Abstract
Technology affects behaviour. Speed bumps, for instance, provide an effective way to enforce speed limits imposed by the legislator. In cases such as these, technology is instrumental to the enforcement of legal norms. This kind of regulation by technology, techno-regulation, or ‘code as code’ has become part of the contemporary regulator’s toolbox. The idea underlying this kind of influencing behaviour by means of technology is relatively straightforward. Norms can be transformed into computer code or architecture in a way that affords certain actions or functions and inhibits others. What is less clear is what the boundaries of techno-regulation are. In this paper we analyse how technology affects human behaviour and we present a typology of techno-effects in order to provide a clear boundary of techno-regulation vis-à-vis other normative and functional aspects of technology. We survey topics such as nudging, affordance, scripts embedded in technological designs, and anthropomorphization. The paper draws from legal philosophy, STS, human computer interaction and regulation theory.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
I.e. the use of speed bumps to regulate driving speeds, entry gates to exclude travel(lers) without a valid ticket, and region codes on DVD players.
- 2.
Note that merely automating procedures to prevent or detect violations of rules and regulations does not necessarily entail that these rules become obfuscated, nor that proper procedures cannot be developed to ensure that citizens have a possibility to contest these rules or their application. Think, for example of the use of speed cameras in traffic, for which there are proper procedures to ‘seek redress in the courts if [citizens] disagree with the content of the decision or the procedural aspects of the decision-making. All this has become part of the routine of the rule of law in our democracies’ (Dommering 2006: 8). The difference between merely automating (instances of) crime prevention and detection and techno-regulation is twofold: (1) systems of the former deliver ex post punishment for violations of the law and (hence) leave room for disobeying the rules, whereas in techno-regulation the technology delivers ex ante prevention and there is no room for violating the law; and (2) the technologies used for the former, e.g. cameras that detect flows of traffic, generally provide cues that a rule is being enforced in a certain location, and what rule this could possibly be. In the case of techno-regulation oftentimes this clarity is lacking – think of the example of entry gates to the Underground: many people will undoubtedly be unaware of the fact that this barrier enforces a rule regarding the contractual relationship between a traveller and a transport company. Both differences contribute to the claim that it is more difficult for citizens to contest norms and rules when they are implemented by means of techno-regulation.
- 3.
- 4.
Computer users could ‘communicate’ with ELIZA using natural language. The program used a number of quite simple techniques to convert their input into follow-up questions or observations, thus creating the illusion of a real conversation and, what is more, leaving users with the impression that ELIZA actually had the ability to understand them.
- 5.
Available at: http://en.wikipedia.org/wiki/Abort,_Retry,_Fail, last accessed on April 10th 2012.
References
Akrich, M. 1992. The de-scription of technical objects. In Shaping technology/building society: Studies in sociotechnical change, ed. W.E. Bijker and J. Law, 205–224. Cambridge, MA: MIT Press.
Akrich, M. 1995. User representations: Practices, methods and sociology. In Managing technology in society: The approach of constructive technology assessment, ed. A. Rip, T.J. Misa, and J. Schot, 167–184. London/New York: Pinter Publishers.
Asscher, L. 2006. ‘Code’ as law: Using Fuller to assess code rules. In Coding regulation: Essays on the normative role of information technology, ed. E. Dommering and L. Asscher, 61–91. The Hague/West Nyack: TMC Asser.
Baldwin, R., M. Cave, and M. Lodge. 2010. Introduction: Regulation – The field and the developing agenda. In The Oxford handbook of regulation, ed. R. Baldwin, M. Cave, and M. Lodge, 3–16. Oxford/New York: Oxford University Press.
Brownsword, R. 2008. So what does the world need now? Reflections on regulating technologies. In Regulating technologies: Legal futures, regulatory frames and technological fixes, ed. R. Brownsword and K. Yeung, 23–49. Oxford: Hart.
Brownsword, R., and K. Yeung. 2008. Regulating technologies: Tools, targets and thematics. In Regulating Technologies: Legal futures, regulatory frames and technological fixes, ed. R. Brownsword and K. Yeung, 3–23. Oxford: Hart.
Burgess, A. 2012. ‘Nudging’ healthy lifestyles: The UK experiments with the behavioural alternative to regulation and the market. European Journal of Risk Regulation 3(1): 3–30.
Cohen, J.E. 2012. Configuring the networked self: Law, code, and the play of everyday practice. New Haven/London: Yale University Press.
Dommering, E. 2006. Regulating technology: Code is not law. In Coding regulation: Essays on the normative role of information technology, ed. E. Dommering and L. Asscher, 1–17. The Hague/West Nyack: TMC Asser.
Duffy, B.R. 2003. Anthropomorphism and the social robot. Robotics and Autonomous Systems 42(3–4): 177–190.
Fogg, B.J. 2003. Persuasive technology: Using computers to change what we think and do. Amsterdam/Boston: Morgan Kaufmann Publishers.
Friedman, B. 1997. Human values and the design of computer technology. Stanford/Cambridge, NY: CSLI Publications; Cambridge University Press.
Friedman, B., and P.H. Kahn Jr. 2006. Value sensitive design and information systems. In Human-computer interaction and management information systems: Foundations, ed. M.E. Sharpe, 348–372. Armonk: M.E. Sharpe Inc.
Friedman, B., P.H. Kahn Jr., and A. Borning. 2002. Value sensitive design: Theory and methods. Washington, DC: University of Washington, Department of Computer Science & Engineering.
Frissen, V. 1994. The domestication of the telephone. In Domestic technology and everyday life – Mutual shaping processes. Proceedings from COST A4 workshop in Trondheim, Norway, ed. A.-J. Berg and M. Aune, October 28–30, 1993. Brussel: COST.
Frissen, V. 2004. De domesticatie van de digitale wereld. Rotterdam: Erasmus Universiteit Rotterdam.
Gaver, W.W. 1991. Technology affordances. In CHI’91 proceedings of the SIGCHI conference on human factors in computing systems, 79–84. New York: ACM.
Gaver, W.W. 1996. Affordances for interaction: The social is material for design. Ecological Psychology 8(2): 111–129.
Gibson, J.J. 1986. The ecological approach to visual perception. Hillsdale: L. Erlbaum Associates.
Gjøen, H., and M. Hård. 2002. Cultural politics in actions: Developing user scripts in relation to the electric vehicle. Science, Technology & Human Values 27(2): 262–281.
Haddon, L. 2003. Domestication and mobile telephony. In Machines that become us: The social context of personal communication technology, ed. J.E. Katz, 43–55. New Brunswick: Transaction Publishers.
Hildebrandt, M. 2008. Legal and technological normativity: More (and less) than twin sisters. Technè 12(3): 169–183.
Hildebrandt, M. 2009. Technology and the end of law. In Facing the limits of the law, ed. E. Claes, W. Devroe, and B. Keirsbilck, 443–464. Berlin/Heidelberg: Springer.
Hildebrandt, M. 2011. Legal protection by design: Objections and refutations. Legisprudence 5(2): 223–249.
Ihde, D. 1990. Technology and the lifeworld: From garden to earth. Bloomington: Indiana University Press.
Kerr, I.R. 2004. Bots, babes and the Californication of commerce. University of Ottawa Law & Technology Journal 1(1–2): 287–324.
Koops, B.-J. 2010. Ten dimensions of technology regulation: Finding your bearings in the research space of an emerging discipline. In Dimensions of technology regulation, ed. M. Goodwin, B.-J. Koops, and R.E. Leenes, 309–325. Nijmegen: Wolf Legal Publishers.
Kroes, P., A. Light, P.E. Vermaas, and S.A. Moore. 2009. Philosophy and design: From engineering to architecture. Dordrecht: Springer.
Latour, B. 1992. Where are the missing masses? The sociology of a few mundane artifacts. In Shaping technology/building society: Studies in sociotechnical change, ed. W.E. Bijker and J. Law, 225–259. Cambridge, MA: MIT Press.
Leenes, R.E. 2010. Harde lessen: Apologie van technologie als reguleringsinstrument. Tilburg: Universiteit van Tilburg.
Leenes, R.E. 2011. Framing techno-regulation: An exploration of state and non-state regulation by technology. Legisprudence 5(2): 143–169.
Lehtonen, T.-K. 2003. The domestication of new technologies as a set of trials. Journal of Consumer Culture 3(3): 363–385.
Lessig, L. 2006. Code: Version 2.0. New York: Basic Books.
MacKenzie, D.A., and J. Wajcman. 1999. The social shaping of technology. Buckingham/Philadelphia: Open University Press.
McGrenere, J., and W. Ho. 2000. Affordances: Clarifying and evolving a concept. In Proceedings of graphics interface 2000 May 15–17, 2000, 179–186. Montreal and Quebec.
Morgan, B., and K. Yeung. 2007. Regulatory instruments and techniques. In An introduction to law and regulation: Text and materials, ed. B. Morgan and K. Yeung, 79–151. Cambridge/New York: Cambridge University Press.
Nass, C.I., and Y. Moon. 2000. Machines and mindlessness: Social responses to computers. Journal of Social Issues 56(1): 81–103.
Nass, C.I., J. Steuer, E.R. Tauber, and H. Reeder. 1993. Anthropomorphism, agency, and ethopoeia: Computers as social actors. In CHI ’93 INTERACT ’93 and CHI ’93 conference companion on human factors in computing systems, 111–112. New York: ACM.
Nass, C.I., J. Steuer, and E.R. Tauber. 1994. Computers are social actors. In CHI’94 proceedings of the SIGCHI conference on human factors in computing systems, 72–78. Boston/New York: ACM.
Norman, D.A. 1988. The psychology of everyday things. New York: Basic Books.
Oudshoorn, N., and T.J. Pinch. 2003. How users matter: The co-construction of users and technologies. Cambridge, MA: MIT Press.
Oudshoorn, N., E. Rommes, and M. Stienstra. 2004. Configuring the user as everybody: Gender and design cultures in information and communication technologies. Science, Technology & Human Values 29(1): 30–63.
Picard, R.W. 1997. Affective computing. Cambridge, MA: MIT Press.
Reeves, B., and C.I. Nass. 1996. The media equation: How people treat computers, television, and new media like real people and places. Stanford/New York: CSLI Publications/Cambridge University Press.
Silverstone, R., and L. Haddon. 1996. Design and domestication of information and communication technologies: Technical change and everyday life. In Communication and design: The politics of information and communication technologies, ed. R. Mansell and R. Silverstone, 44–75. Oxford/New York: Oxford University Press.
Thaler, R.H., and C.R. Sunstein. 2008. Nudge: Improving decisions about health, wealth, and happiness. New Haven: Yale University Press.
Turkle, S. 1984. The second self: Computers and the human spirit. New York: Simon & Schuster.
Turkle, S. 2007. Evocative objects: Things we think with. Cambridge, MA: MIT Press.
Van den Berg, B. 2008. Self, script, and situation: Identity in a world of ICTs. In The future of identity in the information society: Proceedings of the third IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS International Summer School on the Future of Identity in the Information Society, ed. S. Fischer-Hübner, P. Duquenoy, A. Zuccato, and L. Martucci, 63–77. New York: Springer.
Van den Berg, B. 2010a. I-Object: Intimate technologies as ‘reference groups’ in the construction of identities. Technè 14(3): 176–193.
Van den Berg, B. 2010b. The situated self: Identity in a world of ambient intelligence. Nijmegen: Wolf Legal Publishers.
Van den Berg, B. 2011. Techno-elicitation: Regulating behaviour through the design of robots. In Technologies on the stand: Legal and ethical questions in neuroscience and robotics, ed. B. van den Berg and L. Klaming, 403–422. Nijmegen: Wolf Legal Publishers.
Van Oost, E. 2003. Materialized gender: How shavers configure the users’ femininity and masculinity. In How users matter: The co-construction of users and technologies, ed. N. Oudshoorn and T.J. Pinch, 193–209. Cambridge, MA: MIT Press.
Verbeek, P.-P. 2005. What things do: Philosophical reflections on technology, agency, and design. University Park: Pennsylvania State University Press.
Weizenbaum, J. 1966. ELIZA: A computer program for the study of natural language communication between man and machine. Communications of the ACM 9(1): 36–45.
Yeung, K. 2008. Towards an understanding of design-based instruments. In Regulating Technologies: Legal futures, regulatory frames and technological fixes, ed. R. Brownsword and K. Yeung, 79–109. Oxford: Hart.
Acknowledgement
The authors wish to thank Martin Pekárek and Mireille Hildebrandt for their willingness to challenge and debate the ideas put forth in this chapter.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media Dordrecht.
About this chapter
Cite this chapter
van den Berg, B., Leenes, R.E. (2013). Abort, Retry, Fail: Scoping Techno-Regulation and Other Techno-Effects. In: Hildebrandt, M., Gaakeer, J. (eds) Human Law and Computer Law: Comparative Perspectives. Ius Gentium: Comparative Perspectives on Law and Justice, vol 25. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-6314-2_4
Download citation
DOI: https://doi.org/10.1007/978-94-007-6314-2_4
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-6313-5
Online ISBN: 978-94-007-6314-2
eBook Packages: Humanities, Social Sciences and LawLaw and Criminology (R0)