Front. Blockchain Frontiers in Blockchain Front. Blockchain 2624-7852 Frontiers Media S.A. 10.3389/fbloc.2020.00012 Blockchain Hypothesis and Theory Decentralized Network Governance: Blockchain Technology and the Future of Regulation Zwitter Andrej 1 * Hazenberg Jilles 2 1Data Research Centre, Faculty Campus Fryslân, University of Groningen, Groningen, Netherlands 2Independent Researcher, Groningen, Netherlands

Edited by: Natalie Geld, MedNeuro, Inc., United States

Reviewed by: Stefanos Leonardos, Singapore University of Technology and Design, Singapore; Michael Cooper, Independent Researcher, Denver, United States

*Correspondence: Andrej Zwitter, a.zwitter@rug.nl

This article was submitted to Blockchain for Good, a section of the journal Frontiers in Blockchain

25 03 2020 2020 3 12 28 10 2019 27 02 2020 Copyright © 2020 Zwitter and Hazenberg. 2020 Zwitter and Hazenberg

This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

Advancements in the digital domain, for example, in blockchain technology, big data, and machine learning, are increasingly shaping the lives of individuals, groups, organizations, and societies. These developments call for effective governance to protect the basic interests and needs of these actors. Simultaneously, the very nature of governance is also changing. Policy-making is increasingly moving away from top-down governance by the state toward more horizontal modes of governance. This paper reviews the literature on governance theory in order to conceptualize governance as a mode of decentralized, networked regulation. We argue that the current dominant modes of governance are inadequate in understanding governance in the digital domain and are poorly equipped to conceptualize novel forms of governance such as decentralized autonomous organizations (DAOs). Therefore, this study proposes a new mode of governance based on the regulation of new power relationships between the state and actors in the digital domain. This model further explores the role that blockchain technology can play in what we term decentralized network governance.

blockchain governance networks decentralized autonomous organizations social network analysis

香京julia种子在线播放

    1. <form id=HxFbUHhlv><nobr id=HxFbUHhlv></nobr></form>
      <address id=HxFbUHhlv><nobr id=HxFbUHhlv><nobr id=HxFbUHhlv></nobr></nobr></address>

      Introduction

      Innovations in the digital domain are increasingly shaping the daily processes and interactions of individuals, educational institutions, companies, and governmental organizations. However, the theoretical frameworks of governance that are being employed concerning these have not advanced at the same pace, and fall behind in terms of regulating new technologies and their societal impact. Blockchain is one of these new technologies and is widely seen as a “swiss multi-tool” that can provide solutions for many emergent problem areas such as digital identity, data ownership, privacy, and even future decentralized decision-making (see section Mode 3 – Decentralized Network Governance and Blockchain Technology on DAOs). In this paper, we tie together the literature on governance and social network theory in order to develop a novel conception of governance. We argue that this novel conception is better at accommodating new and increasingly dominant forms of technological governance such as through blockchain technology. Moreover, we propose that it addresses governance challenges caused by blockchain technology in a more effective way. The conception of decentralized network governance relies on social network theory.

      The manner in which societies are and can be effectively governed has changed. Because of the pressures of globalization, functional differentiation, and technological specialization, governance processes and mechanisms have become increasingly decentered, horizontal, and, ultimately, networked (Rhodes, 1996, 1997; Kooiman, 2003; Van Kersbergen and Van Waarden, 2004; Bevir, 2010, p. 1–93). Policy-making no longer relies primarily on the exerted power of a single actor, which has traditionally been the state. Instead, interactions and societies are becoming increasingly governed by networks that comprise a diverse set of public and private actors. It has also been acknowledged that the digital era is increasingly fragmenting the playing field between governance actors (Murray, 2011). These changes necessitate an updated conceptualization of what governance is, as well as a consideration of what extent new technologies like blockchain technology [and also digital ledger technology (DLT)] can contribute to effective and legitimate governance mechanisms.

      The aim of this study is to merge the literature on governance with social network theory, in order to conceptualize a new approach to governance: decentralized network governance. Within the governance literature, policy-making is becoming increasingly conceptualized in terms of different modes of governance. These range from Westphalian command-and-control governance to decentered, horizontal, and self-referential modes of governance. In order to envision governance effectuated by digital networks in general and by blockchain technology specifically, we turned to network theory. This theory offers an appropriate concept of societal power in a networked system, of which distributed ledgers and the decentralized nature of blockchain technology are an example.

      Whereas traditional and new modes of governance rely on the identity and roles of specific actors, blockchain technology requires a re-appreciation of the powers exerted by different actors. In this study, we used Manuel Castells’s conception of network power in order to analyze new power relationships (Castells, 2000, 2011). Traditional modes of governance fail to appreciate changes in power relationships that result from the emergence of new actors, practices, and relationships. We argue, however, that such consideration is essential for constructing governance in the digital domain.

      This paper consists of four sections. In the first section, the terms datafication and blockchain technology are introduced. In the second section, governance literature is reviewed and dominant modes of governance are conceptualized. In the third section, arguments are put forward concerning why these modes of governance are inadequate in terms of effectively governing the quasi-theoretical conceptions introduced by DLT and blockchain technology. The fourth section offers the first methodological clues for the analysis of network governance, based on social network analysis. These methods will allow for better decisions to be made regarding how to design and disseminate power relationships into technological solutions, which require oversight and regulation.

      Datafication and Blockchain Technology

      The creation, collection, dissemination, and distribution of all sorts of information in the digital domain rely no longer solely on social processes but increasingly on technology. An algorithm determines the updates you see on Facebook, press agencies rely on data analysis to assess the newsworthiness of information, and social networking sites and blogs are digitally scraped for information to target advertisements at individuals (Goodman, 2015). Blockchain technology is promising to reform digital currency, in order to improve logistics and help manage digital identity in a decentralized and trustless manner (Zwitter and Boisse-Despiaux, 2018). These algorithms are primarily developed and employed by private actors.

      Information is crucial for social coordination, i.e., for governance, and digital data are the modern embodiment of information. This means that the conditions of the digital domain affect governance substantially. Artificial intelligence (AI) and blockchain technology are among the most prominent exemplifications of this phenomenon. More and more of our social interactions are being shaped by these technologies. The political and economic worlds are also becoming increasingly structured and regulated by the effects of AI and DLT, increased connectivity, and the services surrounding them. Researchers and professionals alike are prophesizing a data revolution that is as equal in impact and disruptive in force as the industrial revolution.

      The potential uses and value of AI and DLT are indeterminate and potentially limitless. This indeterminacy is arguably one of the driving forces behind the fast pace of innovation in these fields. Academics, data analysts, and corporations are in the process of finding value in data and its decentralized management. They are also looking into ways that data sets can be operationalized and linked and are trying to determine what can be learnt from such analyses (Manyika et al., 2011; Provost and Fawcett, 2013; Chandler, 2015; Metcalf and Crawford, 2016).

      Blockchain technology and DLT can be defined as decentralized and trustless ledgers, recording transactions across a peer-to-peer network. These features create the potential to provide transparency as well as accountability. Such technologies could impact not only the financial sector (e.g., Bitcoin, Libra) but also diverse fields such as supply chain management, digital identity, smart contracts, voting (e.g., liquid democracy), health records, water management, and much more.

      To summarize this in a simplified manner, a blockchain is a decentralized database that stores a registry of assets and transactions across a peer-to-peer network. The “asset” may not only be money or transactional information, but also information regarding ownership, contracts, goods, and any other information (Warburg, 2016). A blockchain does not duplicate the value that is transferred, like other peer-to-peer networks, but instead, it registers that a value has been transferred from one actor to another. Moreover, DLT does not require any central control system, and it stores the transaction history in blocks of data that are cryptographically locked together. As it is replicated on every node in the blockchain network, it becomes an immutable and transparent historical record of all transactions (Balva, 2017).

      Blockchain is based on a consensus mechanism. This mechanism basically relies on “hashing” and a type of “proof,” e.g., “proof of work,” “proof of stake,” and other proofs. Hashing is the process of creating a digital fingerprint of any sort of information shared in the transaction. The hash is a way of verifying the authenticity of the transaction. This allows users to identify whether data have been tampered with.

      The technical specifications of DLT systems are becoming increasingly varied in nature. This shows that often-highlighted features of blockchain technologies, such as immutability, transparency, and trustlessness, are in fact design features rather than sine qua non-conditions (Zwitter and Boisse-Despiaux, 2018). However, one can say that blockchain is a technology that lowers the uncertainty regarding transactions between parties that do not otherwise share trust. The idea of a “trustless” technology means that DLT, by nature of a validated ledger shared across all peers, reduces the uncertainty of not having recourse if something goes wrong with a transaction. Since DLT allows the tracing of every transaction, from the beginning until it is validated and added to the blockchain (or similarly structured ledgers), users can verify whether an error has happened, and also where the error has occurred.

      A particularly interesting development that the emergence of blockchain technology has brought with it is the concept of DAOs (decentralized autonomous organizations). Blockchain technology and Bitcoin have been developed to make traditional financial governance mechanisms obsolete, as its developer Satoshi Nakamoto (mysteriously or pseudonymously named) envisioned (Nakamoto, 2008). The technology was designed with a specific governance model in mind, and this becomes more visible when reviewing the discourse on DAOs (Chohan, 2017). DAOs can be defined as “non-hierarchical organizations that perform and record routine tasks on a peer-to-peer, cryptographically secure, public network, and rely on the voluntary contributions of their internal stakeholders to operate, manage, and evolve the organization through a democratic consultation process” (Hsieh et al., 2018). The DAO thereby has two governance components. The first is the internal governance component, which is characterized by non-hierarchical modes of governance and has quasi-democratic features. These features are quasi-democratic rather than democratic because there is no guarantee of the principle “one person, one vote.” For example, an actor can accumulate more votes than others, thus tipping voting balance in its favor. Dependent on its design, the weight of voting rights can be based on several different parameters. Within the DAO, voting weight can be dependent on the ownership of tokens, the weight can be capped at certain levels, etc. (Quiniou, 2019, p. 84). The external governance component is the reliance on clusters of servers and individual nodes for the functioning of the network and decision-making. In essence, actors can exert undue influence on decision-making, and in a stronger way than other actors, if they control more nodes and server capacity. Furthermore, developers themselves can offer code upgrades through open participation and self-selection, and miners can vote on protocol changes based on computing power (Hsieh et al., 2018).

      From a policy-making perspective, big data analytics, AI, and DLT have drastically changed the core concepts of governance. Two key effects have been observed:

      Actors and roles: New actors are appearing, both on the national and international stage. Moreover, the roles and relationships that actors have developed between each other are changing (Zwitter, 2015). New actors who are bridging the digital with the physical world are emerging as increasingly powerful players on both the national and international stage. These are not just the big corporations, such as Google, Facebook, and BuzzMetrics, which are dominant in collecting and analyzing big data, but also smaller interest groups who are gaining traction through the quasi-democratizing effect of blockchain technology and the equalizing effect of digital communication. Hacking collectives such as Anonymous and LulzSec are being recognized as powerful players not to be ignored. Furthermore, the cyber domain has established new and changing roles of different governance actors. Big data generators, collectors, utilizers, blockchain miners, server providers, etc., are new roles that are shaping the relationships between actors. A good example of the changing effect that this has had on relationships between actors is “the paradox of individuality in big data” (Richards and King, 2013). Although the individual plays a relatively insignificant role within the larger pool of data, i.e., as a generator and utilizer of data and authenticator in the blockchain, the individual can potentially become powerful. Examples of this power (of the individual as the utilizer of technology) are the numerous hacks that have affected the blockchain community, e.g., the Mt. Gox hacks, BitStamp hack, Bitcoinica hacks, etc.

      Power relations: These new actors and changing roles are constituting new and changing power relationships. In particular, actors such as tech corporations and organizations involved in blockchain technology, like the Ethereum or IOTA networks, have become increasingly powerful because ownership is in the hands of those who develop the means, collect the data, and repurpose the tools (Richards and King, 2013, p. 44). In the domain of big data, collectors (which also include many state agencies) determine what is collected and stored, and for what period of time. Big data utilizers, who are predominantly private corporations, operationalize data by defining and re-defining it for purposeful analysis. Small groups and individuals operating as hacktivists, cyber criminals, and cyber terrorists can challenge the power of corporations and states. The power relationships between these actors influence social coordination. These are also no longer confined to national jurisdictions because the digital realm spans the entire globe. The source of power thereby changes1. As we will see below, the different kinds of relationships (nodal relationships between actors) can become very relevant in the exercising of power.

      The shift in power relationships effectuated by the digital transformation of big data, blockchain technology, and AI has been tremendous. Technologies provided by private corporations, and the data bought from large data collectors, are being increasingly replied upon by many sectors such as intelligence agencies, the public and private banking system, and political parties. In effect, the legal, economic, political, criminal, and military domains have undergone tremendous change due to the digitalization of the world. As we will show, traditional modes of law and governance are doing little to conceptualize, control, and coordinate these shifts in power.

      In general, these emergent technologies, and blockchain technology in particular, are already tacitly or explicitly imposing their own governance norms, when seen from the perspective of Lessig’s “Code is Law” (Lessig, 2000). However, closer investigation is required in order to ascertain whether these imposed norms of governance also need regulation and governance themselves. There is a need to strike a balance between the new power distributions and the tacit governance norms and structures imposed by technology, vis-à-vis the existent normative framework and governance structure surrounding our democratic principles. However, the changing roles of governance actors and, thereby, the available mechanisms of governance require reconceptualization. This is because, for instance, legal norms are notoriously lagging behind in relation to the pace of technical innovations, but also because the potential illegitimate uses of big data pose a great threat to fundamental rights and require some form of regulation and/or oversight. Public actors, traditionally conceived as protectors of public interest, lack the capabilities to effectively govern the spaces created by many technological innovations. Moreover, public actors have been subject to critique for the widespread collection of the data of individuals, and the leaks of such data as well. The next section will explore the concept of governance and its dominant modes.

      Modes of Governance

      The digital domain requires regulation and governance in order to establish a more legitimate, and ultimately productive, balance of power. This raises the question of what the best way to conceive and conceptualize such norms and rules is. In this study, we have taken a broad perspective of governance, avoiding bias toward specific modes of governance.

      Governance itself is an elusive concept, highly complex and contested in literature (Kooiman, 2003; Van Kersbergen and Van Waarden, 2004; Levi-Faur, 2012; Colombi-Ciacchi, 2014). In our study, we use a unifying conception of governance based on Levi-Faur (2012). Levi-Faur (2012, p. 7–8) defines governance as “signifier of change” in policy-making. By signifying different changes in policy-making, governance opens up “new ways, new concepts, and new issues for research” (Levi-Faur, 2012, p. 7–8). This conception of governance as a signifier of change offers a comprehensive perspective on policy-making as subject to “continuous change of patterns of interaction and relations among actors” (Sand, 2004).

      Governance is often depicted by distinguishing between “old” and “new” governance (Rhodes, 1996, 1997; Mayntz, 2003; Bevir, 2010; Lobel, 2012). “Old” refers to hierarchical structures, mostly of state institutions. “New” refers to the emergence of more horizontal modes of policy-making, which have arisen due to the pressures of globalization and the functional differentiation of sectors of society. However, given that neither old nor new types exclude each other, they often co-exist in practice and a clear temporal distinction between them cannot be located. We refer to these types of governance as Mode 1 and Mode 2 governance. The current assessment focuses on two aspects of Mode 1 and Mode 2 governance: roles and power relationships. Governance roles are understood as the ability to participate in policy-making at any stage. Power relationships refer to the relative power that an actor, or a certain role, has over other actors within policy-making and its enforcement. Within different modes of governance, different aspects of power relationships are deemed relevant. A useful analogy of this is the power that a policeman has standing at an intersection commanding traffic: power can be derived from his uniform, the perception of the drivers, or of him blocking the road (Dahl, 1957). Similarly, modes of governance regulate or coordinate different aspects of power relationships based on what is deemed the relevant aspect of power.

      Mode 1 Governance

      Mode 1 governance, or “old” governance in the literature, refers to governance carried out primarily via the hierarchical command-and-control structures of the state and other public hierarchies (see Figure 1). This means that it relies on authoritative institutions to make policies through the enforcement of hard law. Rooted in Westphalian notions of nation-states, this mode of governance is often legitimized through justificatory strategies resting on public sovereignty and public input in political decision-making (Scharpf, 1999). Therefore, Mode 1 governance is inherently political and institutional.

      Hierarchical command-and-control policy-making via the state. Within Mode 1, the state is sovereign and legitimate in commanding and controlling societal actors (both public and private; among private actors, for example, social groups and small and medium enterprises, SMEs). The identity of actors is perceived as the relevant aspect of power. Power relationships are vertical because they base themselves on the identity of the state as sovereign and legitimate.

      Furthermore, this mode of governance can be interpreted as identity-based. Within identity-based governance, roles are assigned to and/or performed by actors based on who these actors are, i.e., their identity. For example, Mode 1 governance locates the authority to perform tasks of policy-making, or the delegation thereof, with state organs because of who the state is. This means that the state’s identity is seen as being an authoritative and legitimate public body, acting as sovereign over a territory and as the source of law and policy. Intermediary institutions perform governance roles only through delegated authority by the state.

      Given the relative clarity of governance structures within Mode 1, the relevant aspects of power relations are equally clear. The authority to make, implement, and enforce policies lies with the state or those that it delegates to do so. Power is static because authority is permanently assigned to an actor, based on its identity. The relevant aspect of a power relationship is thus the identity of the actor capable of commanding others. Moreover, power relationships are governed via structured governance mechanisms, by predominantly assigning rights to weaker parties and duties to stronger parties. The static nature of power and structured conception of power relationships are explained by the fact that relationships between individuals, organizations, societal actors, corporations, etc. are mediated and governed via the state as the dominant hierarchical authority in policy-making. A good example of this is the relationship between human rights and the duty of the state to protect them.

      Mode 2 Governance

      Mode 2 governance, or “new” governance, contrasts with these distinct Westphalian structures of policy-making. It represents a move away from the vertical command-and-control structures of the state toward more horizontal modes of policy-making (see Figure 2). This approach creates a more level playing field between societal actors, both private and public. Authority is not necessarily acquired by identity but rather through performance, knowledge, and expertise. Public–private partnerships, policy networks, and private governance all reflect the nature of a world in which the state is arguably no longer the central governing authority (Rhodes, 1997; Van Kersbergen and Van Waarden, 2004). Examples of Mode 2 governance are diverse, but include public–private partnerships working toward the achievement of policy goals that private sector agents are trying to realize more effectively and efficiently through self-regulation. Other examples of areas where Mode 2 governance mechanisms apply are soft law, negotiation, compromise, competition, codes of conduct, and other corporate sectoral agreements on standards of production or quality. As such, Mode 2 governance changes the roles and power relationships of and between actors involved in policy-making or subject to these policies. While not being necessarily unified, different forms of Mode 2 governance are role-based in the distribution of governance tasks, as opposed to identity-based.

      Horizontal policy-making in which societal actors have greater independence in commanding their spheres of influence and/or making and implementing policies. Coinciding with this, the state takes on a role of “steering” rather than “rowing.” The state regulates societal actors by incorporating them into the policy-making process. The role they can play therefore becomes the relevant aspect of power, and the power relationships become the relevant focus of governance. Oversight is performed by non-majoritarian institutions such as central banks that guard the boundaries set by the state.

      Role-based governance implies that governance tasks and mechanisms are assigned to and/or performed by actors because of the role they can perform, to achieve a desired policy goal within a specific domain. Policy goals and corresponding benchmarks become prominent tools in steering policy-making in specific directions. For instance, a public institution sets goals in a specific policy domain and delegates the achievement thereof to private or corporate actors. These actors are perceived as being more capable of efficiently and expertly delivering the desired goal in this domain. In other domains, the roles of the same private and corporate actors might be completely different. This explains why Mode 2 is not identity but role-based, as the examples below illustrate:

      It should be noted that the distinction between Modes 1 and 2 governance is not always clear in practice. Many hybrid forms exist that borrow elements from both modes. The most prominent is multi-level governance, predominantly employed to describe policy-making within the European Union. It relies on both Mode 1, i.e., hierarchical commands from a public authority, and Mode 2, policy networks and the involvement of private actors (Mayntz, 1998). Mode 1 governance is increasingly dismantled at the level of the state, while simultaneously reconstructed at the regional and international level in combination with Mode 2 governance (Van Kersbergen and Van Waarden, 2004).

      With a view to Mode 2 governance, one can see that actors who are frequently engaged in the field of blockchain and DLT take on a variety of different roles. An interesting case that illustrates this is the call for regulation of initial coin offerings (ICOs) and similar crypto-securities. These ICOs can be described as cryptographically secured tokens that represent a token owner’s bundle of rights and obligations vis-à-vis a token provider. They are issued by a token provider and registered on the blockchain as a source of income for their projects. In the last few years, such ICOs have come under increasing public scrutiny as concerning their role as financial securities under US and EU regulations. There have also been frequent fraudulent uses of ICOs, and these have become a contested issue in policy and academic debates (Hacker and Thomale, 2018). In terms of our typology, this shifted the debate around ICOs from being an unregulated space into the realm of Mode 2 governance, with governance ranging from moderate self-regulation to non-autonomous self-governance. It remains to be seen whether states deem it necessary to enforce governance in the field of crypto-securities, even by means of Mode 1 governance.

      Mode 3—Decentralized Network Governance and Blockchain Technology<sup><xref ref-type="fn" rid="footnote2">2</xref></sup>

      Constructing the governance of the digital domain requires conceptualizing the relevant aspects of power relationships within this domain vis-à-vis Mode 1 and 2 governance. It is not surprising that the digital domain, and especially blockchain technology, cannot be effectively governed through either mode of governance. This is firstly because the emergent new roles and power relationships in the digital domain are neither hierarchical nor horizontal. Instead, they are fluid, with different roles and power relationships often residing in a single, anonymous, actor. Secondly, blockchain technology enables trustlessness, whereas trust is fundamental to the functioning of both Mode 1 and 2 governance. This section will address the first consequence briefly, before providing the stepping stones for the conceptualization of decentralized network governance (Mode 3).

      Modes of governance rely on conceptions of the relevant aspects of power relationships to be governed. In relation to the digital domain and blockchain in particular, power must be conceptualized as fluid, as different actors perform different governance roles within different contexts. Also, there are times when the networks through which roles are distributed operate as governance actors themselves. As identities and roles are no longer central to the exertion of power in social coordination, their place has been taken by new forms of power and hence require new forms of governance. Castells’s writing on network power (mentioned previously) notes that there are four forms of power specifically related to networks: networking power, network power, networked power, and network-making power. We can see that these relate closely to the digital domain and blockchain technology (Castells, 2011)3 :

      Networking power: the power that actors and organizations have that constitutes the core of the network. This power pertains to the ability to include and exclude others, and thereby controls the makeup of the network.

      Network power: the power that results from the standards required to coordinate interactions. This primarily concerns the imposition of rules within a network.

      Networked power: the power that actors have over one another within a network. This power mimics traditional conceptions of power but the way in which it is exerted differs per network.

      Network-making power: the power of an actor or organization to constitute or re-program a network according to its values and specific interests.

      The employment of traditional modes of governance threatens to undermine the benefits of technological innovations such as blockchain and DLT. In particular, overregulation or the application of inadequate mechanisms often reduces the potential benefits of digital technologies. Consequently, this might produce more negative outcomes than positive ones, seeing as a mismatch between regulations and intended governance norms of technological solutions could produce the appearance of regulation without actually having adequate substance. Alternatively, overregulation might be obsolete when trust is not an issue, as is the case with blockchain-enforced governance.

      The hierarchical governance of big data actors and states can either miss their targets, because the digital realm is not necessarily confined to territories, or tamper with innovations that might benefit societies. It is, for instance, commonly accepted that “code changes quickly, user adoption more slowly, legal contracting and judicial adaptation to new technologies slower yet, and regulations through legislation slowest of all” (Brown and Marsden, 2013, p. xv). Single actor solutions should therefore be rejected. Mode 2 governance can undermine the potential benefits of blockchain-based governance as its distribution of governance responsibilities cannot, as we have seen, be readily applied to governance structures established by blockchain technology. The integration of actors into governance mechanisms, based on their ability to achieve policy outcomes, runs the risk of privatizing oversight into the hands of those with the most power.

      We propose a novel network approach to governance that is more tailored to the decentralized nature of governance structures, and which can generally be found in blockchain solutions and DAOs more specifically. Our approach of decentralized network governance seeks to distribute governing tasks according to capability and exerted power, on a fluid basis. This implies that governance tasks are distributed neither on the basis of the identity of actors nor on the basis of the role they can perform in the governance process. Given that different actors perform multiple roles within blockchain structures, often simultaneously, the relational nature of power is fundamental in this conception of governance. Within a governance network, a relational conception of power necessitates fluidity in governance tasks. The distribution of power becomes variable and dynamic dependent on the specific relation between two or more actors (see Figure 3).

      Within the digital domain, and more specifically the domain of digital network providers, the state has limited powers and new actors emerge. These new actors command others through network-making and networked power, in a multitude of continuously changing relationships. Individual ownership of governance is limited. Governance over and within this network is thereby differentiated. This problematizes that power is dispersed throughout the network and is dependent on clusters/alliances of actors that can change per topic.

      Within decentralized network governance, roles vary according to the nature of the network and the relations within it. This requires that the distribution of governance tasks, rights, and obligations are sensitive to relationships of power between actors. Governance mechanisms must be flexible. Moreover, as new aspects of power relationships become relevant in blockchain-based solutions, such as those concerning server providers, miners, etc., governance mechanisms should address these. Whereas traditional modes of governance assume that power resides in identities or roles, decentralized network governance perceives power as residing in specific and changing relationships. Power can thus reside in every actor from individuals, corporations, or the state, depending on the relationship between these actors requiring governance. In different roles and relationships, multiple actors can possess each of the novel network powers. Regarding the concept of fluid power, and differing from other governance modes where roles are defined a priori, Mode 3 governance tacitly implies power through being an actor in a networked environment. This form power is a function of connectivity. In social network analysis, this kind of power is referred to as centrality of an actor in the network. Power in the form of connections allows actors to define their own role by choosing alliances dependent on the issues that are at stake. The example of voting behavior regarding finding consensus around hard forks is a case in point. By choosing alliances, networked actors assume governance functions within the network.

      In order to illustrate this, we can take DAOs as an example. To qualify as a DAO, organizational governance on the blockchain needs to implement voting rights that determine the autonomous execution of smart contracts when certain conditions have been met, e.g., absolute majority or agreement of certain stakeholders and certain external conditions. “[The] DAO as an entity acts independently and cannot be influenced by external forces. The organization and its open-source code are fully transparent and therefore incorruptible. The functionalities and program rules are written in code and maintained on the blockchain” (Kondova and Barba, 2019). Any actor in the blockchain can submit a proposal that will be automatically executed if the consensus mechanism is triggered by the actors in the blockchain network. This ensures that all actors are voters and proposal-submitters at the same time: a clear case for networked power. At the same time, “The DAO” project in 2016 at ETH-Zurich illustrated that network power – the power over a network for standard setting – can act as a last resort fail-safe. In this case, the $250 million raised through the Ethereum network upon the launch of the project were stolen, but then through the fail-safe of the hard fork, they were recovered. DuPont elaborates on this as follows:

      However, shortly after the minimum 2-week “debating” period, on June 17, 2016, The DAO’s code was “exploited” by an unknown individual. This exploit used unintended behavior of the code’s logic to rapidly drain the fund of millions of dollars’ worth of ETH tokens. Immediately, Slock.it, the leaders of the Ethereum platform, numerous crypto-currency exchanges, and other informal technical leaders stepped in to stem the bleeding – shutting down “exits” through the exchanges, and launching counter-attacks. It is at precisely this point that we see the vision of future governance structures break down, and devolve into traditional models of sociality – using existing strong ties to negotiate and influence, argue and disagree – all with nary a line of code in sight. In the end, the whole project was disbanded, with an inglorious “hard fork” rolling back the ostensibly “immutable” ledger (DuPont, 2017, p. 158).

      While DuPont describes The DAO experiment ultimately as a failure, it does illustrate our perspective on decentralized network governance. Actors on different levels of the blockchain solution were able to exert different governance roles successfully. This took place inside the DAO and, on a higher level on the Ethereum network, through a “hard fork.” As such, this DAO hack exemplifies the fact that blockchain does impose specific governance elements by virtue of its on-chain governance structures. In its ideal form, blockchain can resemble a liberal notion of a positivist legal order. In times of crises, as the DAO hack certainly represents, governance structures resorting to off-chain solutions might more closely resemble political governance outside of the legal order that the blockchain itself represents (Reijers et al., 2018). However, the off-chain solution is also a governance structure that is based on the design of the blockchain and thus represents a meta-governance structure. In the example of The DAO, as well as in other cases of consensus-finding for a hard fork, actors decide on changing the rules on a meso-level, i.e., off-chain but bound by the design of the technology for their range of possible actions. On a meta-level, namely, the technological infrastructure, the possibility of this decision to hard-fork is implied by the design of the blockchain technology. Were the technology designed in a way that would preclude the option of a hard fork, stakeholders would not even be able to contemplate the hard fork as an option. This is also an example of how technology tacitly imposes norms of governance, and how on-chain and off-chain governance are entangled together. It also shows that governance mechanisms of DLT are design features rather than sine qua non-conditions.

      Therefore, as illustrated above, off-chain mechanisms that distribute tasks and obligations are typical for this sort of governance imposed by digital networks. This characteristic is independent of the identity of an actor. But it depends on the specific type of power of an actor and its role in a specific policy domain. Decentralized network governance, thus, does not presuppose a certain delineation between actors as pre-given, but assumes that actors’ rights, obligations, and regulatory authorities change depending on the function and role they assume in relation to other actors. The two most crucial new forms of power are the power to constitute and reprogram networks (network-making power) and the power to connect and ensure cooperation within networks (networked power) (Castells, 2011). These two powers are exerted by new private actors within the digital domain of blockchain-based solutions. Within the case of The DAO project, examples of these new actors are as follows: Slock.it, the leaders of the Ethereum platform, numerous crypto-currency exchanges, and other informal technical leaders.

      Since the crucial elements of network power reside with private (corporate) actors, it is important to integrate third parties into the theoretical model of decentralized network governance. For instance, governance roles on the blockchain (on-chain governance) or outside and around a blockchain solution (off-chain governance), can be performed by a myriad of different actors. These take on a specific role in concrete situations. Effective governance of power relationships thus requires alliances to be brokered between actors in order to match the exerted power of the dominant or deviant actors. This necessitates new associations in specific and single-issue areas, in order to establish a new and more equal balance of power. In other words, a pre-legal political realm is given space within the network of actors that surrounds DLT solutions. Third parties can play governance roles via education and providing information, acting as watchdogs and private enforcers, aiming to prevent harm and reforming legal rules. This resembles the structures of Mode 2 governance. The difference, however, is that these governance tasks can be performed in alliances vis-à-vis an actor who exerts greatest power; i.e., governance with, alongside, and against states and legal rules.

      The actors who regulate, make, have to adhere to, and are regulated by policies vary in a fluid way. Even if the state does not have much on-chain power as the governing actor in Mode 3, off-chain, it can play a more crucial role in empowering different actors by enabling the clustering of interest groups. This implies that within decentralized network governance, roles are empowered through relationships rather than by specific identities or policy areas. States can empower actors by providing access to information, improving the legal standing of non-state actors, and (in particular) raising the position of those who represent minorities or subordinate groups vis-à-vis increasingly powerful actors. Furthermore, due to its centralized position, the state can assume brokerage positions and close structural holes. Mode 3 governance also empowers individuals to enter into new relationships outside of the traditional modes of governance. Examples of this are digital pressure groups, who often supersede national borders, jurisdictions, and governance institutions. Through the use of social networks and other technological instruments, these interest groups voice concern, empower others, enforce and protect rights, reform law, and prevent harm by pressuring others to perform their obligations adequately. Logically, three strategies of decentralized network governance can be conceptualized:

      Platform strategy, in which crowds, e.g., interest groups or one-issue parties, are enabled by the state (off-chain) to critique and protest about powerful actors within the network (on-chain). In this role, the state can also facilitate the education of under-informed individuals and institutions.

      Private strategy, in which crowds cooperate within a network to achieve certain goals, put certain proposals forward, or correct and counterbalance other power brokers in the network.

      Legal strategy, in which the state or the designer of a technology, e.g., the DAO with regard to blockchain technologies, enables actors to effectively protest against and critique powerful actors. This is done by exempting them from legal requirements when there are grave power imbalances in specific relationships.

      The common effect of these strategies is that they enable deliberation among the relevant actors and allow weaker actors to join forces to counterbalance more powerful ones. In a context where traditional governance fails, decentralized network governance opens up a space for contestation in which actors in concert govern each other. The available means range from educational pursuits to legalizing otherwise illegal means such as white-hat hacking or other forms of protest. Such governance has the best chances to achieve effective regulation of power relationships and can trigger increased and better self-regulation. This can be done, for instance, by motivating powerful actors to initiate more detailed codes of conduct in concert with societal actors, or by improving international public collaboration regarding the protections of rights for weaker parties in the digital domain.

      Methodological Considerations

      In decentralized networked governance, actors within policy networks engage in a networked structure rather than a hierarchical or horizontal structure. The term “decentralized network governance,” therefore, as foreshadowed with Castells’s approach, is not only a descriptor of the changes in the structures that we have witnessed in the ongoing trend from Mode 1 to Mode 3. We use this term also as a signifier to indicate that network theory could provide a valuable analytical and practical approach. In the following paragraphs, we will briefly outline the implications of adapting social network theory and methods to this domain.

      As suggested for the practice of policy-making, programming, and project design, social network analysis can provide many insights. More can be understood about patterns of interaction, structural holes, diffusion of information, clusters and groups within a network, cooperation and conflict among actors, and the effects that the emergence of new actors, as well as the disappearance of existing actors has on a network (Zwitter, 2016). Approaching decentralized network governance from the perspective of social network theory becomes particularly compelling in analogy to the ideas underpinning social networks, as formulated by Simmel (2011, p. 4):

      A collection of human beings does not become a society because each of them has an objectively determined or subjectively impelling life-content. It becomes a society only when the vitality of these contents attains the form of reciprocal influence; only when one individual has an effect, immediate or mediate, upon another, is mere spatial aggregation or temporal succession transformed into society.

      Exactly this kind of vitality and reciprocal influence can be witnessed in off-chain governance, which lends a political dynamic. Likewise, a network of actors does not become a governance-relevant policy network because of their individual salient positions, but because of their interactions, the identity they portray in specific policy circles, and the respective leverage they have vis-à-vis other actors, depending on the subject matter. Translating this to the case of off-chain governance, we have seen in The DAO case that roles of actors changed from beneficiary to regulator when moving from on-chain to off-chain governance.

      Through the lens of social network analysis, the role and power of actors within a decentralized network are functions dependent on whether actors can influence other actors or whether they can leverage their positions through different forms of brokerage. The nodes (actors) and ties (connections) ultimately determine policy-making power. Identity and role are isolated; permanent aspects of power are irrelevant in this context. For analytic purposes, the digital network represents “a specific set of linkages among a defined set of persons [actors], with the additional property that the characteristics of these linkages as a whole may be used to interpret the social behavior of the persons involved” (Mitchell, 1969, p. 2). That means, on the one hand, that understanding the properties of a digital network has analytic benefits for understanding the underlying patterns of social structure and for explaining behavior and power (Wellman, 1988).

      On the other hand, however, it also has policy-making implications. Understanding the power relationships that emerge from a network structure helps in assigning responsibilities to key players and developing appropriate governance mechanisms. As a first step toward the analysis and structuring of a network, such as actors in a blockchain network, power needs to be understood differently. In network theory, power is considered as the ability to leverage one’s position vis-à-vis ties with other actors. Power becomes a function of centrality. It suffices to say that different forms of centrality (degree, closeness, and betweenness centrality) provide different methods of analysis of the network (Knoke and Yang, 2008). Different centrality functions help to identify the right actors, which can leverage their position adequately. Within decentralized network governance, the centrality of actors is the relevant aspect of power relationships in assigning responsibilities and developing governance mechanisms.

      Of particular utility for decentralized network governance is the clustering coefficient. Defined in social network theory, this measure concerns the degree to which actors in a social or policy network cluster together. It is based on the empirical finding that, in social networks, members of distinct groups share a more tight-knit network among each other. Within a network, distinct groups are thus characterized by a high density of ties among a set of nodes. The clustering coefficient can be used to identify groups within a larger digital network that were previously unknown and that might either leverage their coordinated power vis-à-vis the rest of the network, or provide specific services. For example:

      “Core Ethereum developers were in favor for such a hard-fork in order to return stolen funds. Most miners followed their lead. However, a minority of miners rejected the controversial idea to change immutable transactions and continued mining the old blockchain. This divided Ethereum into two co-existing blockchains, the new one, Ethereum (ETH), and the old one, Ethereum Classic (ETC).” (Friebe, 2017)

      This illustrates that while technically everybody has an independent vote, the leverage of prestige and networking power (see Castells’s classification above) can determine the outcome of off-chain voting and have direct on-chain effects as the split into two Ethereum blockchains illustrates. At the same time, increasingly larger mining pools are being established in order to share processing power and, thus, the mined benefits. Furthermore, we are increasingly witnessing single private-sector actors establishing themselves in various blockchain domains by using large server farms, in order to maximize profit. These developments indicate that centralization and clustering are taking place, which requires further analysis and potentially governance mechanisms to regulate their effect.

      In addition to the three strategies of decentralized network governance mentioned in the previous section, the brokerage positions within policy networks in particular can be leveraged to achieve desired outcomes or to avoid undesired ones. Brokerage positions appear when we have a look at different groups in the policy network. According to Gould and Fernandez (1989), actors can:

      coordinate within a group (coordinator),

      consult members of a group as an outsider (consultant),

      prevent or facilitate outsiders to gain access to a group (gatekeeper),

      represent the group to the outside (representative), or

      mediate between separate groups (liaison).

      As illustrated above, network theory and its methodical application through social network analysis can, thus, provide concrete insights into existing blockchain and DLT applications. This methodology can be applied to both on-chain and off-chain dynamics. It can also be used to design smarter digital networks and assign roles to actors depending on their centrality and brokerage positions, as well as identify groups within a larger network that can fulfill certain functions (such as counterbalancing powerful single actors). Methodologically, social network analysis might have a central role to play in the further development of a theoretical framework regarding decentralized network governance. Ultimately, this may help contribute toward the effective governance of the digital domain.

      Conclusion

      Over the years, governance mechanisms have adapted due to globalization, increased technical specialization, and functional differentiation. However, governance also needs to adapt to the technical innovations of the digital domain in general, and to the increasing use of blockchain technology in particular. Due to the use of and reliance on digital networks, DLT and blockchain technology are increasingly shaping our societies and power relationships. Even at a time when their full potential is still debated and undetermined, the effects of technologies as governance instruments are increasingly tangible. In the present article, we have provided the first systematic steps toward the necessary reconceptualization of governance as applicable to societies increasingly shaped by digital networks and blockchain technology. We have proposed a framework of decentralized network governance. As illustrated in this paper with cases from blockchain technology, decentralized network governance is by no means limited to DLT. It applies equally to all modern power relationships that are characterized by the preponderance of private actors that provide networks of communication for other private actors.

      In order to set the stage and explain the necessity of a reconceptualization of governance, we started by outlining the transformative nature of blockchain technology as a case within and representative of the larger implications of the changes experienced in the digital and online domain. It became apparent that DLT has concrete, disruptive effects on policy-making when examining the impact on existing actors and the emergence of new ones. Furthermore, for the purpose of developing a stringent framework for decentralized network governance, old (Mode 1) and new (Mode 2) governance were analyzed, focusing on power, identity, and the roles that actors play within these forms of governance. Mode 1 describes traditional, hierarchical governance with fixed identities (states, corporations, and citizens). Mode 2 describes a more horizontal form of governance with fixed roles depending on power and expertise (see Figure 4). Within Mode 2 governance, one can identify three forms: (a) public–private governance, (b) non-autonomous self-governance, and (c) autonomous self-governance.

      Overview of modes of governance.

      To illustrate this, we took blockchain technologies and DAOs specifically as examples. We concluded that these examples are inaccessible to both traditional forms of governance. The core critique is that both modes of governance do not take into account the fact that the roles of actors in DLT-based solutions are constantly changing, and that power is context-specific and relational. This became apparent in the off-chain solution sought to remedy the DAO hack. In order to capture this new form of governance, which is also applicable in all sorts of digital networks, we propose the concept of decentralized network governance. This new mode of governance is characterized by the changing and multiple roles of actors, and the necessity to identify roles depending on network clusters and policy domains. This new perspective on governance as networked but decentralized opens up new policy mechanisms such as the design of new platforms for counterbalancing emergent digital actors. Network-making power facilitates the provision of such platforms for interest groups, tech-brokers, and private citizens, as well as actors with weaker power. Whereas on-chain governance can impose a mode of governance explicitly, off-chain governance can assume such governance structures tacitly. This governance structure in technology networks displays the fluid features that characterize decentralized network governance.

      It would have gone beyond the scope of this article to further unearth empirical material in the blockchain domain to flesh out the theoretical framework presented here. Therefore, it would be worthwhile to further investigate whether the interaction between on-chain and off-chain governance does indeed lead to specific governance dynamics. If the future of governance is indeed one of changing roles and power alliances, we should expect to see increasingly fluid dynamics within and surrounding digital networks. Such fluidity could express itself merely as users of the network banding together and increasingly defining the network. It could, however, also take explicit forms of governance within set rules of the network. This would depend on whether the network allowed for such decisions itself (e.g., on-chain) or whether it required extraordinary measures to be taken outside the network (e.g., off-chain, or alternative platforms).

      Hence, decentralized network governance, as a new Mode 3 governance, allows for the conceptualization of new forms of regulation of digitalized social affairs. This is illustrated by the multiple uses of blockchain for logistic, financial or contractual purposes, which acknowledge the fluidity of roles of actors in and around blockchain networks. It recognizes that traditional means of command-and-control governance have little use concerning radically democratized platforms. This conception of a third form of decentralized, yet networked, governance gives concrete indications of the utility of social network analysis with regard to policy-making and the design of governance tools in the digital domain.

      Author’s Note

      Figures 13 as well as parts of the text have been translated and republished with permission of the publisher from Hazenberg and Zwitter (2017).

      Author Contributions

      All authors listed have made a substantial, direct and intellectual contribution to the work, and approved it for publication.

      Conflict of Interest

      The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

      References Balva C. (2017). La Blockchain: Réinventer les rapports de confiance. https://www.youtube.com/watch?v=JID9c-MABis Bevir M. (2010). Democratic Governance. Princeton, NJ: Princeton University Press. Brown I. Marsden C. (2013). Regulating Code: Good Governance and Better Regulation in the Information Age. Massachusetts, CA: MIT Press. Castells M. (2000). The Rise of the Network Society. Oxford: Blackwell. Castells M. (2011). A Network Theory of Power. Int. J. Commun. 5 773787. Chandler D. (2015). A World without Causation: Big Data and the Coming Age of Posthumanism. Millenn. J. Int. Stud. 43 833851. 10.1177/0305829815576817 Chohan U. W. (2017). The Decentralized Autonomous Organization and Governance Issues. SSRN Electronic Journal. Available online at: https://ssrn.com/abstract=3082055 (accessed March 15, 2020). Colombi-Ciacchi A. (2014). Judicial Governance in Private Law through the Application of Fundamental Rights. Austr. Law J. 1 120134. Dahl R. (1957). The Concept of Power. Sys. Res. Behav. Sci. 2 201215. DuPont Q. (2017). “Experiments in algorithmic governance-A history and ethnography of “The DAO,” a failed decentralized autonomous organization,” in Bitcoin and Beyond: Cryptocurrencies, Blockchains, and Global Governance, Ed Edn, ed. Campbell-Verduyn M. (Abingdon: Routledge), 157177. 10.4324/9781315211909-8 Friebe T. (2017). Ethereum: Governed by a benevolent dictator? Medium. https://medium.com/blockchainspace/ethereum-governed-by-a-benevolent-dictator-2a2be8aa331a. Goodman M. (2015). Future Crimes: Everything is Connected, Everyone Is Vulnerable and What We Can Do About It. Knopf. New York: Doubleday Publishing Group. Gould R. V. Fernandez M. R. (1989). Structures of Mediation: A Formal Approach to Brokerage in Transaction Networks. Sociol. Methodol. 19 89126. Hacker P. Thomale C. (2018). Crypto-Securities Regulation: ICOs, Token Sales and Cryptocurrencies under EU Financial Law. Eur. Comp. Financ. Law Rev. 15 645696. 10.1515/ecfr-2018-0021 Hazenberg J. L. J. Zwitter A. (2017). Network governance im big data- und Cyber-Zeitalter. Z. Evangelische Ethik 61, 184209. 10.14315/zee-2017-0305 (accessed March 16, 2020). Hsieh Y.-Y. Vergne J.-P. Anderson P. Lakhani K. Reitzig M. (2018). Bitcoin and the rise of decentralized autonomous organizations. J. Organiz. Des. 7 14. 10.1186/s41469-018-0038-1 Klijn E. H. (2008). Governance and Governance Networks in Europe. Pub. Manag. Rev. 10 505525. Knoke D. Yang S. (2008). Social Network Analysis. Thousand Oaks (CA): SAGE. Kondova G. Barba R. (2019). Governance of Decentralized Autonomous Organizations. J. Mod. Account. Audit. 15 406411. 10.17265/1548-6583/2019.08.003 Kooiman J. (2003). Governing as Governance. Thousand Oaks (CA): SAGE. Koppenjan J. Klijn E. H. (2004). Managing Uncertainties in Networks. Abingdon: Psychology Press Routledge. Lessig L. (2000). Code Is Law. Harvard Magazine. https://harvardmagazine.com/2000/01/code-is-law-html. Levi-Faur D. (2012). “From “Big Government” to “Big Governance,” in The Oxford Handbook of Governance, ed. Levi-Faur D. (Oxford: Oxford University Press), 318. Lewis J. M. (2011). The Future of Network Governance Research: Strength in Diversity and Synthesis. Pub. Administr. 89 12211234. 10.1111/j.1467-9299.2010.01876.x Lobel O. (2012). “New Governance as Regulatory Governance,” in The Oxford Handbook of Governance, ed. Levi-Faur D. (Oxford: Oxford University Press), 6582. Manyika J. Chui M. Brown B. Bughin J. Dobbs R. Roxburgh C. (2011). Big data: The next frontier for innovation, competition, and productivity (McKinsey Global Institute-May 2011). http://www.mckinsey.com/business-functions/digital-mckinsey/our-insights/big-data-the-next-frontier-for-innovation Mayntz R. (1998). New Challenges to Governance Theory. Italy: European University Institute. Mayntz R. (2003). From Government to Governance: Political Steering in Modern Societies. Summer Academy on IPP, Wuerzburg 7-11 September. http://www.ioew.de/govemance/english/veranstaltungen/Summer_Academies/SuA2Mayntz.pdf Metcalf J. Crawford K. (2016). Where Are Human Subjects in Big Data Research? The Emerging Ethics Divide. Big Data Soc. 3 114. Mitchell J. C. (1969). Social Networks in Urban Situations: Analyses of Personal Relationships in Central African Towns. Manchester: Manchester University Press. Murray R. W. (2011). Magnanimity and Rationality: Exploring How the Institutions of International Society Are Implemented. Paper Presented at the Annual Meeting of the International Studies Association Annual Conference “Global Governance: Political Authority in Transition”, Le Centre Sheraton Montreal Hotel, MONTREAL, QUEBEC, CANADA, Mar 16, 2011. http://Www.Allacademic.Com/Meta/P501727_index.Html. Nakamoto S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System. Available online at: Www.Cryptovest.Co.Uk (accessed March 15, 2020). Provost F. Fawcett T. (2013). Data Science and Its Relationship to Big Data and Data-Driven Decision Making. Big Data 1 5159. 10.1089/big.2013.1508 27447038 Quiniou M. (2019). Blockchain: The Advent of Disintermediation. John. Hoboken, NJ: Wiley. Reijers W. Wuisman I. Mannan M. De Filippi P. Wray C. Rae-Looi V. (2018). Now the Code Runs Itself: On-Chain and Off-Chain Governance of Blockchain Technologies. Vienna: Topoi. Rhodes R. A. W. (1996). The New Governance: Governing without Government. Polit. Stud. 44 652667. 10.1111/j.1467-9248.1996.tb01747.x Rhodes R. A. W. (1997). Understanding Governance: Policy Networks, Governance, Reflexivity, and Accountability. Cambridge: Cambridge University Press. Richards N. M. King J. H. (2013). Three Paradoxes of Big Data. Stanf. Law Rev. 66 4146. 10.1186/s12913-017-2416-8 28701232 Sand I.-J. (2004). “Polycontextuality as an Alternative to Constitutionalism,” in Transnational Governance and Constitutionalism, Eds Edn, eds Joerges C. Sand I.-J. Teubner G. (Oxford: Hart Publishing), 4266. Scharpf F. (1999). Governing in Europe: Effective and Democratic?. Oxford: Oxford University Press. Simmel G. (2011). Georg Simmel on Individuality and Social Forms. Chicago: University of Chicago Press. Van Kersbergen K. Van Waarden F. (2004). “Governance” as a Bridge Between Disciplines: Cross-disciplinary Inspiration Regarding Shifts in Governance and Problems of Governability, Accountability and Legitimacy. Eur. J. Polit. Res. 43 143171. 10.1111/j.1475-6765.2004.00149.x Warburg B. (2016). How the blockchain will radically transform the economy. https://www.ted.com/talks/bettina_warburg_how_the_blockchain_will_radically_transform_the_economy/up-next?language=en Wellman B. (1988) “Structural Analysis: From Method and Metaphor to Theory and Substance,” in Social Structures: A Network Approach, ed Edn, eds Wellman B. Stephen D. Berkowitz (Cambridge: Cambridge University Press), 1961. Zwitter A. (2015). Big Data and International Relations. Ethic. Int. Aff. 29 377389. 10.1017/S0892679415000362 Zwitter A. (2016). Humanitarian Intelligence - A Practitioner’s Guide to Crisis Analysis and Project Design. New York. London: Rowman & Littlefield. Zwitter A. Boisse-Despiaux M. (2018). Blockchain for humanitarian action and development aid. J. Int. Hum. Act. 3 16. 10.1186/s41018-018-0044-5

      Power is here conceived as relational (Dahl, 1957). Conceived as a relation, power exists in coordination and the ability of an actor to command that coordination. A single actor cannot be powerful in and of itself, it is in the ability to command others that she has power.

      Within governance literature, Mode 2 governance is sometimes depicted as “network governance.” Within this strain of governance literature, the “network” is employed primarily as metaphor to exemplify the increasingly horizontal structures of Mode 2 governance and mechanisms of compromise and negotiation. We refer to decentralized network governance as the governance of a network (e.g., a blockchain network) through a network (the multiplicity of actors that exert power in continuously changing roles and relationships). Moreover, literature that describes Mode 2 governance as “network governance” often focuses on the relationships and mechanisms of coordination within institutions, for instance, regulatory agencies or public administrations. The present conceptualization does not confine itself to such a limitation. See Klijn (2008); Koppenjan and Klijn (2004), and Lewis (2011).

      Manuel Castells conceptualizes networked power as the dominant form of power exerted within modern networked societies. This is not the time or place to argue for or against this conceptualization of societal powers that structure modern societies. We employ these forms of network power as they directly relate to new powers that emerge within networks. The cyber domain is thus conceived as network, and its most prominent exemplifications are literally so without necessarily conceiving of societies themselves as networks.

      ‘Oh, my dear Thomas, you haven’t heard the terrible news then?’ she said. ‘I thought you would be sure to have seen it placarded somewhere. Alice went straight to her room, and I haven’t seen her since, though I repeatedly knocked at the door, which she has locked on the inside, and I’m sure it’s most unnatural of her not to let her own mother comfort her. It all happened in a moment: I have always said those great motor-cars shouldn’t be allowed to career about the streets, especially when they are all paved with cobbles as they are at Easton Haven, which are{331} so slippery when it’s wet. He slipped, and it went over him in a moment.’ My thanks were few and awkward, for there still hung to the missive a basting thread, and it was as warm as a nestling bird. I bent low--everybody was emotional in those days--kissed the fragrant thing, thrust it into my bosom, and blushed worse than Camille. "What, the Corner House victim? Is that really a fact?" "My dear child, I don't look upon it in that light at all. The child gave our picturesque friend a certain distinction--'My husband is dead, and this is my only child,' and all that sort of thing. It pays in society." leave them on the steps of a foundling asylum in order to insure [See larger version] Interoffice guff says you're planning definite moves on your own, J. O., and against some opposition. Is the Colonel so poor or so grasping—or what? Albert could not speak, for he felt as if his brains and teeth were rattling about inside his head. The rest of[Pg 188] the family hunched together by the door, the boys gaping idiotically, the girls in tears. "Now you're married." The host was called in, and unlocked a drawer in which they were deposited. The galleyman, with visible reluctance, arrayed himself in the garments, and he was observed to shudder more than once during the investiture of the dead man's apparel. HoME香京julia种子在线播放 ENTER NUMBET 0016hulp.com.cn
      www.kk555.com.cn
      kubaow.com.cn
      www.ffokkx.com.cn
      www.fe-dna.com.cn
      www.pwkutb.com.cn
      www.okpktg.org.cn
      usmpbo.com.cn
      rncxyy.com.cn
      mlsuiu.com.cn
      处女被大鸡巴操 强奸乱伦小说图片 俄罗斯美女爱爱图 调教强奸学生 亚洲女的穴 夜来香图片大全 美女性强奸电影 手机版色中阁 男性人体艺术素描图 16p成人 欧美性爱360 电影区 亚洲电影 欧美电影 经典三级 偷拍自拍 动漫电影 乱伦电影 变态另类 全部电 类似狠狠鲁的网站 黑吊操白逼图片 韩国黄片种子下载 操逼逼逼逼逼 人妻 小说 p 偷拍10幼女自慰 极品淫水很多 黄色做i爱 日本女人人体电影快播看 大福国小 我爱肏屄美女 mmcrwcom 欧美多人性交图片 肥臀乱伦老头舔阴帝 d09a4343000019c5 西欧人体艺术b xxoo激情短片 未成年人的 插泰国人夭图片 第770弾み1 24p 日本美女性 交动态 eee色播 yantasythunder 操无毛少女屄 亚洲图片你懂的女人 鸡巴插姨娘 特级黄 色大片播 左耳影音先锋 冢本友希全集 日本人体艺术绿色 我爱被舔逼 内射 幼 美阴图 喷水妹子高潮迭起 和后妈 操逼 美女吞鸡巴 鸭个自慰 中国女裸名单 操逼肥臀出水换妻 色站裸体义术 中国行上的漏毛美女叫什么 亚洲妹性交图 欧美美女人裸体人艺照 成人色妹妹直播 WWW_JXCT_COM r日本女人性淫乱 大胆人艺体艺图片 女同接吻av 碰碰哥免费自拍打炮 艳舞写真duppid1 88电影街拍视频 日本自拍做爱qvod 实拍美女性爱组图 少女高清av 浙江真实乱伦迅雷 台湾luanlunxiaoshuo 洛克王国宠物排行榜 皇瑟电影yy频道大全 红孩儿连连看 阴毛摄影 大胆美女写真人体艺术摄影 和风骚三个媳妇在家做爱 性爱办公室高清 18p2p木耳 大波撸影音 大鸡巴插嫩穴小说 一剧不超两个黑人 阿姨诱惑我快播 幼香阁千叶县小学生 少女妇女被狗强奸 曰人体妹妹 十二岁性感幼女 超级乱伦qvod 97爱蜜桃ccc336 日本淫妇阴液 av海量资源999 凤凰影视成仁 辰溪四中艳照门照片 先锋模特裸体展示影片 成人片免费看 自拍百度云 肥白老妇女 女爱人体图片 妈妈一女穴 星野美夏 日本少女dachidu 妹子私处人体图片 yinmindahuitang 舔无毛逼影片快播 田莹疑的裸体照片 三级电影影音先锋02222 妻子被外国老头操 观月雏乃泥鳅 韩国成人偷拍自拍图片 强奸5一9岁幼女小说 汤姆影院av图片 妹妹人艺体图 美女大驱 和女友做爱图片自拍p 绫川まどか在线先锋 那么嫩的逼很少见了 小女孩做爱 处女好逼连连看图图 性感美女在家做爱 近距离抽插骚逼逼 黑屌肏金毛屄 日韩av美少女 看喝尿尿小姐日逼色色色网图片 欧美肛交新视频 美女吃逼逼 av30线上免费 伊人在线三级经典 新视觉影院t6090影院 最新淫色电影网址 天龙影院远古手机版 搞老太影院 插进美女的大屁股里 私人影院加盟费用 www258dd 求一部电影里面有一个二猛哥 深肛交 日本萌妹子人体艺术写真图片 插入屄眼 美女的木奶 中文字幕黄色网址影视先锋 九号女神裸 和骚人妻偷情 和潘晓婷做爱 国模大尺度蜜桃 欧美大逼50p 西西人体成人 李宗瑞继母做爱原图物处理 nianhuawang 男鸡巴的视屏 � 97免费色伦电影 好色网成人 大姨子先锋 淫荡巨乳美女教师妈妈 性nuexiaoshuo WWW36YYYCOM 长春继续给力进屋就操小女儿套干破内射对白淫荡 农夫激情社区 日韩无码bt 欧美美女手掰嫩穴图片 日本援交偷拍自拍 入侵者日本在线播放 亚洲白虎偷拍自拍 常州高见泽日屄 寂寞少妇自卫视频 人体露逼图片 多毛外国老太 变态乱轮手机在线 淫荡妈妈和儿子操逼 伦理片大奶少女 看片神器最新登入地址sqvheqi345com账号群 麻美学姐无头 圣诞老人射小妞和强奸小妞动话片 亚洲AV女老师 先锋影音欧美成人资源 33344iucoom zV天堂电影网 宾馆美女打炮视频 色五月丁香五月magnet 嫂子淫乱小说 张歆艺的老公 吃奶男人视频在线播放 欧美色图男女乱伦 avtt2014ccvom 性插色欲香影院 青青草撸死你青青草 99热久久第一时间 激情套图卡通动漫 幼女裸聊做爱口交 日本女人被强奸乱伦 草榴社区快播 2kkk正在播放兽骑 啊不要人家小穴都湿了 www猎奇影视 A片www245vvcomwwwchnrwhmhzcn 搜索宜春院av wwwsee78co 逼奶鸡巴插 好吊日AV在线视频19gancom 熟女伦乱图片小说 日本免费av无码片在线开苞 鲁大妈撸到爆 裸聊官网 德国熟女xxx 新不夜城论坛首页手机 女虐男网址 男女做爱视频华为网盘 激情午夜天亚洲色图 内裤哥mangent 吉沢明歩制服丝袜WWWHHH710COM 屌逼在线试看 人体艺体阿娇艳照 推荐一个可以免费看片的网站如果被QQ拦截请复制链接在其它浏览器打开xxxyyy5comintr2a2cb551573a2b2e 欧美360精品粉红鲍鱼 教师调教第一页 聚美屋精品图 中韩淫乱群交 俄罗斯撸撸片 把鸡巴插进小姨子的阴道 干干AV成人网 aolasoohpnbcn www84ytom 高清大量潮喷www27dyycom 宝贝开心成人 freefronvideos人母 嫩穴成人网gggg29com 逼着舅妈给我口交肛交彩漫画 欧美色色aV88wwwgangguanscom 老太太操逼自拍视频 777亚洲手机在线播放 有没有夫妻3p小说 色列漫画淫女 午间色站导航 欧美成人处女色大图 童颜巨乳亚洲综合 桃色性欲草 色眯眯射逼 无码中文字幕塞外青楼这是一个 狂日美女老师人妻 爱碰网官网 亚洲图片雅蠛蝶 快播35怎么搜片 2000XXXX电影 新谷露性家庭影院 深深候dvd播放 幼齿用英语怎么说 不雅伦理无需播放器 国外淫荡图片 国外网站幼幼嫩网址 成年人就去色色视频快播 我鲁日日鲁老老老我爱 caoshaonvbi 人体艺术avav 性感性色导航 韩国黄色哥来嫖网站 成人网站美逼 淫荡熟妇自拍 欧美色惰图片 北京空姐透明照 狼堡免费av视频 www776eom 亚洲无码av欧美天堂网男人天堂 欧美激情爆操 a片kk266co 色尼姑成人极速在线视频 国语家庭系列 蒋雯雯 越南伦理 色CC伦理影院手机版 99jbbcom 大鸡巴舅妈 国产偷拍自拍淫荡对话视频 少妇春梦射精 开心激动网 自拍偷牌成人 色桃隐 撸狗网性交视频 淫荡的三位老师 伦理电影wwwqiuxia6commqiuxia6com 怡春院分站 丝袜超短裙露脸迅雷下载 色制服电影院 97超碰好吊色男人 yy6080理论在线宅男日韩福利大全 大嫂丝袜 500人群交手机在线 5sav 偷拍熟女吧 口述我和妹妹的欲望 50p电脑版 wwwavtttcon 3p3com 伦理无码片在线看 欧美成人电影图片岛国性爱伦理电影 先锋影音AV成人欧美 我爱好色 淫电影网 WWW19MMCOM 玛丽罗斯3d同人动画h在线看 动漫女孩裸体 超级丝袜美腿乱伦 1919gogo欣赏 大色逼淫色 www就是撸 激情文学网好骚 A级黄片免费 xedd5com 国内的b是黑的 快播美国成年人片黄 av高跟丝袜视频 上原保奈美巨乳女教师在线观看 校园春色都市激情fefegancom 偷窥自拍XXOO 搜索看马操美女 人本女优视频 日日吧淫淫 人妻巨乳影院 美国女子性爱学校 大肥屁股重口味 啪啪啪啊啊啊不要 操碰 japanfreevideoshome国产 亚州淫荡老熟女人体 伦奸毛片免费在线看 天天影视se 樱桃做爱视频 亚卅av在线视频 x奸小说下载 亚洲色图图片在线 217av天堂网 东方在线撸撸-百度 幼幼丝袜集 灰姑娘的姐姐 青青草在线视频观看对华 86papa路con 亚洲1AV 综合图片2区亚洲 美国美女大逼电影 010插插av成人网站 www色comwww821kxwcom 播乐子成人网免费视频在线观看 大炮撸在线影院 ,www4KkKcom 野花鲁最近30部 wwwCC213wapwww2233ww2download 三客优最新地址 母亲让儿子爽的无码视频 全国黄色片子 欧美色图美国十次 超碰在线直播 性感妖娆操 亚洲肉感熟女色图 a片A毛片管看视频 8vaa褋芯屑 333kk 川岛和津实视频 在线母子乱伦对白 妹妹肥逼五月 亚洲美女自拍 老婆在我面前小说 韩国空姐堪比情趣内衣 干小姐综合 淫妻色五月 添骚穴 WM62COM 23456影视播放器 成人午夜剧场 尼姑福利网 AV区亚洲AV欧美AV512qucomwwwc5508com 经典欧美骚妇 震动棒露出 日韩丝袜美臀巨乳在线 av无限吧看 就去干少妇 色艺无间正面是哪集 校园春色我和老师做爱 漫画夜色 天海丽白色吊带 黄色淫荡性虐小说 午夜高清播放器 文20岁女性荫道口图片 热国产热无码热有码 2015小明发布看看算你色 百度云播影视 美女肏屄屄乱轮小说 家族舔阴AV影片 邪恶在线av有码 父女之交 关于处女破处的三级片 极品护士91在线 欧美虐待女人视频的网站 享受老太太的丝袜 aaazhibuo 8dfvodcom成人 真实自拍足交 群交男女猛插逼 妓女爱爱动态 lin35com是什么网站 abp159 亚洲色图偷拍自拍乱伦熟女抠逼自慰 朝国三级篇 淫三国幻想 免费的av小电影网站 日本阿v视频免费按摩师 av750c0m 黄色片操一下 巨乳少女车震在线观看 操逼 免费 囗述情感一乱伦岳母和女婿 WWW_FAMITSU_COM 偷拍中国少妇在公车被操视频 花也真衣论理电影 大鸡鸡插p洞 新片欧美十八岁美少 进击的巨人神thunderftp 西方美女15p 深圳哪里易找到老女人玩视频 在线成人有声小说 365rrr 女尿图片 我和淫荡的小姨做爱 � 做爱技术体照 淫妇性爱 大学生私拍b 第四射狠狠射小说 色中色成人av社区 和小姨子乱伦肛交 wwwppp62com 俄罗斯巨乳人体艺术 骚逼阿娇 汤芳人体图片大胆 大胆人体艺术bb私处 性感大胸骚货 哪个网站幼女的片多 日本美女本子把 色 五月天 婷婷 快播 美女 美穴艺术 色百合电影导航 大鸡巴用力 孙悟空操美少女战士 狠狠撸美女手掰穴图片 古代女子与兽类交 沙耶香套图 激情成人网区 暴风影音av播放 动漫女孩怎么插第3个 mmmpp44 黑木麻衣无码ed2k 淫荡学姐少妇 乱伦操少女屄 高中性爱故事 骚妹妹爱爱图网 韩国模特剪长发 大鸡巴把我逼日了 中国张柏芝做爱片中国张柏芝做爱片中国张柏芝做爱片中国张柏芝做爱片中国张柏芝做爱片 大胆女人下体艺术图片 789sss 影音先锋在线国内情侣野外性事自拍普通话对白 群撸图库 闪现君打阿乐 ady 小说 插入表妹嫩穴小说 推荐成人资源 网络播放器 成人台 149大胆人体艺术 大屌图片 骚美女成人av 春暖花开春色性吧 女亭婷五月 我上了同桌的姐姐 恋夜秀场主播自慰视频 yzppp 屄茎 操屄女图 美女鲍鱼大特写 淫乱的日本人妻山口玲子 偷拍射精图 性感美女人体艺木图片 种马小说完本 免费电影院 骑士福利导航导航网站 骚老婆足交 国产性爱一级电影 欧美免费成人花花性都 欧美大肥妞性爱视频 家庭乱伦网站快播 偷拍自拍国产毛片 金发美女也用大吊来开包 缔D杏那 yentiyishu人体艺术ytys WWWUUKKMCOM 女人露奶 � 苍井空露逼 老荡妇高跟丝袜足交 偷偷和女友的朋友做爱迅雷 做爱七十二尺 朱丹人体合成 麻腾由纪妃 帅哥撸播种子图 鸡巴插逼动态图片 羙国十次啦中文 WWW137AVCOM 神斗片欧美版华语 有气质女人人休艺术 由美老师放屁电影 欧美女人肉肏图片 白虎种子快播 国产自拍90后女孩 美女在床上疯狂嫩b 饭岛爱最后之作 幼幼强奸摸奶 色97成人动漫 两性性爱打鸡巴插逼 新视觉影院4080青苹果影院 嗯好爽插死我了 阴口艺术照 李宗瑞电影qvod38 爆操舅母 亚洲色图七七影院 被大鸡巴操菊花 怡红院肿么了 成人极品影院删除 欧美性爱大图色图强奸乱 欧美女子与狗随便性交 苍井空的bt种子无码 熟女乱伦长篇小说 大色虫 兽交幼女影音先锋播放 44aad be0ca93900121f9b 先锋天耗ばさ无码 欧毛毛女三级黄色片图 干女人黑木耳照 日本美女少妇嫩逼人体艺术 sesechangchang 色屄屄网 久久撸app下载 色图色噜 美女鸡巴大奶 好吊日在线视频在线观看 透明丝袜脚偷拍自拍 中山怡红院菜单 wcwwwcom下载 骑嫂子 亚洲大色妣 成人故事365ahnet 丝袜家庭教mp4 幼交肛交 妹妹撸撸大妈 日本毛爽 caoprom超碰在email 关于中国古代偷窥的黄片 第一会所老熟女下载 wwwhuangsecome 狼人干综合新地址HD播放 变态儿子强奸乱伦图 强奸电影名字 2wwwer37com 日本毛片基地一亚洲AVmzddcxcn 暗黑圣经仙桃影院 37tpcocn 持月真由xfplay 好吊日在线视频三级网 我爱背入李丽珍 电影师傅床戏在线观看 96插妹妹sexsex88com 豪放家庭在线播放 桃花宝典极夜著豆瓜网 安卓系统播放神器 美美网丝袜诱惑 人人干全免费视频xulawyercn av无插件一本道 全国色五月 操逼电影小说网 good在线wwwyuyuelvcom www18avmmd 撸波波影视无插件 伊人幼女成人电影 会看射的图片 小明插看看 全裸美女扒开粉嫩b 国人自拍性交网站 萝莉白丝足交本子 七草ちとせ巨乳视频 摇摇晃晃的成人电影 兰桂坊成社人区小说www68kqcom 舔阴论坛 久撸客一撸客色国内外成人激情在线 明星门 欧美大胆嫩肉穴爽大片 www牛逼插 性吧星云 少妇性奴的屁眼 人体艺术大胆mscbaidu1imgcn 最新久久色色成人版 l女同在线 小泽玛利亚高潮图片搜索 女性裸b图 肛交bt种子 最热门有声小说 人间添春色 春色猜谜字 樱井莉亚钢管舞视频 小泽玛利亚直美6p 能用的h网 还能看的h网 bl动漫h网 开心五月激 东京热401 男色女色第四色酒色网 怎么下载黄色小说 黄色小说小栽 和谐图城 乐乐影院 色哥导航 特色导航 依依社区 爱窝窝在线 色狼谷成人 91porn 包要你射电影 色色3A丝袜 丝袜妹妹淫网 爱色导航(荐) 好男人激情影院 坏哥哥 第七色 色久久 人格分裂 急先锋 撸撸射中文网 第一会所综合社区 91影院老师机 东方成人激情 怼莪影院吹潮 老鸭窝伊人无码不卡无码一本道 av女柳晶电影 91天生爱风流作品 深爱激情小说私房婷婷网 擼奶av 567pao 里番3d一家人野外 上原在线电影 水岛津实透明丝袜 1314酒色 网旧网俺也去 0855影院 在线无码私人影院 搜索 国产自拍 神马dy888午夜伦理达达兔 农民工黄晓婷 日韩裸体黑丝御姐 屈臣氏的燕窝面膜怎么样つぼみ晶エリーの早漏チ○ポ强化合宿 老熟女人性视频 影音先锋 三上悠亚ol 妹妹影院福利片 hhhhhhhhsxo 午夜天堂热的国产 强奸剧场 全裸香蕉视频无码 亚欧伦理视频 秋霞为什么给封了 日本在线视频空天使 日韩成人aⅴ在线 日本日屌日屄导航视频 在线福利视频 日本推油无码av magnet 在线免费视频 樱井梨吮东 日本一本道在线无码DVD 日本性感诱惑美女做爱阴道流水视频 日本一级av 汤姆avtom在线视频 台湾佬中文娱乐线20 阿v播播下载 橙色影院 奴隶少女护士cg视频 汤姆在线影院无码 偷拍宾馆 业面紧急生级访问 色和尚有线 厕所偷拍一族 av女l 公交色狼优酷视频 裸体视频AV 人与兽肉肉网 董美香ol 花井美纱链接 magnet 西瓜影音 亚洲 自拍 日韩女优欧美激情偷拍自拍 亚洲成年人免费视频 荷兰免费成人电影 深喉呕吐XXⅩX 操石榴在线视频 天天色成人免费视频 314hu四虎 涩久免费视频在线观看 成人电影迅雷下载 能看见整个奶子的香蕉影院 水菜丽百度影音 gwaz079百度云 噜死你们资源站 主播走光视频合集迅雷下载 thumbzilla jappen 精品Av 古川伊织star598在线 假面女皇vip在线视频播放 国产自拍迷情校园 啪啪啪公寓漫画 日本阿AV 黄色手机电影 欧美在线Av影院 华裔电击女神91在线 亚洲欧美专区 1日本1000部免费视频 开放90后 波多野结衣 东方 影院av 页面升级紧急访问每天正常更新 4438Xchengeren 老炮色 a k福利电影 色欲影视色天天视频 高老庄aV 259LUXU-683 magnet 手机在线电影 国产区 欧美激情人人操网 国产 偷拍 直播 日韩 国内外激情在线视频网给 站长统计一本道人妻 光棍影院被封 紫竹铃取汁 ftp 狂插空姐嫩 xfplay 丈夫面前 穿靴子伪街 XXOO视频在线免费 大香蕉道久在线播放 电棒漏电嗨过头 充气娃能看下毛和洞吗 夫妻牲交 福利云点墦 yukun瑟妃 疯狂交换女友 国产自拍26页 腐女资源 百度云 日本DVD高清无码视频 偷拍,自拍AV伦理电影 A片小视频福利站。 大奶肥婆自拍偷拍图片 交配伊甸园 超碰在线视频自拍偷拍国产 小热巴91大神 rctd 045 类似于A片 超美大奶大学生美女直播被男友操 男友问 你的衣服怎么脱掉的 亚洲女与黑人群交视频一 在线黄涩 木内美保步兵番号 鸡巴插入欧美美女的b舒服 激情在线国产自拍日韩欧美 国语福利小视频在线观看 作爱小视颍 潮喷合集丝袜无码mp4 做爱的无码高清视频 牛牛精品 伊aⅤ在线观看 savk12 哥哥搞在线播放 在线电一本道影 一级谍片 250pp亚洲情艺中心,88 欧美一本道九色在线一 wwwseavbacom色av吧 cos美女在线 欧美17,18ⅹⅹⅹ视频 自拍嫩逼 小电影在线观看网站 筱田优 贼 水电工 5358x视频 日本69式视频有码 b雪福利导航 韩国女主播19tvclub在线 操逼清晰视频 丝袜美女国产视频网址导航 水菜丽颜射房间 台湾妹中文娱乐网 风吟岛视频 口交 伦理 日本熟妇色五十路免费视频 A级片互舔 川村真矢Av在线观看 亚洲日韩av 色和尚国产自拍 sea8 mp4 aV天堂2018手机在线 免费版国产偷拍a在线播放 狠狠 婷婷 丁香 小视频福利在线观看平台 思妍白衣小仙女被邻居强上 萝莉自拍有水 4484新视觉 永久发布页 977成人影视在线观看 小清新影院在线观 小鸟酱后丝后入百度云 旋风魅影四级 香蕉影院小黄片免费看 性爱直播磁力链接 小骚逼第一色影院 性交流的视频 小雪小视频bd 小视频TV禁看视频 迷奸AV在线看 nba直播 任你在干线 汤姆影院在线视频国产 624u在线播放 成人 一级a做爰片就在线看狐狸视频 小香蕉AV视频 www182、com 腿模简小育 学生做爱视频 秘密搜查官 快播 成人福利网午夜 一级黄色夫妻录像片 直接看的gav久久播放器 国产自拍400首页 sm老爹影院 谁知道隔壁老王网址在线 综合网 123西瓜影音 米奇丁香 人人澡人人漠大学生 色久悠 夜色视频你今天寂寞了吗? 菲菲影视城美国 被抄的影院 变态另类 欧美 成人 国产偷拍自拍在线小说 不用下载安装就能看的吃男人鸡巴视频 插屄视频 大贯杏里播放 wwwhhh50 233若菜奈央 伦理片天海翼秘密搜查官 大香蕉在线万色屋视频 那种漫画小说你懂的 祥仔电影合集一区 那里可以看澳门皇冠酒店a片 色自啪 亚洲aV电影天堂 谷露影院ar toupaizaixian sexbj。com 毕业生 zaixian mianfei 朝桐光视频 成人短视频在线直接观看 陈美霖 沈阳音乐学院 导航女 www26yjjcom 1大尺度视频 开平虐女视频 菅野雪松协和影视在线视频 华人play在线视频bbb 鸡吧操屄视频 多啪啪免费视频 悠草影院 金兰策划网 (969) 橘佑金短视频 国内一极刺激自拍片 日本制服番号大全magnet 成人动漫母系 电脑怎么清理内存 黄色福利1000 dy88午夜 偷拍中学生洗澡磁力链接 花椒相机福利美女视频 站长推荐磁力下载 mp4 三洞轮流插视频 玉兔miki热舞视频 夜生活小视频 爆乳人妖小视频 国内网红主播自拍福利迅雷下载 不用app的裸裸体美女操逼视频 变态SM影片在线观看 草溜影院元气吧 - 百度 - 百度 波推全套视频 国产双飞集合ftp 日本在线AV网 笔国毛片 神马影院女主播是我的邻居 影音资源 激情乱伦电影 799pao 亚洲第一色第一影院 av视频大香蕉 老梁故事汇希斯莱杰 水中人体磁力链接 下载 大香蕉黄片免费看 济南谭崔 避开屏蔽的岛a片 草破福利 要看大鸡巴操小骚逼的人的视频 黑丝少妇影音先锋 欧美巨乳熟女磁力链接 美国黄网站色大全 伦蕉在线久播 极品女厕沟 激情五月bd韩国电影 混血美女自摸和男友激情啪啪自拍诱人呻吟福利视频 人人摸人人妻做人人看 44kknn 娸娸原网 伊人欧美 恋夜影院视频列表安卓青青 57k影院 如果电话亭 avi 插爆骚女精品自拍 青青草在线免费视频1769TV 令人惹火的邻家美眉 影音先锋 真人妹子被捅动态图 男人女人做完爱视频15 表姐合租两人共处一室晚上她竟爬上了我的床 性爱教学视频 北条麻妃bd在线播放版 国产老师和师生 magnet wwwcctv1024 女神自慰 ftp 女同性恋做激情视频 欧美大胆露阴视频 欧美无码影视 好女色在线观看 后入肥臀18p 百度影视屏福利 厕所超碰视频 强奸mp magnet 欧美妹aⅴ免费线上看 2016年妞干网视频 5手机在线福利 超在线最视频 800av:cOm magnet 欧美性爱免播放器在线播放 91大款肥汤的性感美乳90后邻家美眉趴着窗台后入啪啪 秋霞日本毛片网站 cheng ren 在线视频 上原亚衣肛门无码解禁影音先锋 美脚家庭教师在线播放 尤酷伦理片 熟女性生活视频在线观看 欧美av在线播放喷潮 194avav 凤凰AV成人 - 百度 kbb9999 AV片AV在线AV无码 爱爱视频高清免费观看 黄色男女操b视频 观看 18AV清纯视频在线播放平台 成人性爱视频久久操 女性真人生殖系统双性人视频 下身插入b射精视频 明星潜规测视频 mp4 免賛a片直播绪 国内 自己 偷拍 在线 国内真实偷拍 手机在线 国产主播户外勾在线 三桥杏奈高清无码迅雷下载 2五福电影院凸凹频频 男主拿鱼打女主,高宝宝 色哥午夜影院 川村まや痴汉 草溜影院费全过程免费 淫小弟影院在线视频 laohantuiche 啪啪啪喷潮XXOO视频 青娱乐成人国产 蓝沢润 一本道 亚洲青涩中文欧美 神马影院线理论 米娅卡莉法的av 在线福利65535 欧美粉色在线 欧美性受群交视频1在线播放 极品喷奶熟妇在线播放 变态另类无码福利影院92 天津小姐被偷拍 磁力下载 台湾三级电髟全部 丝袜美腿偷拍自拍 偷拍女生性行为图 妻子的乱伦 白虎少妇 肏婶骚屄 外国大妈会阴照片 美少女操屄图片 妹妹自慰11p 操老熟女的b 361美女人体 360电影院樱桃 爱色妹妹亚洲色图 性交卖淫姿势高清图片一级 欧美一黑对二白 大色网无毛一线天 射小妹网站 寂寞穴 西西人体模特苍井空 操的大白逼吧 骚穴让我操 拉好友干女朋友3p