Risk
3/29/2012
05:24 PM
Thomas Claburn
Thomas Claburn
Commentary
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Google Big Tent: Regulation Vs. Personal Responsibility

Society should embrace the touch-the-stove approach when it comes to online common sense, explains 14-year-old Adora Svitak, author of no less than three books and advocate of techno-youth empowerment, at Google event on Web regulation.

Google gathered a group of technologists, academics, and artists Thursday to discuss how individuals can improve their Internet literacy and become more active digital citizens.

The event, called Google Big Tent, grew out of the company's European Zeitgeist event last year, and has become a separate periodic gathering focused on digital policy and censorship.

David Drummond, Google's SVP and chief legal counsel, characterized this first Big Tent in the United States as a platform for the discussion of issues facing the Internet community. Noting the economic and social benefits of the Internet, he also acknowledged the Internet's dark side.

"Technology has not magically solved our pressing social problems," he said.

Yet in grappling with these problems and they way they're manifested online, Drummond said that debates about remedies quickly devolve into discussions of regulation or ways to constrain private companies.

[ Read YouTube Tool Blurs Faces To Protect Privacy. ]

Drummond, as Google's top legal representative, often has a ringside seat at such battles. Much of the Federal Trade Commission's interest in consumer privacy stems from the boundary-pushing--some would argue rule-breaking--business practices of Google and competitors like Facebook. Google is also facing antitrust scrutiny in the United States and Europe. The prospect of future regulation that will affect Google and its peers is very real.

In that context, it's hardly surprising that Google might want to focus on how individuals can take greater responsibility for their online experience. If Internet users, for example, learn how to protect their own privacy, governments may not ask as much of Google.

Drawing a contrast between the drumbeat for regulation and the absence of advocacy for end-user responsibility, Drummond explained, "It's this attention deficit to the questions of digital citizenship and digital literacy that we hope to address today."

At a time when the White House is talking about a Consumer Privacy Bill of Rights, Google wants to talk about consumer digital responsibility. Someone's got to do it.

What might that look like? Fourteen-year-old Adora Svitak, author of no less than three books and advocate of techno-youth empowerment, rejected the academic nanny culture that bans before it looks. "I prefer the 'touch the stove' approach," she said during her time on stage.

Touching a hot stove was, she recalled, something her mother allowed her to do in her youth--not long ago--to educate her. She recounted it as a slightly painful experience that taught her more effectively than a more risk-averse approach might have. Perhaps her fourth book will be called Technology for the Tiger Mother, if there's room for two in Amy Chua's school of hard knocks.

But Svitak's endorsement of personal responsibility online has an undeniable logic, given that, despite lawmakers' threats to tame the Internet, there isn't really an alternative at the moment.

"Facebook doesn't give you a popup [when you post] that says, 'Are you going to regret this later?'" she said. "For now, we really have to be our own privacy filters."

If the youth/tech advocacy gig doesn't work out, Svitak could become a spokesperson for an ad industry trade group without missing a beat.

Representatives from YouTube, Twitter, and the Pew Research Center followed Svitak and provided some insight into the difficulty of identifying harmful content, the needles in the haystack of tweets, videos, and other user-supplied content.

As an example, it has become increasingly common for young girls to use YouTube to upload "Am I Pretty?" videos. This trending genre involves a teen or tween video maker who seeks votes of approval for her looks from the Internet community and is invariably exposed to abuse from one or more of the Internet's seemingly infinite supply of jerks.

YouTube, of course, hears from parents and those concerned about the vulnerable young that it should do more to protect users from others and from themselves.

"The question we face is, 'should a private company take away the right of a girl to ask if I am pretty?'" asked Victoria Grand, YouTube director of global communications and policy.

For some, the answer is obvious, for others, not so much. And for every issue that seems easy to solve, there's another more vexing conundrum awaiting those trying to keep the world safe from the rest of the world.

There are videos of people cutting themselves, except most are warnings to not actually do so. There are videos of people inhaling cinnamon and recording their gasping, to the chagrin of medical professionals. There are tweets that may be insulting, hate-speech, or just banter among friends.

"We have a very active 'My Little Pony' role-playing community," explained Twitter trust & safety director Del Harvey, in an apparent attempt to highlight the ambiguity of tweet policing.

It's not easy figuring out whether the brains strewn on a street in a YouTube video represent hard-hitting journalism from Syria or a prank pulled by someone who purchased organ meat from a butcher shop.

"What do you do with man boobs?" Grand asked.

What indeed. It's a question, though, that does make the push for regulation easier to understand.

The Enterprise 2.0 Conference brings together industry thought leaders to explore the latest innovations in enterprise social software, analytics, and big data tools and technologies. Learn how your business can harness these tools to improve internal business processes and create operational efficiencies. It happens in Boston, June 18-21. Register today!

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
herman_munster
50%
50%
herman_munster,
User Rank: Apprentice
4/3/2012 | 9:15:52 PM
re: Google Big Tent: Regulation Vs. Personal Responsibility
I'm a big fan of the "personal responsibility" approach to things. Laws for the sake of laws, laws designed to alleviate the burden of personal responsibility on the masses, only serve to make us weaker.
Andrew Hornback
50%
50%
Andrew Hornback,
User Rank: Apprentice
4/2/2012 | 3:15:13 AM
re: Google Big Tent: Regulation Vs. Personal Responsibility
I think there are actually a couple of issues going on here - the want for governments to regulate commerce (which, after all, isn't the Internet the largest engine of commerce on the planet?) and the idea that people should be protected from their own ignorance or the ignorance of others via rules enforced by a corporate entity.

Last time I looked, there was no equivalent to Driver's Ed for the new Internet user. Basically, if you have a connection and the want to go somewhere, you're thrown as far into the deep end of the pool as you want from the word go. There are no training wheels, there is no user manual.

No amount of regulation or legislation is going to prevent people from doing things that others find questionable. The more regulation that comes into play, the more likely censorship and the infringement upon people's rights becomes.

It's a tough situation - as a corporate entity, you can't force people to police themselves, you can't censor them without the possibility of creating a riot - what options do you really have?

Andrew Hornback
InformationWeek Contributor
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2208
Published: 2014-12-28
CRLF injection vulnerability in the LightProcess protocol implementation in hphp/util/light-process.cpp in Facebook HipHop Virtual Machine (HHVM) before 2.4.2 allows remote attackers to execute arbitrary commands by entering a \n (newline) character before the end of a string.

CVE-2014-2209
Published: 2014-12-28
Facebook HipHop Virtual Machine (HHVM) before 3.1.0 does not drop supplemental group memberships within hphp/util/capability.cpp and hphp/util/light-process.cpp, which allows remote attackers to bypass intended access restrictions by leveraging group permissions for a file or directory.

CVE-2014-5386
Published: 2014-12-28
The mcrypt_create_iv function in hphp/runtime/ext/mcrypt/ext_mcrypt.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 does not seed the random number generator, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging the use of a single initial...

CVE-2014-6123
Published: 2014-12-28
IBM Rational AppScan Source 8.0 through 8.0.0.2 and 8.5 through 8.5.0.1 and Security AppScan Source 8.6 through 8.6.0.2, 8.7 through 8.7.0.1, 8.8, 9.0 through 9.0.0.1, and 9.0.1 allow local users to obtain sensitive credential information by reading installation logs.

CVE-2014-6160
Published: 2014-12-28
IBM WebSphere Service Registry and Repository (WSRR) 8.5 before 8.5.0.1, when Chrome and WebSEAL are used, does not properly process ServiceRegistryDashboard logout actions, which allows remote attackers to bypass intended access restrictions by leveraging an unattended workstation.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.