scholarly journals Interoperability as a tool for competition regulation

Author(s):  
Ian Brown

Interoperability is a technical mechanism for computing systems to work together – even if they are from competing firms. An interoperability requirement for large online platforms has been suggested by the European Commission as one ex ante (up-front rule) mechanism in its proposed Digital Markets Act (DMA), as a way to encourage competition. The policy goal is to increase choice and quality for users, and the ability of competitors to succeed with better services. The application would be to the largest online platforms, such as Fa-cebook, Google, Amazon, smartphone operating systems (e.g. Android/iOS), and their ancil-lary services, such as payment and app stores. This report analyses up-front interoperability requirements as a pro-competition policy tool for regulating large online platforms, exploring the economic and social rationales and pos-sible regulatory mechanisms. It is based on a synthesis of recent comprehensive policy re-views of digital competition in major industrialised economies, and related academic litera-ture, focusing on areas of emerging consensus while noting important disagreements. It draws particularly on the Vestager, Furman and Stigler reviews, and the UK Competition and Markets Authority’s study on online platforms and digital advertising. It also draws on interviews with software developers, platform operators, government officials, and civil so-ciety experts working in this field.

2020 ◽  
Author(s):  
Ian Brown

Interoperability is a technical mechanism for computing systems to work together – even if they are from competing firms. An interoperability requirement for large online platforms has been suggested by the European Commission as one ex ante (up-front rule) mechanism in its proposed Digital Markets Act (DMA), as a way to encourage competition. The policy goal is to increase choice and quality for users, and the ability of competitors to succeed with better services. The application would be to the largest online platforms, such as Fa-cebook, Google, Amazon, smartphone operating systems (e.g. Android/iOS), and their ancil-lary services, such as payment and app stores. This report analyses up-front interoperability requirements as a pro-competition policy tool for regulating large online platforms, exploring the economic and social rationales and pos-sible regulatory mechanisms. It is based on a synthesis of recent comprehensive policy re-views of digital competition in major industrialised economies, and related academic litera-ture, focusing on areas of emerging consensus while noting important disagreements. It draws particularly on the Vestager, Furman and Stigler reviews, and the UK Competition and Markets Authority’s study on online platforms and digital advertising. It also draws on interviews with software developers, platform operators, government officials, and civil so-ciety experts working in this field.


2021 ◽  
pp. 359-388
Author(s):  
Liza Lovdahl Gormsen

In Chapter 14, Liza Lovdahl Gormsen considers the contemporaneous debate on how best to address aspects of the interaction between competition law and the digital economy. She stressed that data is the pinnacle of the digital economy. It has fuelled amazing innovations in all sectors of the economy, but the accumulation of data in the hands of a few global companies may lead to lock-in, bottleneck issues, and leverage. The chapter notes that according to the report Unlocking Digital Competition, which was prepared for the UK Treasury, competition policy will need to be updated to address the novel challenges posed by the digital economy. Some of these updates can happen within current powers, but legal changes are important to ensure that this job can be done effectively. The Competition and Markets Authority’s market study on Online Platforms and Digital Advertising recommends establishing a Digital Markets Unit and ex ante regulation as a possible way forward. Building on the outputs from the Furman Review, the government asked the CMA to lead a Digital Markets Taskforce. In December 2020, the latter published its advice, A New Pro-competition Regime for Digital Markets, where it sets out the role of the Digital Markets Unit and an overview of its proposed regulatory framework for digital firms. This chapter looks at some of the challenges for UK competition policy in digital markets, in particular in relation to data, enforcement, and regulation. It also touches upon some of the potential issues that the UK faces in the digital economy following Brexit.


2017 ◽  
Vol 4 (1) ◽  
pp. 205395171769075 ◽  
Author(s):  
Andrew Schrock ◽  
Gwen Shaffer

Government officials claim open data can improve internal and external communication and collaboration. These promises hinge on “data intermediaries”: extra-institutional actors that obtain, use, and translate data for the public. However, we know little about why these individuals might regard open data as a site of civic participation. In response, we draw on Ilana Gershon to conceptualize culturally situated and socially constructed perspectives on data, or “data ideologies.” This study employs mixed methodologies to examine why members of the public hold particular data ideologies and how they vary. In late 2015 the authors engaged the public through a commission in a diverse city of approximately 500,000. Qualitative data was collected from three public focus groups with residents. Simultaneously, we obtained quantitative data from surveys. Participants’ data ideologies varied based on how they perceived data to be useful for collaboration, tasks, and translations. Bucking the “geek” stereotype, only a minority of those surveyed (20%) were professional software developers or engineers. Although only a nascent movement, we argue open data intermediaries have important roles to play in a new political landscape.


EU Law ◽  
2020 ◽  
pp. 1126-1162
Author(s):  
Paul Craig ◽  
Gráinne de Búrca

All books in this flagship series contain carefully selected substantial extracts from key cases, legislation, and academic debate, providing students with a stand-alone resource. This chapter focuses on another principal provision concerned with competition policy: Article 102 TFEU. The essence of Article 102 is the control of market power, whether by a single firm or, subject to certain conditions, a number of firms. Monopoly power can lead to higher prices and lower output than would prevail under more normal competitive conditions, and this is the core rationale for legal regulation in this area. Article 102 does not, however, prohibit market power per se. It proscribes the abuse of market power. Firms are encouraged to compete, with the most efficient players being successful. The UK version contains a further section analysing issues concerning EU competition law and the UK post-Brexit. EU law


Author(s):  
A. D. Smith

Even before September 11, 2001, security and privacy was a concern to nearly 80% of the current and potential Internet users around the globe, according to survey released by the Information Technology Association of America (ITAA) (Poulsen, 2000). The survey, commissioned by the American Express Company, randomly polled 11,410 people in 10 countries, and found that nearly half of the respondents enjoyed some form of Internet access. As might be expected, most of the world’s Internet users utilize Internet for e-mail, browsing, and entertainment. However, fewer than 28% do some shopping online, and 24% use the Internet for banking and financial transactions. But when Internet users and non-users of many countries were asked if they agree with the statement, “I am or would be concerned about security and privacy issues when purchasing or making financial transactions online,” 79% agreed. Prior to the tragedy of September 11, 2001, U.S. citizens also expressed legitimate concerns toward the issues of privacy and security, with an 85% showing. The poll released by the Information Technology Association of America also illustrated that approximately 80% have doubts about the U.S. government’s ability to maintain computer security and privacy. Hence, protecting operating systems is a major strategic concern if the success of e-government as a whole is to reach its potential. Although most of these issues are typically not discussed in relationship with e-government, the need for trusted computing systems within e-business and computing systems can be made as an effective argument that all these issues affect e-government systems as well. Secure computing systems issues in terms of e-government are just as important.  The scope of this article is to present a description of one the most generally known security certifications; namely, the trusted computer system evaluation (TCSEC) and its commercial implementation procedure in the commercial product evaluation process and discuss the influence of this evaluation/certification on the incidence of hacker attacks on e-business. As evident by the abundance of marketing literature of different operating systems for e-business that frequently refers to its security strength ranked against popular security certifications, it is very common to rank commercially available operating systems against TCSEC evaluation and/or certification criteria. This article will also explore where the many operating systems stands on this particular evaluation. In essence, given the vulnerabilities exposed after September 11, 2001, strategic security managers should be deeply concerned that the e-business platform they are responsible for contains the highest security standards to prevent any type of potentially harmful hacker attacks. Managers need to have a working knowledge of TCSEC security evaluation/certifications to become better informed when choosing the e-security platform for e-government/e-business. Essentially, the selection of a particular operating system for e-government/e-business have as much to do with factors ranging from existing skills, existing infrastructure, and economic reasons all the way up to political and strategic reasons. In dealing strategically with modern e-business environments, one of the most important factors that management must consider when choosing an operating system for their e-business platform is the security strength to resist computer hacker attacks on the operating system. If, for example, during different hacker attacks, one of the major aspects of these attacks is a certain operating system, as opposed to other systems, then this is a clear message to management to build in proper safeguards in the proposed operating system (Smith & Rupp, 2002a, 2002b). Certainly some of the reasons for frequent hacker attacks may probabilistic in terms and not random events, since Linux and Windows operating systems are more frequently used for e-commerce than other systems. So, it is not surprising that there are practically few reports of successful hacker attacks against operating systems that run e-business platforms (Smith, 2005; Smith & Lias, 2005; Smith & Offodile, 2002). 


Subject Online streaming. Significance US media firms CBS and Viacom announced their merger yesterday, having split in 2006; this will create a 30-billion-dollar entity and economies of scale that will help the firm compete in online streaming. The UK telecoms regulator Ofcom’s annual media review on August 7 shows that 40% of viewers now watch TV and film largely through online video. Indeed, streaming on online platforms such as Twitch is becoming more popular than conventional media forms, and UK subscriptions to streaming services overtook subscriptions to traditional TV services for the first time last year. Impacts Competition will intensify -- AT&T, Comcast, Disney and Apple are starting streaming services to compete with Amazon, CBS, Hulu and Netflix. Online streaming has vast potential beyond the media, for example in training in sectors such as medicine, and in workplaces more broadly. Insufficient regulation of appropriate online content and advertising risks creating obstacles that may curb the rise of streaming. Methods will improve to monitor and punish illegal streaming, but cybersecurity will still struggle to keep pace. The EU General Data Protection Regulation is causing reports of data breaches to rise, risking reduced user faith in online platforms.


2006 ◽  
Vol 40 (2) ◽  
pp. 16-21 ◽  
Author(s):  
Jean-Charles Tournier ◽  
Patrick G. Bridges ◽  
Arthur B. MacCabe ◽  
Patrick M. Widener ◽  
Zaid Abudayyeh ◽  
...  

2019 ◽  
Vol 17 (3/4) ◽  
pp. 288-304 ◽  
Author(s):  
Keith Spiller ◽  
Xavier L'Hoiry

This paper focuses on surveillant relations between citizens and police. We consider how online platforms enable the public to support the task of policing, as well as empowering the public to work without and beyond the police. While community-supported policing interventions are not new, more recently mobile and accessible technologies have promoted and enabled a DIY (Do-It-Yourself) culture towards policing amongst the public. The paper examines watch groups or those who task themselves with monitoring suspicious or actual behaviours. We consider two empirical examples: first, a community alert group mediated through social media. Second, a group of businesses that circulate, via a website, CCTV images of (alleged) wrongdoing in their premises. Drawing on David Garland’s (1996) work on responsibilisation, we situate the growth of these types of responsibilised groups within the contemporary economic and political climate of crime control in the UK. We argue that citizens are establishing new surveillant relations that are pushing policing in new and evolving directions.


Sign in / Sign up

Export Citation Format

Share Document