Main Page: Difference between revisions
No edit summary |
|||
Line 1: | Line 1: | ||
Welcome to Difficult Problems in Cyberlaw, a January course taught by Professor Jonathan Zittrain and co-hosted by Stanford Law School and Harvard Law School. | |||
If you are a student, please see the [[Student Responsibilities]] section and [[Course Logistics]]. | |||
The four main difficult problems to be addressed are: | |||
*[[Global Network Initiative]] | |||
*[[Ubiquitous Human Computing]] | |||
*[[Future of Wikipedia]] | |||
*[[Cybersecurity]] | |||
Cross-cutting themes: | Cross-cutting themes include: | ||
*[[Due Process on the Internet]] | |||
*[[Motivating Good & Bad Actors]] | |||
*[[Mass Collaboration]] | |||
*[[Privacy and Anonymity on the Internet]] | |||
= | ==WEEK ONE: DEFINING THE PROBLEMS== | ||
*[[ | <center> '''Monday, January 4th''' </center> | ||
*[http:// | |||
*[ | '''LUNCH''': 12-2pm SLS (location TBA) | ||
** [http:// | :Student introductions | ||
*[[ | |||
'''CLASS''': 7:20-9:20pm SLS (location TBA) | |||
:A brief overview of the course, it's goals and expectations, including an introduction to the difficult problems and the cross-cutting themes. | |||
:A quiz on Zittrain's book, <span style="font-variant:small-caps">[http://yupnet.org/zittrain/ The Future of the Internet: And How to Stop It]</span> will be given. | |||
:Brief introduction to the Global Network Initiative | |||
''Readings'': | |||
*Read <span style="font-variant:small-caps">[http://yupnet.org/zittrain/ The Future of the Internet: And How to Stop It]</span> | |||
*Explore the [http://www.globalnetworkinitiative.org/ Global Network Iniative] website | |||
*Read GNI [http://www.globalnetworkinitiative.org/cms/uploads/1/GNI_-_Principles_1_.pdf Guiding Principles] | |||
---- | |||
<center> '''Tuesday, January 5th''' </center> | |||
'''PANEL''': | |||
'''CLASS''': 5:15-7:15pm SLS (location TBA) | |||
:Identify the first-order problems regarding corporate responsibility and free expression on the internet. Examine how GNI attempts to address these problems and then evaluate whether GNI is a success and whether better approaches could be taken. | |||
:Introduction to ubiquitous human computing. | |||
*5 students will have 4 minutes each to introduce themselves at the beginning of class | |||
''Guests:'' | |||
*Mark Chandler, CISCO | |||
''Readings:'' | |||
*Read the [http://cyber.law.harvard.edu/cyberlaw_winter10/GNI GNI Wiki Primer] | |||
*Read Rhys Blakely, ''[http://business.timesonline.co.uk/tol/business/industry_sectors/media/article728898.ece Yahoo in second Chinese blog Row],'' <span style="font-variant:small-caps">TimesOnline</span>, Feb. 9, 2006. | |||
*Read Colin Maclay, "[http://drop.io/cyberlaw_winter10/asset/maclay-access-controlled-pdf Protecting Privacy and Expression Online]," ''in'' <span style="font-variant:small-caps">Access Controlled</span> (Ronald Diebert et al., eds., MIT Press: Cambridge, MA, 2010). | |||
*Read Jonathan Zittrain, ''[http://drop.io/cyberlaw_winter10/asset/ssrn-id1140445-pdf Ubiquitous Human Computing]'', SSRN Paper No 32/2008 (July 2008). | |||
---- | |||
<center> '''Wednesday, January 6th''' </center> | |||
'''PANEL''': | |||
'''CLASS''': 6:30-8:30pm SLS (location TBA) | |||
:Examine the nature of ubiquitous human computing and potential future applications of human computing and the dangers. | |||
:Introduction to cybersecurity. | |||
*5 students will have 4 minutes each to introduce themselves at the beginning of class | |||
''Guests'': | |||
*Lukas Biewald, [http://crowdflower.com/ CrowdFlower] | |||
*Bjoern Hartman, see his [http://bjoern.org/projects/catbook/ Mechanical Turk Cats Book] | |||
''Readings'': | |||
*Visit Mechanical Turk, LiveOps, CrowdFlower or other human computing site | |||
*Watch "[http://bigthink.com/jonathanzittrain/the-long-and-silent-subway-ride-of-the-future The Long and Silent Subway Ride of the Future]" | |||
*Read Nancy R. Mansfield, ''[http://www.allbusiness.com/technology/internet-technology/618188-1.html The information revolution and its impact on the employment relationship: an analysis of the cyberspace workplace]'', <span style="font-variant:small-caps">American Business Law Journal</span> (2003). | |||
*Skim the White House [http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf Cyberspace Policy Review] (2009); focus on the introduction/overview and the Near & Mid-Term Action Plans. | |||
'''ASSIGNMENT: Due -- Email Admin with Problem Topic Choice''' | |||
---- | |||
<center> '''Thursday, January 7th''' </center> | |||
'''CLASS''': 11:10am-1:10pm SLS (location TBA) | |||
:Cybersecurity has been identified as one of the greatest threats facing the United States today, but it is ill-defined and almost impossible to address. How can we frame this problem to better inspire solutions? How should government, military, businesses, and internet/tech approach the problem from different angles and do these different approaches work together? | |||
:Introduction to Future of Wikipedia | |||
*5 students will have 4 minutes each to introduce themselves at the beginning of class | |||
''Guests'': | |||
* | |||
''Readings'': | |||
*Listen to David Clark, [http://www.ischool.berkeley.edu/newsandevents/events/sl20090304 The Internets We Did Not Build]. | |||
*Col. Allen & Lt. Col Demchak, ''[http://drop.io/cyberlaw_winter10 The Palestinian-Israeli Cyberwar]'', <span style="font-variant:small-caps">Military Review</span> (2003). | |||
*Kim Zetter, ''[http://www.wired.com/threatlevel/2008/08/revealed-the-in/ Revealed: The Internet's Biggest Security Hole]'', <span style="font-variant:small-caps">Wired</span> (2008). | |||
*Review <span style="font-variant:small-caps">Zittrain, [http://yupnet.org/zittrain/ The Future of the Internet: And How to Stop It]</span>; Chapter 3 | |||
*''[http://www.resourceshelf.com/2009/11/23/wsj-volunteers-log-off-as-wikipedia-ages/ Wikipedia Volunteers Log Off as Wikipedia Ages]'', <span style="font-variant:small-caps">Wall Street Journal</span>. | |||
---- | |||
<center> '''Friday, January 8th''' </center> | |||
'''FIELD TRIP''': eBay office visit (details to follow) | |||
'''CLASS''': 3:00-5:00pm SLS (location TBA) ['''NOTE CLASS TIME'''] | |||
:Wikipedia has grown quickly and rapidly to become one of if not the largest online content-generating collaboration. Following the 2009 Wikimania, Wikimedia has undertaken a self-review, looking at strategies for the future of Wikipedia. Is it a sustainable model? and if so, to what other fields is it applicable? How can its reception in academia be improved? and what are its applications for education? | |||
:Brief introduction of next week's cross-cutting themes | |||
*5 students will have 4 minutes each to introduce themselves at the beginning of class | |||
''Guests'': | |||
''Readings'': | |||
*Review <span style="font-variant:small-caps">Zittrain, [http://yupnet.org/zittrain/ The Future of the Internet: And How to Stop It]</span>; Chapter 5 | |||
*Peruse Wikipedia's [http://strategy.wikimedia.org/wiki/Main_Page Strategy Page] | |||
*Strona, ''[http://prawo.uni.wroc.pl/~kwasnicki/EkonLit6/WikipediaSoul.pdf The Battle for Wikipedia's Soul]'', <span style="font-variant:small-caps">The Economist</span>, March 6, 2008. | |||
*''[http://www.insidehighered.com/news/2007/01/26/wiki A Stand Against Wikipedia?]'', <span style="font-variant:small-caps">Inside Higher Ed</span>, Jan. 26, 2007. | |||
'''CLASS SOCIAL''': Optional, evening, details TBD | |||
---- | |||
<center> '''Saturday, January 9th''' </center> | |||
Tour of San Francisco (Optional); details http://cyber.law.harvard.edu/difficultproblems/edit/SyllabusTBD. To give input and suggestions, visit [[Tour Ideas]]. | |||
==WEEK TWO: CROSS-CUTTING THEMES== | |||
<center> '''Monday, January 11th''' </center> | |||
'''CLASS''': 7:20-9:20pm SLS (location TBA) | |||
:One potential way to address some of the problems addressed in this course is through innovations and technological solutions. Several solutions have changed the way our browsers work and thereby changed the way we interact with the internet, making life better. In what other areas could a similar approach be applied? | |||
:Introduction to cross-cutting theme of privacy, anonymity and liability on the internet | |||
''Guests'': | |||
*John M. Agosta, [http://disputefinder.cs.berkeley.edu/ DisputeFinder] | |||
*Tye Rattenbury, DisputeFinder | |||
*Rob Ennals, DisputeFinder | |||
*Tad Hersch, DisputeFinder | |||
''Readings'': | |||
*Visit [http://www.herdict.org/web/ HerdictWeb] | |||
*Zittrain's [http://www.hyperorg.com/blogger/2009/02/10/berkman-jz-on-herdict/ Comments on Herdict] at a Berkman Center Lunch | |||
*Visit [http://disputefinder.cs.berkeley.edu/ DisputeFinder] (Test it out!) | |||
*Read Introduction to Ann Bartow, ''[http://www.law.harvard.edu/students/orgs/jlg/vol322/383-430.pdf Internet Defamation As Profit Center: The Monetization of Online Harrassment]'', 32 <span style="font-variant:small-caps">Harvard Journal of Law & Gender</span> 383 (2009). | |||
---- | |||
<center> '''Tuesday, January 12th''' </center> | |||
'''WORKSHOP''': 10am-3pm Faculty Lounge, Stanford [http://public.resource.org/law.gov/ law.gov workshop] | |||
Hosted by Carl Malamud | |||
'''CLASS''': 5:15-7:15pm SLS (location TBA) | |||
:Privacy and anonymity can raise significant issues for accountability for online actions. Users often believe they are more anonymous than they truly are online - how can we better educate the public about the reality of privacy online? | |||
''Guests'': | |||
*Mark Chandler, CISCO | |||
*Ryan Calo, SLS Fellow | |||
''Readings'': | |||
*Odia Kagan, ''[http://www.ibls.com/internet_law_news_portal_view.aspx?s=latestnews&id=1915 Fighting Anonymous Defamation],'' <span style="font-variant:small-caps">International Business Law Services</span>, November 26, 2007. | |||
*Consider commercial applications; visit [http://www.reputationdefender.com/ ReputationDefender] | |||
*Read through the Facebook or Google terms of service | |||
---- | |||
<center> '''Wednesday, January 13th''' </center> | |||
'''CLASS''': 6:30-8:30pm SLS (location TBA) | |||
: | |||
---- | |||
<center> '''Thursday, January 14th''' </center> | |||
'''CLASS''': 11:10am-1:10pm SLS (location TBA) | |||
---- | |||
<center> '''Friday, January 15th''' </center> | |||
'''CLASS''': 1:00-3:00pm SLS (location TBA) | |||
: Group Presentation of proposed solution | |||
'''CLASS SOCIAL''': Optional, evening, details TBD | |||
==WEEK THREE: SOLUTIONS== | |||
<center> '''Monday, January 18th''' </center> | |||
'''NO CLASS''': [http://en.wikipedia.org/wiki/Martin_Luther_King,_Jr._Day Martin Luther King, Jr. Day] | |||
---- | |||
<center> '''Tuesday, January 19th''' </center> | |||
'''CLASS''': 5:15-7:15pm SLS (location TBA) | |||
: Group Presentation of proposed solution | |||
---- | |||
<center> '''Wednesday, January 20th''' </center> | |||
'''CLASS''': 6:30-8:30pm SLS (location TBA) | |||
: Group Presentation of proposed solution | |||
---- | |||
<center> '''Thursday, January 21th''' </center> | |||
CLASS: 11:10am-1:10pm SLS (location TBA) | |||
: Group Presentation of proposed solution | |||
WRAP-UP DINNER: 7:20-9:20pm SLS (location TBA) | |||
---- | |||
<center> '''Sunday, January 24th''' </center> | |||
'''FINAL PROJECTS DUE''' |
Revision as of 01:31, 3 December 2009
Welcome to Difficult Problems in Cyberlaw, a January course taught by Professor Jonathan Zittrain and co-hosted by Stanford Law School and Harvard Law School.
If you are a student, please see the Student Responsibilities section and Course Logistics.
The four main difficult problems to be addressed are:
Cross-cutting themes include:
- Due Process on the Internet
- Motivating Good & Bad Actors
- Mass Collaboration
- Privacy and Anonymity on the Internet
WEEK ONE: DEFINING THE PROBLEMS
LUNCH: 12-2pm SLS (location TBA)
- Student introductions
CLASS: 7:20-9:20pm SLS (location TBA)
- A brief overview of the course, it's goals and expectations, including an introduction to the difficult problems and the cross-cutting themes.
- A quiz on Zittrain's book, The Future of the Internet: And How to Stop It will be given.
- Brief introduction to the Global Network Initiative
Readings:
- Read The Future of the Internet: And How to Stop It
- Explore the Global Network Iniative website
- Read GNI Guiding Principles
PANEL:
CLASS: 5:15-7:15pm SLS (location TBA)
- Identify the first-order problems regarding corporate responsibility and free expression on the internet. Examine how GNI attempts to address these problems and then evaluate whether GNI is a success and whether better approaches could be taken.
- Introduction to ubiquitous human computing.
- 5 students will have 4 minutes each to introduce themselves at the beginning of class
Guests:
- Mark Chandler, CISCO
Readings:
- Read the GNI Wiki Primer
- Read Rhys Blakely, Yahoo in second Chinese blog Row, TimesOnline, Feb. 9, 2006.
- Read Colin Maclay, "Protecting Privacy and Expression Online," in Access Controlled (Ronald Diebert et al., eds., MIT Press: Cambridge, MA, 2010).
- Read Jonathan Zittrain, Ubiquitous Human Computing, SSRN Paper No 32/2008 (July 2008).
PANEL:
CLASS: 6:30-8:30pm SLS (location TBA)
- Examine the nature of ubiquitous human computing and potential future applications of human computing and the dangers.
- Introduction to cybersecurity.
- 5 students will have 4 minutes each to introduce themselves at the beginning of class
Guests:
- Lukas Biewald, CrowdFlower
- Bjoern Hartman, see his Mechanical Turk Cats Book
Readings:
- Visit Mechanical Turk, LiveOps, CrowdFlower or other human computing site
- Watch "The Long and Silent Subway Ride of the Future"
- Read Nancy R. Mansfield, The information revolution and its impact on the employment relationship: an analysis of the cyberspace workplace, American Business Law Journal (2003).
- Skim the White House Cyberspace Policy Review (2009); focus on the introduction/overview and the Near & Mid-Term Action Plans.
ASSIGNMENT: Due -- Email Admin with Problem Topic Choice
CLASS: 11:10am-1:10pm SLS (location TBA)
- Cybersecurity has been identified as one of the greatest threats facing the United States today, but it is ill-defined and almost impossible to address. How can we frame this problem to better inspire solutions? How should government, military, businesses, and internet/tech approach the problem from different angles and do these different approaches work together?
- Introduction to Future of Wikipedia
- 5 students will have 4 minutes each to introduce themselves at the beginning of class
Guests:
Readings:
- Listen to David Clark, The Internets We Did Not Build.
- Col. Allen & Lt. Col Demchak, The Palestinian-Israeli Cyberwar, Military Review (2003).
- Kim Zetter, Revealed: The Internet's Biggest Security Hole, Wired (2008).
- Review Zittrain, The Future of the Internet: And How to Stop It; Chapter 3
- Wikipedia Volunteers Log Off as Wikipedia Ages, Wall Street Journal.
FIELD TRIP: eBay office visit (details to follow)
CLASS: 3:00-5:00pm SLS (location TBA) [NOTE CLASS TIME]
- Wikipedia has grown quickly and rapidly to become one of if not the largest online content-generating collaboration. Following the 2009 Wikimania, Wikimedia has undertaken a self-review, looking at strategies for the future of Wikipedia. Is it a sustainable model? and if so, to what other fields is it applicable? How can its reception in academia be improved? and what are its applications for education?
- Brief introduction of next week's cross-cutting themes
- 5 students will have 4 minutes each to introduce themselves at the beginning of class
Guests:
Readings:
- Review Zittrain, The Future of the Internet: And How to Stop It; Chapter 5
- Peruse Wikipedia's Strategy Page
- Strona, The Battle for Wikipedia's Soul, The Economist, March 6, 2008.
- A Stand Against Wikipedia?, Inside Higher Ed, Jan. 26, 2007.
CLASS SOCIAL: Optional, evening, details TBD
Tour of San Francisco (Optional); details http://cyber.law.harvard.edu/difficultproblems/edit/SyllabusTBD. To give input and suggestions, visit Tour Ideas.
WEEK TWO: CROSS-CUTTING THEMES
CLASS: 7:20-9:20pm SLS (location TBA)
- One potential way to address some of the problems addressed in this course is through innovations and technological solutions. Several solutions have changed the way our browsers work and thereby changed the way we interact with the internet, making life better. In what other areas could a similar approach be applied?
- Introduction to cross-cutting theme of privacy, anonymity and liability on the internet
Guests:
- John M. Agosta, DisputeFinder
- Tye Rattenbury, DisputeFinder
- Rob Ennals, DisputeFinder
- Tad Hersch, DisputeFinder
Readings:
- Visit HerdictWeb
- Zittrain's Comments on Herdict at a Berkman Center Lunch
- Visit DisputeFinder (Test it out!)
- Read Introduction to Ann Bartow, Internet Defamation As Profit Center: The Monetization of Online Harrassment, 32 Harvard Journal of Law & Gender 383 (2009).
WORKSHOP: 10am-3pm Faculty Lounge, Stanford law.gov workshop Hosted by Carl Malamud
CLASS: 5:15-7:15pm SLS (location TBA)
- Privacy and anonymity can raise significant issues for accountability for online actions. Users often believe they are more anonymous than they truly are online - how can we better educate the public about the reality of privacy online?
Guests:
- Mark Chandler, CISCO
- Ryan Calo, SLS Fellow
Readings:
- Odia Kagan, Fighting Anonymous Defamation, International Business Law Services, November 26, 2007.
- Consider commercial applications; visit ReputationDefender
- Read through the Facebook or Google terms of service
CLASS: 6:30-8:30pm SLS (location TBA)
CLASS: 11:10am-1:10pm SLS (location TBA)
CLASS: 1:00-3:00pm SLS (location TBA)
- Group Presentation of proposed solution
CLASS SOCIAL: Optional, evening, details TBD
WEEK THREE: SOLUTIONS
NO CLASS: Martin Luther King, Jr. Day
CLASS: 5:15-7:15pm SLS (location TBA)
- Group Presentation of proposed solution
CLASS: 6:30-8:30pm SLS (location TBA)
- Group Presentation of proposed solution
CLASS: 11:10am-1:10pm SLS (location TBA)
- Group Presentation of proposed solution
WRAP-UP DINNER: 7:20-9:20pm SLS (location TBA)
FINAL PROJECTS DUE