Who Owns Knowledge - Knowledge and The Law - Nico Stehr, Bernd Weiler - 1, 2008 - Transaction Pub - 9780765803375 - Anna's Archive
Who Owns Knowledge - Knowledge and The Law - Nico Stehr, Bernd Weiler - 1, 2008 - Transaction Pub - 9780765803375 - Anna's Archive
Who Owns Knowledge - Knowledge and The Law - Nico Stehr, Bernd Weiler - 1, 2008 - Transaction Pub - 9780765803375 - Anna's Archive
Intentionally
Left Blank
Transaction Publishers
New Brunswick (U.S.A.) and London (U.K.)
Copyright © 2008 by Transaction Publishers, New Brunswick, New Â�Jersey.
All rights reserved under International and Pan-American Copyright
Conventions. No part of this book may be reproduced or transmitted in any form
or by any means, electronic or mechanical, including photocopy, recording, or
any information storage and retrieval system, without prior permission in writing
from the publisher. All inquiries should be addressed to Transaction Publishers,
Rutgers—The State University of New Jersey, 35 Berrue Circle, Piscataway,
New Jersey 08854-8042. www.transactionpub.com
This book is printed on acid-free paper that meets the American National
Standard for Permanence of Paper for Printed Library Materials.
K487.S3W46 2008
340'.11—dc22 2007037421
Contents
Preface vii
Nico Stehr
Introduction: Knowledge and the Law: Can Knowledge be Made Just? 1
Nico Stehr, Christoph Henning and Bernd Weiler
Part 1
The Social Contexts of Knowledge and the Law
Introduction to Part 1 17
Steve Fuller
Warwick University
1. The Law and Economics of Rights in Valuable Information 25
Edmund W. Kitch
University of Virginia, USA
2. Scientific Norms, Legal Facts, and the Politics of Knowledge 67
Alfons Bora
University of Bielefeld, Germany
3. Is a Just System also Fair? Traversing the Domain of Knowledge,
Institutions, Culture, and Ethics 87
Anil K. Gupta
Indian Institute of Management, Vastrapur, India
Part 2
Major Social Institutions, Knowledge and the Law
Contributors 315
Index 321
Preface
Nico Stehr
The age of industrialization approaches its end. The structures of the traditional
social order are losing their meaning. Its elements, such as work and property,
are being overwritten by a new social order already visible on the horizon. The
bases of this social order rest on knowledge — as much on everyday knowledge
as, increasingly, on scientific knowledge. As the capacity to take action, as
the possibility to “get things rolling,” knowledge is not only constitutive for
economic activities, production and consumption. It is also the basis of any
communication between human beings, and represents the means of organizing
and integrating modern global society. It is meaningful, therefore, to describe
this society as a knowledge society. That is to say, we mold reality by virtue of
our knowledge.
While industrial societies give way to knowledge societies, the institutional
architecture of modern societies, in terms of basic social structure — in the
form of major social institutions, the political system, civic society, the law,
science, the economy and religion, to mention the most formidable institutions
— remains part of the basic structural arrangement of society. But the relations
among major social institutions change. The growing importance of knowl-
edge for social institutions is unevenly distributed among them. Yet all social
institutions have to cope with and respond to the growing societal significance
of knowledge. This is certainly also the case for the legal system.
The major interests of this anthology center on the ways in which the legal
system deals with knowledge: in light of its enhanced significance for oth-
er social institutions, for example, especially the state, civil society and the
economy; but also for science itself as the “author” of much of the additional
knowledge that is the motor of modern social change and social problems.
More concretely, two of the apparently incompatible, and in this context
competing, but fundamental perspectives on the role of knowledge between
the legal and economic systems are: (1) The notion that the most important
basis of new knowledge is available knowledge. But in so far as access to
parts of the existing knowledge base is protected (e.g. through patents, copy-
right, etc.), the growth of knowledge is impeded. (2) If new knowledge is not
vii
viii Who Owns Knowledge
1
2 Who Owns Knowledge?
In a recent decision (June 27, 2005), the US Supreme Court ruled in favor
of some major film and music companies. This means that Internet platforms
Introduction: Knowledge and the Law 3
such as Morpheus and Grokster, which offer tools that could be used to distrib-
ute music and films for free, are endangered1; or, put differently, that the law
protects the music industry from losses through piracy. But how and why did
the results of creative activities come into the purview of the legal system in
the first place? And how, for example, did creators, imitators and consumers of
“knowledge” respond then and now to the establishment and the enforcement
of property rights attached to their creations?
In the 1980s, the video player was allowed onto the market even though it
enabled users to produce copies of video films. Two decades later, major com-
panies seem to have a much higher impact on our conceptions of justice, or at
least to have such an influence on the legal system. In a current Supreme Court
case (Laboratory Corp. vs. Metabolite), a diagnostic blood test is claimed as
“property” by two different parties — companies who claim royalties due to
different patents (Andrews, 2006:B20; Kintisch, 2006:946ff.). What is at stake
here? As most theories mainly focus on the inventor (“incentives”) and the
consumer (the “public good”), it is important to distinguish the relevant stake-
holders more carefully. There are not only these two, but at least four different
parties involved.2
First, there is the artist or inventor as the initial producer of creative content.
Second, there is the industry that promotes the artist and profits from sales of
records and movies. Sometimes there are intermediary traders between them,
buying and selling patents or copyrights, which makes the issue even more
complicated. Third, we have the users who buy and consume these products.
And finally, we have associations of users who share these products amongst
themselves. It is important to see that in the case in question it was the second
party against the fourth, not — as standard economic theory often portrays it
— the first against the third party. Businesses want to “force” users to buy cop-
ies from them, and not to exchange copies amongst themselves. The question
is whether they have a right to do so, and on what grounds. In other words:
How can knowledge become a property that is protected by law? And what are
the varying interests of the different actors involved?
In some cases, as in the case of the rock band “Metallica” against the plat-
form “Napster,” it is the artists themselves suing the Internet platforms. This
touches the very notion of property: usually an owner can use his property in
whatever way he likes. But in this case, there are different dimensions of prop-
erty: on the one hand the material property of the product, the single product,
on the other hand the intellectual property, or the prototype, which usually
belongs to the industry or to the artist.
The reasons for conflicts like these are manifold. Some of them have to
be looked for in the technological changes of the last decades. Usually, mate-
rial property means that if somebody owns something, nobody else can physi-
cally use the same thing at the same time. Therefore every second user has to
buy another copy of the good in question — its use is exclusive. In terms of
many knowledge-based products, this social relation between consumers has
changed. It is technically possible to move the frontiers: goods such as music
or films are becoming intangibles. Their use is no longer exclusive if you can
reproduce them on your computer and distribute them through the Internet. Of
course this conflicts with the interests of the industries that had formerly mo-
nopolized the distribution of these products, both technically and legally. Now
that the technical matters have changed, it is a contested area whether the law
should try and suppress these possibilities to the benefit of the companies and
artists (which is what has happened in most cases so far); or whether it should
allow for this non-market distribution to the benefit of customers. In any case,
these conflicting interests, which are induced by knowledge, call for a new
legal framework.
We find a similar situation in the scientific community. Usually supported
by state funds, researchers did not have to focus on the business side of sci-
ence, which was even considered to be against the ethic of science, for example
in Robert Merton’s well-known norms of science. A “capitalization of knowl-
edge” was called for only when universities and researches had to organize
their own funding, due to the privatization of the system of education.3 Now
that scientists depend more and more on private funding, they have a greater
incentive to “sell” and “market” their products (which clearly was the motive
for Korean Woo-Suk Hwang to publish his faked stem-cell research in Science
and Nature; Wade, 2006).4
There is a complicated relation between science, economic progress, and
the law. Early on, the American Constitution granted a limited protection of
intellectual property:
Congress shall have power . . . to promote the progress of science and useful arts,
by securing for limited times to authors and inventors the exclusive right to their
respective writings and discoveries. (Constitution of the United States of America,
Article 1, Section 8; see www.constitution.org/constit_.htm)
The main argument is the economic incentive for inventors to invent, for cre-
ators to be creative, and for scientists to do research (cf. Scotchmer, 2004). This
is an argument concerning the action tendencies of individuals; yet the assump-
tion of a “homo economicus” is currently contested even in economics itself.
For this reason some — as, for example, the open-source movement (Weber,
2004) — call the incentive theory of patents into question, arguing that creativ-
ity is an end in itself and not an economic means. Given that artists and scien-
tists are publicly funded, they would hardly bother to “capitalize” their knowl-
edge — yet exactly this is what is not given in the real world any longer.
Moreover, the steady growth of the economy — and related to this, of the
public welfare in general — depends on constant innovation. This is a macro-
argument, not about individual behavior, but rather about the behavior of com-
plex social systems. Often it is simply assumed that patents are the best way to
spread new productive technologies (which can to a certain extent simply be
called “knowledge”) across the industries. Though this is a reasonable assump-
tion, it remains an empirical question, and recent research shows that the “leak-
ing” of science through patents is actually slower than the standard distribution
of knowledge via the scientific institutions: “the priority publication system in
science appears to distribute information more rapidly than the patent system”
(Adams, Clemmons, and Stephan, 2006). Some have even argued that — due
to corporate strategic behavior, legal bureaucratization and other reasons — at
this very moment, the US Patent System is even “endangering Innovation”
(Jaffe and Lerner, 2004).
In all modern societies, we now find elaborate drug regulations and correspond-
ing agencies that register, test, control, or permit pharmaceutical substances to
enter the market as legalized drugs. Until a few decades ago, decisions about
the production and marketing of chemicals as drugs were made by corpora-
tions, by individual pharmacists or by physicians (Henk, Henk, and de Vries,
1987:243–259).5 As scientific knowledge is “applied,” it becomes embedded in
social contexts external to science. As a part of such embeddedness, knowledge
is subject to the kinds of (latent) control mechanisms and social constraints
found in and constitutive for these contexts. It simply cannot escape the selec-
tivity that issues from such external contexts, even if only in efforts designed to
generate trust toward a certain artifact or solution offered by novel knowledge.
The whole area of national and international intellectual property and copy-
right protection is another arena in which legislation to control the deploy-
5 A discussion and analysis of the grants economy may be found in Boulding
(1981).
6 Who Owns Knowledge?
together with demands to regulate and adjudicate the specific utilization of and
access to knowledge.
The dissemination and application of knowledge do not occur in the imagi-
nary world of perfect, unimpeded competition and equality of opportunities.
As a result, a politics of knowledge must confront the consequences of the
social distribution of knowledge, especially the stratified access to and utiliza-
tion of knowledge.6 It remains an open question, for example, to what extent
dispossession of knowledge generates social conflicts, and in what specific
ways such struggles manifest themselves. Several decades ago, Daniel Bell
(1964:49) warned that right-wing extremism may “benefit” from any exclusion
of social groups from access to and acquisition of technical expertise.
However, such predictions of the intellectual, social, and economic gaps
sustained by knowledge overestimate the extent to which knowledge and its
use can in fact be controlled. It will be increasingly difficult to control knowl-
edge, in spite of the many efforts that will undoubtedly be made. Efforts to
control knowledge encounter contradictions. Sustaining economic growth, for
example, requires an expansion of knowledge. And knowledge that expands
rapidly is difficult to control. The expansion of knowledge enlarges the seg-
ment of knowledge-based occupations. Knowledge expansion and knowledge
dissemination rely on conditions that are themselves inimical to control. None-
theless, as we have observed, the typically expressed fear that an inevitable
outcome of such developments is the greater ease with which knowledge (and
information) can be monopolized and effectively employed for repressive
(even totalitarian) purposes, or even as a tool of maintaining the benign status
quo, had been a widely accepted premise of discussion of the social control
of knowledge, even before Orwell’s classic book on the subject. What exactly
nourishes this point of view? What is the basis for the widespread conviction
that knowledge and technical artifacts are relatively easy to control, and that
access to knowledge can be easily denied (Weingart and Pansegrau, 1999)?
Modern economies are mainly based on the market system, as opposed to other
forms of allocation like planning, gift exchange, or grants.7 But a market is nei-
ther a purely self-organizing entity, as it is often argued in mainstream textbook
economics, nor is it a universal structure that is simply given as such. There is a
broad variety of concrete markets. First, there are different markets according
to the goods traded and the services exchanged: the financial market operates
6 For a more complex approach, see Kitch (2000:1727–1741).
7 For the history of the market system, see Karl Polanyi (1944); Marcel Mauss
([1950] 1990); Belshaw (1965).
8 Who Owns Knowledge?
differently from the market for raw materials, the market for industrial goods,
the one for services or — last but not least — the labor market. Secondly, as the
property-rights approach stresses, every market depends on a legal framework.
Different countries or supranational institutions may very well “choose” quite
different institutional frames, and this is bound to have a significant impact on
the nature of markets.8
In the recent past, another market form has acquired greater and greater
economic significance; namely, the market for knowledge-based products
and services, often referred to as the foundation and the evolution of the
“knowledge economy” (see, for example, Stehr, 2002). Though more a grad-
ual leap than a qualitative inception, knowledge-based means of production,
knowledge-related products such as computer programs, new productive
technologies like nano- and biotechnology, pharmaceutical products — but
also films, CDs, and knowledge contingent services — continue to gain ever
higher market shares. The social sciences are challenged to ask how the exist-
ing legal frames adapt to these evolving markets, and how the legal system
might cope in the future in order to inject a measure of fairness and equity
into the distribution of knowledge, as well as into products and services em-
bedded in knowledge.
These questions are difficult ones. Some of the unique and salient attributes
of knowledge-based products and services are different from other commodi-
ties exchanged in the marketplace: “knowledge-based products are intangible,
non-excludable and non-rivalrous goods” (Cowan and Harrison, 2001; Cornes
and Sandler, 1986; Romer, 1993:345–399). Once dispatched to the market,
knowledge, it is argued, does not need to be acquired again and again; it is
freely available to everyone. It becomes a “public good.” The use by one agent
does not preclude its use by another agent (non-excludability), and there is no
competition when it comes to its use; or it is difficult, if not impossible, for the
creator of the claim, for example, to preclude others from using it (rivalry).
That is, if A sells such information/knowledge to B, it is unlikely that B will
enjoy the exclusive use of the information purchased. It is also unlikely that A
and B will compete for access to the general stock of knowledge.
In addition, the material base in which information is inscribed, and which
thus restricts in some way the non-rivalrous or non-excludable nature of
knowledge, may affect these relations and transactions involving knowledge/
information. For economists, these attributes of knowledge/information make
it a prototypical example of a public good. The inability to appropriate or com-
mand all the returns on knowledge is presumably a general disincentive to
8 For a public choice approach, see James Buchanan (1968). For the sensitivity of
markets to non-economic motives, see Nico Stehr, Christoph Henning, and Bernd
Weiler (2005). Also, Hernando de Soto (2000).
Introduction: Knowledge and the Law 9
the private sector, and therefore to the private fabrication as well as supply
of knowledge. Given these special characteristics of knowledge, the World
Bank concludes that “public action is sometimes required to provide the right
incentive for its creation and dissemination by the private sector, as well as to
directly create and disseminate knowledge when the market fails to provide
enough” (World Bank, 1999:17).
Yet exactly this causes a dilemma: Because capitalistic markets are not
need-driven, but rather profit-oriented, this raises the question of how prof-
its can be made in the case of non-excludable and non-rivalrous goods and
services. Prima facie there are two possibilities. Either the initial price of a
knowledge product has to be so high that the first sold product covers not only
the investments into research and development as well as the production costs,
but also a “decent” profit — and in a way, this is what patent law does. But the
economic disadvantage in this case is that demand and supply may not match:
who is willing to pay such a high price, especially when everybody knows that
the second (third, etc.) user will get access to the product for free? Therefore
the second possibility is to sell its products for “normal” prices, but to try and
restrict the access to the product in question instead, even after it is sold. This
is the aim of copyright: a user may read the book she bought, but as long as it
is protected by copyright she must not copy it. But this would mean a serious
obstacle to the dissemination of new technologies.
This is a classical dilemma: on the one side there is the immediate public
welfare associated with a new knowledge-based good: if access to this good is
restricted — technologically, by law, by monetary mechanisms, or all — the
public welfare (or its “social value,” as Cowan and Harrison put it) is dimin-
ished, as only a few producers or consumers have the right to use the new
technology or the new product, or the price of these products rises due to the
addition of royalties on top of production prices. This may tighten social in-
equality and lead to monopolies that may reduce the total market outcome (net
productivity).9 On the other hand, if access to the knowledge-based products is
not restricted, the incentive to produce them in the first place may be in ques-
tion, as it is very unlikely to make a profit. At least, this is how some authors
view the matter.10
But this only raises new questions. Is it really a primarily monetary interest
that drives scientists and artists? One could easily imagine that they might be
willing to distribute their products freely, because they — in most cases no
9 For this argument see, for example, Peter Drahos (1996); R.V. Bettig (1996); Law-
rence Lessig (2005b).
10 See, for example, A.D. Moore (2001). As an overview to these discussions see Pe-
ter S. Menell (1999); Daniel Andriessen (2004); and, for German readers: Brigitte
Hilmer (2004:708–792).
10 Who Owns Knowledge?
References
Adams, James D., J. Roger Clemmons, and Paula E. Stephan (2006) “How rapidly does
Science leak out?” National Bureau of Economic Research Working Paper Series
11997 (January 2006), online at: www.nber.org/papers/w11997.
Allee, Verna (1997) The Knowledge Evolution: Expanding Organizational Intelligence.
Boston: Butterworth-Heinemann.
Andersen, Birgitte and Sue Konzelmann (2005) “In Search of a Useful Theory of the
Productive Potential of Intellectual Property Rights,” Oxford Intellectual Property
Research Centre Working Paper Series 5, May 2005, online at www.oiprc.ox.ac.
uk/EJWP0505.html.
Andrews, Lori B. (2006) “The Patent Office as Thought Police.” The Chronicle Review
52(24): B20.
Andriessen, Daniel (2004) Making Sense of Intellectual Capital. Amsterdam: Butter-
worth Heinemann.
Bell, Daniel (1968) “The Measurement of Knowledge and Technology.” Pp. 145–246
in Eleanor B. Sheldon and Wilbert E. Moore, eds., Indicators of Social Change:
Concepts and Measurements. Hartford, CT: Russell Sage Foundation.
———(1964) “The Post-industrial Society.” In Eli Ginzberg, ed., Technology and Social
Change. New York: Columbia University Press.
Belshaw, Cyril S. (1965) Traditional Exchange and Modern Markets. Englewood
Cliffs, NJ: Prentice-Hall.
Bettig, R.V. (1996) Copyrighting Culture: The Political Economy of Intellectual Prop-
erty. Boulder: Westview Press.
12 See, for example, Bollier (2002). The term “enclosure” is meant to indicate that
there is a parallel to earlier processes that Karl Marx once called “primitive accu-
mulation.”
12 Who Owns Knowledge?
Bollier, David (2002) “Reclaiming the Commons: Why We Need to Protect our Public
Resources from Private Encroachment.” Boston Review (Summer).
Boulding, Kenneth (1981) A Preface to Grants Economics: The Economy of Love and
Fear. New York: Praeger.
Buchanan, James (1968) The Demand and Supply of Public Goods. Chicago: Rand
McNally & Company.
Burk, Dan L. and Mark A. Lemley (2003) “Policy Levers in Patent Law.” Virginia Law
Review 89(7): 1575–1696.
Cornes, Richard and Todd Sandler (1986) The Theory of Externalities, Public Goods,
and Club Goods. Cambridge: Cambridge University Press.
Cowan, Robin and Elad Harrison (2001) “Intellectual Property Rights in a Knowledge-
based Economy.” MERIT-Infonomics Research Memorandum Series 2001-027,
Maastricht Economic Research Institute on Innovation and Technology.
Drahos, Peter (1996) A Philosophy of Intellectual Property. Aldershot: Dartmouth.
Dworkins, Gerald (1997) “Should there be Property Rights in Genes?” Philosophical
Transactions: Biological Sciences 352(1357): 1077–1086.
Etkowitz, Henry and Andrew Webster (1995) “Science as Intellectual Capital.” Pp.
480–505 in Sheila Jasanoff, ed., Handbook of Science and Technology Studies.
Thousand Oaks, CA: Sage.
Hayek, Friedrich August v. (1969) “Competition as a Discovery Procedure,” available
online at http://www.mises.org/journals/qjae/pdf/qjae5_3_3.pdf.
Henk, J.H.W. Bodewitz, Buurma Henk, and Gerard H. de Vries (1987) “Regulatory Sci-
ence and the Social Management of Trust in Medicine.” Pp. 243–259 in Wiebke
E. Bijker, Thomas P. Hughes, and Trevor Pinch, eds., The Social Construction of
Technological Systems: New Directions in the Sociology and History of Technol-
ogy. Cambridge, MA: MIT Press.
Hilmer, Brigitte, ed. (2004) “Schwerpunkt: Geistiges Eigentum.” Deutsche Zeitschrift
für Philosophie 52(5):708–792.
Jaffe, Adam B. and Jost Lerner (2004) Innovation and Its Discontents: How Our Broken
Patent System is Endangering Innovation and Progress, and What to Do About It.
Princeton, NJ: Princeton University Press.
Kinsella, N. Stephan (2001) “Against Intellectual Property.” Journal of Libertarian
Studies 15(2):1–53.
Kintisch, Eli (2006) “What Good is a Patent? Supreme Court May Suggest an Answer.”
Science 311:946 ff.
Kitch, Edmund W. (2000) “Elementary and Persistent Errors in the Economic Analysis
of Intellectual Property.” Vanderbilt Law Review 53(6):1727–1741.
Klein, Naomi (2001) “Reclaiming the Commons.” New Left Review 9:81–89.
Koo, Bonwoo, Carol Nottenburg, and Philip G. Pardey (2004) “Plants and Intellectual
Property: An International Appraisal.” Science 306:1295–1297.
Lessig, Lawrence (2005a) “Innovation Commons.” Pp. 227–240 in Nico Stehr, ed., The
Governance of Knowledge. New Brunswick, NJ: Transaction.
——— (2005b) Free Culture: The Nature and Future of Creativity. London: Penguin
Books.
Mauss, Marcel ([1950] 1990) The Gift: The Form and Reason for Exchange in Archaic
Societies, trans. W.D. Halls. London: Routledge.
Menell, Peter S. (1999) “Intellectual Property: General Theories.” In Boudewijn
Bouckaert and Gerrit De Geest, eds., Encyclopedia of Law and Economics. North-
hampton, MA: Edward Elgar Publishing Inc.
Introduction: Knowledge and the Law 13
Steve Fuller
The papers in the first part of Who Owns Knowledge? are organized from the
least to the most embodied conceptions of knowledge countenanced in con-
temporary social science. The first paper, a reprinted classic by Edmund Kitch,
epitomizes a widely held view among economists, and increasingly lawyers,
that knowledge escapes any easy characterization in terms of the qualities of
ordinary privately owned material goods. Next comes Alfons Bora, a soci-
ologist in the tradition of Niklas Luhmann, who treats the body of scientific
knowledge as constituting one of several institutional sectors in the modern
social system. Finally, Anil Gupta, an expert in Indian agricultural policy, re-
gards all knowledge as derivative on people’s modes of being. The commercial
extraction of such knowledge potentially undermines their integrity as human
beings. We shall briefly review the issues that these conceptions raise.
Kitch’s pioneering attempt to integrate the legal and economic dimensions
of knowledge production is very much a product of its time and place: 1980,
University of Chicago. Back then and there Richard Posner was spearheading
the “law and economics” movement, which subsequently gained considerable
recognition, perhaps even more in economics than law itself. A legacy of this
movement has been the economic justification of institutions on grounds of
minimizing transaction costs. It is clear that Kitch partly has this issue in mind
when considering why judges associate keeping markets open and allowing
knowledge to flow freely. But before examining Kitch’s argument, readers
used to a sharp distinction between empirical and normative matters should be
warned that they are bound to be frustrated.
Kitch’s argument begins by assuming Gary Becker’s Nobel Prize-winning
human capital theory. In particular, Kitch accepts Becker’s distinction between
general and specific human capital. The former refers to knowledge that is of
use to the worker regardless of the firm that employs her services, the latter to
knowledge that has value only in the context of a specific firm. The difference
between the knowledge imparted in an academic degree course and on-the-job
training captures the spirit of Becker’s distinction. According to Becker, work-
17
18 Who Owns Knowledge?
ers will find it in their interest to the bear the cost of acquiring general capital,
which may include payment to the employer, whereas employers will find it in
their interest to bear the cost of having workers acquire specific capital.
However, Kitch observes that the rationality of Becker’s distinction has
been historically undermined by the Anglo-American common law tradition,
which for the last five centuries has ruled strongly in favor of the free mobil-
ity of labor. Thus, the law has made it easy for workers to undo the advantage
that employers hope to gain by investing in the workers’ acquisition of specific
capital. Indeed, workers become attractive to other firms — and acquire an in-
centive to shift employers — precisely because they can take with them all they
have learned. That the prior employer might suffer competitively from her local
secrets being divulged to the new employer has failed to sway judges in most
cases. On the contrary, judges have interpreted their role as ensuring the overall
competitiveness of the market. In this context, an important mechanism is the
removal of bottlenecks in the transmission of knowledge, especially of the sort
that would maintain the advantage currently enjoyed by one competitor.
Kitch is puzzled by this state of affairs, a response that is itself prima facie
puzzling. Judges clearly realize that the public’s interest in the protection of
markets pertains primarily not to the interests of particular traders but to the
overall dynamism in the system of exchange — that is, the ability for infor-
mation to circulate freely so as to enable agents to be as informed as possible
when making choices in line with their respective interests. In practice, this
concern inclines judges to remove blockages resulting from attempts to hoard
knowledge — in this case, by employers. I say “in this case” because judges
equally allow employers to undermine the attempts by individual workers to
gain power within a firm by commissioning “knowledge engineering” projects
that involve the construction of “expert systems” that attempt to make explicit,
however imperfectly, workers’ so-called tacit knowledge.
Despite his initial, perhaps Socratically feigned puzzlement, Kitch ultimate-
ly believes that the economists can learn from the judges. Kitch traces their
common law wisdom to a realization that knowledge lacks some of the basic
qualities that would enable its literal treatment as “intellectual property.” In
particular, knowledge is not really “divisible”: The fact that you know some-
thing does not exclude me from knowing it. In fact, if I come to know what
you know, the value of your knowledge diminishes because you lose whatever
advantage it held over me in my prior state of ignorance.
Here it is worth observing that, strictly speaking, Kitch’s analysis really
does apply to knowledge, and not to what he prefers to talk about, namely,
information. A key distinction between knowledge and information, clarified
by the Shannon-Weaver theory of communication, is that it is in the nature
of information to resolve the uncertainty that its receiver experiences about a
Introduction to Part 1 19
decision she must take. On this definition, what is informative for one receiver
may not be so for another if the two receivers possess different background
knowledge and action contexts. Under the circumstances, information can be
easily subject to a proprietary regime, once one targets those whose posses-
sion of the information would clarify their action context. For everyone else,
it is presumed that the same information would be of little or no operational
value.
Knowledge, in contrast, is what I have called, following Fred Hirsch, a
pure “positional good” whose value is tied exclusively to its scarcity. Kitch
recognizes the negative consequences of this definition, which he summarizes
as knowledge’s “self-protective” character. In other words, whatever positional
advantage a solitary knower might have is dissipated as more people come
to know the same thing. Thus, the “power” that philosophers from Plato and
Bacon onward have associated with knowledge pertains only to the fact that
at first it is possessed only by the few. Kitch justifies this phenomenon solely
on empirical grounds, noting the difficulty in maintaining trade secrets, both
at the level of business practice and formal legislation. In the latter case, the
key feature of intellectual property legislation is the time limit placed on the
rights bestowed to the property holder. Any incentive to invention putatively
provided by the prospect of property rights must ultimately recognize the nec-
essarily artificial restrictions they pose to the free flow of knowledge.
However, Kitch leaves open the possibility of a more philosophically prin-
cipled reason for knowledge’s so-called self-protectiveness. One such reason
might be that the metaphysics presupposed by the very idea of intellectual
property is wrong. Patent law is an outgrowth of the 18th century Enlighten-
ment view that, courtesy of Newtonian mechanics, science had nearly com-
pleted human comprehension of nature. In this frame of mind, it made sense to
speak of fixed — and known — “laws of nature” that was an intellectual legacy
of all human beings, as equal products of the same divine creator. Thus, intel-
lectual property would be a temporary right based on a demonstrated ability to
work over a determinate part of that commons so as to benefit oneself in the
short term but everyone in the long term. This line of thought, famously en-
shrined in Article 1, Section 8 of the US Constitution, assumes easy analogical
transfers between “conceptual space” and “physical space.” Thus, an applica-
tion of the laws of nature is like the application of labor to a plot of land. In this
context, a property right is meant to provide an incentive for perhaps otherwise
lazy people not simply to live off the work of others.
However, the analogy between conceptual and physical space does not make
sense if the laws of nature are still thought to be up for grabs. It suggests that
the fundamental principles that were originally used to assign a patent to an
invention may be later shown false. Taking such fallibility seriously, as is rou-
20 Who Owns Knowledge?
tinely done in the history, philosophy, and sociology of science, calls into ques-
tion the need to create a specially regulated domain of “intellectual property”
beyond the ordinary regulation of market transactions. The arguments for a
distinct category of intellectual property would then have to be restricted to the
purported socio-economic benefits of innovation, regardless of the epistemic
security of the principles on which it might be based. To be sure, these revised
arguments might work, but they would be no different from the arguments the
state uses to justify financial incentives for any risky private investments.
Moreover, notwithstanding the lip service that continues to be paid to New-
tonian “laws of nature,” intellectual property legislation has adapted to their
fallible character in its own perverse way. I refer here to the increasing willing-
ness of courts to grant patents for mathematical proofs and biological species,
typically on the basis of some unique codification that permits the proof to
be demonstrated or the species to be created. Such “codification” requires a
specially equipped computer or laboratory through which the patented object
can be presented as the product of a step-by-step process. It matters more that
the proof or species can be reliably produced by this process than that it repre-
sents or instantiates one or more laws of nature, the state of our exact access to
which may be suspended for purposes of making the strictly legal point about
property rights.
Bora agrees with Kitch on one — and perhaps only one — aspect of what
Bora calls the “reflexive politics of knowledge.” Both agree that once knowl-
edge is known, its character necessarily changes. For Kitch, this points to the
futility of institutionalizing any robust sense of intellectual property. For Bora,
on the other hand, the lesson veers in the opposite direction: Knowledge comes
to be more sharply differentiated as an institutional sector in the social system,
and hence its influence can be felt more determinately in other social sectors.
For Bora, a weakness of much of recent science and technology studies, espe-
cially that which relies uncritically on Ulrich Beck’s “risk society” idea, is its
one-sided treatment of reflexive modernization that stresses the politicization
of science but not the scientization of politics. In particular, Bora is concerned
with the emergence of “legal facts” to which scientific practice is increasingly
held accountable. Just as scientists increasingly defend their normative autono-
my on political grounds, legislators and jurists determine their attitude towards
science in terms of known or anticipated consequences of scientific activities.
In other words, science and politics have internalized aspects of each other’s
orientation to the social system. Bora imagines that such “structural coupling,”
as he calls it, both complicates and harmonizes the relationship between two
otherwise possible conflicting sectors.
Bora’s narrative has many attractive, perhaps even wishful features. While
it certainly makes sense of the evolution of legal discourse relating to sci-
Introduction to Part 1 21
I. The Law
Anglo-American law governing the subject may be divided into two sections:
information embodied in human capital and information embodied in firms.
25
26 Who Owns Knowledge?
Both workers and firms are carriers of information, and the legal issues have
centered on the relationship between them.
The human capital of a worker includes the information he has. The following
two paragraphs briefly summarize Becker’s (1975) pioneering analysis.
General human capital is capital of value to many firms, and a worker is in
a position to capture its value at any of those firms (Becker, 1975:19–26). He
will, therefore, pay the costs of acquiring this capital, either through payments
(tuition) or reduction in salary. A firm providing training that adds to general
human capital can arrange its payment schedule so that at any given time it has
provided the worker with the amount of training for which he has paid. Thus
the free movement of workers need not be restrained to generate incentives for
training that provides general human capital.
Specific human capital is human capital with value only to a particular firm
(Becker, 1975:26–37). In the information context, an example is knowledge of
the firm’s operating procedures and personnel. Because this information is of
value only to the firm, the firm will pay for the necessary training, and an em-
ployee cannot steal the information for use elsewhere. There is thus no need to
restrain the free movement of workers to generate incentives for training that
provides specific human capital.
Since at least 1800, Anglo-American law has provided no protection to a
firm for the value of the human capital of its employees. Employees have been
free to change employment at will. This law displaced an earlier legal regime,
centered on the Statute of Laborers of 1492, which significantly restricted the
free movement of labor (see Becker, 1975:379–87; Holdsworth, 1936:459–
66).
More interesting, and more difficult to analyze, is the severe limitation in
this modern law on types of contractual arrangements that can be used to re-
strict the movement of employees.1 The issue has been litigated most frequently
in the context of post-employment covenants not to compete. These covenants
are written agreements providing that in the event of termination of employ-
ment the employee cannot work for a competitor for a specified length of time
in a specified area. The courts have applied strict standards of reasonableness to
these contracts and have upheld them only in the case of employees who pos-
1 While this essay was in preparation Rubin and Shedd (1981) were writing “Human
Capital and Covenants not to Compete.” We share a common dissatisfaction with
the traditional explanations for judicial reaction to covenants not to compete. Ru-
bin and Shedd explain invalidation of such contracts on grounds of opportunistic
behavior.
The Law and Economics of Rights in Valuable Information 27
that postemployment restraints reduce both the economic mobility of employees and
their personal freedom to follow their own interests. These restraints also diminish
competition by intimidating potential competitors and by slowing down the dissemi-
nation of ideas, processes, and methods. They unfairly weaken the individual em-
ployee’s bargaining position vis-a-vis his employer and, from the social point of
view, clog the market’s channeling of manpower to employments in which its
productivity is greatest. (Blake, 1960:627)
This view assumes either that such clauses are usually in the interest of the
employer or that employees would not value, and hence not charge for, the
right to future freedom of choice. Such clauses are not in the interest of an
employer unless he makes significant investments in the employee’s human
capital. If the employee offers general skills that can be provided by others on
the labor market, the employer is indifferent to who provides those skills since
he will have to pay the market wage in any case.
The complexity and difficulty of a restrictive covenant do not seem to ex-
ceed other issues on which employers are permitted to bargain freely. For in-
The Law and Economics of Rights in Valuable Information 29
stance, fringe benefits or pension plans involve judgments about future events
and needs of the employee. The congressional pension reforms imposed by the
Employee Retirement Income Security Act suggest the modern consumerist
response to problems of this type — mandated disclosure, standardized con-
tractual arrangements, and special formation procedures. The Truth in Lending
Act imposes similar requirements on lending arrangements, which often have
term features well in excess of the likely relevant term of covenants not to
compete. These responses, however, have not included outright prohibition of
the form of contract.
One easy explanation why the lack of capacity argument has such appeal
is the judicial rule restricting the contract form. The courts have refused to
enforce the contract, so the contract is seldom used. Because it is seldom used,
society has no stock of “received wisdom” about the advantages and disad-
vantages of such contracts. If the rule were suddenly changed, employers and
employees would have to learn about such contracts and during the learning
process there would be more mistakes than with other well-established contract
forms. In this view, the rule creates the conditions of its own social desirability.
Blake has persuasively shown that the rule’s origins lie not in the contractarian
structure of the 19th century common law but in the older status law of master
and apprentice (Blake, 1960:629–37). The early cases involved apprentices
whose masters had made them promise not to pursue their craft, as masters,
after the end of the fixed term of apprenticeship. The courts held that the status
of master was inconsistent with such contractual restraints. The 19th century
cases analogized the position of the newly contractually autonomous worker
to that of a master and held that the precedents forbade such agreements. The
rule, once adopted, became its own justification.
It is difficult to put much weight on the capacity argument in light of three
anomalous regimes of employment: entertainment,3 professional sports,4 and
military enlistment.5 In these cases, entering workers sign contracts that restrict
their employment options for significant periods of time. The young ballplayer
or military volunteer seems to be able to understand the implications of such
contracts and bargain for offsetting terms. Not surprisingly, these special re-
gimes are justified on the basis of the need for the employer to invest in spe-
cialized training for the employee.
3 Courts have been willing to uphold exclusive contracts in the entertainment indus-
try because of the unique nature of the services involved and to issue injunctions
against competitive employment to enforce them. These injunctions date back to
Lumly v. Wagner, 1 DeG., M. & G. 604, 42 Eng. Rep. 687 (Ch. 1852). Materials
on modern practice are to be found in Frackman (1979) and Note (1980:489).
4 These special employment institutions are summarized in Sobel (1977).
5 The law is summarized in Schlueter (1977). The cases of validity of the contract
have focused on parents trying to undo the enlistments of their minor children.
30 Who Owns Knowledge?
Firms also possess information. This is easy to see in the case of a trade secret
written on a piece of paper locked in the firm’s safe or existing as part of the
human capital of the employees who know the secret. It is less easy to see when
information exists only in the form of the memories and habits of employees.
Assume, for instance, that six employees of a firm know a particular piece of
information. If the employees are paid a competitive wage so that they are
unlikely to leave, and if they are effectively constrained from communicating
the information to others, then the firm has an asset apart from the human
capital of the employees. Firms carry information in a web of contractual
relations and property rights.
Information held by firms, unlike information embodied in human capital,
is not self-appropriating. Becker (1975:26) recognizes this feature explicitly
for technological innovations,6 but it is true of all information that can exist
apart from human capital. For instance, a firm that has prepared a competitive
bid can lose the value of the preparatory material if the bid is communicated
to a competitor who bids one dollar less. Similarly, a firm that loses a training
manual to a competitor suffers a reduction in value.
The law has given special protection to a class of information called trade
secrets. This section will discuss, first, the law of trade secrets and then the law
protecting other kinds of information.
1. Trade secrets. The courts protect trade secrets with both damage and
injunctive remedies. The first English cases, involving formulas for medicines,
date from the second decade of the 19th century, and the first American cases,
involving manufacturing processes, from the middle of the century.7 “A trade
secret,” says the Restatement, “may consist of any formula, pattern, device or
compilation of information which is used in one’s business, and which gives
him an opportunity to obtain an advantage over competitors who do not know
or use it.” 8
The question of whether information should be protected is decided by the
courts. They require that the information have value, be used in the firm, and
not be generally known by others. Firms sometimes obtain contractual agree-
ments from employees that certain information disclosed to them is confiden-
tial. Courts will accept these agreements as evidence that the firm valued the
information and attempted to preserve its secrecy, but they decide for them-
selves whether the information should actually be protected.
The rules of trade secrecy law suggest that the law’s coverage is broad but
an overwhelming number of the reported cases deal with appropriated process
technology — how to make something.9 There are a small number of cases in-
volving knowledge of the identity of customers, and after that, nothing (Blake,
1960:667).10
tions may become fair game for all comers. Patent systems try to establish these
rights so that incentives can be provided to invest in research. Property rights in
skills, on the other hand, are automatically vested, for a skill cannot be used with-
out permission of the person possessing it.’’
7 Newberry v. James, 2 Merivale 446, 35 Eng. Rep. 1011 (Ch. 1817). The first re-
ported American case suggested that an injunction could not issue on the ground
that it would be impossible to enforce. Deming v. Chapman, 11 How. Prac. 382
(N.Y. Sup. Ct, 1854). The case involved a process for marbleizing iron, slate, and
other articles. That dictum was not followed in Hammer v. Barnes, 26 How. Pr.
174 (N.Y. Sup. Ct. 1863), involving a process for brewing ale. The leading early
American case, Peabody v. Norfolk, 98 Mass. 452 (1868), involved a process for
manufacturing gunny cloth from jute buffs.
8 Restatement of Torts § 757 (1939).
9 The restrictive covenant cases, on the other hand, most frequently deal with cus-
tomer contact situations.
10 Thus, as a practical matter, the domains of patent law and trade secrecy appear to
be congruent, except that patent law does not extend to customer relations. The
32 Who Owns Knowledge?
ways in which the patent system offsets the deleterious effects of trade secrecy
protection are analyzed in Kitch (1977:75–80). The near congruence of the two
regimes may, therefore, reflect an understanding that trade secrecy protection is
more desirable when its negative effects are offset by a property rights system.
However, the explanation offered below for the scope of trade secret protection is
that the types of information not covered by trade secrecy law have high deprecia-
tion rates that make legal protection unnecessary. See pp. 53–54. Unlike the pat-
ent-related explanation, this explanation can encompass the protection allowed to
customer lists.
11 The label is facetious since the purpose of the books is to persuade firms of the
need for security measures, but they make their point by illustrating how easy it
is to obtain a competitor’s secrets. I have located Arnold and McGuire (1975);
Harvard University, Graduate School of Business, Competitive Intelligence (C.I.
Assoc. 1959); Greene (1966); Hamilton (1967); Hickson (1968); Payne (1967);
Smith (1970). I have found Smith the most helpful. I have seen references to Ber-
gier (1975), but I have not obtained a copy.
12 Northern Petrochemicals Co. v. Tomlinson, 484 F.2d 1057 (7th Cir. 1973).
The Law and Economics of Rights in Valuable Information 33
matter of the secret and its related technology to those involved in the litiga-
tion process. The courts have developed elaborate confidentiality procedures to
deal with this situation.13 The information may be disclosed, for instance, only
to the defendant’s attorney and not to his client, the accused thief (Milgrim,
1979). But even assuming the effectiveness of these procedures, they violate
basic precepts of security. Information relating to the secret must be specially
assembled and circulated to a new group of individuals, and the litigation itself
will signal the value that the firm places upon the information.14
There is no remedy for trade secrecy theft against a firm using the trade
secret if the firm acquired the information without being aware of its tainted
origin.15 Once a secret gets out, problems of tracing will practically assure the
victim’s inability to stop competitive use. If the perpetrator of the theft is judg-
ment proof and the present holders of the information are innocent, there may
be no effective relief.
Another formidable threat to trade secrecy may be foreign espionage. The
governments of foreign powers that maintain intelligence services have an in-
terest in upgrading the technological base of their own industries. One peace-
time function of an intelligence service is obtaining otherwise unavailable
technological information.16 It is likely that foreign intelligence services are
less sensitive to legal restraints than a domestic competitor would be.
The difficulties of detection and enforcement make this a logical area for the
use of strong criminal penalties. Since the number of detectable thefts is small,
the activity can only be effectively deterred if heavy penalties are imposed on
thieves who are caught. Trade secrecy skillfully executed is not a crime under
the traditional criminal statutes. Entry only to copy is not entry with felonious
intent and hence not burglary. Information is not the kind of property that falls
within the scope of traditional theft statutes. Bribery of an employee to provide
information, but not property of the employer, is not a crime. When property
13 These are discussed in Roger M. Milgrim (1979). Milgrim observes: “Perhaps the
greatest single drawback to trade secret litigation is the disclosure which plaintiff
often must make during the course of the case.” Id. at § 7.06 [I].
14 A dramatic recent example is the action brought by the US Government to enjoin
the publication of plans for the construction of the hydrogen bomb. The litigation
revealed that the plans were genuine and led to the revelation that numerous details
about construction of the bomb were available to the public in US government
libraries.
15 Restatement of Torts § 758 (1939).
16 Payne (1967:156–95) describes some of the extensive industrial espionage activi-
ties of the iron curtain countries. West Germany recently claimed that a major fo-
cus of the East German intelligence organization is obtaining information about
microelectronic technology. Wall Street Journal, June 6, 1980:16, c. 1.
34 Who Owns Knowledge?
is taken, a crime has been committed.17 In the late 1960s and early 1970s,
twenty-six states passed statutes to make trade-secret theft a crime.18 There
have, however, been very few prosecutions under these statutes.19 The statutes
came about as the result of a ring organized to systematically steal process
secrets and materials from an American drug company and sell them to Ital-
ian manufacturers who at that time operated under an umbrella created by the
lack of drug patents under Italian law.20 The ring proved very difficult for the
company to break, and the problem highlighted a gap in the criminal laws that
many legislatures were willing to fill.
The new statutes require the theft of a trade secret. Therefore, in the criminal
prosecution determining whether what was taken was a trade secret is a central
issue. The defense must prove that what was taken was not kept secret by the
company nor known to other concerns in the industry. To defend on that issue,
the defense must ask for large amounts of material relevant to the technology
in issue. Procedures for protecting the confidentiality of this material exist, but
its assembly and dissemination during the litigation process obviously increase
the risk of further loss.21 In a California case, a convicted thief of trade secrets
from IBM argued that his conviction should be set aside because he was the
only one who had ever been prosecuted under the statute. Rejecting the argu-
ment as frivolous, the court observed:
The record in this case dramatically suggests the reason why it may be true that
section 499c is a statute which has rarely been enforced. Defendant’s prosecution
and conviction were the result of an extremely difficult, complicated and expensive
investigation instigated by IBM. It is apparent why a private company such as IBM
would engage in such an undertaking only rarely and only where, as here, the value
of the stolen trade secrets was extremely great. The legal problems involved in
prosecuting such an action are also apparent. The record on appeal itself contains
thousands of pages of transcript. (62 Cal. App. 3d 24–25, 133 Cal. Rptr. 153)
The issue of appropriate proportion between the remedy and the wrong in
trade secrecy cases has recently concerned the courts in the area of injunctive
17 When the thief uses a copying machine or takes pieces of paper, the charge may be
theft of services or of the paper. Where these thefts are of low value, the crime will
be a misdemeanor.
18 Milgrim (1979:vol. 12, at § 1.10), describes this development. See Annot., 84
A.L.R. 3d 967 (1978).
19 Six cases are cited in the A.L.R. Annotation.
20 Payne (1967:35–68) describes this incident.
21 In People v. Serrata, 62 Cal. App. 3d 9. 133 Cal. Rptr. 144 (Ct. App. 1976), the
court observed that the trial court did authorize extensive defense discovery of
IBM documents and other materials in the possession of the prosecution. IBM also
made extensive documentation available voluntarily.
The Law and Economics of Rights in Valuable Information 35
remedies. For the last 100 years, courts have routinely enjoined a defendant
proven to have wrongfully appropriated a trade secret from using the secret in
perpetuity.22 Recently, however, defendants have persuaded some courts that
the period of the injunction should not exceed the time that it would have taken
the defendant to engineer the secret independently.23 The trade secret remedy,
they have argued, should only make the plaintiff whole, not put him in a better
position than he otherwise would have been. The older, still widely followed
practice had a punitive element; the defendant ended up worse off than if there
had been no theft. In an assumed model in which most thefts are detected, a
pure compensation remedy makes sense. But where most thefts are not likely
to be detected, a disproportionate remedy makes sense if the courts’ objective
is to reduce the amount of trade secret theft.
A complexity has recently been introduced into trade secret law by the inter-
action of more expansive government regulation and the freedom of informa-
tion act. Statutes such as the toxic substances control act or the environmental
protection act require companies to disclose aspects of their production opera-
tions, for instance, the chemicals they manufacture, including intermediates,
and the components of plant emissions. The Equal Opportunity Employment
Commission requires detailed reports about the composition of the workforce
and hiring procedures. The Customs Bureau requires detailed information
about exported goods. The Occupational Health and Safety Administration
regulates and inspects all workplaces.
The Freedom of Information Act imposes a general obligation on all federal
agencies to provide copies of their documents on demand. It contains excep-
tions to that obligation, one of which is for “trade secrets and commercial or fi-
nancial information obtained from a person and privileged or confidential.” 24
Under the act, firms can make dragnet requests for documents of a given
type. The copying necessary to meet these requests is assigned to clerical per-
sonnel who may, without realizing it, include in the documents material en-
titled to the protection of the trade secret exemption. The agency can decide
to withhold material identified as sensitive on the ground that the material is
a trade secret. The party seeking the information may then challenge the deci-
sion to withhold in court. A district court judge will eventually examine the
documents, at first in camera, to determine whether they in fact contain trade
secrets. If the court holds that the documents are not trade secrets, they must be
produced. What constitutes a trade secret is, thus, an important legal question
under the Freedom of Information Act.
22 Annot., 38 A.L.R. 3d 572, 576 (1971).
23 Schulenburg v. Signatrol, Inc., 33 Ill. 2d 379, 212 N.E.2d 865 (1965). This position
is adopted by Milgrim (1979: 12A, § 7.08[1]).
24 5 U.S.C. § S52(b) (4) (1977).
36 Who Owns Knowledge?
A different question arises if the agency itself is willing to produce the doc-
uments but the original submitter wishes to stop production. Many agencies
have, either by regulation or practice, notified firms when requests are received
for production of documents originally submitted by the firms. The agencies
have tended to see themselves as stakeholders, with no self-interest in whether
the documents are produced. The submitter of the document has then sued in
the courts to bar the agency from producing the documents. These cases, now
considerable in number, have become known as “reverse freedom of informa-
tion act suits.”
The major legal questions raised by these cases were addressed by the
United States Supreme Court last term in the case of Chrysler Corporation
v. Brown.25 The principal issue was whether the trade secrecy exception to the
act was simply an exception to the agency’s duty to produce, or whether it
also created a right in the affected third party to object to the production of the
document. The Court held that it was only an exception from the duty to pro-
duce. Another question was whether production of documents containing trade
secrets by an agency was a violation of a long-standing criminal statute that
prohibits a federal employee from disclosing confidential business informa-
tion “to any extent not authorized by law.” 26 The statute is aimed at the federal
employee who, without authority, takes information from the office files and
discloses it to others. The question in the case was whether the statute also
prohibited an agency from officially releasing confidential information unless
it was expressly authorized to do so by statute. The Court held that it did not.
Agencies have inherent power to control their records and, in the absence of
statutory provisions prohibiting disclosure (such as exist, for instance, in the
income tax area), an agency is free to choose to disclose. Finally, the Court
held that the supplier of the information was an aggrieved party who had the
right to participate in the procedures that led the agency to decide whether to
release the information.
These developments are a major change in American trade secret law. In an
action for violation of trade secrecy rights the plaintiff has to show that the in-
formation is secret. If the defendant can show that the information is available
in government files, and that the government would make those files available,
the trade secret right disappears. Firms will probably be able to persuade many
agencies to protect the most sensitive documents on the ground that protection
of trade secrets is a long-established legal right which Congress has shown no
explicit desire to disrupt, and that failure to recognize the right will reduce the
firms’ cooperation with reporting requirements. But where an agency deter-
mines to release the material, it is unlikely that firms will be able to persuade
25 99 s. Ct. 1705 (1979).
26 18 U.S.C. § 1905 (1977).
The Law and Economics of Rights in Valuable Information 37
the courts that the decision is an abuse of discretion. The agencies face the
problem of making regulatory decisions on the basis of the data submitted to
them. If the relevant data are kept secret, the procedures and basis for their
decisions must be secret. If the decisions are challenged, it is difficult for the
agency to defend itself.27 Thus trade secrecy in this context generates the kind
of closed government the Freedom of Information Act is designed to combat.
The firms can argue that failure to recognize trade secrecy claims is unwise
because it will create incentives for firms to obscure documents they submit
to the government. But the argument will be unattractive to a court, because
it seems to be a threat by the firms not to meet their legally required reporting
obligations. Thus the long-established regime of American trade secrecy law is
now under an amorphous and apparently inadvertent pall.28
The courts require the plaintiff in a trade secrecy case to show that the tak-
ing of the secret was improper. Thus, a disclosure by an employee in violation
of his fiduciary obligations to his employer, or a taking involving theft or fraud,
is actionable. By contrast, a competitive firm can legally conduct a systematic
and sustained investigation of a competitor in order to uncover confidential
information. Firms often ask their salesmen, for example, to report information
provided to them by customers about the activities of competitors. The subject
may come up naturally in the course of sales presentations where comparative
comments or questions are to be expected. Salesmen may also be instructed
to exploit any opportunity that comes up for learning about a competitor, such
as overheard conversations. It would be quite easy to construct a theory that
the information in possession of these firms has been provided to them in con-
fidence only for the purpose of assisting their buying decisions, and that the
competitor’s concerted effort to obtain that information is an improper effort to
induce breach of that confidence. Under the traditional rule, however, improper
means has meant something more than systematic surveillance. “In general,”
says the Re-statement, “they are means which fall below the generally accept-
ed standards of commercial morality and reasonable conduct. . . . Examples of
such means are fraudulent misrepresentations to induce disclosure, tapping of
telephone wires, eavesdropping or other espionage” (Restatement of Torts §
757 Comment f). And, cautions the Re-statement, “liability . . . is based not on
the actor’s purpose to discover another’s trade secret but on the nature of the
conduct by which the discovery is made” (Restatement of Torts § 757 Com-
ment g).
27 The tension between open government and central economic planning is elegantly
explored by Fuller (1959).
28 In the aftermath of Chrysler, the problem is receiving considerable attention in
law reviews. See McGarity and Shapiro (1980). I pointed out the vulnerability of
information submitted to the FDA in Kitch (1973).
38 Who Owns Knowledge?
Our tolerance of the espionage game must cease when the protections required to
prevent another’s spying cost so much that the spirit of inventiveness is dampened.
Commercial privacy must be protected from espionage which could not have been
reasonably anticipated or prevented. We do not mean to imply, however, that every-
thing not in plain view is within the protected vale, nor that all information obtained
through every extra optical extension is forbidden. Indeed, for our industrial compe-
tition to remain healthy there must be breathing room for observing a competing
industrialist. A competitor can and must shop his competition for pricing and exam-
ine his products for quality, components, and methods of manufacture. . . . To require
DuPont to put a roof over the unfinished plant to guard its secret would impose an
enormous expense to prevent nothing more than a school boy’s trick. (431 F.2d
1016)
There are two branches to the implied argument. First, the law should not
create incentives for otherwise wasteful expenditures by refusing to provide
legal protection. Second, to permit this kind of information taking will result
in an incorrect level of investment in innovation.
A. PREVENTION OF WASTEFUL EXPENDITURE. The court argues that to deny legal
protection to DuPont would be to create an incentive for a wasteful expendi-
ture — some form of temporary roof solely for the purpose of protecting the
trade secret during construction. On the facts, the argument is unpersuasive.
The existence of a cause of action will affect the decision whether to build
the roof only if the cause of action significantly affects the probability of suc-
cessful use of aerial photography to obtain the secret. In the case, the aerial
photography was apparently conducted at a low altitude and in a manner that
attracted the attention of DuPont employees, who were able to observe the
registration number of the plane. But if equally useful photographs could be
taken with more powerful lenses at 15,000 feet, then the only effect of the
cause of action might be to cause the photographer to behave differently. If so,
DuPont would have the same incentives to conceal the production line during
construction.
The argument raises a general question about trade secret law. Why do the
courts require that the plaintiff show, as a condition of recovery, that he has
expended resources keeping the information secret? Are not all such protective
expenditures wasteful? Property rights are not usually lost because the owner
has not expended sufficient resources to protect them. In DuPont, the court
balked at the notion that DuPont should have erected a giant cover. But how
does the court know that that expenditure is too much?
Perhaps what the courts require in trade secret cases is that the firm have
made sufficient expenditure so that there is a reasonable probability that the
secrets are, in fact, secret. The courts, this reasoning would go, should not
spend their time trying to protect trade secrets when, in all probability, the
information is not secret anymore because no effort has been made to protect
it. The problem with that argument is that the plaintiff apparently thinks the
secret has value, for he is willing to invest in the litigation. Why should he also
40 Who Owns Knowledge?
be required to invest further in keeping the secret secret? Indeed sometimes the
most effective way to protect information (or an object) of value is by treat-
ing it as if it were not valuable. The courts have sometimes held, for instance,
that public tours of a plant which allowed tourists to observe a secret process
in operation destroyed the trade secret even though there was no showing that
casual observation was likely to lead to competitively harmful disclosure of a
secret.31 A closed section of the plant prominently posted, “Restricted area, do
not enter,” as is recommended in the how-to-do-it books (Arnold and McGuire,
1975:171–72), may simply inspire efforts to learn what is within. One thinks
of a violent armed robbery of an armored car, while the innocuous messenger
walks nearby, $3,000,000 in negotiable securities in his pocket.
Another explanation for the requirement might be that the courts insist on
sufficient investment so that the employees know that confidentiality is claimed
for the information involved, and so that the employer is not free to claim later
that some information acquired by the employee is secret even though he was
not notified of it at the time. The trade secrecy cause of action could possibly
be used to foil the policy of free movement of employees unless confined to
information that the employer has shown a consistent and meaningful desire
to protect. The trade secret cause of action is not contractually based and thus
there is no contractual process to notify the employee of the extent of his fet-
ters. Only if the courts require a consistent policy of overt protection would
the trade secret cause of action not be used to frustrate the law’s policy of free
movement. Thus DuPont can be viewed as consistent with this law in that
DuPont had done what was necessary to make it clear to its employees that the
process was confidential. The only purpose of the special roof would have been
to deter surveillance by third parties.
B. APPROPRIATE INVESTMENT INCENTIVES. This part of the court’s argument is
precisely the same as the standard argument made for patents. Unless DuPont
can keep the information about its new process for producing methanol away
from its competitors (or charge them for it), its return on the process will be
the competitive return, and it will get no return on the cost of developing the
process. If taken seriously, the argument implies that the courts should fash-
ion property rights to overcome the information externality problem. This the
Supreme Court once did in the famous case of International News Service v.
Associated Press,32 where it gave to the Associated Press a common law cause
31 A common injurious information leak is “public relations tours through your facil-
ities. These are dangerous not only because they are useful to industrial espionage
agents, but because when discussed in court it sounds to judge and jury like more
information was given away or revealed by the company than was the fact. Judge
and jury are biased to give the event bigger significance than it merits in real life”
Arnold and McGuire (1975:170).
32 International News Service v. Associated Press, 248 U.S. 215 (1918).
The Law and Economics of Rights in Valuable Information 41
of action against the International News Service for copying its uncopyrighted
news dispatches. The case has been controversial and little followed. This as-
pect of the court’s rationale, however, creates ambiguity about the scope of its
holding.
It has long been considered legal to copy a competitor’s product. There is
strong, recent Supreme Court precedent which holds that such a right is pro-
tected by federal law.33 But this is a feature of the law inconsistent with the
economic reasoning in Christopher. It means that trade secret law generates
contorted incentives: industrial processes that can be protected by secrecy are
favored and product innovations that are necessarily revealed to competitors
are disfavored. The force of the precedent means that the question is unlikely
to be reopened, but the reasoning of Christopher may affect some borderline
cases.
The borderline cases arise when a seller attempts to restrict the flow of in-
formation to his customers in a way that restricts its availability to his competi-
tors. Can he impose contractual restraints on his customers that have the effect
of making the efforts of his competitor to obtain this information “improper”?
For instance, computer programs have been held by the Supreme Court to be
unpatentable. Can the seller of machines embodying programs, or of manuals
describing programs, require each purchaser or leasee to sign a contract which
states that “the purchaser and the seller agree that this program is being sold to
purchaser for the sole purpose of use in machine serial number , that
purchaser will make no disclosure of the contents of the program to any other
person except those personnel involved in the operation of the program, and
then only to the extent to enable purchaser to use to program”? The seller
might also send a letter to his competitors, informing them that all of his pro-
grams are subject to agreements of confidentiality and that any effort by the
competitor to obtain the information will be an improper effort to induce a
breach of contract. Or a seller of an electronics device might place the critical
part of the device within a sealed closure and place the following inscription
upon it: “This machine is [sold] [leased] upon condition that [buyer] [leasee]
agrees not to unseal this closure. The contents within are the trade secrets of the
seller. May be maintained, repaired, or replaced, only by employees of seller or
authorized personnel subject to convenants not to disclose its contents.” (Or,
perhaps, the label should suggest, the device will self-destruct unless opened
in a proper way.) Another possibility is to distribute a product with no portion
of it particularly concealed, but bearing a general legend: “This product incor-
porates various trade secrets of the X Corporation and is [sold] [leased] on the
33 Sears, Roebuck & Co. v. Stiffel Co., 376 U.S. 225 (1964).
42 Who Owns Knowledge?
understanding that the secrets are not to be disclosed to any person and that this
product is only for the use of [buyer] [leasee].” 34
The courts have long recognized that trade secret information can be dis-
closed to others under conditions that preserve its secrecy. In fact, two leading
trade secret cases involve disclosures made without any explicit contractual
restriction to third parties, one of a product design to a prospective purchasers35
and one of a production pattern to a firm retained to repair it.36 In both cases,
the courts had no trouble in concluding that the third party had accepted an
implied confidentiality pledge when the information was disclosed, and that
the pledge was enforceable.
In the case of sales, such contractual restrictions would run into the courts’
long-standing aversion to restraints on purchasers of property. The courts
maintain the position that a sale should give the purchaser absolute dominion
over the property.37 That can be avoided by the leasing form, yet widespread
leasing is likely to destroy the secrecy of the information and hence its legal
34 Some of these questions are explored in Maggs (1979). These types of conditions
have proven effective with courts in the computer industry. See Digital Dev. Corp.
v. Int’l Memory Systems, 185 U.S.P.O. 136, (S.D. Cal. 1973) (no injunction, dam-
ages only for product copying); Data General Corporation v. Digital Computer
Controls, Inc., 357 A.2d 105 (Del. Ch. 1975) (manufacture of machine designed
from plaintiff’s drawings provided in confidence to customers for purposes of
maintenance enjoined for period of time required to reverse engineer). The plain-
tiff, however, was denied a preliminary injunction in Data General because of
uncertainty on the factual issue of secrecy. 297 A.2d 433 (Del. Ch. 1971), aff’d
297 A.2d 437 (Del. Super. Ct. 1972).
35 Smith v. Dravo Corp., 203 F.2d 369 (7th Cir. 1953).
36 Tabor v. Hoffman. 118 N.Y. 30, 23 N.E. 12 (1889).
37 Merchants Suppliers Paper Co. v. Photo-Worker Corporation, 29 A.D.2d 94, 285
N.Y.S.2d 932 (1967). (Owner of machine is free to copy it in competition with
seller even if he has promised not to.) “The plaintiff passed title and having done
so cannot exercise dominion over their product.” 29 A.D.2d 96, 285 N.Y.S.2d 935.
Turner (1962:30–31) states that disclosure, even in confidence, to a large section
of the industry will destroy secrecy. In Board of Trade v. Christie Grain & Stock
Co., 198 U.S. 236 (1905), Mr. Justice Holmes stated for the Court that “The Plain-
tiff does not lose its rights by communicating the result to persons, even if many, in
confidential relations to itself, under a contract not to make it public, and strangers
to the trust will be restrained from getting at the knowledge by inducing a breach
of trust and using knowledge obtained by such a breach” (Turner, 1962: 250–51).
The information protected in Board of Trade was current quotations from the floor
and the protection was for a duration of a few minutes. There are cases that protect
specialized teaching methods against former students who have signed confiden-
tiality agreements, even though the plaintiff is seeking to teach the secret to any-
one who will pay his fee. The protection, however, is against use of the secret in
competitive teaching, not use of the secret in the former student’s business. Smok
Enders, Inc. v. Smoke No More, Inc., 184 U.S.P.Q. 309, (S.D. Fla. 1974); Ultra-
The Law and Economics of Rights in Valuable Information 43
protection. That would, of course, not apply in the case of hidden or sealed
technology that did not become known to the leasee in the course of his use. In
that narrow class of cases, Christopher may presage judicial protection.
2. Other information. The rest of the law of commercial privacy presents a
more confused pattern.
Hornbook statements of trade secrecy law apply to all information. The Re-
statement says that “a trade secret may consist of any formula, pattern, device
or compilation of information which is used in one’s business, and which gives
him an opportunity to obtain an advantage over competitors who do not know
or use it” (Restatement of Torts § 757 Comment b). This sweeping definition is
followed by a list of illustrations, all but one of which is a technology. “It may
be a formula for a chemical compound, a process of manufacturing, treating or
preserving materials, a pattern for a machine or other device, or a list of cus-
tomers” (Restatement of Torts § 757 Comment b). And, adds the Restatement,
Almost all of the pure trade secret cases — namely, those not arising in the
context of restrictive covenants — involve information about production meth-
ods or the appropriation of detailed customer information, usually a written list
of customers. This may either be because the law does not provide additional
protection or because other kinds of information depreciated so rapidly that
litigation is not worthwhile.
In a separate section, the Restatement announces the position that “one
who, for the purpose of advancing a rival business interest, procures by im-
proper means information about another’s business is liable to the other for
the harm caused by his possession, disclosure or use of the information” (Re-
statement of Torts § 759). The scope of the kinds of information included
within this section is larger than that protected by trade secret law. It “applies
to information about one’s business whether or not it constitutes a trade secret”
(Restatement of Torts § 759 Comment b). The important differences between
the protection supplied under this principle and trade secret protection are two.
First, protection of a trade secret is a legitimate interest of an employer that
will support a restrictive covenant. Second, in many cases it will be difficult
Life Labs. Inc., v. Eames, 240 Mo. App. 851,221 S. W. 2d 224 (K.C. Ct. App.
1949).
44 Who Owns Knowledge?
38 5 Austin Scott, The Law of Trusts § 505, at 3564 (1965): “Where a fiduciary in vio-
lation of his duty to the beneficiary acquires property from a third person through
the use of confidential information which he obtained as a fiduciary, he holds the
property upon a constructive trust for the beneficiary.”
The Law and Economics of Rights in Valuable Information 45
ing to the matter. This doctrine is used in a group of cases that can be called the
“idea-submitter cases.” 39 In these cases an outsider communicates information
to a firm — an idea for a book, a television series, an advertising gimmick, a
business method, an invention — without any prior understanding about the
obligations of the firm. The submitter and the firm reach no agreement about
the use of the information or any compensation of the submitter, but the firm
uses the information anyway. Many courts will “return” the benefits of the
information to the submitter.
Consequently, many firms establish regular policies to deal with idea sub-
mitters. These policies involve procedures for isolating and retaining records
of the submission and refusing to consider them until the submitter signs a
contract limiting the firm’s possible liability.
These rules can be more coherently organized for purposes of functional
analysis if the traditional legal categories are dropped. The analysis that fol-
lows is organized under the headings of (a) information outbound from the
firm, (b) information inbound to the firm, and (c) information transactions.
The analysis suggests that the real concern of these rules is not protection
of exclusive control over information of value but rather the preservation of
the institutional integrity of the firm so that it can have a current accounting of
its information stock. Indeed, the rules seem to assure that information of real
value will be transmitted out of the firm unless it falls within the trade secrecy
classification.
A. OUTBOUND INFORMATION. The rules effectively distinguish between infor-
mation carried out of a firm by a departing employee and information obtained
in other ways.
The breadth of an employee’s right to carry information out of a firm is
shown by many of the restrictive covenant cases. Not atypical is Reed, Rob-
erts Associates, Inc. v . Strauman.40 The plaintiff was a firm that supplied
advice to employers on compliance with state unemployment laws. The de-
fendant had signed a restrictive covenant. He had worked ten years for the
plaintiff in internal administration, rising to a top management position. The
firm’s product involved telling firms about the requirements and policies of
state unemployment compensation laws, publicly available information (al-
though not without cost). The defendant was in management, not sales, so
he had no customer contacts. He did, however, know a great deal about the
business, including presumably its profitability. After ten years, probably in-
fluenced in part by its profitability, he quit and started his own firm offering
the same service.
39 This law is summarized in Palmer (1978).
40 Reed, Roberts Assoc., Inc. v. Strauman, 40 N.Y .2d 303, 386 N.Y.S.2d 677, 353
N.E.2d 590 (1976).
46 Who Owns Knowledge?
The plaintiff’s employment did not fall into the category to which restric-
tive covenants can be applied, so the court held the restrictive covenant unen-
forceable. “Apparently,” said the court,
tracked the order book of the plaintiff. He was able to fill the orders because
he knew the mills which supplied each of the various kinds of paper and their
charges. The plaintiff argued that this was confidential information that the
defendant could not use. The court refused to provide relief on this aspect of
the case. “It was the use of his knowledge, skill and experience gained in the
plaintiff’s service, and I do not think it can be said that the origin of the paper
was anything in the nature of a secret process.” 44
This result changes if an employee provides information while still em-
ployed by the firm. If an employee uses the resources and information of his
employer to organize a new competitive firm, there is a cause of action.45 It is
also illegal for a third party to obtain information from a firm by paying one of
its employees to provide it on the side. This raises the question why it should
be legal for an employee to take information if he leaves the firm but illegal to
sell it while he is employed. Why should the courts bar this method of informa-
tion transmission?
B. INBOUND INFORMATION. Employees cannot intercept any kind of informa-
tion coming into the firm and use it in competition with their firm. The scope
of effective protection provided the firm is much broader than in the outbound
cases. However, if the employee communicates the information to the firm and
the firm decides not to use it, the employee becomes free to use it as long as his
use is not competitive with the firm.
These rules seem concerned not with protecting the firm’s exclusive control
over information but with protecting the decision-making integrity of the firm.
Employees are thus entitled to take information out of the firm, but if they do
so they must tell the firm. They cannot remain with the firm and secretly ex-
ploit information in competition with the firm. Conversely, employees cannot
screen out information coming into the firm and select the best for their own
use, thereby distorting the firm’s internal decision-making process.
The operation of the rules can be illustrated by an information problem that
has received some attention in the literature — securities transactions by exec-
utives of a firm. The common law approach to this problem has now been sig-
nificantly displaced by rules imposed by the Securities Exchange Commission
under federal statutes. The common law approach was to permit executives
of firms whose securities were traded on public exchanges to use information
gained about the firm as a result of their positions to make profitable transac-
tions in the securities of the firm (Manne, 1966:17–31). The courts found that
the firm itself was not in the business of trading in its securities and that the
firm had not imposed any contractual restraint on such use of the informa-
tion. Insider trading did not involve the use of information that had not been
provided to the firm itself. Thus, the application of the general rules led to the
holding that insider trading was permissible.
This law has been partially displaced by federal securities regulation. Execu-
tives cannot benefit from their knowledge of discrete pieces of insider informa-
tion to profit in the securities market. The most notorious example involved
transactions by executives of Texas Gulf Sulphur who bought shares of the cor-
poration on the basis of information about a potentially large sulphur find before
that information had been made public. Executives can still buy or sell stock of
their companies, even if their decision is based on their knowledge of the com-
pany, as long as it is not related to some identifiable, discrete, and material piece
of information not known to the public. If an executive decides on the basis of
his dealings with the new president that the man will not work out, or that he
has made a series of decisions harmful to the company, the executive can sell
his stock and benefit thereby if the stock price goes down, even if his judgment
about the new man is information that is not available to the market generally.
C. TRANSACTION CASES. The contractual transmission of information whose
value is not effectively shielded by a property right is very difficult. The two
sides must exchange information about the value of the information being ex-
changed while retaining the option not to complete the transaction if they are
unable to reach agreement on terms. If a property right shields the value of the
information, then the information can be freely exchanged because it is of no
value unless the property right is also transferred. For instance, information
about the inventory of a plant is of little value unless the plant is purchased.
The patent system creates a property rights framework in which trade secret in-
formation about technology can be exchanged since the information will have
little value unless the patent is also licensed.
There are contractual solutions to these problems. The negotiating parties
can enter into a contract specifying the information to be disclosed and what
can and cannot be done with it, even if no final deal is made. The seller of the
information can warrant its value, or some of its quality parameters, and a pen-
alty schedule can be agreed upon if the information falls short of the warranty
standards. Payments for the information can be spread over the time period that
the information will be used, and the amount of the payments made dependent
on measures of the value of the information.
The problems that have bothered the courts have arisen when explicit un-
derstanding on the ground rules is missing. There are two principal types of
cases. One involves an outsider submitting a business idea to a firm. The idea
can be an advertising concept, a business proposal, or an idea for a new prod-
uct. The other type of cases involve the submission of ideas for a book, play,
The Law and Economics of Rights in Valuable Information 49
Take, for instance, the problem of identifying and exploiting profitable mar-
kets. Standard price theory analysis depends on firms having an incentive to
identify and exploit profitable markets for the argument that market organiza-
tion generates allocational efficiency. Yet if firms have no ability to control the
information, the profit in the market will be dissipated before they can exploit
it. As soon as the profitable opportunity is identified, employees will leave the
firm to exploit it. It is true that employees can be retained with “golden hand-
cuffs,” but to be effective the payments must equal the value of the information
to the employee if he leaves, and such payments will eliminate the profitability
of the information. Even this tactic may not work since the aggregate “golden
handcuff” payments cannot exceed the value of the information, whereas any
single employee may be in a position to appropriate its full value.
The problem of lack of incentives to invest in information seems further
complicated by the difficulty of transacting in information. Once informa-
tion is produced, it is socially wasteful to create a situation in which other
firms have an incentive to produce that information again unless production is
cheaper than transmission. But information transactions are difficult. Not only
are there the aforementioned transactional problems, but there is the problem
of the interdependence of transactions. The value of information to firm B is
interrelated with whether that information will be provided for firms C, D, E,
F, and so on. Yet if the transaction involves information that can be protected
only through secrecy, it will be difficult for firm B to know whether the infor-
mation is being provided to other firms. “Shhh!” the seller will wisely caution
everyone. If that contingency cannot be monitored, however, the buyer will not
know what to pay for the information.
These difficulties suggest that the industrial property systems should be
extended beyond the limited domains of patent and copyright to embrace all
information of commercial value. The problem is that it is difficult to imagine
how property rights would be defined in such a system. Suppose a firm de-
termines that provision of fast food hamburgers is a highly profitable market.
Suppose further (which seems most unlikely) it is the only firm to have reached
that conclusion. Is its right to be the exclusive right to exploit all future expan-
sion in the market? For how long a period of time?
This logic also suggests that successful firms in the present legal environ-
ment should be preoccupied with secrecy about their affairs. They should want
48 I have systematically read the Oil and Gas Journal, which has long technical sec-
tions written by the personnel of firms in the industry. One purpose of the articles
seems to be to find purchasers for the company’s technology.
52 Who Owns Knowledge?
Another bit of evidence that the real world does not operate as logic sug-
gests is that California, a state that seems to harbor a disproportionate number
of technologically progressive companies, does not permit any restrictive cov-
enants to be enforced, even in the trade secrecy area.49 One would think that if
legal protection of trade secrecy were of any significance, there would either be
pressure from the firms to change the rule or this would be a significant factor
in the location of such activities.
Another bit of evidence is a recent survey of high technology firms in the
Boston area to determine if their efforts to maintain trade secrecy were increas-
ing. The hypothesis that led to the survey was that given the increase in the dif-
ficulty and cost of enforcing patents, one should expect to see firms substitut-
ing secrecy protection for patents (Casey, Marthinson, and Moss, 1978).50 The
survey found no such effect. The authors of the survey attributed this finding to
a weakened effectiveness of trade secrecy due to the new federal government
regulation. It is debatable whether these relatively new statutes have already
had so much effect. An alternative explanation would be that the secrets are
already quite safe, and that additional efforts would have almost no effect.
These difficulties in the socially optimal incentives for the investment in
and dissemination of information can be accepted as an unfortunate fact of
nature. If they cannot be overcome, they cannot.
These problems are, in larger compass, the paradox of the efficient markets
literature. The modern scholarship of finance has shown that securities markets
are so efficient that all, or at least most, investors will do better if they select se-
curities at random rather than invest after trying to identify good investments.
But if this is so, who has an incentive to invest in providing information to the
market so that it is efficient? If no one has an incentive, how can the market
be efficient?
The remainder of this essay attempts to identify aspects of the information
problem that makes the argument just developed false. There are three key
49 California Business and Professional Code § 16600 (West 1964) provides that
“Except as provided in this chapter, every contract by which anyone is restrained
from engaging in a lawful profession, trade, or business of any kind is to that ex-
tent void.” There is no exception for restrictions reasonably necessary to protect
a trade secret. The only exception relates to the sale of goodwill. There is dictum
to the contrary. Muggill v. Reuben H. Donnolly Corp., 42 Cal. Rptr. 107, 398 P.2d
147 (1965), cited in Gordon Termite Control v . Terrones, 84 Cal. App. 3d 176,
179; 148 Cal. Rptr. 310, 311 (1978); Trans-American Collections, Inc. v. Conti-
nental Account Servicing House, Inc., 342 F. Supp. 1303, 1303 (D. Utah 1972).
Louisiana and Michigan have similar statutes. 16 La. Rev. Stat. Ann. § 23:921;
Mich. Comp. Laws Ann. §§ 445.761 & 445.766.
50 This is not to say that businesses do not have trade secret protection programs. See,
e.g.. “Vigilant Firms Strive to Keep Their Secrets by Plugging up Leaks.” Wall
Street Journal, July 28, 1972:1 c. 1.
The Law and Economics of Rights in Valuable Information 53
A. Information is Self-protecting
This argument has both a supply side and a demand side. On the supply side the
argument is that information is difficult to steal. The demand side argument is
that nobody can profit by stealing it. Together they operate to make information
more secure than it seems.
1. Difficult to steal. This point should not be unfamiliar to a teacher who
has had the experience of teaching a course and then discovering that many
of the students did not understand most of the subject matter. Nor should it be
unfamiliar to the author of an article who has had the experience of discover-
ing that many of his readers completely misunderstand it. Information of any
complexity is difficult to transmit. The examples just given are drawn from
an enterprise whose purpose is to communicate information successfully. It is
much more difficult to obtain information when it is organized in a form not
designed to facilitate communication. Imagine a highly efficient plant which
employs some 500 people. It is unlikely that all the information making that
plant operate as efficiently as it does would exist in a single place. There is old
Joe down there in charge of the paint room. He runs a very good paint room,
but the general manager probably does not have the slightest idea how he does
it. All the general manager needs to do, to protect the firm against Joe’s death,
retirement, or departure, is make sure that Joe has trained the night-shift su-
pervisor and his vacation stand-in. If the productivity of the paint room does
not fall when Joe takes his month-long summer vacation, the manager can be
reasonably confident that the stand-ins understand the system. If a few em-
ployees know the system, the firm is protected against the departure of any
one. Conversely, if Joe were to defect to a competitor, it is not clear that Joe’s
knowledge would be of much value. The competitor’s paint room is probably
set up quite differently. The physical layout is different and the product comes
off the assembly line in a different condition. For instance, Joe’s employer does
final finishing in the paint room, whereas the competitor does it in a different
department. The key to the productivity of Joe’s operation has been that finish-
ing and paint preparation go on simultaneously. Joe may not even know that is
why the paint room is productive.
Managers can avoid increasing the ease with which this information can
be transmitted by resisting the temptation to assemble the information in or-
ganized written form. Thus the firm might choose not to prepare a detailed
54 Who Owns Knowledge?
manual which explains in useful detail: “Operating Procedures for the Efficient
Production of Ethanol of Plant A.” Managers might choose instead to review
the operating procedures for segments of the plant, set operating standards for
the operation of those segments, and hold the segments to those operating stan-
dards without writing down in one place how those standards are to be met.
The difficulty of stealing valuable information is further compounded by the
likelihood that it is embedded in a context that contains a great deal of extrane-
ous information. Think of the problems confronting the analyst of the aerial
photographs of DuPont’s plant. Suppose he suspects that the photographs will
provide information about the process. But which aspects of the photograph?
Which machine is the key?
It is this aspect of information that seems to be at work in the Freedom of
Information Act cases. Assume that an agency agrees with a submitter that
documents should be withheld on grounds of trade secrecy. The question for
the courts is now whether the documents in fact contain trade secrets. The in-
teresting thing about the litigated cases is that the documents in issue contain
information of a type that has never been litigated in a traditional common law
trade secrecy case. The cases involve such things as financial reports on the op-
eration of a government franchise,51 manning tables by race and sex submitted
to the EEOC,52 or lists of consignees on a customs declaration form.53
The explanation for the subject matter of the reverse Freedom of Informa-
tion Act cases is that they involve documents in which information of value has
been assembled in a single place and the criteria of the assembly are clear. The
submitter probably would not assemble such a document absent government
reporting requirements. And if it did, it would control access to the document
and the criteria that led to the assembling of the document would not be clear to
a third party who obtained it. In the freedom of information act cases, by con-
trast, it is clear that the financial report was prepared to meet the requirements
of the franchisor and would be of interest to any firm contemplating bidding
on the franchise at renewal time; that the manning tables were compiled to
meet EEOC requirements and would be of interest to anyone contemplating a
discrimination suit against the firm; and that the customs declaration discloses
the names of firms interested in purchasing the product exported and would
be of interest to firms with the same product for use as a mailing list. Thus the
combination of highly specific government reporting requirements combined
with the statutory duty to disclose have significantly lowered the cost of ob-
taining information about competitive firms and reduced the natural tendency
of information to protect itself from competitive appropriation.
51 National Parks & Conservation Ass’n v. Morton, 498 F.2d 765 (D.C. Cir. 1974).
52 Chrysler Corp. v. Brown, 99 S. Ct. 1705 (1979).
53 Twin Coasts Publishing Co. v. Department of Commerce (pending D.D.C.).
The Law and Economics of Rights in Valuable Information 55
the thieves kept falling out among themselves as one participant in the con-
spiracy would attempt to sell the information and defraud his co-conspirators
(Payne, 1967:41).54 In another case, the thief approached Colgate with Proctor
and Gamble’s marketing strategy for toothpaste. Colgate called in the police
and the thief was arrested (Payne, 1967:26–27). Colgate’s action may not have
been entirely altruistic. It would not be unreasonable to calculate that the risks
in paying for the information and later finding that it was not authentic 55 or
that it had been sold to a number of other firms in the industry were greater
than the gains from helping to destroy the viability of the post-theft market for
information. This logic would suggest that the trade secret thief would be well
advised to approach firms that themselves do not have valuable trade secrets.
But it may be that those firms are not in a position to exploit effectively the
information that has been stolen.
C. THE VALUE OF INFORMATION SELF-DESTRUCTS. A firm with information that its
competitors do not possess has an exclusive position to exploit. The only way
the information possessed by the departing employee or the information thief
can be exploited is in competition with the originating firm. If the information
concerns an efficient process, the theft generates two, or more, firms in posses-
sion of the process. They may quickly compete away the value of the process.
Anticipation of this competition will deter the theft in the first place.
This problem does not apply to thefts by entities that exploit the informa-
tion in markets where the first firm does not operate. If the firm possessing the
secret information cannot operate in certain markets due to tariffs or other bar-
riers, a firm operating within those protected markets can steal the information
and benefit from it within the protected markets. There is some indication, for
example, that the most serious threat to secret technological information comes
from the espionage agents of socialist countries and Japan.56
54 “Soon the crack came from within. By the spring of 1961, only six months after
the beginning of its successful operations, Fox’s group began to disintegrate. Can-
celarich and Fine rebelled and accused Fox of holding on to what they claimed
was their share of the profits. . . . To try and force his hand Cancelarich and Fine
stole his collection of micro-organisms and purloined documents during Fox’s ab-
sence abroad. . . . Equipped with this material they began their own illicit selling
operations. . . .” Harold Farrar was imprisoned for selling Celanese Corporation
technology to Mitsubishi Plastics Industries at a price regarded by observers as
“an incredible bargain for the Japanese.” The price was $77,400 for technology
thought to be worth millions of dollars. Wall Street Journal, January 21, 1980:1
c.1.
55 “Colgate Wondered Whether the Supplement was Really New.” Wall Street Jour-
nal, January 21, 1980:1 c.1.
56 See note 16 and Hoover (1964:140). The Wall Street Journal article on the Mit-
subishi theft from Celanese suggests this is a common Japanese tactic. Wall Street
Journal, January 1, 1980: 1 c. 1.
The Law and Economics of Rights in Valuable Information 57
The finance literature has made it clear that markets transmit information. It can
be logical for some investors to decide not to invest in acquiring information
57 Klein, Crawford, and Alchian (1978) develop a theory of vertical integration based
upon the problem of opportunistic behavior within contract relations. The ability
of employees to appropriate information from the firm is one example of such
behavior.
58 Who Owns Knowledge?
58 This sketchy model has been elaborately detailed under highly specialized assump-
tions in Grossman and Stiglitz (1978). Carlton (1981) explores a related model to
illuminate the problem of how a competitive industry plans its future output.
The Law and Economics of Rights in Valuable Information 59
trading in many situations, and some firms might wish to do so at all times. The
firm can bar insider trading by contract with its employees, but violations of such
contracts would be difficult to detect. The SEC’s regulatory apparatus helps firms
wishing to suppress insider trading to do so, but leaves firms wishing to permit it
unable to do so.
61 Loeffler (1974) concludes that the fraud was essentially a securities fraud whose
objective was to inflate the stock price.
62 It was a repeated pattern for employees to discover the ongoing fraud and then
to begin their own fraud protected by their ability to blackmail their superiors.
See Loeffler (1974:129–133). This “climate of personal moral decay,” (Loeffler,
1974:133) increased the financial strain on the conspiracy. None of the employees
who discovered parts of the fraud attempted to benefit by selling the stock short.
63 Ray Dirks, a securities analyst, learned of the fraud from Ronald Secrist, a former
employee who had also reported the fraud to the insurance regulators. Trading by
Dirks’ clients had a dramatic impact on price and accelerated collapse of the fraud
(Loeffler, 1974:110–113).
62 Who Owns Knowledge?
This line of argument might be used against all vertical integration, includ-
ing tie-ins, on the ground that the more explicit markets there are the better.
The organization and operation of markets require resources, however, and the
usefulness of the information generated by a market is influenced by its depth
and continuity. A policy that strives to fragment the economy into an infinite
number of market interactions would be, ironically, a policy to destroy all in-
formative markets. There is an optimal number of markets in an industry. Too
few markets will raise the internal information cost problems for firms; too
many markets will erode the net value of the information they generate.
The development of a market in an industry requires that the industry share
conventions about the terms and conditions of trade. This requirement is most
visible in organized securities markets with their elaborate requirements on
units and time of trade, forms of orders, payment obligations, and so on. This
means that it is not costless to change markets, since it will be costly to all of
the participants to adjust to new trading terms and procedures.
In organizing its own operations a firm must consider how those opera-
tions will relate to existing markets in the industry. Consider, for instance,
the problem of choosing between two technologies for producing end product
X. One technology involves the production of intermediate products A, B,
and C which are widely bought and sold. The other technology involves no
such intermediates. The capital risks are equivalent. An advantage of the first
technology is that the firm can use the information embodied in the intermedi-
ate markets to monitor the efficiency of the process operation and to adjust to
changing technologies. If its costs exceed the market price for intermediate
A, the firm will know something is wrong in that part of the process. If the
firm cannot correct the problem, it will have the option of closing that part of
its operation and buying A on the market. Conversely, if its costs of proceed-
ing from C to X exceed the difference between the two market prices, the
firm can either correct the cost situation or close that part of its process and
sell C instead of X. Thus, the first technology is better diversified to face the
technological and market risks of the capital investment decision, for it has
more of the characteristics of an index fund. Similar problems exist in the
human capital field. There is an advantage to a firm in adopting technologies
and procedures that utilize standard human skills for which markets exist. If
the employees are trained in recognized professions and use widely accepted
skills and procedures, then the market will provide information to both the
firm and the employee about the employee’s wage value. But if the employee
is trained in skills specific to the firm, determining wages will be more costly
for the firm and the risks associated with the specialized investment will have
to be carried by the firm.
The Law and Economics of Rights in Valuable Information 63
These arguments explain why firms might choose to buy production tech-
nology from machinery suppliers and designers and to acquire human skills
from specialized, independent educational institutions even if they could per-
form those tasks at lower short-run cost within the firm. It could also explain
why employers permit employees to participate in professional conferences or
publish articles about their work. A firm wants to be different than its competi-
tors, but not too different. The use of outside designers, equipment suppliers,
staff training, professional conferences, and consultants are all ways the firm
can assure that its internal operations and technology do not drift away from
the industry’s norm and impair the firm’s ability to use the information content
of existing markets.
Not only might this approach illuminate some central problems of indus-
trial organization, such as firm structure of an industry and vertical integra-
tion, but it may supply the “missing link” between micro- and macro-theory
— why macro-events have observable effects on real instead of only nominal
economic variables.64 If firms in fact, and quite rationally, acquire most of the
information they need from markets, the relative efficiency of their response
would depend on the efficiency with which the firm production-market trans-
mission mechanism works. The firm must be able to position itself within the
relevant market in a way that enables it to profit from the production and ex-
ploitation of the relevant information. The finance literature has verified that
some process makes the securities markets efficient in terms of information
relating to a particular security. It is easy to conjecture how a firm is able to col-
lect information about such a security and then make the market transactions
necessary to capture the value of the information and simultaneously make
the market price efficient. But it is very difficult to gain, in proportion to its
value, from information that affects every market. This would mean that firms
get good information about the relative prices of inputs and outputs, but not as
good information from markets about macro-events. A major welfare cost of
an unstable price level may be that the price level degrades the quality of the
information that can be extracted from markets and thus increases the “errors”
of firms dependent on those markets for information vital to their operation. To
put the point in terms of the finance literature, today’s price contains good in-
formation on the relative value of security X against all other traded securities,
but it contains much poorer information about the price level of all securities
six months from now. Firms would, therefore, consistently underestimate the
inflationary or deflationary effects of macro-events, which would lead to the
effect of macro-events on real economic variables.
65 Rubin and Shedd (1981) use opportunistic behavior as an explanation. This expla-
nation does not, however, explain why the parties to the contract are not able to
provide for or assume that risk. Cf. Kronman and Posner (1979).
66 Posner (1979) summarizes this tradition: “For at least a century, economists have
been concerned that a purely competitive market would not produce enough in-
formation. The underlying problem of information production is the difficulty of
appropriating as private profits any of the social benefits that the disseminator of
information creates. Unlike most goods, information is not consumed by use. If I,
a farmer, sell you an apple, and you eat it, no one else can eat it; thus anyone who
wants my apples will have to do business with me and will have to compensate me
for my costs in growing them. But if I sell you an idea, and you use it to produce
something that reveals the idea, anyone else can use the idea without dealing with
me. Of course the law may seek to prevent such appropriation. The point, however,
is that some legal intervention or other ‘artificial’ restriction is necessary to make
an idea a saleable commodity.”
The Law and Economics of Rights in Valuable Information 65
References
Arnold, Tom and David McGuire (1975) “The Law and Practice of Corporate Informa-
tion Security.” Journal of Patent Office Society 57.
Becker, Gary S. (1975) Human Capital: A Theoretical and Empirical Analysis. Cam-
bridge, MA: National Bureau of Economic Research. Second edition.
Bergier, Jacques (1975) Secret Armies: The Growth of Corporate Industrial Espionage
Trans. Harold J. Salemson. Indianapolis: Bobbs-Merrill.
Blake, Harlan M. (1960) “Employee Agreements Not to Compete.” Harvard Law Re-
view 73.
Carlton, Dennis W. (1981) “Planning and Market Structure.” In John McCall, ed.,
The Economics of Information and Uncertainty. Chicago: University of Chicago
Press.
Casey, Jr., William L., John E. Marthinson, and Laurence S. Moss (1978) “Trade Pat-
enting: Complementary or Substitutable Activities?” Unpublished paper, Babson
College, Wellesley, Mass.
Fama, Eugene and Arthur Laffer (1971) “Information and Capital Markets.” Journal
of Business 44.
Frackman, Russell J. (1979) “The Failure to Pay Wages and Termination of Entertain-
ment Contracts in California.” Southern California Law Review 52.
Fuller, Lon L. (1959) “Governmental Secrecy and the Forms of Social Order.” Pp. 256–
68 in Carl J. Friedrich, ed., Community: Nomos II. New York: Liberal Arts Press.
Greene, Jr., Richard M. (1966) Business Intelligence and Espionage. Homewood, IL:
Dow Jonoes-Irwin, Inc.
Grossman, Sanford J. and Joseph E. Stiglitz (1976) “Information and Competitive Price
Systems.” American Economic Review 66 (Paper and Proceedings, May 1976).
——— (1980) “On the Impossibility of Informationally Efficient Markets” American
Economic Review 70.
Hamilton, Peter (1967) Espionage and Subversion in an Industrial Society. London:
Hutchinson.
Hickson. Philip (1968) Industrial Counter Espionage. Tampa, FL: Spectator Publica-
tions.
Hirshleifer, Jack (1971) “The Private and Social Value of Information and the Reward
to Inventive Activity.” American Economic Review 61.
——— (1973) “Where Are We in the Theory of Information?” American Economic
Review 63 (Papers and Proceedings, May 1973).
Holdsworth, W.S. (1936) A History of English Law. London: Methuen and Company
Ltd.
Hoover, J. Edgar (1964) “The U.S. Businessman Faces the Soviet Spy.” Harvard Bus-
ness Review 42.
Kitch, Edmund W. (1977) “The Nature and Function of the Patent System.” Journal of
Law and Economics 20.
——— (1980) “Patents, Prospects, and Economic Surplus: A Reply.” Journal of Law
and Economics 23.
66 Who Owns Knowledge?
——— (1973) “The Patent System and the New Drug Application: An Evaluation of
the Incentives for Private Investment in New Drug Research and Marketing, in
Regulating New Drugs.” In Richard L. Landau ed., The University of Chicago
Center for Policy Study 82.
Klein, Benjamin Robert C. Crawford, and Armen A. Alchian (1978) “Vertical Integra-
tion, Appropriable Rents, and the Competitive Contracting Process.” Journal of
Law and Economics 21.
Kronman, Anthony T. and Richard A. Posner (1979) The Economics of Contract Law.
Boston: Little, Brown.
Loeffler, Robert N. (1974) Report of the Trustee of Equity Funding Corporation of
America 6 (October 31).
Lucas, Jr., Robert E. (1975) “An Equilibrium Model of the Business Cycle.” Journal of
Political Economy 83.
Maggs, Peter B. (1979) “Some Problems of Legal Protection of Programs for Micro
Computer Control Systems.” University of Illinois Legal Forum 453.
Manne. Henry G. (1966) Insider Trading and the Stock Market. New York: The Free
Press.
McFetridge, Donald G. and Douglas A. Smith (1980) “Patents, Prospects, and Eco-
nomic Surplus: A Comment.” Journal of Law and Economics 23.
McGarity, Thomas O. and Sidney A. Shapiro (1980) “The Trade Secret Status of Health
and Safety Testing Information: Reforming Agency Disclosure Policies.” Harvard
Law Review 93.
Milgrim, Roger M. (1979) Trade Secrets in 12.4 Business Organizations. New York:
Clark Boardman Co.
Palmer, George E. (1978) The Law of Restitution. New York: Aspen Publishers.
Payne, Ronald (1967) Private Spies. London: A. Barker.
Posner, Richard A. (1979) “Information and Antitrust: Reflections on the Gypsum and
Engineers Decisions.” Georgetown Law Journal 67:1187, 1193.
Rubin, Paul H. and Peter Shedd (1981) “Human Capital and Covenants Not to Com-
pete.” Journal of Legal Studies 10.
Schlueter, David A. (1977) “The Enlistment Contract: A Uniform Approach.” Military
Law Review 77.
Scott, Austin (1965) The Law of Trusts. Boston: Little, Brown and Co.
Smith, Paul I. Slee (1970) Industrial Intelligence and Espionage. Post Falls: ID: Cen-
tury Publishing Company.
Sobel, Lionel S. (1977) Professional Sports and the Law. New York: Law-Arts Pub-
lisher.
Turner, Amedee E. (1962) The Law of Trade Secrets. London: Sweet and Maxwell,
Ltd.
2
Scientific Norms, Legal Facts, and the
Politics of Knowledge
Alfons Bora
The politics of knowledge have become a contested issue in the scientific de-
bate. At least three different interpretations of this field of governance can be
found in the literature (cf. Wehling, 2004). One interpretation is oriented to
innovation and the development of distributed production of knowledge (Ram-
mert, 2003). One might call it — in metaphorical terms — a model of “delib-
erate release” of knowledge. A second interpretation deals with questions of
regulating uncertainty and of controlling the production of knowledge that is
steadily growing. This second version is an aspect of regulative politics, aim-
ing at the protection of rights and at pursuing common goods (Stehr, 2003).
It might be called a model of “knowledge containment.” A third interpreta-
tion that has gained increasing interest during the last years has been named
“reflexive politics of knowledge” (Wehling, 2004; Böschen, 2005). It is based
on concepts of reflexive modernity that have been brought forward by Ulrich
Beck, for example, and on contemporary approaches in science and technolo-
gy studies that are represented by Sheila Jasanoff, Helga Nowotny, and others.
The term “reflexive knowledge politics” indicates blurring boundaries between
science and other societal systems, such as politics, or the law, for instance.
The concept criticizes classical differentiations between the knowledge orders
of experts and laypersons, or between facts and values. Instead, it makes use of
a concept of “reflexivity” that intends to replace these “old” distinctions, or, at
least, to re-interpret them in the light of a theory of societal de-differentiation.
The current article will shed light on some of the phenomena that gave
reason to formulate the idea of reflexive politics. It will thereby take a critical
position against the above-mentioned third interpretation of “reflexive knowl-
edge politics.” The concept of reflexivity in these approaches will be refor-
mulated in order to better understand the cross-boundary relations between
societal systems. The empirical example will be the relation between science,
politics, and the law—the latter being one of the most prominent instruments
of political intervention.
This relation between science, politics, and the law lies at the heart of knowl-
edge politics, as a few empirical considerations can demonstrate. The politics
67
68 Who Owns Knowledge
of knowledge have reached the centre of the political system. In Europe, for
instance, the Lisbon Agenda has made knowledge-based society and the po-
litical, legal, economic, and scientific path towards this knowledge society the
central issue of policymaking for the years to come (Rodrigues, 2005). It does
so in combining different objectives, such as social standards, cultural values,
respect for the environment, with high competitiveness and economic strength.
In March 2000 in Lisbon, EU heads of state and government set the strategic
goal to become the most competitive and dynamic knowledge-based economy
in the world, capable of sustainable economic growth with more and better
jobs and greater social cohesion. These goals were confirmed at the Barcelona
European Council, which added that investment in European R&D should be
increased to 3 percent of GDP by 2010. In this process, the role and the par-
ticular shape of science and scientific knowledge become an issue for discus-
sion. How, under which conditions, does science enter the scene of the Lisbon
strategy? In particular, the relation between science and the other societal fields
will not remain untouched when looking at this process.
Currently, the debate very much deals with issues of “science communica-
tion” on the one side, and “enabling” regulation on the other. Both aspects are
important, but my suggestion is that they are only one-way, linear modes and
therefore are not sufficient to meet the challenges that knowledge governance
is producing. If we take a closer look at the debate about the Lisbon Agenda,
the following developments can be observed: In the knowledge society a broad
concept of innovation — including social and institutional innovation — and
an enlarged vision of the role and place of the citizens are necessary. The sim-
ple, more or less linear model of “explaining science to the public” is replaced
by a more complex, systemic, multi-directional, and multi-level concept. This
concept is more interactive in the way of a “citizen push” approach promoting
innovation “with and for everyone.” Under such conditions, scientific com-
munication to other social fields — be it the public or functional systems such
as the law, e.g. — has to perform beyond single channel, one-way informa-
tion. The general task for science is not just to teach, but also to learn, to get
involved, to develop broader skills, to “build bridges” to other social fields.
Citizens can be viewed as actors promoting and strengthening research, not
only as sceptical and uneducated. New forms of knowledge governance are
postulated and regulatory implications are discussed.
Against this background, the question arises, who — which social system
— owns which sort of knowledge? And, furthermore, how can the exchange
of knowledge work between different social systems? The aim of this paper is
to sketch a theoretical point of view that allows for opening the perspective
on the relation between science and regulation. The focus of the argument
will be on the relation between science and the law, the latter being one of the
Scientific Norms, Legal Facts, and the Politics of Knowledge 69
central instruments of regulation. In the course of its argument, the paper takes
a sociological perspective on the political field. This perspective is, to a great
extent, informed by sociological systems theory. My considerations in this ar-
ticle try to make use of the theoretical force of this approach by concurrently
demonstrating its empirical value.
Looking at the interplay between science and the law in knowledge society,
we can identify three main thematic strands: legal ownership in a narrow sense
(patents, TRIPS, etc.); legal regulation in technical security law; and scientific
expertise for legal decision-making. The current contribution focuses on the
second and the third strand: legal regulation and scientific advice. Both can
be viewed as complementary sides of the general relation between law and
science, as two forms of exchange of knowledge between different social sys-
tems (“owners”), each of which combines cognitive and normative knowledge.
Both forms of exchange are manifestations of the governance of knowledge
(Stehr, 2004.) The suggestion is that if we conceive this relation under the
general aspect of knowledge, particular problems in regulation and in exper-
tise will become understandable as general characteristics of the governance
of knowledge. Furthermore, the political implications of this complex relation
might be better understood from the perspective of knowledge than from other
perspectives. The politics of knowledge — this will be the practical message
— must take serious cognitive and normative knowledge on both sides: legal
norms and scientific facts, but also legal facts and scientific norms. The sort of
“knowledge cross-over” that the current contribution addresses gives reason to
conceive the politics of knowledge in a reflexive and multi-directional mode.
Under the presuppositions mentioned before, the concept of “reflexivity” has
to be discussed critically. From a systems theoretical point of view, it gains
new aspects and a higher level of terminological precision.
The argument of this contribution will be presented in three steps. First, two
directions of the relation between science and the law — expertise and regula-
tion — will be discussed, which can both be understood as consequences of
functional differentiation. Second, two modes of knowledge — cognitive and
normative — will be theoretically analyzed, which both are aspects of expertise
and regulation. Third, the theoretical and practical implications of the approach
suggested in this article will be discussed. They refer to the model of reflexive
politics and will result in a theoretically embedded concept of reflexivity.
Expertise and regulation are two forms of knowledge exchange between differ-
ent “owners.” Both “directions” of exchange between science and the law can
be viewed as everyday contacts between the two social systems. The metaphor
of “exchange of knowledge,” then, raises two questions:
70 Who Owns Knowledge
tutions. Regulation under these auspices is more than regulatory law. It is any
operation of a system aiming at the change of the current state of a “goal” or
“object” system. The latter might even be the regulating system itself, in the
case of self-regulation (Bora, 2002.)
At the same time, regulation is losing effectiveness and facing serious prob-
lems. Regulatory failure, unintended side effects, and over-regulation are the
well-known problems. The current paper addresses an additional aspect. With
respect to science, new challenges come in sight. Law faces complex norma-
tive structures in the field that it tries to regulate: “technoscientific” norms
as part of the scientific reality. The term “technoscience” has been coined in
order to indicate that experimental science by modelling natural processes
unequivocally demonstrates the technological reproducibility of this process.
Science and technology are closely linked in this context, where scientific
questions turn out to be technological projects (Latour, 1991; Haraway, 1991).
“Technoscientific” norms are, consequently, normative constructs emerging
from the interplay between science and technology. They combine factual —
scientific and technological — knowledge and normative claims. A large num-
ber of provisions in environmental law and related areas can be interpreted as
“technoscientific” norms. This holds true for many legal forms of risk attribu-
tion, for instance. The legal model of risk attribution, e.g., paragraph 16 of the
German Genetic Engineering Act, implicitly constitutes factual knowledge by
providing for an interpretive scheme (Deutungsmuster) that selects relevant
knowledge from irrelevant on the factual level (Bora, 1999). Or, as Lezaun
(2004) argues, we can see the concept of a “transformation event” in the regu-
lation of the marketing of transgenic organisms. It identifies “transgenic” or-
ganisms by reference to the specific technical-industrial intervention which
produced them, and thereby implies a certain concept of relationship, based
less on conventional biological taxonomies, and more on the novel models of
origin and relatedness that are being developed “between” law and science.
Another example is the erosion of institutional norms of knowledge produc-
tion by the expansion of intellectual property regimes. In this context, a num-
ber of irritating questions arise: Is scientific knowledge now being privatized
at the expense of the public sphere? Can one in any case distinguish private
and public (Strathern and Pottage, 2004)? Another example, from the comple-
mentary perspective so to speak, shows that and how “technoscientific” norms
are involved in the governance of biotechnology: in June 2005, the German
Ministry for consumer protection gave an instruction that its subordinate of-
fices — which have the legal duty to conduct research on all fields of biotech-
nology — must withdraw from participating in biological safety research. The
case shows how strongly the implicit cognitive schemata are mingled with
normative presuppositions. Regulatory preferences, coupled with cognitive
Scientific Norms, Legal Facts, and the Politics of Knowledge 73
The before-mentioned questions about expertise and regulation are not new
in their respective single views. Law plays a pivotal role in the fabrication of
nature and technology — and, vice versa, science and technology both create
a corpus of normative knowledge. Sociology of science on the one hand and
law and society studies on the other have each reacted to this development in
their respective realms. However, they have remained more or less isolated
from each other. The focus on knowledge and knowledge society might offer
an opportunity to combine these particular efforts somehow.
What are theoretical shortcomings of the single perspectives? Their main
weakness seems to consist of the fact that they each focus on the code of a
single functional system (right/wrong in one case, true/false in the other).
Therefore, they are, from a theoretical point of view, not extremely sensitive
to “external” codes. This argument has to be put very carefully, because obvi-
ously STS and socio-legal studies both emphasize the influence of these “ex-
ternal” factors on their respective subjects. They observe non-legal influences
on the legal system and non-scientific influences on science. However, they
often neglect the reverse effect, the fact that the law produces cognitive knowl-
74 Who Owns Knowledge
edge,2 and that science produces norms. Often, both perspectives are adjusted
to interpretive schemata that function as “law and society” or “science and
society,” as if society was something different from the respective functional
system under observation. In both cases, “society” is a unspecified symbol for
the “other.” The sociology of knowledge opens a view that shows law and sci-
ence (and economy, politics, education etc.) as aspects of society.
Studies in “law and society” and “science and society,” while referring their
specific objects of investigation to the broader context of society, have each
developed a somewhat local concept of “society” or “sociality.” For instance,
from the perspective of the legal system, “society” is a potential source of
normative substance, but also — and this is more problematic — a perma-
nent source of non-normative perturbances (such as facts, power, interest, etc.).
From the perspective of science, on the other hand, “society” is the permanent
source of non-factual perturbances (such as norms, power, interest, etc.).
Law and society studies, therefore, are mainly concerned with the external
observation of non-legal conditions of the law (traditionally observed as
“power”). Science and technology studies, on the other hand, are concerned with
non-scientific conditions of science (also traditionally observed as “power”).
Very rarely, they become sensitive to the inherent mixture of cognitive and
normative aspects in both fields. Although a few persons have constantly been
dealing with the issue, e.g., Sheila Jasanoff, Gunther Teubner, Alain Pottage,
and others, the mainstream in both disciplines is not significantly adjusted to
this type of question from a theoretical point of view.
Moreover, the same holds true for the relations in the opposite direction,
when we talk about the ability of science and the law to have an impact on “so-
ciety,” i.e., on other functional systems. These “goal” systems are each differ-
ent from science and from the law. Problems in the relation between science or
law and their respective “goal” systems in counselling or regulating processes
stem from these differences. This is a very familiar theoretical concept of ex-
pert advice and regulation in science and technology studies and in socio-legal
studies. In a schematic manner, one could characterize these two forms of ex-
change between law on the one hand, science on the other, and their respective
social environments as follows.
The problem in both cases consists of theoretically describing the process
of exchange, of influence that somehow “goes” from one system to the other.
The central insight of constructivism (particularly the constructivism of sys-
tems theory) was that on the counselled and the regulated side a more or less
“radical” model of system autonomy has to be taken into consideration. Only
2 A fact that is, for instance, almost completely neglected in studies on the “under-
standability” of legal texts (Lerch, 2004), an issue that could be excellently helpful
to show that and how the law produces and shapes cognitive knowledge.
Scientific Norms, Legal Facts, and the Politics of Knowledge 75
in the case of law (regulation), and normative knowledge in the case of science
(advice).
The “goal” system in both cases faces its internal code on the advising/
regulating side and there is no question of “misreading.” The problem here
seems to be visibility/invisibility. Does the regulated/counselled system re-
alize that it faces communications in its own code? Visibility is a problem
insofar as this second layer is mostly implicit.
Furthermore, the counselling/regulating system will usually not perceive
this second layer in its own operations. That means, it will not observe that it is
using and producing “external” knowledge. It will, in Teubner’s words, “mis-
read” the situation in this respect, but the misreading will not be productive.
The second, implicit layer is relevant insofar as it contains the presuppositions
on which advice and regulation respectively are built. Take, for instance, the
following cases as examples.
1. In green biotechnology, risk regulation uses the precautionary principle
in all European countries. The principle is based on scientific analysis ac-
cording to the state of the art in science. Risk is understood as a sort of
potential danger that has been triggered by the genetic transformation and
by nothing else. If no indicators for “specific” risk in this sense can be
found, then no particular measures of precaution will be necessary (infor-
mation theoretical concept, in contrast to decision theoretical, cf. Bora,
2006). Here, the normative concept of risk is completely influenced by a
specific strand of argument in science, which bears fundamental norma-
tive implications (concept of risk) but appears as merely scientific in the
legal context. Scientific communication is characterized by contingency,
78 Who Owns Knowledge
The introduction to this article briefly portrayed the concept of reflexive poli-
tics. From the perspective of the authors who represent this idea, reflexivity
means a certain mode of politicization of knowledge in particular and of sci-
ence in general (Böschen, 2005:241.) The arguments for this view are based
on three developments. Firstly, they refer to the development of public forms
of governance, which build a strong contrast to regulative politics on the one
hand and to private governance on the other. Participation of a broad vari-
ety of actors and civil society in all forms of public decision-making are the
characteristics of this development. Secondly, the idea of epistemic cultures
(Knorr-Cetina, 1999) gains relevance. The term was coined in order to iden-
tify different practices in the production of knowledge over various disciplines
and scientific fields. Thereby, it describes differences within the unity of sci-
ence. Thirdly, as the argument says, these epistemic cultures vary significantly
in their treatment of uncertainty and non-knowledge. Under this aspect, the
distinction between specific and unspecific non-knowledge (Japp, 1997) is of
high importance. Specific non-knowledge describes the case in which an ac-
tor explicitly knows that he/she lacks knowledge in a certain aspect. Specific
non-knowledge, therefore, is reason to start enquiry and to try to produce new
knowledge. It is the characteristic condition of scientific research: we try to
expand our knowledge in an area, where we still do not have (enough) knowl-
edge. This form of specific non-knowledge has to be strictly distinguished
from any kind of unspecific non-knowledge. Unspecific non-knowledge de-
scribes a case of categorical ignorance, a case in which an actor cannot know
that he/she lacks knowledge in a certain aspect. Unspecific non-knowledge
transcends the barriers of our epistemic capacities in a given moment. Many
80 Who Owns Knowledge
environmental and health catastrophes of the last decades have been charac-
terized by such an epistemic barrier in the moment they became an issue of
social decision-making. One may, for instance, think of the DDT case (Car-
son, 1962), but also of the beginning of the debate about chlorofluorocarbons
(CFCs) in the early 1920s, when the dangerous substances were initially taken
as problem solutions, because their disastrous consequences could not even
be imagined due to a substantial lack of causal knowledge. In order to avoid
misinterpretation it is important to note that the category of unspecific non-
knowledge does not excuse those actors, who in a later stage with positive
indications of possible dangers drew the wrong decisions (or even refused
to take any). It rather helps to see the complexity of the related decisions. It,
therefore, gives reason to ask for the way in which different epistemic cultures
treat uncertainty.
Reflexive knowledge politics, some authors argue, is the answer to these
epistemological barriers. Governance begins to acknowledge uncertainty, to
include a multiplicity of actors, to politicize scientific arguments (“structural
sub-politics,” Böschen, 2005:256), and thereby gives politics a reflexive shape.
Under such conditions, knowledge becomes political, the thesis of reflexive
politics says. A political decision has to be made about what is relevant knowl-
edge and how this knowledge should be obtained. Therefore, the representa-
tives of this concept demand a new structure of public governance (Böschen,
2005:248–260). The relations between science and other societal systems are
the nucleus of such new structures. These relations have the form of organized
exchange between the different subsystems (Böschen, 2005:260). Thereby,
they are located in those societal areas which have been described as struc-
tural coupling above. The organizational structures of these coupling relations
have to answer the questions of “reflexive politics of knowledge”: Who has the
right to be informed, to define relevant knowledge, to veto in the process of
knowledge production, and to shape the process of public governance? How
shall these rights be executed? Which forms and procedures are best suited to
achieve the goals of “reflexivity” in this concept? The sum of activities aim-
ing at an answer to the above-mentioned questions are the components of the
“reflexive politics of knowledge.”
Coming back to the differentiations that were introduced in the second
paragraph of this article — the distinction between cognitive and normative
knowledge on both sides of the relation between law and science, the concept
of structural coupling, and of productive misreading — it is easy to see that the
concept of “reflexive” politics still remains too metaphorical with respect to
the complex exchange relations between different “owners” of (different forms
of) knowledge. The term “reflexive politics” is better suited to locate problems
than to describe theoretical solutions. The demands for (more) reflexivity do
Scientific Norms, Legal Facts, and the Politics of Knowledge 81
not yet provide for their operationalization. What would “reflexive politics”
mean with respect to the double relation between science and the law, and to
the double crossing of cognitive and normative knowledge in this realm? This
relation can be described more in depth, as I tried to show in the second part.
My argument starts where the concept of “reflexive politics” ends: with the
specific problem of what Böschen calls “organized exchange” between sci-
ence, politics, and the public. I focus on the law as regulatory instrument.
The question then is, what could “reflexive governance” mean under the
conditions sketched out in the previous parts?
Governance — in the shape of regulation and of expertise — is always and
inevitably “infected” by the technoscientific type of norm that I have tried to
describe. Therefore, it is involved in a process of permanent construction of
cognitive and normative knowledge in science and in law.
Theoretically, this description is embedded in a systems theoretical con-
cept of modern society as functionally differentiated society. Knowledge gov-
ernance is a complex phenomenon stretching across a number of functional
systems, primarily politics, law, science, and economy. As such a cross-cutting
field it is deeply involved with aspects of structural coupling between these
functional systems. My approach addresses this issue of structural coupling.
It is located on the level of organizations, where structural coupling becomes
relevant empirically. Expert advice on the one side, and legal regulation on the
other, are concrete manifestations of such coupling between different function-
al systems. My argument says that the standard view on structural coupling can
be supplemented by a knowledge-oriented view. It is then possible to observe
a higher degree of complexity in the relations that constitute knowledge gov-
ernance. This observation — to be very clear — is still based on the systems
theoretical fundament. Moreover, it is this fundament of an elaborated differ-
entiation theory that allows for the application of the concept of knowledge.
The relevant addition to the standard view is the fact that cognitive and norma-
tive knowledge are involved on both sides of the coupling in both cases (advice
and regulation).
Based on this differentiation, I suggest distinguishing two modes of knowl-
edge governance. The first is the form developed during the 1990s, which main-
ly consists of the two aspects of democratizing science and of post-regulatory
law. It contains a sort of “reflexivity” that reacts on our standard model: how
can science communicate its knowledge to other social systems? The program
here is “science communication,” public understanding of science and humani-
ties (PUSH), “explaining science to the public” etc. On the other side, how can
regulation become sensitive to the autonomy of the regulated fields? The pro-
gram here is non-directive interventions, incentives, knowledge management
by public institutions, the “enabling” state, etc. The reflexivity of this model
82 Who Owns Knowledge
lems and pitfalls are also connected to participation (Bora, 1999). In spite of
the fact that participatory settings may have a productive function in improv-
ing the opportunities for involving civil society actors, they may also provoke
exclusive dynamics, if they are not designed very carefully with respect to
their function (Bora and Hausendorf, 2004). In this respect, a warning against
any euphoric attitude is necessary. An international overview (Abels and Bora,
2004) of a range of “alternative” procedures (such as the consensus conference,
the scenario workshop, the public dialogue, the voting conference, participa-
tory technology assessment, and others) has shown that we have good rea-
son to be cautious in this respect. It would, therefore, certainly be misleading
merely to install one of these procedures, hoping that it will solve the structural
problems of exchange between science, politics, and the law.
Coming back to the initial example, the Lisbon Agenda as Europe’s path
to the knowledge society, we might now say that it is still a strategy of first
order reflexivity in many aspects. Strongly bound to the ideas of technologi-
cal and economic innovation as primary goal, the strategy aims at fostering
lifelong learning and better education. Innovation policy, therefore, functions
as a “metapolicy” for science governance. It co-ordinates all single policies
with the goal of “innovation,” and, of course, with normative and cognitive
implications of what innovation would mean. The types of instruments we
observe in this context are more or less conventional: directives, action plans,
and the Open Method of Coordination. Only the latter could be seen as an
aspect of second order reflexivity, if at all (Zeitlin and Pochet, 2005)! The
OMC is a voluntary process that all member states have committed themselves
to pursuing in the context of the Lisbon Strategy. It is supposed to be a way
of creating greater visibility, encouraging a strategic and integrated approach,
mobilizing all relevant actors and finally encouraging mutual learning. Its five
main elements are: agreeing common objectives for the Union; establishing
common indicators as a means of comparing best practice and measuring
progress; translating the EU objectives into national/regional policies through
the development of two yearly National Action Plans; periodic monitoring,
evaluation and a peer review program; finally, promoting policy cooperation
and transnational exchange of learning and good practice between member
states. However, it only refers to relations between member states. Responsive
knowledge governance stretches across law, politics, and science as functional
systems and across all their organizations. Moreover, the Lisbon strategy is
strongly oriented towards the classical “expertocratic” model with respect to
science governance. Science and technology define the common indicators,
which serve as instruments for benchmarking. Many actors have, therefore,
demanded a different, a more responsive model of governance with respect to
the Lisbon Agenda (Bora, 2005a). Altogether, political instruments that realize
84 Who Owns Knowledge
the kind of reflexive governance sketched above are indispensable for a viable
exchange of knowledge between the different social fields.
References
Knorr-Cetina, K. (1999) Epistemic Cultures: How the Sciences make Knowledge. Cam-
bridge, MA: Harvard University Press.
Latour, B. (1991) Nous n’avons jamais été modernes. Essai d’anthropologie symétri-
que. Paris: Éditions La Découverte.
Lerch, K.D., ed. (2004) Die Sprache des Rechts: Studien der Interdisziplinären Arbeits-
gruppe Sprache des Rechts der Berlin-Brandenburgischen Akademie der Wissen-
schaften. Berlin: de Gruyter.
Lezaun, J. (2004) “Subjects of Knowledge: Epistemologies of the Consumer in the GM
Food Debate.” In Nico Stehr, ed., The Governance of Knowledge. New Bruns-
wick, NJ: Transaction Books.
Liberatore, Angela and Silvio Funtowicz (2003) “ ‘Democratising expertise,’ ‘expertis-
ing’ democracy: what does this mean, and why bother?” Science and Public Policy
30(3):146–150.
Luhmann, Niklas (1991) Soziologie des Risikos. Berlin/New York: de Gruyter. Pub-
lished in English as Risk: A Sociological Theory, trans. Rhodes Barrett. New York:
A. de Gruyter, 1993.
——— (1995) Social Systems, trans. John Bednarz Jr., with Dirk Baecker; foreword by
Eva M. Knodt. Stanford, CA: Stanford University Press.
——— (2000) “Die Rückgabe des zwölften Kamels. Zum Sinn der soziologischen Ana-
lyse des Rechts.” Vol. 21, pp. 3–60 in Zeitschrift für Rechtssoziologie, H. 1 Para-
doxien des Rechts: eine Debatte zu Niklas Luhmanns Rechtssoziologie.
Merton, R.K. (1973) The Sociology of Science: Theoretical and Empirical Investiga-
tions. Chicago: University of Chicago Press.
Nowotny, H., P. Scott, and M. Gibbons (2001) Re-thinking Science: Knowledge and the
Public in an Age of Uncertainty. Cambridge: Polity.
Nowotny, H. (2003) “Democratising expertise and socially robust knowledge.” Science
and Public Policy 30(3):151–156.
Perrow, C. (1984) Normal Accidents. New York: Basic Books.
Piaget, J. (1970) Biologie et connaissance: essai sur les relations entre les régulations
organiques et les processus cognitifs. Paris: Gallimard.
Rammert, W. (2003) “Zwei Paradoxien einer innovationsorientierten Wissenspolitik:
Die Verknüpfung heterogenen und die Verwertung impliziten Wissens.” Soziale
Welt 54(4):483–508.
Rodrigues, M. J. (2005) “An overview of the Lisbon Strategy: The European agenda for
competitiveness, employment and social cohesion.” Background Paper. Brussels:
2004.01.05
Schulte, M. (2004) “The use of knowledge in the legal system: the relationship between
scientific expertise and legal decisions.” Pp. 211–226 in Nico Stehr, ed., The Gov-
ernance of Knowledge. New Brunswick, NJ: Transaction Books.
Shapin, S. and S. Shaffer (1985) Leviathan and the Air-Pump: Hobbes, Boyle and the
Experimental Life. Princeton.
Silbey, S. and P. Ewick (2003) “The Architecture of Authority: The Place of Law in the
Space of Science.” In Austin Sarat and Martha Umphrey, eds., The Place of Law.
Ann Arbor, MI: University of Michigan Press.
Stehr, N. (2003) Wissenspolitik: die Überwachung des Wissens. Frankfurt am Main:
Suhrkamp.
Stehr, N., ed. (2004) The Governance of Knowledge. New Brunswick, NJ: Transac-
tion.
86 Who Owns Knowledge
87
88 Who Owns Knowledge?
respect the rights of the unborn and those who cannot vote in the current deci-
sion making system, such as non-human sentient beings.3 The latter refers to
fairness in exchange of goods and services among different sections of society
living at present, especially equality of opportunity and enabling arrangements
to give the disadvantaged a reasonable chance of gaining access to resources.
The National Innovation Foundation (NIF) was set up by the Department of
Science and Technology, Government of India in 2000 to scale up the Honey
Bee Network approach to scouting and documentation of a grassroots network
covered by the prior informed consent, build a value chain, protect intellectual
property rights, and ensure a fair distribution of benefits, if any. We provide
an operational framework in which NIF and Honey Bee Network are trying
to address these dilemmas. The Honey Bee Network4 started the dialogue 19
years ago on the issue of fairness and justice-in-knowledge exchange among
local communities, individuals, professionals attached to institutions, state and
markets.
Knowledge is produced when people observe, analyze, abstract, absorb, as-
similate, or just feel. It is obvious, therefore, that there is considerable variation
in the way knowledge is produced, validated, abstracted, and disseminated.
For some, prior feelings and beliefs cannot be separated from subsequent
knowledge that is gained. For others, it is possible to gain knowledge as an
objective fact without bringing feelings into the picture.5 However, both these
perspectives may converge on at least one issue: the interpretation, use, and
consequences of the knowledge gained through emotive or instrumental means
are certainly influenced by our values, past experiences, and future expectation
about the social order. Therefore, if we believe that we can and should use
3 They are also called perfect strangers, i.e., unknown and unknowable. We cannot
find out the preferences of a generation unborn. Likewise, we do not know what
the ant on the wall or a bird in the window thinks about us. Justice towards the next
generation is defined as intergenerational justice.
4 The Honey Bee philosophy refers to primarily four principles: (a) connecting
people to people by encouraging knowledge exchange in local languages so as to
facilitate cross pollination of ideas, (b) the knowledge providers must be acknowl-
edged and sourced while referring to their knowledge. They should not become
anonymous and should not feel short changed while sharing their knowledge. This
is akin to the flowers not complaining when bees collect their nectar; (c) attribut-
ing not only the knowledge provider but also those through whom we identify the
knowledge provider and (d) if any wealth is generated, a reasonable share goes
back to the people whose knowledge enabled the wealth generation.
5 Rummel (1981) criticizes the Rawlsian concept of “veil of ignorance” for assum-
ing that separating personal preferences or feelings will lead to fairer norms of
societal allocation of resources. The notion that people receive what is their due,
he argues, strongly depends upon what different groups of people believe is their
“due” (emphasis mine).
90 Who Owns Knowledge?
knowledge for the larger social good, then both the means through which we
gather that knowledge and the ends for which we use that knowledge may get
connected.
In Gandhian philosophy, the means often are considered more important
than the ends. If knowledge is collected through unfair means, no matter how
just the distribution of that knowledge is, the problem will not go away. This is
the problem that we wish to address in this paper.
While working through the Honey Bee Network, we realized that the preva-
lent norms of knowledge exchange, governed by the rules created by institu-
tions of state and civil society at that time, did not find any unfairness in the
extraction/collection of peoples’ knowledge (traditional as well as contempo-
rary, tacit as well as explicit) without any attribution, acknowledgement, prior
informed consent or reciprocity towards the knowledge providers. The only
resource, as we have argued, in which poor people were often rich was their
knowledge about use of resources, coping with risks of climate or other envi-
ronmental factors, dealing with stresses, and managing survival. This knowl-
edge, whether of material or institutional nature, was scouted and documented
by outsiders and shared in a language that local communities did not know. The
act of bringing private knowledge or community knowledge into the public do-
main without consent (Gupta and Sinha, 2003) was considered just because the
larger number of people benefited from the use of that knowledge. The largest
good of the greatest number of people, a utilitarian logic, produced the norm
according to which no injustice was caused. It was argued that local communi-
ties did not lose anything by sharing their knowledge. In any case, the ethics of
these communities often guided them to share their knowledge unhesitatingly.
The providers of knowledge, in many cases, did not ask for any report of what
the knowledge seekers did with the knowledge they obtained.6 Therefore, by
not providing access to the analysis or the publication, the outside researchers
or corporate agents did not, apparently, do any injustice. However, is it not a
violation of human rights when something is taken from someone who is not
aware of its true worth, or does not care to ask for the products developed by
the knowledge seekers? Most local communities around the world are very
generous in sharing their knowledge. They do not even ask investigators what
they will do with the knowledge provided. In their culture, sharing is the most
natural and expected behavior. They don’t realize that a majority of the out-
siders who access local knowledge do not feel obliged to either disclose their
purpose or to inform them when something of commercial value is developed
based on that knowledge. In the absence of any written agreement, the local
communities don’t even know what products actually came out of the knowl-
6 Britz and Lipinski (2001) cover this issue under commutative and contributive
justice.
Is a Just System also Fair? 91
edge they shared. The question of sharing benefits does not arise. The tragedy
is that when young people notice that most of the knowledge-rich, older people
often remain economically poor, they lose interest in acquiring, experimenting
with, and maintaining the knowledge. The erosion of knowledge starts because
young people don’t want to remain poor by continuing with the traditional
sharing ethic.
How do we derive the criteria by which fairness can be judged? Rawls said,
“When an adverse consequence of an exchange occurred for, or affected even
one person, the process would be qualified as unfair.” Therefore, a community
or an individual knowledge provider can be considered as a sufferer if any of
the following four things happen: (a) the knowledge provider needs access to a
product, say a medicine, based on the knowledge he provided but cannot afford
or access it; (b) by sharing the knowledge, other people come to know and the
demand for the skills and/or the local resources goes down because people can
obtain knowledge and/or resources from other sources; (c) the social esteem
of the local community or the individual knowledge holder does not increase,
even when the knowledge they provided proves to be extremely useful to the
larger world, because they have not been acknowledged or cited as the source
of the knowledge (for instance, provision of the knowledge of Cinchona as a
malarial control plant by the American Indians to the European settlers, who
used this knowledge to dominate and control the Indian tribes); and (d) the
younger people within the community lose respect for the knowledge that el-
derly people shared with the outsiders without any reciprocity because they
find that knowledge-rich elders are often economically very poor. And there
could be other criteria by which the adverse consequences on one or many
knowledge providers can be assessed.
My second contention is that unfairness can also arise if we look at the possible
adverse consequences for the knowledge seekers using unfair means to get the
knowledge. Let me illustrate ways in which this can happen: (a) the respect for
oral communications and tacit knowledge goes down in the profession because
scholars notice that not acknowledging oral knowledge of tacit and traditional
communities is not very different from ignoring similar knowledge of modern
communities or individual scholars; (b) the interactional opportunities among
the scholars go down, leading to decline in trust, social capital and production,
and cumulation of knowledge; (c) enforcement of ethical values among schol-
92 Who Owns Knowledge?
arly communities becomes difficult because of the guilt or fear of being faulted
for using different values while dealing with similar knowledge from informal
sources; (d) the respect among younger scholars and students for senior schol-
ars goes down when they realize that the professional norms of a just way of
dealing with knowledge actually appear to cause unfairness in the dispensation
of justice; and (e) the organizers of a conference regretfully find that there is
no dearth of potential participation from the scholars who follow similar norms
of unfair knowledge extraction but those few scholars who are sensitive and
responsible do not participate. The adverse consequences even for a few of the
knowledge seekers may create a similar dilemma to the adverse consequences
for knowledge providers.
Many scholars, we now revert to our original context, would argue that when
they extracted the knowledge of local communities without any acknowledge-
94 Who Owns Knowledge?
ment, they did not do it to exploit the people. They did it because that was a
normal thing to do as per the professional standards or norms of institutional
behavior. What is “normal” need not be governed either by the dominance of
the institutions which define normality or by the discomfort caused to those
whose conduct gets questioned. No journal of ethnobotony refuses a publica-
tion because the content of the articles has not been shared with the knowledge
providers in their local language or because the sources of the information
have not been acknowledged as authors, or prior informed consent has not
been taken before putting the knowledge of the local communities in the public
domain. In Honey Bee, we have faced these problems squarely and have tried
to evolve norms which could be considered just as well as fair.
But, what we practise, even if imperfectly, is not yet the norm of the profes-
sion or social science research councils of European or developing countries.
A Ph.D. thesis will not be rejected in Germany or the USA because the student
did not get permission from the local communities and fulfilled other respon-
sibilities mentioned above. And yet, a certificate is signed to say that all due
acknowledgements have been made. How do we include or deal with the ac-
knowledgements which have not been made and thus not considered “due”?
The norms of justice can converge with norms of fairness if we grapple with
the problem of means and ends. In oral societies the legitimacy of oral tradition
exists and therefore, the values of certain kind matter more than others. Some
societies may be very unjust in their treatment of women, handicapped people,
or even minorities. However, the right to have one’s knowledge treated in a
fair and just manner is not divisible and subtractable. Therefore, one cannot
argue that a traditional healer convicted of murder has no right over his healing
knowledge because he has committed a murder. Several of his constitutional
rights may be superseded because of his offence. But, in my view, his knowl-
edge right will not be compromised.
novator who comes to know of it later may feel unfairly treated. In such a case,
the institution must have norms, which are flexible, friendly, and fair to those
who developed the innovation first but were not smart enough or lucky enough
to be noticed early or reach the NIF early.
In the case of traditional knowledge, a similar problem may arise. The same
plant may be used for somewhat similar purposes by many communities, not
all of whom may be able to reach us or be discovered by the NIF. The knowl-
edge of some communities may have been documented by scholars in the past
and published. These communities may have developed very valuable knowl-
edge but will be denied any recognition because scholars in the past published
their knowledge without their permission and in an unfair manner. This com-
munity is not at fault; but the ends of justice will be compromised if the novelty
in the innovation is not appreciated. Sometimes, an innovator has developed
a solution which some other individual or community in another part of the
world has discovered or developed earlier and independently. Should such a
person be given credit if it can be established that he may had no access to
international knowledge base and thus developed the knowledge de novo? If
the purpose is to promote creativity, originality, novelty, and an experimental
ethic, then the norms by which an arrangement is called just and fair will be
different than the case where the purpose is only to grant a patent.
Within the context of intellectual property rights, I have raised the follow-
ing issues, which involve similar dilemmas:
a. First to file versus first to invent: It is completely a just system if the pat-
ent office grants patents to an innovator who comes first. In the USA, the
first-to-invent system is followed; in most other countries, the first-to-file
system is followed. From a legal point of view, it makes sense. Now look
at the transaction cost for a small inventor or innovator who has developed
his or her innovation in a remote corner, away from the big cities and who
is unaware of the modern systems of protection. He does not have the
resources to hire the best attorneys and therefore cannot file an application
earlier than someone else who is more resourceful. He loses his rights.
Should we now accept the fairness of this system because it rewards re-
sourcefulness over resourcelessness? Is this the only way to address the
problem?
b. Lawful and rightful disclosure: Since 1993, SRISTI and I have argued
that every patent office must require each patent applicant to file an affida-
vit declaring that all the knowledge and/or resources used for making the
claims have been obtained, “lawfully” and “rightfully.” If India does not
have a law requiring prior informed consent of local communities/indi-
viduals, whose knowledge is collected by outsiders for any commercial or
96 Who Owns Knowledge?
Concluding Comments
I have argued in this paper that in many cases it is easier to be just than to be
fair. I am suggesting the need for developing a theory giving primacy to fair-
ness while ensuring justice. Sometimes, intragenerational fairness is a precon-
dition for ensuring intergenerational justice. If the children of local knowledge
Is a Just System also Fair? 97
experts do not have an incentive to keep the knowledge systems alive, then
the future generations will be deprived of access to a living laboratory of ex-
perimentation and creativity. A grave injustice to future generations will follow
because we could not develop norms of fairness in the current generation.
The asymmetry in rights and responsibilities is inevitable. None of us are
able to achieve the goals of complete justice and fairness in our personal lives.
We realize that, in our anxiety to be fair to different roles, we cause injustice to
some or the other stakeholders. These tradeoffs in everyday life perhaps make
us insensitive to the need of avoiding these tradeoffs in the larger society. We
can avoid this only at the cost of eventually becoming fair to each constituent.
I submit that knowledge asymmetries have provided the spur for social
dialogue, engagement, and encounter in society for centuries. The challenge
is to maintain the incentives for local expertise to evolve and grow without
legitimacy being granted to unfair means of overcoming the asymmetry. Local
knowledge, linked to place and time, invariably encompasses certain universal
values of compassion, creativity, and collaboration. I am not suggesting such
to be the case in every instance. I am only saying that the probability of such
a thing happening is higher when a knowledge production, consumption and
distribution system is linked to a place and the people inhabiting that place.
The institutional context of technological, cultural, and social knowledge
production therefore becomes extremely important. Those who produce knowl-
edge should take into account the values that increase the chances of putting
such knowledge to environment friendly and socially compatible use. I am
aware that social compatibility can sometime be a constraint rather than an op-
portunity. At such moments, an individual has to listen to the call of conscience
and decide. No major innovation would have taken place if compatibility with
the existing norms of society had been a precondition. At the same time, the
norms of social fairness and justice require that while developing knowledge
and institutions to manage it, we do not disregard the envelope in which the
message is communicated. The institutional envelope for technological and
social knowledge has to be calibrated so that it can contain a fair extent of
variety.
References
Britz, J. J. and T.A. Lipinski (2001) “Indigenous Knowledge: A moral reflection on cur-
rent legal concepts of IP.” Libri 51:234–246.
Humphrey, Nicholos (2006) “Introduction: Science Looks at Fairness.” Social Re-
search 73(2):345.
Rummel, R. J. (1981” Understanding Conflict and War. Vol 5. The Just Peace. Beverly
Hills, California: Sage Publications.
This Page
Intentionally
Left Blank
Part 2
Steve Fuller
101
102 Who Owns Knowledge?
The great advantage of Huber’s analysis is that it takes the idea of “risk
management” literally: Risk is managed by conferring a normative order on a
nebulous situation without eliminating the underlying epistemic sources of the
nebulousness. For Huber, following Luhmann, this is what the legal system
does more generally. Instead of creating new knowledge to overcome igno-
rance, the law restructures power relations so that society can systematically
address whatever hand reality deals it. It is worth observing, though, that this
analysis presupposes a rather sharp distinction between the “known” and the
“unknown.” This is required for the fiduciary relationship between the poli-
cymakers and the modellers of risky events to be set up in the first place. It
would be difficult to know who should be hired to model an impending flood
if track records were not treated as evidence for the possession of knowledge.
However, if we presume that nothing is ever definitively known, then risk man-
agement would focus more on regulatory mechanisms that would ensure the
regular monitoring of the scientific status of policy-relevant knowledge, even
if no errors have been formally identified or even suspected. In that case, rather
than focus on patent law as the model for risk management, as Huber does, one
might look to electoral law, or more precisely, constitutional law as applied to
the conduct of elections.
Marlin-Bennett is concerned with the normative basis for laws regulating
the production and distribution of science and technology, especially in an era
that perhaps too quickly treats the assignment of intellectual property rights as
the default strategy. A sign of just how bad Marlin-Bennett thinks things are is
evidenced by the metaphysical cast of her argument, drawing its terms of ref-
erence from the work of the late phenomenologist Emmanuel Lévinas, whose
influence has grown in recent years for arguing that care for “the other,” that
which is radically different from oneself, defines us as ethical beings. Espe-
cially in postmodernist circles, Lévinas is rapidly replacing the totemic status
accorded to his teacher Heidegger, many of whose views he shared but without
the teacher’s Nietzschean residues.
The relevance of all this to the global regulation of science and technology
may not be immediately apparent, and Marlin-Bennett largely abandons it in
the latter two-thirds of the paper. Nevertheless, her point of departure provides
an unusually specific understanding of “ethical obligation,” a concept normal-
ly invoked all too casually to counterbalance the undoubted inequities of the
global intellectual property regime. The one ambiguity in her presentation lies
in the institutional enforcer of this obligation. At first it seems it might be an
intergovernmental agency like the World Trade Organization, which already
tries to harmonize existing agreements between countries at various stages of
economic development. However, by the end of the chapter, she portrays the
problem as an instance of the more general problem of market failure, which
Introduction to Part 2 103
requires a strong state with the power to regulate the assignment of patents and
perhaps even the profits gained from them.
It is worth noting that Marlin-Bennett frames the need for a profound re-
thinking of the normative basis for the global regulation of science and tech-
nology by way of contrast with a rather stereotyped presentation of contempo-
rary political economy. She portrays all agents — states, firms, and individuals
— as ultimately self-interested in their actions. Moreover, “self-interest” is
understood narrowly to exclude the interests of others (i.e., no “win-win” sce-
narios), and interest itself is reduced to economic interest. Thus, even national
self-interest turns out to be little more than the promotion of the nation’s busi-
ness interests overseas.
Here Marlin-Bennett may have taken too seriously the pervasiveness of
the “market state” mentality promoted by neoliberal legal theorists like Philip
Bobbitt. Nevertheless, she leaves out an important part of the story of glo-
bal political economy that Bobbitt does not altogether ignore, namely, war
as a “normal” or “inevitable” feature of international competition that rivals
the market-based relations she privileges. In particular, economic nationalism
has historically included a strong commitment to welfare provision, including
research to improve citizen training and health. Behind these developments,
which have decisively influenced the course of science and technology, has
been a concern with ensuring the loyalty and fitness of otherwise class-divided
societies in times of war. Germany set the original precedent, which came to
full realization in the link between progressive domestic policies and aggres-
sive foreign policies, what Alvin Gouldner called the “welfare-warfare state,”
in 20th century America. I shall return to this point at the end.
At the same time, Marlin-Bennett portrays market theorists as generally
sanguine about the existence of sharp and persistent economic inequalities.
However, this superficially correct point overlooks the historic tendency of
the very same market theorists — from Adam Smith to Milton Friedman — to
regard the existence of monopolies as evidence of the blockage of free trade,
ultimately traceable to preferential government treatment for certain traders at
the expense of others. In other words, the complacency that Marlin-Bennett de-
tects in market theorists has stemmed from their belief, perhaps better founded
conceptually than empirically, that any inequalities in wealth are the products
of temporary trade imbalances that correct themselves in the long run. Indeed,
to someone like Joseph Schumpeter, the inherent volatility of markets, reflect-
ing the dual fickleness of nature’s supply and consumer demand, provides a
perpetual incentive to innovation. Such a liberating conception of markets,
arguably taken to grotesque extremes by the Austrian school of economics,
was meant in contrast to the state as a source of hereditary privilege or dictato-
rial prerogative.
104 Who Owns Knowledge?
do, moreover that humans know only he can do, and that even if those things
are risky they are likely to result in good. (By “risky” I mean that while God
can bring anything into being, and anticipate all the consequences of doing so,
it does not follow that he intends all of those consequences. Thus, God can
remain all-powerful, all-knowing, and all-good even if all the consequences of
his actions are not good because they are expressed in a finite material world,
in which there may be suboptimal aspects to the optimal solution to the prob-
lem of divine creation.)
The point of this theological excursus is that it provides the model for the
idea of philanthropy as developed in the Enlightenment and perfected by capi-
talists in the late 19th century, and which is still operative today in the likes
of Bill Gates and George Soros. However, the economic arguments do not go
entirely in its favor for two general reasons. First, philanthropy suffers from
something akin to market failure: Philanthropists tend to support either high-
profile causes, around which massive publicity campaigns have been mounted,
or causes somehow connected to their more pecuniary interests. Second, it
is not clear that outright gifts contribute to the recipient’s long-term welfare,
if they do not provide incentives for making such gifts less attractive to both
sides in the future. In other words, economically sensible magnanimity not
only avoids interdependency but is openly hostile to it. After all, the truly mag-
nanimous agent would wish the recipient to become similarly magnanimous,
which implies autonomous. And so, while the delivery of free drugs may make
for better headlines and immediately grateful beneficiaries, investment in a
developing country’s science and technology infrastructure would probably do
more to redress the underlying inequities.
But in the end, Marlin-Bennett may be right to suggest that state govern-
ments provide the only reliable correctives to the global market failures sur-
rounding science and technology today. But this is not because states have a
more generous view of humanity than markets. Rather, as mentioned above in
the case of economic nationalism, states — true to their medieval legal herit-
age — are corporate agents no less than firms. What differentiates them is that
states are in the business of producing citizens, as opposed to, say, industrial
goods. In that case, the sort of “free market” promoted by current global intel-
lectual property regimes inhibits the capacity of states to engage in this produc-
tive activity. It is interesting that, despite the general acceptance of their status
as corporate agents in international law, states generally couch their complaints
against other states and sometimes businesses in terms of the harms caused to
the people they already protect rather than those they are trying to produce.
However, a subtle shift in rhetoric of this sort might serve to strengthen the
state’s hand amidst the fluctuations in global knowledge governance.
This Page
Intentionally
Left Blank
4
Fundamental Ignorance in the
Regulation of Reactor Safety and
Flooding: Risks of Knowledge
Management in the Risk Society1
Michael Huber
1. Introduction
The problem of generating genuinely new knowledge is not new. Plato (1999)
described the fundamental knowledge dilemma in the Meno dialogue, where
he showed that to discover novelty people can neither search for what they
already know nor what they do not know. It does not make sense to search for
the new by looking for already known things. But it is equally useless to search
for the unknown as people cannot know what they should look for. In case they
find new things, they are not able to realize it.
Although this knowledge dilemma is irresolvable, numerous suggestions to
practically overcome it have been developed. Socrates referred to the innate,
eternal soul that through its numerous rebirths accumulated all knowledge
imaginable. Michael Polanyi (1973) secularized this view when he claimed
that “tacit knowledge” anticipates new knowledge, that is, novelty is latently
existent in the already known. Jean Piaget (1972) emphasized a dialectical
learning process, where individuals attempt to be in cognitive balance with
their environment by constructing stable frames that prevail over the volatility
of reality. In a double process, variations in signals from their environment are
absorbed, that is, individuals adapt their cognitive frame to their current under-
standing of the world. In cases where there are significant differences between
worldview and empirical experience, however, the frame no longer adapts but
instead assimilates these discrepancies by modifying itself. Max Miller (1986)
suggested that individuals learn through dialogical rather than monological
processes. They learn not by individual reasoning but in a collective process
1 I am greatly indebted to Henry Rothstein (LSE) for his comments on the previous
drafts of this chapter.
107
108 Who Owns Knowledge?
through argumentation and discursive rigor, exposing their ideas and reason to
the scrutiny of others.
If learning is a collective process, new obstacles emerge. For example, in-
dividual learning is constrained by intelligence, but not by external limitations
to learning. Policy makers, however, are exposed to challenges such as a fun-
damental ignorance or unspecific non-knowledge (Japp, 1997) where nobody
knows how to know what ought to be known. Brian Wynne (1996) has drawn
attention to these unmanageable and unknowable situations — or “unknown
unknowns” — that occur when policymakers neither know what is likely to
result from their actions nor even know what they don’t know.2 Moreover,
policymakers cannot just wait until a problem is visible, but often they have
to anticipate problems. Wynne has used thalidomide as one example of failing
to anticipate new knowledge, which was used in the 1950s as a treatment for
morning sickness but was only discovered later to have teratogenic effects.
Wynne has also used the example of chlorofluorocarbons (CFCs) which were
introduced as a path-breaking invention for cooling and air-conditioning, but
only later in the 1970s were found to deplete the ozone layer. Drawing on such
examples, Wynne has criticized the unpreparedness of policymakers and the
narrow-mindedness of scientists in such cases and has suggested addressing
such ignorance by recourse to “better” knowledge in the form of lay knowl-
edge.
From an economic perspective, however, gaining better knowledge is de-
pendent on the distribution of property rights. Lack of property rights can hin-
der the generation of new knowledge, as one has to have access to current
knowledge in order to generate new knowledge. Similarly, lack of property
rights can also constrain the generation of new knowledge because of weak
economic incentives. Why should firms invest in new knowledge that is con-
sidered a collective good? In contrast to learning theory perspectives, there-
fore, the knowledge dilemma is not addressed through alternative or better
knowledge, but through institutions in the form of patents that balance eco-
nomic constraints and societal needs. The knowledge dilemma is not solved by
new knowledge, but by new institutions that control the use of knowledge.
The generation of new knowledge can also be constrained by its own risks;
a characteristic of Beck’s Risk Society (1992). In the Risk Society, new risks
transgress traditional social and natural boundaries and, potentially, pose risks
to people that are of a different scale and quality to those of previous eras.
From this perspective, risk is an inevitable and, indeed, necessary companion
of gaining new knowledge. As the saying goes in the aviation industry, a plane
is safe only after two crashes. But in some industries, such as nuclear power,
biotechnology or space technology, two “crashes” are difficult to tolerate, po-
2 See e.g. http://www.niesr.ac.uk/event/wynne.htm
Risks of Knowledge Management in the Risk Society 109
2. Nuclear Power3
sponse to the high costs generated by safety measures. This risk revolution can
be divided in two main steps. Initially, probabilistic risk assessment was intro-
duced to reinterpret the deterministic MCA concept; that is, it did not cover
the entire reactor system, but only the hypothetical event of a MCA. The MCA
was identified not by probabilistic analysis, but by (deterministic and often
arbitrary) decisions. That approach could be labelled probabilistic determin-
ism and led to considerable conflict, because risk assessment had proved to be
notoriously unsuccessful in predicting problems of existing power production
technologies.7 Its introduction for nuclear power was, therefore, even more
controversial. However, risk assessment was introduced less for accuracy than
as a substitute for reality. It was successful in so far as it identified only negli-
gible risks and confirmed the path of technology development and regulation.
As the bottom line, risk assessments confirmed the high level of reactor safety
in all LWRs. It also indicated efficiency gains by attaching low probabilities
to selected events. Moreover, it introduced a new profession into the debate,
namely risk analysts. Only at a later stage was a fully fledged probabilistic ap-
proach introduced.
The probabilistic revolution shaped regulatory strategies. As it was too
dangerous to test the effects of nuclear radiation in vivo, and so gain reliable
and relevant practical knowledge, the probabilistic predictions were tested in
terms of legal feasibility and reliability. Thus, the law was concerned not only
with the setting of standards, guidelines, and regulations, but also provided the
arena to settle scientific disagreements about reactor safety. Final decisions
about the nuclear uncertainty were taken in court, turning them into political,
economic, and sometimes legal liabilities. This, however, added to uncertain-
ties rather than resolved them. For example, in Germany two identical reac-
tors were subject to very different licensing decisions when one court opted
for reactor containments on the grounds that the residual risks should never
be greater than risks of a conventional accident, while in an other decision,
based on the same “evidence,” another court decided that containment was
not necessary on the grounds that the probability of a nuclear accident was too
low to necessitate preventative actions. The legal decisions were based on the
same findings, but differences in legal interpretations led to opposite decisions
(Huber, 1998:175ff). The decision to transform uncertainty into certainty was
7 The probabilistic approach was mainly challenged on methodological grounds.
Firstly, it is emphasized that predictions on reactor safety are based on a narrow
sample. Secondly, probabilistic analysis is developed in the context of space tech-
nology where long-term loads did play a negligible role. The method seems ill
suited for nuclear power. Thirdly, nuclear reactors are not standardized but each
plant is adapted to the current state of scientific and technological development,
specific environmental and political conditions establishing a fundamental chal-
lenge to an instrument based on statistical data.
Risks of Knowledge Management in the Risk Society 113
itself a source of risk and failure. The legal process turned hypothetical events
into acceptable aspects of regulation. At the same time, these decisions shifted
the general attention towards liability claims and political trust and away from
safety.
The Chernobyl accident of 1986, however, dramatically changed attitudes
towards nuclear safety. Even through it was frequently argued that Chernobyl
had little in common with western LWRs, the accident changed the way in
which nuclear power was viewed. It was not so much the likelihood of it hap-
pening to western LWRs, but a matter of public perception and potential politi-
cal liabilities (Huber, 1998:174). Policy shifted towards a strictly preventative
strategy and no nuclear power plant has been licensed in Europe or the USA
since.8 The Chernobyl accidents led to a fundamentally different assessment of
safety risks. However, little new and relevant knowledge was accumulated; the
novelty emerged after the Chernobyl accident from institutional arrangements
and general public convictions (Liberatore, 1999). For example, fundamental
changes occurred such as the establishment of a new regulatory agency. Expert
groups, previously responsible for risk assessments, were mistrusted and lost
political influence. But also conceptual changes could be observed; preventa-
tive concepts such as the “precautionary principle” found more resonance in
the previously hostile state institutions.
In summary, nuclear power was initially regarded as a routine development
of steam power plants that required only routine attention. It was not the acute
awareness of dangers that had an effect on safety concerns, but regulatory rou-
tine that led to unobtainable safety requirements. The emerging concern was
resolved by introducing hypothetical events. They better prepared policymak-
ers. But new problems emerge from this solution and new risks such as human
failure emerge.
3. Flooding9
The second case is that of flooding, which is a well-known and familiar haz-
ard (e.g. Green, 1997). Flooding is common and flood risks have, therefore,
always been assessed in great detail. But flooding has taken on a new signifi-
cance since climate change has led policymakers to fear the enormous costs of
compensation and reconstruction. This general concern is linked to dramatic
events such as the floods in 1998 and 2000 in the UK; the summer floods of
2002 in Germany, Austria and the Czech Republic, or floods in China, the
8 Recently, and under the impression of climate change, nuclear power is viewed as
the alternative form of energy production and new plants are to be licensed soon.
9 This section is based on Faure and Hartlief (2005), Crichton (2003) and Huber
(2004).
114 Who Owns Knowledge?
USA or France; and to the increasing loss of insured values. In the 1998 flood,
insured costs were estimated for the first time to be beyond £1 billion (= €1.5
billion) and only four years later in Germany the losses reached about €10
billion. These enormous losses, together with the expectation of even higher
frequencies of flooding in the near future, had to be managed by institutions of
emergency aid and insurance, which were unprepared for the challenge (e.g.
Huber, 2004).
Historically, flood mapping and modelling has been a central tool in flood
management and can be traced back to ancient times; detailed maps of the
periodic Nile floods were made 3500 years ago. The science of flood predic-
tion has improved over the years, but improvements in knowledge have been
accompanied by greater awareness of uncertainties. For example, the British
Environment Agency (EA) invested considerable resources in the improve-
ment of a flood database and insurance firms, which held a large share of flood
risks in their portfolio, supported that strategy. Industry and the EA improved
knowledge in different directions however. In 2003, for example, the EA stated
that flood maps,
indicate where flooding from rivers, streams, watercourses or the sea is possible.
However, the maps do not show flood defences, which offer vital protection in many
areas, and hence the maps do not indicate the degree of flood risk to land or prop-
erty. (EA, 2003; emphasis added)
The immediate practical use of these flood maps was limited as the EA applied
a concept of a purely “natural” flood. Not surprisingly, the insurance industry
considered predictions from this model to be misleading as,
homeowners who were unharmed by the widespread flooding of 2000 are neverthe-
less set to be classed as high–risk under Environment Agency ratings. . . . The data set,
delivered earlier this year, groups houses by postcode area and has been criticised
by insurers for lack of sensitivity to the factors that affect flooding. (Datamonitor,
9.05.2003; emphasis added; source: www.datamonitor.com)
If properties without claim history, that is, without historical evidence for flood
damage, were considered “high-risk,” the insurance industry had to develop
competing flood maps in order to assess their overall portfolio and potential
future risks. That has led to further improvements of the EA maps, but they are
still insufficient, as “not all defences are shown yet; only defences built in the
last five years to a certain standard are currently shown. More will be added
as part of the updating process” (EA, 2004).10 Such inductive approaches have
4. Analysis
Differences between the cases of nuclear safety and flooding complicate their
comparison. First, in the context of the “risk society,” nuclear technology is a
new risk, while flooding is an old one. Second, reactor safety is a man-made
problem while flooding is seen as a natural hazard, although climate change
and changed land management practices might suggest otherwise. Third, the
range of regulatory interventions depends on the geographical effects of these
hazards. While nuclear accidents pollute entire continents with radioactive
fall-out, flooding is more confined in its effects. Fourth, and closely related
to the third point, the cases differ in terms of their visibility. Nuclear power is
the paradigmatic case of the “risk society” that has gained global, long-term
visibility. Comparatively, even exposed people forget floods within two years
(Kunreuther, 1978). And last, but not least, the nuclear issue is dealt with in an
institutional setting dominated by political and public input while flooding is
— if at all — largely managed by private actors.
Despite these, and other, differences, both cases surprisingly converge in
their practical solution to manage uncertainty. They apply a probabilistic ap-
Risks of Knowledge Management in the Risk Society 117
proach, divide problems into manageable portions and arrange them around
hypothetical events. Aspects of manageability and blame shifting are central
for the strategies of knowledge management. Policymaking is driven less by
the problem of complementary or competing knowledge, and rather more by
the problem of managing the political, organizational, or, more generally, in-
stitutional dimensions of knowledge. And institutional risks emerge as central
to policymaking, that is, threats to regulatory institutions and/or the legitimacy
of associated rules and methods of regulation. The risks of risk management
determine policymaking.
4.1 Internalization
to foresee rare but costly events or to have enough specificity to deal with
individual cases to a sufficient degree of precision. Maps also ignore issues of
regional or local vulnerability, political preparedness and tell little about the
social distribution of impacts. The MCA similarly proved to be inaccurate in
its predictions and contributed little to safety. The lack of accuracy is docu-
mented by important cases such as Chernobyl or Three Miles Island where
neither the causes nor the actual process was predicted correctly (see Perrow,
1984).
Nevertheless, the use of the MCA was politically useful, as it protected poli-
cymakers against the accusation of inactivity or mismanagement as document-
ed by the National Audit Organisation for the UK floods of 1998 (NAO, 2001).
This holds true as long as real accidents do not occur. The inadequate manage-
ment of societal risks creates conditions for the rise of explicit institutional
risk management. Recognizing residual failures necessitates — under condi-
tions of visibility and accountability — the introduction of more systematized
institutional risk assessment and management methods as organizations seek
to defend the legitimacy of decision-making procedures. Institutional risks can
become a category for control in their own right. In the nuclear case, disagree-
ments about the interpretation of probabilities in court led to legal risks for
operators. Instead of safety risks, the risk of diverging legal interpretations
emerged that was illustrated by the two opposing decisions on the introduction
of containments for nuclear reactors. The institutional focus fed back into the
perception and management of societal risks. Regulators may be sensitized to
new or different dimensions of the risk for which they could be held account-
able. The human factor risk in the nuclear power debate was an enlightening
example that led to more research, greater professionalization, more robust
evidence-based decision making, and associated regulation. It also showed that
changing the perspective on the nuclear issue did not necessarily provide more
safety.
Generally, where the management of societal and institutional risks are not
aligned, there might be organizational pressures to prioritize the management
of institutional risks at the expense of societal risks. Blame-avoidance behavior
at the expense of delivering core business is a well-documented organizational
rationality (e.g. Hood, 2002). Regulators focus on managing the institutional
risks of not meeting performance targets or fulfilling legal duties at the expense
of efficiently managing societal risks. Internalization shifted attention and al-
tered the perception of societal risks,12 the tools that enable policymakers to
internalize risks and drive the spiralling logic of risk management should be
discussed in more detail.
ever, these strategies orient policymaking away from external events such as
flooding or nuclear accidents and towards internal political substitutes and
their management (Rothstein et al., 2006).13
4.2.2. Hypothetical events. Hypothetical events provided another possibil-
ity to flexibly adapt the management of non-knowledge to managerial needs.
It was argued that hypothetical events emerge from experiments, where poli-
cymakers locally reduce the complexity of decision making by establishing
conditions of temporary and geographical limitations from which they attempt
to learn for implementation under normal conditions (e.g. Lezaun and Millo,
2005). Experiments can enrich the fragmented and limited history surround-
ing the known case in question. March et al. (1996) have suggested extracting
more information from the few cases by “treating unique historical incidents
as detailed stories rather than single data points” (March et al., 1996:2). They
also recommend “focusing intensively on critical incidents” as they change the
world “they are branching points of historical development,” and they “change
what is believed about the world.” Hypothetical events should grow out of
these thought experiments and analyses.
Actual regulations, however, were never based on the enriched history of
a few relevant and “available” events. Radkau remarks on the introduction of
the MCA:
The MCA and its German equivalent, the GAU [größter anzunehmender Unfall,
M.H.] were and remained an arbitrarily introduced maximal accident: there is no
evidence that its definition was based on real accidents or that it was developed fur-
ther on basis of the growing experience with nuclear incidents. (Radkau, 1983:358)
A credible accident should not be confused with the maximal accident. Defining
the MCA as a break of cooling pipes is a choice driven by managerial needs
rather than knowledge about reactors. Other causes like the nuclear meltdown
or the destruction of containments were systematically excluded from fur-
ther safety analysis. It is a result of “interpretative flexibility” as was empha-
sized by a report of K.E. Zimen from the Hahn-Meitner Institute in Berlin
(Germany) stating that it is not objective, but dependent on subjective factors,
“Only the maximal accident, (i.e., the immediate release of all nuclear material
into the atmosphere as a radioactive cloud above the reactor) can be described
objectively” (see Radkau, 1983:358f.). Under the conditions of a maximal ac-
cident, the report continues, nuclear power would have to be banned at all
locations. The MCA can therefore be read as a concession for engineers and
policymakers. The Maximal Credible Accident was not driven by competing
13 Similar observations have been made for the management of flooding by political
settings (Huber, 2006).
Risks of Knowledge Management in the Risk Society 121
5. Concluding Remarks
14 The MCA was also a strategy of institutional adaptation that reinforced the deci-
sion taken: It put new professions in charge, required complex institutional ar-
rangements and controlled and regulated the technological development.
15 Contrary to this unsurprised response from experts, flooding has been attributed a
new feature that surprised influential actors (e.g. SwissRe, 1998) but — as empiri-
cal studies indicate (e.g. NAO, 2001) — here it is the general public that remains
largely unsurprised.
122 Who Owns Knowledge?
References
Association of British Insurers (2000) Inland Flooding Risk – Issues Facing the Insur-
ance Industry. London: Association of British Insurers (Research Report Nr. 10).
Baldwin, R. and M. Cave (1999) Understanding Regulation. Theory, Strategy and
Practice. Oxford: Oxford University Press.
Bateson, G. (1972) Steps to an Ecology of Mind. New York: Chandler.
Beck, U. (1992) Risk Society. London: Polity Press.
Crichton, D. (1999) “The Risk Triangle.” In J. Ingleton, ed., Natural Disaster Manage-
ment. London: Tudor Rose.
———(2003) Flood Insurance in England and Wales: Are there Lessons to be Learned
from Scotland? London: Benfield Greig Hazard Research Centre, Technical Pa-
pers 1.
Durand, I. (2006) “Belgium.” In M. Faure and T. Hartlief, eds., Financial Compensa-
tion for Victims of Catastrophes: A Comparative Legal Approach. New York and
Berlin: De Gruyter
Environment Agency [EA] (1997) Policy and Practice for the Protection of Flood
Plains. Bristol: Environment Agency.
——— (1998) Environment Agency Response to the Independent Report on the Easter
1998 Floods. London: Environment Agency.
———(2003) Indicative Flood Maps (http://www.environment-agency.gov.uk)
Faure, M. and T. Hartlief, eds. (2006a) Financial Compensation for Victims of Catas-
trophes: A Comparative Legal Approach. New York and Berlin: De Gruyter.
——— (2006b) “The Netherlands.” In M. Faure and T. Hartlief, eds., Financial Com-
pensation for Victims of Catastrophes: A Comparative Legal Approach. New York
and Berlin: De Gruyter.
Gratt, L.B. (1987) “Risk Analysis or Risk Assessment: A Proposal for Consistent Defi-
nitions.” In V. Covello and L. Lave, eds., Uncertainty in Risk Assessment, Risk
Management and Decision Making. New York
Green, J. (1997) Risk and Misfortune: A Social Construction of Accidents. London:
UCL Press.
Heising, C.D. and V.P. George (1986) “Nuclear Financial Risk – Economy Wide Costs
of Reactor Accidents.” Energy Policy 14(1).
Hood, C. (2002) “The Risk Game and the Blame Game.” Government and Opposition
37(1).
Hood C., H. Rothstein, and R. Baldwin (2001) The Government of Risk. Oxford: Ox-
ford University Press.
Hood, C. and H. Rothstein (2001) “Risk Regulation under Pressure: Problem Solving
or Blame Shifting?” Administration and Society 33(1).
Huber, M. (1998) Das regulative Netzwerk. Frankfurt /Main: Lang.
——— (2004) “Risk Management, Insurability and Regulatory Reform: Is the English
Flood Insurance Regime able to Adapt to Climate Change? The Geneva Papers on
Risk and Insurance 29(2) (April).
———(2006) Risk, Flood and Flood Risk. London (Manuscript).
Huber, M. and T. Amodu (2006) “The UK.” In M. Faure and T. Hartlief, eds., Financial
Compensation for Victims of Catastrophes: A Comparative Legal Approach. New
York and Berlin: De Gruyter.
Japp, K.P. (1997) “Zur Beobachtung von Nicht-Wissen.” Soziale Systeme 2.
Kunreuther, H. (1978) Disaster Insurance Protection: Public Policy Lessons. New
York: Wiley.
Lezaun, J. and Y. Millo (2005) Regulatory Experiments: Putting GM Crops and Finan-
cial Markets on Trial. London: CARR Discussion Paper Nr. 30.
Liberatore, A. (1999) The Management of Uncertainty: Learning from Chernobyl. Am-
sterdam: Gordon and Breach.
Luhmann, N. (1993) “Die Paradoxie des Entscheidens.” Verwaltungsarchiv. Zeitschrift
für Verwaltungslehre, Verwaltungsrecht und Verwaltungspolitik 84(3).
———(2000) Die Politik der Gesellschaft. Frankfurt / Main: Suhrkamp
Mackenzie, D. (2003) “Long-Term Capital Management and the Sociology of Arbi-
trage.” Economy and Society 32(3).
124 Who Owns Knowledge?
March, J.G., L.S. Sproull, and M. Tamuz (1996) “Learning from Samples of One or
Fewer.” In M.D. Cohen and L.S. Sproull, eds., Organizational Learning. Thou-
sand Oaks, CA: Sage.
Miller, M. (1986) Kollektive Lernprozesse. Frankfurt/Main: Suhrkamp.
Moreteau, O., M. Cannarsa, and F. Lafay (2006) “France.” In M. Faure and T. Hartlief,
eds., Financial Compensation for Victims of Catastrophes: A Comparative Legal
Approach. New York and Berlin: De Gruyter.
National Audit Organisation (2001) Inland Flood Defence. London: Report by the Con-
troller and Auditor General HC 299 Session 2000-2001: 15 March 2001.
Perrow, C. (1984) Normal Accidents. New York: Basic Books.
Piaget, J. (1972) The Principle of Genetic Epistemology. London: Routledge and Kegan
Paul.
Plato (1999) “Meno (Menon).” In The Great Dialogues of Plato, trans. W.H.D. Rouse.
New York: Penguin.
Polanyi, M. (1973) Personal Knowledge: Towards a Post-Critical Philosophy. London:
Routledge and Kegan Paul.
Radkau, J. (1983) Aufstieg und Krise der deutschen Atomwirtschaft. 1945-1975. Ver-
drängte Alternativen in der Kerntechnik und der Ursprung der nuklearen Kontro-
verse. Frankfurt: Fischer.
Rothstein, H., M. Huber, and G. Gaskell (2006) “A Theory of Risk Colonisation: The
Spiralling Logics of Societal and Institutional Risk.” Economy and Society 35(1).
Reactor Safety Commission [RSK] (1986) Bewertung der Ergebnisse der Expertenta-
gung über den Unfall im Kernkraftwerk Tschernobyl und weitere RSK Beratungen.
Cologne: 216 Session on 15 October 1986.
SwissRe (1998) Climate Research does not Remove the Uncertainty: Coping with Risks
of Climate Change. Zurich: SwissRe (www.swissre.com).
Thyssen, O. (2004) “Luhmann and Epistemology.” Cybernetics and Human Knowing
11(1).
Van den Daele, W. (1993) “Restriktive oder konstruktive Technologiepolitik.” In W.
Krohn and G. Krücken, eds., Riskante Technologien: Reflexion und Regulation.
Frankfurt/Main: Suhrkamp.
Vaughn, D. (1999) “The Dark Side of Organizations: Mistake, Misconduct and Disas-
ter.” In Annual Review of Sociology 25.
Wildavsky, A. (1993) “Die Suche nach der fehlerlosen Risikominderungsstrategie.” In
W. Krohn and G. Krücken, eds., Riskante Technologien: Reflexion und Regulation.
Frankfurt/Main: Suhrkamp.
Wynne, B. (1996) “May the Sheep Safely Graze? A Reflexive View on the Expert-lay
Knowledge Divide.” In S. Lash, B. Szerszynski, and B. Wynne, eds., Risk, Envi-
ronment and Modernity: Towards a New Ecology. London: Sage.
5
Scientific knowledge has the potential of improving lives. New drugs, new
plant varieties, a better understanding of the natural world, and new technolo-
gies can have a transformative effect on the lives of those who have access
to the products of scientific research. Access, however, is not available to
all. What are the ethical obligations of global society for producing scientific
knowledge, disseminating it, allowing it to be used, and controlling it? Do
economic, legal, and political structures hinder or enable our ability to fulfill
these obligations? In this paper, I explore these questions, focusing on how
the spread of liberalized markets has led to changes in the way research is
funded and directed, as well as in the way the resulting knowledge is owned
or controlled. The practice of scientific research bumps up against conflict-
ing and complementary interests of the public (the epistemic communities of
scientists, the national publics, and a poorly defined global public), firms, and
states. I examine the conduct of scientific research, focusing on agricultural
research and commenting on the interplay of public and proprietary interests. I
adopt a critical international political economy approach and place these con-
cerns within a normative context in which members of the global community
have an ethical obligation to care for each other. Changing legal, economic,
and political structures challenge our ability to fulfill this obligation, especially
with respect to the production, dissemination, and use of scientific knowledge
for the betterment of human lives.
At the heart of this paper is a normative claim: A communal goal of an
ethical global society ought to be the production and diffusion of scientific
knowledge that addresses key problems that people (particularly vulnerable
1 Paper presented at the conference, “Can Knowledge Be Made Just,” Center for
Advanced Cultural Studies, Essen, Germany, March 21–23, 2005. I thank the par-
ticipants in that conference (especially Steve Fuller and J. Rogers Hollingsworth)
and Marc Cohen for their helpful criticism. An earlier version of this paper was pre-
sented to the 2004 International Studies Association Meeting, Montreal, Canada.
125
126 Who Owns Knowledge?
people) face. In the next section, I develop this claim by drawing on the work
of philosopher Emmanuel Lévinas, as well as that of theorists of international
political economy. I argue for a global communal obligation to make scientific
knowledge available to those who need it, balanced with a realization of the
pragmatic requirement that people need incentives to innovate and must be
justly compensated for their scientific work. The second section examines how
the attractiveness of patents within a market economy challenges our ability
to uphold this ethical obligation. The third section uses the example of agri-
cultural research to further probe the argument, and the conclusion highlights
possible means of introducing ethical correctives to current trends.
We use theory to make sense of the organization of the global political econ-
omy. When a theory is widely accepted — as standard economic nationalist
and liberal theories are — we tend not to focus our attention on the implicit
ethics bound up with the theory. This is particularly so when the theory is
not explicitly normative. Nevertheless, all theories come with normative and
causal assumptions; and causes and norms together inform the hidden ethics
of the theories. Mainstream theorists of either an economic nationalist or lib-
eral bent start from either Alexander Hamilton’s economic nationalism in the
Report on Manufactures (1791) or Adam Smith’s liberalism in The Wealth of
Nations ([1776] 1993). Economic nationalists assume that states remain the
most important actors in the global political economy, and that their goal is to
further their own interests in accumulating power, including wealth (Gilpin,
2001). State policies on matters relevant to the production and commercializa-
tion of new scientific knowledge, according to this theoretical approach, will
be designed to favor the increased competitiveness of a country’s firms relative
to other countries. Liberal theories de-emphasize the state and focus on firms’
self-interested efforts to increase their competitiveness. The role of the state
is to provide the legal superstructure in which competitive, open markets can
operate (Moravcsik, 1997).
Despite the differences in these two approaches to political economy, they
share the foundational normative assumption that it is good (or at least not
Science in Whose Interest? 127
bad) that agents are self-interested. For economic nationalists, the state is the
self-interested agent; for liberals, the individual or the firm (a legal person)
fills that role. This is viewed as natural, the way things are. Cooperation hap-
pens when the interests of one agent can be manipulated to be consistent with
the interests of another. Theories of international regimes (Krasner, 1983; Ritt-
berger, 1993) provide an institutionalist explanation of how such cooperation
and shifting of interests can come to be. Once rules are established and the
various agents have a reasonably strong expectation that the others in the re-
gime will generally play by the rules, cooperation can lead to better outcomes.
Depending on the particular rendition of regimes theory, a hegemonic leader
may be required to establish the regime, or, alternatively, like-minded coun-
tries may simply choose to commit to sets of rules. Any required changes in
behavior stem, in this rendering of state or human motivation, from the desire
to maximize one’s utility, at least in the long run. These standard theories of
political economy pay little attention to the moral obligations and affective
commitments that knit societies together and in which markets are enmeshed
(Etzioni, 1988).
For economic nationalism and liberalism, a default assumption, which has
both causal and normative implications, is that the market is “normal” or “in-
evitable.” Karl Polanyi, however, eloquently debunked that myth (Polanyi,
[1944, 1957] 2001). The market economy that is today worldwide in its reach
is the result of a series of human interventions in social relations that trans-
formed the feudal economy of Europe into the industrial market economy of
19th and 20th centuries (Polanyi, [1944, 1957] 2001; Hollingsworth and Boy-
er, 1997; Fuller, 2004). Moreover, the way the market assigns value to various
factors of production, including human capital, is infused with normativity:
Simply saying that this is better than or worth more than that is to judge the
relative worth of the thing. Even more revealing of the ethical values underly-
ing markets is the acceptance of inequality, that it is OK for some people to be
richer than others. (These norms are not necessarily wrong. They are, however,
necessarily normative.)
world (and, of course, we have limited time, limited means, and infinite obliga-
tions) we must judge justly among competing obligations and act accordingly.
In this section, I develop this conclusion from Lévinas’s reasoning.
Lévinas first would question the assumption of liberals and economic na-
tionalists that self-interest is ontologically predetermined. Economic national-
ism and liberalism both assume that agents are self-interested because they are
agents. It’s tautological: To be an agent is to be self-interested. This assump-
tion, which is consistent with both Hobbesian and Utilitarian worldviews, is
deeply rooted in Western political philosophy.
As a definition, this assumption posits self-interest as a component of being.
Emmanuel Lévinas counters this and makes three radical arguments:
1. that ethics are prior to ontology (in other words, that people have ethical
responsibilities before they are);
2. that ethical obligation is toward someone (in other words, that obligations
are realized in relationships); and
3. that, therefore, an Agent can be only in relation to an Other, a person who
is irreducibly different from the Agent.
“Ontology,” Lévinas argues, “is the essence of every relation with beings and
even of every relation in being” (Lévinas, [1951] 1996).
Lévinas thus rejects the expectation, implicit in standard political theories,
that individuals (and therefore states) can be understood as discrete (unitary)
actors.2 He posits, as David Campbell explains, that “being is a radically in-
terdependent condition” (Campbell, 1999). The consequence of this interde-
pendence that derives from the recognition of the Other is a boundless re-
sponsibility for the well-being of the other: “The I before the Other (Autrui) is
infinitely responsible” (Lévinas, [1964] 1996). Furthermore, in recognizing the
irreducible difference of the Other, the Agent also recognizes a “trace” of the
transcendent: of God (if you are theologically inclined) or of the transcendent
metareality that links all humans in the most fundamental, initial element of
our humanity. In seeing an Other, we recognize the divine trace within him or
her, and recognize, ourselves, the inescapable and infinite responsibility we
have toward the Other. Because, for Lévinas, the act of seeing an Other, and
through the Other, the trace of the transcendent metareality is more fundamen-
tal than the recognition of oneself and one’s self-interest, self-interest cannot
be the most fundamental ordering principle of our lives. Lévinas defines the
2 To be fair, realism and its variants (including neorealism and economic national-
ism) see states in relation to each other. Each state seeks to increase its relative
power. The underlying assumption, however, is that each state is self-interested,
seeking to improve its position. Lévinas sees a more highly interconnected world
of relations and concern for the other rather than only the self.
Science in Whose Interest? 129
ethical responsibility of people in terms of regard for the other. This stands in
stark opposition to liberalism and realism which both signal the ethical accept-
ability of and the expectation of self-interest.
But ethics, for Lévinas, is “beyond being.” It exists in transcendence or in
infinity — a metaphysical reality. In the real world, our “proximity” to others
— the fact that we do, indeed, have to live in the world and interact with real
people in real time — requires justice. Laws and systems of justice represent
the compromises that humans make in order to uphold at least some small
fraction of the responsibility each of us has. Responsibility for every Other
requires “disinterestedness,” so that “the justice that compares, assembles, and
conceives, the synchrony of being and peace, takes form” (Lévinas, [1974]
1996).3 Lévinas’s formulation of ethics, which at first seems to not be opera-
tionalizable in the real world, is brought back to earth through justice.
But, some may ask, isn’t this Lévinisian philosophy simply utopian, and
wasn’t that approach largely discredited as hopelessly naive? I would answer
that empirical evidence of other-interested behavior, even in the midst of self-
interested behavior, provides a powerful counter to the pessimistic naysayers.
To say that we are responsible for others does not mean that we always act on
our responsibility. But that we sometimes do, and that, perhaps more compel-
lingly, we recognize the trace of the infinite that calls us to such ethical action
is even more conclusive. It is not an accident that people, throughout history,
have turned to religion to articulate ethical obligations. Given the pervasive
and persistent nature of human beings’ concern with religious (and secular)
ethics, it seems reasonable to turn a Lévinisian lens on events and provide a
meaningful context in which to view them. Furthermore, in empirical terms,
we see that people do not always act in a self-interested way. Fundamental
human compassion and care for others was most recently seen in the outpour-
ing of charitable contributions for victims of the December 26, 2004 tsunami.
Given this and other quotidian experiences of interest in others, it seems to me
to be unreasonable to assume that a theory of political economy grounded in
expectations of self-interested action is wholly realistic.
Another argument that might be raised is that ascribing to an institution
— the state — the ethical and ontological standing of an individual is logically
fallacious. To this criticism I would say that while states are the institutional
structures through which people act in international relations — people aggre-
gate their interests, create laws and policies, implement them, etc. through the
state — it is people who act. If each individual person has an ethical obligation
3 Here Lévinas’s approach seems consistent with Derek Parfit’s reasoning. Parfit ar-
gues that “our reasons for acting should become more impersonal. Greater imper-
sonality may seem threatening. But it would often be better for everyone” (Parfit,
1984).
130 Who Owns Knowledge?
moral situations are defined not in terms of [justice oriented] rights and responsi-
bilities but in terms of relationships. The morally mature person understands the
balance between caring for the self and caring for others. . . . Moral problems can be
expressed in terms of accommodating the needs of the self and of others, of balanc-
ing competition and cooperation, and of maintaining the social web of relations in
which one finds oneself. (Tronto, 1987)
4 Lévinas writes only indirectly of states. His concern was with the individual “I” in
relation to the Other. I thank Jacob Schiff for reminding me of this.
Science in Whose Interest? 131
What does this requirement that human beings care for each other have to
do with the production, distribution, use, and control of scientific knowledge?
Knowledge of all kinds, Nico Stehr argues, is inextricably tied to social inequal-
ity, given the nature of society in the post-industrial age. He further suggests
that the power of knowledge can be understood as a “bundle of competencies”
(Stehr, 1999). Who is advantaged and who is disadvantaged depends on indi-
viduals’ relative abilities to use these competencies. Consequently, knowledge
is of concern to ethics because I am responsible for the social inequality of the
Other. Of the various forms of knowledge, applied scientific knowledge, in
particular, has enormous power to stratify humans beings because of its poten-
tial uses to improve the material circumstances of people’s lives.
But even the most basic, curiosity-inspired research has wide-ranging social
value. Basic scientific research is concerned with uncovering laws of nature
that are fundamental properties of the universe, a universe that all beings in-
habit equally. A deeply human characteristic is curiosity about the universe
(Bronk, 1949), and it is this human curiosity that motivates “the asking and
answering of questions about Nature” (Collins, 1983). Thus, all of humanity
has a shared interest in knowing about the universe, given our shared living
within it. Moreover, since scientific research can not be conducted without ma-
terial resources provided by at least one human source (a patron, a government,
a firm), at least one person has created the conditions under which scientific
research is possible. And, since those resources can not be obtained outside
of society, society as a whole has contributed to the creation of new scientific
knowledge. Society, then, has a right to learn about the new knowledge. The
Other’s well-being is enhanced — curiosity satisfied — when I provide scien-
tific knowledge to him or her, or when I create conditions that allow the Other
to engage in research.
More salient from the standpoint of ethical obligations, though, is applied
scientific knowledge and technological innovation. A primary consideration
is whether the scientific knowledge has a positive or negative effect on the
Other’s well-being. The Other’s well-being is immediately enhanced when sci-
entific knowledge leads to advances that improve health, that make life more
comfortable, that increase the food supply, that make the economy more pro-
ductive, and the like. Other scientific “advances” actually decrease our quality
of life, decrease the quality of life of some people, or have mixed results. The
automobile is an obvious example of mixed results. It increases our ability to
travel from place to place, it increases overall economic efficiency, it provides
aesthetic pleasure to car aficionados, and it pollutes and causes traffic acci-
dents. A weapons system has a similar mixed effect, improving the well-being
132 Who Owns Knowledge?
Commodification happens when access to the products and services that imple-
ment scientific knowledge is restricted by patent rights. Though patent rights
often encourage innovation and, consequently, can be a means to increase the
well-being of the Other, patent rights that are too strong or too pervasive can
undercut the conduct of scientific research as a public good. Patents provide
incentives for private individuals and firms to innovate and commercialize
their innovations. While it may be true that many scientists conduct research
for their own curiosity, it is reasonable to assume that they also need to make
a living and likely wish to profit from their inventions. Firms exist to make
a profit, not necessarily to serve the public good. Hence individuals and (es-
pecially) firms are generally eager to commodify their inventions by patent-
ing them. Firms generally engage in targeted scientific research that can be
translated into a profitable application. They do not generally engage in basic
research.5 Governments have also patented the discoveries of scientists in
their employ, and it is interesting to note the US government patents its scien-
tists’ inventions but does not claim copyright to any government publication.
Recently, universities have begun to patent the inventions of their scientists
and engineers.
5 Xerox Parc and Bell Labs, two private sector research centers, may be excep-
tions.
Science in Whose Interest? 133
Historical Context
It is important to remember that patents are not the only means of encourag-
ing and remunerating scientific research. Since the Medieval era, universities
provided scientists with the resources to conduct research. The obligation of
teaching can be seen as somewhat incidental to the primary purpose of knowl-
edge creation. In the 16th and 17th centuries, “instead of being concentrated
solely within the universities, scientific activity shifted to princely courts, in-
formal urban academies, and organized scientific societies” (Eamon, 1985).
Meteorological research, for example, benefitted greatly from the investment
made by Prince Elector Karl Theodor, of the Palatinate, who financed the free
distribution of uniform, calibrated instruments for collecting weather data in
1780 (Landsberg, 1980; 1979). In 17th and 18th century England, public atten-
tion to science in the form of public lectures was supported by subscriptions.
“The payment of a fee by gentlemen, traders, and aristocrats who attended the
lectures,” writes Larry Stewart, “was itself a form of patronage of Newtonian
philosophy” (Stewart, 1986). As a result, science came to serve a broader so-
cial purpose “as patrons made more practical demands on [their] work, and
as scientists increasingly justified their role in terms of social need” (Eamon,
1985).
Likewise, technological innovation happened prior to the development of
patents. Indeed, S.R. Epstein notes that the European craft guilds provided a
means for encouraging innovation and disseminating information about new
technologies. In his analysis, manufacturing guilds, though not wholly without
negative consequences, did provide a benefit to society because of the system
of quality controls and of migrating skilled workers (journeymen) who spread
knowledge from town to town (Epstein, 1998).
Patents have traditionally protected technology — applications of knowl-
edge — rather than scientific discovery.6 These applications were not initially
required to be innovative. Prior to the 14th century, patent or patent-like pro-
tection was, instead, granted for other reasons. Rulers commonly awarded
6 Material in this section comes from Marlin-Bennett (2004).
134 Who Owns Knowledge?
7 A letter patent was a public letter from the government granting a privilege — in
this case, monopoly production and commercialization rights of an invention — to
an individual.
Science in Whose Interest? 135
ownership rights to inventions resulting from federally funded research vested with
the government. However, the government had no means to manufacture or com-
mercialize inventions and many good ideas and products were left undeveloped.
(Neumann and Sandberg, 1998; Stecklein, 1999; Poovey, 2001)
The expanding reliance on patents takes a toll on the public commitment to sci-
entific research as a public good. If we take responsibility for Others as the key
normative principle, and if the structure of markets, both local and global, has
played in an important role in keeping us from our obligations, then we have a
moral conundrum. The case in point is the shrinking pool of public funds left in
the world for scientific research and its diffusion, the subject of this section.
Before looking at the data, an initial problem must be disclosed: Finding reliable
and comprehensive data about expenditures on basic scientific research by gov-
ernments, international organizations, universities, and firms is extremely dif-
ficult. Separating out research from development is the first hurdle. To explore
the generation of new knowledge in the global public domain, expenditures on
research — especially basic research — that produce freely accessible scientific
findings are key. However, reporting on research expenditures is often present-
ed in tandem with development expenditures. Development refers to using new
knowledge for the creation of products (generally commercial). The case of
vaccine R&D provides an example. Scientists must first conduct research to un-
derstand the basic biology of a pathogen and how it affects the body. Then they
must understand how to cause the body to produce antibodies without creating
any significant negative side effects. Only after these research milestones have
been achieved can the research into how to produce the vaccines, human trials,
and mass production begin. Where research ends and development begins is
murky, and murkier still is where development ends and marketing begins.
This is especially true for pharmaceutical companies, which have begun to
market their new drugs at a very early stage of development. A recent study
by a business consulting firm, Cutting Edge Information, recommends that
pharmaceutical companies begin marketing in the pre-clinical stage of product
development — even before the medication has been tested on humans. The
report recommends that companies “minimize R&D/marketing differences
and unite teams behind a common scientific and commercial vision” (Cutting
Edge Information, 2003). In other words, it is in the interest of firms to avoid
transparency, so the figures they report are suspect. Though accepted account-
ing practices maintain a distinction between R&D and marketing, it may be
more difficult to maintain this separation if the scientists and technologists are
part of a marketing team. If a scientist must spend time meeting with the mar-
keting staff from an early stage of the research and development efforts, should
the hours she spends meeting with the marketing staff be charged to marketing
Science in Whose Interest? 137
awarded at major research institutions in 1997 and 2002. The third column
shows the universities that were awarded the most patents in 2003. Accord-
ing to the Association of University Techology Managers, universities’ income
from patents has increased “from $699 million in 1997 to $1.07 billion in
2001” (Staedter, 2003).
The trend toward patent-driven research at universities may obscure the
distinction between R&D and marketing. Even more important, though, is the
question of whether universities are acting as firms rather than providers of
the public good of new knowledge. Universities’ pursuit of patentable inven-
tions is part of what former Harvard University President Derek Bok refers to
as “the commercialization of higher education” (Bok, 2003b; 2003a). In his
analysis, universities are using changes in the law that allow them to patent
the results of government-sponsored research (the result of the Bayh-Dole Act,
discussed above) along with other entrepreneurial schemes to increase rev-
enues. Doing so threatens the core mission of universities to provide education
and new knowledge in the public domain. “In their pursuit of moneymaking
ventures, universities . . . risk compromising their essential academic values”
(Bok, 2003b).
A second problem with the data is the difficulty in finding data that can
be compared across countries. The OECD provides data, some of which is
received from the countries, some of which is estimated by the organization’s
staff. The data tables include explanatory notes for almost all the countries
included. The notes describe such problems as incomparability of data from
prior years “because of changes in the methods of assessing R&D efforts” (the
case for Belgium), reclassification of some government funding (the case for
Australia and Italy), “overestimation” (the case for Poland), and the like. Dif-
ferences in calculating R&D expenditures makes summing across countries
problematic, as well. Moreover, a good deal of data is simply missing, and the
tables are very sparse (Organization for Economic Cooperation and Develop-
ment).
With these caveats in mind, it is still useful to look at the data on historical
trends in funding science and technology. Figures 1-3 below represent data on
a logarithmic scale to show gross trends and to allow expenditures of great-
ly differing magnitude to be displayed together. Data from the United States
and Japan, the two leading countries for R&D expenditures, as well as France
and Germany (the leading countries for R&D expenditures in the European
Union), and Israel (a country that has joined the ranks of the advanced indus-
trialized countries only recently). The expenditures are reported in constant
Science in Whose Interest? 139
1995 dollars, so inflation is accounted for. The graphs show a lack of signifi-
cant growth in R&D expenditures by governments and by higher education.
Business expenditures, however, are growing, though they seem to be leveling
off somewhat.
Figure 1. Business Expenditures on R&D;
logarithmic scale
1000000
Million 1995 US $
100000 Japan
10000 U.S.
1000 Israel
100 France
Germany
10
1
81
84
87
90
93
96
99
02
19
19
19
19
19
19
19
20
Year
10000
Japan
United States
Israel
1000
France
Germany
100
81
84
87
90
93
96
99
02
19
19
19
19
19
19
19
20
Year
100000
Million 1995 US $
10000
Japan
United States
Israel
France
Germany
1000
this view.
81
83
85
87
89
91
93
95
97
99
01
03
19
19
19
19
19
19
19
19
19
19
20
20
Year
Source for Figures 1-3: Organization for Economic Cooperation and Development.
140 Who Owns Knowledge?
get the patent application filed in a timely manner will lose out to the more
legally agile competitor unless two conditions are met: the competitor doesn’t
independently come up with the same innovation and the first inventor doesn’t
disclose information that would allow the competitor to figure the invention
out. Even in the “first to invent” system used by the United States, innovators
have an incentive to keep their work in progress secret so that competitors do
not get any information that could help them win the race to achieve a patent-
able invention.
The immediate consequence of this situation is likely to be a decline in the
willingness to publish scientific papers by scientists working in fields where
patents are profitable. Moreover, in some cases, scientists are required, by the
terms of their employment or their grants, to adhere to nondisclosure agree-
ments (Cook-Deegan, 2003). If a scientist must receive permission from some-
one else before publishing scientific knowledge, his speech may be chilled.
When permission for publishing must be obtained from the entities that have a
financial stake in how the invention is presented to the public, the scientist may
find that publishing is impossible or that negative results must be toned down.
The scientist may, himself, have a financial interest in seeing the invention
presented in the most positive possible light. Together, these tendencies work
toward secrecy and against the diffusion of knowledge.
Incentive to innovate only in profitable technologies. Another problem with
the system of encouraging the patenting of R&D products is that the practice
decreases incentive to conduct research in some areas, while encouraging re-
search in others. For example, variants on Viagra are possibly more profitable
than drugs needed primarily by people who cannot afford them. In general,
vaccines are less profitable than drugs, and so more R&D is committed to
creating new drugs than new vaccines. Radically different approaches to solv-
ing scientific and technological problems are much (financially) riskier than
modest tweaking of existing procedures, so commitment of research funding,
especially by firms, is likely to go to the sure thing rather than the longshot.
Cross-licensing complications. When a team of scientists and technologists
begin a new research project, they face an enormous hurdle: They must iden-
tify all the patents that their work might violate, and they must arrange for
cross-licensing arrangements. As a statement from the International Aids Vac-
cine Initiative notes, “Differing requirements in product development among
national agencies may ultimately delay or complicate ‘cross-licensing’ of
products” (International Aids Vaccine Initiative, 2000).
Changing the social role of universities. A consequence of the Bayh-Dole
Act was that the interest of universities became more closely aligned with the
interests of profit-seeking firms (Neumann and Sandberg, 1998; Stecklein,
1999; Poovey, 2001). The traditional role of the university as the sponsor of
142 Who Owns Knowledge?
new public domain knowledge has been limited by the extent to which reaping
the benefits of patents drives research priorities.
In the section below, I illustrate some of the problems posed by a shift from
governmental to privately sponsored scientific research by looking more close-
ly at agricultural research.
8 In May, 2004, the Canadian Supreme Court ruled that Monsanto did have a valid
patent, that Schmeiser did infringe upon it, but that he did not profit from his
infringement. Consequently, Schmeiser was not required to pay damages to Mon-
santo (Anonymous, 2004).
144 Who Owns Knowledge?
developed countries between 1991 and 1996 was only 0.2 percent (Pardey and
Beintema, 2001). Overall support for the CGIAR has been stagnant in real
terms, and funding for germplasm improvement and germplasm collection de-
creased 9 (see Figure 4). Since widespread hunger still exists in the world and is
likely to persist (Rosegrant and Cline, 2003), a strong argument could be made
that there is insufficient investment in public domain agricultural research and
that the levels of funding are not sufficient to meet global needs.
Figure 4. CGIAR Expenditures on Germplasm
Improvements, Germplasm Collection, and
Sustainable Production
160
140
120
millions of
Year 2000
100 deflated germ improve
US dollars 80 deflated germ collect
(deflation factors
approximated) 60 deflated sustain
40
20
0
72
77
82
87
92
97
02
19
19
19
19
19
19
20
Year
Note: Data before 2002 are averages (computed from 10 year and 5 year totals). Plateaus on the
graph reflect the use of these averages rather than a lack of change over the years. Deflation
factors approximated using information from the Federal Reserve Bank of St. Louis (Federal
Reserve Bank of St. Louis). Source of CGIAR data: (Consultative Group on International
Agricultural Research 2004. Table A5.1).
9 Personal communication via e-mail with Marc Cohen, IFPRI, June 29, 2005. Also,
CGIAR documents show that funding for research into sustainable production has
recently surged. This may be in response to European pressures for more environ-
mentally sound agricultural research.
10 The MVI is primarily funded by the Bill and Melissa Gates Foundation, including
the initial grant of $50 million, and a grant in 2003 for $100 million. Additional
funding has come from USAID. See information on the website of the Bill and
Melissa Gates Foundation website, http://www.gatesfoundation.org/GlobalHealth/
GranteeProfiles/SGGHMalariaMVI-011019.htm, accessed March 8, 2005.
Science in Whose Interest? 145
technology, is costly and the expected profits from the resulting product may
be low. The private sector may not be interested in developing products for
the regions of the world that need them. However, as Melinda Morree points
out, simply assuming that the public sector can research, develop, and provide
access to products may, indeed be naive. MVI has created a model attempting
to draw on the strengths of both the public and private sectors through partner-
ships and the provision of foundation (i.e., charitable) funding (Morree, 2004).
According to the organization’s literature:
MVI invests in targeted malaria vaccine efforts of industrial, biotech, and academic
partners so that the costs of development are not a barrier to success. In return for
this investment, MVI expects the public sector to have access to one or more suc-
cessful vaccines, and it expects MVI-supported vaccine to be reasonably priced
— within the reach of developing-nation governments and the global health funds
that assist them. At the same time, MVI works to provide a realistic assessment of
the malaria vaccine market. (Malaria Vaccine Initiative, 2003)
The question of intellectual property and global science in the public interest
is fundamentally about the balance of the public good and the private good
and our obligation to care infinitely about the Other. Our ethical obligation is
to mitigate problems faced by the Other we encounter. In this case, finding a
way to produce and disseminate needed scientific knowledge becomes a re-
quirement. Can firms, which are legal persons, not real ones, present a work-
able possibility for a more ethical solution (Esterik, 1999)? Should firms be
considered to have the same ethical obligations as people? One solution would
be to embrace free market measures, as long as the public social safety net
were in place. Another solution would be to rely on the free market combined
private charitable giving. Monsanto’s example is instructive. The company has
been funding the African Agricultural Technology Foundation, whose mission
is summarized as:
Critics see many problems with organizations like this, including the possi-
bilities of decreasing biodiversity and encouraging monoculture if genetically
modified seeds become widely adopted, trapping small holder farmers into
using seeds for which, later on, they end up paying more for necessary inputs
146 Who Owns Knowledge?
References
J. Rogers Hollingsworth
A major issue in this volume is who owns knowledge — a very complicated
problem to address. It immediately requires us to pose an equally vexing ques-
tion: what is knowledge? For purposes of this introduction, I take a somewhat
controversial position, viewing knowledge as a configurative concept which
also includes information and facts. For purposes of this discussion, knowl-
edge is knowing something with a considerable degree of familiarity, while
information is the communication or reception of knowledge, and facts consist
of information which is perceived as having objective reality.1
The essays in the following section are quite varied in their substance. For
this reason, my discussion will focus primarily on a number of general issues
about which the reader should be cognizant while reflecting on a few of the
ramifications of “Who Owns Knowledge.”
Sociologists and economists have long pointed out that we should think of
two kinds of knowledge: communal (e.g., public) knowledge and proprietary
knowledge. Public knowledge is owned by everyone in common. One example
is the knowledge that is published in scientific journals to which everyone has
access. This is quite unlike private knowledge — or a private good, so that
when Jake eats his cake, no one else can eat it also. Because of the communal
nature of public knowledge, the reading of a scientific paper by one person
does not diminish its use for the next reader. On the other hand, when knowl-
edge is patented or its use is acquired by licensure, it is the very opposite of
communal knowledge and is restricted to private use. To most observers, it has
long been relatively easy to understand the pecuniary motives of those who
produce knowledge for sale in the market place. But what have been the incen-
1 For a brief introduction, the reader should consult the unabridged Webster’s dic-
tionary.
153
154 Who Owns Knowledge?
tives that motivate those who produce knowledge which is owned in common
by the community?
As Robert Merton and others observed, a major incentive to produce public
knowledge has long been peer recognition. Thus, scientists confer honorific
awards to those who make notable achievements. The scientist who is first in
making an important discovery receives the credit, but unlike a sports tourna-
ment, there is no reward for being a runner-up. Historically, rewards have been
medals and prizes, and other means of bestowing esteem on the discoverer.
Such an incentive system has historically generated a great deal of competition
among scientists, occasionally intense feuds as to who deserved recognition
for priority. To facilitate the effective working of this kind of incentive sys-
tem, the international scientific community has highly recognized peers who
determine what contributions to knowledge are worthy of being recognized
as important contributions. Table 1 briefly describes the public science sector
which has existed in the United States during the 20th century.
Historically, modern societies not only have had a scientific sector which
produces publicly owned knowledge, but during the process of modernization,
a for-profit sector has also produced science and technology at an accelerating
rate. In this sector, the incentives have been primarily monetary. Many observ-
ers have suggested that over the past fifty years, the process of industrializa-
tion has tended to diminish the proportion of scientists motivated to produce
public knowledge while an increasing proportion of scientists have engaged in
the pursuit of proprietary knowledge. Some believe that a fundamental trans-
formation is occurring in the ownership of knowledge. Increasingly, there is a
for-profit sector of science which reaps much of its rewards from ownership
of copyrights and patents, from licensing, and from other forms of transferring
property rights of scientific and technological knowledge. Table 2 is a brief
expression of the characteristics of the for-profit sector science in the United
States.
While in the United States, for-profit sector science has been expanding
throughout the 20th century; its rate of growth has dramatically increased dur-
ing the past twenty-five years. Many suggest that the passage of the Bayh-Dole
Act by the US Congress in 1980 did much to accelerate the expansion of the
proprietary sector. This act provided that intellectual property resulting from
federally funded research in universities could be patented, with the provision
that universities and their researchers would be the beneficiaries of resulting
royalties. Thus, during the 1980s, university linkages with industry increased
dramatically. The number of patents issued to American universities tripled in
a single decade (1984–1994). Numerous universities established intellectual
transfer offices, began to develop adjacent science parks, and dramatically in-
creased their equity in firms nearby and elsewhere. In the year 2000, American
universities by conservative estimates earned at least $1 billion, primarily in
patent royalties (Etzkowitz, 2002:124).
In the twenty-five-year period following the passage of the Bayh-Dole act,
the historical relationship between public sector and for-profit sector science
was significantly altered, bringing about a transformation in the culture and
behavior of American universities. Historically, universities were sites primar-
ily concerned with producing science as public goods, while for-profit firms
were primarily engaged in producing science and technology as private goods.
The practices distinguishing these two types of organizations were never tidy.
While the two types of organizations had somewhat different goals and re-
ward structures, on any single day, some universities and their faculties were
engaged in producing both public and private knowledge. Similarly, some
for-profit organizations produced both public and private knowledge. For ex-
ample, the laboratories of ATT and IBM historically had very enviable records
for producing some of the world’s most important basic scientific discover-
ies as public science. Nevertheless, in the aggregate the historical practices of
American scientists in universities and for-profit firms tended to be quite dif-
ferentiated. But in recent years, the differences in the behavior of the two types
of organizations have been considerably narrowed.
Mayer-Schönberger, in one of the following essays, presents an interesting
discussion of various narratives that have been used to analyze legal protec-
tions for proprietary knowledge over several hundred years. He reports that
recent analysts (e.g., Ronald Bettig, Lawrence Lessig, Jessica Litman) suggest
that the power of intellectual property markets has become increasingly con-
centrated in large organizations, a tendency which could ultimately be suicidal
for the incentive and reward structure for producing new knowledge. Litman’s
argument is that the power of those who own patents and copyrights has dra-
matically expanded in recent years, in their ability to convince the Congress
Introduction to Part 3 157
to extend the life of copyrights and patents — in short leading to the creeping
privatization of knowledge in advanced industrial societies (Benkler, 2006).
While there is much merit to these observations about the increasing propri-
etary nature of knowledge, this perspective can easily be overstated. In order
not to exaggerate these tendencies, we need to be mindful of several contrary
perspectives.
First, there are substantial data which suggest that — with the exception of
the pharmaceutical industry — firms rely much less on patents to capture the
benefits of research and development than most observers believe. Instead of
patents, most American firms capture the benefits of research and development
by first mover advantages, secrecy, and the exploitation of complementary ca-
pabilities. Recent scholarship demonstrates that many firms which engage in
extensive patenting are not motivated by the desire for royalties from markets
but act in an effort to prevent competitors from acquiring inventions on related
products (i.e., patent blocking) and as part of a strategy to force rivals into ne-
gotiations on a variety of issues. Indeed, some research demonstrates that the
absence of patent protection would have little impact on the innovative efforts
of most firms — with pharmaceuticals being a major exception.
Moreover, there are longitudinal and cross-national data which illustrate
that when countries have strengthened their patent laws, there has been a de-
crease in the level of investment in innovative activity. In short, there is little
theoretical or empirical evidence in the economic literature about intellectual
property that the legal regulation of knowledge or cultural production (e.g.,
films, music) enhances innovation or creativity. In short, the production strat-
egy of most innovative firms does not involve seeking exclusive rights via
patents laws (Levin et al., 1987; Cohen et al., 2000; Mansfield et al., 1981;
Benkler, 2006: Chapters 2, 6, 7). Other recent scholarship demonstrates that
the costs of patents to those who own them outweigh their benefits. The most
exhaustive study from this perspective is that by Bessen and Maurer (2007)
which is based on extensive US data from 1976 to 1999 (also see Boldrin and
Levine, 2007). (Again, the exception to this trend is with the pharmaceutical
industry.)
One of the most interesting and rapidly developing trends in the produc-
tion of information is the emergence of a commons-based information system
which is nonproprietary in form. IBM’s Linux-related services are an excellent
example of a business strategy based on nonexclusivity. While IBM owns more
than 29,000 patents, it invested more than a billion dollars in the development
of free software — such as Linux. Within a period of four years (2000–2003),
IBM received 100 percent more in revenues from its Linux-related services
than from all royalties derived from its thousands of patents. From the per-
158 Who Owns Knowledge?
spective of IBM, its free activity has permitted the company to develop clos-
er relations with its customers, offering them solutions to specific problems.
This strategy now generates more than two billion dollars annually for IBM.
Google, Amazon, CNN.com, Hewlett Packard and dozens of other firms have
adopted business strategies which depend on making free software available to
the public. Yale Law Professor Yochai Benkler argues that we are in the midst
of a basic transformation in the production and ownership of information —
with nonproprietary forms becoming increasingly important even when being
promoted by some of the world’s major multinational corporations (Benkler,
2006: 46–47, 64, 123–124, 472).
The shifting balance between public knowledge (i.e., the commons, non-
proprietary) and proprietary knowledge has enormous implications for the
functioning of modern democracy. In the history of the mass media in West-
ern democracies, there has been increasing concentration in the ownership of
newspapers, radio, and television broadcasters; increasing control over what
was being distributed and increasing numbers of citizens receiving the infor-
mation/knowledge being distributed. When Alexis de Tocqueville wrote his
famous book Democracy in America in the early 1830s, he believed that one of
the most important factors contributing to democratic institutions was the mo-
bilization of a press by an active citizenry. But over time, recipients of informa-
tion from the mass media have become passive audiences with little capacity
to communicate with their fellow citizens, as a result of the increased concen-
tration in the ownership of the means of distributing information/knowledge
(Starr, 2004; Benkler, 2006:186–187).
However, the Internet is becoming one of the most important innovations
in modern history in shaping the ownership and distribution of information
and knowledge. The Internet may well have the potential to alter the role of
citizens as participants in present-day political life. Information and knowl-
edge are central for the effective functioning of modern democratic polities.
Significantly, the Internet has made it possible for millions of individuals to
produce and exchange information with others in their own society as well
as across the globe. The Internet has expanded the capacity of individuals to
acquire knowledge for themselves, to communicate with others, and to form
associations across multiple levels of society. As a result of the Internet, we are
observing the shift from a very constrained to a more engaged citizenry in the
distribution of knowledge and information.
These observations about the Internet have been noted for some time. How-
ever, we should not assume that we are headed toward a utopia. Indeed, those
who view the blogosphere as having the potential to transform the world into a
utopian democracy are unrealistically optimistic. In no democracy can everyone
speak and be heard at the same time. If everyone has her own soapbox, listeners
Introduction to Part 3 159
will naturally self-organize around some more than others. So it is with the In-
ternet blogosphere. Fortunately, recent research on complex networks has pro-
vided us with the theory and methods to monitor and understand the potential
of the Internet to transform contemporary political life. We can be certain that
blogs and other online sites will become more and more concentrated: groups
of self-organizing bloggers, in a large network having a power-law distribution
— meaning that some nodes will be attached to many others, while some will
be poorly linked to others. However, there is a fundamental difference between
the structure of the Internet with a few highly popular bloggers for commu-
nicating knowledge and the structure of market-based mass media during the
height of the age of industrial capitalism. During the previous era — even in
societies having the most liberal, open media systems — most citizens were
essentially readers, listeners, and/or viewers of what alleged professionals re-
ported. The age of the Internet, however, represents a marked change in the dis-
tribution of information and knowledge. The Internet is a much more flexible
and open system (Benkler, 2006, especially chapters 6 and 7). Hundreds of mil-
lions of people can now be more than passive recipients of information; most
may publish whatever and whenever they please to do so. If certain nodes on
the Internet become too homogeneous in the information being distributed, in-
dividuals can respond by generating alternative viewpoints. Whereas in the age
of the mass media, money and/or political power were necessary and sufficient
to control the media, that is no longer the case. There is substantial evidence
that the Internet is quite liberating. In the words of Benkler (2006:272): The
Internet “allows all citizens to change their relationship to the public sphere.
They no longer need be consumers and passive spectators. They can become
creators and primary subjects. It is in this sense that the Internet democratizes.”
As the Internet is an open forum, it has enormous implications about changes
in the ownership and distribution of knowledge. Hopefully, the readers of the
following essays will be mindful of these changes as they reflect on how the
context is changing in the way knowledge is owned and distributed.
Steve Fuller’s essay about fraud in science raises a broad set of concerns we
should confront as we reflect on the problem of Who Owns Knowledge. The
producers of knowledge — whether proprietary or non-proprietary — are now
distributing their product throughout the globe. Whenever we confront the is-
sue of the ownership of any kind of good (knowledge or any other kind), we
must face up to the necessity of having norms and rules for regulating conduct.
The good or product we are confronting in this volume happens to be knowl-
edge.
160 Who Owns Knowledge?
Rather than being so fixated on the dubious claims of the increasing inci-
dence of scientific fraud, our societies would benefit more if the legal — espe-
cially the academic — community were to invest greater energy in attempting
to identify and mitigate the extent of fraudulent information in our economic
and political systems. American society provides an amazing number of ex-
amples of how actors have deliberately disseminated false information to mass
publics over the last third of a century. In the economic system, there were
the large number of fraudulent loans resulting in the savings and loan banking
debacle in the early 1980s, followed by Enron, WorldCom, Tyco and numer-
ous other cases of fraud involving hundreds of billions of dollars and resulting
in the criminal conviction of numerous corporate executives. More recently,
the world has found itself in the midst of one of the largest credit crises in his-
tory, brought about by the misinformation in the real estate sector disseminated
by borrowers, lenders, appraisers, underwriters, and rating companies about
financial assets — many of these actors operating in very incestuous relation-
ships with one another. The FBI contends that it has recently received more
than 35,000 mortgage-fraud reports (Wall Street Journal, August 18–19, 2007:
B2).
Also in the United States, there has been a long history of the executive
branch of government misinforming the public going back to the Tonkin Gulf
Resolution (which was a major event leading to war in Vietnam), the Iran Con-
tra deal during the Reagan administration, the allegations that Iraq had weap-
ons of mass destruction and was working “hand-in-glove” with Al Qaeda. In
sum, there are massive amounts of fraudulent misinformation being distributed
to mass publics, and readers of this volume would be advised to reflect on the
scope and seriousness of the problem lest they become too fixated on allega-
tions of fraud in scientific research. Fortunately, fraud in science is more likely
to be self corrected by the scientific community than is the case with some of
the world’s major economic and political systems.
ence, cybernetics, and the biological sciences. For example, advances in the
biological sciences led to the realization that at the level of cells, information is
conveyed by DNA which influences biological replication. In short, molecules,
cells, and organs interact in a complex communication network which trans-
forms vital information basic to life. This realization about DNA has slowly
helped to socialize us to recognize that communication of information is not
necessarily done only by human brains. Thus, for decades scientists have rec-
ognized that tens of millions of bits of information vital to the very existence
of life function in a self-organizing process, somewhat automatically, indepen-
dent of human cognition (Kay, 2000).
Meantime, in other spheres, a great deal of information is processed elec-
tronically and is decontextualized from human reflection. John von Neumann’s
views about “cellular automata” have been widely diffused on a large scale,
across the entire technological landscape. To sharpen our perspective on how
cybernetics, computer science, and biology have shaped our thinking about in-
formation we should give greater thought to the degree to which machines are
automatically collecting ever-increasing amounts of data, processing it, and
then making decisions which have major societal impacts. For lack of space
I will only mention a single example — that involving the work of physicists
and mathematicians in the world’s major financial markets, particularly those
trading equities on major stock exchanges. Elaborate computer models have
been designed to scan data on thousands of firms throughout the world, de-
veloping profiles of firms which have share prices low relative to a variety of
performance measures. Computers are programmed to identify firms which
are underpriced and to execute orders to buy and sell shares when share price
no longer is consistent with prescribed performance criteria. Moreover, many
models are designed for computers to engage in automatic hedging — buying
and selling equities both long and short. In sum, a great deal of the equity trad-
ing across the globe has been done in recent years by this kind of automated
processing of information by computers.
The implications of the Hildebrandt essay suggest that these processes are
becoming quite widespread throughout our society. Already there are many
organizations which have files on millions of individuals: their purchasing
habits, their lifestyles, what they read. The telecommunications industry has
data on the billions of telephone calls customers make, and Internet companies
have the potential to track the names to and from which customers send and
receive electronic mail. And while many societies have enacted privacy laws,
we have observed in the United States these have been overridden in the name
of “national security.” For example, the federal government has acquired the
telephone records of millions of citizens. And while these issues are currently
being litigated, the US government has increasingly taken the view that even
Introduction to Part 3 163
While the title of Engel’s essay suggests that he is only addressing the recep-
tion of “rigorous” social science in the law, a careful reading of his text reveals
a stimulating description of the differences between legal reasoning and rea-
soning in the social sciences. He argues that social science and law are two
distinct enterprises, with different epistemologies, goals, and purposes, and
fundamentally different methods.
The following quotations are extracted from his text in order to highlight his
characterization of social science: “Most social science aims at falsification”
(p. 276); “At the heart of the scientific method is falsification” (p. 278); “the
majority of social scientists take objectivity to be the supreme goal” (p. 276);
“a social scientist excels in making everything black or white” (p. 276); “All
social science is an exchange in strictly controlled partial analysis” (p. 276);
“economists learn that the easiest way to earn themselves praise and a career is
with advanced mathematical modeling” (p. 277); “the social sciences are built
on the idea of methodologically controlled degrees of uncertainty” (p. 279);
the attitude toward certainty “is best characterized by a statistical test” (p. 279);
“[t]he statistical test is taken to be successful if there is a 5 percent probability
that A does not cause B” (p. 279). Finally, Engel suggests that lawyers, in con-
trast to social scientists, stress elegance in writing, and have more “openness
to rhetoric” (p. 283).
Engel’s views about law and social science are interesting, well stated, and
undoubtedly are shared by many legal scholars. However, the relationship be-
tween law and social science is too important a subject to be left only to law-
yers or legal scholars. Hence, it is important for us to confront the following
interrelated set of questions: (1) Are the practices of social scientists as homo-
geneous as Engel suggests? (2) Is law as practiced by lawyers, legal scholars,
and jurists as divorced from the social sciences as he suggests? (3) What is the
relationship between law and the entire spectrum of science, and do there ap-
pear to be significant changes underway is redefining the relationship between
law and science?
The social science community is not nearly so homogeneous as Engel’s
essay implies. While it would be difficult to quantify the practices of social
scientists, my impression is that his characterization applies to only a minor-
ity of social scientists. Moreover, even those who utilize “rigorous statistical”
analysis do not rely on tests of statistical significance on the scale implied by
Introduction to Part 3 165
References
Kay, L.E. Who Wrote the Book of Life: A History of the Genetic Code. Stanford, CA:
Stanford University Press.
Kevles, D.J. (1998) The Baltimore Case: A Trial of Politics, Science, and Character.
New York: W.W. Norton.
Lerner, J. (2002) “Patent Protection and Innovation Over 150 Years.” Working Paper
No. 8977. Cambridge, MA: National Bureau of Economic Research.
Levin R.C., A.K. Klevorick, R.R. Nelson, and S.G. Winter (1987) “Appropriating the
Returns from Industrial R and D.” Brookings Papers on Economic Activity 1987,
783–820.
Mansfield, E., M. Schwartz, and S. Wagner (1981) “Imitation Costs and Patents: An
Empirical Study.” Economic Journal 91:907–918.
McCloskey, D.N. The Rhetoric of Economics. Madison, WI: University of Wisconsin
Press.
Starr, P. (2004) The Creation of the Media: Political Origins of Modern Communica-
tions. New York: Basic Books.
von Neumann, J. (1966) Theory of Self-Reproducing Automata. Champaign-Urbana,
IL: University of Illinois Press.
6
I. Research Question
Iudex non calculat. For most lawyers, the proverb settles it. Formal methods
are none of their business. This holds for explicit models no less than for quan-
titative empirical methods. Actually, the use of mathematics only makes the
challenge patent; informal, but rigorous conceptual and empirical tools from
the social sciences fare no better. Interestingly, this reticence is often even to
be found in lawyers, who, in principle, are quite open to findings or insights
from the neighboring disciplines. What they learn from interaction with social
scientists mystically transforms into topical arguments. On that path, all the
methodological caveats from the science of origin get lost.
Social scientists, when they become aware of this legal practice, usually
react with disdain: Lawyers are no better than laypeople. They lack sophistica-
tion. Is the law a science at all? This paper claims: Disdain is overly simplistic.
Simply turning lawyers into social scientists would be inappropriate. Just more
and better training will not do. Rather, the more rigorous the methods, the more
carefully the interface between law and the social sciences must be designed.
This is challenging, but not impossible to do.
The interface between the law and the social sciences is, of course, not
a new topic. There have been violent battles, like the one about cost-benefit
analysis in the US (Heinzerling, 1998; McGarity, 1998; Adler and E.A. Pos-
ner, 1999; 2000; R.A. Posner, 2000; Sunstein, 2000b; Symposium, 2000), or
about law and economics in Germany (Fezer, 1986; 1988; Ott and Schäfer,
1988; Kirchner, 1991). There is a rich literature discussing legal methodology,
once the law is defined as a governance tool (see Schuppert, 1993; Schmidt-
Aßmann and Hoffmann-Riem, 2004). A couple of years ago, I myself wrote a
* I am grateful to Martin Hellwig and to Stefan Tontrup for their comments on an
earlier version, to Lena Heuner for research assistance and to Darrell Arnold for
the linguistic trimming of the paper.
169
170 Who Owns Knowledge
programmatic piece, pleading for “the law as applied social science” (Engel,
1998b). In my own substantive work, I have routinely used concepts from the
social sciences. In so doing, I have tried out many different formats, ranging
from doctrinal argument (e.g. Engel, 2004d) over advice for legal policymak-
ing (e.g. Engel, 2002a) to reconstructions of governance tools by way of a
formal model (Engel, 2006).
Against this backdrop, the paper wants to make a specific contribution by
deliberately narrowing down the field of observation. This is not another ex-
ercise in putting welfare economics into perspective (on this, see Thompson,
et al., 1990). It is taken for granted that there are normative goals competing
with allocative efficiency, and that the law might want to trade some efficiency
for purposes of redistribution, fairness, or identity, to name only some of the
competitors (more from Engel, 2001b). The focus is thus not on the prescrip-
tive side, but on the descriptive side of social science (on the distinction see
van Aaken, 2003). The law relies on a social science to learn more about the
regulated issue, be it in terms of facts, or of analytic tools (on this distinction,
Schmidt-Aßmann, 2004b:399). The focus is thus on the empirical, on the ex-
planatory and on the predictive side of social science.
At first blush, one should think that this side of social science is much less
critical for the law than the normative side. Why is it that, nonetheless, resis-
tance against taking the social sciences seriously for descriptive purposes is no
less pronounced? This could, of course, in and of itself be the topic of a study
by a social scientist. An economist could flesh out the incentive effects of open-
ing up legal discourse to the language and the methods of the social sciences.
A political scientist could analyze the battle over methodology as a battle over
power, within the discipline, but also in the legal community more generally,
and in the political arena at large. A sociologist could describe traditional legal
methodology as a tool for community building and enculturation. The follow-
ing is informed by these perspectives. But this is a paper by a lawyer. I want
to understand why so many of my colleagues are so reluctant. I want to dis-
tinguish more from less legitimate reasons for this reticence. I ultimately want
to argue with my colleagues: even if I am making the case for scepticism as
strong as possible, there is still room for us lawyers to take the social sciences
seriously. I am thus not a disinterested anthropological observer, studying the
peculiar discourse of the legal tribe. I am a member of this tribe, in all honesty
arguing for a change in discourse.
If one wants to convince, one should not appear biased. Specifically, one
should argue with the opposite view where it is strongest. In ideal types, a legal
academic may define her task in three ways: she may contribute to the evolution
of doctrine; she may advise courts and policymakers how to make new law;
and she may study legal phenomena as an outside observer. The case against
Rigorous Descriptive Social Science in the Law 171
openness for empirical and analytic methodology from the social sciences is
strongest if one adopts the first task definition. Consequently, I am focusing
on the interface between descriptive social science and the application of legal
rules. Actually, the case becomes even stronger if one focuses on the customer
of academic doctrinal work, i.e., the courts, administrative authorities, or the
attorneys of those arguing before these legal decision makers. I thus start from
the idea that the results of legal academic work should ultimately be market-
able in legal practice. I am exploring why legal practice might find it difficult
to digest rigorous descriptive social science. I try, however, to show that this
does not imply that descriptive social science should be banned altogether.
Rather, one must carefully design appropriate interfaces. This has implications
for the division of labor between legal practice and academia.
It would not be difficult to write a complementary paper, vigorously argu-
ing for the integration of rigorous descriptive social science into law. After
all, the social sciences have adopted their empirical and analytic methodolo-
gies for good reason. Rhetorically, the point could be made even stronger by
confronting concrete instances of erring legal intuition with methodologically
sound scientific criticism. I will not be doing that here. Basically I take it for
granted that social scientists are experts in their domains, and that the quality
of legal decisions could be improved if this expertise were to have an impact.
For this is not where the problem is. There is, of course, sheer legal ignorance,
but it is not a worthy topic for a scholarly paper. Ignorance is best combated
by teaching, maybe accompanied by a little prodding and nudging. Such calls
for scientific betterment will, however, not do where the reluctant discipline
is raising potentially legitimate concerns. Finding out whether there are such
concerns is the purpose of this paper.
Social science is as little uniform as is law. Quite a few of the legal con-
cerns with descriptive social science are raised by critics in these fields as well
(characteristic pieces include Leamer, 1983; McCloskey, 1998; McCloskey
and Ziliak, 2001). When social scientists are asked to give policy advice, or
to help firms choose their strategies, their customers sometimes raise concerns
not so dissimilar from the legal ones. Fencing the law off from the social sci-
ences, or transforming the findings such that they become easier to digest, is
therefore not the only option. Lawyers, however, will not often be in a position
to insist that the descriptive input from a social science be more appropriate
for their purposes. In exploring the concerns, I will therefore assume “normal”
social science. Since I am interested in legal reticence, I will not explore a
complementary question: would social scientists have good reason to resist
being instrumentalized by lawyers?
The paper starts by illustrations from legal practice (Section II). The bulk
of the paper explores the legitimacy of concerns (Section III). Thereafter, the
172 Who Owns Knowledge
cannabis, the court widely discussed the relevant findings from the literature.3
It did the same when regulated access to the professional care of the elderly
came under attack. In this ruling, the court extensively reported statistical data
and model calculations on the demographics of the Federal Republic.4 Finally,
a decision by the Spanish Supreme Court is striking. It is again taken from a
criminal case. The defendants had marketed contaminated edible oil. Again,
causality was disputed. The court allowed statistical evidence (cf. Koehler and
Shaviro, 1990). “To find causality . . . it is not necessary to know the exact
mechanism by which the effect has been brought about, as long as a correlation
or the nexus between the relevant events could be found, and alternative causes
can be excluded.” 5
Openness to the methodological standards of the social sciences is a differ-
ent matter. One noteworthy exception stems from antitrust (cf. Böge, 2004). A
couple of years ago, the European Commission ushered in a “more economic
approach” to European antitrust.6 A visible sign of this is the new position of
a chief economist in the Competition Directorate General. With this approach
comes a greater openness to the methodology prevalent in academic economic
thinking about antitrust issues (Hildebrand, 2002; Nitsche and Thielert, 2004).
The European Court of First Instance seconded by giving the Commission
greater leeway with respect to methodology.7
Some of the reasons for the legal reticence to rigorous social science methods
are down to earth. Most lawyers lack the necessary expertise (discussed in
Section 1 below). They fear that judicial power might erode (Section 2). Other
reasons carry greater weight. By accepting alien methodology, lawyers might
unwillingly take value judgments on board (Section 3). Most importantly, the
legal task is fundamentally different from the task of a social scientist (Sec-
3 Bundesverfassungsgericht 3/9/1994, Entscheidungen des Bundesverfassungsge-
richts 90, 145, 178f.
4 Bundesverfassungsgericht 10/24/2002, Entscheidungen des Bundesverfassungsg-
erichts 106, 62, 73f.
5 Tribunal Supremo 4/23/1992, Cuadernos del Consejo General del Poder Judicial
1992, 69, cited from the German translation, Neue Zeitschrift für Strafrecht 1994,
37, 38.
6 White Paper on the modernization of the rules implementing articles 85 and 86 of
the EC Treaty, of April 28, 1999, § 78 (Commission Programme 99/027), http://eu-
ropa.eu.int/comm/competition/antitrust/wp_modern_en.pdf (2/11/2005).
7 European Court of First Instance 6/6/2002, Case T-342/99, §§ 58-64 – Airtours;
10/25/2002, Case T-5/02, § 119 – Tetra Laval.
174 Who Owns Knowledge
tion 4). Related to this, lawyers define the situation in a way that differs from
the definitions prevalent in the social sciences (Section 5). For both reasons,
practical, not theoretical, reasoning is called for (Section 6). Actually, judicial
psychology responds to this need (Section 7). A further problem originates in
the, usually low, compatibility of doctrinal strictures with the strictures from
formal social science (Section 8). Procedural rules make it difficult to take
social science on board (Section 9). The autonomy of the legal system is to be
respected (Section 10). Finally, the law purposefully has a fuzzy goal function.
Some of the goals beyond effective governance do not marry well with formal
social science (Section 11).
1 Lack of Expertise
to their intuitions. Before one has seen the evidence, it in particular is hard
to believe that statistics usually outperform experts (Meadow and Sunstein,
2001; Surowiecki, 2004). The main purpose of economic argument is not to
pin down linear causality. Rather economists search for equilibrium. They thus
aim at clarifying the interdependence between the action of several (groups
of) actors.
A last concern carries greater weight. Lawyers rightly sense that mathemat-
ics and statistics are foreign languages, as are the conceptual languages used in
informal analysis. Lawyers are trained to see language as a powerful tool. They
know only too well how easily language can be employed for strategic purpos-
es. And they have seen often enough how important it is to listen carefully. If a
nuance is missed, it may well mean that the case is lost. In all honesty, model-
ers and statisticians must admit that the pitfalls of their respective languages
are no smaller in this respect. If the methods from empirical and analytic social
sciences were allowed in court, those adept in these technologies would have a
strategic advantage. If the issue is important enough, the opponent would react
by also hiring social scientists. But this mechanism would only work if both
parties could invest sufficient resources. At any rate, it would result in an arms
race. More importantly, professional judges would often not have the expertise
to counteract such movements.
Since the formation of modern law in the Roman Empire, lawyers have always
been close to power (Schiavone, 1991). In the US, it is the hallmark of critical
legal studies to trace power politics under the guise of legal benevolence (Kel-
man, 1987). It is therefore not far-fetched to speculate that some lawyers might
repel the social sciences because they anticipate an erosion of legal power
(Lepsius, 2005:10). Specifically, for that reason, lawyers might dislike formal
methodology. It entails a double risk. Outsiders not under the control of the
legal community could pass through doctrinal fences. Even worse, alien, but
rigorous, methods would endow them with weapons, the effect of which the
ordinary lawyer is neither able to predict nor to counteract. But, of course,
maintaining the power of a profession is not a legitimate aim as such. The pro-
fession would have to show that alternative institutional arrangements serve
society worse than the lawyers do.
Law and economics scholars rightly spend much time and effort carrying home
the distinction between positive and normative analysis. There is, of course,
176 Who Owns Knowledge
normative welfare economics (Baumol, 1965; Ng, 2003). It is, at the least, con-
sequentialist, if not openly utilitarian. Lawyers often have good reason to resist
allocative efficiency as the only, or even as the predominant, normative goal
(Eidenmüller, 1995). But descriptive analysis, based on methodological indi-
vidualism, is a different matter (van Aaken, 2003). In principle, such analysis
is agnostic with respect to goals for legal policymaking. It is a conceptual tool
for understanding incentives and how they are changed by legal intervention.
However, in more subtle ways, methodology may be linked to normative
goals. A seemingly far-fetched parallel helps elucidate the point. The perfor-
mance of weather forecasters in the Denver airport was tested under two con-
ditions: in ordinary circumstances, and under experimentally induced stress.
Stress had two effects. Forecasters became significantly more accurate, but
also more risk averse. They thus sent more planes away for fear of severe
weather than in the no stress condition (Hammond et al., 1992). Choosing
between the concomitant risks of false positives versus false negatives is a
normative question (Levi, 1962).
In the experiment, better decision quality was thus not normatively neutral.
Taking the rigorous methods from the social sciences on board could have the
same effect on legal decision-making. Statistics are on average more accurate
than experts (see again Meadow and Sunstein, 2001). But statistics need suf-
ficiently large samples of quantitative data (Hays, 1994).8 Otherwise, results
are not significant. Statistical accuracy thus comes at a double price. The in-
vestigation is biased in favor of quantitative data, at the expense of qualitative
analysis. Moreover, statisticians will seek out large samples, at the expense of
local effects. This is not a merely theoretical concern. It is at the heart of the
American dispute over cost-benefit analysis. In order to increase rationality
and political control, the Environmental Protection Agency is under an obliga-
tion to carry out such analysis.9 Critics have pointed to the fact that this has
resulted in giving the measurable death toll excessive weight in policymak-
ing. Other deteriorations of health are not so easily quantified. Even less do
non-health risks, like the overall impact on nature as a complex system, lend
themselves to quantification (Heinzerling, 1998; Driesen, 2000; Ackerman and
Heinzerling, 2002).
Rigorous modelling may have a similar effect. It indubitably increases accu-
racy in assessing causal relationships and it helps pinpoint interdependencies.
8 King, Keohane and Verba (1994) do, however, demonstrate how much of concep-
tually controlled inference may travel to situations of “small N,” i.e., situations
with small samples.
9 Sec. 812 Clean Air Act, see also Unfunded Mandates Reform Act of 1995, Pub. L.
No. 104-4, § 202, 109 Stat. 48 (codified at 2 U.S.C. § 1532 [1995]), further extend-
ing the scope of cost-benefit analysis.
Rigorous Descriptive Social Science in the Law 177
The rational choice model is a powerful tool for understanding the mechanics
of strategic interaction. For many social problems, this is an elucidating per-
spective. However, strategic interaction is but one aspect of social life. People
do not only care about their individual well-being, however defined. It is equal-
ly justified to portray them as social animals (Aristotle and Kenyon, 2003). As
such, they care about relative position, not only about absolute utility (Tversky
and Simonson, 1993). This is how the empirically strong fairness inclinations
differ from preferences (Fehr and Schmidt, 2000). Also, not all social problems
are exclusively motivational in nature. Often, forging a joint understanding
of the situation is at least as important (Heiner, 1983; Engel, 2005). Under
real-life conditions, analyzing the underlying conflict of interests is often not
paramount. It would only matter once open, violent conflict has been tamed
(Farnsworth, 2000; Engel, 2003).
Such objections would be less important, were there sufficiently powerful
conceptual tools for drawing alternative analytic pictures. Admittedly, due to
developments like behavioral economics, the situation is improving (see, e.g.,
Fehr and Schmidt, 1999; Tirole, 2002). But it is still far from balanced. This is
not surprising. Scientific disciplines are social endeavours. This makes them
path dependent (Kuhn, 1962). Economics has been extreme in this respect. For
more than a century, buying into the rational choice model has been the easi-
est way to make a career in the field. This deliberate narrow-mindedness has
resulted in the outstanding quality of rational choice analysis. It is unmatched
by any alternative approach in the social sciences. This explains why ratio-
nal choice has been so successful in invading not only law, but also political
science (e.g. Scharpf, 1997) and sociology (e.g. Coleman, 1990). Ironically,
excellent quality is nowadays the strongest impediment to embracing rational
choice methodology in the law. When lawyers do so, they must strive hard to
balance out rational choice findings. The competing aspects or concerns can
hardly ever be formulated in comparable quality.
Much of the reluctance to integrate rigorous methodology from the social sci-
ences into legal reasoning may be put down to one difference: social scientists
and lawyers have different tasks. Social scientists want to explain social phe-
nomena. They want to test their hypotheses. Occasionally, they also engage
in prediction. Lawyers, however, want to take decisions. Of course, not all
lawyers have decision-making power. Judges, administrative authorities and
the legislator do. Counsels and the Attorney General take part in a formal pro-
cedure that leads to decision making. When they help the parties draft legal
instruments, lawyers anticipate future authoritative decisions, or they prepare
178 Who Owns Knowledge
to prevent them. A similar subsidiary role for future decision making is also
assumed by all those academic lawyers who do doctrinal work.
The task difference has many facets. Both tasks have different objects (treat-
ed in Section a below). In decision tasks, implicit knowledge plays a legitimate
role (Section b). The different tasks are accompanied by different disciplinary
norms (Section c). Methodological orientations differ profoundly. While most
social science aims at falsification, most legal science is hermeneutical (Sec-
tion d). The social sciences and law differ in their attitudes towards certainty
(Section e) and social construction (Section f). While the majority of social
scientists take objectivity to be the supreme goal, lawyers predominantly pur-
sue truth (Section g). This difference translates itself into a very different role
of judgment (Section h). While social scientists are observers, most lawyers
explicitly or implicitly are actors (Section i). The differences play themselves
out with respect to all the elements of the process of decision making (Section
j).
a. Object of study. The theory/practice divide has many facets. It starts with
the object of study. Ultimately, all legal work must be helpful in deciding cases.
It is thus a real-life conflict that determines relevance. The more rigorous the
method, the more remote the concrete conflicts become from work in the social
sciences. As illustrated by most papers published in the esteemed economics
journals, the standard topic in the social sciences is one precisely defined causal
or interdependent relationship. Metaphorically speaking, a social scientist ex-
cels in making everything black or white. Contrary to this, lawyers are masters
in handling superimposed shades of grey.
Precision comes at a price. “The best theory depends on one’s trade-off
between parsimony and fit” (Harless and Camerer, 1994:1285). There is thus
a trade-off between quality and scope. High-level precision results from de-
contextualization. All models rest on assumptions. They need not be coun-
terfactual, but they are bound to be less complex than the real-life phenom-
enon under study. All social science is an exercise in strictly controlled partial
analysis. Sharp conceptual tools from the social sciences allow us to see im-
plications that would remain fuzzy, if not invisible, otherwise. Mathematics
in particular permits us to exactly handle a degree of complexity unmatched
by verbal discourse. Take marginal analysis, or the analysis in n-dimensional
space as illustrations (more from Simon and Blume, 1994). But along with
mathematical formulation, many of the nuances of the real-life phenomenon
get left aside. Consequently, mathematical modelling, like any other rigorous
analytic method, imposes a stricture on legal decision-making that is absent in
the traditional, doctrinal mode. Of course, nuances might come back if several
models are applied to one and the same phenomenon. But this requires a level
of expertise unlikely in lawyers, and often not present in social scientists either.
Rigorous Descriptive Social Science in the Law 179
When they adopt social science methods, lawyers thus run the risk of defining
the problem in an inappropriately narrow way. They are in danger of trading
macro adequacy for micro precision.
A related point is this: most social scientists are better at sophistication in
modelling than they are at the art of modelling (for a nice exception see Haller-
bach and Spronk, 2002). Their disciplinary background tends to pay them a
smaller premium for sensitivity with respect to ecological validity and robust-
ness. This may lead to an inappropriate focus on the existing, well-developed
models. Typically, modelers are not particularly inclined to develop new mod-
els from scratch in order to capture a hitherto neglected, but ecologically im-
portant, aspect of reality.
b. Openness to implicit knowledge. Most people successfully navigate their
social relations with very few if any conceptual tools from the social sciences to
support them. This by no means implies that these conceptual tools are wrong
or inappropriate. But the observation is evidence of the fact that people know
many things implicitly that social scientists have been able to couch in rigorous
terms. In this respect, lawyers are typically like lay people. Very often, when
the social sciences come up with a new brilliant insight, some lawyers grumble:
we knew it all along. Of course, with precise terms, one understands a phenom-
enon much better (Cowan et al., 2000). Also, the fact that some lawyers in some
conflicts have found it useful to bring forward an argument does not mean that
it has become the acquired wisdom of the legal community. But the observa-
tion has a disturbing implication. The lawyers, and lay people for that matter,
knew it even before the social sciences had forged the tools. There is no reason
to believe in the impossibility of further progress in the social sciences. Con-
sequently, openness to implicit knowledge insures the law against falling prey
to the current inabilities in the social sciences. More disturbingly even, there
may be a trade-off between precisely handling what is already understood, and
neglecting what is not. The higher the premium on methodological rigor in the
law, the more difficult it becomes to harness the existing implicit knowledge to
improve decision quality.
c. Different disciplinary norms. Science is a social endeavour; the point has
already been made. It has a further implication. All social interaction relies on
social norms (March and Olsen, 1989; E.A. Posner, 2000). Science is no ex-
ception to this. Disciplinary norms provide individual scientists with a bench-
mark. For instance, economists learn that the easiest way to earn themselves
praise and a career is with advanced mathematical modelling. Their discipline
thus teaches them to develop a taste for conceptual high-tech. When they select
a topic, they choose it such that it allows them to demonstrate their modelling
skills. The professional norm for the law is different. It is to treat the parties as
best one can.
180 Who Owns Knowledge
Along with this goes what has long been called professional deformation
(Langerock, 1915). Having recourse to the categories dominant in one’s field
is no longer a conscious decision. Professional training has endowed the indi-
vidual with a selection bias. For instance, a good economist becomes hyper-
sensitive to incentive problems. After a while, it becomes difficult for her to see
the world through a different lens. The social sciences themselves are rightly
not too much concerned with such observations. Ultimately, such blinkers may
even spur disciplinary progress. But for the decision-making task of the law,
bias and narrow-mindedness are much less acceptable.
d. Falsification vs. hermeneutics. The difference between explanation or
prediction and decision making translates itself into a fundamental difference
in methodology. At the heart of the scientific method is falsification (Popper,
1935). The standard design is a hypothesis, derived from a thorough theoreti-
cal framework, and tested empirically. Predictions are derived from hypoth-
eses tested in other contexts. Recently, there have been attempts to reintroduce
hermeneutics into the social sciences. But this is a vigorously disputed affair
(Mantzavinos, 2005). The law could not be more different. Many lawyers may
not have heard of the term, let alone read the philosophical classics (canonical
Dilthey, 1923). But most of them have had access to disciplinary adaptations
(remarkable Engisch, 1983).
Most importantly, however, hermeneutics is what lawyers are doing day to
day when applying doctrine. This is most obvious in the civil law countries.
Here, the typical source of law is statute. The general, abstract rule is applied
to the case. The case is bound to possess many more features than are relevant
for the rule. Actually, solving the case is an exercise in looking back and forth
between the body of rules and the features of the case. A decision is reached
when both can be matched by what legal methodology calls a syllogism. Actu-
ally, doctrine in the common law countries is not fundamentally different. The
only difference is this: in a first step, the abstract rule must be distilled from
previous decisions.
Hermeneutics is fundamentally different from falsification. Hermeneutics
is a matching exercise. In going through the hermeneutical circle, both the
(statutory) text and the facts of the case remain fairly flexible. It is only after
the decision maker has settled down for one specific match between a certain
reading of the text and a certain selection of the facts that the relationship
between text and facts can be exactly described. The chosen match is next to
never just right; it is the best this legal actor has been able to come up with.
After the fact, it may not seem difficult to integrate descriptive methods from
the social sciences. They show up at a precise point of either the establishment
of the relevant facts, or the interpretation of the pertinent rules. But for the
hermeneutical method, process is at least as important as outcome. And the
Rigorous Descriptive Social Science in the Law 181
10 Actually, the test as described does not show causality, but only a correlation be-
tween A and B. If there is nothing but this test, it is equally likely that B has caused
A, not the other way round.
182 Who Owns Knowledge
citadel. Contrary to this, the legal constructions of reality are much more flex-
ible. If plaintiff finds a witness for the conclusion of the contract before the
court ruling becomes binding, he may successfully appeal. The influence of the
leading case on lawyers’ mind sets may be overcome by a new, equally graphic
case. One field of reference may oust its predecessor and mold the general
rules according to its own needs. This is what social security lawyers are cur-
rently trying to do with German administrative law (e.g. Axer, 2000). Put dif-
ferently, the law is not only acquainted with social construction. It also has its
disciplinary routines for getting rid of it. This makes it difficult for the law to
buy into the explicit or implicit constructions that come with the methodology
of the respective social sciences.
g. Objectivity vs. Truth. If they are not into discourse analysis, most social
scientists would only grudgingly admit that they are engaged in social con-
struction at all. If asked for the professional standard, most of them would
say: objectivity. This is, at least, how they justify far-reaching decontextualiza-
tion and replicability as standards in experimentation. There is good reason
to argue with all these (e.g. Leamer, 1983). The philosophical counterclaim
is the already mentioned idea that all science is social in nature (see again
Kuhn, 1962). In more pragmatic terms, the history of sciences demonstrates
how costly the strict goal of objectivity actually is. These critics rightly insist
on the importance of science as practice for scientific progress (Daston, 1999).
But when they adopt the rigorous methods from the social sciences, lawyers
inevitably buy into the prevalent belief in objectivity.
It matches poorly with legal decision-making. The most obvious difference
is to be found in court procedure. In many countries, the ultimate criterion for
the assessment of facts is not objective truth, but the subjective conviction of
the judge or jury. The French have coined the term conviction intime for this
(more from Demougin and Fluet, 2005); see also Schulz, 1992.
h. Role of judgment. Many lawyers believe that formal methodology and
judgment are opposites. This is not true. An econometrician permanently ex-
ercises judgment: when composing the sample; when defining the probability
model against which the data is tested11; when cleaning the sample from outli-
ers; when selecting the robustness checks, and so forth. Likewise, a modeler
exercises a good deal of judgment: Which aspect of the real-world problem
lends itself to rigorous modelling? Is there a standard model that helps make
the point? Which are the best assumptions? Judgment thus is entailed in the
already mentioned art of modelling. There is, however, a pronounced differ-
ence between judgment in the descriptive social sciences and judgment in legal
decision-making. In formal analysis, judgment is mainly up front. It is in the
setup of the analysis, not in the analytical mechanics. In law, however, judg-
11 Say equal distribution, or normal distribution.
184 Who Owns Knowledge
ment is on line. Lawyers are trained to check each and every substantial and
procedural move while they are taking it. If it appears to lead the final outcome
astray, there is always a doctrinal degree of freedom to readjust things.
The statement needs qualification. In science, no less than in law, one should
distinguish the context of discovery from the context of representation (Pop-
per, 1935:§ 1 I 3; Ziman, 2000; Engel, 2004a). If one is interested in science
as a practice, one is very likely to find on line judgment. The scientist changes
the design on the fly when it dawns on her that the original idea is doomed
to failure. The actual difference is thus in the context of representation. The
scientific community expects a clean paper. The legal community, however,
is prepared to read the major judgmental interventions in the written reasons.
Legal judgment is thus not exercised in camera. Discussing judgment is the
main purpose of the professional legal discourse. The more law opens itself up
to the methodology of the social sciences, the more this disciplinary practice
would have to change.
A related point concerns creativity. Of course, all academic work is about
creativity. If there is nothing new in an academic product, it is not worth pub-
lishing. But creativity has a very different status in the two contexts. In a stan-
dard product from the social sciences, there is one new idea. It drives the pa-
per. In the introduction, the author explains why the point is important in the
broader framework of the discipline. The core of the paper presents the idea
in the necessary detail. Often, the conceptual claim is also tested empirically.
Put differently, in such a paper, creativity is mainly exercised before the actual
work starts. In doctrinal legal work, creativity is ubiquitous. A single case may
require a lawyer to take dozens of subtle moves. In all but the most simple
cases, the final product is idiosyncratic. Creativity is needed on many of the
doctrinal bifurcations, and even more so in the composition of the entire path
to the result. If formal methodology is introduced into legal decision-making,
these regular openings for creativity would disappear.
The different attitude towards judgment and creativity translates itself into
different disciplinary standards for elegance. Again, lawyers tend to believe
that they are the only ones who have a professional taste for beauty. To them,
mathematical exposition is bloodless technocracy. They are highly surprised
when they hear mathematicians, or social scientists for that matter, talk about
the elegance of a proof. Yet, in the law, beauty is a very different animal. It may
be found in the composition of the decision or of a manuscript. But it is above
all the beauty of the language that is admired. For a lawyer, rhetoric does not
earn her blame, but praise. Lawyers are educated to win over their public with
whatever linguistic means they deem fit. This cultural trait is quite functional.
It stems from the fact that legal decision-making is open to whatever argument
seems relevant. This not only holds for normative claims; it is relevant for the
Rigorous Descriptive Social Science in the Law 185
presentation of the decisive facts as well. The openness to rhetoric goes back
to the need to generate acceptance for the decision. This would become much
more difficult were the law to use formal language.
Finally, the different role of judgment has an effect on the characteristic
objects of trust. Scientists trust method, lawyers trust judgment. Consequently,
scientists do not primarily doubt the final outcome. It logically follows from
painstakingly applying method. Method thus determines the degree of reli-
ability in an intersubjective way. In contrast to this, lawyers primarily have
doubts about the adequacy of the final outcome. Their trained reflex is this: the
outcome may well be wrong, despite the fact that no methodological mistakes
have been committed. The hermeneutical method provides so much leeway
that it cannot itself guarantee the acceptability of the outcome. If they were to
embrace rigorous methodology from the social sciences, the lawyers would
have to change their attitude towards methodology. They would have to start
discussing decision quality, and the assessment of the facts in particular, in
terms of methodology, not only in terms of the appropriateness of the outcome.
In the long run, this might be feasible. But it would require a long period of
collectively learning how to maintain the judgmental component that is funda-
mental to legal decision-making.
i. Observer vs. actor. Social scientists are observers, lawyers are actors (on
the distinction see Spencer-Brown, 1969). This is obvious for practising law-
yers, but it typically also holds for academic lawyers. When they do doctrinal
work, legal practice is not merely an object of study for them. They conceive
of themselves as part and parcel of the legal community.
The ultimate goal of good science is better understanding. The ultimate
goal of good legal practice is better decision making. Of course, good decision
making requires understanding the issue at hand. But for practising lawyers,
all understanding is part and parcel of the hermeneutical exercise. It is only
pursued in the interest of rendering an acceptable decision. Consequently, for
a legal actor, “a contribution to the understanding of” is a useless thing. This,
however, is the best rigorous methodology can yield. Moreover, legal actors
must assume responsibility for their decisions. Again, this also holds for le-
gal academics. If they change their opinion, their colleagues ask for sufficient
justification. If there remains doubt, they lose credit in the field. Personal re-
sponsibility for an outcome does not marry well with rigorous methodology. In
science, it would be difficult to defend a methodological blunder by a satisfac-
tory outcome. This, however, is what lawyers are rightly expected to do. One
may even push the point one step further. All legal decision-making is inher-
ently political. Consequently, in the law, generic knowledge is instrumental. It
is used to the extent that it serves the politically legitimate purpose. If social
scientists are caught doing the same thing, they are rightly criticized (Weber,
186 Who Owns Knowledge
1967). If they adopt the methodology from the social sciences, lawyers are also
likely to inherit the aversion against policymaking. This would be contrary to
their decision task.
Related to this, science rightly assumes strategic interaction away. There are
strict moral rules about scientific practice, and credible sanctions in the case
of scientific misconduct. In legal procedure, however, strategic interaction is
taken for granted. This also holds for the way academic work is introduced into
procedure. If a law professor writes an opinion on behalf of one of the parties,
she may not be openly partial. But everybody expects her to explore, if not ex-
tend, the doctrinal limits to the benefit of the party represented. Again, if social
science methodology were introduced into legal decision-making, it would be
hard to prevent the strict moral rules from being applied as well. That would,
however, be dysfunctional in the legal context.
6 Practical Reasoning
q; if p then q; therefore p.
We have a presumptive reason for performing the action. This presumption can,
however, be challenged and withdrawn. Subjecting our argument to appropriate
challenges is how we hope to identify and consider the alternatives that require con-
sideration, and determine the best choice for us, in the particular context. . . . Whether
this presumption stands or falls depends on satisfactory answers being given to the
critical questions associated with the scheme. (Atkinson et al., 2004:88)
Actually, the norm for good presumptive inference could be directly taken
from a civil procedure textbook. Initially, a simple statement suffices. If the op-
ponent objects, reasons for the statement must be given. “When the proponent
puts forward a presumption, she does not have to back it up with proof, but she
does have to give it up if the respondent can disprove it” (Walton 2001:156).
Introducing the formal methods of the social sciences in court is thus much
more than an invitation to change culture or taste. It requests that lawyers swap
theoretical for practical reasoning. Since their task is not to advance our under-
standing of the world, but to rule in it, this would clearly be a mistake.
The foregoing has explored the norm judicial decision-making should follow.
But do judges actually do so? The existing evidence does indeed point in this
direction (discussed in Section a below). The underlying mental mechanisms
can be characterized in two different ways. If one exclusively looks at deliber-
ate reasoning, judicial decision-making can be largely described by the psy-
chological concept of holistic thinking (Section b). This should, however, be
Rigorous Descriptive Social Science in the Law 189
put into the broader context. Man possesses more than one decision mode, and
judges routinely have recourse to several of them simultaneously (Section c).
Based on this, the effects of introducing formal methodology can be analyzed
(Section d).
a. Phenomenology. The key to judicial decision-making is controlled in-
tuition. Lawyers are permanently engaged in making sense of the available
information (cf. Turner, 2001). They want to know whether the stories they are
told by the parties are convincing.12 They see it as their task to construct a story
of the events that comes as close to reality as is feasible, given the concrete
circumstances of the legal decision being taken (Pennington and Hastie, 1997);
see also (Bruner, 1990; 1997). They want to know whether a factual statement
is credible and whether the concomitant doctrinal claim is plausible (cf. Chater
and Oaksford, 2004:48). In all of this, they rely on common sense (Feigenson,
2000:13 f., 44). In principle, they go about their judicial task the same way as
they assess situations in everyday life (Feigenson, 2000:110). They fill in the
existing evidence with their general world knowledge (Meyer, 1994; see also
Bruner, 1973). It thus is natural for them to decide on an incomplete factual or
conceptual basis (cf. Chater and Oaksford, 2004:44).
Judges routinely have recourse to soft concepts like exemplars (cf. Bandu-
ra, 1986:103; Anderson, 2000:348), schemata (cf. Bartlett, 1932:206, 212 and
passim; Anderson, 2000:347 f.), scripts (cf. Schank and Abelson, 1977) and
prototypes (Feigenson, 2000:50); see also (Cantor et al., 1982; Lakoff, 1987).
They are not hostile to scientific knowledge, but they usually rely on the folk
version (Steiner et al., 1999). Finally, for a judge, cognition and responsibility
are closely intertwined (Feigenson, 2000:88). Cognition is thus not a distanced
affair. It is undertaken in light of the final output and whether the judge feels
able to take on responsibility for this. Eventually, judges want to feel right
about their decision. They strive for congruence between cognition, emotions,
and the final decision (Feigenson, 2000:69–86).
b. Holistic thinking. There is a striking parallel between these stylized facts
about judicial decision-making and what has in psychology been called holis-
tic thinking (Nisbett et al., 2001); see also (Stich, 1990; Stein, 1996; Chater
and Oaksford, 2001). It in general is more prevalent in Eastern than in West-
ern societies (Nisbett et al., 2001), but it is also present in Western concepts
of wisdom (Baltes and Staudinger, 1993). Characteristic features of holistic
thinking are: Experiential knowledge is more important than formal logic. The
emphasis is on plausibility and on sense experience (Nisbett et al., 2001:301).
Typicality matters more than rigor (Sloman, 1993). If they are in conflict, ho-
12 This does, of course, not exclude the alternative strategy, often used by the de-
fendant, to repel the claimant’s case point by point; more on this by Feigenson
(2000:97).
190 Who Owns Knowledge
listic thinkers trust their beliefs more than logical validity (Wilkins, 1928; Ev-
ans et al., 1983). They are not disturbed by contradiction (Geertz, 1983). They
react to it by dialectically opposing competing views of the matter (Nisbett et
al., 2001:301). They implicitly assume reality to be dynamic and changeable
(Feigenson, 2000:13). Causality is seen as a complex function of multiple fac-
tors operating on an object in a field (Nisbett et al., 2001:306).
Due to this, holistic thinkers are prepared to find as wrong today what
seemed right yesterday (Nisbett et al., 2001:301). They do not go after the one
logical conclusion. They rather strive to detect degrees of covariation (Nis-
bett et al., 2001:306). Consequently, holistic thinkers are hungry for more sup-
porting information. They are willing to heavily rely on their general world
knowledge (Oaksford and Chater, 1998). However, a second, weaker argument
does not increase, but decreases, their confidence in a statement (Nisbett et
al., 2001:302). Holistic thinkers are sensitive to small variations in the envi-
ronment (Feigenson, 2000:14 f.). The rationale for deciding in favor of one
perspective over the other tend to be extremely subtle and elaborate, but at the
same time incomplete and unsystematic (Chater and Oaksford, 2004:43).
The features listed indicate why attempts to formalize everyday reasoning
have failed (Chater and Oaksford, 2004:44 f., 68). Such attempts have been
undertaken in artificial intelligence, with the hope of later endowing computers
with the ability of practical reasoning (Pylyshyn, 1987; Pearl, 1988; Ford and
Pylyshyn, 1996). The main problem stems from the fact that holistic thinking
engages knowledge that is inextricably entangled with further knowledge. It
therefore is not possible to break it down into packets that could be processed
by machines (McDermott, 1987; see also Fodor, 1983).
The general attitude towards thinking translates itself into what has been
called folk science (Keil, 2003). People understand the world around them
to a much lesser degree than they think. They thus fall prey to an illusion of
the depth of their knowledge (Keil, 2003:368). Instead, they rely on “intuitive
theories” (Keil, 2003:368). People generally treat the world the same way that
the ordinary user treats the hardware and the software of her computer. They
know how to handle it for the kind of tasks they frequently face. From this
knowledge base, they can draw useful analogies. But they typically know next
to nothing about mechanism (Keil, 2003:370). Specifically, they underrate the
amount of information they retrieve on line from the respective context (Keil,
2003:372). Moreover, folk-scientific knowledge is often implicit in the first
place (Keil, 2003:370).
c. Combination of several decision modes. Deliberate reasoning is not the
only tool for decision making. Humans dispose of a plurality of decision modes
(Weber and Lindemann, 2002). Others speak of a mental toolbox (Payne et al.,
1988; Gigerenzer and Selten, 2001). It runs from the most primitive decision
Rigorous Descriptive Social Science in the Law 191
modes like reflexes (e.g. Blau and Blau, 1955) over parsimonious, but context-
rich heuristics (Gigerenzer et al., 1999) to fairly complex, task-specific skills
that may be triggered by just one cue (Anderson, 2000:chapter 9).
The plurality of decision modes allows humans to capitalize on different
mental and external resources. If appropriate, they can use external devices
for the provision of information, for memory, for execution and even for the
actual decision making. Mentally, serial processing according to the laws of
logic is not the only ability. Along with it goes intuition (Strack and Deutsch,
2002). It may best be explained by the capacity of parallel processing, which
is largely exercised at the subsymbolic level (Lovett and Anderson, 2005; see
also Glimcher, 2003).
Judges do not decide by reflex. Hopefully, judicial decision-making by a
rigorously simplified heuristic is a rare event (but see Dhami and Ayton, 2001).
This is, however, not to say that judicial decision-making is nothing but delib-
erate reasoning. It is more appropriate to view judicial decision-making as a
fairly elaborate skill. A parallel extensively studied by psychologists is play-
ing chess. Although the confines of the board and the permissible moves are
all precisely defined, sheer complexity makes it impossible to just calculate.13
Instead, experienced chess players have stored a rich array of typical patterns
in memory. Deciding between these patterns is usually more a matter of feel-
ing than of knowing. This is not to say that chess players do not reason. But
their reasoning is more local in character. It may be characterized as the finish
to a decision-making process, which musters other mental resources as well
(Groot, 1965).
d. Impact of formal social science on judicial decision-making. In East-
ern societies, decontextualizing practices are disapproved of (Nisbett et al.,
2001:301). Formal rationality appears alien to those accustomed to everyday
reasoning (Chater and Oaksford, 2004:46). Since judicial decision-making has
been demonstrated to be in the neighborhood of contextual, everyday reason-
ing, the prevalent reluctance of lawyers to rely on the rigorous methods of the
social sciences should be less of a surprise. The psychology of judicial decision-
making does not lend itself to this kind of reasoning.
Moreover, by incorporating elements of rigorous methodology, judges
might impair the proper functioning of the predominant decision mode. The
following line of argument supports this concern:
Social organization directs attention to some aspects of the field at the expense of
others. What is attended to influences metaphysics, that is, beliefs about the nature
of the world and about causality. Metaphysics guides tacit epistemology, that is,
beliefs about what it is important to know and how knowledge can be obtained.
8 Doctrinal Impediments
However, the need for a doctrinal opening creates a problem of double stric-
tures. For a judge, the first and foremost stricture is in the text of the applicable
provisions and of the interpretive tradition attached to it. Quite frequently, a
good deal of creativity is required to bring the facts of the conflict of life under
a pertinent provision. It thus is not enough for a judge to find a good solution to
the underlying conflict. This solution must go through the conduit of a host of
doctrinal restrictions. It is no easier to design a rigorous model that captures the
essence of the conflict of life. It is equally demanding to design an experiment
that makes it possible to uncover an essential feature of the case according to
statistical standards.
If formal methods are introduced in court, both these strictures must be met
simultaneously. This is bound to be challenging. Moreover, the more credit
given to social science methodology, the more judges might be attracted to
doctrinal carelessness. This would impair the rationalizing effect that doctrine
has for law. Judges might be tempted to disregard normatively relevant features
of the case that are not captured by the social science methods applied in order
to avoid double strictures. One may also put the conflict between doctrine and
social sciences methods this way: both must stylize facts, both must construct
reality, both must partly decontextualize, but normally not the same way.
9 Procedural Impediments
Likewise, the formal rules for judicial procedure may make it difficult to in-
corporate social science methods (cf. Eidenmüller, 1995). The most obvious
impediment is in the rules for access to facts. In principle, the court is not free
about how to inform itself about the case or the underlying social conflict. The
court must wait for the parties to make statements. If the parties agree on a
fact, the court may, in principle, not question the veracity of this statement. If
a statement is disputed, in principle, the only way for the court to learn more
about reality is through formal proof.
Formal proof in court is ill-suited to generate the kind of facts a social scien-
tist would want to know. It is true that proof may be extended to facts transcend-
ing the case. For instance, the facts of a related conflict may be investigated if
that is the only way to assess the veracity of the disputed statement concerning
the case itself. But in statistical analysis, many facts are only needed in order
to fulfil methodological needs. It is hard to imagine that a court should oblige
hundreds of outsiders to make data available in the interest of getting at signifi-
cance. Likewise, procedural rules would not possibly allow strict methodologi-
cally controlled experiments with outsiders against their will. Generating new
generic knowledge is not a problem court procedure is made for. However, this
is what the social sciences focus on.
194 Who Owns Knowledge
Often, one and the same observation can be made in different conceptual lan-
guages. This is not a waste of energy. Through the different lens, different
aspects of the phenomenon become visible. Since the additional language is
taken from a different background, different analogies are triggered. Above,
the role of formal social science in the law has been regarded from an individu-
alistic vantage point. It has predominantly been the perspective of the judge,
occasionally also the perspective of other actors in the judicial procedure. The
same question may also be asked from a systemic perspective. Will the integra-
tion of formal social science hamper the ability of the legal system to fulfil the
social function entrusted to it?
If one asks this question in the abstract, it is natural to rely on systems
theory for the response. It is clear-cut. In Niklas Luhmann’s theory, science
and the law are two different subsystems (Luhmann, 1990; 1993). Like all
subsystems, they are distinguished by their use of a unique code. Science is
16 This is not to say that jury decision making could not be reduced or abolished.
Comparative law demonstrates that different legal orders think quite differently
about the desirability of juries. But the ability of the court system to handle social
science methodology would probably not be the most important concern in such a
shift.
Rigorous Descriptive Social Science in the Law 197
organized along the distinction between true and false. The law is organized
along the distinction between legal and illegal. The characteristic feature of a
subsystem is autopoiesis. The subsystem decides autonomously whether an
input from a different subsystem is relevant, or just noise. In principle, for the
receiving subsystem, neither intention nor clout in the sending subsystem mat-
ter. Applied to the interface between social science and the law, in principle,
the law might rightly ignore a social scientist who claims she is able to better
understand the legal conflict. If social scientists frown at the quality of legal
argument, lawyers could well respond that this is none of their business. The
point should, however, not be overstated. Systems theory does not claim that
the law must ignore all statements by social scientists. It only insists that the
norm for choosing between openness and closure must exclusively be a legal
one. Specifically, if this is necessary for the viability of the legal system, it is
not only entitled to disregard social science methodology. This is even what it
ought to do.
It may indeed be argued that taking the social science methodology on
board might have a negative effect on the smooth functioning of the legal sys-
tem. Tongue in cheek, lawyers sometimes say: there is no topic that would be
beyond me. Not so rarely, this is just hubris, if not mere ignorance. Nonethe-
less, there is a kernel of truth to it. The legal system is permanently faced with
novel situations and conflicts. It could not possibly wait to regulate them until
scientists think they have sufficiently understood them. The individual judge
is constitutionally obliged to decide whatever case is brought before her, as
long as jurisdictional demarcations are respected. She cannot call in another
judge on grounds of insufficient skill or understanding. The constitutional rule
has been introduced because there are so many degrees of freedom in legal
decision-making. Therefore, it should be determined who is going to decide
even before the case has occurred. At the margin, the court system responds
to the ensuing problem of subject-matter competence by specialization. For
instance, in many German civil courts, there is a special bench for disputes
over medical malpractice. However, the methodological demands in a field of
law may not be pushed beyond a level that ordinary judges are able to capture
(Hoffmann-Riem, 2001:15).
Related to this are resources. Scientific methods assume potentially unlim-
ited resources. If a researcher lacks the funds or skills, she should select an-
other research topic. Those better prepared should take the question up. If it is
not possible to understand the question in a methodologically acceptable way,
it must wait. Not so rarely, entire disciplines choose a lengthy detour if the true
question seems beyond methodological reach.17 Contrary to this, the resources
17 A good example is behaviorism. In the early 20th century, it was very difficult
to make rigorous statements about the brain in action. Skinner (1938) therefore
198 Who Owns Knowledge
available to decide one given case are bound to be limited. This not only con-
cerns money and education, but above all time. The legal system at large can
muster many more resources. Through inputs from individual cases, gradually
a body of knowledge about how to handle a new class of disputes can accumu-
late. But this too must happen within a reasonable time framework.
In comparison to science, the legal benchmark is much more flexible. Of
course, there are methodologically unacceptable statements in the law. But the
threshold is a fairly low one. Once it is overstepped, subtle rules of thumb are
applied. If a statement is acquired wisdom in the legal community, it need only
be referred to. If one introduces a piece of new knowledge into legal discourse,
it is enough to show its plausibility. If this piece is disputed, the knowledge
must be corroborated. This may be done by further argument, or by reference
to authorities. Scientists do frequently play that role in legal procedure. The
highest standard is to be met if a lawyer challenges acquired wisdom. Even
the lower courts would often refrain from such statements, and rather have the
losing party appeal. It would not be easy for the legal system to maintain this
flexibility if formal methodology from the social sciences were introduced. For
it is the very purpose of rigorous methodology to provide science with a strict
benchmark.
In ideal types, the legal method is bottom up, not top down. Law is best at
gradually building an understanding of a more abstract issue by deciding a host
of cases, each in its full context of origin. This, for instance, explains why the
courts often try to decide “as close to the facts as possible.” By this, they mean
that sweeping statements should be withheld where there is potentially insuf-
ficient understanding. Of course, scientific texts explicitly state the conditions
under which the results hold, but scientific investigation is undertaken in the
interest of uncovering general statements. Routinely, scientific papers start by
a general hypothesis derived from an explicit theoretical framework. In this
sense, scientific investigation is top down. If it opened itself up to social sci-
ence methodology, law would have to shift to this approach.
On an even more pragmatic level, social science methodology would be
driving a wedge between the lower and the higher courts. Due to a lighter case
load and more resources, eventually the higher courts might be able to live up
to these standards. However, the lower courts could not possibly follow suit. In
civil affairs, a single judge in a German Court of First Instance (Amtsgericht)
has a docket of more than a thousand cases per year. Likewise, the strict meth-
odological standards of the social sciences would drive a wedge between legal
urged psychology to leave its very object of study aside. It should no longer spec-
ulate about what happens within the brain, and it should focus on observable
input-output relations instead. The position held sway over the discipline until the
cognitive revolution some 20 years later (Chomsky, 1959).
Rigorous Descriptive Social Science in the Law 199
In court practice, attorneys often follow a simple heuristic of tallying. If the op-
ponent’s attorney has written a brief of 100 pages, they respond with 110. They
are afraid a short response might convey the impression that their reasons carry
less weight. This paper ignores the legal rule of thumb. It uses fewer words
to argue for the integration of formal social science into law than to argue
against it. This is not to say that the case for rigorous methodology is doomed
to failure. But this case has often been made already. Actually it is behind the
entire program of formal law and economics (see R.A. Posner, 2003; Cooter
and Ulen, 2004) and of the statistical analysis of legal issues (e.g. Klerman
and Mahoney, 2004). Even worse, I have already written on the topic, and do
not want to repeat myself (Engel, 1998b). Suffice it therefore to briefly recall
the key arguments, and to put some of the arguments against the integration of
formal social science in perspective.
The prime reason for openness is straightforward. Precision is no value as
such in legal decision-making. But materially wrong decisions are not accept-
able. Rigorous methodology provides the law with a better understanding of
the issue at hand. It prevents the courts from falling prey to their untrained
intuitions, or even from being strategically misled by one of the parties. For-
Rigorous Descriptive Social Science in the Law 201
rhetorically put into contexts for which they do not hold. Ultimately, such use
may be acceptable if it helps the law to do a better job in decision making. But
there is considerable danger that legal decisions are indeed materially misled
that way.
How can the law reap the benefits of formal social science without putting
its core functions at risk? Which are the necessary filters (Hoffmann-Riem,
2001:16)? How can the distance be bridged (Hoffmann-Riem, 2004:60-62)?
There is no one-size-fits-all answer to these questions. The integration of rigor-
ous methodology into law is an art, not a science. Given the many legitimate
concerns listed above, every new case, every new topic and every new aca-
demic paper must find the individually best way to carry off the integration.
The following generalizations are no more than indicators. Whether they fit,
or whether new and better ways are found, must be left to the inventiveness of
those who are actually doing it.
If lawyers are overwhelmed by complexity, their standard response consists
in replacing substantive by procedural governance. If an administrative agency
is granted discretion, the judicial control of decision-making procedure in the
agency becomes all the more stringent. It has been suggested that a similar
mechanism be used to handle the interface between formal social science and
the law. Rigorous methodology should be admissible in court only if a statute
permits the courts to rely on it (Eidenmüller, 1995). This can hardly be con-
vincing. One may already question whether the legislator understands formal
social science any better than the courts. At any rate, the legislator is not likely
to adequately administer the interface between science and judicial decision-
making. The responsibility for deciding about the limits of integration must
be with those who are actually struggling with the strictures of applying law
to fact. Moreover, practising lawyers would normally be hard pressed to find
any explicit statement of the legislator. Usually, reading between the lines of
legislative materials is the most they could hope for. If the suggestion were
accepted in practice, it would simply make for more red tape. Before actually
using an argument based on the methodology of a neighboring discipline, the
judge would have to write down a few justifying lines. There would always be
a pertinent statement in the legislative materials if needed.
Not all legal topics are equal. Using a rational choice model to understand
the effects of regulated access by competitors to telecommunications networks
does not seem far-fetched (Engel and Knieps, 1998; Engel, 2002c). Here too,
the legal argument cannot be reduced to this. For instance, rule of law and the
limits of justiciability play an important role. But rational choice modelling is
Rigorous Descriptive Social Science in the Law 203
much harder to digest if applied to, say, criminal sanctions on abortion. The
closer the regulatory concern comes to an issue that naturally lends itself to
a defined conceptual framework of a social science, the more the law has to
gain from opening itself up to the methodological standards of this discipline.
Consequently, the relative weight of the standard legal counterarguments de-
creases.
The two examples illustrate a further natural distinction. In disputes over
network access, an actual or potential competitor desires access to the network
of the incumbent. The competitor may in many respects be weaker than the
incumbent. But competitors are firms, and enforcing access is a central ele-
ment of their business plan. If the law allows for a good deal of methodological
sophistication in deciding about the complaint, this is not likely to generate a
problem of fairness. Both parties will be represented by the best lawyers they
can get. If this is appropriate, these lawyers may bring in economists as ex-
perts. None of this would work in an abortion case.
Another option consists in exploiting the distinction between the generation
and the representation of court decisions. There are, of course, substantial and
necessary links between both (Engel, 2004a). But the reasons for a judgment
are not meant to be a description of the way the court has found it. Rather
the reasons summarize those facts and those arguments that eventually have
turned out to be decisive. Also, the reasons legitimately speak with several
voices. They are meant to convince the losing party that the decision could
not have been otherwise. The parties are to learn what the judgment means for
their future interaction. Higher courts are to be able to control the decision-
making body. Finally, via the reasons, the court contributes to the professional
discourse of lawyers, and to the evolution of law (Engel, 2001a). Against this
backdrop, two options present themselves. The court might well rely on rigor-
ous methods from the social sciences to generate its decisions, but it might
write down a different, easier accessible justification. Moreover, if the court
wants to keep some of the rigor for the written reasons, it might write another
part aiming at less sophisticated readers.
The most important distinction, however, is the one between the court sys-
tem and legal academia. In principle, legal academics might entirely ignore the
concerns listed above, and exclusively contribute to the scientific discourse in
the field from which the rigorous methodology is taken. Actually, this is what
many law and economics scholars have chosen to do. If one does so, the law as
an academic discipline changes its character. It cuts the ties to jurisprudence.
In order to mark the difference, one might speak of legal science, or of legal
studies (cf. the Journal of Legal Studies).
There is nothing to be said against legal science in the sense just described.
It is as useful as studying political institutions and the political process with the
204 Who Owns Knowledge
same conceptual apparatus. But those academics pay a price. They deliberately
stop being actors within the legal system, and become mere observers. The ju-
dicial system will normally pay little attention to what they are doing, and for
good reason. It will be unpredictable whether doctrine will pick up elements of
this scientific discourse. If it does, what arrives in the legal system will exclu-
sively be driven by its own dynamics.
The artistic component involved in integrating social science methodol-
ogy into the law begins when an academic wants to serve the community of
practising lawyers, but also to live up to methodological standards. Such ex-
ercises are necessary, because otherwise no true “division of cognitive labor”
(Keil, 2003:368) occurs. Legal academia is uniquely situated to do precisely
this. It may have access to both communities. From legal practice, and from
those academics even closer to practice, it may learn about doctrinal evolu-
tion and the underlying real-life experiences. From the neighboring discipline,
such academics may not only learn the methodological tools, but also how to
apply them swiftly. Such academics may thus best be understood as interface
actors (cf. Hutter, 1989). It is their self-chosen task to creatively link both
disciplines.
In practical terms, these interface actors must gradually accumulate a body
of experience regarding how to productively integrate rigorous methodology.
The integration is easiest if there is already a doctrinal controversy. Practising
lawyers are likely to pick the results up if the underlying conflict is rigorously
modelled, or if an empirical hypothesis is rigorously tested. However, just writ-
ing down a model in mathematical language, or presenting a regression plot,
will not do. If they are to have an impact on legal practice, such papers need
a substantial introduction, telling practising lawyers how the model is derived
from doctrine. Similarly, the results must be translated into a language spoken
by legal practice.18 A second option starts from a policy problem handled by
law. Due to the policy orientation, the academic will not be able to just use one
scientific concept. Consequently, the result will usually not be methodologi-
cally clean. But such a study may at least integrate more rigorous parts where
this helps understand a crucial element of the issue.19 A third option starts from
a scientific finding or tool and explores its importance for practical law. Such a
paper may easily start rigorously, but it will have to incorporate richer content
in the explorative part.20
These examples demonstrate the concerns about integrating rigorous social
science into law are to be taken seriously. But there is no reason to throw out
18 Although I am not using mathematics, Engel (1998a) is written with this inten-
tion.
19 The best illustration of this approach in my work is Engel (2002a) .
20 For this approach, Engel (2002b) may serve as an illustration.
Rigorous Descriptive Social Science in the Law 205
the baby with the bath water. On the contrary, it is the proper role of legal aca-
demia to serve as an interface actor between the social sciences and judicial
practice. This is a challenging, but a manageable task.
References
Ackerman, Frank and Lisa Heinzerling (2002) “Pricing the Priceless: Cost-Benefit
Analysis of Environmental Protection.” University of Pennsylvania Law Review
150:1553–1584.
Adler, Mathew D. and Eric A. Posner (2000) “Cost-Benefit Analysis: Legal, Economic
and Philosophical Perspectives. Introduction.” Journal of Legal Studies 29:837–
843.
———(1999) “Rethinking Cost-Benefit Analysis.” Yale Law Journal 109:165–247.
Alexy, Robert (2003) “Die Gewichtsformel.“ Pp. 771–792 in Joachim Jickeli, Peter
Kreutz and Dieter Reuter, eds., Gedächtnisschrift für Jürgen Sonnenschein. Ber-
lin.
Anderson, John R. (2000) Learning and Memory: An Integrated Approach. New York,
Wiley.
Aristotle and Frederic G. Kenyon (2003) Aristotle on the Constitution of Athens. Union,
NJ: Lawbook Exchange.
Atkinson, Katie, Trevor Bench-Capon, and Peter McBurney (2004) “Justifying Practi-
cal Reasoning.” Pp. 87–90 in Floriana Grasso, Chris Reed and Giuseppe Carenini,
eds., Proceedings of the Fourth Workshop on Computational Models of Natural
Argument. Valencia.
Axer, Peter (2000) Normsetzung der Exekutive in der Sozialversicherung: ein Beitrag
zu den Voraussetzungen und Grenzen untergesetzlicher Normsetzung im Staat des
Grundgesetzes. Tübingen, Mohr Siebeck.
Baltes, Paul B. and Ursula M. Staudinger (1993) “The Search for a Psychology of Wis-
dom.” Current Directions in Psychological Science 2:75–80.
Bandura, Albert (1986) Social Foundations of Thought and Action: A Social Cognitive
Theory. Englewood Cliffs, N.J.: Prentice-Hall.
Bartlett, Frederic C. (1932) Remembering: A Study in Experimental and Social Psy-
chology. Cambridge: The University Press.
Baumol, William J. (1965) Welfare Economics and the Theory of the State. London:
London School of Economics and Political Science.
Becker, Gary Stanley (1976) The Economic Approach to Human Behavior. Chicago:
University of Chicago Press.
Berger, Peter L. and Thomas Luckmann (1967) The Social Construction of Reality: A
Treatise in the Sociology of Knowledge. Garden City, N.Y.: Doubleday.
Blau, Theodore H. and Lili R. Blau (1955) “The Sucking Reflex: The Effects of Long
Feeding vs. Short Feeding on the Behavior of a Human Infant.” Journal of Abnor-
mal and Social Psychology 51:123–125.
Böge, Ulf (2004) “Der ‘more economic approach’ und die deutsche Wettbewerbspoli-
tik.” Wirtschaft und Wettbewerb 54:726–733.
Bruner, Jerome (1997) “A Narrative Model of Self-Construction.” Annals of the New
York Academy of Sciences 818:145–161.
Bruner, Jerome S. (1973) Beyond the Information Given: Studies in the Psychology of
Knowing. New York: Norton.
206 Who Owns Knowledge
Fodor, Jerry A. (1983) The Modularity of Mind: An Essay on Faculty Psychology. Cam-
bridge, Mass.: MIT Press.
Ford, Kenneth M. and Zenon W. Pylyshyn (1996) The Robot’s Dilemma Revisited: The
Frame Problem in Artificial Intelligence. Norwood, N.J.: Ablex Pub.
Frey, Bruno and Alois Stutzer (2001) “Beyond Bentham — Measuring Procedural Util-
ity.” CESifo Working Papers 492. http://papers.ssrn.com/abstract=268059.
Friedman, Milton (1953) Essays in Positive Economics. Chicago: University of Chi-
cago Press.
Fudenberg, Drew and Jean Tirole (1991) Game Theory. Cambridge, MA: MIT Press.
Gagarin, Michael (1994) “Probability and Persuasion: Plato and Early Greek Rhetoric.”
Pp. 46–68 in Ian Worthington, ed., Persuasion. Greek Rhetoric in Action. London:
Routledge.
Geertz, Clifford (1983) Local Knowledge: Further Essays in Interpretive Anthropol-
ogy. New York: Basic Books.
Gigerenzer, Gerd and Reinhard Selten, eds. (2001) Bounded Rationality: The Adaptive
Toolbox. Cambridge, MA: MIT Press.
Gigerenzer, Gerd, Peter M. Todd, and the ABC Research Group (1999) Simple Heuris-
tics that Make us Smart. New York: Oxford University Press.
Glimcher, Paul W. (2003) Decisions, Uncertainty, and the Brain: The Science of Neu-
roeconomics. Cambridge, Mass.: MIT Press.
Groot, Adrianus Dingeman de (1965) Thought and Choice in Chess. The Hague: Mou-
ton.
Gröschner, Rolf (1998) “Der homo oeconomicus und das Menschenbild des Grund-
gesetzes.” Pp. 31–48 in Christoph Engel and Martin Morlok, eds., Öffentliches
Recht als ein Gegenstand ökonomischer Forschung: Die Begegnung der deut-
schen Staatsrechtslehre mit der Konstitutionellen Politischen Ökonomie. Tübin-
gen: Mohr.
Guthrie, Chris, Jeffrey J. Rachlinski, and Andrew J. Wistrich (2001) “Inside the Judicial
Mind.” Cornell Law Review 86:777–830.
Hallerbach, Winfried and Jaap Spronk (2002) “A Multidimensional Framework for
Financial-Economic Decisions.” Journal of Multi-Criteria Decision Analysis
11:111–124.
Halpern, Joseph Y. and David A. McAllester (1990) “Likelihood, Probability, and
Knowledge.” Computational Intelligence 5:151–160.
Hammond, Kenneth R., Lewis O. Harvey, and Reid Hastie (1992) “Making Better Use
of Scientific Knowledge: Separating Truth from Justice.” Psychological Science
3:80–87.
Harless, David W. and Colin F. Camerer (1994) “The Predictive Utility of Generalized
Expected Utility Theories.” Econometrica 62:1251–1289.
Harman, Gilbert (1965) “The Inference to the Best Explanation.” Philosophical Review
74:88–95.
———(1995) “Rationality.” Pp. 175–211 in Edward E. Smith and Daniel N. Osherson,
eds., Thinking. An Invitation to Cognitive Science III. Cambridge, Mass.: MIT
Press.
——— (2004) “Practical Aspects of Theoretical Reasoning.” Pp. 45–56 in Al Mele and
Piers Rawling, eds., Oxford Handbook of Rationality. Oxford: Oxford University
Press.
Hays, William Lee (1994) Statistics. Fort Worth: Harcourt College Publishers.
Rigorous Descriptive Social Science in the Law 209
Nitsche, Rainer and Julia Thielert (2004) “Die ökonomische Analyse auf dem Vor-
marsch — Europäische Reform und deutsche Wettbewerbspolitik.” Wirtschaft und
Wettbewerb 54:250–259.
Oaksford, M. and Nick Chater (1998) Rationality in an Uncertain World: Essays on the
Cognitive Science of Human Reasoning. Hove, East Sussex: Psychology Press.
Ott, Claus and Hans-Bernd Schäfer (1988) “Die ökonomische Analyse des Rechts —
Irrweg oder Chance wissenschaftlicher Erkenntnis?” Juristenzeitung 43:213–223.
Payne, John W., James R. Bettman, and Eric J. Johnson (1988) “Adaptive Strategy Se-
lection in Decision Making.” Journal of Experimental Psychology 14:534–552.
Pearl, Judea (1988) Probabilistic Reasoning in Intelligent Systems: Networks of Plau-
sible Inference. San Mateo, CA: Morgan Kaufmann Publishers.
Peirce, Charles S. and Kenneth Laine Ketner (1992) Reasoning and the Logic of Things:
The Cambridge Conferences Lectures of 1898. Cambridge, Mass.: Harvard Uni-
versity Press.
Pennington, Nancy and Reid Hastie (1997) “Explanation-Based Decision Making. Ef-
fects of Memory Structure on Judgement.” Pp. 454–481 in William M. Goldstein
and Robin M. Hogarth, eds., Research in Judgement and Decision Making. Cam-
bridge: Cambridge University Press.
Popper, Karl Raimund (1935) Logik der Forschung: Zur Erkenntnistheorie der mod-
ernen Naturwissenschaft. Vienna: J. Springer.
Posner, Eric A. (2000) Law and Social Norms. Cambridge, MA: Harvard University
Press.
Posner, Richard A. (2000) “Cost-Benefit Analysis: Definition, Justification, and Com-
ment on Conference-Papers.” Journal of Legal Studies 29:1153–1177.
———(2003) Economic Analysis of Law. New York: Aspen Publishers.
Posner, Richard A. and Andrew M. Rosenfield (1977) “Impossibility and Related Doc-
trines in Contract Law: An Economic Analysis.” Journal of Legal Studies 6:83–
118.
Pylyshyn, Zenon W. (1987) The Robot’s Dilemma: The Frame Problem in Artificial
Intelligence. Norwood, N.J.: Ablex.
Rachlinski, Jeffrey J. (2000) “Heuristics and Biases in the Courts: Ignorance or Adapta-
tion?” Oregon Law Review 79:61–102.
Rescher, Nicholas (1976) Plausible Reasoning: An Introduction to the Theory and
Practice of Plausibilistic Inference. Assen: Van Gorcum.
Risse, Thomas (2000) “ ‘Let’s Argue!’ Communicative Action in World Politics.” Inter-
national Organization 54: 1–39.
Schank, Roger C. and Robert P. Abelson (1977) Scripts, Plans, Goals, and Understand-
ing: An Inquiry into Human Knowledge Structures. Hillsdale, N.J., New York: L.
Erlbaum Associates.
Scharpf, Fritz Wilhelm (1997) Games Real Actors Play: Actor-Centered Institutional-
ism in Policy Research. Boulder, Colo.: Westview Press.
Schiavone, Aldo (1991) “Der Jurist.” Pp. 99–116 in Anrea Giardini, ed., Der Mensch
der römischen Antike. Frankfurt, Campus.
Schmidt-Aßmann, Eberhard (2004a) Das allgemeine Verwaltungsrecht als Ordnung-
sidee: Grundlagen und Aufgaben der verwaltungsrechtlichen Systembildung. Ber-
lin: Springer.
——— (2004b) “Methoden der Verwaltungsrechtswissenschaft — Perspektiven der
Systembildung.” Pp. 387–413 in Eberhard Schmidt-Aßmann and Wolfgang Hoff-
212 Who Owns Knowledge
Inexplicable Law:
Legality’s Adventure in Europe*
Alexander Somek
The rule of law has its own way of celebrating its marvels. The usual euphe-
mism has it that in systems governed by the rule of law, the law emerges from
a process of conversation. As most trained lawyers know, conversations that
are generative of law could go on forever. To every legal argument there is a
conceivable counter-argument. Legal conversations could be conducted indefi-
nitely — with infinitesimally growing nuance and erudition, of course.
But every legal conversation needs to come to an end, too. Otherwise the
law would fail to regulate. At one point, the discussion over what is right or
wrong needs to be cut off. Such a cut-off point is called a “decision.” The law
can be known only through decisions. This is what makes the law into the so-
cial sphere where willing is an objective reality.
Luhmann was keenly aware that decisions are disturbingly paradoxical.
(1993:308–309). They implicitly claim, at any rate in a legal context, to ap-
ply or implement something that was to be known in advance and that, could
it have been known in advance, would have made the act of decision unnec-
essary. In other words, that the law can be known only through decisions is
tantamount to saying that it can be known only by submerging the worrisome
awareness that it cannot be known at all.
The paradox is omnipresent. It is, indeed, aggravated by the fact that —
conventional standards regarding jurisdiction and finality aside — the modern
legal system does not honor decisions independent of their rational pedigree.
* I would like to thank Jill Gaulding and John Reitz for comments on an earlier draft.
The paper was first presented at a workshop on the “justiciability of knowledge”
held at the Institute for Cultural Sciences in Essen in March 2005. I would like
to thank the participants, in particular Nico Stehr and Martin Schulte, for their
comments. The valuable research assistance by Tiffany Piecewicz and Michael
Wilhelm is also gratefully acknowledged here.
215
216 Who Owns Knowledge?
In other words, the legal system does not locate the authority of the termination
of a legal dispute in the substance of its result, the decision proper. The expla-
nation is simple. The substance of the decision can only be appreciated with
resort to the bundle of arguments and counter-arguments underlying its genera-
tion. Consequently, in the moment a decision becomes intellectually appropri-
ated in a subsequent application it is decomposed again into the controversy
from which it arose or even gives rise to another. Official fidelity to statutory
language and stare decisis notwithstanding, it is plain that what makes sources
authoritative in the context of legal justification are the reasons used to elabo-
rate the wording of the statute or the arguments adduced to elucidate the actual
holding of a case.
Reasons cannot control the future. Rather, the future determines the reasons
that will actually be deemed to have been persuasive. Reasons look plausible
from one decision to the next. Hence, what a decision in one case implies
for the next is bound to remain an open question. Any blind adherence to the
words of a statute or the rule established in a case would seem to countenance
pure “decisionism.” Consequently, legal controversy cannot come to a conclu-
sion. It is resuscitated in every appeal to legal authority — be it a statute or a
precedent — as if the decisions handed down by judicial bodies were merely
the by-products necessary to continue the controversy.
Only a small intellectual step is needed to appreciate fully the dialectical
momentum that originates from the process of conversation. Every decision,
by favoring one side over the other, sacrifices the wealth and richness of dis-
course. The sacrifice is necessary, however, for without it there would be no
way for continuing the indefinite chain. But no decision can ever be as in-
sightful and complex as the discussion preceding and following its adoption.
Consequently, it becomes increasingly difficult to accept the idea that parties,
at some point, need to succumb to a decision without further appeal.
At the same time, there is little reason to be excited about appeals once it
has become clear that, the correction of flawed factual determinations aside,
no decision can be much better than any other. No decision can live up to
the erudition that can be sustained only on the level of the conversation. The
very concept of a misapprehension of law is cast into doubt if it is generally
understood that truncation and distortion are the sacrifices necessary to ensure
the reproduction of law from one case to the next or even from the one inter-
pretation of a statutory provision to another. Just as there are no reasons for a
legal argument ever to come to an end, there are also no good reasons to carry
it on indefinitely. The process is always intellectually more resourceful than
the result. But a result is what parties seek to obtain from it. The law cannot
be known if what is meant by “known” is that the meaning of the law is being
pinned down in, or condensed to, a decision.
Inexplicable Law: Legality’s Adventure in Europe 217
In what follows, I would like to explore the trace that this dialectical moment
has left in a legal system that deserves particular praise for the manifold para-
doxical complexities that it has to offer to its students. What I have in mind
here is, of course, European Community law. In our context, it is interesting
for at least two reasons.
First, European Community law self-consciously acknowledges its own in-
determinacy. This is ostensibly the case not only as regards the provision of a
special “preliminary reference procedure,” in the course of which a Member
States’ court may or must ask the European Court of Justice (ECJ) to supply
an authoritative interpretation (Article 234 EC Treaty), it becomes evident also
in the cases that are of relevance here, namely, instances when states might be
held liable for a breach of Community law. For such liability to arise it is nec-
essary, among other things, that the breach be “sufficiently serious.” According
to established Court practice, this is not the case where European Community
law has not been sufficiently clear.
Second, as will be more fully explored below, European Community law
may already be underway to privatize the final determination of the law. Put
bluntly, expounding the meaning of law may have already become a matter of
adjudicating tort claims. Their success seems to depend, essentially, on whether
the law’s lack of clarity was clear enough so that it could have been recognized
by any reasonable judicial tribunal. Whether or not the solution that the ECJ
has found for this problem is just may be regarded — necessarily, I add tongue
in cheek — as an open question.
The heart of the matter is, of course, how a supranational legal system ought
to reply to misapprehension by its addressees. As regards the member states,
Community law appears to have a straightforward response. If member states,
in particular a national legislature, could and should have known Community
law because, for example, the law has been clear, they incur a civil liability for
damages suffered by parties whose interests have been adversely affected as a
result of a misapprehension of Community law. The question, however, seems
to have been given recently a more intriguing twist. The ECJ had to address
the issue of whether member state courts can be responsible for mistakenly
assuming that Community law is clear when it should have occurred to them
that, on the contrary, the law is unclear and therefore in need of clarification
by the ECJ. The Court had to deal here, in an appropriate way, with a rejection
of its supreme interpretative authority. Needless to add that the assumption of
interpretative authority is presumptuous in itself for instances where the law is
supposedly, contrary to its appearance, unclear. What should there be left for
the ECJ to clarify?
218 Who Owns Knowledge?
As we shall see, the ECJ’s daring foray into hitherto uncharted waters left
European Community law shipwrecked amidst the sea of legal paradox. The
rule that the ECJ introduced to assert its authority is — and has to be — self-
effacing in its application. In a sense, the Court set a precedent that nullifies
itself.
I begin by reminding the reader of how important the co-operative partner-
ship is between the ECJ on the one hand and national courts on the other for the
implementation of the Community’s legal system. I then turn to two different
modes of dealing with bad court decisions against which there is no further
appeal. After a short sketch of the ECJ’s jurisprudence on state liability I will
offer a reconstruction of how the Court dealt with an instance of purported
misinterpretation by a member state court deciding at last instance. It will be
seen that the Court’s precedent, even though firm in principle, is necessarily
self-effacing in practice.
Interpretative Authority
The member states of the European Union are responsible for implementing
and respecting Community law (Articles 10 and 249 EC Treaty). If they fail
to do so either the Commission will go after them (Article 226 EC Treaty) or
their conflicting laws will be set aside. Such an act of setting aside requires the
good will of trustworthy partners, i.e., the national judges, in particular, given
that the Community does not have its own and separate system of “federal”
courts. Indeed, the success of European integration, from a legal point of view,
has depended vitally on the co-operation between the ECJ and national courts,
which played their part not merely in referring questions of interpretation to
the high tribunal in Luxembourg but also in effectively “setting aside” na-
tional law that was deemed to be in conflict with Community law. Given that
national courts have connived in undermining national sovereignty through
“dis-applying” their own national laws one would be surprised to see the ECJ
confront its long-standing partners by also holding them responsible for a
breach of Community law — as though they were on a plane with sluggish or
unwilling national legislatures and recalcitrant administrators.
Arguably, the ECJ needs to take heed of rejection. Its authority to explain
what the law is, even where there is no law to explain, must not be challenged
by national courts that happen to believe that it is they who know better or
best. How, then, is the ECJ to act when it is presented with a case in which it is
alleged, among other things, that a court did not refer the matter even though
it should have done so? I add that the difficulty is compounded by the fact
mentioned above that only courts deciding the matter at last instance are under
an obligation to refer. This raises a difficult question. Decisions by courts of
Inexplicable Law: Legality’s Adventure in Europe 219
final appeal are by their very nature not susceptible to appeal. Cases decided
by courts at last instance are final. Nevertheless, it is these same courts that are
under an obligation to refer. But until recently, at any rate, a violation of such
an obligation could not have been successfully revealed by an appellant before
another court. Has it, thus, been treated as an obligation at all? Not, of course,
vis-à-vis European citizens; if at all, it has been a legal duty that is owed to the
Community, which could have enforced it, any time, by the Commission bring-
ing an action against a defaulting member state. Via this avenue, the member
states could have been held responsible for the conduct of their highest courts
of law. As a matter of constitutional convention, however, the Commission has
abstained from taking that step. The Commission, more precisely, even though
bringing action against administrative practice that was condoned by national
courts, has so far never reacted to an act of a court of final appeal by bringing
an action against the member state.
If, therefore, owing to a reasonable constitutional convention, there is noth-
ing to be done against a court at last instance’s failure to refer, then one may
want to conclude that there is not really an obligation to refer. Such a conclu-
sion, putting it mildly, is in tension with the wording of Article 234. None-
theless, the only avenue available to have the matter decided by the ECJ is a
reference against a final decision that originates from another (lower) national
court of law. But how could that ever be the case? The decision by the court at
last instance is final.
The law governs its own creation. More generally, it reflects upon, and is re-
sponsive to, its own operation in legal terms. Some of the pertinent standards
regulate the imposition of sanctions for the creation of bad law. One such sanc-
tion is nullity, or rather, the declaration of the nullity of a legal act. The act is
then held to be so flawed as to be legally non-existent. A final decision may be
final but at the same time so repugnant that it must be denied the force of law
at all. Arguably, it can then only seemingly be final while in fact its nullity is
being determined in another legal act.
Typically, a refusal to enforce is the reaction of public authority to bad legal
decisions. Contracts, for example, when reflecting grave inequalities of bar-
gaining power, are declared null and void because public authority refuses to
lend its hand to a dirty deal. In a word, nullity is the major means of sanctioning
the creation of bad law. Conceivably, declarations of nullity are also the typical
public law response to egregious errors by courts of final appeal. Speaking of
such a response I do not entertain a mere hypothetical possibility. In dramatic
instances, claims regarding the nullity of final decisions have been advanced
220 Who Owns Knowledge?
when public opinion was polarized over a case (e.g., Brown in the USA [347
U.S. 483, 1954], the Crucifix case in Germany [BVerfGE 93]). Often, the rules
of nullity are applied retroactively to acts issued by prior regimes.
Interestingly, there is also a private law response to bad law. It leaves the va-
lidity of the act unaffected and imposes instead a liability on the body respon-
sible for its creation. From the perspective of the private law track, the creation
of bad law is a tort or, cast in the language of law and economics, its enforce-
ment comes at a certain cost to public authority. It may be sustained, but only
at a certain price. The final decision can still be wrong on its merits. The losing
party may be harmed by this and deserving of compensation. I should like to
refer to the pursuit of this second track as the strategy of privatization.
The successful application of the public strategy presupposes the application
of some standard of sound legal reasoning for a finding of nullity to be con-
vincing, that is, a conception of what constitutes an egregious mistake. Since
any sophisticated standard is likely to breed controversy and since there is, by
definition, no more court of appeal left, the mistake needs to be sufficiently ob-
vious to the legal community at large. The so-called Radbruch (1990) formula,
I mention in passing, is an example for how such a standard was actually used,
even though retroactively, with regard to decisions by courts that have become
final. The Radbruch formula suggests that, very roughly speaking, a law that
is “gravely and evidently unjust” must neither be followed nor applied. What
merely purports to be law is not law at all. The gravity and obviousness of an
unjust law is inherited by any application of it so that a decision based on such
a law is also invalid. Hence, Radbruch’s idea can also be applied to judicial de-
cisions. Arguably, it could also be applied to decisions directly, that is, without
taking into account the pedigree of injustice; it does not have to stem from the
application of a gravely unjust law.
Of course, the idea that the legal community at large will unanimously
agree in a certain case that, contrary to its appearance, no legal decision has
been handed down at all is largely fictitious. The Radbruch formula makes
sense only if it is understood as a judicial standard. This is indeed what was
to become of it. It became a handy tool for courts that found themselves bur-
dened with having to assess the validity of final court decisions that were made
during the period of prior political regimes. It is a delicate matter, which need
not concern us here, whether it was prudent — and just — to transform it from
what it had been originally designed to be, namely an encouragement of judi-
cial resistance, into a means of dispensing transitional justice. Nevertheless, it
rests on a clear appreciation of what is at stake. Every legal norm, be it a stat-
ute or a final decision, embodies the value of legal certainty. Radbruch grants,
readily, that creating legal certainty is of great merit. The endless chain of legal
conversation needs to come to an end in each single case. Legal certainty, how-
Inexplicable Law: Legality’s Adventure in Europe 221
ever, ceases to be of value where — you may have guessed it — the injustice
of the decision becomes so grave and evident that an appeal to legal certainty
is no longer of any avail to rescue the norm.
Although the Radbruch formula offers merely one example of how a standard
for identifying egregious error might be conceived (arguably, many others are
possible, for example, the failure to apply domestic laws) it demonstrates quite
nicely what the public strategy is all about. It presupposes a self-reflection of
legal thought with regard to the conditions of legal validity and, hence, a general
determination of what may or may not count as law in certain cases. In a sense,
this affects the “code” of the legal system as a whole, for the line is drawn with
regard to what is always to be meant (and not to be meant) by “law.” The public
standard is about “all or nothing,” as it were, about law or non-law. The issue is
resolved by explicating, basically, the concept of law from the vantage point of
a legal theory, that is, a theory which combines a definition of law with criteria
as to what it takes to be the right standards of legal reasoning. The consequence
of its successful application is, I repeat, absolute nullity.
Obviously, the strategy of privatization has a different thrust. Its applica-
tion does not presuppose any inquiry into the concept of law. On the contrary,
a legal decision is subjected to the application of another legal norm, that is,
some private law rule of liability. No recourse to legal theory is needed here,
merely the ordinary principles of tort law, the application of which requires the
existence of harm, causality, and, where applicable, some standard of fault.
The contrast to the public strategy is indeed a stark one.
First, there is a lack of congruence with regard to the public strategy. A tort
liability for a misapplication of law may be incurred even by committing a
mistake that is far below the level of egregiousness or, in the worst case, of a
grave and evident injustice.
Second, the decision does not have to be null and void in order for liability
to arise. Indeed, for the harm to be brought about the decision needs to be valid
or, at any rate, effective. Of course, the inquiry into liability can also be con-
ducted by assuming that there was reason to believe that the decision was not
null and void whereas it turned out that in fact it was. This would complicate
matters considerably, though, for then the question would have to be asked
whose responsibility it would have been to have known otherwise.
With this complication in mind I am turning to what I think is the heart of
the matter. It concerns the justiciability of knowing or not knowing the law.
The ECJ has no power to declare a decision by a member state court null and
void. In fact, as an international tribunal (with a very special jurisprudence,
222 Who Owns Knowledge?
The ECJ did not initially address whether member states are potentially
liable for all breaches of Community law until Brasserie du Pêcheur and Fac-
torame III where the Court affirmed, among other things, that a prohibition of
imports from another member state was a breach of Article 28 EC Treaty and
could not be justified under Article 30 EC Treaty by the need to protect public
health (Joined Cases C-46/96 and C-48/93 [1996] ECR I-1029). The type of
breach addressed in Brasserie was not the non-implementation of a Directive
by a member state, but rather an act by the legislature that interfered with a
fundamental freedom guaranteed in the Treaty. The ECJ held that liability can
be incurred by a member state regardless of which organ of the state was re-
sponsible for the breach. Liability can arise from an action by the legislature,
the administration, or the judiciary.
Brasserie further expanded the Francovich precedent by saying that
The ECJ determined that in order to find a “sufficiently serious” breach, cer-
tain factors may be taken into account: the clarity and precision of the rule
breached, the measure of discretion left to the national authorities, whether the
infringement and damage caused was intentional or involuntary, whether an
error of law was excusable or inexcusable or whether the position taken by a
Community institution may have contributed to the omission and the adoption
or retention of national measures of practices contrary to Community law. Put
simply, the factors for consideration appear to take into account the motivation
for a breach of law. Later, in Laboratoires Pharmaceutiques Bergaderm SA
and Goupil v. Commission, the factors for determining a serious breach were
simplified, by making it a “test” for state liability whether the member state
manifestly and gravely disregarded the limits of its discretion (Case C-352/98
[2000] ECR I-5291).
Article 234 EC, as it has come to be interpreted by the ECJ, binds all mem-
ber states to the rulings of the ECJ. A national court is required to give full ef-
fect to provisions of Community law as interpreted by the ECJ. Thus, national
courts must apply European Community law over conflicting national law. The
largest problem lies in the fact that national courts still have some ability to
disregard rulings of the ECJ. For example, in the Brasserie case, the German
Supreme Court, the Bundesgerichtshof (BGH), found no causal link between
the loss suffered and the breach of European Community law, and the German
224 Who Owns Knowledge?
government was therefore not held liable for a breach. In essence, the BGH
was able to go against the ECJ ruling without being sanctioned for it. The BGH
is the highest German court for civil procedure, and no right exists under the
EC Treaty for an individual to raise a matter before the ECJ on its own motion
and the ECJ is not considered to be an appeals court for the BGH. In principle,
national courts are required to follow the rulings of the ECJ, but the actions
of the BGH in Brasserie clearly illustrate how member states can avoid state
liability.
Owing to direct effect and supremacy of Community law, member states
have an obligation to interpret national law on state liability according to the
criteria established by the case law of the ECJ. Up to this point, member state
liability is not a uniform, codified law; rather it is the result of principles estab-
lished and developed in the rulings of the ECJ. The types and quantum of dam-
ages to be awarded are determined under national law, and damages can thus
be denied under national characteristics. Given that national courts are autho-
rized to determine whether a causal link exists between the breach of European
Community law and the harm suffered, the policy behind the rules of state
liability appears to provide a number of loopholes, which may give rise to the
risk of inadequate protection. Furthermore, even if compensation for a breach
is not per se impossible or excessively difficult to obtain, national courts still
have a broad opportunity to restrict damages that would otherwise have been
awarded had the decision solely been left to the discretion of the ECJ.
Köbler was the first case to bring the question of liability regarding the be-
havior of a national court directly before the Court of Justice (Case C-224/01
[2003] ECR I-10239).
Unpacking Liability
Herr Köbler is a flesh and blood professor of law installed at an Austrian Uni-
versity. He claimed that he was denied a length-of-service salary increment
because of his German citizenship. The details of the matter were a bit more
complicated, which explains, too, why at a certain point the case gave rise to
a reference to the ECJ. The Austrian Administrative Court, which requested
the clarification of Community law, withdrew its reference after it had been
provided by the ECJ with an update regarding its most recent case law. Con-
sequently, the claim made by Köbler that he, contrary to Community law, had
been discriminated against on the ground of nationality was dismissed by the
Austrian Administrative Court.
Köbler then filed for damages in an ordinary court of law, alleging breach
of Community law by the Republic of Austria. A perplexed court referred the
matter again to the ECJ.
Inexplicable Law: Legality’s Adventure in Europe 225
The Court was asked to clarify a variety of matters. Chief among these was
the question of whether a member state could become liable even for a decision
reached by a supreme court of a member state. In the course of the proceed-
ings, the United Kingdom, for example, submitted that the resulting discord
with principles such as res judicata and legal certainty aside, “the authority and
reputation of the judiciary would be diminished if a judicial mistake could in
the future result in an action for damages.” This same country also pointed out
that it was inherent in the division of labor between national courts on the one
hand and the ECJ on the other that the latter would respect the autonomy of
national courts and hence tolerate “errors that cannot be appealed or otherwise
corrected.”
In its opinion, the Court underscores that it was in the position of an in-
ternational tribunal and stressed that in the eyes of international law all state
institutions are equal. It also highlights that the rights of individuals, granted by
Community law, would be in jeopardy if there were no redress against wrongful
decisions made even by a “final” tribunal. Precisely because the finality needs
to be respected state liability remains the only remedy. The Court disposes of
the res judicata objection by drawing, skilfully, the line between the public and
private strategy of responding to purportedly unlawful law. The latter strategy,
the Court emphasizes, commends itself precisely because it leaves the prin-
ciple of res judicata unaffected. Nevertheless, the Court also has to confront the
consequence that there would have to be some avenue for the wrongly decided
case to re-enter the national judicial system again. As regards the consequent
undermining of the authority of the judiciary, the Court replies that such a step
would, on the contrary, enhance the quality of the legal system and, therefore,
in the long run strengthen the authority of the judiciary. The irony inherent in
the reply should not go unnoticed. The Court would never apply this principle
to itself when liability by the Community for damages caused by an erring ECJ
were the issue. Indeed, such liability cannot be extended to the ECJ for the ECJ
would end up in the position of a judicial body adjudicating, at any rate on ap-
peal against a ruling by the Court of First Instance, its own cause pursuant to
Article 288 (2) EC Treaty. This would fly in the face of the rule of law. In a reply
to the concern about undermining judicial authority, the Court points out that
the possibility for damage claims to be brought against courts is not excluded
completely by some member state laws. Arguably, the Court had a point here.
After dismissing the objections raising finality and the damage to judicial
authority, the Court goes on to clarify the conditions governing the liability of
a court at last instance, which are to be applied by another national court, along
the lines that have been laid out for state liability in general.
1. The rule of Community law must be intended to confer rights on individu-
als.
226 Who Owns Knowledge?
court did was to ignore an abundantly clear lack of clarity, even if unwittingly.
None of these elementary principles have actually been clarified by the ECJ.
Even though the Court usually leaves the application of the conditions of state
liability to the national court, in this case the Court thought that it was provided
with the information necessary to apply itself the conditions governing the
establishment of liability, however, without being in the position to specify the
damage award any further.
The first condition governing liability calls for a specification of the individ-
ual right that is alleged to have been infringed. The Court completely passed
over the question of whether an attribution of liability to Austria presupposes
that Article 234 (the obligation to refer) confers an individual right. Without
the Administrative Court’s failure to refer a matter concerning the substantive
right to be free from discrimination (or, in this case, the premature withdrawal
of the reference), this substantive right would not have been interfered with.
It can be argued, therefore, that the claim conferred by the substantive right
is mediated by the hypothetical procedural right (Article 234) and that it can
emerge only where there is a procedural right in the first place. But the ques-
tion of one right being conditioned by another did not appear in the opinion
of the Court. Rather, the ECJ blindly deemed the existence of the right to be
free from discrimination on the ground of nationality as sufficient to provide a
normative anchor for state liability. What the Court did not take into account
was the decisive role that it plays itself in determining the meaning of any
substantive right. If the meaning of the right to be free from discrimination is
not settled in a certain instance no breach of Community law is possible unless
the national court at last instance is under an obligation towards a European
citizen to make a reference to the ECJ and to abide by the clarification handed
down by this tribunal. For there to be such a right, however, the national court
deciding at last instance must not have discretion to decide for itself whether
the reference is necessary to enable it to give judgment. Only if there is no such
discretion Article 234 EC Treaty confers a right to a reference that is backed
up by a liability rule.
The question is of utmost significance for European Community law for
it extends all the way down to the nature of direct effect. According to well-
established doctrine, direct effect means that Community law confers “rights”
on European citizens that may be invoked by them in a national court of law.
Article 234 recognizes the discretion of the national court located on the
level below a court of final appeal to refer a case to the ECJ. This discretion is
further qualified by the condition “if it considers that a decision on the ques-
228 Who Owns Knowledge?
right to be free from discrimination was at stake — that the right infringed
was the right to a preliminary reference procedure. The conditionality in the
relation between the procedural and the substantive right is left unexplored
even though the revelation (in the sense of Weistum) of the meaning of the
substantive right to be free from discrimination hinges essentially on the prior
procedural right to have a ruling by the ECJ. What the ECJ did, by fiat, was to
assume an unrestricted right to a preliminary reference procedure for cases in
which Community law is not clear. This, however, appears to be tantamount to
conferring onto Article 234 the status of a fundamental right.
Interestingly, the wording of the Treaty — contrary to its exposition in prior
case law — appears even to countenance such a conclusion. The third para-
graph of Article 234 EC Treaty says that “where any such question is raised
in a case pending before a court or tribunal of a Member State against whose
decisions there is no judicial remedy under national law” the court has to refer.
This sentence apparently refers to the first paragraph of Article 234, in which
are listed the types of issue that can be subject to a preliminary ruling without
restricting the question to those “necessary” for the national court to have clari-
fied in order for it to be in a position to decide a case. Indeed, such a broad
reading of the third paragraph of Article 234 is not implausible if one adds
a CILFIT-style proviso that no reference is needed in cases where European
Community law is sufficiently clear. It does not, however, flow from existing
case law.
The second condition of state liability, which is specified further through the
mentioning of sub-conditions (2.1–2.3), concerns the question of whether the
national Court “manifestly infringed” the applicable law. In the Köbler case,
the answer to this question depended on whether the salary increment was
to be qualified as a “loyalty bonus.” I already mentioned that, remarkably
enough, the matter had been referred by the Administrative Court to the ECJ
in the first place. The reference was later withdrawn, though, after the Reg-
istrar of the ECJ forwarded to the Administrative Court a recent decision by
the Court suggesting that increments such as the one in question were indeed
to be considered a loyalty bonus. Not surprisingly, the Administrative Court
must have gained the impression that the ECJ thought that the matter had been
settled in a prior case and that the case pending before it can now be decided
by following faithfully what had been laid down in the precedent. Confidently,
the Administrative Court decided the matter itself, thereby specifying the con-
ditions under which a loyalty bonus with a discriminatory effect can be upheld
on public interest grounds. For the ECJ this must have appeared to have been
230 Who Owns Knowledge?
a particularly snooty act. The ECJ emphasized in Köbler, almost as if “in re-
ply to” the national court, that the prior case had only stated that a loyalty
bonus could be justified under certain conditions but that it had not explicated
what these conditions were. Nevertheless, the Administrative Court applied
the relevant proportionality test by its own lights, that is, without awaiting
further tutelage by the ECJ. The ECJ thought that such behavior — as though
licentious — was the result of a misreading: “[T]he inferences drawn by the
Verwaltungsgerichtshof from that judgement are based on an incorrect reading
of it.” The Administrative Court should have requested a preliminary ruling
on the matter of whether a loyalty bonus could be justified or not on the basis
of the pertinent public interest grounds for this particular matter had not been
clarified by prior case law.
Third, the Court did not consider the causality factor and therefore failed
to address the thorny question of whether the damage had not been caused by
the ECJ resolving the matter in a manner favorable to Köbler rather than by
the Administrative Court deciding differently. Arguably, the damage was not
caused by the Administrative Court for prior to the reference it was anything
but clear which way the matter would be resolved by the ECJ. In fact, it can
be argued that the injury was caused by the ECJ in adjudicating the matter in
favor of Professor Köbler. The ECJ causes the damage, the member states have
to pay.
Nevertheless, the ECJ finally found that there was an excuse for the erring
Court. Community law, even though unclear, was not clear enough to have
been perceived as being unclear. I take the Court to be saying that Community
law in certain instances is not clearly unclear and, hence, obscurely obscure.
Duplex negatio does not affirm in this case. It is not the case that, owing to its
being obscurely obscure or opaquely opaque, Community law all of a sudden
becomes clear. However, where Community law appears to be clear — in cases
of Schein, as it were — it may be treated by a national court as if it were clear.
The national court is then taken to act in good faith. It is a different matter, to
be sure, how a tribunal could be ever in a position to tell, in advance, the dif-
ference between clear law and obscurely obscure law. Maybe the Köbler case
is the deconstruction of this difference. A decision is needed in order to make
clear whether the law is really or only seemingly clear.
Not surprisingly, in arriving at this answer conditions 2.1 and 2.3 are con-
founded by the Court. Here is what the ECJ had to say in defence of the Ad-
ministrative Court:
Community law does not expressly cover the point whether a measure for reward-
ing an employee’s loyalty to his employer, such as a loyalty bonus, which entails
an obstacle to freedom of movement for workers, can be justified and thus be in
Inexplicable Law: Legality’s Adventure in Europe 231
conformity with Community law. No reply was to be found to that question in the
Court’s case-law. Nor, moreover, was that reply obvious.
The ECJ also granted, implicitly, that the Administrative Court might have
thought that the ECJ had considered the matter already resolved in the prior
case. The Administrative Court acted in good faith. Even though the reading
was incorrect, the Court admitted that the mistake could have been triggered
by its own behavior.
A Self-effacing Precedent
In the proceedings, the United Kingdom pointed out that if the ECJ were in
the position “to assess the seriousness and excusability of any error into which
[national supreme courts] had fallen” this would clearly not be “beneficial”
for the “vital relationship” between ECJ and national courts. Evidently, an of-
fended national legal system that is forced to pay compensation may feel in-
clined to bring its own damage action against the Community — either on the
basis of 288 (2) EC Treaty or with resort to its own principles of private law
— raising the issue that the principles set out in Köbler themselves are based
on a “manifest infringement” of Community law. One need merely recount the
questionable intellectual merits of the Court’s reasoning in Köbler in order to
understand that there might be a basis for redress. First, the Court asserts that
granting a tort remedy against a final decision is likely to enhance the quality
of the judicial system but fails to address the self-subversive consequence of its
claim. Second, the Court does not determine the way in which the conditions of
liability need to be applied by national courts (alternatively or cumulatively).
Third, the Court does not discuss whether it regards Article 234 as directly ef-
fective in the sense of creating a right for European citizens. Fourth, the Court
avoids the causality issue, which would shed light on the interpreting ECJ itself
creating the damage. From this angle, the major tort-feasor is the ECJ itself.
In light of such severe shortcomings, one is inclined to conclude that the
Court’s jurisprudence is at least as weak and at least as liability-creating as
those “misreadings” by national courts that are susceptible to being classified
by the ECJ as manifest breaches. It can be argued, then, that as soon as the
ECJ were to find a member state liable for a breach on the basis of Köbler, the
Community would itself incur liability toward the member state for imposing
such liability on it. Since the damages of the injured party would thus end up
being collected, effectively, from the Community the authority of Köbler dis-
sipates owing to a reductio ad absurdum. Member state liability for breaches
of Community law cannot mean that the Community ends up paying for them.
Consequently, Köbler effaces itself. The reductio resulting in that conclusion
232 Who Owns Knowledge?
can be made by the national courts themselves since the ECJ cannot sit as a
court adjudicating, on appeal, its own cause and, as explained by the ECJ in
Köbler, jurisdictional niceties should not serve as a pretence to deny interested
parties their right to have a remedy. From the outset, the national courts should
deny awarding damages for alleged infringements by their courts of final ap-
peals. The strategy of privatization would thus come to its “public” conclusion.
Köbler is not good law.
But maybe such a harsh reaction to Köbler would actually miss the mark
of the strategy of privatization. My hope is, at any rate, that the Court does not
mistake its self-important celebration of standards of liability as norms that
could be applied, in all seriousness, to acts of courts deciding at last instance. I
believe the decisive message sent out by the Court, after it has gone through all
the tort law mumbo jumbo, is the candid admission that, first, no reply to the
relevant question was to be found in the Court’s case law, and, second, even if
it had been possible to imagine such a reply its content would not have been
“obvious.” I take this to mean the opinions by ECJ are as inexplicable as the
law they purport to expound. One is inclined to conclude that the ECJ hinted
at a universal principle of gullible ignorance, which encompasses also, as it
should, an element of bliss.
Such a principle would apply to the situation in which a national court mis-
takenly assumes that European Community law is clear where in fact it is un-
clear. Cases where obscurity is itself obscure, that is, where it is not even clear
whether the ECJ would find the law in need of clarification, are cases in which
no liability will be incurred. Actually, these are the cases in which the law sim-
ply cannot be known. The law needs then to be laid down in a decision. These
cases coincide, not surprisingly, precisely with the cases in which a court de-
ciding at last instance is held to be under an obligation to make a reference.
It follows that the ECJ effectively denies what it appears to assert, namely
that the obligation to refer is backed up with the sanction of liability. Without
admitting it openly, it assumes the existence of an individual right to a prelimi-
nary reference procedure and effectively denies its existence with reference to
the ultimate experience of the rule of law, which is, as I tried to explain at the
outset, that the law can only be known if it is not known at all. Cases of grave
and evident injustice aside, no court can be held responsible for not knowing
the law. Every court deciding at last instance, at any rate, is entitled to a free
ride on the ignorance that abounds under, and owing to, the rule of law.
Conclusion
What are we, thus, to make of the strategy of privatization? I think we are
entitled to take it for what it is, namely, as a symbolic assertion of judicial au-
Inexplicable Law: Legality’s Adventure in Europe 233
thority. There is a beautifully dark side to this symbolism for it assumes that the
law, at any rate of the level of elaboration by high judicial tribunals, is univer-
sally inexplicable. The authority on which the hierarchy is built has no medium
to express itself. This is the hidden greatness of the strategy of privatization. It
has no reasonable sphere of application. It is merely symbolic. It is a symbol
for the hope that there is an excuse for the general fact that inexplicable law is
purported to be known in decisions.
Bibliography
Ackerman, Bruce (1991) We the People, vol. 1: Foundations. Cambridge, MA: Harvard
University Press.
Ahdieh, Robert B. (2004) “Between Dialogue and Decree: International Review of Na-
tional Courts.” New York University Law Review 79:2029–2163.
Alexy, R. (1992) The Argument from Injustice. A Reply to Legal Positivism, trans. by B.
and S.L. Paulson. Oxford: Oxford University Press.
Baudenbacher, Carl (2005) “The Implementation of Decisions of the ECJ and of the
EFTA Court in Member States Domestic Legal Orders.” Texas International Law
Journal 40:383–416.
Biondi, Andrea (1999) “The European Court of Justice and Certain National Proce-
dural Limitations: Not such a Tough relationship.” Common Market Law Review
36:1271–1287.
Blumenberg, Hans (1979) Schiffbruch mit Zuschauern: Paradigma einer Daseinsmeta-
pher. Frankfurt/Main: Suhrkamp.
Breuer, Martin (2004) “State Liability for Judicial Wrongs: The Case of Gerhard Köbler
v. Austria.” European Law Review 29:243–254.
Breyer, Stephen and Antonin Scalia (2005) “A Conversation between U.S. Supreme
Court Justices.” International Journal of Constitutional Law 3:519–541.
Calabresi, G. and A.D. Melamed (1972) “Property Rules. Liability Rules, and Inalien-
ability: One View of the Cathedral.” Harvard Law Review 85:1089–1128.
Cassese, Antonio (2005) International Law, 2nd. ed. Oxford: Oxford University Press.
Craig, P.P. (1993) “Francovich, Remedies and the Scope of Damage Liability.” Law
Quarterly Review 595–597.
Craig, P.P. and G. de Búrca (2003) EU Law: Text, Cases and Materials, 3rd ed. Oxford:
Oxford University Press.
Crawford, James, Jacqueline Peel, and Simon Olleson (2001) “The ILC’s Articles on
Responsibility of States for Internationally Wrongful Acts: Completion of the Sec-
ond Reading.” European Journal of International Law 12:963–991.
Deards, Elspeth (1997) “Germany: Brasserie du Pêcheur, Snatching Defeat from the
Jaws of Victory” European Law Review 22:620–625.
Editorial (2004) “The Transformation of National Government.” European Law Review
29:151–152.
Gerven, Walter van (2000) “Of Rights, Remedies and Procedures.” Common Market
Law Review 37:501–536.
Habermas, Jürgen (1996) Between Facts and Norms: Contributions to a Discourse
Theory of Law and Democracy, trans. W. Regh. Cambridge: Polity Press.
234 Who Owns Knowledge?
Theunissen, Michael (1980) Sein und Schein: Die kritische Funktion der Hegelschen
Logik. Frankfurt/Main: Suhrkamp.
Tridimas, Takis (2001) “Liability for Breach of Community Law: Growing Up and
Mellowing Down?” Common Market Law Review 38:301–332.
Wallace, Chloe J. (2000) “Community Sex Discrimination in National Courts: A Legal
Cultural Comparison.” Pp. 119–134 in Jo Shaw, ed., Social Law and Policy in an
Evolving European Union. Oxford: Hart Publishing.
Wattel, Peter J. (2004) “Köbler, CILFIT and Welthgrove: We Can’t Go on Meeting Like
This.” Common Market Law Review 41:177–190.
Weatherill, Stephen (1995) Law and Integration in the European Union. Oxford: Ox-
ford University Press.
Weber, Max (1976) Wirtschaft und Gesellschaft. Grundriss der verstehenden Soziolo-
gie, 5th ed., ed. J. Winckelmann. Tübingen: Mohr & Siebeck.
Weiler, J.H.H. (1999) The Constitution of Europe. Cambridge: Cambridge University
Press.
Wilburg, Walter (1941) Die Elemente des Schadensrechts. Marburg: Elwert and
Braun.
This Page
Intentionally
Left Blank
8
A fight is under way. Jack Valenti (2003) called it a “furious battle,” Lawrence
Lessig (2004) described it as a “struggle” and a “war.” The battle is over how
much protection society should afford to authors of creative works. The goal
is delicate: to find the appropriate balance between protecting creative works
and permitting them to be shared, enjoyed and exploited freely, even perhaps
against the will and wish of their creators. The stakes are high. Intellectual
property is traded at huge, transnational markets. According to the Internation-
al Federation of the Phonographic Industry, over 5 percent of GDP in North
America and Europe is attributed to “copyright industries,” which translates
into USD 435 billion annually for the US alone. According to UNESCO, over
the last fifteen years, growth of the intellectual property markets has been about
double the rate of the (quite healthy) US economy thereby increasing its share
of the overall economic output.
For Jack Valenti, representing the rights holders, sharing these products
of creative labor without permission is stealing and endangering the central
source of economic growth not just in the United States. Striking the wrong
balance, Valenti implies, will lead not just to the demise of a vibrant sector in
our economy. It is not simply “Hollywood” that is at stake, he is saying, but our
economic future. Lawrence Lessig, rarely outdone in apocalyptic predictions,
sees even more at issue. For him, permitting people to share creative works is
a central tenet of a free society: Giving rights holders too much power may
threaten our societal existence. Faced with a choice between Valenti’s Scylla
— the destruction of our economy — and Lessig’s Carybdis — the end of our
free society — we, to paraphrase Woody Allen (1980), have to choose wisely.
Each side finds support for its argument in tightly woven narratives about
the underpinnings of and reasons for the legal protection of creative works.
Various narratives of the system of “intellectual property protection” — this
frequently used term in the English-speaking world itself connotes a specific
narrative — have been put forward. Our reasoning, our understanding, and our
acceptance of the system of protection creative works seem to rest on the valid-
ity and persuasiveness of these narratives.
237
238 Who Owns Knowledge?
In the first part of this chapter, I venture to analyze the debate about “intel-
lectual property” through the lens of the main narratives put forward in the con-
cept’s support, and to expose just some of the linkages, junctures, and chasms
between these narratives. More importantly perhaps, examining the protection
of creative works through the associated narratives, I hope to unearth some of
the implicit assumptions and connotations of the narratives. “Space,” Rohan
Samarajiva once said, “is no neutral container”; neither are stories.
In the second, much shorter part of this paper, I analyze the role of authority
in the narratives of the protection of creative works, and how the connected
societal mechanism of imbuing narratives with authority disadvantages a cer-
tain kind of narrative of creative works compared with others. In concluding,
I suggest what hurdles would have to be overcome to create a more inclusive
mechanism.
I. The Stories
These are the major narratives put forward in explaining, elucidating, and
grounding the protection of creative works. To be sure, these are neither all, nor
even the only important ones. And they themselves are thick, content-rich, and
woven together of different strands, signifying the issue’s overall complexity.
In 1690 John Locke published his Two Treaties of Civil Government (Locke,
1967). In it, he posited that initially “earth and all inferior creatures” are com-
mon to everybody. However, every individual who mixes what nature has
provided with his own labor and thus creates something new, makes this his
property. If Locke’s labor theory of property is applicable to physical goods, it
— the argument goes — is even more applicable to informational goods: Cre-
ative works represent perhaps the purest form of an individual’s labor.
Moreover, a few years before publishing his Two Treatises Locke had draft-
ed a memorandum to parliament urging the abolition of the old publishers’
privileges and replacing them with what seemed like a more author-centric
copyright (King, 1884). Consequently, and not surprisingly, John Locke was
turned into copyright’s über-father.
Expanding on Lockean influence, copyright became to be seen not just as
an extension of Locke’s labor theory of property, but of his more general idea
of utilitarianism. Copyright’s aim, it has been argued, is not primarily ex post,
to offer a societal reward to authors for their creativity, but pro futuro to induce
those that are creative to continue creating for the advancement of society. The
world’s first copyright law, the Statute of Queen Anne in 1709 was hailed as
In Search of the Story 239
fering an additional, differing layer of the complex history and structure of our
current intellectual property regimes.3
Paralleling the recent critique on the Lockean foundation of copyright, the
conception of intellectual property as an emanation (and societal recognition)
of creativity, however, may both overplay the Kantian link and provide — at
least historically — an overly simplistic view of the continental European land-
scape. European legislators and theorists followed the Anglo-American devel-
opment with great interest, and thought their ideas not too dissimilar from their
British counterparts. “Revisionists” (Ginsburg, 2003; Gunlicks, 2001) have re-
cently argued that the differences between the Lockean and Kantian approach
in practice are minimal, and point to the fact that both camps have been able to
agree to numerous international treaties harmonizing intellectual property laws
internationally, including the Berne Convention, the World Copyright Treaty
and the Agreement on Trade-Related Aspects of Intellectual Property Rights,
Including Trade in Counterfeit Goods (TRIPS).
The two narratives of intellectual property we have covered so far make up
what can be termed the orthodox views of intellectual property — these are the
roots of the Anglo-American and the continental European theories. Together
they comprise what one could describe as the Western view of intellectual
property rights.
In addition to the Lockean and Kantian “story” a related narrative has
emerged, one that is less based on philosophy or theory, and more on formal
normative principles. It results in a de-contextualized Western narrative. Its
evolution is quite obvious. Nations holding the Lockean and Kantian views
have long argued for and been successful in securing international protection
of intellectual property through international legal instruments. What began
with decades of intellectual property treaties and similar IP-specific multilat-
eral agreements had, by the beginning of the 1990s, spread to the international
trade agenda. The resulting TRIPS agreement injects the Western narrative of
intellectual property protection into the global trade agreements, forcing non-
Western nations to formally adopt a narrative that may be philosophically and
historically alien to them. This results in the positivist adoption by non-Western
nations of a Kantian or Lockean (or hybrid) narrative through the force of inter-
national law and international obligations.
Recently Jessica Litman (2001) has juxtaposed these two views with a third,
quite different, view of the history and structure of intellectual property laws.
3 For a comprehensive study of the differences between the Lockean copyright and
the Kantian author’s right, see Ellins (1996).
242 Who Owns Knowledge?
For Litman, it is less about grand theories, and underlying philosophies of utili-
tarianism, innovation, creativity, or personhood, and more about a vivid lesson
of public choice theory. To her, the history of intellectual property laws is but a
reflection of the power of vested interests, mostly of rights holders.
Public choice theory suggests that actors in the political arena behave simi-
lar to participants in a market (Mueller, 2003). They tend to maximize their
individual profits. Politicians will act to get reelected. Citizens desire to influ-
ence policymakers to legislate their way. Such influence will be stronger and
more successful, the theory posits, the better a particular interest is organized
and the less organized the opposition is. Comparatively obscure issues will
cause less of a public interest, and will permit highly focused stakeholders to
shape the legislative outcomes.
Litman contends that this is exactly what has been happening in the area of
intellectual property laws in the United States for at least the last thirty years.
The interests of the rights holders, mostly the publishing industry, the music
industry and what is colloquially called “Hollywood” have been combined in
very well financed trade and lobbying associations. These associations have
many years of expertise in their lobbying efforts, and have fine-tuned their po-
litical donation practices and access strategies. Assessing decades of intellec-
tual property legislation, Litman concludes that rights holders have been able
to continuously strengthen and widen the scope and substance of their rights.
Lessig (2001) notes that while the duration for copyright has been extended
only once in the first one hundred years of its existence, and once in the fol-
lowing fifty years, it has been extended eleven (!) times in the past forty years,
mostly at the behest of rights holders. Disney, for example, has repeatedly been
able to get Congress to extend the duration of copyright, sometimes just weeks
before Mickey Mouse would have become public domain.
According to Litman, the only (and few) stoppages to continuous intel-
lectual property extension were provided by (a) the Supreme Court and (b)
issue-specific lobbying by powerful rights users, like the American Library
Association (ALA). As Congress subsequently undid most of the loosening of
intellectual property protection afforded by the courts, lobbying by rights us-
ers’ interest groups offered the only credible and powerful counter balance in
this political game. But libraries and similar user-side stakeholders focus on a
few specific issues. Consequently, rights holders not only command the terrain,
they regularly meet with their user-side counterparts and negotiate draft stat-
utes directly. In a well-orchestrated fait accompli, legislators are then routinely
presented with a final text, which — unsurprisingly given the lack of public
interest — gets enacted with little debate and even less modification.
Thus, for Litman, intellectual property laws at least in the US are not based
on any foundational theory, or grounded necessarily in sound logic. The laws
In Search of the Story 243
which every receiver can act as a sender and vice versa. This creates an eas-
ily accessible, global (and quasi-priceless) infrastructure for the dissemination
and distribution of digitized information.
With the technological and economic incentives to buy intellectual property
mostly eradicated, unauthorized copying of somebody else’s creations has be-
come cheaper. By the same token, attempting to transact legally has become
relatively pricier as the information markets are transformed from national,
high value, low volume to global, high volume, low value. Take a simple pic-
ture found on the Internet. To use it in a book, one has to first identify the rights
holder, then to contact him or her, and negotiate a transaction to use the picture.
Frequently these transaction costs are prohibitively high — and substantially
higher than just using the picture without asking. Chances are that the rights
holder will not notice anyway.
Napster, Emule, BitTorrent and all the other latest tools to share intellectual
property among users — peer-to-peer as it is called — and without paying
anything to the rights holder are only the consequence of the problem. Even
without them, the change in transaction costs has shifted users’ behavior, as
ripping music off CDs and onto tens of millions of iPods exemplifies.
Information economists focusing on the study of transaction costs suggest
that to rescue intellectual property rights one must increase the cost of illegal
copying. The US Digital Millennium Copyright Act4 and the recently passed
European Union Directive on Copyright5 already explicitly prohibit the cir-
cumvention of technical copy-protection schemes. But that is hardly sufficient.
When a programmer published a small piece of software on the Internet that
broke the technological lock of DVDs (digital video discs) and permitted any
user to make perfect copies, the programmer — who was stupid enough to
identify himself — was charged with a felony, but within a day the software
tool had been downloaded over 30 million times around the world.6 The genie
was out of the bottle.
The solution to this problem that rights holders and technology companies
alike have most frequently suggested is a technological one: to create a global
information infrastructure — from networks to computers to software — that
makes it easy and cheap to transact legally, and very hard and costly to copy
without permission (Brin, 1999).
A further narrative, too, is grounded in economic theory. But while the pre-
vious layers looked at the economic nature of information and the resulting
consequences for its institutional protection, and at the relative difficulty or
ease of economic transactions of information, relegating legal institutions to a
minor player in a largely technological conception of intellectual property, the
center of attention now moves from individual rights and transactions to the
macroeconomic level. What is, political economists ask, actually happening on
intellectual property markets?
Bettig (1996) has perhaps written the most elegant study on this subject. He
contends that our current Western conceptions of intellectual property evoke
the rhetoric of the creative genius that society justly rewards, and the utility of
In Search of the Story 247
be solved. It is embedded in the genetic code of the capitalist system. For him
the very conception of intellectual property will lead to information monopo-
lies. And because of the qualities of information, society’s means to slow that
process — for example with antitrust and competition laws — are even less
useful for information markets than for markets of physical goods.
Bettig’s critical theory approach to intellectual property law is perhaps less
extreme than it may sound. Over the past decades, legal experts have repeat-
edly examined specific information markets and concluded that intellectual
property rights are not necessary for their functioning, and may even hinder
and hamper market efficiency (Breyer, 1970). Bettig adds a further layer of a
possible understanding of intellectual property: perhaps intellectual property
is neither outcome of a grand theory, nor reflection of a technology. Instead
it may be a necessary institution for a capitalist system to extend itself to lu-
crative information markets, yet overlooking a genetic defect that causes the
institution to plant the seed for its own ultimate destruction.
Lessig, in his second book (2001), advances a somewhat related story-
line. He, too, suggests that our information markets have become more and
more concentrated. He does not, though, fault our capitalist system, but the
creeping privatization of what he calls our “intellectual commons.” Because
the structures we use to communicate today are largely privately owned and
virtual places are appropriated by private actors for economic gains, the areas
of unfettered debate and sharing of ideas and creativity are rapidly reduced.
His take is itself a bit of a remix of both Habermas’s Strukturwandel (1991)
and the mantra of his first book, that the structures make rules, but he does
add a novel perspective: it is not just that the rights holders become more con-
centrated, the very structures we use to share information, too, become more
concentrated and controlled. If this is an inherent tendency of the system — as
Lessig at least at times seems to believe — escaping it is even harder that
resisting market monopolies. Thus, surprisingly, we find Lessig, the libertar-
ian Chicago-groomed law and economics expert in line with Bettig’s Marxist
view of intellectual property as necessary but ultimately suicidal feature of
our system.
lectual product. It is now time to shift away both from the right — the abstract
connection that links the creation with the creator — and from the creation
itself, and examine the creator.
Traditional conceptions of intellectual property conceive of the author as a
singular individual, who creates her work de novo and completes it before it is
given to society. This may be an awfully simplistic view. Umberto Eco (1990)
reminds us not just in the title of one of his books — “lector in fabula” — that
the author is not the only component producing the creativity that completes
the work. Readers have to envision the world that authors describe, and doing
so produces a vital part of the final product. Thus giving authors, who have
only contributed a part of the whole the sole right of ownership is peculiar, to
say the least.
Literary theory has gone even further. For Stanley Fish (1982, see also Iser,
1980), for example, a given work is open to innumerable interpretations — to
him interpreting a piece of creative work is part of the creative act itself. Inter-
pretation is not an afterthought, an unavoidable by-product of the vagueness of
language, but a constitutive component of creativity. Regardless of whether or
not he and similar literary theorists are right, it is clear that viewing the author
as the sole creator of intellectual works is a simplification that does not do
justice to the creative act itself.
Moreover, creators are themselves recipients of intellectual products. They
are consciously or unconsciously building on works of others. This is even
truer today than in earlier centuries. So much has already been published —
books, pictures, movies — that the single, path-breaking insight that nobody
had before is highly unlikely — and today’s intellectual property protection is
not even intended to be reserved for these rare moments of genius.
According to John Seely Brown and David Duguid (2000), the younger cre-
ators have already come to terms with this abundance of intellectual creations.
Instead of hoping for the singular moment of genius, they deliberately use and
reuse parts of existing intellectual works as building blocks for their own. The
resulting “bricolages” are creative combinations. But do we call their creators
“authors”? For Seely Brown and Duguid, this exemplifies the foundational
problem of the orthodoxy of of intellectual property. The envisioned unitary
author is nowhere to be found — and perhaps does not even exist (anymore).
If that is the case, then the entire idea of linking a creative product to a specific
singular creator, an “author” is on shaky ground.
I have presented seven narratives of the foundations of and reasons for the le-
gal protection of creative works. We first looked at Locke and Kant, providing
250 Who Owns Knowledge?
thorship? Figuratively put, if one narrative suggests that only cooperation can
adequately grasp a problem, how can it successfully compete against others
without undermining its own message?
As a consequence, any narrative positing an elusive author is structurally
disadvantaged to compete with author-centric narratives in a winner-takes-all
competition for formal authoritative power. This may help to explain (among
many other factors) the relative paucity of such narratives in the relevant de-
bates and their failure to gain formal acceptance (and thus formal authority) so
far in any jurisdiction, despite significant intellectual recognition.
Lately, narratives of the elusive author have found their way into the main-
stream public debates, in the form of advocating a mass-collaborative author-
ship often (and often mistakenly) labeled “open source.” Yet, most if not all
“open source” projects do have identifiable authors of their various parts. In
fact, online collaborative authoring environments often used for such projects
automatically track each participant’s input, making attribution easier rather
than more difficult. Linux and similar projects hence may be distinct forms
of collaboration, but they are hardly novel forms of authorship. Their success
rests on a specific model of collaboration, not on a new paradigm of intel-
lectual ownership. Lessig’s “creative commons” movement, for example, is
founded on existing intellectual property law.
Insofar, however, as these projects deliberately de-emphasize intellectual
property ownership, they do put in question IP orthodoxy. The central (perhaps
suicidal or cannibalistic) tension remains: The more these alternative narra-
tives question the existence of an authoritative narrative of intellectual author-
ship, the harder their task to persuade as an authoritative argument.
For narratives of the elusive author to succeed the central hurdle must first
be overcome: the competitive process of selecting one narrative as the exclu-
sive “right” one. The mechanism would have to move beyond a binarity of
choice, be accepting of the multiplicity of truths, and reflecting it in its decision
making. A tall order, perhaps an insurmountable obstacle! Yet, for those that
value the bricolage narratives it may be a worthy endeavor. And even those
who are advancing traditional author-centric narratives may want to ask them-
selves what we as a society might miss by a structural under-representation of
non-conforming narratives.
References
Brin, David (1999). The Transparent Society: Will Technology Force Us to Choose
between Privacy and Freedom? Reading: Addison-Wesley.
Brooks, Peter (1996) “The Law as Narrative and Rhetoric.” P. 14 in Peter Brooks and
Paul Gewirtz, eds., Law’s Stories: Narrative and Rhetoric in the Law. New Haven:
Yale University Press.
Brown, John Seely and David Duguid (2000) The Social Life of Information. Boston:
Harvard Business School Press.
Bugbee, Bruce (1967) The Genesis of American Patent and Copyright Law. Washing-
ton: Public Affairs Press.
Coase, Ronald (1960) “The Problem of Social Cost.” Journal of Law and Economics
3:1.
Ellins, Julia (1996) Copyright Law, Urheberrecht und ihre Harmonisierung in der
Euopäischen Gemeinschaft. Berlin: Duncker
Fichte, Johann Gottlieb (1793) “Beweis der Unrechtmäßigkeit des Büchernachdrucks.”
Berliner Monatsschriften 1793:443.
Fish, Stanley (1982) Is There a Text in This Class? The Authority of Interpretative Com-
munities. Cambridge, MA: Harvard University Press.
Ginsburg, Jane C. (2003) “The Concept of Authorship in Comparative Copyright Law.”
DePaul Law Review 52: 1063.
Gunlicks, Michael B. (2001) “A Balance of Interests: The Concordance of Copyright
Law and Moral Rights in the Worldwide Economy.” Fordham Intellectual Prop-
erty, Media and Entertainment Law Journal 11: 60.
Habermas, Jürgen (1991) The Structural Transformation of the Public Sphere: An In-
quiry into a Category of Bourgois Society. Cambridge, MA: MIT Press.
Hamilton, Alexander, James Madison, and John Jay (1961 [1788]) The Federalist. Lon-
don: Dent.
Iser, Wolfgang (1980) Act of Reading. Baltimore: Johns Hopkins University Press.
Kant, Immanuel (1987) “Von der Unrechtmäßigkeit des Büchernachdrucks.” UFITA
106:137.
King, Peter (1884) The Life and Letters of John Locke. London: Henry Bohn.
Lessig, Lawrence (1999) Code: and other Laws of Cyberspace. New York: Basic
Books.
———(2001). The Future of Ideas — The Fate of the Commons in a Connected World.
New York: Random House.
———(2004) Free Culture. New York: Penguin.
Litman, Jessica (2001) Digital Copyright. Amherst: Prometheus.
Locke, John (1967) Two Treaties of Civil Government. London: Cambridge University
Press.
Luf, Gerhard (1988) “Philosophische Strömungen und ihr Einfluss auf das Urheberre-
cht.” Pp. 7, 14 in Robert Dittrich, ed., Woher kommt das Urheberrecht und wohin
geht es? Vienna: Österreichische Schriften zum Gewerblichen Rechtsschutz und
Medienrecht.
Mackaay, Ejan (1992) “An Economic View of Information Law.” P. 43 in Willem F.
Korthales Altes, Egbert J. Dommering, P. Bernt Hugenholtz, and Jan J.C. Kabel,
eds., Information Law Towards the 21st Century. Boston: Kluwer.
Mayer-Schönberger, Viktor (2001) “Information Law Amid Bigger, Better Markets.” In
John Donahue, and Joseph Nye, eds., Governance Amid Bigger, Better Markets.
Washington, DC: Brookings.
254 Who Owns Knowledge?
It has long been traditional knowledge among the San people, an indigenous
hunter-gatherer society in Southern Africa, that hunger and thirst can effec-
tively be staved off by eating slices of the hoodia cactus. This knowledge has
spread outside the San community and was already used by the South African
army at the beginning of the last century. It has also been described in the eth-
nobotanical professional literature.
Scientists from the South African Council for Scientific and Industrial Re-
search (CSIR) investigated the mechanism of appetite suppression through
hoodia and isolated the active molecule in the 1990s. They filed a patent in
1996 to reserve the right to make use of the molecule for commercial purposes,
e.g., as an anti-obesity drug. A license to develop and market products from
the patented molecule was contracted to the UK-based company Phytopharm
in 1997. Phytopharm sold the rights to the pharmaceutical giant Pfizer for $21
million in 1998. At that time the market volume for an effective appetite sup-
pressant authorized as a drug for human use was estimated to be up to $8 bil-
lion per year.
The San people launched a political and legal battle to get a share of the
profits the CSIR could expect from the license to Phytopharm. After long nego-
tiations a Memorandum of Understanding was achieved in 2002 which entitled
the San to 8 percent of all milestone payments CSIR would receive from Phy-
topharm during product development and 6 percent of all license fees to be paid
when a product reaches the market. The representatives of the San were hopeful
that the payments due would amount to $1.3 million until 2007 and be approxi-
mately the same every year when a product was on the market (Wise, 2003).
255
256 Who Owns Knowledge?
In 1998 one could assume that the hoodia patent which the CSIR scientists had
filed without asking the San communities would be exploited commercially
without sharing the benefits with the San communities. This prospect triggered
public outrage. A coalition of NGOs devoted to the defense of the rights of in-
digenous people, decried the behavior of the CSIR and the involved companies
as “biopiracy.”
This is a major case of biopiracy. Corporations are scouring the globe looking to
rip off traditional knowledge from some of the poorest communities in the world.
Consent or compensation is rarely given. (Speaker of Action Aid, quoted in The
Observer, 2001)
The episode was a blatant example of biopiracy, the exploitation for profit, of
‘civilized’ society, of the knowledge and natural resources of indigenous people
through theft of their intellectual property, leaving them out in the cold. (Block,
2004)
once the secret is lifted, the knowledge falls in the public domain. It becomes
a collective good, a common heritage of mankind, and can be appropriated
through learning and used commercially without asking the original holder or
inventor of the knowledge for permission and without sharing benefits with
them. Regimes of intellectual properties give exclusive rights of commercial
use for a limited period of time (mostly 20 years for patents) to those who
disclose new knowledge (an invention). However, after the expiration of the
patent the invention is added to the stock of science and technology which can
be freely used by everybody worldwide. Thus, with respect to their traditional
knowledge about the hoodia cactus the San people are in no other situation
than farmers, artisans, or scientists in any society with respect to the knowl-
edge they have contributed to the available cognitive resources. But in the lat-
ter case, nobody claims theft or misappropriation when the knowledge is used
for further development of technology and production.
Nevertheless, the criticism of the way the traditional knowledge of the San
was handled, was successful. The CSIR hastened to emphasize that it had al-
ways planned to seek the participation of the San communities. And Phyto-
pharm provided as a defense that they had assumed that the tribe whose knowl-
edge served as a basis for isolating the protected hoodia molecule, was long
extinct. Apparently, there is an understanding that it would be unfair to apply
the notion and the rules of the public domain to the traditional knowledge of
indigenous people in the same manner as to the “traditional” knowledge of
modern societies (see also van den Daele, 2004). But why is it unjust to treat
things equally in this case?
One argument, often advanced, is that “public domain” is a purely Western
concept that must not be transferred to the knowledge of indigenous people.
For these people the knowledge handed down from their ancestors is not just
information which they can transfer and disseminate; rather it is an inalienable
cultural heritage only entrusted to them as custodians. Therefore, whether and
how such knowledge can be legitimately used must be decided by the custom-
ary law of the indigenous communities not by the modern legal rules of the
nation states.
Another argument relates to how indigenous knowledge has come to be in-
corporated in the public domain. This has frequently happened through the oc-
cupation and violent opening up of indigenous societies through colonial rule
or through the ongoing oppression of the cultural autonomy of these societies
in post-colonial nation states. In view of such practices any invocation of the
public domain should be dismissed as illegitimate (Dutfield, 2000).
Finally, it is argued that regimes of intellectual property which render tra-
ditional knowledge a collective good are inherently biased in favor of indus-
trialized countries. These countries can under such a regime use the traditional
258 Who Owns Knowledge?
In juridical terms the operational value of this norm may be quite low, due
to the many reservations added. With regard to the hoodia case it is moreover
doubtful whether the knowledge of the San about the appetite suppressant ef-
Drug Research Based on Traditional Knowledge 259
fects of the cactus is at all covered by the norm. While the knowledge clearly
embodies traditional lifestyle, it can hardly be held to be “relevant for the con-
servation and sustainable use of biological diversity.” In political terms, Article
8 (j) is nevertheless increasingly taken as the recognition by international law
that indigenous people can claim special rights to their traditional knowledge.
Accordingly, the TRIPs Agreement of 1994, which regulates the global exten-
sion and implementation of intellectual property rights, leaves room for con-
tracting states to provide special legal regimes for the protection of traditional
knowledge (Article 27). The question of how such a regime should be designed
is on the agenda of the UN World Intellectual Property Organization (WIPO)
and of parliaments in many countries of the South. The question is unresolved,
despite a plethora of conferences, working groups, model laws and despite
legislation in some countries.
enous knowledge from the public domain that has only been disclosed during
the last 20 years.
Incompatible legal perspectives prevailed in our discussions also over the
question whether the rights (property) of indigenous communities to their
knowledge can ever expire. According to the customary law of indigenous
communities (this was the argument) traditional knowledge is handed down
from generation to generation and remains the property of the community as
long as this community exists. The Peruvian Act of 2002 likewise implies that
indigenous knowledge, if it has not been released into the public domain more
than 20 years ago, remains the exclusive property of the respective community
forever. The modern law, in contrast, limits all intellectual property rights in
time. A compromise offered in the dialogue was that traditional knowledge
should be considered exclusive property as long as the holders manage to keep
it within the confines of their communities — which amounts to the protection
of secrets not uncommon also under the principles of modern law.
It became also apparent in the deliberations in our discourse that the no-
tion that indigenous communities are collective trustees or custodians of their
knowledge is already refuted by processes of differentiation triggered in these
communities through contact with the modern sectors of the national societies.
Frequently, the indigenous traditional knowledge is held and administered by
specialists who act as travellers between the divided cultural worlds. Associa-
tions of traditional healers, for instance, which exist in many African countries,
propagate and sell natural medicine in all sectors of the society. They more
closely resemble modern professional organizations than institutions of the in-
digenous communities. And they are unwilling to accept that the scope of their
professional activities is circumscribed by the customary law of their tribes
rather than by the laws of the nation state.
And a final point: Quite a few indigenous people leave their communities
and migrate to the modern sectors of the society. They thus remove themselves
and the traditional knowledge which they embody from the jurisdiction of the
customary law. Since these individuals are at the same time national citizens,
it is difficult to envisage that they will not be allowed under the national law to
make use of the knowledge and craft they have learnt in their tribal past.
4. The Future of Justice for Indigenous People and the Future of the
Public Domain
If we assume that the rules agreed upon in our stakeholder dialogue represent
more or less what can reasonably be expected as a legal regime for the protec-
tion of traditional knowledge, it follows that it is unlikely that the customary
law will prevail and the political aspirations underlying the rhetoric of “biopi-
262 Who Owns Knowledge?
racy” will come true. None of the rules agreed upon implies that the knowledge
about the appetite suppressant effect of hoodia would have to be removed from
the public domain of the South African society and channelled back to the ex-
clusive property of the San people. The criticism of “biopiracy” against CSIR
and Phytopharm would be completely unwarranted. By the way: The same
result follows if one applies the Peruvian Act of 2002.
It is nevertheless unlikely that the moral pressure in support of claims like
those of the San people will recede in the near future. The battle for the protec-
tion of traditional knowledge is a symbol for the battle for justice towards in-
digenous people in general. And as long as the underlying issues of justice are
not addressed representatives of indigenous communities and their NGO allies
will continue to raise sweeping criticisms of biopiracy. And companies will
continue to pay for the use of traditional knowledge rather than face biopiracy
campaigning. However, this will mainly apply to foreign and transnational
companies which can easily be targeted in the mass media. So far, there is no
indication that the South African companies which meanwhile offer natural
products from hoodia in the Internet, have been exposed as “biopirates.”
It is questionable whether increased protection of traditional knowledge
will at all contribute to the justice issues which are at stake for the indigenous
communities. It is clearly not a proper means to regain land rights. It seems
also clear that collisions which emerge in the regulation of traditional knowl-
edge between tribal customary law and national or international law will not in
general be resolved by giving tribal law the preference. Finally, payments from
benefit sharing will almost certainly be frustrating. There is a long way from
the traditional knowledge to its commercial use, and the way is often a blind
alley – as is exemplified by Pfizer’s retreat from drug development with the
hoodia molecule. Few projects will yield benefits that can be shared. It seems
quite unrealistic to expect that a company that uses traditional knowledge will
ever pay 10 percent of the sales (before taxes) achieved with products devel-
oped from that knowledge — this is, however, exactly what the Peruvian Act
requires as minimum benefit sharing. It is more realistic to fear that the higher
the hurdles are that protect traditional knowledge, the greater is the risk that
indigenous communities end up with nobody wanting to use their knowledge.
The situation is quite similar with respect to benefit sharing under the CBD.
The nationalization of genetic resources (state property) ruled by the CBD
has not resulted in any notable financial transfer to the developing countries,
because these resources are not used. Insiders have sarcastically remarked that
the most important transfers that have been achieved were the travel expenses
for numerous international conferences in which national bureaucrats, profes-
sional experts and NGO representatives discussed benefit sharing.
Drug Research Based on Traditional Knowledge 263
References
1 Mireille Hildebrandt teaches law and legal theory at the Law Faculty of Erasmus
University Rotterdam and is seconded to the Law Science Technology and Society
(LSTS) at the Vrije Universiteit Brussels as senior researcher on an interdisciplin-
ary research project, coordinated by Serge Gutwirth, Bruno Latour and Isabelle
Stengers, financed by the Belgium Science Policy Office, called: The Loyalties of
Knowledge. The positions and responsibilities of the sciences and of scientists in
a democratic constitutional state. See http://www.vub.ac.be/LSTS/people/Hildeb-
randt/index.shtml. This contribution has been inspired by the challenging research
done within the project on the Loyalties of Knowledge. A first version of this text
was presented at the international conference on “Can Knowledge Be Made Just”
at the Kulturwissenschaftliches Institut in Essen, Germany on 23rd March 2005;
a second version was discussed at a seminar of the Information Systems Integrity
Group of James Backhouse at the London School of Economics on 20 October
2005. I want to thank the participants of both meetings for their challenging and
enthusiastic comments.
265
266 Who Owns Knowledge?
present legal framework (section 5). Fifth, I will discuss the crucial difference
between a profile as a correlated data subject and the person of flesh and blood
as a correlatable human (section 6). Sixth, I will explore the possibilities for
the law to make profiling practices justiciable. I will claim that for data pro-
tection legislation to take effect — that is, for profiles to become justiciable
— both specific technological design and an effective fair trial are a precondi-
tion. Finally, I will indicate how the law of a constitutional democracy in fact
both presumes and — for this reason — should create a position from which
humans as linkable data subjects with a sense of self can make knowledge-
constructs such as profiles justiciable (section 7).
2. Profiling Practices
With Custers (2004:17–20) I think that profiling practices are a way to gener-
ate knowledge from data. This knowledge consists of patterns or correlations
between data (sets). To give a simple example: if we have a database with data
on the color of your eyes and a series of transactions at your local grocery,
a correlation may be found between the color of your eyes and your prefer-
ence for certain products (eye shadow would be predictable, but other, more
unexpected correlations might turn up). In marketing, this way of generating
correlations (exploratory research) has been used since the 1970s (called re-
gression analysis). The tools for discovering such correlations have improved
exponentially, while the transaction costs for searches in huge databases have
decreased enormously. The whole process of profiling is often described in 4
steps: data collection, data preparation, data mining, and interpretation (KDD-
model: knowledge discovery in databases), see e.g. Custers (2004:17–20).
These are not obvious steps, as they all require a certain infrastructure and the
restructuring of information in a way that fits a database. As Lyotard remarked
in 1984:
Along with the hegemony of computers comes a certain logic, and therefore a cer-
tain set of prescriptions determining which statements are accepted as ‘knowledge’
statements. (quoted by Van Brakel, 1999:3/15)
Data collection requires that certain types of behavior (buying things; visit-
ing places; surfing on Internet; speaking with colleagues, friends, clients, sup-
pliers) are not only observed but also recorded and stored. This is a major dif-
ference from previous observation of behavior in public space as the data were
not often recorded and stored (Lessig, 1999a:143, 150–151). For instance, if
you buy bread around the corner and pay with cash, this will be observed by
others, but your “transaction” will not be recorded, stored and linked with other
268 Who Owns Knowledge?
data that were recorded, stored, and aggregated; money is still mostly anony-
mous today, although even this may be otherwise once banknotes are equipped
with RFID-tags. Second, these data have to be aggregated into databases. To
profile clients of a bank, all transaction data that come into different depart-
ments of the bank have to be stored as transactions of the same client, because
to profile customers as high or low spenders it is necessary to identify as many
different transactions possible as emanating from this one person. This is why
integration of different databases becomes interesting (and profitable), lead-
ing to a market for data and databases. Third, data mining — the process of
generating correlations or checking on the outliers of established correlations
—requires creativity (to select data to be correlated and the algorithms that
may produce correlations) and professional expertise (to detect spurious cor-
relations that do not have any independent explanatory power).
The fourth step is the central issue of profiling: the emergence and interpre-
tation of correlations. The point is that a correlation does not mean anything
until it is interpreted: it does not necessarily indicate reasons or causes. Of
course it can be used as a hypothesis, claiming a causal link. The interest-
ing thing about profiling is, however, that it does not start from a hypothesis
that is then rigorously tested/falsified/verified, but that it generates correlations
without necessarily even being interested in causality or human reason. For in-
stance, it is possible to observe online behavior such as the relative speed with
which certain keys are touched on the keyboard. It is also possible to profile this
behavior to such an extent that a person may be recognized as the same person
on the basis of her typing behavior. Those who use this kind of identification
technology are not interested in the causes of your typing behavior, nor in your
reason for hesitating between the a and the i. They are interested in identifying
you as the same person over a period of time (personalizing), and, perhaps,
linking the information with that of others, being able to predict certain traits
or behavior as correlating with your typing behavior (group profiling).
As Custers (2004:56–58) observes, profiling may not build on the tradi-
tional methodologies of the social or natural sciences that aim at explanations
(in terms of causes), or understanding (in terms of meaning). Interpreting the
correlations is not usually done to construct theoretical knowledge about soci-
ety or persons (e.g., in sociology or psychology), but to decide on the next step
to be taken. Data-mining technologies are instrumental for decision-making
processes. For instance, in the case of marketing the question will be: which
type of persons will be identified as potential customers, and to which ap-
proach will they respond; in the case of crime control: which type of persons
will be targeted as potential suspects to investigate further; and, in the case
of anti-terrorism or immigration: which type of persons will be identified as
potential terrorists or illegal immigrants. In fact, correlations seem to create
Profiles and Correlatable Humans 269
new meanings. Insignificant personal data may thus turn out to be highly sig-
nificant. Also, the data may correlate with sensitive personal information that
is protected by privacy legislation. To avoid the constraints of data protection
one could use seemingly insignificant data that correlate with sensitive per-
sonal data. This is called masking (Custers, 2004:57). Traditional protections
may not work here, and countering traditional conceptions of science may be
an irrelevant exercise. Profiling is about generating a new type of knowledge,
consisting of patterns in data that are interesting and certain enough for a user;
it is not necessarily about science. It could very well be that the impact of
these technologies and practices is more fuzzy, more precise, more implicit
and more worrying than the impact of scientific knowledge. See, e.g., Glenn
(2004:352) on the fact that fuzzy logic is “very precise, very informed, and
highly particular”; profiling may produce categorizations not unlike those of
fuzzy set theory, mapping the vagueness of real life with a new measure of
precision.
dynamic way (meaning that one has to be ready to readjust one’s categories at
any point in time). In fact, automated profiling reaches a level of sophistica-
tion that turns it into a very precise specification or personalization — even if
still on the basis of statistically sound generalizations (group profiling). This
may reduce wrongful categorization, but if that is the case, the accuracy of the
intimate knowledge it produces may reinforce stigmatization back to the level
of social control in a village community.
A third way of looking at the purpose of profiling is warning persons of the
risk they run and thus confronting them with knowledge about themselves that
they had no access to (genetically determined disease, for instance). This con-
frontation will enable them to take measures, but it may also impact their sense
of self in an existential way. Profiling may offer them choices they would have
lacked otherwise, but profiling may also reveal secrets of the self that force a
person to reconstruct her identity (Hudson, 2005).
A fourth function profiling may take on is customization. As a result of tar-
geted advertising a person may be confronted only with those advertisements
that ought to interest him, considering his past behavior. If we move on to the
advance of targeted servicing and Ambient Intelligence this perspective be-
comes pervasive. In the case of Ambient Intelligence, the combination of ubiq-
uitous computing and intelligent devices enables your environment to respond
to your wishes before you become aware of them and to restructure itself in
tune with the anticipations you carry “under the skin.” This sounds like heaven
— and like hell. It can reduce the feedback you get from your environment, as
you begin to live in a world of your own making. The diversity of unexpected
and unwanted confrontations with others, whether human or nonhuman, could
be suppressed by your intelligent agent that “knows” — on the basis of your
past behavior — what you would probably want and expect. We should add
that the line between customization and manipulation is a thin one. To quote
Lawrence Lessig (1999a:154):
When the system seems to know what you want better and earlier than you do,
how can you know where these desires really come from . . . profiles will begin to
normalize the population from which the norm is drawn. The observing will affect
the observed.
that can be falsified/verified (Custers, 2004; Scott Armstrong, 1970); fifth, pro-
files can impact our lives in a number of ways without us ever being aware
of the fact that we were included in or excluded from certain opportunities or
risks on the basis of a profile; sixth, profilers may “know” things about us we
don’t know about ourselves (Hudson, 2005; Rose, 2003:86–87).
4. the use limitation principles, stating that disclosure or use for other pur-
poses is only allowed in case of consent of the data subject or on the basis
of the authority of the law;
5. the transparency principle, stating that the data subject should be able to
know about the collection and storage of personal data, their purpose and
the identity of the data controller;
6. the individual participation principle, stating that a data subject has the
right to erase, rectify, complete or amend her data; and finally
7. the accountability principle, stating that the data controller should be ac-
countable for complying with these principles.
In more generic terms we could sum up these principles under the heading of a
principle of minimum asymmetry, combining demands of opacity for personal
information with demands for transparency in the case of lawful monitoring of
such data. Such a combination of opacity and transparency, argued by Gutwirth
and De Hert (2005), offers a more balanced regime of informational freedom
than David Brin’s breathtaking thought experiment. Brin (1998) claims that
attempts to achieve opacity for individuals is outdated and should be substi-
tuted for attempts to provide total transparency of all information everywhere
(implying that even the White House will be a Glass House, Rosen, 2004:195).
As such, the principle of minimum asymmetry has been described by Jiang
(2002:4) in terms of a privacy-aware system that
should minimize the asymmetry of information held between data owners and data
collectors and data users, by: (1) decreasing the flow of information from data own-
ers to data collectors and users, and (2) increasing the flow of information from data
collectors and users back to data owners.
The first part of the principle is equivalent to the data minimization principle,
demanding maximum opacity of personal information, heralded by privacy
propagators; the second part of the principle adds the principle of transparency
that is constitutive for data protection regimes. Other than Jiang, data protec-
tion legislation so far does not think in terms of data owners; especially in
Europe data protection is considered a personal right and/or human right that
cannot be traded (Gutwirth and De Hert, 2005; Prins, 2004).
This all sounds very fair and very just. However, as we have seen, the es-
sence of profiling is the ubiquitous process of collection, storage, aggrega-
tion, and processing of data in databases. If such ubiquitous processes take
place and develop into forms of ambient intelligence whereby our personal
Profiles and Correlatable Humans 275
digital agents interact with an animated environment on a real time basis, data
protection with its dependence on traditional legal tools seems to be totally
inadequate. The sheer number of decisions taken by intelligent devices, soft-
ware programs, and personal digital agents seems to invalidate traditional legal
concepts like (1) liability for individual actions, (2) transparency of and access
to personal information, (3) limitation of the use of data for specific purposes
and, especially, (4) consent as the basis for collection, storage, and processing
of personal data. This is the case because (1) the actions of electronic devices
that (will) impact our lives may at some point resist reduction to actions of
a specific human agent; (2) the amount of data being collected and the low
transaction costs for the data controller make transparency and access virtually
impossible; (3) as the essence of profiling is linking data and discovering for
what purpose the emerging profiles could be used, not much can be expected
from attempts to prohibit linking and using data for other purposes; and (4)
this is even more pertinent as so many daily transactions require consent of a
kind that can hardly be taken seriously, considering the consequences of refus-
ing consent and the impossibility of reviewing all the different conditions on
which consent is given.
We may conclude that the logic of profiling (ubiquitous linkability, unob-
trusive correlatability) is at odds with the logic of data protection (providing
citizens with the means to refuse and/or direct their linkability). One builds on
invisibility, the other on transparency. Unless the principles of informational
privacy can — for instance — be built into the personal digital agents (PDA)
that manage the exchange of data, and unless these privacy-enhanced PDAs are
widely used by human data subjects, profiling technologies will simply disable
data protection legislation. This confronts us with a new problem. The risks of
illegitimate (unjust, or even illegal) profiling could be managed by developing
a technological infrastructure that can prevent ubiquitous transparency of citi-
zens, while at the same time promoting transparency of data controllers (prin-
ciple of minimum asymmetry). However, such a technological infrastructure
would need a legal, economic, and social infrastructure that is conducive to the
creation and real-time maintenance of the balance between personal opacity and
organizational transparency. We may in fact need new ways of interdisciplin-
ary thinking to develop business models, engineering design, and legislation
adequate to allow the emergence of such technologically embodied law. In the
following, I will focus on the legal preconditions for such a system of checks
and balances, notwithstanding the fact that the legal exploration will need ad-
equate integration with the domains of what Lawrence Lessig (1999a) calls the
market, social norms, and the architecture of our environment (see also Koops
and Leenes, 2005). I would add that in propagating technologically embodied
law, I do not plead an instrumentalist attitude to law and technology, whereby
276 Who Owns Knowledge?
technology is used to enforce social norms without public debate and without
any possibility to choose alternative actions. In reaction to Lessig (1999a) and
Reidenberg (1998), Tien (2004) and Brownsword (2005) have indicated that
such instrumentalism would in fact treat citizens as objects to be manipulated
into preferred behavior, instead of appealing to them as rational agents or rea-
sonable subjects. This sounds like the Pavlovian reaction of a lawyer, who can
only think in terms of law as the democratically legitimated commands of a
sovereign, in opposition to technology as an implicit form of regulation that
forces your hand without a possibility for contestation either in the political or
the judicial forum. The point I am making — and that I believe Lessig to be
advocating — is rather that technology regulates our lives anyway, and that it
is up to us to make an informed choice about the technological infrastructure
that facilitates the type of society we want to live in.
6. Correlated Data Subjects and Correlatable Humans
The simple fact that profiles can, do, and will affect our lives in both positive
and negative ways raises many questions. On the one hand, these questions
concern the impact of false positives and false negatives (wrong categoriza-
tion): how to organize the possibility of resistance to knowledge claims regard-
ing an individual based on the group profile that is applied to her? If the profile
is non-distributive, meaning that not all members of the group or category share
all the attributes of the profile, it cannot be concluded that the profile applies to
an individual member of that group or category. Applying the profile may thus
lead to selection or exclusion on false grounds. On the other hand, the ques-
tions raised concern the impact of knowledge about a person that stigmatizes
this person or an entire group of persons; knowledge that confronts a person
with information about herself she may not want to know; knowledge that is
used for targeted servicing leading to customization and de-individualization.
Can the law make these knowledge constructs justiciable in relation to both
types of questions: (1) questions about fitting people into wrong categories and
(2) questions about effects of fitting people into categories as such? The first
type of question is important but seems obvious: if you can give evidence that
the profile does not apply to you, you have a case. The second type of question
is less obvious: if the profile applies to you and is not abused for unjustified
discrimination, what is the problem?
To explain what could be the problem, we must look into the proliferation of
profiles that are emerging. These profiles can be understood as correlated data
Profiles and Correlatable Humans 277
flect upon the prototypes that direct the way others deal with us, because only
the profiler has access to them, these images of the self determine us beyond
recognition. The thin line between monitoring and manipulation will lose its
significance if we do not know what profiles are at work; we will find our-
selves at the mercy of those that are so eager to service us with anything that
brings them a profit.
The attempts to define a person can thus have as a consequence that targeted
servicing creates an environment that responds to desires we did not know we
cherished, pinning us down to the inferences made on the basis of past transac-
tions. How can we challenge these inferences, and counter the future laid out
for us? What happens if a suspect is faced with a profile that defines him as
a psychopath, based on strings of data that have been correlated and prove a
high probability of repeated criminal actions? Should he accept the profile and
conform to the expectations thrown in his face, or should he accept the profile
and decide to change his lifestyle? Should the law think of him as a lost case
or provide the means to counter both the applicability of the profile and, if it is
accepted as applicable, its deterministic implications?
The English language does not recognize the term “justiciable.” Luckily, the
initiators of the conference which led to this volume, invented it. Curiously the
conference had two titles: Is knowledge justiciable? Can knowledge be made
just? What could it mean to make profiles, as knowledge constructs, justi-
ciable? Is making them justiciable the same as making them just? As a lawyer,
I feel rather attracted to the idea of making knowledge justiciable, because it
is a more modest claim than making knowledge just. Justice is something to
be strived for, certainly by the law, but, as Derrida (1994) professes, to claim
justice is — perhaps paradoxically — clearly a bridge too far. The difference
between law and morality is that the first can settle disputes, while the second
has probably caused them since we so often differ on what morality demands.
At the same time, however, morality is also a part of the law: the disputes it
causes at the heart of the law nourish the vitality, complexity and responsive-
ness of the law. Above that, the law can even be said to be embody a specific
morality, precisely because it makes things disputable (justiciable). To make
knowledge just would be claiming the Archimedian foothold from which to
dictate true knowledge, while to make knowledge justiciable is rather the op-
posite. It means that we bring competing knowledge claims within the jurisdic-
tion of a fair trial that allows their proponents to plead their case. I will thus
280 Who Owns Knowledge?
restrict myself to raising the question of what it takes to make the knowledge
claims of profiling practices justiciable.
From the perspective of democracy and the rule of law, the answer is three-
fold: first, we need legislation that constrains technological design and its ap-
plications to fit the demands of a democratic constitutional state. This means
that we will at least have access to the profiles that are applied to us and have
the legal tools to contest the knowledge claim they present. Second, the most
important legal tool to accomplish this is a fair trial that makes the knowledge
claims of profiles justiciable whenever they have legal consequence. As I dis-
cussed in other work (Hildebrandt, 2006b), the fair trial offers an interesting
“ideal type” or “good practice” for the testing of knowledge claims. The com-
bination of the interrelated principles of an independent and impartial judge,
a public hearing, equality of arms, presumption of innocence, contradictory
proceedings, and the principle of immediacy provides a setting that allows
lay persons to have the last word on competing expert knowledge claims. In
fact, Wakeford (2002) claims that jury trials contain an interesting setting for
rethinking both the construction of knowledge and the issue of representation,
namely participative instead of aggregative. As indicated before, we need to
develop a technological infrastructure that detects when and where profiles are
constructed and anticipates the use made of them. Otherwise we have no way
of knowing which and how knowledge claims are impacting our lives. Third,
we need a concept of the legal person that empowers a person to question the
construction and application of profiles as they impact humans as correlatable
data subjects and as persons with a sense of self.
In this last section I will focus on the concept of the legal person that is pre-
conditional for the democratic constitutional state and for the fair trial that
embodies the constitutive principles of the rule of law. The concept of the
legal person affects two things. First it provides a position from which ac-
tions — such as knowledge construction — can be made justiciable if they are
claimed to cause harm. This position is effectively actualized in the “fair trial.”
The formal equality attributed to the legal persona in court empowers humans
of flesh and blood to contest unjustified discrimination on the basis of inferred
profiles — provided the technological infrastructure exists that can detect the
use of profiles.
Profiles and Correlatable Humans 281
Second, the fact that the law thinks in terms of the legal person (legal sub-
jectivity) provides an artificial position that shields humans as correlatable data
subjects and as persons with a sense of self from complete determination. The
concept of the legal person refers to the Greek persona, which was the mask
behind which actors hid themselves when they performed in a theatre. The
mask indicated the role they played. When a subject takes the stand in a court
of law, the construct of the legal person prevents confusion between the role
the subject takes on the one hand and the indeterminate subject of flesh and
blood on the other hand (Foqué, 1996; Foqué and ’t Hart, 1990). One could ar-
ticulate this in another way by saying that the concept or construct of the legal
person allows the human person as a correlatable data subject with a sense of
self to resist the profile (the correlated human) and/or the way it affects her life.
The importance of the legal person is that it protects the essentially underdeter-
mined nature of the human person against the desire of the state and the market
to categorize its subjects in such a way that they fit the logic of state bureau-
cracy and/or market imperatives. By insisting on the correlatability of humans
against knowledge claims concerning correlations, the legal person confirms
and protects what Deleuze would perhaps have called the virtual character
of the correlatable human. The law, by instituting the legal person, creates a
distance between the correlatable human and the correlated data subject, thus
creating a specific type of freedom. This freedom allows us to challenge the
actual profile; by virtualizing it back to the questions it presumes, thus creating
the possibility, for instance, to claim the irrelevance of the actual profile.
Imagine a group profile that attributes certain properties to members of the
group. If the profile is non-distributive (as most non-trivial profiles are), cat-
egorizing members by means of the profile will produce false negatives and
false positives. If a person takes action in a court of law claiming that the pro-
file is not applicable in her case, she in fact challenges the move from the prob-
able to the real. This is the more obvious reason why we want to know whether,
which and how profiles are used to infer things about our person. Imagine a
person is profiled as a psychopath according to the checklist of the famous
professor Hare (Edens, 2001), because she has the properties that define a psy-
chopath. Though she may in fact fit the profile, she may want to question the
validity of knowledge constructs that form the basis of her profile (claiming
in her case the profile is a false positive) and/or she may want to question the
relevance of categorizing people on the basis of Hare’s checklist. In that case,
she may claim that the profile of a psychopath as constructed by Hare answers
the wrong question, looking only for the probabilities that define an ensuing
reality, instead of virtualizing actual traits and thus opening the way for new
actualities (Stengers, 1997:147).
282 Who Owns Knowledge?
8 Concluding Remarks
References
Agre, P.E. (2001) “Beyond the Mirror World: Privacy and the Representational Practic-
es of Computing.” In P.E. Agre and M. Rotenberg, eds., Technology and Privacy:
The New Landscape. Cambridge, MA: MIT Press.
Beck, U. (1992) Risk Society: Towards a New Modernity. London: Sage.
Bennett, C.J. (2001) “Convergence Revisited: Toward a Global Policy for the Protec-
tion of Personal Data?” In P.E. Agre and G. Bramhall, eds., Technology and Pri-
vacy: The New Landscape. Cambridge, MA: MIT Press.
Brin, D. (1998) The Transparent Society: Will Technology Force Us to Choose Between
Privacy and Freedom? Reading, MA: Perseus.
Brownsword, R. (2005) “Code, control, and choice: why East is East and West is West.”
Legal Studies, 25(1):1–22.
Canhoto, A. and J. Backhouse (2004) Constructing Categories, Construing Signs
— Analysing Differences in Suspicious Transaction Reporting Practice. London:
Information Systems Integrity Group, London School of Economics.
Clarke, R. (1994) “Human Identification in Information Systems: Management Chal-
lenges and Public Policy Issues.” Information Technology & People, 7(4):6–37.
Custers, B. (2004) The Power of Knowledge: Ethical, Legal, and Technological As-
pects of Data Mining and Group Profiling in Epidemiology. Nijmegen: Wolf Legal
Publishers.
De Mul, J. (2003) “Digitally mediated (dis)embodiement. Plessner’s concept of excen-
tric positionality explained for cyborgs.” Information, Communication & Society
6(2):247–266.
Profiles and Correlatable Humans 283
Science, and the behavior of scientists, has never been perfect, but the im-
perfections now seem to matter more. Consider the South Korean scientist
Hwang Woo-Suk, who was selected as one of Time magazine’s “People Who
Mattered” in 2004, for having allegedly extracted stem cells from cloned hu-
man embryos. Nevertheless, despite having published in Nature and Science,
the world’s leading scientific periodicals, Hwang’s research was found to be
based on unethical treatment of subjects and, more importantly, the misrepre-
sentation of data (especially multiple reports of the same data). By Christmas
2005, Hwang had been forced to resign from Seoul National University, and
six of his co-workers were suspended or had their pay cut. Hwang and his col-
leagues are hardly alone. In response to the recurrence of well-publicized and
highly damaging scandals across the physical and biological sciences in recent
years, many universities and some entire national research funding agencies
now convene “institutional review boards” to deal with breaches of what has
come to be known as “research ethics.”
It may be flippant to regard the recent emergence of “research ethics” as
an academic craze. But perhaps “moral panic” is a more apt description. To
be sure, from artists to scientists, all intellectual workers are preoccupied
with the giving and taking of credit. The hiring, promoting, and rewarding
of academic staff is increasingly based on “citation counts,” which consist in
the number of times someone receives credit in peer-approved publications.
Even if someone’s work is criticized, it must be credited properly. Often
credit is given simply because one has already produced creditable work.
(This is common in grant funding decisions and can even apply in publica-
tion decisions, in terms of giving the benefit of the doubt.) But increasingly
the fixation on credit reflects the work’s potential monetary value. In the
ever-expanding field of intellectual property law, the former is covered under
copyrights, the latter under patents. However one defines the creditworthi-
ness of intellectual work, one thing is clear: Reported cases of fraud are on
the rise.
So perhaps there is, after all, a need for national research ethics boards or
even an international court of scientific justice. If so, what form should these
institutions take? These questions belong to the domain of epistemic justice,
which attempts to solve the problem of how knowledge may be produced so
as to result in the distribution, rather than the concentration, of power. In the
slogan, “knowledge is power” (or “savoir est pouvoir” or “Wissens ist Kraft”),
power involves both the expansion and contraction of possibilities for action.
Knowledge is supposed to expand the knower’s possibilities for action by con-
tracting the possible actions of others. These “others” may range from fellow
knowers to non-knowing natural and artificial entities. This broad understand-
ing of the slogan encompasses the interests of all who have embraced it, in-
Research Ethics as the Latest Moral Panic 287
cluding Plato, Bacon, Comte, and Foucault. But differences arise over the nor-
mative spin given to the slogan: Should the stress be placed on the opening or
the closing of possibilities for action? If the former, then the range of knowers
is likely to be restricted; if the latter, then the range is likely to be extended.
After all, my knowledge provides an advantage over you only if you do not
already possess it; hence, knowledge is a “positional good” (Hirsch, 1976).
This idea of positional good also helps to explain the rather schizoid atti-
tudes toward the production and distribution of knowledge that are epitomized
in the constitution of universities. In short, we do research to expand our own
capacity to act, but we teach in order to free our students from the actions that
have been and could be taken by others. I have characterized the university’s
management of this schizophrenia as “the creative destruction of social capi-
tal” (Fuller, 2003). By virtue of their dual role as producers and distributors
of knowledge, universities are engaged in an endless cycle of creating and de-
stroying “social capital,” that is, the comparative advantage that a group or net-
work enjoys by virtue of its collective capacity to act on a form of knowledge
(Stehr, 1994). Thus, as researchers, academics create social capital because
intellectual innovation necessarily begins life as an elite product available only
to those on “the cutting edge.” However, as teachers, academics destroy so-
cial capital by making the innovation publicly available, thereby diminishing
whatever advantage was originally afforded to those on the cutting edge. In
this respect, intellectual property is anathema to the very idea of the university
(Fuller, 2002: chap. 1). Recalling Joseph Schumpeter’s (1950) definition of the
entrepreneur as the “creative destroyer” of capitalist markets, the university
may be regarded as a “meta-entrepreneurial” institution that functions as the
crucible for larger societal change.
If universities are the ideal dispensers of epistemic justice, then what would
be the exact charge of a national research ethics board in the case of, say,
Professor Hwang? In other words, what is the nature of the problem associ-
ated with his research — that he claimed personal credit for work not done,
or that he allowed that work to be disseminated widely to other medical re-
searchers and practitioners? The former bears more directly on the potential
financial benefits from cloned human stem cells, while the latter bears on the
potential consequences for recipients of treatments based on such stem cells.
The ambiguity here immediately points to a problem in defining the extent of
researcher responsibility. One nation has already taken significant steps in the
right direction to address the systemic issues suggested here: Norway, whose
code of research ethics — available at http://www.etikkom.no — was drafted
by a team of academic lawyers.
The key feature of this code is its comprehensive coverage of the various
conditions under which the researcher’s autonomy is challenged: from gov-
288 Who Owns Knowledge?
have divided along predictable lines, with, say, The Economist championing
Lomborg and Scientific American condemning him. Somewhat more surpris-
ing is that the main parties to the dispute have been either just as removed from
the relevant front-line natural science or as politically motivated as Lomborg
himself. A naïve observer could be forgiven for concluding that Lomborg had
violated an implicit norm of public ecological discourse: “If you’re going to be
political, make sure you’re a certified environmental scientist. Otherwise, toe
the line and support the ecologists!”
As it happens, the author of The Sceptical Environmentalist claimed he spent
only 18 months working with students locating errors and distortions in the
statistics used by ecologists to fuel their gloomy forecasts. Lomborg had not
previously made any notable first-order contributions to environmental science
or policy, though his formal training in rational choice theory and the political
economy of welfare informed the book’s optimistic case for the future of hu-
manity. However, Lomborg’s fiercest public opponent, Harvard’s E.O. Wilson,
was himself no more qualified than Lomborg to pass judgment on the empiri-
cal state of the global environment, though he certainly has voiced informed
lay opinions on the matter (e.g. Wilson, 2002). The professional reputation of
Wilson, best known as the founder of sociobiology, rests on his studies of the
social behavior of ants. Methodologically speaking, Wilson is a traditional nat-
ural historian, not especially expert on the interpretation of statistics, on which
charges of Lomborg’s incompetence are largely based. Wilson’s significance
in the controversy surrounding The Sceptical Environmentalist — he spear-
headed the attack on Lomborg in Scientific American that helped to justify the
CSD’s inquiry — puts paid to the idea that politics is never the trump card in
science. Wilson had spent much of the past 30 years vilified for the political
and scientific malfeasances allegedly committed in the name of sociobiology,
but now, it would seem, the field has gained renewed scientific respectability
as “evolutionary psychology,” and Wilson himself has been resurrected as a
heroic ecologist, responsible for coinages like “biophilia” and “biodiversity”
(Wilson, 1984; 1992).
Aside from the pressure exerted by international notables like Wilson,
Lomborg was stigmatized by the Greens and the recently ousted Reds of his
own country for having benefited from a newly elected neoliberal government,
which made him director of an environmental assessment institute with an
eye to rolling back pollution restrictions on industrial growth. To be sure, as
Denmark’s highest profile representative at June 2002 Johannesburg “Earth
Summit,” Lomborg argued for the loosening of such restrictions. At the same
time, however, he called for the profits from increased industrial output to be
channelled into development aid to third world nations. This old-style leftist
sentiment surprised Lomborg’s neoliberal paymasters. Indeed, it showed that
290 Who Owns Knowledge?
number of humans, not as an end in itself. This point came out even more
strongly in Lomborg’s highly publicized gathering of world-class economists
in 2004 known as the “Copenhagen Consensus” (Lomborg, 2004). In contrast,
Wilson and most professional environmental scientists see themselves as con-
cerned with the future of all forms of life. Thus, they would judge humanity by
our ability to conserve the natural environment. Whereas Lomborg holds that
biodiversity may need to suffer for human starvation to be eliminated, his op-
ponents’ unqualified support for biodiversity extends to recommending curbs
on human population growth. In their own way, each side is calling for “sus-
tainable development,” but the difference in how they order priorities leads to
substantially different development policy proposals. In many respects, these
differences replay the original debates over the ecology that erupted in the late
1960s. However, back then, the difference of opinion was not so sharply di-
vided along disciplinary lines: Specifically, there were biologists on both sides
of the issue, with Lomborg’s position not so very different from that of Barry
Commoner, who also saw the imposition of population checks on the poor as a
politically cheap way of tackling the problem of the inequitable distribution of
wealth (Fuller, 2006: chap. 13; cf. Schwartzman, 1995).
A close look at Lomborg’s re-analysis of environmental data reveals some-
one cautious about recommending draconian policy solutions on purely bio-
logical grounds. He fully realizes that such solutions are designed to curtail not
only the profligate consumption patterns of the rich (which attracts media cov-
erage) but also the profligate reproductive patterns of the poor. For example,
in chapter six, when considering whether the gap between the world’s rich and
poor is truly increasing, Lomborg observes that the United Nations Develop-
ment Program nurtures such fears by drawing attention to the fact that poor
families out-reproduce rich ones. Yet, Lomborg notes, the purchasing power of
poor families is increasing (as measured by the percentage of income needed
to supply essential goods). To be sure, this point does not justify complacency,
but it does suggest that century-old eugenics policies need not be part of a
comprehensive package to reduce global poverty. If the right metrics are used
— ones appropriate to the phenomena that need to be tracked — then there is
still reason to back now unfashionable welfare policies that would encourage
economies to grow themselves out of poverty.
Later on, in Part V, Lomborg tackles the presuppositions of Wilson and his
allies more directly. Here he immediately grants that biodiversity must be part
of a comprehensive welfare policy, in that no nation should ever be dependent
on a single staple crop for its economic support. However, Lomborg is suspi-
cious of defences of biodiversity that go beyond this minimalist thesis because
they tend to be based on a peculiar ideological reading of Neo-Darwinism. For,
if Darwin is correct that there is always a struggle for survival because spe-
292 Who Owns Knowledge?
n Motivated by the idea that the interests of “science” are independent of scientists’
interests, and that scientific error will not naturally self-correct
° Scientists presumed guilty until proven innocent
° Apt for research whose integrity is easily (systematically?) compromised
by political and economic considerations.
° Allows the agency to raise its own enquiries if no one has filed a complaint.
n Requires clear sense of jurisdiction to establish pretext for enquiry:
° Was the agency involved in enabling the action (e.g. funding)?
° Can the agency enforce sanctions based on its ruling (e.g. excommunica-
tion)?
n Respected for value-added mode of enquiry that promises closure without simply
reinforcing the status quo
° Independent examinations of affected parties and witnesses
° Explicit demarcation and weighting of existing evidence
° Restitution is a collective learning experience for science
CSD was an unholy mixture of two models of judicial review that are capable
of authorizing a research ethics board. On the one hand, the CSD has elements
of a proactive inquisitorial system that promotes an independent standard of
scientific propriety in terms of which many scientists may be found generally
wanting. On the other hand, the CSD resembles a more reactive accusatorial
system that presumes scientists innocent of impropriety unless a formal charge
is brought against them. (I originally applied this distinction from the law of
evidence to the philosophy of science in Fuller, 1985: chap. 1, n. 28.) I sum-
marize the characteristics of the two systems as alternative visions of epistemic
justice in figures 1 and 2.
The natural context for an inquisitorial system is a field whose scientific in-
tegrity is regularly under threat because its research is entangled with political
or financial interests. Often these entanglements are unavoidable, especially in
the case of biomedical research. Here the inquisitors are part cost accountant,
part thought police. They ensure that the funders of scientific research are get-
ting their money’s worth by threatening to cut off the funding for scientific
transgressors. Equally the inquisitors uphold scientific standards by threaten-
ing the transgressors with “excommunication,” which would make it impos-
sible for them to practice or publish as scientists.
In contrast, the accusatorial system assumes that scientists adequately regu-
late their own affairs through normal peer review procedures. Here scientific
integrity is understood as a collective responsibility that is upheld by catch-
ing any errors before they cause substantial harm. The accusatorial system is
Research Ethics as the Latest Moral Panic 295
n Motivated by the idea that scientists normally uphold the interests of “science,” and
so scientific error will naturally self-correct, except in isolated cases of complaint.
° Scientists presumed innocent until proven guilty
° Apt for research whose conduct or application has focused impacts, and
those so impacted can easily identify themselves.
° The agency is prohibited from raising its own enquiries, if there are no
complaints.
n Requires neutrality to the adversaries to establish pretext for adjudication
° Are the agency’s interests independent of the adversaries’?
° Can the agency enforce sanctions based on its ruling (e.g. restitution)?
n Respected for its wisdom in past adjudications
° Judgments are proportional to the error, if any, committed
° Judgments deter similar cases from arising in the future
then designed for those relatively rare cases when error slips through the peer
review net and some harm results. This “harm” may involve concrete damage
to health and the environment, or the corruption of later research that assumes
the validity of fraudulent work. The legitimacy of the accusatorial system ulti-
mately depends on the accuser establishing that some harm has been commit-
ted, which she alleges to be the fault of the accused.
In the Lomborg case, the CSD failed as both an accusatorial and an inquisito-
rial body. On the one hand, the CSD agreed to decide the case before an instance
of harm had been clearly established. That certain scientists feel aggrieved that
Lomborg’s opinions carry more political clout than their own is not sufficient
grounds for “harm,” given that no adverse consequences were demonstrated to
have followed from Lomborg’s advice — minus a few bruised egos. The ag-
grieved would make better use of their time trying to defeat Lomborg-friendly
politicians in the next general election. On the other hand, the CSD collected
various opinions about The Sceptical Environmentalist without conducting a
formal examination of those opinions. Thus, readers were left to speculate about
how exactly this mass of opinion actually influenced the CSD’s judgment: Were
some sources trusted more than others? If so, why? Was Lomborg’s scientific
practice demonstrably worse than that of other environmental scientists? Is the
problem here a particular researcher or an entire field fraught with mixed agen-
das? Clear answers to these questions would have enabled the CSD to demon-
strate that it was operating with an independent standard of scientific integrity
and not simply — as Lomborg’s defenders claimed — allowing itself to be used
to settle a political score.
296 Who Owns Knowledge?
errors in the scientists they endorse. Moreover, both are entitled to make their
own mistakes and learn from them — in ways that enable them to do more
of the same in the future. This is what I call the right to be wrong, the first
article in any decent Bill of Epistemic Rights (Fuller, 2000a: chap. 1). The
liberal professions of law and medicine have traditionally enforced this right
by licensing practitioners whose competence is presumed until a charge of
malpractice is formally lodged. This structure presupposes that a clear line can
be drawn between the practitioner’s expertise and the client’s interests, on the
basis of which one can judge whether the former has served the latter. To be
sure, this line is increasingly blurred. But arguably, the line is even more, not
less, blurred in the case of strictly scientific expertise.
The public image of scientists as detached and cautious experts is not en-
demic to the scientific enterprise itself but merely to its public image. As Karl
Popper saw very clearly, scientists qua scientists advance the course of inquiry
by overstating their knowledge claims (a.k.a. “going beyond the data”) in set-
tings where they will be subject to stiff cross-examination and possibly falsi-
fied. In this respect, the entire issue of “scientific dishonesty” is misconceived,
since scientists do not really need to believe what they put forward in the spirit
of “hypothesis.” Moreover, the drive toward overstatement may well be mo-
tivated by ideological considerations, as is clear in the case of environmental
science. However, none of this need be a problem, so long as rigorous checks
are in place. But how rigorous is rigorous? It is here that the public needs to
take some responsibility for the conduct of science. However, the negative ex-
ample of the Danish CSD shows that the answer does not lie in the restriction
of debate.
My proposal moves in a contrary direction. A court of scientific justice — a
more suitable title for the successor body to the CSD — should be empow-
ered to determine whether the distribution of opinions in the media on a sci-
ence-based topic is “fair” to the various scientific researchers, interest groups,
as well as members of the public who are not obvious “stakeholders.” (This
would be the court’s inquisitorial side.) If the distribution is deemed unfair,
then the court is empowered to redress the balance by releasing funds for the
support of research and publicity into the underrepresented viewpoints. (This
would be the court’s accusatorial side.) To the maximum extent possible,
these funds will be drawn from an independent source, so as not to involve a
redistribution of the support already enjoyed by other viewpoints. This would
help insulate the court from conflicts of interest and trade-offs that the public
should make for itself. It would also underscore a basic insight of mass com-
munications, namely, that a relative increase in the visibility of an alternative
viewpoint is often sufficient to shift public opinion. The great advantage of the
proposed court is that the import of its rulings would be, at once, to check and
298 Who Owns Knowledge?
encourage scientific inquiry. Whether — and how — such a court would have
ruled in the Lomborg case is, of course, speculative. Perhaps, given the media
attention attracted by all sides to the case, it would have done nothing at all.
Nevertheless, rather than casting a broad sociological net to examine the condi-
tions that encourage researchers to cut corners and overstate their knowledge
claims, research ethics has acquired an ideological superstructure known as
“virtue epistemology,” which harks back to classical Greek ideas that to be
a reliable knower, one must be a person of good character (Zagzebski and
Fairweather, 2001). So, if one is shown to have been unreliable, he or she is
punished for moral failure, and the research system is presumed to be intact
—at least until the next culprit is convicted. Of course, virtue epistemology
does not suppose that researchers are Cartesian agents existing in splendid
isolation from each other. However, the normative glue that supposedly joins
the researchers is an elusive force of mutual attraction called trust, which in
practice simply interprets a liability as if it were a virtue. In other words, ce-
teris paribus (i.e., barring specific research ethics violations), the fact that we
can’t check our colleagues’ work — either because we lack the time or skill
— is taken to imply that we don’t need to check.
An interesting defence of this position has been presented by the Anglo-
American historian and philosopher of biology Michael Ruse who, on the basis
of his book The Darwinian Revolution (Ruse, 1979), became the founding
philosophical expert witness in US trials relating to evolution and creationism.
Ruse (2005) reprises signature cases from the history of modern biology, rang-
ing from Darwin and Mendel to Theodosius Dobzhansky and E.O. Wilson, that
300 Who Owns Knowledge?
lectual intuition. At the very least, it points to the role played by timing, what
the Greek sophists called kairos, in the revelation of fraud.
The longer it takes to reveal an alleged fraud, the harder for the revelation to
have a moral bite, since by the time the fraud is revealed it will have probably
opened up avenues of research that otherwise would have remained closed or
delayed. While perhaps of little consolation to duped researchers, from a world-
historic perspective, the opportunity costs of having been duped by the fraud
would have been recouped in the long term by the valid research that ended up
being built on what now turns out to have been invalid foundations. Perhaps
the issue of fraud would hang more ominously over Galileo and Mendel today
if the costs of believing them, both real and opportunity, were measurable and
high. However, no money changed hands and no one’s life was jeopardized in
their cases. Indeed, there are no posthumously awarded Nobel Prizes — that
is, highly desirable but scarce rewards — which would require that Galileo’s
and Mendel’s own achievements (not simply the achievements they inspired in
others) be directly compared with those of other potential recipients.
In this respect, the periodic reanalysis, and sometimes interpretive revision,
of major scientific breakthroughs by historians seriously interferes with at-
tempts to enforce strict codes of research ethics. After all, long undetected
frauds have inspired normatively appropriate research, which suggests that the
perpetrators pointed to a destination at which others eventually arrived safely.
Strictly speaking, then, those who commit such fraud are guilty more of confus-
ing the potential and the actual than the true and the false.
Indeed, had the history of science been populated by fraud busters of the
sort countenanced today, it would be now impossible to distinguish between
what philosophers call “realist” and “instrumentalist” approaches to science
(Fuller, 2000b: chap. 2). The former — exemplified by Galileo and Mendel
(as well as Newton) — made claims about causal mechanisms that went well
beyond the available empirical data. However, given the relatively decentral-
ized and risk-free nature of scientific accountability, one could “speculative-
ly” (which should be understood as a euphemism for “rhetorically” and even
“deceptively”) overshoot the commonly agreed body of evidence as long as
it eventuated in fruitful research. In other words, realists have usually ex-
isted — with the striking exception of Galileo — as tolerated but skeptically
regarded inquirers. It was only after W.K. Clifford’s self-consciously anti-
theistic address, “The Ethics of Belief” (1876), and science’s corresponding
professionalization, that responsible inquiry came to be defined in terms of a
demonstrating a sense of proportionality of belief to evidence.
In conclusion, the push to publish undoubtedly leads to fraud in the sci-
ence system, but so what? An increasingly competitive research environment
provides greater incentives to anticipate the results of research not yet done or
304 Who Owns Knowledge?
to massage the data of results already in hand. But it equally provides more in-
centives to check for such transgressions of scientific propriety. Consequently,
it is hard to say that there is now more fraud than in some supposedly less
competitive past. We might imagine the level of fraud to have been less in the
past, given the lack of incentives. But there may have been more fraud, given
the lack of check. In any case, there are no records. What most certainly does
not follow is that the relative failure to detect fraud in the past means that less
fraud occurred. Just as much, or even more fraud, may have been committed
in the past, but more rides on science today than ever before. Arguably that is
the real problem.
The current expression of concern about research fraud hides more systemic
problems with the scientific enterprise. Interest in fraud is typically limited to
the misrepresentation of research outputs, not the inputs. What is missing is
captured by the phrase “citation clubs,” whereby a circle of researchers cite
each other’s work to ensure publication in key “high impact” journals, regard-
less of their actual contribution to the intellectual basis of the research reported.
As citations are increasingly used both to inform and to assess research perfor-
mance, a subtly misleading picture is thus presented of the relative significance
of particular researchers and their fields. Still subtler is the obverse phenom-
enon of “citation ostracisms,” whereby rival researchers are strategically ex-
cluded so as either not to share credit for a finding or, at least as likely, confront
criticism that might put the finding in a less glowing light. As with ostracism in
past societies, the long-term effect of this sort of input-based fraud is to allow
the ostracized researcher’s career to die a slow and painful death — assuming
she cannot find a new home elsewhere in cognitive space.
Moreover, certain kinds of fraud might actually be desirable, especially
given science’s tendency to quickly disown its past. Many plagiarism cases
involve resurrecting work that was undervalued when first published but would
unlikely appear credible now were it revealed to have been written many years
earlier. In any case, much credible research can be — and has been — built on
the back of frauds. Once that happens, the revelation of fraud may be reduced
to a mere historical curiosity, as we have seen in the cases of Galileo and Men-
del. Truth be told, science may flourish with a fair level of fraud because reality
is more tolerant of our representations of it than we might like to think. It may
be that fraud safely goes undetected because it is “wrong” only in misrepre-
senting one’s own work, but not in misrepresenting how reality works.
No doubt readers will wonder whether my somewhat perverse reading of
the history of science simply ends up encouraging the unscrupulous to enter
science in the future. I do not believe that this is likely and, in any case, it
does not matter, as long as the scientific establishment maintains its high tariffs
on intellectual trade. The would-be fraudster would have to train for so many
Research Ethics as the Latest Moral Panic 305
References
——— (1992) The Diversity of Life. Cambridge, MA: Harvard University Press.
——— (2002) The Future of Life. New York: Alfred Knopf.
Zagzebski, L. and A. Fairweather, eds. (2001) Virtue Epistemology: Essays on Epis-
temic Virtue and Responsibility. Oxford: Oxford University Press.
12
Concluding Observations
Ralf Rogowski
The title of this collection suggests that the legal regulation of knowledge is
centered on the question of ownership. In my concluding remarks I want to test
this assumption in the light of the findings of the contributions.
The chapters raise questions of fundamental importance to the topic of legal
regulation of knowledge. These include the nature of knowledge in modern
society, how knowledge is protected by law, and the consequences legal regu-
lation has on the production and fabrication of knowledge. I shall assess these
questions in light of the answers given in the contributions. At the end, I shall
add a comment on the consequences for legal regulation that derive from pro-
cesses of reflexivity or self-reference which the legal regulation of knowledge
encounters in regulating itself.
The question of the nature of knowledge is central to any assessment of the role
of its regulation by law. The chapters shed light on it from different perspec-
tives. They deal, in fact, with different types of knowledge. There is cultural
knowledge in the form of information among indigenous people about the heal-
ing power of exotic plants, discussed by van den Daele. There is knowledge
about human beings gathered from data used for profiling purposes, discussed
by Hildebrandt. And there is the unknown knowledge in form of risk, uncer-
tainties, and danger in case of nuclear disasters or the occurrence of flood-
ing, discussed by Huber. Finally, there is knowledge derived from scientific
inquiry, discussed in a number of chapters, including those by Bora, Engel,
Marlin-Bennett and Fuller.
The chapters use different perspectives in analyzing these different forms
of knowledge. Some adopt a philosophical, sociological, or legal perspective.
Here, knowledge becomes an object to be protected, controlled, or governed by
politics or law. Other contributions employ an economic perspective in which
knowledge is primarily treated as a commodity. In this discourse, dominant
in Anglo-American discussions, knowledge is viewed as property that can be
traded. It is translated into prices and attributed to specific owners who have
307
308 Who Owns Knowledge?
At the global level, the UNESCO World Report “Towards Knowledge Soci-
eties” (UNESCO 2005) paints a similar optimistic picture by emphasizing the
potential of the new technologies that offer real prospects for human and sus-
tainable development and the building of more democratic societies. However,
the UNESCO Report also addresses critical issues, in particular the widening
of the so-called digital divide between the most favored and the developing
countries.
A special type of knowledge is scientific knowledge in the form of empiri-
cal evidence or discursive knowledge derived from theories, and, in particular,
reflexive knowledge or knowledge about knowledge. This form of knowledge
is studied in specialized disciplines like sociology of knowledge or science
and risk studies. What do we learn from the chapters about trends in reflexive
knowledge production?
Scientific norms are increasingly used as a basis of political and judicial
decision-making. However, the use of scientific expertise in political and ju-
dicial practice is riddled with problems of misunderstanding, resistance, and
distortion, as Engel shows in detail. The judicial system resists scientific con-
cepts on system-specific grounds unless its own doctrinal practice has become
reflexive. Furthermore, research is increasingly dominated by profit-oriented
activities due to a lack of public funds, as Marlin-Bennett shows.
What Stehr more or less convincingly claims to be characteristic of the
modern economy, namely moralization of markets, seems to resonate with
evidence in the science system. Moralization of markets takes here the form
of ethicization of research. Scientific self-regulation shows increasing signs
of such ethicization, which is itself increasingly becoming an obstacle for re-
search, as discussed by Fuller.
judicial distinction has triggered a number of regulatory efforts and is, further-
more, an example of interpretive authority that aims at providing certainty and
determinacy, at least among practising European Union lawyers. That it is pos-
sible for the ECJ, nevertheless, to surprise and violate expectations has been
demonstrated by Somek in his ECJ case study.
IP law is certainly developing. In addition to patents copyrights and trade-
marks, so-called allied rights gain importance (Cornish and Llewelyn, 2003).
These include geographical indications, industrial and other designs as well as
undisclosed or confidential information, including trade secrets. It should be
mentioned that a main reason for rapid change of IP laws is the Internet and
new information technologies that require innovative legal regulations.
normative knowledge, we can find both types in law as well as science. Law is
not just normative but can learn and adjust to new situations as well and vice
versa scientific expertise is not just geared towards production of new knowl-
edge but gives also normative advice. Bora’s governance of knowledge at the
level of second-order reflexivity is an interesting suggestion for a new style of
knowledge politics.
We have to ask, however, what it means for law itself. Law has to address
its consequences and be able to manage legal change on the basis of insights
about its impact. This is a key topic in discussions of reflexive tendencies in
modern law (see Teubner, 1993 and the application of the concept of reflexive
law to labour law by Rogowski, 2001). We therefore need to add to Bora’s ac-
count the reflexive question about the consequences of the legal regulation of
knowledge for legal regulation itself and the possibility of second-order reflex-
ivity of “knowledge law” regarding the fabrication/production of law.
References
Cornish, W.R. and D. Llewelyn (2003) Intellectual Property: Patents, Copyright, Trade
Marks and Allied Rights. 5th ed. London: Sweet & Maxwell.
Hutter, M. (1989) Die Produktion von Recht: Eine selbstreferentielle Theorie der Wirt-
schaft, angewandt auf den Fall des Arzneimittelpatentrechts. Tübingen : Mohr.
Luhmann, N. (2005) Risk: A Sociological Theory. New Brunswick, London: Aldine
Transaction.
———(2004) Law as a Social System. Oxford: Oxford University Press.
———(1990) Wissenschaft der Gesellschaft. Frankfurt am Main: Suhrkamp
Concluding Observations 313
Piel, K. (1998) “Recht als Bestandteil einer ‘intelligenten’ Suprastruktur der Finan-
zmärkte.” Pp. 202–228 in H. Willke, ed., Systemisches Wissensmanagement. Stut-
gart: UTB (Lucius & Lucius).
Rogowski, R. (2001) “The Concept of Reflexive Labour Law.” Pp. 179–196 in J. Prib-
an, and D. Nelken, eds., Law’s New Boundaries. The Consequences of Legal Au-
topoiesis. Aldershot: Ashgate.
Stehr, N. (1994) Knowledge Societies. London: Sage.
——— (2005) Knowledge Politics. Boulder: Paradigm Publishers.
——— (2007) Die Moralisierung der Märkte. Frankfurt am Main: Suhrkamp.
Teubner, G. (1993) Law as an Autopoietic System. Oxford, Cambridge: Blackwell.
UNESCO (2005) Towards Knowledge Societies. UNESCO World Report. Paris: United
Nations Educational, Scientific and Cultural Organization
This Page
Intentionally
Left Blank
Contributors
Alfons Bora is Dean of the Department of Sociology at the Institute for Sci-
ence and Technology Studies, University of Bielefeld, Germany. He studied
law and sociology, wrote his Ph.D. 1991 in Freiburg and his Habilitation at the
Freie Universität Berlin, Germany. He was a scientific researcher at the Max
Planck Institute for Foreign and International Penal Law in Freiburg and at the
Social Science Research Center Berlin, both in Germany. Recent publications
include (with Heiko Hausendorf) Analysing Citizenship: Social Positioning in
Political and Legal Decision-making Processes, Amsterdam (John Benjamins)
2006; (with Michael Decker, Armin Grunwalk, and Ortwin Renn) Technik in
einer fragilen Welt: Die Rolle der Technikfolgenabschätzung, Berlin (edition
sigma) 2005; (with Gabriele Abels): Demokratische Technikbewertung, Biele-
feld (transcript) 2004.
315
316 Who Owns Knowledge?
for example, “Technology and the end of law,” in a volume on Limits to the
(rule of) Law, to be published by Hart.
Ralf Rogowski is Associate Professor and Director of the European Law in the
World Economy Programme at Warwick Law School, and Co-Director of the
Social Theory Centre of Warwick University. He has published widely in the
areas of social and legal theory, comparative law, and European law and policy.
His publications include Die Wirkung des Bundesverfassungsgerichts (co-au-
thored with T. Gawron, Nomos, 2007), The Shape of the New Europe (co-ed.
with C. Turner, Cambridge UP, 2006), Constitutional Courts in Comparison:
The U.S. Supreme Court and the German Federal Constitutional Court (co-
ed. with T. Gawron, Berghahn, 2002), Civil Law (New York University Press,
1996), Challenges to European Legal Scholarship (co-ed. with G. Wilson.
Blackstone 1996) and Reflexive Labour Law (co-edited with T. Wilthagen,
Kluwer, 1994).
Alexander Somek holds the Charles E. Floete Chair in Law at the Univer-
sity of Iowa, USA. His most recent publications include: Rechtliches Wissen
(Frankfurt a.M.: Suhrkamp, 2006); “Equality as Reasonableness: Constitution-
al Normativity in Demise,” pp. 191–215 in A. Sajó, ed., The Dark Side of Fun-
damental Rights (Utrecht: eleven international publishing, 2006); “Stateless
Law. Kelsen’s Conception and its Limits,” in Oxford Journal of Legal Studies
26 (2006) 753–774.
Wolfgang van den Daele studied law and philosophy. He was, until 2005,
Research Director at the Social Science Research Cener (WZB) and Professor
of Sociology at the Freie Universität, Berlin. He is a member of the German
National Council of Ethics. Recent writings include: “Legal Framework and
Political Strategy in Dealing with the Risks of New Technology: Two Faces
of the Precautionary Principle,” in Han Somsen, ed. (2007); “The Spectre of
Coercion: Is Public Health Genetics the Route to Policies of Enforced Disease
Prevention?” in Community Genetics 9 (2006): 40–49; (with Rainer Döbert)
“Rationality and Global Governance: Mediating the Conflict over Access to
Essential Medicines through Deliberations between TNCs and NGOs,” in
Gunnar Folke Schuppert, ed., (2006) Global Governance and the Role of Non-
state Actors. Baden-Baden: Nomos, pp. 157–178.
321
322 Who Owns Knowledge?
Ellins, Julia 241, 253 Fuller, Steve v–vi, 17, 37, 65, 71, 84,
Ellis, Richard 212 101–106, 127, 148, 159–160,
Employee Retirement Income Security 285–306, 307, 309
Act 29 Funtowicz, Silvio 85
Engel, Christoph vi, 84, 164–165,
169–214, 307, 309 Gagarin, Michael 188, 208
Engisch, Karl 180, 207 Galileo, Galilei 301–305, 302
Englich, Birte 201, 207 Gallo, Robert 160
English Statute of Monopolies 134 Gaskell, G. 124
Environment Agency 114–115, 123 Gates, William 105
Environmental Protection Agency 38, Geertz, Clifford 165, 190, 208
176 General Agreement of Tariffs and Trade
Epstein, S.R. 133, 148 143
Equal Opportunity Employment Genetic Engineering Act 72
Commission 35 George, V.P. 110, 123
Esterik, Penny Van 145, 148 Gerven, Walter van 233
Etkowitz, Henry 4, 12 Gewirtz, Paul 250, 253
Etzioni, Amitai 127, 130, 148 Gibbons, M. 85
Etzkowitz, H. 156, 167 Gigerenzer, Gerd 186, 190–191, 208
European Commission 84, 173, 247 Gilpin, Robert 126, 148
Evans, Jonathan St B.T. 190, 201, 207 Ginsburg, Jane C. 241, 253
Ewick, P. 71, 85 Glimcher, Paul W. 191, 208
Goffman, Ervin 270, 283
Fairweather, A. 299, 306 Gouldner, Alvin 103
Fama, Eugene 49, 65 Graff, Gregory D. 144, 148
Farnsworth, Ward 177, 199, 207 Gratt, L.B. 119, 123
Farrar, Harold 56 Green, J. 113, 123
Faure, M. 113, 115–116, 123 Greene, Richard M., Jr. 32, 65
Federal Emergency Management Agency Groot, Adrianus Dingeman de 191, 208
115 Gröschner, Rolf 174, 208
Fehr, Ernst 177, 207 Grossman, Sanford J. 58, 65
Feigenson, Neal 189–190, 201, 207 Gunlicks, Michael B. 241, 253
Feyerabend, Paul 301–302, 305 Gupta, Anil 17, 21–23, 87–98, 308
Fezer, Karl-Heinz 169, 207 Guthrie, Chris 201, 208
Fichte, Johann Gottlieb 240, 253 Gutwirth, S. 274, 283
Fish, Stanley 142, 249–250, 253
Fisher, Ronald 301 Habermas, Jürgen 21, 233, 248, 253
Fluet, Claude 183, 194, 206 Hallerbach, Winfried 179, 208
Fodor, Jerry A. 190, 208 Halpern, Joseph Y. 188, 208
Foqué, R. 281, 283 Hamilton, Alexander 126, 148, 239, 253
Ford, Kenneth M. 190, 208 Hamilton, Clark 239, 254
Fowler, J.H. 166–167 Hamilton, Peter 32, 65, 126, 148, 253
Frackman, Russell J. 29, 65 Hammond, Kenneth R. 176, 206, 208
Freedom of Information Act 25, 35–37, Haraway, D.J. 72, 84
54 Harless, David W. 178, 208
Frey, Bruno 199, 208 Harman, Gilbert 187, 201, 208
Friedman, Milton 103, 165, 174, 208 Harrison, Elad 8–9, 12
Fudenberg, Drew 174, 208 Hart, H.L.A. 234, 254
Hartlief, T. 113, 115–116, 123
324 Who Owns Knowledge?
Langerock, Hubert 180, 210 March, James G. 120, 124, 179, 210
Latour, Bruno 21, 71–72, 85 Marlin-Bennett, Renée 101–105,
Leamer, Edward E. 171, 183, 210 125–150, 307, 309, 311
Leenes, R. 275, 283 Marthinson, John E. 52, 65
Lemley, Mark A. 2, 12 Martin, Kriele 233–234
Lepsius, Oliver 172, 175, 210 Marx, Karl 11
Lerch, K.D. 74, 85 Maturana, H.R. 272, 283
Lerner, J. 167 Maurer, M.J. 157, 167
Lerner, Jost 5–6, 12 Mauss,Marcel 7, 12
Lessig, Lawrence 1, 9, 12, 156, 237, Mayer, Otto 182, 210, 310
242, 244–246, 248, 250, Mayer-Schönberger, Viktor 237–254,
252–253, 265, 267, 270–273, 310
275–276, 283 McAllester, David A. 188, 208
Levi, Isaac 176, 210 McBurney, Peter 205
Levin, R.C. 157, 168 McCaffery, Edward 201, 210
Lévinas, Emmanuel 102, 104, 126–129, McCloskey, Deirdre N. 171, 210
148 McCloskey, Donald 165, 168, 171, 210
Levine, D.K. 157, 167 McDermott, Drew V. 190, 210
Lévy, Pierre 277–278, 283 McFetridge, Donald G. 25, 66
Lezaun, J. 72, 85, 120, 123 McGarity, Thomas O. 37, 66, 169, 210
Liberatore, Angela 71, 85, 113, 121, 123 McGee, G.E. 140, 149
Lindemann, Patrizia G. 190, 213 McGuire, David 32, 40, 65
Lipinski, T.A. 90, 97 Mead, G.H. 266, 278, 283
Lisbon Agenda 68, 83, 308 Meadow, William 175–176, 210
Litman, Jessica 156, 241–242, 245, 253 Melamed, A.D. 233
Llewelyn, D. 311–312 Mendel, Gregor Johann 299, 301–305
Locke, John 238–240, 243–244, 249, Menell, Peter S. 9, 12
253, 310 Merleau-Ponty, M. 266, 283
Loeffler, Robert N. 61, 66 Merton, Robert 4, 71, 85
Lomborg, Bjørn 288–298, 305 Merz, J.F. 140, 149
Lovelock, James 292 Meyer, Philip N. 189, 210
Lovett, Marsha C. 191, 210 Milgrim, Roger M. 33–35, 66
Lucas, Robert E., Jr. 63, 66 Miller, Max 107, 124
Luckmann, Thomas 182, 205 Millo, Y. 120, 123
Luf, Gerhard 250, 253 Minow, Martha 250, 254
Luhmann, Niklas 17, 21, 71, 75, 78, 85, Mischel, Walter 206
101–102, 123, 174, 196, 210, Moore, Adam D. 1, 9, 13
215, 234, 311–312 Moravcsik, Andrew 126, 149
Moreteau, O. 124
Mackaay, Ejan 243, 253 Morree, Melinda 145, 149
Mackenzie, D. 117, 123 Moss, Laurence S. 52, 65
Maggs, Peter B. 42, 66 Mueller, Dennis C. 242, 254
Mahoney, Paul 172, 174, 200, 209 Müller, K.H. 167
Malaria Vaccine Initiative 144–145, 147 Murdoch, Rupert 247
Manktelow, Ken 186, 206, 210 Mussweiler, Thomas 201, 207
Manne, Henry 47, 59, 66
Mansfield, E. 157, 168 National Audit Organisation 118, 121
Mantzavinos, Chrysostomos 180, 200, National Innovation Foundation (NIF)
210 89, 94–95
326 Who Owns Knowledge?
329
330 Who Owns Knowledge
215–218, 221–222, 225, 231, trade secrecy 19, 25, 28, 30–49, 52–56,
247, 311 60, 135, 260, 308, 311
market 7 trade secrecy protection 32
systems theory 69, 74–75, 174, 196