Main Page: Difference between revisions
No edit summary |
BerkmanSysop (talk | contribs) (orig) |
||
(343 intermediate revisions by 58 users not shown) | |||
Line 1: | Line 1: | ||
Welcome to Difficult Problems in Cyberlaw, a January course taught by Professor Jonathan Zittrain and Elizabeth Stark, co-hosted by Stanford Law School and Harvard Law | Welcome to Difficult Problems in Cyberlaw, a January course taught by Professor Jonathan Zittrain and Elizabeth Stark, co-hosted by Stanford Law School and Harvard Law SchooI. | ||
In addition to this wiki, this class maintains a [http://blogs.law.harvard.edu/difficultprobs/ blog] and [http://twitter.com/DifficultProbs twitter feed]. Check them out! | |||
If you are a student, please see the [[Student Responsibilities]] section and [[Course Logistics]]. For admins looking for details on field trips, please visit [http://cyber.law.harvard.edu/difficultproblems/Main_Page#Field_Trip_Logistic here]. All regular class meetings will be at '''Stanford Law School Classroom 280B'''. | If you are a student, please see the [[Student Responsibilities]] section and [[Course Logistics]]. For admins looking for details on field trips, please visit [http://cyber.law.harvard.edu/difficultproblems/Main_Page#Field_Trip_Logistic here]. All regular class meetings will be at '''Stanford Law School Classroom 280B'''. | ||
Line 6: | Line 8: | ||
The four main difficult problems to be addressed are: | The four main difficult problems to be addressed are: | ||
*[[Global Network Initiative]] | *[[Global Network Initiative]] ([[GNI Brainstorming |Group Page]]) | ||
*[[Ubiquitous Human Computing]] | *[[Ubiquitous Human Computing]] ([[Ubicomp Brainstorming |Group Page]]) | ||
*[[Future of Wikipedia]] | *[[Future of Wikipedia]] | ||
*[[Cybersecurity]] | *[[Cybersecurity]] ([[Cybersecurity Project|Final Project]]) ([[Cybersecurity Brainstorming |Brainstorming Page]]) | ||
Cross-cutting themes include: | Cross-cutting themes include: | ||
Line 16: | Line 18: | ||
*[[Motivating good and bad actors]] | *[[Motivating good and bad actors]] | ||
*[[Collaborating and relying on masses]] | *[[Collaborating and relying on masses]] | ||
*[[Privacy and | *[[Privacy and Anonymity on the Internet]] | ||
Group presentation schedule: | |||
*Friday, Jan. 15th: Ubiquitous Human Computing | |||
*Tuesday, Jan. 19th: Cybersecurity | |||
*Wednesday, Jan. 20th: Global Network Initiative | |||
*Thursday, Jan. 21st: Future of Wikipedia | |||
Line 37: | Line 45: | ||
''Assignments'': Before next class, post [[Day 2 Predictions]]. | ''Assignments'': Before next class, post [[Day 2 Predictions]]. | ||
''Thoughts after class'': [[Day 1 Thoughts]] | |||
---- | ---- | ||
Line 63: | Line 73: | ||
''Assignments'': Before next class, post [[Day 3 Predictions]]. | ''Assignments'': Before next class, post [[Day 3 Predictions]]. | ||
''Thoughts after class'': [[Day 2 Thoughts]] | |||
---- | ---- | ||
Line 68: | Line 80: | ||
<center> '''Wednesday, January 6th''' </center> | <center> '''Wednesday, January 6th''' </center> | ||
'''CLASS''': 6:30-8:30pm SLS Room 280B | '''CLASS''': 6:30-8:30pm SLS Room 280B, guests to begin arriving at 7:00pm | ||
:Examine the nature of ubiquitous human computing and potential future applications of human computing and the dangers. | :Examine the nature of ubiquitous human computing and potential future applications of human computing and the dangers. | ||
:Introduction to cybersecurity. | :Introduction to cybersecurity. | ||
Line 76: | Line 88: | ||
*Lukas Biewald, [http://crowdflower.com/ CrowdFlower] | *Lukas Biewald, [http://crowdflower.com/ CrowdFlower] | ||
*Bjoern Hartman, see his [http://bjoern.org/projects/catbook/ Mechanical Turk Cats Book] | *Bjoern Hartman, see his [http://bjoern.org/projects/catbook/ Mechanical Turk Cats Book] | ||
*Aaron Koblin | *Aaron Koblin, see his [http://www.aaronkoblin.com/work.html Ten Thousand Cents and Sheep Market projects] | ||
''Readings'': | ''Readings'': | ||
*Visit [http://www.mturk.com/ Mechanical Turk], [http://www.liveops.com/ LiveOps], [http://www.crowdflower.com CrowdFlower] or other human computing site | *Visit [http://www.mturk.com/ Mechanical Turk], [http://www.liveops.com/ LiveOps], [http://www.crowdflower.com CrowdFlower] or other human computing site | ||
**Watch the [http://www.ustream.tv/recorded/2167086 12-minute video] of Lukas' | **Watch the [http://www.ustream.tv/recorded/2167086 12-minute video] of Lukas' CrowdFlower presentation at TechCrunch | ||
*Skim Nancy R. Mansfield, ''[http://www.allbusiness.com/technology/internet-technology/618188-1.html The information revolution and its impact on the employment relationship: an analysis of the cyberspace workplace]'', <span style="font-variant:small-caps">American Business Law Journal</span> (2003). | *Skim Nancy R. Mansfield, ''[http://www.allbusiness.com/technology/internet-technology/618188-1.html The information revolution and its impact on the employment relationship: an analysis of the cyberspace workplace]'', <span style="font-variant:small-caps">American Business Law Journal</span> (2003). | ||
*Kate Thomas, ''[http://www.seiu.org/2009/12/insurers-hire-mafia-to-spam-congress.php Insurers Hire Mafia to Spam Congress]'', <span style="font-variant:small-caps">SEIU.org Blog</span>, Dec. 10, 2009. | *Kate Thomas, ''[http://www.seiu.org/2009/12/insurers-hire-mafia-to-spam-congress.php Insurers Hire Mafia to Spam Congress]'', <span style="font-variant:small-caps">SEIU.org Blog</span>, Dec. 10, 2009. | ||
Line 89: | Line 101: | ||
''Assignment'': Before next class, post [[Day 4 Predictions]]. | ''Assignment'': Before next class, post [[Day 4 Predictions]]. | ||
''Thoughts after class'': [[Day 3 Thoughts]] | |||
---- | ---- | ||
Line 94: | Line 108: | ||
<center> '''Thursday, January 7th''' </center> | <center> '''Thursday, January 7th''' </center> | ||
'''CLASS''': 11:10am-1:10pm SLS Room 280B | '''CLASS''': 11:10am-1:10pm SLS Room 280B, guests to begin arriving at 11:40am | ||
:Cybersecurity has been identified as one of the greatest threats facing the United States today, but it is ill-defined and almost impossible to address. How can we frame this problem to better inspire solutions? How should government, military, businesses, and internet/tech approach the problem from different angles and do these different approaches work together? | :Cybersecurity has been identified as one of the greatest threats facing the United States today, but it is ill-defined and almost impossible to address. How can we frame this problem to better inspire solutions? How should government, military, businesses, and internet/tech approach the problem from different angles and do these different approaches work together? | ||
:Introduction to Future of Wikipedia | :Introduction to Future of Wikipedia | ||
Line 106: | Line 120: | ||
*Kim Zetter, ''[http://www.wired.com/threatlevel/2008/08/revealed-the-in/ Revealed: The Internet's Biggest Security Hole]'', <span style="font-variant:small-caps">Wired</span> (2008). | *Kim Zetter, ''[http://www.wired.com/threatlevel/2008/08/revealed-the-in/ Revealed: The Internet's Biggest Security Hole]'', <span style="font-variant:small-caps">Wired</span> (2008). | ||
*Review <span style="font-variant:small-caps">Zittrain, [http://yupnet.org/zittrain/ The Future of the Internet: And How to Stop It]</span>; Chapter 3 | *Review <span style="font-variant:small-caps">Zittrain, [http://yupnet.org/zittrain/ The Future of the Internet: And How to Stop It]</span>; Chapter 3 | ||
*CENTRA Technology, [http://drop.io/cyberlaw_winter10 Cyber Compendium] Workshop, Nov. 2009. | *Skim CENTRA Technology, [http://drop.io/cyberlaw_winter10 Cyber Compendium] Workshop, Nov. 2009. | ||
*Skim the White House [http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf Cyberspace Policy Review] (2009); focus on the introduction/overview and the Near & Mid-Term Action Plans. | *Skim the White House [http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf Cyberspace Policy Review] (2009); focus on the introduction/overview and the Near & Mid-Term Action Plans. | ||
*Read [http://cyber.law.harvard.edu/cyberlaw_winter10/Future_of_Wikipedia Future of Wikipedia] wiki background paper | *Read [http://cyber.law.harvard.edu/cyberlaw_winter10/Future_of_Wikipedia Future of Wikipedia] wiki background paper | ||
''Assignment'': Before next class, post [[Day 5 Predictions]]. | ''Assignment'': Before next class, post [[Day 5 Predictions]]. | ||
''Thoughts after class'': [[Day 4 Thoughts]] | |||
---- | ---- | ||
Line 116: | Line 132: | ||
<center> '''Friday, January 8th''' </center> | <center> '''Friday, January 8th''' </center> | ||
'''FIELD TRIP: ''BONUS''''': eBay office visit ( | '''FIELD TRIP: ''BONUS''''': 10:30 am eBay office visit (shuttle from SLS), including JZ talk and meeting with eBay lawyers and security experts | ||
*If you're unable to attend, you might want to watch JZ's [http://www.youtube.com/watch?v=Dw3h-rae3uo Minds for Sale talk]. | |||
'''CLASS''': 3:00-5:00pm SLS Room 280B | '''CLASS''': 3:00-5:00pm SLS Room 280B, guests to begin arriving at 3:30pm | ||
:Wikipedia has grown quickly and rapidly to become one of if not the largest online content-generating collaboration. Following the 2009 Wikimania, Wikimedia has undertaken a self-review, looking at strategies for the future of Wikipedia. Is it a sustainable model? and if so, to what other fields is it applicable? How can its reception in academia be improved? and what are its applications for education? | :Wikipedia has grown quickly and rapidly to become one of if not the largest online content-generating collaboration. Following the 2009 Wikimania, Wikimedia has undertaken a self-review, looking at strategies for the future of Wikipedia. Is it a sustainable model? and if so, to what other fields is it applicable? How can its reception in academia be improved? and what are its applications for education? | ||
:Brief introduction of next week's cross-cutting themes | :Brief introduction of next week's cross-cutting themes | ||
''Guests'': | ''Guests'': | ||
* | *Stu West, [http://wikimediafoundation.org/wiki/Board_of_Trustees#Stu_West Wikimedia Foundation Board Member] | ||
*Phoebe Ayers, Wikimedia | *Mike Godwin, Wikimedia General Counsel | ||
*Phoebe Ayers, Wikimedia volunteer | |||
''Readings'': | ''Readings'': | ||
Line 136: | Line 154: | ||
''Assignment'': Before next class, post [[Day 6 Predictions]]. | ''Assignment'': Before next class, post [[Day 6 Predictions]]. | ||
''Thoughts after class'': [[Day 5 Thoughts]] | |||
'''EVENING EVENT: ''BONUS''''': Cocktails and hors d'oeuvres at David Hornik's office in Palo Alto after class. | '''EVENING EVENT: ''BONUS''''': Cocktails and hors d'oeuvres at David Hornik's office in Palo Alto after class. | ||
Line 149: | Line 169: | ||
<center> '''Monday, January 11th''' </center> | <center> '''Monday, January 11th''' </center> | ||
'''CLASS''': 7:20-9:20pm SLS Room 280B | '''CLASS''': 7:20-9:20pm SLS Room 280B, guests to begin arriving at 7:50pm | ||
:One potential way to address some of the problems addressed in this course is through innovations and technological solutions. Several solutions have changed the way our browsers work and thereby changed the way we interact with the internet, making life better. In what other areas could a similar approach be applied? Change the technology, save the world. | :One potential way to address some of the problems addressed in this course is through innovations and technological solutions. Several solutions have changed the way our browsers work and thereby changed the way we interact with the internet, making life better. In what other areas could a similar approach be applied? Change the technology, save the world. | ||
:Introduction to cross-cutting theme of privacy, anonymity and liability on the internet | :Introduction to cross-cutting theme of privacy, anonymity and liability on the internet | ||
Line 161: | Line 181: | ||
''Readings'': | ''Readings'': | ||
*Visit [http://www.herdict.org/web/ HerdictWeb] | *Visit [http://www.herdict.org/web/ HerdictWeb] | ||
*Watch [http://www.youtube.com/watch?v=NggzBHSXdCo Video explanation of Herdict] (student suggested) | |||
*Zittrain's [http://www.hyperorg.com/blogger/2009/02/10/berkman-jz-on-herdict/ Comments on Herdict] at a Berkman Center Lunch | *Zittrain's [http://www.hyperorg.com/blogger/2009/02/10/berkman-jz-on-herdict/ Comments on Herdict] at a Berkman Center Lunch | ||
*Visit [http://disputefinder.cs.berkeley.edu/ DisputeFinder] (Test it out!) | *Visit [http://disputefinder.cs.berkeley.edu/ DisputeFinder] (Test it out!) | ||
Line 169: | Line 190: | ||
''Assignment'': Before next class, post [[Day 7 Predictions]]. | ''Assignment'': Before next class, post [[Day 7 Predictions]]. | ||
''Thoughts after class'': [[Day 6 Thoughts]] | |||
---- | ---- | ||
Line 179: | Line 202: | ||
'''CLASS''': 5:15-7:15pm SLS Room 280B | '''CLASS''': 5:15-7:15pm SLS Room 280B, guests to begin arriving at 5:45pm | ||
:Privacy and anonymity can raise significant issues for accountability for online actions. Users often believe they are more anonymous than they truly are online - how can we better educate the public about the reality of privacy online? Consider the Drumbeat privacy project and creative commons issues. | :Privacy and anonymity can raise significant issues for accountability for online actions. Users often believe they are more anonymous than they truly are online - how can we better educate the public about the reality of privacy online? Consider the Drumbeat privacy project and creative commons issues. | ||
:Introduction to the cross-cutting theme of due process and dispute resolution on the internet. | :Introduction to the cross-cutting theme of due process and dispute resolution on the internet. | ||
Line 189: | Line 212: | ||
*Michael Fertik, Reputation Defender | *Michael Fertik, Reputation Defender | ||
*Carl Malamud | *Carl Malamud | ||
*Julie Martin, Mozilla | |||
*Aza Raskin, Mozilla | |||
''Readings'': | ''Readings'': | ||
Line 195: | Line 220: | ||
*Odia Kagan, ''[http://www.ibls.com/internet_law_news_portal_view.aspx?s=latestnews&id=1915 Fighting Anonymous Defamation],'' <span style="font-variant:small-caps">Int'l Business Law Services</span>, November 26, 2007. | *Odia Kagan, ''[http://www.ibls.com/internet_law_news_portal_view.aspx?s=latestnews&id=1915 Fighting Anonymous Defamation],'' <span style="font-variant:small-caps">Int'l Business Law Services</span>, November 26, 2007. | ||
*Consider commercial applications; visit [http://www.reputationdefender.com/ ReputationDefender] | *Consider commercial applications; visit [http://www.reputationdefender.com/ ReputationDefender] | ||
*[https://wiki.mozilla.org/Drumbeat/Challenges/Privacy_Icons Drumbeat privacy icon challenge] backgrounder | |||
''Additional Materials'' (suggested by student): | |||
*Watch [http://www.youtube.com/watch?v=JCbKv9yiLiQ Message from Anonymous to the Church of Scientology]; | |||
*Skim [http://en.wikipedia.org/wiki/Anonymous_%28group%29 Wikipedia's article about Anonymous Group]; | |||
*Read about (and use!) [http://www.torproject.org/ Tor] | |||
''Assignment'': Before next class, post [[Day 8 Predictions]]. | ''Assignment'': Before next class, post [[Day 8 Predictions]]. | ||
''Thoughts after class'': [[Day 7 Thoughts]] | |||
---- | ---- | ||
Line 202: | Line 235: | ||
<center> '''Wednesday, January 13th''' </center> | <center> '''Wednesday, January 13th''' </center> | ||
'''CLASS''': 6:30-8:30pm SLS Room 280B, guests to begin arriving at 7:00pm | |||
'''CLASS''': 6:30-8:30pm SLS Room 280B | |||
:How do our due process concerns translate to the internet and online communities? Should due process exist on the internet? Is the internet public or private space and under what terms do we have the privilege or right to access? | :How do our due process concerns translate to the internet and online communities? Should due process exist on the internet? Is the internet public or private space and under what terms do we have the privilege or right to access? | ||
:Consider, for example, how much due process should be required to remove an account from Facebook, Google or Twitter. How much due process is necessary for a take-down on YouTube and what right of appeal do you have in any of these circumstances? | :Consider, for example, how much due process should be required to remove an account from Facebook, Google or Twitter. How much due process is necessary for a take-down on YouTube and what right of appeal do you have in any of these circumstances? | ||
Line 210: | Line 241: | ||
''Guests'': | ''Guests'': | ||
*Kim Scott, Google | * Kim Scott, Google | ||
''Readings'': | ''Readings'': | ||
*Skim Elizabeth Thornburg, ''[http://faculty.smu.edu/ethornbu/Thornburg%20Macro.doc Going Private: Technology, Due Process, and Internet Dispute Resolution]'', 34 <span style="font-variant:small-caps">Univ. Cal. Davis</span> 151 (2000). | |||
*Read through the Facebook or Google terms of service (see the primer above) | * Skim Elizabeth Thornburg, ''[http://faculty.smu.edu/ethornbu/Thornburg%20Macro.doc Going Private: Technology, Due Process, and Internet Dispute Resolution]'', 34 <span style="font-variant:small-caps">Univ. Cal. Davis</span> 151 (2000). | ||
*Terri Wells, ''[http://www.seochat.com/c/a/Search-Engine-News/Beware-the-Google-Death-Penalty/ Beware the Google 'Death Penalty']'',<span style="font-variant:small-caps">Search Engine News</span> (2006). | * Read through the Facebook or Google terms of service (see the primer above) | ||
* Recall Zittrain, Chapter 7, on [http://yupnet.org/zittrain/archives/18#48 Private Sheriffs] | |||
* Terri Wells, ''[http://www.seochat.com/c/a/Search-Engine-News/Beware-the-Google-Death-Penalty/ Beware the Google 'Death Penalty']'',<span style="font-variant:small-caps">Search Engine News</span> (2006). | |||
''Assignment'': Before next class, post [[Day 9 Predictions]]. | ''Assignment'': Before next class, post [[Day 9 Predictions]]. | ||
''Thoughts after class'': [[Day 8 Thoughts]] | |||
---- | ---- | ||
Line 224: | Line 259: | ||
<center> '''Thursday, January 14th''' </center> | <center> '''Thursday, January 14th''' </center> | ||
'''CLASS''': 11:10am-1:10pm SLS Room 280B | '''CLASS''': 11:10am-1:10pm SLS Room 280B, guests to begin arriving at 11:40am | ||
:Online collaboration projects require internet organizations to motivate and coordinate large groups of people. This requires both motivating good actors to participate and motivating bad actors either to not participate or to conform to the rules/standards of the site. How can website hosts face these challenges? How involved should the users of cooperatively developed sites be in their governments? | :Online collaboration projects require internet organizations to motivate and coordinate large groups of people. This requires both motivating good actors to participate and motivating bad actors either to not participate or to conform to the rules/standards of the site. How can website hosts face these challenges? How involved should the users of cooperatively developed sites be in their governments? | ||
Line 230: | Line 265: | ||
*Daniel Hoffer, [http://www.couchsurfing.org/ Couchsurfing] | *Daniel Hoffer, [http://www.couchsurfing.org/ Couchsurfing] | ||
*Micah Schaffer | *Micah Schaffer | ||
*Dan Scholnick | *Dan Scholnick, [http://www.trinityventures.com/venture-capital-team/bio.php?first-name=Dan&last-name=Scholnick Trinity Ventures] | ||
*Ben Rigby, [http://beextra.org The Extraordinaries] | |||
*Stu West, [http://wikimediafoundation.org/wiki/Board_of_Trustees#Stu_West Wikimedia Foundation Board Member] | |||
''Readings'': | ''Readings'': | ||
Line 236: | Line 273: | ||
*Browse [http://www.opencouchsurfing.org/ OpenCouchSurfing.org] posts and complaints | *Browse [http://www.opencouchsurfing.org/ OpenCouchSurfing.org] posts and complaints | ||
*Review readings from Friday, January 8th on Wikipedia and motivation of contributors | *Review readings from Friday, January 8th on Wikipedia and motivation of contributors | ||
''Thoughts after class'': [[Day 9 Thoughts]] | |||
'''CLASS SOCIAL''': Bonus, evening, details TBD | |||
---- | ---- | ||
Line 241: | Line 282: | ||
<center> '''Friday, January 15th''' </center> | <center> '''Friday, January 15th''' </center> | ||
'''CLASS''': 1:00-3:00pm SLS Room 280B | '''CLASS''': 1:00-3:00pm SLS Room 280B, guests to begin arriving at 1:30pm | ||
: | :Ubiquitous Human Computing presentation (60 min) | ||
:Discussion of solution's strengths and weaknesses and other approaches to consider | :Discussion of solution's strengths and weaknesses and other approaches to consider | ||
''' | ''Guests'': | ||
*Fabio Rosati, Elance | |||
''Group Documents'': | |||
*[http://docs.google.com/Doc?docid=0AVl_o5lQOXEqZGMzejN4OG5fMjEzZnFyeG54ZG4&hl=en Best practices ] | |||
*[http://docs.google.com/Doc?docid=0AVl_o5lQOXEqZGMzejN4OG5fMjE2Z3pjNWR2ZGM&hl=en Technological solutions ] | |||
''Thoughts about the discussed solutions'': [[UHC Solutions]] | |||
==WEEK THREE: SOLUTIONS== | ==WEEK THREE: SOLUTIONS== | ||
Line 257: | Line 305: | ||
<center> '''Tuesday, January 19th''' </center> | <center> '''Tuesday, January 19th''' </center> | ||
'''FIELD TRIP: ''BONUS''''': | '''FIELD TRIP: ''BONUS''''': Google, 3:30pm | ||
'''CLASS''': | '''CLASS''': Held at Google during visit | ||
: | :Cybersecurity presentation (60 min) | ||
:Discussion of solution's strengths and weaknesses and other approaches to consider | :Discussion of solution's strengths and weaknesses and other approaches to consider | ||
''Guests'': | |||
*Mitchell Baker | |||
---- | ---- | ||
Line 267: | Line 318: | ||
<center> '''Wednesday, January 20th''' </center> | <center> '''Wednesday, January 20th''' </center> | ||
'''CLASS''': 6:30-8:30pm SLS Room 280B | '''FIELD TRIP: ''BONUS'':''' Facebook, 12:30-2pm (TBC) | ||
: | |||
'''CLASS''': 6:30-8:30pm SLS Room 280B, guests to begin arriving at 7:00pm | |||
:Global Network Initiative presentation (60 min) | |||
:Discussion of solution's strengths and weaknesses and other approaches to consider | :Discussion of solution's strengths and weaknesses and other approaches to consider | ||
''Guests'': | |||
*Esther Wojcicki | |||
---- | ---- | ||
Line 275: | Line 331: | ||
<center> '''Thursday, January 21st''' </center> | <center> '''Thursday, January 21st''' </center> | ||
'''CLASS''': 11:10am-1:10pm SLS Room 280B | '''CLASS''': 11:10am-1:10pm SLS Room 280B, guests to begin arriving at 11:40am | ||
: | :Future of Wikipedia presentation (60 min) | ||
:Discussion of solution's strengths and weaknesses and other approaches to consider | :Discussion of solution's strengths and weaknesses and other approaches to consider | ||
''Guests'': | ''Guests'': | ||
*Craig Newmark | *Craig Newmark, [http://www.craigslist.org/about/craig_newmark Craigslist founder] and [http://wikimediafoundation.org/wiki/Advisory_Board#Craig_Newmark Wikimedia Foundation Advisory Board member] | ||
*Edward Wes | *Edward Wes | ||
*Jack Herrick, founder of [http://www.wikihow.com/Main-Page WikiHow] | |||
*Stu West, [http://wikimediafoundation.org/wiki/Board_of_Trustees#Stu_West Wikimedia Foundation Board Member] | |||
'''WRAP-UP DINNER''': 7:20-9:20pm SLS Student Lounge | |||
''' | <center> '''Friday, January 22nd''' </center> | ||
'''ReputationDefender visit''': 2:30pm | |||
---- | ---- | ||
Latest revision as of 14:12, 23 June 2022
Welcome to Difficult Problems in Cyberlaw, a January course taught by Professor Jonathan Zittrain and Elizabeth Stark, co-hosted by Stanford Law School and Harvard Law SchooI.
In addition to this wiki, this class maintains a blog and twitter feed. Check them out!
If you are a student, please see the Student Responsibilities section and Course Logistics. For admins looking for details on field trips, please visit here. All regular class meetings will be at Stanford Law School Classroom 280B.
This map site has a map of the Bay Area, Stanford campus, and visitor parking at Stanford.
The four main difficult problems to be addressed are:
- Global Network Initiative (Group Page)
- Ubiquitous Human Computing (Group Page)
- Future of Wikipedia
- Cybersecurity (Final Project) (Brainstorming Page)
Cross-cutting themes include:
- Due process on the Internet among private sheriffs
- The role of intermediaries
- Motivating good and bad actors
- Collaborating and relying on masses
- Privacy and Anonymity on the Internet
Group presentation schedule:
- Friday, Jan. 15th: Ubiquitous Human Computing
- Tuesday, Jan. 19th: Cybersecurity
- Wednesday, Jan. 20th: Global Network Initiative
- Thursday, Jan. 21st: Future of Wikipedia
WEEK ONE: DEFINING THE PROBLEMS
LUNCH: 12-2pm SLS, Room 280B
- Student introductions
CLASS: 7:20-9:20pm SLS Room 280B
- A brief overview of the course, its goals and expectations, including an introduction to the difficult problems and the cross-cutting themes.
- A quiz on Zittrain's book, The Future of the Internet: And How to Stop It will be given.
- Brief introduction to the Global Network Initiative
Readings For Class:
- Read The Future of the Internet: And How to Stop It
- Explore the Global Network Initiative website
- Read the GNI Wiki Primer
Assignments: Before next class, post Day 2 Predictions.
Thoughts after class: Day 1 Thoughts
CYBERSECURITY BACKGROUND: BONUS: 2-4pm SLS Room 280B
- Professor Zittrain will interview Professor Jack Goldsmith as an overview of cybersecurity as it has evolved and as it can potentially be addressed.
- Bonus Writing Opportunity: produce a summary of the cybersecurity event, to be used as background reading for Thursday
CLASS: 5:15-7:15pm SLS Room 280B
- Identify the first-order problems regarding corporate responsibility and free expression on the internet. Examine how GNI attempts to address these problems and then evaluate whether GNI is a success and whether better approaches could be taken.
- Introduction to ubiquitous human computing.
Guests:
- Mark Chandler, CISCO
- Chuck Cosson, Microsoft
- Dunstan Hope, BSR
Readings:
- Read Rhys Blakely, Yahoo in second Chinese blog Row, TimesOnline, Feb. 9, 2006.
- Read Colin Maclay, "Protecting Privacy and Expression Online," in Access Controlled (Ronald Diebert et al., eds., MIT Press: Cambridge, MA, 2010).
- Read GNI Guiding Principles
- Read the UbiComp Wiki Primer
Assignments: Before next class, post Day 3 Predictions.
Thoughts after class: Day 2 Thoughts
CLASS: 6:30-8:30pm SLS Room 280B, guests to begin arriving at 7:00pm
- Examine the nature of ubiquitous human computing and potential future applications of human computing and the dangers.
- Introduction to cybersecurity.
Guests:
- Lukas Biewald, CrowdFlower
- Bjoern Hartman, see his Mechanical Turk Cats Book
- Aaron Koblin, see his Ten Thousand Cents and Sheep Market projects
Readings:
- Visit Mechanical Turk, LiveOps, CrowdFlower or other human computing site
- Watch the 12-minute video of Lukas' CrowdFlower presentation at TechCrunch
- Skim Nancy R. Mansfield, The information revolution and its impact on the employment relationship: an analysis of the cyberspace workplace, American Business Law Journal (2003).
- Kate Thomas, Insurers Hire Mafia to Spam Congress, SEIU.org Blog, Dec. 10, 2009.
- Read Jonathan Zittrain, Ubiquitous Human Computing, SSRN Paper No 32/2008 (July 2008).
- Read the Cybersecurity Wiki Primer
ASSIGNMENT: Due -- Email Admin with Problem Topic Choice
Assignment: Before next class, post Day 4 Predictions.
Thoughts after class: Day 3 Thoughts
CLASS: 11:10am-1:10pm SLS Room 280B, guests to begin arriving at 11:40am
- Cybersecurity has been identified as one of the greatest threats facing the United States today, but it is ill-defined and almost impossible to address. How can we frame this problem to better inspire solutions? How should government, military, businesses, and internet/tech approach the problem from different angles and do these different approaches work together?
- Introduction to Future of Wikipedia
Guests:
- Chuck Cosson, Microsoft
Readings:
- Listen to David Clark, The Internets We Did Not Build.
- Col. Allen & Lt. Col Demchak, The Palestinian-Israeli Cyberwar, Military Review (2003).
- Kim Zetter, Revealed: The Internet's Biggest Security Hole, Wired (2008).
- Review Zittrain, The Future of the Internet: And How to Stop It; Chapter 3
- Skim CENTRA Technology, Cyber Compendium Workshop, Nov. 2009.
- Skim the White House Cyberspace Policy Review (2009); focus on the introduction/overview and the Near & Mid-Term Action Plans.
- Read Future of Wikipedia wiki background paper
Assignment: Before next class, post Day 5 Predictions.
Thoughts after class: Day 4 Thoughts
FIELD TRIP: BONUS: 10:30 am eBay office visit (shuttle from SLS), including JZ talk and meeting with eBay lawyers and security experts
- If you're unable to attend, you might want to watch JZ's Minds for Sale talk.
CLASS: 3:00-5:00pm SLS Room 280B, guests to begin arriving at 3:30pm
- Wikipedia has grown quickly and rapidly to become one of if not the largest online content-generating collaboration. Following the 2009 Wikimania, Wikimedia has undertaken a self-review, looking at strategies for the future of Wikipedia. Is it a sustainable model? and if so, to what other fields is it applicable? How can its reception in academia be improved? and what are its applications for education?
- Brief introduction of next week's cross-cutting themes
Guests:
- Stu West, Wikimedia Foundation Board Member
- Mike Godwin, Wikimedia General Counsel
- Phoebe Ayers, Wikimedia volunteer
Readings:
- Review Zittrain, The Future of the Internet: And How to Stop It; Chapter 6
- Peruse Wikipedia's Strategy Page
- Strona, The Battle for Wikipedia's Soul, The Economist, March 6, 2008.
- A Stand Against Wikipedia?, Inside Higher Ed, Jan. 26, 2007.
- Browse Wikipedia Watch and Criticism of Wikipedia
- Wikipedia Volunteers Log Off as Wikipedia Ages, Wall Street Journal.
- New editors are joining English Wikipedia in droves?, Infodisiac, Dec. 6, 2009.
Assignment: Before next class, post Day 6 Predictions.
Thoughts after class: Day 5 Thoughts
EVENING EVENT: BONUS: Cocktails and hors d'oeuvres at David Hornik's office in Palo Alto after class.
Tour of San Francisco (Optional); details TBD. To give input and suggestions, visit Tour Ideas.
WEEK TWO: CROSS-CUTTING THEMES
CLASS: 7:20-9:20pm SLS Room 280B, guests to begin arriving at 7:50pm
- One potential way to address some of the problems addressed in this course is through innovations and technological solutions. Several solutions have changed the way our browsers work and thereby changed the way we interact with the internet, making life better. In what other areas could a similar approach be applied? Change the technology, save the world.
- Introduction to cross-cutting theme of privacy, anonymity and liability on the internet
Guests:
- John M. Agosta, DisputeFinder
- Tye Rattenbury, DisputeFinder
- Rob Ennals, DisputeFinder
- Tad Hersch, DisputeFinder
Readings:
- Visit HerdictWeb
- Watch Video explanation of Herdict (student suggested)
- Zittrain's Comments on Herdict at a Berkman Center Lunch
- Visit DisputeFinder (Test it out!)
- Visit New.net
- How can .church domain names exist when it does not exist? Look at the new.net domain decoder
- Compare with List of Internet Domains
- Read Introduction to Ann Bartow, Internet Defamation As Profit Center: The Monetization of Online Harrassment, 32 Harvard Journal of Law & Gender 383 (2009).
Assignment: Before next class, post Day 7 Predictions.
Thoughts after class: Day 6 Thoughts
WORKSHOP: BONUS: 1-2pm Faculty Lounge, Stanford law.gov workshop Hosted by Carl Malamud
- Some students attend the entire workshop, 10am-3pm
CLASS: 5:15-7:15pm SLS Room 280B, guests to begin arriving at 5:45pm
- Privacy and anonymity can raise significant issues for accountability for online actions. Users often believe they are more anonymous than they truly are online - how can we better educate the public about the reality of privacy online? Consider the Drumbeat privacy project and creative commons issues.
- Introduction to the cross-cutting theme of due process and dispute resolution on the internet.
Guests:
- Ryan Calo, SLS Fellow
- Ebele Okobi-Harris, Yahoo! Director of Business and Human Rights
- Mark Surman, Mozilla
- Michael Fertik, Reputation Defender
- Carl Malamud
- Julie Martin, Mozilla
- Aza Raskin, Mozilla
Readings:
- Browse Creative Commons for discussion
- Review Zittrain, The Future of the Internet: And How to Stop It; Chapter 9 on Data Genealogy
- Odia Kagan, Fighting Anonymous Defamation, Int'l Business Law Services, November 26, 2007.
- Consider commercial applications; visit ReputationDefender
- Drumbeat privacy icon challenge backgrounder
Additional Materials (suggested by student):
- Watch Message from Anonymous to the Church of Scientology;
- Skim Wikipedia's article about Anonymous Group;
- Read about (and use!) Tor
Assignment: Before next class, post Day 8 Predictions.
Thoughts after class: Day 7 Thoughts
CLASS: 6:30-8:30pm SLS Room 280B, guests to begin arriving at 7:00pm
- How do our due process concerns translate to the internet and online communities? Should due process exist on the internet? Is the internet public or private space and under what terms do we have the privilege or right to access?
- Consider, for example, how much due process should be required to remove an account from Facebook, Google or Twitter. How much due process is necessary for a take-down on YouTube and what right of appeal do you have in any of these circumstances?
- Introduction to online collaboration and group motivation strategies
Guests:
- Kim Scott, Google
Readings:
- Skim Elizabeth Thornburg, Going Private: Technology, Due Process, and Internet Dispute Resolution, 34 Univ. Cal. Davis 151 (2000).
- Read through the Facebook or Google terms of service (see the primer above)
- Recall Zittrain, Chapter 7, on Private Sheriffs
- Terri Wells, Beware the Google 'Death Penalty',Search Engine News (2006).
Assignment: Before next class, post Day 9 Predictions.
Thoughts after class: Day 8 Thoughts
CLASS: 11:10am-1:10pm SLS Room 280B, guests to begin arriving at 11:40am
- Online collaboration projects require internet organizations to motivate and coordinate large groups of people. This requires both motivating good actors to participate and motivating bad actors either to not participate or to conform to the rules/standards of the site. How can website hosts face these challenges? How involved should the users of cooperatively developed sites be in their governments?
Guests:
- Daniel Hoffer, Couchsurfing
- Micah Schaffer
- Dan Scholnick, Trinity Ventures
- Ben Rigby, The Extraordinaries
- Stu West, Wikimedia Foundation Board Member
Readings:
- F. Gino, Jun Gu, & Chen-Bo Zhong, Contagion or Restitution? When bad apples can motivate ethical behavior, 45 J. Experimental Social Psychology 1299-1302 (2009).
- Browse OpenCouchSurfing.org posts and complaints
- Review readings from Friday, January 8th on Wikipedia and motivation of contributors
Thoughts after class: Day 9 Thoughts
CLASS SOCIAL: Bonus, evening, details TBD
CLASS: 1:00-3:00pm SLS Room 280B, guests to begin arriving at 1:30pm
- Ubiquitous Human Computing presentation (60 min)
- Discussion of solution's strengths and weaknesses and other approaches to consider
Guests:
- Fabio Rosati, Elance
Group Documents:
Thoughts about the discussed solutions: UHC Solutions
WEEK THREE: SOLUTIONS
NO CLASS: Martin Luther King, Jr. Day
FIELD TRIP: BONUS: Google, 3:30pm
CLASS: Held at Google during visit
- Cybersecurity presentation (60 min)
- Discussion of solution's strengths and weaknesses and other approaches to consider
Guests:
- Mitchell Baker
FIELD TRIP: BONUS: Facebook, 12:30-2pm (TBC)
CLASS: 6:30-8:30pm SLS Room 280B, guests to begin arriving at 7:00pm
- Global Network Initiative presentation (60 min)
- Discussion of solution's strengths and weaknesses and other approaches to consider
Guests:
- Esther Wojcicki
CLASS: 11:10am-1:10pm SLS Room 280B, guests to begin arriving at 11:40am
- Future of Wikipedia presentation (60 min)
- Discussion of solution's strengths and weaknesses and other approaches to consider
Guests:
- Craig Newmark, Craigslist founder and Wikimedia Foundation Advisory Board member
- Edward Wes
- Jack Herrick, founder of WikiHow
- Stu West, Wikimedia Foundation Board Member
WRAP-UP DINNER: 7:20-9:20pm SLS Student Lounge
ReputationDefender visit: 2:30pm
FINAL PROJECTS DUE