{"id":96521,"date":"2006-09-24T00:00:00","date_gmt":"2006-09-24T05:00:00","guid":{"rendered":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/2006\/09\/24\/funding-priorities-respondents-rank-four-suggested-priorities-for-building-the-networked-future\/"},"modified":"2024-04-14T04:14:16","modified_gmt":"2024-04-14T09:14:16","slug":"funding-priorities-respondents-rank-four-suggested-priorities-for-building-the-networked-future","status":"publish","type":"post","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2006\/09\/24\/funding-priorities-respondents-rank-four-suggested-priorities-for-building-the-networked-future\/","title":{"rendered":"Funding Priorities: Respondents rank four suggested priorities for building the networked future"},"content":{"rendered":"<h3 data-is-section=\"true\" data-wp-context=\"{&quot;id&quot;:&quot;setting-priorities-question-and-responses&quot;}\" data-wp-interactive=\"{&quot;namespace&quot;:&quot;prc-block\\\/table-of-contents&quot;}\" id=\"setting-priorities-question-and-responses\" class=\"wp-block-heading\">Setting Priorities: Question and Responses<\/h3>\n\n<p class=\"wp-block-paragraph\">Respondents were asked the following:<\/p>\n\n<p class=\"wp-block-paragraph\"> <strong>If you were in charge of setting priorities about where to spend the available funds for developing information and communications technologies (predominantly the internet) to improve the world, how would you rank order the following international concerns? Please number these from 1 to 4, with 1 being the highest priority.<\/strong> <\/p>\n\n<p class=\"wp-block-paragraph\"><figure><img loading=\"lazy\" decoding=\"async\" width=\"530\" height=\"522\" alt=\"Setting Priorities for Development of Global Information &amp; Communication Technologies\" src=\"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/wp-content\/uploads\/sites\/9\/media\/F0A057AC493C4D0687094797E7910D4E.jpg\" class=\"aligncenter\"><\/figure>\n<\/p>\n\n<p class=\"wp-block-paragraph\">An extended collection hundreds of written answers to this question can be found at: <br><a href=\"http:\/\/www.elon.edu\/e-web\/predictions\/expertsurveys\/2006survey\/worldpriorities.xhtml\">http:\/\/www.elon.edu\/e-web\/predictions\/expertsurveys\/2006survey\/worldpriorities.xhtml<\/a><\/p>\n\n<h3 data-is-section=\"true\" data-wp-context=\"{&quot;id&quot;:&quot;overview-most-say-building-network-capacity-and-technology-knowledge-should-be-top-priorities&quot;}\" data-wp-interactive=\"{&quot;namespace&quot;:&quot;prc-block\\\/table-of-contents&quot;}\" id=\"overview-most-say-building-network-capacity-and-technology-knowledge-should-be-top-priorities\" class=\"wp-block-heading\">Overview: Most say building network capacity and technology knowledge should be top priorities.<\/h3>\n\n<p class=\"wp-block-paragraph\">More than three-fourths of respondents \u2013 78% \u2013 identified building network capacity and the knowledge base to help people of all nations use it as the first or second priority for the world&#8217;s policy makers and technology industry to pursue. It was selected as the first priority by 51% of the survey participants.<\/p>\n\n<p class=\"wp-block-paragraph\">Following closely as a priority was \u201ccreating a legal and operating environment that allows people to use the internet the way they want, using the software they want,\u201d which gained support from 64% of respondents as either the first or the second international priority. Falling far down the list were the other two choices in the setting of priorities \u2013 \u201cdeveloping and &#8216;arming&#8217; an effective international security watchdog organization\u201d and \u201cestablishing an easy-to-use, secure international monetary microcredit system\u201d \u2013 which each gained only 8% of respondents&#8217; votes as a first priority. Many respondents wound up including support for two or more of the priorities in their written elaborations. They most often combined the ideals of total access\/tech knowledge and an open legal and operating environment.<\/p>\n\n<h3 data-is-section=\"true\" data-wp-context=\"{&quot;id&quot;:&quot;accessibility-and-the-knowledge-to-use-that-access-to-advantage-are-seen-as-key-priorities&quot;}\" data-wp-interactive=\"{&quot;namespace&quot;:&quot;prc-block\\\/table-of-contents&quot;}\" id=\"accessibility-and-the-knowledge-to-use-that-access-to-advantage-are-seen-as-key-priorities\" class=\"wp-block-heading\">Accessibility and the knowledge to use that access to advantage are seen as key priorities.<\/h3>\n\n<p class=\"wp-block-paragraph\">Respondents overwhelmingly agreed that bringing the tools of connection to as many people as possible and teaching them how to benefit from these tools will help improve the world.<\/p>\n\n<p class=\"wp-block-paragraph\">\u201cCapacity building should be the prime focus,\u201d wrote <b>Rajnesh Singh<\/b>, a leader in the Pacific Islands chapter of the Internet Society.[51.numoffset=&#8221;51&#8243; A section with more complete biographical data on most respondents who took credit for their remarks can be found at the end of this report.] \u201cNot just machines, but people and getting them to do new and wonderful things with technology.\u201d<\/p>\n\n<p class=\"wp-block-paragraph\"> <b>Fred Baker,<\/b> president of the board of trustees of the Internet Society, responded, \u201cEducation is key to internet deployment and use, and is something I am directly involved with.\u201d<\/p>\n\n<p class=\"wp-block-paragraph\">\u201cProviding access and literacy is paramount,\u201d wrote <b>Howard Rheingold<\/b>, internet sociologist and author. \u201cWithout affordable access, knowledge of how to use the technology and the legal and operating environment that permits innovation, we won&#8217;t see the creative explosion we say with personal computers and the internet.\u201d<\/p>\n\n<p class=\"wp-block-paragraph\"> <b>Robin Gross<\/b>, executive director for IP Justice, wrote, \u201cBuilding an open, inclusive, and inter-operable infrastructure is the most important because all of issues will depend upon the infrastructure.\u201d<\/p>\n\n<p class=\"wp-block-paragraph\"> <b>Ed Lyell<\/b>, an expert on the internet and education, wrote, \u201cWe enhance the positive potential of global communication commerce only by bringing as many into the network as possible. To continue to expand the current digital divide will bring on negatives of jealousy, income disparity, have\/have not battles, etc. This is a case when the economic common good must be nourished while minimizing the potential greed of individualized privatization. By this I do not mean government-run \u2013 but a structured system of individual incentives for excellence that lead to positive collective improvement.\u201d<\/p>\n\n<p class=\"wp-block-paragraph\">Many respondents agreed with <b>Tunji Lardner<\/b>, CEO for the West African NGO network, wagonet.org, who wrote, \u201cThe challenge remains helping the majority of our brothers and sisters in vast underserved places in the world.\u201d <b>Lutfor Rahman<\/b>, executive director of the Association for Advancement of Information Technology at Pundra, Bangladesh, added, \u201cEverybody should know the benefit and problems of using the internet, and this should get first priority.\u201d<\/p>\n\n<p class=\"wp-block-paragraph\">\u201cMy priority would be to build a 100-mg-per-second broadband pipe into every home,\u201d said <b>Rob Atkinson<\/b> of the Information Technology and Innovation Foundation. <\/p>\n\n<p class=\"wp-block-paragraph\"> <b>Nan Dawkins<\/b>, co-founder of Red Boots Consulting, wrote, \u201cWhile ensuring access certainly impacts the internet&#8217;s potential as a change agent, it is important to remember that simple access is not enough. Giving a man (or woman) a laptop and a cheap connection is not sufficient to change his\/her plight. The internet is a tool with some potential, but it is probably not within the top 100 factors that can drive significant change in the world.\u201d<\/p>\n\n<h3 data-is-section=\"true\" data-wp-context=\"{&quot;id&quot;:&quot;many-respondents-pressed-for-an-operating-environment-that-is-open-fair-and-full-of-innovation&quot;}\" data-wp-interactive=\"{&quot;namespace&quot;:&quot;prc-block\\\/table-of-contents&quot;}\" id=\"many-respondents-pressed-for-an-operating-environment-that-is-open-fair-and-full-of-innovation\" class=\"wp-block-heading\">Many respondents pressed for an operating environment that is open, fair and full of innovation.<\/h3>\n\n<p class=\"wp-block-paragraph\">Respondents also put \u201ccreating a legal and operating environment that allows people to use the internet the way they want, using the software they want\u201d at the top of the priorities list. Their concerns in this realm include: the positive and negative effects of a software monoculture; regulation&#8217;s influence on security, trust, innovation and access; and the outcomes caused by the imposition of various limitations by those in prevailing power structures.<\/p>\n\n<p class=\"wp-block-paragraph\">\u201cThe social institutions of exchange and basic law (which requires some enforcement ability) are the most important for real development,\u201d wrote <b>Bruce Edmonds<\/b> of the Centre for Policy Modelling at Manchester, UK. \u201cThis will allow new online institutions to emerge.\u201d<\/p>\n\n<p class=\"wp-block-paragraph\"> <b>Wladyslaw Majewski<\/b>, of OSI ComputTrain and the Poland chapter of the Internet Society, responded, \u201cThe only listed goal worth significant funding is to defend and promote human rights and activities.\u201d<\/p>\n\n<p class=\"wp-block-paragraph\">\u201cGiving people the ability to develop their own strategies and appropriate technologies as they see fit will always be a more powerful method of ensuring equitable uptake than by top-down measures or by allowing current power groups (e.g. corporate interests) to define the future environment,\u201d argued <b>Mark Gaved<\/b><i>, <\/i>of The Open University, in the U.K.<\/p>\n\n<p class=\"wp-block-paragraph\"> <b>John Quarterman<\/b>, president of InternetPerils and an internet pioneer, wrote, \u201cWithout software diversity we&#8217;re at the mercy of the monopoly software vendors, both directly and even more indirectly through ease of exploit of such software and especially ease of spread of such exploits, not to mention through the warping of political and social systems that happens as monopolists fight to maintain control \u2026 Distributed security is what we need, and the most effective first step is to deal with the software monopoly problem.\u201d <b>Baker <\/b>of the Internet Society responded, \u201cI would simply leave (this) to anti-trust law.\u201d<\/p>\n\n<p class=\"wp-block-paragraph\"> <b>Jeff Hammond<\/b>, vice president for Rhea and Kaiser, wrote that innovation will trump any monoculture. \u201cCreating a legal framework for the internet should focus on intellectual property alone,\u201d he argued. \u201cI do not believe that the goals of &#8216;using the internet the way they want&#8217; means that a political solution should be sought for infrastructure or technology platforms. Political solutions are typically about <i>discouraging<\/i> human activities. Innovation is about encouraging human activities, many of which will be failures. If a software monoculture results, it will be because it is the solution that solves the greatest number of problems for the greatest number of people&#8230;it will also be temporary until the problems it creates are solved by the next wave of innovation.\u201d<\/p>\n\n<p class=\"wp-block-paragraph\">\u201cAny effort to improve the world by means of development of information and communication technologies should be based on empowerment of the individual as user and various groups of users, and not be conducive to a business monoculture. In other words, the current trends of corporate domination in the area should be reversed. Public interest should be the top priority,\u201d maintained <b>Mirko Petric<\/b>, of the University of Zadar, Croatia.<\/p>\n\n<p class=\"wp-block-paragraph\"> <b>Ross Rader<\/b> of Tucows Inc. wrote, \u201cVarious current legal environments are threatening to tear apart the fabric of the network (i.e. U.S. intellectual property law, communications regulation, etc.). This trend must be reversed. Without a fundamental right to choose platform, service, and application, there is very little merit left in the network. The edge must be left to its own devices, despite the economic pursuits of big business.\u201d<\/p>\n\n<p class=\"wp-block-paragraph\"> <b>Robin Berjon<\/b> of the World Wide Web Consortium and Expway wrote, \u201cIf there is no environment for open standards and multiple platforms, none of the two remaining points will be feasible, so I would place it at the top of the priority list because it is a prerequisite.\u201d And <b>Glenn Ricart<\/b>, a member of the Internet Society Board of Trustees, put it this way: \u201cThe highest priority is to make sure that the Internet can continue to foster economic and social growth and development for everyone (in all cultures) via innovation, competition, and free speech (e.g. uncensored and unmonitored packets).\u201d<\/p>\n\n<p>[We must]<\/p>\n\n\n<p class=\"wp-block-paragraph\"> <b>Simon Woodside<\/b>, CEO of Semacode Corporation in Ontario, Canada, responded, \u201cThe legal environment today is excellent, and bodies such as ISOC, ICANN, and IETF, along with world governments, should continue to nurture and protect the open nature of the internet.\u201d<\/p>\n\n<p class=\"wp-block-paragraph\">Some respondents selected this priority as the first on their list and then made sure to emphasize the fact that the internet should remain as <i>unregulated<\/i> as possible.<\/p>\n\n<p class=\"wp-block-paragraph\">\u201cDigital Rights Management, &#8216;trusted computing&#8217; that bakes restrictions into hardware, and extensions of copyright law such as the Digital Millennium Copyright Act are roadblocks that could strangle a global creative renaissance before it can take root worldwide,\u201d <b>Howard Rheingold<\/b> argued.<\/p>\n\n<p class=\"wp-block-paragraph\"> <b>Jim Warren<\/b>, a pioneer technology-policy advocate and activist, responded, \u201cI do not imply that government and laws should do much. Quite the contrary \u2013 I want government and laws to mostly GET OUT OF THE WAY! First and foremost, government <i>mostly<\/i> serves itself first (and serves its most powerful supporters second) \u2013 and that is perhaps the foremost danger.\u201d<\/p>\n\n<h3 data-is-section=\"true\" data-wp-context=\"{&quot;id&quot;:&quot;if-the-network-is-not-secure-and-trusted-will-it-be-used&quot;}\" data-wp-interactive=\"{&quot;namespace&quot;:&quot;prc-block\\\/table-of-contents&quot;}\" id=\"if-the-network-is-not-secure-and-trusted-will-it-be-used\" class=\"wp-block-heading\">If the network is not secure and trusted, will it be used?<\/h3>\n\n<p class=\"wp-block-paragraph\">At a June 2006 technical conference in Boston, Microsoft officials reported that a significant percentage of the world&#8217;s computers have been infected by keystroke loggers, Internet Relay Chat bots and rootkits. Microsoft said that between January 2005 and June 2006 it removed at least 16 million instances of malicious software \u2013 one virus, Trojan, rootkit or worm in every 311 times it scanned one of the 270 million computers running the Windows Malicious Software Removal Tool.[52.numoffset=&#8221;52&#8243; Naraine, R. &#8220;Microsoft: Trojans, Bots Are &#8216;Significant and Tangible Threat,'&#8221; eWeek.com, June 12, 2006, available online at <a href=\"http:\/\/www.eweek.com\/article2\/0,1895,1974620,00.asp?kc=ewnws061206dtx1k0000599\">http:\/\/www.eweek.com\/article2\/0,1895,1974620,00.asp?kc=ewnws061206dtx1k0000599<\/a>]<\/p>\n\n<p class=\"wp-block-paragraph\">\u201cSecurity has to come first. As long as we have \u2026 Trojan, spyware, malware, we will not be able to gain any true integrity of the internet,\u201d insisted <b>Terry Ulaszewski<\/b><i>, <\/i>of\u00a0 Long Beach Live.<i><\/i><\/p>\n\n<p class=\"wp-block-paragraph\">A vocal minority of survey respondents pointed out that the communications network will not be used or useful if it is not seen as a safe place to be, no matter how well-connected everyone is. \u201cUnless we find ways to curb spam, identity theft, cyber extortion, virus writing, and other such criminal activity, people will not WANT to use the enhanced IT environment that the other three choices present,\u201d explained <b>Eugene Spafford<\/b>, executive director of the Center for Education and Research in Information Assurance and Security. \u201cTechnology alone (or even primarily) cannot solve this problem \u2013 we will need international response to bad actors, with appropriate investigation and punishment.\u201d<\/p>\n\n<p class=\"wp-block-paragraph\"> <b>Anthony Rutkowski <\/b>of VeriSign, a company that includes a team of malware detectives based out of Dulles, Va., called the Rapid Response Team, responded, \u201cCybersecurity and infrastructure protection will remain the highest priority. Next-Generation Network legal norms, regulations, and standards will likely have proliferated so as to all for flexible use to the extent that is achievable given other priorities like security and infrastructure protection.\u201d<\/p>\n\n<p class=\"wp-block-paragraph\"> <b>Amos Davidowitz<\/b> of the Institute of World Affairs wrote, \u201cPeople will not use it if they do not feel secure, so access and security are the primary goals.\u201d<\/p>\n\n<p class=\"wp-block-paragraph\"> <b>Marc Rotenberg<\/b>, executive director of the Electronic Privacy Information Center, responded, \u201cWe need stronger safeguards for privacy and human rights before enabling greater security authority.\u201d<\/p>\n\n<h3 data-is-section=\"true\" data-wp-context=\"{&quot;id&quot;:&quot;there-were-notable-expressions-of-concern-about-whether-it-would-be-wise-to-create-an-internet-police-agency&quot;}\" data-wp-interactive=\"{&quot;namespace&quot;:&quot;prc-block\\\/table-of-contents&quot;}\" id=\"there-were-notable-expressions-of-concern-about-whether-it-would-be-wise-to-create-an-internet-police-agency\" class=\"wp-block-heading\">There were notable expressions of concern about whether it would be wise to create an internet police agency.<\/h3>\n\n<p class=\"wp-block-paragraph\">Interpol, the International Criminal Police Organization, is the group effort of 184 nations to facilitate cross-border police cooperation. It has been in existence since 1923, and has seen crime shift online in the past decade. It has limited influence, but is has concentrated some efforts on internet crime and crime prevention. It hosted its first international cybercrime conference in September 2005.[53.numoffset=&#8221;53&#8243; First International Cybercrime Investigation Conference site available online at <a href=\"http:\/\/www.interpol.int\/Public\/TechnologyCrime\/Conferences\/1stCybConf\/Conference.asp\">http:\/\/www.interpol.int\/Public\/TechnologyCrime\/Conferences\/1stCybConf\/Conference.asp<\/a>] In March 2006 an Interpol spokesman called on international politicians to make it easier for cybercrime to be fought across borders. He cited gangs that work online from Russia, China, the U.S. and other nations to target internet users across the globe.[54. Espiner, T., &#8220;Interpol: Give Us the Tools to Fight Cybercrime,&#8221; ZDNet UK, March 21, 2006, available online at <a href=\"http:\/\/news.zdnet.co.uk\/internet\/security\/0,39020375,39258540,00.htm\">http:\/\/news.zdnet.co.uk\/internet\/security\/0,39020375,39258540,00.htm<\/a>]<\/p>\n\n<p class=\"wp-block-paragraph\">In responding to the survey scenario of \u201cdeveloping and arming an effective, international security watchdog organization,\u201d several participants wrote in support of the way that individual nations are working separately and together right now in preventing crime and leveraging punishments. <\/p>\n\n<p class=\"wp-block-paragraph\">\u201cBillions of dollars are already being used to build an effective international security watchdog organization,\u201d wrote <b>Charlie Breindahl<\/b> of the IT University of Copenhagen. \u201cIt goes under names such as NSA, CIA and the Department of Homeland Security. Some of it is legal, some illegal. If there is a need to fulfill in this area, it is to put in place an international cyberpolice controlled by the UN; that possibility is moot, of course.\u201d<\/p>\n\n<p class=\"wp-block-paragraph\"> <b>Alejandro Pisanty<\/b>, vice chairman of the board for ICANN and CIO for the National University of Mexico, responded, \u201cA single &#8216;watchdog organization&#8217; seems less preferable, and less viable, than an active network of national, functional, and cross-national and cross-functional bodies with solid agreements among them.\u201d<\/p>\n\n<p class=\"wp-block-paragraph\">A counter argument was sounded by <b>John Browning, <\/b>founder of First Tuesday: \u201cA specialist tech-security watchdog sounds like a <i>really<\/i> bad idea: use a computer, go to jail.\u201d<\/p>\n\n<p class=\"wp-block-paragraph\"> <b>Fredric Litto<\/b> of the University of Sao Paulo in Brazil said \u201cincentivated communication\u201d (providing business groups and individuals with various incentives to encourage their continued use of communications tools for the common good) is a better answer than employment of such a force, adding, \u201cLeave policing to the last stage, you might not even need it.\u201d <\/p>\n\n<p class=\"wp-block-paragraph\">And many people voiced strong dissent regarding the concept of a formalized international internet-security group. <b>Glenn Ricart<\/b> wrote, \u201cI will not willingly choose to give up my privacy so that some international security organization can decide to intervene when they think it appropriate.\u201d <b>Cory Doctorow<\/b>, blogger and co-founder of <i>Boing Boing,<\/i> wrote, \u201cWhy do we need internet cops? How about internet architecture that helps users protect themselves instead?\u201d<\/p>\n\n<p class=\"wp-block-paragraph\"> <b>Rajnesh Singh<\/b> responded, \u201cICTs have become a new tool for criminals and terrorists, and it is important to think about and take the necessary protective measures, however this must not be at the peril of freedom of expression and basic human rights.\u201d <b>Ted Coopman<\/b> of the University of Washington-Seattle wrote, \u201cAny international ICT police force would not (based on my read of history) be used to protect people or infrastructure in general, but protect those in power from those who are not.\u201d<\/p>\n\n<p>[priorities to choose from on this list]<\/p>\n\n\n<p class=\"wp-block-paragraph\"> <a name=\"OLE_LINK2\"> <\/a> <a name=\"OLE_LINK1\"> <b>Scott Moore<\/b>, online community manager for the Helen and Charles Schwab Foundation, wrote, \u201cA centralized &#8216;enforcement unit&#8217; is utter bullshit. A watchdog group should do just that \u2013 use their resources to inform and spread the warnings so that people can be prepared. Arming a central organization against internet criminals is like trying to destroy bad weather.\u201d<\/a> <\/p>\n\n<p class=\"wp-block-paragraph\"> <b>Lynn Schofield Clark,<\/b> director of the Teens and the New Media @ Home Project at the University of Colorado also emphasized the ideal that members of civil society can work together to help patrol the internet. \u201cWe need a watchdog organization to oversee criminal and terrorist acts carried out through the use of ICTs; and we really need a series of well-supported, lower-level watchdog organizations to ensure that ICTs are not utilized by those in power to serve the interests of profit at the expense of human rights. We need ICT specialists to augment the work of important organizations already in existence that are fulfilling this watchdog role. The need for the watchdogs will only increase as time goes on.\u201d<\/p>\n\n<h3 data-is-section=\"true\" data-wp-context=\"{&quot;id&quot;:&quot;here-is-the-state-of-play-on-internet-policies-and-enforcement-policy&quot;}\" data-wp-interactive=\"{&quot;namespace&quot;:&quot;prc-block\\\/table-of-contents&quot;}\" id=\"here-is-the-state-of-play-on-internet-policies-and-enforcement-policy\" class=\"wp-block-heading\">Here is the state of play on internet policies and enforcement policy.<\/h3>\n\n<p class=\"wp-block-paragraph\">A treaty to help nations deal with cross-border crime has been in the works for many years. The Council of Europe Cybercrime Convention is open to signature by all nations, but conflicts over sovereignty and worries about speech and privacy rights have stalled it regularly since its beginnings in 1997.[55.numoffset=&#8221;55&#8243; The following U.S. Department of Justice site has a number of links to details regarding the treaty: <a href=\"http:\/\/www.usdoj.gov\/criminal\/cybercrime\/intl.html\">http:\/\/www.usdoj.gov\/criminal\/cybercrime\/intl.html<\/a>] Only a few nations have signed it, but the work continues. The Organization of American States and the Council of Europe held a joint cybercrime conference in December 2005, and the Asia Pacific Economic Cooperation Forum also conducts annual conferences. Representatives of the Computer Crime and Intellectual Property Section of the Criminal Division of the U.S. Department of Justice conduct cybercrime workshops in cooperation with representatives of many other nations.[56. To see a summary of recently prosecuted computer-crime cases in the U.S. online, go to: <a href=\"http:\/\/www.cybercrime.gov\/cccases.html\">http:\/\/www.cybercrime.gov\/cccases.html<\/a>]<\/p>\n\n<p class=\"wp-block-paragraph\">Individual countries have developed resources to educate internet users and help them identify and report crimes. In the U.S., five federal agencies and 13 private organizations announced the January 2006 launch of OnGuard Online (<a href=\"http:\/\/www.onguardonline.gov\/\">www.onguardonline.gov<\/a>), a site with information about monitoring credit history, the effective use of passwords and other security measures, and recovering from identity theft.[57. From the U.S. DOJ, <em>United States Activities to Improve Cybercrime Legislation and Investigate Capacities<\/em>, March 2006, available at <a href=\"http:\/\/www.coe.int\/t\/e\/legal_affairs\/legal_co-operation\/combating_economic_crime\/6_cybercrime\/t-cy\/(T-CY%20_2006_%2006%20-%20e%20-%20US%20Activities%20to%20ipmrove%20cybercrime%20l_205).pdf\">http:\/\/www.coe.int\/t\/e\/legal_affairs\/legal_co-operation\/combating_economic_crime\/6_cybercrime\/t-cy\/(T-CY%20_2006_%2006%20-%20e%20-%20US%20Activities%20to%20ipmrove%20cybercrime%20l_205).pdf<\/a>]<\/p>\n\n<h3 data-is-section=\"true\" data-wp-context=\"{&quot;id&quot;:&quot;some-see-the-enhancement-of-economic-systems-as-a-top-priority&quot;}\" data-wp-interactive=\"{&quot;namespace&quot;:&quot;prc-block\\\/table-of-contents&quot;}\" id=\"some-see-the-enhancement-of-economic-systems-as-a-top-priority\" class=\"wp-block-heading\">Some see the enhancement of economic systems as a top priority.<\/h3>\n\n<p class=\"wp-block-paragraph\">Throughout the survey many respondents noted that economics is critical for the creation of a better world. Consistent with that assertion, some of them ranked the fourth item as a valuable priority. While a few respondents replied that it is not possible to make such a system secure and few selected it as a first priority, some said it is a worthy goal to work toward. <\/p>\n\n<p class=\"wp-block-paragraph\">\u201cThe open-source development model must be applied to currency,\u201d wrote <b>Douglas Rushkoff,<\/b> author and teacher. \u201cInterest-bearing, centralized currency is the final obstacle to a collaborative international network.\u201d<\/p>\n\n<p class=\"wp-block-paragraph\">\u201cMicrocredit programmes have shown themselves to be some of the most useful and culture-enabling programmes yet developed. It&#8217;s brilliant that people should be able to find them independent of the intermediaries currently involved in brokering the programmes,\u201d wrote <b>Elle Tracy<\/b><i>,<\/i> president and e-strategies consultant for The Results Group.<\/p>\n\n<p class=\"wp-block-paragraph\"> <b>Ricart <\/b>responded, \u201cThe ordinary industrial finance system will get around to arranging an international monetary microcredit system as it is feasible to do so.\u00a0 Credit cards are getting close. I want trusted intermediaries to assure me that Ubu and Kwana&#8217;s farm really exists and that the pictures are not from somewhere else.\u201d<\/p>\n\n<p class=\"wp-block-paragraph\"> <b>Singh<\/b> wrote, \u201cA microcredit scheme would reach out to a new capital market that would benefit primarily those in the developing world who would otherwise find it hard to finance their small ventures. The funder would decide on the risk and partake in the necessary course of action (hopefully) without banking bureaucracy \u2013 a very practical outcome.\u201d<\/p>\n\n<p class=\"wp-block-paragraph\"> <b>Dan McCarthy<\/b>, managing director of equity funds company Neuberger Berman Inc., responded, \u201cCommunities on eBay\/PayPal\/Skype, Google, or Western Union could facilitate microcredit well before 2020.\u201d And the Internet Society\u2019s <b>Fred Baker<\/b> wrote, \u201cI don&#8217;t know that microfinancing as a vehicle for international philanthropy actually works, but finding ways to extend credit\/debit card systems to developing countries can be a way of helping them close the digital divide in commerce.\u201d<\/p>\n\n<p class=\"wp-block-paragraph\">There were those who disagreed. <b>David Weinberger<\/b> of Harvard&#8217;s Berkman Center wrote, \u201cMicrocredit will just make it easier to charge per bit. I&#8217;d hate to lose the froth of sharing.\u201d And <b>Paul Craven<\/b>, director of enterprise communications at the U.S. Department of Labor, wrote, \u201cI don&#8217;t think it is possible to build a &#8216;secure&#8217; international monetary microcredit system.\u201d<\/p>\n\n<h3 data-is-section=\"true\" data-wp-context=\"{&quot;id&quot;:&quot;there-is-a-virtue-to-putting-all-the-priorities-together&quot;}\" data-wp-interactive=\"{&quot;namespace&quot;:&quot;prc-block\\\/table-of-contents&quot;}\" id=\"there-is-a-virtue-to-putting-all-the-priorities-together\" class=\"wp-block-heading\">There is a virtue to putting all the priorities together.<\/h3>\n\n<p class=\"wp-block-paragraph\">Most respondents couldn&#8217;t resist including comments on the entire list of suggested priorities in their elaborations. Following are a few tightly woven responses. <\/p>\n\n<p class=\"wp-block-paragraph\"> <b>Syamant Sandhir<\/b> of Futurescape responded, \u201cBasic safeguards need to be set up in a global legal framework that builds on current growth and increasingly takes in new communities. Keeping peace in these now global communities would be paramount and on the basis of this safe and secure framework a microcredit system that helps communities would emerge.\u201d<\/p>\n\n<p class=\"wp-block-paragraph\">\u201cThese are all critically important policy pursuits,\u201d wrote <b>Jim McConnaughey<\/b>, a senior economic adviser active at the NTIA in U.S. policy on access and the digital divide. \u201cOne result that I would expect to happen would be a natural flow towards greater democratic tendencies in many developing and even developed countries, including more participatory debates and a higher rate of participation in political elections (through secure electronic voting).\u201d<\/p>\n\n<p class=\"wp-block-paragraph\"> <b>Seth Finkelstein<\/b>, author of the Infothought blog and an EFF Pioneer Award winner, wrote, \u201c1) The legal environment just might kill technological development. It&#8217;s a palpable threat. 2) Diversity is helpful. 3) I have my doubts microcredit is solvable, but it&#8217;s potentially useful. 4) Although scary, criminal and terrorist acts are relatively rare in the grand scheme of things.\u201d<\/p>\n\n<p class=\"wp-block-paragraph\"> <b>Joe Bishop <\/b>of Marratech AB wrote, \u201c1 and 2 will bring commerce. Commerce will create some equalization of wealth in places where it does not now exist. That will prompt 3.\u00a0 Governments will take care of 4 out of paranoia.\u201d<\/p>\n\n<p class=\"wp-block-paragraph\"> <b>Kerry Kelley,<\/b> vice president for SnapNames.com, responded, \u201c1) Making the Internet friendlier to native languages, so that people can communicate more easily cross-culturally. 2) Being able to trust that who you are communicating with is who they say they are &#8211; as opposed to a security watchdog. 3) Reducing &#8216;taxes&#8217; and &#8216;tolls.&#8217; Cost of bandwidth, ISP subscriptions, PCs and an &#8216;affordable&#8217; micropayment system are key. 4) Doing what we can to head off the balkanization of the Internet into incompatible systems. These are more where I see priorities lying personally. Some are a re-phrasing of the above.\u201d<b><\/b><\/p>\n\n<p class=\"wp-block-paragraph\"> <b>Steve Cisler,<\/b> a developer of world-wide community networks (including public-access projects in Guatemala, Ecuador, and Uganda), was among several respondents who said the meeting of basic human needs is the only real priority in many vast regions of the world today. \u201cNon-internet-related problems are a much higher priority than any of these,\u201d he wrote, \u201cthough I realize money will flow to these technological\/policy challenges without taking care of more basic problems. This comes from the eight months I spent offline talking to people not using the Internet. It&#8217;s just not a high priority \u2013 except those of us\/you in the ICT world.\u201d<\/p>\n\n<p class=\"wp-block-paragraph\">Over the past few years some people concerned about the degree of U.S. influence over internet policy decisions have lobbied for more international voices to be heard. Because most of the innovation of the network architecture took place in the United States and the U.S. was the first nation to overwhelmingly adopt the internet in day-to-day communication, it had exercised the most control in network decisions. But the world caught up with (and some nations have surpassed) the U.S. in regard to internet proliferation and usage over the past few years. <\/p>\n\n<p class=\"wp-block-paragraph\">In the beginning years of the new millennium, leaders of the United Nations and its affiliated communications organization the International Telecommunication Union called together representatives from all nations for an effort called the World Summit on the Information Society. This spawned the Working Group on Internet Governance \u2013 a body assigned to make recommendations about worldwide involvement in the positive development of the internet as a tool for all.<\/p>\n\n<p class=\"wp-block-paragraph\">There was some speculation that an international organization under the jurisdiction of the United Nations would be created to replace ICANN and the Internet Society. Representatives of the U.S. and other nations opposed this idea and seem to have won their point during negotiations in 2005. ICANN will remain the key authority through 2011, with the Internet Society&#8217;s Internet Engineering Task Force and Internet Architecture Board also making key decisions. The WGIG eventually recommended in the fall of 2005 that a new international consulting body \u2013 the Internet Governance Forum \u2013 should be formed. The UN announced that this group is \u201ca new forum for multi-stakeholder dialogue on internet governance.\u201d<\/p>\n\n<p class=\"wp-block-paragraph\">The IGF&#8217;s power is expected to be limited to identifying issues to be addressed in order for all people to benefit from digital communications networks. At its first meeting in Athens in October 2006, the pre-identified talking points are openness, security, diversity and access; and the meeting announcement reports that \u201ccapacity will be a cross-cutting priority.\u201d <\/p>","protected":false},"excerpt":{"rendered":"<p>Setting Priorities: Question and Responses Respondents were asked the following: If you were in charge of setting priorities about where to spend the available funds for developing information and communications technologies (predominantly the internet) to improve the world, how would you rank order the following international concerns? Please number these from 1 to 4, with [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","sub_headline":"","sub_title":"","_prc_public_revisions":[],"_ppp_expiration_hours":0,"_ppp_enabled":false,"ai_generated_summary":"","bylines":[],"acknowledgements":[],"displayBylines":true,"relatedPosts":[],"reportMaterials":[],"multiSectionReport":[],"package_parts__enabled":false,"package_parts":[],"_prc_fork_parent":0,"_prc_fork_status":"","_prc_active_fork":0,"datacite_doi":"","datacite_doi_citation":"","_prc_seo_qr_attachment_id":0,"spoken_article_player_enabled":true,"footnotes":""},"categories":[],"tags":[],"bylines":[],"collection":[],"datasets":[],"level_of_effort":[],"primary_audience":[],"information_type":[],"_post_visibility":[],"formats":[458],"_fund_pool":[],"languages":[],"regions-countries":[],"research-teams":[526],"class_list":["post-96521","post","type-post","status-publish","format-standard","hentry","formats-report","research-teams-internet"],"label":false,"post_parent":96590,"word_count":4135,"canonical_url":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2006\/09\/24\/funding-priorities-respondents-rank-four-suggested-priorities-for-building-the-networked-future\/","art_direction":false,"_embeds":[],"table_of_contents":[{"id":96590,"title":"The Future of the Internet II","slug":"the-future-of-the-internet-ii","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2006\/09\/24\/the-future-of-the-internet-ii\/","is_active":false},{"id":96598,"title":"Acknowledgments","slug":"acknowledgments-14-5","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2006\/09\/24\/acknowledgments-14-5\/","is_active":false},{"id":96603,"title":"Introduction","slug":"introduction-11","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2006\/09\/24\/introduction-11\/","is_active":false},{"id":96609,"title":"Scenario One: A global, low-cost network thrives","slug":"scenario-one-a-global-low-cost-network-thrives","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2006\/09\/24\/scenario-one-a-global-low-cost-network-thrives\/","is_active":false},{"id":96614,"title":"Scenario Two: English displaces other languages","slug":"scenario-two-english-displaces-other-languages","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2006\/09\/24\/scenario-two-english-displaces-other-languages\/","is_active":false},{"id":96620,"title":"Scenario Three: Autonomous technology is a problem\u2026","slug":"scenario-three-autonomous-technology-is-a-problem","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2006\/09\/24\/scenario-three-autonomous-technology-is-a-problem\/","is_active":false},{"id":96626,"title":"Scenario Four: Transparency builds a better world, even at the expense of privacy\u2026","slug":"scenario-four-transparency-builds-a-better-world-even-at-the-expense-of-privacy","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2006\/09\/24\/scenario-four-transparency-builds-a-better-world-even-at-the-expense-of-privacy\/","is_active":false},{"id":96506,"title":"Scenario Five: Virtual reality is a drain for some\u2026","slug":"scenario-five-virtual-reality-is-a-drain-for-some","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2006\/09\/24\/scenario-five-virtual-reality-is-a-drain-for-some\/","is_active":false},{"id":96511,"title":"Scenario Six: The internet opens worldwide access to success\u2026","slug":"scenario-six-the-internet-opens-worldwide-access-to-success","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2006\/09\/24\/scenario-six-the-internet-opens-worldwide-access-to-success\/","is_active":false},{"id":96516,"title":"Scenario 7: Some Luddites\/refuseniks will commit terror acts\u2026","slug":"scenario-7-some-ludditesrefuseniks-will-commit-terror-acts","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2006\/09\/24\/scenario-7-some-ludditesrefuseniks-will-commit-terror-acts\/","is_active":false},{"id":96521,"title":"Funding Priorities: Respondents rank four suggested priorities for building the networked future","slug":"funding-priorities-respondents-rank-four-suggested-priorities-for-building-the-networked-future","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2006\/09\/24\/funding-priorities-respondents-rank-four-suggested-priorities-for-building-the-networked-future\/","is_active":true},{"id":96525,"title":"Reflections","slug":"reflections","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2006\/09\/24\/reflections\/","is_active":false},{"id":96529,"title":"Methodology","slug":"methodology-112-2","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2006\/09\/24\/methodology-112-2\/","is_active":false},{"id":96534,"title":"Brief Biographies","slug":"brief-biographies","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2006\/09\/24\/brief-biographies\/","is_active":false}],"report_materials":"","report_pagination":{"current_post":{"id":96521,"title":"Funding Priorities: Respondents rank four suggested priorities for building the networked future","slug":"funding-priorities-respondents-rank-four-suggested-priorities-for-building-the-networked-future","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2006\/09\/24\/funding-priorities-respondents-rank-four-suggested-priorities-for-building-the-networked-future\/","is_active":true,"page_num":11},"next_post":{"id":96525,"title":"Reflections","slug":"reflections","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2006\/09\/24\/reflections\/","is_active":false,"page_num":12},"previous_post":{"id":96516,"title":"Scenario 7: Some Luddites\/refuseniks will commit terror acts\u2026","slug":"scenario-7-some-ludditesrefuseniks-will-commit-terror-acts","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2006\/09\/24\/scenario-7-some-ludditesrefuseniks-will-commit-terror-acts\/","is_active":false,"page_num":10},"pagination_items":[{"id":96590,"title":"The Future of the Internet II","slug":"the-future-of-the-internet-ii","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2006\/09\/24\/the-future-of-the-internet-ii\/","is_active":false,"page_num":1},{"id":96598,"title":"Acknowledgments","slug":"acknowledgments-14-5","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2006\/09\/24\/acknowledgments-14-5\/","is_active":false,"page_num":2},{"id":96603,"title":"Introduction","slug":"introduction-11","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2006\/09\/24\/introduction-11\/","is_active":false,"page_num":3},{"id":96609,"title":"Scenario One: A global, low-cost network thrives","slug":"scenario-one-a-global-low-cost-network-thrives","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2006\/09\/24\/scenario-one-a-global-low-cost-network-thrives\/","is_active":false,"page_num":4},{"id":96614,"title":"Scenario Two: English displaces other languages","slug":"scenario-two-english-displaces-other-languages","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2006\/09\/24\/scenario-two-english-displaces-other-languages\/","is_active":false,"page_num":5},{"id":96620,"title":"Scenario Three: Autonomous technology is a problem\u2026","slug":"scenario-three-autonomous-technology-is-a-problem","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2006\/09\/24\/scenario-three-autonomous-technology-is-a-problem\/","is_active":false,"page_num":6},{"id":96626,"title":"Scenario Four: Transparency builds a better world, even at the expense of privacy\u2026","slug":"scenario-four-transparency-builds-a-better-world-even-at-the-expense-of-privacy","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2006\/09\/24\/scenario-four-transparency-builds-a-better-world-even-at-the-expense-of-privacy\/","is_active":false,"page_num":7},{"id":96506,"title":"Scenario Five: Virtual reality is a drain for some\u2026","slug":"scenario-five-virtual-reality-is-a-drain-for-some","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2006\/09\/24\/scenario-five-virtual-reality-is-a-drain-for-some\/","is_active":false,"page_num":8},{"id":96511,"title":"Scenario Six: The internet opens worldwide access to success\u2026","slug":"scenario-six-the-internet-opens-worldwide-access-to-success","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2006\/09\/24\/scenario-six-the-internet-opens-worldwide-access-to-success\/","is_active":false,"page_num":9},{"id":96516,"title":"Scenario 7: Some Luddites\/refuseniks will commit terror acts\u2026","slug":"scenario-7-some-ludditesrefuseniks-will-commit-terror-acts","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2006\/09\/24\/scenario-7-some-ludditesrefuseniks-will-commit-terror-acts\/","is_active":false,"page_num":10},{"id":96521,"title":"Funding Priorities: Respondents rank four suggested priorities for building the networked future","slug":"funding-priorities-respondents-rank-four-suggested-priorities-for-building-the-networked-future","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2006\/09\/24\/funding-priorities-respondents-rank-four-suggested-priorities-for-building-the-networked-future\/","is_active":true,"page_num":11},{"id":96525,"title":"Reflections","slug":"reflections","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2006\/09\/24\/reflections\/","is_active":false,"page_num":12},{"id":96529,"title":"Methodology","slug":"methodology-112-2","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2006\/09\/24\/methodology-112-2\/","is_active":false,"page_num":13},{"id":96534,"title":"Brief Biographies","slug":"brief-biographies","link":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/internet\/2006\/09\/24\/brief-biographies\/","is_active":false,"page_num":14}]},"parent_info":{"parent_title":"The Future of the Internet II","parent_id":96590},"materialsOrdered":[],"chaptersOrdered":[],"partsOrdered":[],"partsEnabled":false,"datacite_doi":"","prc_seo_data":{"title":"Funding Priorities: Respondents rank four suggested priorities for building the networked future","description":"Setting Priorities: Question and Responses Respondents were asked the following: If you were in charge of setting priorities about where to spend the available funds for developing information and communications&hellip;","og_title":"Funding Priorities: Respondents rank four suggested priorities for building the networked future","og_description":"Setting Priorities: Question and Responses Respondents were asked the following: If you were in charge of setting priorities about where to spend the available funds for developing information and communications&hellip;","schema_type":"Article","noindex":false,"canonical_url":"","primary_terms":[],"custom_schema":[],"og_image":0,"indexnow_submitted_at":null,"gsc_index_status":null},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"relatedPostsOrdered":[],"bylinesOrdered":[],"acknowledgementsOrdered":[],"_links":{"self":[{"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/posts\/96521","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/comments?post=96521"}],"version-history":[{"count":2,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/posts\/96521\/revisions"}],"predecessor-version":[{"id":133720,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/posts\/96521\/revisions\/133720"}],"wp:attachment":[{"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/media?parent=96521"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/categories?post=96521"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/tags?post=96521"},{"taxonomy":"bylines","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/bylines?post=96521"},{"taxonomy":"collection","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/collection?post=96521"},{"taxonomy":"datasets","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/datasets?post=96521"},{"taxonomy":"level_of_effort","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/level_of_effort?post=96521"},{"taxonomy":"primary_audience","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/primary_audience?post=96521"},{"taxonomy":"information_type","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/information_type?post=96521"},{"taxonomy":"_post_visibility","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/_post_visibility?post=96521"},{"taxonomy":"formats","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/formats?post=96521"},{"taxonomy":"_fund_pool","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/_fund_pool?post=96521"},{"taxonomy":"languages","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/languages?post=96521"},{"taxonomy":"regions-countries","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/regions-countries?post=96521"},{"taxonomy":"research-teams","embeddable":true,"href":"https:\/\/alpha.pewresearch.org\/pewresearch-org\/wp-json\/wp\/v2\/research-teams?post=96521"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}