Regime formation and consequence: The case of internet security in the East-Asia 'Four Tigers'

Abstract The purpose of this article is to identify the process in which each nation appropriates a new technological force challenging regulatory regimes. Departing from regime theory, this paper critically assesses the interaction between Asian Pacific Economic Cooperation and the East-Asia ‘Four Tigers’ in formulating Internet security policy. A particular concern is about the formation of global information policy regime that arbitrates the tension between citizens' right to privacy and free information flow. This paper argues that the potential of the greater protection of information privacy are curtailed as market incentives of information flow dominate over the region's policy effort. A 2003 Bangkok meeting epitomizes such policy formulation in the interaction between international and national regimes that are particular to the region's regulatory legacies. Implications are discussed in terms of the function of industrial legacies in new information policy.

[1]  Kanishka Jayasuriya,et al.  The political rationalities of regionalism: APEC and the EU in comparative perspective , 1998 .

[2]  W. Dutton Information and Communication Technologies: Visions and Realities , 1996 .

[3]  D. Cogburn Governing global information and communications policy , 2003 .

[4]  David C. Kang,et al.  South Korean and Taiwanese development and the new institutional economics , 1995, International Organization.

[5]  S. Vogel,et al.  Freer Markets, More Rules: Regulatory Reform in Advanced Industrial Countries , 1996 .

[6]  T. Misa,et al.  Modernity and Technology , 2002 .

[7]  V. Aggarwal Building International Institutions in Asia-Pacific , 1993 .

[8]  Sarah Andrews Who Holds the Key? - A Comparative Study of US and European Encryption Policies , 2000, Journal of Information, Law and Technology.

[9]  Richard Wu Electronic Transactions Ordinance - Building a Legal Framework for E-Commerce in Hong Kong , 2000, Journal of Information, Law and Technology.

[10]  Amitai Etzioni,et al.  From Empire To Community , 2004 .

[11]  Hugh Richard Slotten,et al.  Selling the Air: A Critique of the Policy of Commercial Broadcasting in the United States by Thomas Streeter (review) , 1996, Technology and Culture.

[12]  J. Abbate,et al.  Inventing the Internet , 1999 .

[13]  Ithiel de Sola Pool,et al.  Technologies of Freedom , 1983 .

[14]  Theerasak Thanasankit,et al.  Acceptance and Leadership--Hegemonies of E-Commerce Policy Perspectives , 2002 .

[15]  Robert Friedel,et al.  Inventing American Broadcasting 1899-1922 , 1989 .

[16]  Cherian George The Internet and the Narrow Tailoring Dilemma for “Asian” Democracies , 2003 .

[17]  R. Wade Governing the Market: Economic Theory and the Role of Government in East Asian Industrialization , 1991 .

[18]  M. Woo-cumings,et al.  The developmental state , 1999 .

[19]  Shalini Venturelli,et al.  Inventing e-regulation in the US, EU and East Asia: conflicting social visions of the Information Society , 2002, Telematics Informatics.

[20]  J. D. Tygar Technological dimensions of privacy in Asia , 2003 .

[21]  W. Russell Neuman,et al.  The future of the mass audience , 1991 .

[22]  James Gomez,et al.  Dumbing down Democracy: Trends in Internet Regulation, Surveillance and Control in Asia , 2004 .

[23]  Saik Yoon Chin Diverging information societies of the Asia Pacific , 2005 .

[24]  James Andrew Lewis,et al.  Cyber security : turning national solutions into international cooperation , 2003 .

[25]  Kenneth C. C. Yang,et al.  A comparative study of Internet regulatory policies in the Greater China Region: Emerging regulatory models and issues in China, Hong-Kong SAR, and Taiwan , 2007, Telematics Informatics.

[26]  Troy A. Murphy Civil Society, the Highlander Folk School, and the Cultivation of Rhetorical Invention , 2003 .

[27]  Harmeet S. Sawhney,et al.  Battle of Systems: Learning from Erstwhile Gas–Electricity and Telegraph–Telephone Battles , 2006 .

[28]  E. Hargittai,et al.  The changing online landscape : From free-for-all to commercial gatekeeping , 2004 .

[29]  O. Gandy,et al.  Cultural Rights: Technology, Legality and Personality.@@@The Panoptic Sort: A Political Economy of Personal Information. , 1993 .

[30]  Ian Hosein,et al.  The Sources of Laws: Policy Dynamics in a Digital and Terrorized World , 2004, Inf. Soc..

[31]  Christian Sandvig Introduction to the Special Issue: Policy, Politics, and the Local Internet , 2003 .

[32]  Wayne Madsen,et al.  Cryptography and Liberty: An International Survey of Encryption Policy, 16 J. Marshall J. Computer & Info. L. 475 (1998) , 1997 .

[33]  Ada W. Finifter,et al.  Political science : the state of the discipline , 1983 .

[34]  Sandra Braman The Emergent Global Information Policy Regime , 2004 .

[35]  V. Aggarwal,et al.  APEC AS AN INTERNATIONAL INSTITUTION , 2000 .

[36]  Lawrence Lessig,et al.  Code and Other Laws of Cyberspace , 1999 .

[37]  R. Mansell,et al.  Communication by design: the politics of information and communication technologies , 1996 .

[38]  Richard Maxwell The Marketplace Citizen and the Political Economy of Data Trade in the European Union , 1999 .

[39]  Barbara J. Mack,et al.  Information Technology Security Handbook , 2003 .

[40]  Claude S. Fischer,et al.  America Calling: A Social History of the Telephone to 1940 , 1993, Business History Review.

[41]  Tom Standage The Victorian Internet: The Remarkable Story of the Telegraph and the Nineteenth Century's On-line Pioneers , 1998 .

[42]  W. Goldfrank,et al.  MITI and the Japanese Miracle: The Growth of Industrial Policy, 1925-1975. , 1982 .

[43]  Philip M. Napoli Foundations of communications policy : principles and process in the regulation of electronic media , 2001 .

[45]  M. Castells The Internet Galaxy , 2001 .

[46]  W. Form,et al.  Embedded Autonomy: States and Industrial Transformation. , 1996 .

[47]  Robert B. Horwitz,et al.  The Irony of Regulatory Reform: The Deregulation of American Telecommunications , 1988 .

[48]  H. Klein Understanding WSIS: An Institutional Analysis of the UN World Summit on the Information Society , 2003 .

[49]  Lisa L. Martin,et al.  International Political Economy: Global and Domestic Interactions , 2003 .

[50]  P. Agre THE ARCHITECTURE OF IDENTITY: Embedding privacy in market institutions , 1999 .

[51]  M. Castells,et al.  The Network Society: From Knowledge to Policy , 2006 .

[52]  Thomas R. Lindlof Qualitative Communication Research Methods , 1994 .

[53]  Christina Spyrelli Electronic Signatures: A Transatlantic Bridge? An EU and US Legal Approach Towards Electronic Authentication , 2002, Journal of Information, Law and Technology.