threat model and creating a census block level measure of adjacency threat in Illinois. Looking at Illinois from June 2015 to December 2020, we find that the presence of a municipal ISP or a cooperative ISP lowers the probability of further market entry controlling for existing incumbents, adjacency threat by nearby ISPs, and other market factors.


Authors
TZ

Tianjiu Zuo

Duke University
MC

Michelle Connolly

Duke University

Discussants
avatar for Roxana Barrantes

Roxana Barrantes

Professor, Pontificia Universidad Catolica del Peru PUCP
Economics. ICT appropriation and use.


Saturday September 17, 2022 11:37am - 12:08pm EDT
Room Y403 WCL, 4300 Nebraska Ave, Washington, DC

11:37am EDT

Personal data on sale
Link to full paper

Abstract
Having reached an unprecedented degree of connectivity, we have become the target of countless organizations that aim to gain access to information about ourselves on many fronts, types, and circumstances of our lives. Like it or not, our personal communications devices are the source of data transmitted and shared with actors that find value in their using, processing, and even selling our data. Rendering personal data in exchange for free digital services, selling personal data at data marketplaces, and contributing personal data to national statistics organizations (i.e., a country’s census) are situations where our personal data are stored, processed and consumed by such actors.
Digital platforms derive a significant fraction of their revenue from advertisers who are allowed to access, retrieve, and manipulate the data that users, knowingly or not, generate continuously. While on the user edge of the platform, such personal information is collected without compensation to the user, on the advertiser edge, a market for the sale of personal information soars. Some analysts [1] consider that a market failure arises on the user edge where platforms provide free internet search or social networking. Further, on data marketplaces where data are sold and bought, individuals can sell their personal information while given varying degrees of privacy protection and assurance of anonymity. Finally, national census organizations rely on truthful disclosure of information by individuals and families, who entrust their governments with their data for the greater benefit society will enjoy if, and when, data-driven policies and decisions are made.
An underlying theme, and one whose importance has become increasingly visible, is people’s concern about how the privacy of their data is protected.
This paper proposes an analytical framework to understand the drivers of data value on the three institutions listed above while examining mechanisms in place or proposed for protecting the identity of data owners. It reviews the literature on data pricing and privacy protection to understand how individuals value their personal data, as value becomes a support for data pricing decisions.
We identify three pathways for personal data once the individual agrees to their release. Personal data may turn into a public good collected by a national census office; it can be sold at a data marketplace, or it can be “exchanged” for digital services at a digital platform. In all cases, we undertake an analysis of the trade-off between data value (or price where it applies) and privacy loss, identifying metrics that quantify it. Literature provides instances of this issue: [2] views the statistical reports coming from the census data as the product of deciding the optimal levels of two inputs, namely, statistical accuracy and privacy loss; a model is discussed to maximize the social value is of reporting accurately while protecting individuals’ privacy; [3] discusses legal approaches to monetize an individual’s behavioural surplus, that is, an individual’s data stored on a social network account. We contribute the preliminary results of lab experimentation with subjects who participate in reverse auctions aimed at purchasing their personal data with and without assurance of privacy protection.


Authors
avatar for Fernando Beltran

Fernando Beltran

Associate Professor, University of Auckland
https://www.auckland.ac.nz/en/business/our-research/innovation-value-creation/fernando-beltran.htmlhttps://youtu.be/DFZThlz109o

Discussants
avatar for Marcela Gomez

Marcela Gomez

Director of Research Analytics, University of Pittsburgh


Saturday September 17, 2022 11:37am - 12:08pm EDT
Room NT08 WCL, 4300 Nebraska Ave, Washington, DC

12:08pm EDT

Universal Broadband Assessment of Low Earth Orbit Satellite Constellations: Evaluating Capacity, Coverage, Cost, and Environmental Emissions
Link to full paper

Abstract
Launching of satellites results in greenhouse gas emissions due to the burning of fuels from the rocket vehicles. Previously, the environmental impact of launching satellites has been ignored due to the negligible amount of annual satellite launches. The emergence of ultra-dense satellite networks seeking to provide universal broadband has prompted the need to assess the associated emissions in providing connectivity. However, an integrated model for assessing the emissions associated with capacity, coverage, cost and demand that Low Earth Orbit (LEO) satellites provide does not exist. Here we develop an open-source integrated emission model for assessing LEO broadband satellites useful to system engineers, economist and policy makers in the quest for universal broadband. The application of the model for three LEO constellations reveals that Kuiper, Starlink and OneWeb emits ~25 g, ~18 g and ~ 1 g of the six common compounds (aluminum oxides, carbon oxides, sulphur oxides, chlorofluorocarbon gases (CFCs), particulate matter under 10 micrometers in diameter (PM10) and photochemical oxidation) for every megabit of data provided. We anticipate that the model will be a starting point for more sophisticated and accurate tools for studying the emissions produced in serving the unconnected using LEO satellites.


Authors
BO

Bonface Osoro

George Mason University
avatar for Edward Oughton

Edward Oughton

Assistant Professor, George Mason University

Discussants
avatar for Roxana Barrantes

Roxana Barrantes

Professor, Pontificia Universidad Catolica del Peru PUCP
Economics. ICT appropriation and use.


Saturday September 17, 2022 12:08pm - 12:40pm EDT
Room Y403 WCL, 4300 Nebraska Ave, Washington, DC

12:08pm EDT

Crowdsourced QoS Evaluation in Broadband: Data Analytics Challenges and New Approaches
Authors
CM

Cise Midoglu

Simula Metropolitan Center for Digital Engineering (SimulaMet)

Discussants

Saturday September 17, 2022 12:08pm - 12:40pm EDT
Room Y402 WCL, 4300 Nebraska Ave, Washington, DC

12:08pm EDT

Obstacles to Text- and Datamining Research: Copyright and More
Link to full paper

Abstract
Preliminary results of an international survey of researchers doing text- and datamining research shows a range of obstacles. Researchers experience challenges in access, use, sharing of data, and storage. The sources of the problems are high prices for proprietary data, terms of use that inhibit research, and legal concerns in areas including copyright, privacy and anti-hacking. Consequences of facing this range of obstacles include changing research design, delaying research, abandoning research, and failure to collaborate across jurisdictional borders. As policymakers and stakeholders discuss reform to relevant legal regimes, they should take into account the right to conduct research and the impact of overly complex, draconian, or protectionist measures on important research activity.


Authors
avatar for Patricia Aufderheide

Patricia Aufderheide

University Professor, American University
Patricia Aufderheide is University Professor of Communication Studies in the School of Communication at American University in Washington, D.C. She founded the School's Center for Media & Social Impact, where she continues as Senior Research Fellow. She is also affiliate faculty in... Read More →
BB

Brandon Butler

University of Virginia

Discussants
JC

Jean Camp

Indiana University


Saturday September 17, 2022 12:08pm - 12:40pm EDT
Room NT01 WCL, 4300 Nebraska Ave, Washington, DC

12:08pm EDT

When to Collect Sensitive Category Data? Working Towards a Participatory Framework for Balancing Privacy and Freedom from Discrimination in Automated Decision Systems in the Public Sector
Link to full paper

Abstract
Automated Decision Systems (ADS) are being used to inform important decisions in government services. Concerns regarding discrimination in ADS have led to the rise of bias mitigation techniques, or data science practices that measure and adjust for disparities based on protected class data. These techniques often require demographic or sensitive category data to both measure discrimination in ADS and process data to mitigate the discriminatory bias. The collection of sensitive category data increases privacy concerns. This preliminary study includes nine semi-structured interviews with data practitioners working in government. The analysis explores what considerations data practitioners in the public sector make when determining best practices for sensitive category data collection and how they engage with the tradeoff between privacy and right to freedom from discrimination. Themes pertinent to social services emerged including the importance of accessibility, reasons for data minimization and the role of reporting structures and historical norms. The analysis also offers considerations for ways that a structured framework and or stakeholder engagement process may inform the collection and use of sensitive category data, including the intersection of these decisions with the right to an explanation and the right to contest a decision.


Authors
Discussants
avatar for Marcela Gomez

Marcela Gomez

Director of Research Analytics, University of Pittsburgh


Saturday September 17, 2022 12:08pm - 12:40pm EDT
Room NT08 WCL, 4300 Nebraska Ave, Washington, DC

12:08pm EDT

Polycentric Governance in the US Amateur-Radio Community: Unassigned Spectrum and Promoting Open Innovation
Link to full paper

Abstract
Due to inherent difficulties in fully specifying contracting terms via formal agreements, societal services that are open-ended in nature, such as long-term innovation and training initiatives, may be underprovided in traditional market economies. We provide a case study of the US Amateur Radio (AR) community, documenting the original motivations for designating the AR spectrum band as well as the community’s longer-term contributions to broadening spectrum applications and training future spectrum experts. Our analysis suggests that the open-ended nature of the services provided by AR operators necessitates polycentric governance for efficient resource allocation, and therefore the current unassigned-spectrum model works well as a non-commercial alternative to excludable property rights. More generally, we argue that the AR service is a valuable experimental ground for generating a better understanding of how to design non-market resource allocation mechanisms for open-ended societal services.


Authors
avatar for Pedro Bustamante

Pedro Bustamante

Assistant Teaching Professor, University of Pittsburgh - School of Information Sciences, Carnegie Mellon University
avatar for Marcela Gomez

Marcela Gomez

Director of Research Analytics, University of Pittsburgh
MW

Martin Weiss

University of Pittsburgh
IM

Ilia Murtazashvili

University of Pittsburgh
avatar for William Lehr

William Lehr

Massachusetts Institute of Technology
AP

Ali Palida

University of Pittsburgh, GSPIA

Discussants

Saturday September 17, 2022 12:08pm - 12:40pm EDT
Room NT07 WCL, 4300 Nebraska Ave, Washington, DC

12:50pm EDT

Lunch, Student Paper Awards, Benton Early Career Award, Poster Award
Authors
avatar for Pedro Bustamante

Pedro Bustamante

Assistant Teaching Professor, University of Pittsburgh - School of Information Sciences, Carnegie Mellon University
KK

Katherine Kurata

Research Assistant, Tufts University - The Fletcher School of Law and Diplomacy
CC

Cole Campbell

University of Illinois at Chicago
avatar for Erezi Ogbo

Erezi Ogbo

Assistant Professor, North Carolina Central University
AK

Andrew Kearns

Northeastern University


Saturday September 17, 2022 12:50pm - 2:00pm EDT
Claudio Grossman Hall WCL, 4300 Nebraska Ave, Washington, DC

2:00pm EDT

Lessons from Past and Current Policy Experiments for Future U.S. Broadband Policy
This panel will critically examine broadband policy in the U.S. by interrogating lessons from past and current infrastructure programs and comparing them to emerging federal subsidy programs. It explores whether broadband policy has evolved sufficiently to address or redress unresolved problems from the last decade. A starting conjecture is whether sustainable forward-looking policy will require aligning supply-side and demand-side programs as well as complementary measures across local, state, and federal levels. The discussion will broadly examine the constraints and opportunities embedded in policies of the last decade to help answer a fundamental question: what actions can researchers and nonprofits undertake now to help individuals and communities avoid the insanity cycle that is embedded in U.S. broadband policy?

Moderators
AS

Alexis Schrubbe

Merrit Network

Panelists
avatar for François Bar

François Bar

University of Southern California
JM

Johannes M. Bauer

Michigan State University
JD

Joshua D. Edmonds

City of Detroit Office of Digital Inclusion
AR

Anna Read

Senior Officer, The Pew Charitable Trusts
avatar for Angela Siefer

Angela Siefer

executive director, National Digital Inclusion Alliance
Angela Siefer is the executive director of the National Digital Inclusion Alliance. Angela has been working in the field we now call digital inclusion since 1997. From physically setting up computer labs in underserved areas and managing local digital inclusion programs to consulting... Read More →
avatar for Sharon Strover

Sharon Strover

Professor, University of Texas-Austin
Our research group just finished examining 10 Digital Navigator programs in Texas.  We have some interesting findings on how to launch these programs!


Saturday September 17, 2022 2:00pm - 3:30pm EDT
Room NT01 WCL, 4300 Nebraska Ave, Washington, DC

2:00pm EDT

The Global Impact of TPRC: A retrospective view from offshoot conferences in Asia/Africa (CPRSouth), Latin America (CPR Latam) and Europe (EuroCPR)
Policy expertise and capacity building opportunities for ICT scholars and policymakers are often lacking in the Global South. Further, there are few opportunities for cross dialogue and knowledge sharing between industry, academia and government. Inspired by the success of TPRC (and later EuroCPR), two conferences were launched in the mid 2000s to address this gap: CPRSouth, which focused on South Asia and Africa, and CPR Latam, which focused on Latin America. Both shared the objective of creating a space for policy dialogue and knowledge sharing between ICT scholars and policymakers. This panel explores the contribution of TPRC-inspired conferences in different continents, with a strong focus on impacts in policy formation and capacity building in the ICT sector. Panelists will trace the different trajectories of these conferences, and reflect on their impacts on local policy capacity and their contributions to the broader academic field.

Moderators
avatar for Robin Mansell

Robin Mansell

Professor, London School of Economics

Panelists
avatar for Roxana Barrantes

Roxana Barrantes

Professor, Pontificia Universidad Catolica del Peru PUCP
Economics. ICT appropriation and use.
HG

Hernan Galperin

University of Southern California
AG

Alison Gillwald

Research ICT Africa
avatar for Rohan Samarajiva

Rohan Samarajiva

Founding Chair, LIRNEasia
Rohan Samarajiva is founding Chair of LIRNEasia, an infrastructure policy and regulation think tank active across emerging economies in South and South East Asia and the Pacific. LIRNEasia has been engaged in research on mobile network big data for development since 2012.  Before... Read More →


Saturday September 17, 2022 2:00pm - 3:30pm EDT
Room NT07 WCL, 4300 Nebraska Ave, Washington, DC

3:30pm EDT

Coffee Break sponsored by the Satellite Industry Association
Saturday September 17, 2022 3:30pm - 4:00pm EDT
Claudio Grossman Hall WCL, 4300 Nebraska Ave, Washington, DC

4:00pm EDT

The Anticompetitive Impacts of Exclusive Rights-of-Way and Unequal Subsidies in the Wireline Broadband Market
Link to full paper

Abstract
Local authorities are often involved in determining the competitive landscape of important services. In particular, Section 253 of the Telecommunications Act, in part, states that a local authority cannot 'prohibit or have the effect of prohibiting the ability of any entity to provide any interstate or intrastate telecommunications service.' Our paper will analyze how a local authority’s attempt to introduce competition (through subsidization of an ISP) in a high fixed cost and advanced technology industry, such as the broadband internet market, could actually worsen competition by restricting incumbents’ ability to compete and provide services. Our analysis will calibrate a simple model of intertemporal entry and competition of the broadband internet market to anonymized proprietary data obtained from a cable broadband provider. Our data consists of information on network buildout costs at various levels of the network, from the digging of the conduit network, to the last mile drop conduit. Our model will map out the space of a set of structural parameters where various competitive equilibria arise. Key parameters will reflect important aspects of the broadband internet market. Of particular interest are aspects that local authorities guide policies over, for example, the technological compatibility of subsidized infrastructure, fair access to subsidized infrastructure, and the granting of rights-of-way (ROW) to market participants. With the model’s parameter space mapped out we will discuss the considerations a local authority must consider before subsidizing an entrant ISP. Our research is of particular relevance to contemporary communications policy as access to affordable high-speed internet becomes an integral part of our lives, and federal, state and local authorities are looking for ways to achieve this.


Authors
YP

Yongjoon Paek

The Brattle Group
avatar for Coleman Bazelon

Coleman Bazelon

Principal, The Brattle Group
PS

Paroma Sanyal

The Brattle Group
RY

Rui Yu

Independent

Discussants
avatar for Edward Oughton

Edward Oughton

Assistant Professor, George Mason University


Saturday September 17, 2022 4:00pm - 4:31pm EDT
Room Y402 WCL, 4300 Nebraska Ave, Washington, DC

4:00pm EDT

How to Build New Infrastructure-- Lessons from the Past
Link to full paper

Abstract
The 2021 Infrastructure Investment and Jobs Act authorized the expenditure of billions of dollars to improve broadband connectivity in underserved and unserved areas. In determining how these funds are spent, government agencies will have to consider how different network architectures meet short- and long-term government goals. For example, money can be allocated to promote short-term goals, such as 25/3 Mbps connectivity, or a robust technological ecosystem that provides flexibility for the introduction of yet unknown services, at higher speeds. When considering these alternatives, policymakers should consider the trade-off between minimizing short-run costs and building a robust, yet more expensive, flexible network.

There are two key episodes in telecommunications history where there were similar, major shifts in the design of the communications network. In the last decade of the nineteenth century, the local exchanges were rebuilt, in large part, in order to provide a new service, long-distance telephony. The second event was in the 1980s. At that time futurists envisioned a more data-intensive world, and consequently, networks were upgraded, or built on a stand-alone basis, to handle the data traffic. As part of this process, the Internet was introduced. Both in the 1890s and 1980s, decision-makers had to consider how the network design was impacted by the future demands of end-users.

The purpose of this research is to review how decision-makers, both those working for telecommunications suppliers, as well as within government agencies, resolved the question of how to build networks that satisfied the short and long-term needs of end-users. There was a tremendous amount of uncertainty associated with the demand for long-distance and data services, and this range of possibilities meant that it was not clear how the new networks should be designed. This research will, among other things, explain how decision-makers determined demand forecasts, as well as the important role externalities and economies of scope had in the decision to integrate services onto one network.

We are in the process of a third rebuilding of the communications network—the construction of broadband networks. The history from the 1890s and 1980s provides guidance to policymakers on how to trade off the short- and long-term advantages associated with different broadband network architectures.


Authors
DG

David Gabel

City University of New York, CUNY Queens College - Department of Economics


Saturday September 17, 2022 4:00pm - 4:31pm EDT
Room Y403 WCL, 4300 Nebraska Ave, Washington, DC

4:00pm EDT

Assessing factors influencing the adoption of Technology in the Port Supply Chain Industry in West Africa Sub-region: A case study of Integrated Customs System in Ghana
Link to full paper

Abstract
The study investigated factors influencing the adoption of technology in the port supply chain industry in the West African Sub-region, using the Ghana Customs Integrated System(GCIS) as a case study. This non-experimental quantitative study leveraged the extended unified theory of the acceptance and use of technology (UTAUT2) as the theoretical foundation to assess whether performance expectancy (PE), behavioral intent (BI), effort expectancy (EE), social influence (SI), facilitating conditions (FC), hedonic motivation (HM), price value (PV), and habit (HT) were predictors of the intention of port users to participate in a GCIS in the port sector while moderated by age. The sample comprises 906 individuals who live in Ghana and work in the formal sector of the port industry. SurveyMonkey platform sent a solicitation email to individuals who met the inclusion criteria with a link that allowed consenting participants to complete a questionnaire of 32 questions. The study used principal component analysis (PCA) and confirmatory factor analysis (structural equation modeling) to analyze and report data. Findings show that only performance expectancy, effort expectancy, and habit influenced the behavioral intention of port users to participate in the integrated customs management system in the Ghanaian port sector. Facilitating conditions, social influence, hedonic motivation, and price value did not affect behavioral intention. Neither did age have a moderating effect on any variable’s influence on behavioral intention. This study offers a deeper insight into the adoption of BYOD in the Ghanaian workplace. The findings can help researchers explain the variations in the UTAUT2 theoretical framework predictions relative to the different sectors within the port supply chain. Researchers who intend to use the UTAUT2 theoretical framework to understand employees' BI to enroll in the GCIS program will now consider PE, EE, and HT the most effective adoption factors. From a practical perspective, the study will help managers or organizations in Ghana and the sub-region focus on the critical constructs as the first steps to implementing GCIS in the port sectors. On the other side, port users will also understand their role relative to performance expectancy, effort expectancy, and the habit to cultivate GCIS.


Authors
AA

Ahmed Antwi-Boampong

Ghana Communications Technology University
DK

David King Boison

Ghana Communications Technology University
avatar for Josephine Agbedoawu

Josephine Agbedoawu

University of the Witswatersrand
PhD Student
AB

Augustine Blay

Capella University
MO

Musah Osumanu Doumbia

Accra Technical University


Saturday September 17, 2022 4:00pm - 4:31pm EDT
Room NT08 WCL, 4300 Nebraska Ave, Washington, DC

4:00pm EDT

Friction-In-Design Regulation as 21st Century Time, Place and Manner Restriction
Link to full paper

Abstract
Digital networked society needs friction-in-design regulation that targets the digital architectures, supposedly smart (data-driven, algorithmic) systems, and interfaces that shape human interactions, behavior, and will (beliefs, preferences, values, intentions). The relentless push to eliminate friction for the sake of efficiency has hidden social costs that affect basic human capabilities and society. A general course-correction is needed.

Friction in the digital networked environment can come in many forms. It can be as simple as a time delay prior to publishing a social media post, a notice that provides salient information coupled with a nudge toward actual deliberation, or a query that tests comprehension about important consequences that flow from an action–for example, when clicking a virtual button manifests consent to share information with strangers. We explore many examples using a simple descriptive framework that helps analysts compare and evaluate them.

One major obstacle in the United States to almost any regulation of how private companies design digital networked technologies and govern social interactions online is the First Amendment and its rigorous protections for free speech. The First Amendment has so often been used to strike down government regulation of various forms of speech that it now has a powerful preemptive effect, which some have called First Amendment Lochnerism. We are most concerned with the foreclosure of regulatory imagination and thus consideration and exploration of new regulatory possibilities, such as friction-in-design regulation.

In this article, we clear the First Amendment brush and reveal an open and mostly underappreciated regulatory territory to explore. We argue that friction-in-design regulation should be understood as Twenty-First century time, place and manner restrictions, akin to laws that prohibit using megaphones in the middle of the night, require permits before marches, and prohibit adult theaters in residential neighborhoods. This does not mean that friction-in-design regulation would escape First Amendment scrutiny altogether, of course. But it would trigger intermediate rather than strict scrutiny, so long as the friction-in-design regulation remained content neutral. In other words, not all friction-in-design regulations would qualify as content neutral time, place, and manner restrictions. We discuss various examples.

At the same time, we advance a novel governance theory that casts time, place and manner restrictions as a useful regulatory model to bring online from the offline context and conventional First Amendment jurisprudence. Properly understood, designed and applied, time, place and manner restrictions constitute a system for balancing individual freedom to communicate with the collective (state) interest in maintaining social order and peace, both offline and online.


Authors
SB

Susan Benesch

Dangerous Speech Project; Harvard University - Berkman Klein Center for Internet & Society
BF

Brett Frischmann

Villanova University

Discussants
YP

YongJin Park

Howard Univ and BKC Harvard


Saturday September 17, 2022 4:00pm - 4:31pm EDT
Room NT01 WCL, 4300 Nebraska Ave, Washington, DC

4:00pm EDT

Fast Interference Management
Link to full paper

Abstract
Interference management is the set of activities and processes executed to enhance electromagnetic compatibility and prevent, prepare for, respond to, and recover from electromagnetic interference. Traditional interference management processes have been slow and manual, occurring far in advance of operation or long after an interference event. In the emerging era of dynamic spectrum sharing, interference management must become much faster, which means many processes must be automated. This paper analyzes key issues associated with the transition to fast, automatic interference management. We define a new subcategory of interference, actionable interference, that is appropriate for use in automatic systems. We describe the options and tradeoffs available for ex ante prevention and ex post response by automatic systems. We define a model for the speed of interference management and assess the choices facing regulators and others from the perspective of speed. We present an implementation architecture based on control systems theory and use it to show how regulatory actions and rights trading interact with automatic interference management systems. An annex makes the case that aggregate interference limits are harmful and should be avoided in future regulation.


Authors
Discussants
avatar for Jon Peha

Jon Peha

Professor and Center Director, Carnegie Mellon University


Saturday September 17, 2022 4:00pm - 4:31pm EDT
Room NT07 WCL, 4300 Nebraska Ave, Washington, DC

4:31pm EDT

Swords and Shields: Impact of Private Standards in Technology-Based Liability
Link to full paper

Abstract
Private voluntary standards are playing an ever greater role in the governance of many emerging technologies, including autonomous vehicles. Government regulation has lagged due to the 'pacing problem' in which technology moves faster than government regulation, and regulators lack the first-hand information that is mostly in the hands of industry and other experts in the field who often participate in standard-setting activities. Consequently, private standards have moved beyond historical tasks such as inter-operability to now produce quasi-governmental policy specifications that address the risk management, governance, privacy risks of emerging technologies. As the federal government has prudently concluded that promulgating government standards for autonomous vehicles would be premature at this time and may do more harm than good, private standards have become the primary governance tool for these vehicles. A number of standard-setting organizations, including the SAE, ISO, UL and IEEE have stepped forward to adopt a series of inter-locking private standards that collectively govern autonomous vehicle safety. While these private standards were not developed with litigation in mind, they could provide a useful benchmark for judge and juries to use in evaluating the safety of autonomous vehicles and whether compensatory and punitive damages are appropriate after an injury-causing accident involving an autonomous vehicle. Drawing on several decades of relevant case law, this paper argues that a manufacturer’s conformance with private standards for autonomous vehicle safety should be a partial shield against liability, whereas failure to conform to such standards should be a partial sword used by plaintiffs tor lack of due care.


Authors
GM

Gary Marchant

ASU - College of Law

Discussants
avatar for Edward Oughton

Edward Oughton

Assistant Professor, George Mason University


Saturday September 17, 2022 4:31pm - 5:02pm EDT
Room Y402 WCL, 4300 Nebraska Ave, Washington, DC

4:31pm EDT

Purposeful Mobile Internet Adoption and Use in United States: A Geodemographic and Socioeconomic Analysis
Link to full paper

Abstract
The digital divide in the United States has received renewed attention during the COVID-19 pandemic. As achievement of digital equity towards the creation of a mature and inclusive digital society remains a high priority, this study examines spatial patterns and socioeconomic determinants of the purposeful use of mobile internet for personal and business needs in US states. Spatial agglomerations of purposeful mobile internet use are identified using K-means clustering and differences between clusters are observed. By borrowing from Adoption-Diffusion Theory and the Spatially Aware Technology Utilization Model, a conceptual model of purposeful mobile internet use posits associations of 12 independent demographic, occupational, innovation, social capital, affordability, and freedom variables with 12 dependent indicators of purposeful mobile internet use. Ordinary Least Squares (OLS) regression analysis reveals that mobile internet use is associated with age structure, employment in management, business, science, and arts occupations, affordability, and the extent of freedom in US states. Implications of these findings are discussed and policy recommendations are provided.


Authors
AS

Avijit Sarkar

University of Redlands
JP

James Pick

Professor, University of Redlands
GB

Geeta Bhat

University of Redlands


Saturday September 17, 2022 4:31pm - 5:02pm EDT
Room Y403 WCL, 4300 Nebraska Ave, Washington, DC

4:31pm EDT

Do Mobile Applications Give Competitive Advantage To Small And Medium Enterprises? Lessons From Indonesia
Link to full paper

Abstract
This study empirically ascertains the effect of the mobile-app-based business process (MAP) of the Small and Medium enterprises (SME) on its competitive advantage in the Indonesian Context. We identify essential factors using the Theory of Consumption Values and the Theory of Planned Behavior that influence MAP. Data for this quantitative study were collected from SMEs in Indonesia. To evaluate the relationship between observable and unobservable constructs we used structural equation modeling (SEM) and Smart partial least square (PLS) version 3.3.9 to test the model fit with the data statistically. The study finds that consumer choice behavior, attitude toward mobile apps, perceived behavioral control, and subjective behavioral control positively and significantly affect the mobile app-business process. MAP also can positively improve SMEs’ competitive advantage. This study contributes to the development of the Theory of Consumption Values and Theory of Planned Behavior, and their effect on the performance of SMEs in the context of the mobile-app-based business processes. This study also provides managerial implications on how to increase the competitiveness of SMEs through the development of MAP.


Authors
KA

Karto Adiwijaya

DEPARTEMEN MANAJEMEN FAKULTAS EKONOMI UNIVERSITAS INDONESIA
IR

Ibrahim Rohman

University of Indonesia Jakarta
MZ

Moinul Zaber

United Nations University; University of Dhaka


Saturday September 17, 2022 4:31pm - 5:02pm EDT
Room NT08 WCL, 4300 Nebraska Ave, Washington, DC

4:31pm EDT

Close Encounters: Gauging Residents’ Comfort and Trust Levels with Smart Technologies during Datawalks
Link to full paper

Abstract
For this study, the researcher led 32 study participants on a 1.5 mile community “datawalk” in Long Beach—the second largest city in Los Angeles County, with a population of nearly 500,000—to gain insights into the trust and comfort levels residents feel when encountering smart technologies that track their movements and capture their image. During the walk, study participants used a custom mobile app to map and photograph each smart technology observed. Participants then responded to several prompts on the app intended to gauge their perceptions of various smart technologies—including surveillance cameras, public WiFi routers and license plate readers. The analysis, which relied on a “culture of trust” framework, found that study participants are generally unaware of the ubiquitous nature of surveillance technologies deployed by both public and private entities, and can only speculate on how personal information collected is stored, shared and analyzed. Study participants expressed concern about the discriminatory impacts of smart technologies, particularly those used by law enforcement. The study findings will inform development of a data privacy platform aimed at providing Long Beach residents with greater agency over City use of their data.



Authors
GS

Gwen Shaffer

California State University Long Beach

Discussants
YP

YongJin Park

Howard Univ and BKC Harvard


Saturday September 17, 2022 4:31pm - 5:02pm EDT
Room NT01 WCL, 4300 Nebraska Ave, Washington, DC

4:31pm EDT

Good Enough?
Link to full paper

Abstract
The FCC’s Broadcast Incentive Auction repurposed 70 MHz of spectrum from use for over-the-air television broadcasts to mobile broadband uses. This incentive auction was likely the most complicated auction in history and overcame numerous technical, engineering and auction design issues. Its central structure was to run a procurement auction for a target clearing of MHz to determine the reserve price in the forward auction when those MHz were sold for mobile broadband deployments. A significant amount of the complexity of the auction was required to ensure that all of the TV license sales were completely voluntary. The auction is widely considered a great success. This paper demonstrates that there may be another side to the story that warrants a closer look.

The success or failure of an auction can be judged by several metrics such as maximizing auction receipts, ensuring the efficient use of spectrum, avoiding excessive concentration of spectrum, introducing competition in the wireless marketplace, and so on. I contend that while this auction may have been a success in some dimensions, it failed in others.

As an initial matter, it was understood that the value of the entire over-the-air television industry was likely less than the value of the spectrum they used. Recognizing that much of that industry could survive without physical over-the-air broadcasts (which only served a small fraction of their viewers) the actual cost to the industry of giving up their spectrum was surely much less than the value of that spectrum. This means that any auction (or other policy) that left any meaningful amount of spectrum in over-the-air TV broadcasts left spectrum used inefficiently.

The Broadcast Incentive Auction was less ambitious.  It only sought to ensure, through a purely voluntary mechanism, that for the repurposed spectrum, the mobile broadband licensees’ willingness-to-pay exceeded the broadcasters willingness-to-accept. By this metric, the auction failed.  Under the auction design implemented, the initial clearing target of 130 MHz revealed a broadcasters willingness-to-accept of about $86 billion.  However, those same stations subsequently revealed a purely voluntary willingness-to-accept in subsequent stages of the auction of less than $27 billion.  This amount was easily within the forward auction bidders’ willingness-to-pay.  Simple auction design changes could have revealed the broadcasters much lower willingness-to-accept much earlier in the auction, leading to significantly more spectrum being repurposed.



Authors
avatar for Coleman Bazelon

Coleman Bazelon

Principal, The Brattle Group

Discussants
avatar for Jon Peha

Jon Peha

Professor and Center Director, Carnegie Mellon University


Saturday September 17, 2022 4:31pm - 5:02pm EDT
Room NT07 WCL, 4300 Nebraska Ave, Washington, DC

5:02pm EDT

Safeguarding Competition in Digital Markets: A Comparative Analysis of Emerging Policy and Regulatory Regimes
Link to full paper

Abstract
This paper presents a comparative analysis of the main policy and regulatory regimes currently suggested in the research literature to promote competition in digital markets. We review the causes of concentration in several digital markets, and differentiate the roles of structural and behavioral remedies to promote competition for and in incumbent digital platforms. Then, we analyze five regimes currently suggested in the research literature and explored by practitioners, ranging from precautionary competition policy and traditional ex ante regulatory remedies to ex post competition policy enforcement, ex post regulation and various self-regulation and co-regulation mechanisms. Finally, we discuss the appropriateness, tradeoffs, and challenges of applying the alternative regimes to four prototypical country scenarios with different microeconomic conditions. In a time when imitation is widespread, we conclude that policy and regulatory regimes, to be effective to promote competition and investment in digital markets, should observe country-specific, developmental, innovation, and market conditions and incentives. We also conclude that ex post competition policy and regulatory regimes might provide a better balance between raising contestability of digital markets and keeping incentives for innovation in most country scenarios, while the effectiveness of ex ante remedies is very dependent on exogenous conditions. This analysis should help policymakers to design measures to promote competition and investment in the digital economy, considering their local context and the tradeoffs of each regime currently proposed in the research literature.


Authors
TS

Tiago Sousa Prado

Michigan State University

Discussants
avatar for Edward Oughton

Edward Oughton

Assistant Professor, George Mason University


Saturday September 17, 2022 5:02pm - 5:40pm EDT
Room Y402 WCL, 4300 Nebraska Ave, Washington, DC

5:02pm EDT

The Solution is in the Details: Building Cybersecurity Capacity in Europe
Link to full paper

Abstract
In December 2020, the European Union (EU) launched a new Cybersecurity Strategy. Accomplishing its aims will require a balancing of national and supranational direction across member states to meet both their national cybersecurity priorities and their commitments with the European Community.

Beyond the EU, the 2020 Strategy is envisioned to support the principles of the Paris Call for Trust and Security in Cyberspace in a context of a polarised international debate on cyber norms. This adds another layer of complexity specially for the 2020 Strategy goals to support EU partners in strengthening their cybersecurity capacity.

This paper uses theoretical and empirical methodologies to answer the question on how the 2020 Strategy should be implemented to ensure cybersecurity capacity building internally and externally. A gap analysis of the 2020 Strategy using two different frameworks, a framework on national cybersecurity capacities and another framework on principles of cyber norms, allows to make hypotheses on how the 2020 Strategy should be successfully implemented within EU member states and beyond. Moreover, we use data on cybersecurity capacity for above 80 countries to test whether the empirical evidence supports our hypotheses. Regarding building capacity internally, we find that the 2020 Strategy should prioritise social and cultural aspects of cybersecurity to booster the effects of investing in the core national capacities required in it. Moreover, we find that countries more mature in cybersecurity capacity are more likely to have states supporting the Paris Call, and this evidence suggests that the EU efforts in building capacity externally can support the advancement of the Principles of the Paris Call. Finally, we propose a flexible framework for capacity building that would enable states to progress in achieving broad principles and collaborating in operational cybersecurity functions to achieve a common aim, without necessarily needing to agree on the details of their implementation.



Authors
SC

Sadie Creese

University of Oxford
avatar for William Dutton

William Dutton

Quello Professor, University of Oxford
My colleagues and I recently completed a study of search and politics, and I continue to work on my concept of The Fifth Estate. Happy to speak with anyone about any aspect of Internet studies, that very much includes study of social media and society.
PE

Patricia Esteve-Gonzalez

University of Oxford
MG

Michael Goldsmith

University of Oxford
EN

Eva Nagyfejeo

Independent
JS

Jamie Saunders

University of Oxford
BV

Basie von Solms

University of Johannesburg
CW

Carolin Weisser Harris

University of Oxford


Saturday September 17, 2022 5:02pm - 5:40pm EDT
Room Y403 WCL, 4300 Nebraska Ave, Washington, DC

5:02pm EDT

Wearables from Head to Toe: Are They Friend or Foe? An Empirical Landscaping of Health and Fitness Wearables and Apps in Six Countries to Identify Emerging Policy Challenges
Link to full paper

Abstract
Research rationale:

Market for wearable devices and applications designed for personal health and fitness has significantly increased in recent years and this segment is expected to continue growing. Furthermore, the boundaries between this segment and the smartphone and smartwatch segments are blurring as more and more smart devices offer functions previously only associated with standalone wearables. This makes it increasingly difficult to understand the full scope of when and how people use corresponding functions. Thorough knowledge about usage patterns will become important as the sensors and apps used for health and fitness services increase the granularity of behavior tracking. The data generated by these services will give valuable insights into people's physical and mental health. Policymakers will also need to take a nuanced approach when handling these issues to preserve fair conduct and competition as the data collected will be intimate in nature, and the data's impact on the health and pharmaceutical industry could be huge.

Research objectives:

Our paper sets out to (1) define a scope for the variety of devices, apps, and functions currently used by consumers to monitor and affect their health or fitness status. We further seek to (2) shed light on the actual usage patterns of these devices, apps, and functions, as well as what specific combinations of devices and apps consumers rely upon. Finally, we will (3) collect data on consumers’ attitudes towards the helpfulness and accuracy of self-tracking, use cases for wearables, and the (potential) sharing of this collected data for medical diagnoses and treatment purposes.

Methods:

To fulfill these research objectives, we conducted representative online surveys relying on a stratified sampling approach in six countries (China, France, Germany, Italy, UK, and the US) featuring a sample of n>3,000 respondents in each country. A professional market research agency carried out the fieldwork and oversaw translation of the questionnaire into local languages. The fieldwork was carried out in late April 2022 and early May 2022.

Results and implications:

Our paper shows that: the omnipresent smartphone whose sensors can be accessed by various health and fitness apps remains the key platform for consumers when it comes to health and fitness; adoption rates for apps from within major digital ecosystems are similar to the ones we found for third-party apps; smartwatches constitute the second most relevant category of devices in the health and fitness space with substantial additional market potential; consumers are broadly open to using even niche and emerging wearables such as smart rings, skin patches, and PEMF headbands; both general and exercise specific tracking features are the most popular functions among consumers across age groups, while social and sharing functions do not resonate strongly with them; and that additional devices commonly also add a new (companion) app to the user portfolio of health and fitness apps. Based on these findings, we would expect a wider variety of apps to be used as the trend to consumer IoT unfolds. We have also found that consumers are positively inclined towards health and fitness technologies. Users of related devices and apps largely agree that these technologies help them achieve their exercise goals. They furthermore perceive the readings of their trackers to be accurate. However, we found more skeptical views when it comes to sharing the collected data with physicians or using collected data to detect illness early on. Our findings also underscore the importance of health and fitness technology for consumers and the likelihood of continued growth in this segment. So far, we did not find any indications of concerns related to digital ecosystem dominance. In fact, our results point instead to an increasing variety of apps being used as consumers adopt more devices. The low interest from respondents in sharing their records or collected data illustrates once more the value that consumers attach to self-determination when it comes to managing their online presence and the concern they have with keeping their data private.


Authors
AS

Anna Schneider

Professor of business psychology, Hochschule Fresenius-University of Applied Sciences
RA

Rene Arnold

Huawei Technologies Co. Ltd


Saturday September 17, 2022 5:02pm - 5:40pm EDT
Room NT08 WCL, 4300 Nebraska Ave, Washington, DC

5:02pm EDT

Assessing the Depth and Importance of the Privacy Policies of Children’s MMO Games
Link to full paper

Abstract
Over the past two decades, children have been drawn to online communities by using massively multiplayer online (MMO) video games, platforms in which users can interact with one another in an online setting in which communication is highly encouraged. These digital communities can be seen as an effective educational tool or entertainment source but can create controversies, such as adults with malicious intent exposing children to inappropriate content. State and federal acts are used to mitigate and hold companies accountable for their behavior, such as the California Privacy Rights Act and the Children's Online Privacy Protection Act (COPPA), often reported by users of the websites. However, companies still violate these acts through manners including, but not limited to, disclosing private information, allowing third-party targeted ads, and failing to obtain parental consent. Therefore it is crucial to investigate the breadth and depth of these privacy policies impacting children.

This comparative textual analysis will look at four MMOs’ privacy policies: Roblox, Club Penguin (now defunct), Wizard 101, and Animal Jam Classic. These four games are selected based on their popularity during their peaks, including a free-chat function, and targeting children as the primary audience. While parents often oversee their children’s usage, minors may still create accounts on these websites without parental permission and play without realizing the risks. More specifically, while parents are liable for their children’s Internet usage and understand the risks, children will still circumvent this. Children are considered a vulnerable audience, with stricter guidelines in place regarding online use. With this in mind, children are still protected under the Fourth Amendment and have some privacy rights under the law. There is balancing necessary to understand how children have the right to privacy from their parents and peers.

As a result, there is value in analyzing these policies to determine and establish the risks for children in using MMO video games; thus, this paper has three goals. First, this paper will define what can be considered an 'overreach' of children’s privacy. It’s essential to set this distinction to set guidelines usable for digital platforms (not restricted to only MMOs) to encourage consistency. Second, this paper looks to determine significant similarities and differences in the policies across the four platforms. The four platforms have the same goal; hence, it’s beneficial to highlight how these policies vary to create a larger picture of the privacy risks. In addition, each platform has various layers and terminology to aid consumers interested in reading how the website functions and uses its data, which is an essential distinction in creating the set guidelines.


Authors
ES

Erika Solis

Penn State

Discussants
YP

YongJin Park

Howard Univ and BKC Harvard


Saturday September 17, 2022 5:02pm - 5:40pm EDT
Room NT01 WCL, 4300 Nebraska Ave, Washington, DC

5:02pm EDT

How I Learned to Stop Worrying and Love the Windfall
Link to full paper

Abstract
Many attempts to increase the flexibility of wireless spectrum rights meet objections that the method of reallocation will result in a windfall. Far from being objectionable, however, allowing windfalls in spectrum reallocation creates virtuous incentives. Furthermore, spectrum windfalls are permitted by law.

KEY TAKEAWAYS
▪ Past restrictions on the supply of flexible-use rights to spectrum have resulted in a system that is not
in the public interest but is nevertheless difficult to unravel.
▪ Process that could increase flexibility necessary for efficient spectrum use often produce “windfalls”
that many find objectionable.
▪ The prospect of a windfall creates the incentive to use one’s spectrum efficiently and to volunteer
restrictive licenses for reallocation, both of which benefit the public.
▪ Though some legal maxims disfavor windfalls, the laws and precedents applicable to spectrum
reallocation permit spectrum arrangements that result in windfalls


Authors
avatar for Joe Kane

Joe Kane

Director of Broadband and Spectrum Policy, Information Technology and Innovation Foundation

Discussants
avatar for Jon Peha

Jon Peha

Professor and Center Director, Carnegie Mellon University


Saturday September 17, 2022 5:02pm - 5:40pm EDT
Room NT07 WCL, 4300 Nebraska Ave, Washington, DC
 
Filter sessions
Apply filters to sessions.