<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://cyber.harvard.edu/difficultproblems/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Andrewsegna</id>
	<title>Identifying Difficult Problems in Cyberlaw - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://cyber.harvard.edu/difficultproblems/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Andrewsegna"/>
	<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/difficultproblems/Special:Contributions/Andrewsegna"/>
	<updated>2026-05-24T14:09:33Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.43.6</generator>
	<entry>
		<id>https://cyber.harvard.edu/difficultproblems/?title=CrowdConf_Brainstorm_page&amp;diff=169</id>
		<title>CrowdConf Brainstorm page</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/difficultproblems/?title=CrowdConf_Brainstorm_page&amp;diff=169"/>
		<updated>2010-10-04T01:12:30Z</updated>

		<summary type="html">&lt;p&gt;Andrewsegna: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Use this page to discuss the best practices reading we did not have time for in class, and brainstorm questions and topics that we might present as a class at the CrowdConf Future of Work Conference next week.&lt;br /&gt;
&lt;br /&gt;
Crowdsourcing (Human Computing) is one of the most promising technologies, which has already been  successfully in many different areas (Examples: X-Prize, 99designs, Amazon Mechanical Turk) and we believe has a huge potential for the future. It has the potential to significantly shape and change the way the labor market works. That said, it also creates challenges which need to be addressed. We would love to hear your thoughts on how technology could be leveraged to solve some of these challenges: &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;(1) Preserving Confidentiality in Complex Tasks&#039;&#039;. As the best practices document notes, some tasks require worker exposure to proprietary information. The Best Practices mention contracts as a way of dealing with this issues. Do we think that contractual relationships can assuage companies&#039; fears of workers disclosing propriety information? Does the sheer volume (and potential geographical spread) of workers on a given task make enforcing such an agreement impossible? &lt;br /&gt;
**Is there a way the technology can account for this problem?&lt;br /&gt;
**Could the problem be solved potentially by drafting specific tasks to specific information, the disclosure of which would make the individual who divulged the info identifiable? &lt;br /&gt;
**What are the costs of drafting such complex contracts?&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;(2) Feedback Mechanisms and Dispute Resolution&#039;&#039;. When there is little or no direct contact between employers and employees and when tasks are completed on a one-off basis, it can be tough to encourage fair feedback or to verify a potential worker&#039;s competence in advance. Workers themselves face portability problems; a good rating on Mechanical Turk doesn&#039;t necessarily carry over to other crowdsourcing sites or offline careers. &lt;br /&gt;
**Could the technology facilitate a cyber dispute-resolution forum? (What if the dispute-resolution process was, in turn, crowd-sourced?!). &lt;br /&gt;
**Could the platform have a rating system that suggested a fair rate based on the type of tasks requested? There could be a &amp;quot;survey&amp;quot; that each employer fills out before submitting the task, which would calculate a suggested rate. Perhaps it could be based off of past rates, as tracked by the platform operator? (Does Amazon&#039;s &amp;quot;recommended&amp;quot; technology do this in a different form already?)&lt;br /&gt;
**Is there any way to use technology to prevent abuse of feedback systems, or at least encourage people to use the feedback system in good faith?&lt;br /&gt;
**Have platforms set up features to facilitate the creation of online worker unions? (See SECTION BELOW for more questions on Online Worker Unions)&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;(3) Disclosure&#039;&#039;. The anonymity of cyber-space and the possibility to divide a large project into a a large number of small tasks so that the ultimate product is unidentifiable raises a number of ethical concerns. Have companies, clients and platforms alike, explored setting up or mandating an ethical commission investigating these concerns? What about a voluntary code of conduct created and agreed on by the industry as a quality management system to prevent black sheep from ruining the reputation of the entire industry in case of misconduct and as a preemptive action towards governmental regulation? --&amp;gt; How do you prevent a private-run &amp;quot;Manhattan Project&amp;quot; implemented through crowdsourcing and sold to the highest bidder?&lt;br /&gt;
** (Zara) If project identification is important to the worker, would it help if cloudwork websites rated projects by their degree of macro-transparency and distinguished accordingly in their user interface? The ethical disclosure problem has at least three dimensions: 1) a worker&#039;s subjective discomfort with not knowing the purpose of their HIT; 2) the decision a worker might have made had they been able to make an informed choice; and 3) objective, ethical standards that should prevail in the industry. Although users can already select a HIT based on their assessment of the project, including the degree of information disclosed, organizing HITs by level of transparency could facilitate user choice that selects specifically for this criterion. By creating two portals, or databases of HITS, classified according to levels of transparency, disclosure would be highlighted as a desirable HIT characteristic as to which workers can and should exercise choice. If the database of high-disclosure HITs consistently generated higher quality workers and a reputation for legitimacy, normative pressures could encourage companies to offer more information about a task’s role in a larger project and the corresponding ability to compete in the high-disclosure market.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Follow-Up Questions / Further discussion points&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Online Worker Unions&#039;&#039;. Crowdsourcing&#039;s success is dependent on finding ways to engage its labor pool, whether it be through offering money or gamesque points. However, as mentioned in class and in the best practices document, there are many ways for these laborers to become dissatisfied with their work, whether it be through a lack of transparency, stress, low wages, etc. Is there a potential for a crowdsourcing labor movement in response to these dissatisfactions? As an inherently digital workforce, these individuals&#039; attempts to share discontents and act upon them are facilitated by their familiarity with and access to online communities. However, how far will this unity go? Do you feel that workers will only offer critiques of certain employers to others or could there be the formation of unions and similar entities in the crowdsourcing world?&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Overlap of legal frameworks&#039;&#039;. Some countries have a state pension fund that is financed by a tax deducted from a worker&#039;s salary. How are these legal requirements adhered to in the realm of crowd-sourcing? How is the location/jurisdiction of the worker determined? If the company&#039;s location is chosen, how measures are taken for the worker to have access to that respective legal system?&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Compensation&#039;&#039;. Crowdsourcing appears to rely on monetary compensation, a gamelike points system, or personal gratification to motivate people to participate in these tasks. Which of these compensation forms is the most effective in ensuring a large labor pool and the best results for employers? Which (if any) of these forms will be the most prominent system of compensation in the future and which do you think would be the most ideal compensation structure for crowdsourcing in the future?&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Employment relationship&amp;quot;. Are all cloudworkers to be considered independent contractors? Does this qualification pass the test of current labour laws and tax laws?&lt;br /&gt;
** (Zara) The IRS definition of an employee versus an independent contractor, which tries to codify the common law, seems inapplicable to the cloudworker-employer relationship. &#039;&#039;See&#039;&#039; [http://www.irs.gov/businesses/small/article/0,,id=99921,00.html Independent Contractor (Self-Employed) or Employee?] The page on independent contractors states: &amp;quot;The general rule is that an individual is an independent contractor if you, the person for whom the services are performed, have the right to control or direct only the result of the work and not the means and methods of accomplishing the result.&amp;quot; [http://www.irs.gov/businesses/small/article/0,,id=179115,00.html] As Davis observes in his discussion of scientific research, cloudsourcing problems tend to be idea-based. Applying the common law definition to idea-oriented micro-tasks, which don&#039;t require specialized instrumentalities or complex services, is difficult. It could be argued that requestors control the means and methods of accomplishing the results by virtue of the nature of the task; the task can only be accomplished in readily identifiable ways. But if the &amp;quot;means and method&amp;quot; of accomplishing a result is the process of thinking, then an employer will have a hard time establishing this level of control!&lt;br /&gt;
**In searching the internet I found this interesting blog post (http://behind-the-enemy-lines.blogspot.com/2009/07/is-amazon-mechanical-turk-black-market.html). I do not know if the information provided is accurate, but it raises some interesting questions: how do crowdsourcing platforms respond to the accusation of fostering a black market?&lt;br /&gt;
**Is it appropriate for crowdsourcing platforms to construe a relationship between the worker and the requester? Or should any responsibility be allocated to such platforms?&lt;br /&gt;
** Should the role of the platforms be more active in ensuring fairness of the working conditions and salary?&lt;br /&gt;
** Crowdsourcing platforms have sometimes been depicted as virtual sweatshops. Do platforms feel any pressure from this criticism? Will increasing awareness of this perception in the general public prompt crowdsourcing platforms to adopt more stringent policies for the monitoring of working conditions?&lt;br /&gt;
** Should minimum wages be granted to full-time cloudworkers? Should the maximum working hours be monitored and controlled by the platform? It has been argued that the Fair Labor Standards Act should apply to crowdsourcing platforms (Working For (Virtually) Minimum Wage: Applying the Fair Labor Standards Act In Cyberspace; 60 Ala. L. Rev. 1077). What is the platforms&#039; response to this?&lt;br /&gt;
** How crowdsourcing platforms address the issue of labour conditions in developing countries? Is the age of the cloudworker actually checked in order to avoid children labour exploitation? Should it be? And how?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Mobile Online Devices&#039;&#039;. Mobile and closed platforms with constant connection to the Internet have been supplanting sedentary workplaces in popularity.. How has crowdsourcing taken advantage of this change or has it struggled to do so? What advantages/challenges do these mobile devices offer workers, employees, and crowdsourcing agencies?&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Recommendation System / Performance Tracking&#039;&#039;. It seems like sharing information about workers as suggested in the Best Practices document is a bit invasive for my taste, and perhaps something would have to be written into workers&#039; contracts to explicitly allow this type of information sharing? (I&#039;m not exactly what sure this law would implicate, but I seem to remember that when a potential employer calls a jobseeker&#039;s former employers, the employers can only share information that the person worked there, but can&#039;t reveal performance evaluations, etc.) Perhaps it&#039;s just me, but I&#039;d feel more comfortable if companies enabled performance-tracking software, but didn&#039;t go so far as to share it with all other similar companies. (Question from Jenny)&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Encryption?&#039;&#039; In some cases, the employer might want to protect the large picture of the project from workers while still makes each piece of task workable. For example, a writer might want his article to be shortened or proofread, but not necessarily want the workers to get the idea of the article before it gets published. How to make sure that they would not be able to do so (by e.g. divide the project into extremely small pieces, or, cut off possible communications among co-workers)?&lt;br /&gt;
** Secrecy in projects, however, also implicates the downsides with making discrete jobs that cover up the underlining project purpose. The Best Practices discussed some of these with micro-tasks (e.g. moral qualms with the project and lower quality of performance).  Also, the employees will be isolated by such secret tasks since they will both lack a physical place to work with other employees and be cut off from discussing it in crowdsourcing chat rooms. One thing then to think about then is how do you balance those two objectives to get the best overall outcome for a specific project (thinking about desired secrecy and worker performance/satisfaction almost as two axes on a graph)?  Again, as mentioned above, would developing contractual relationships to deal with this suffice?&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Quality control.&#039;&#039; As the demonstration showed last week, the author still needs to use his own judgment to eliminate many inappropriate revisions suggested by the crowd. Is it possible to develop certain methods to have different pools of people to whom different projects can be assigned? Without collecting too much private information, we can use demographic standards to differentiate the crowd (age, sex, education, etc). Then the quality of collaborative product can be raised and author’s final intervention can also be reduced.&lt;br /&gt;
** In thinking about pulling from different pools of crowdsourcing employees, I’d be curious to ask about employee information verification. Basically, when recruiting crowdsourcing employees, especially when seeking out a certain educational background, how difficult is it to verify that they in fact have that background? Is misrepresentation of that kind of information more prevalent in the crowdsourcing context since it is largely faceless without personal interaction to help catch people in a lie? If so, would it be (or has it been shown to be) helped by the improved work environment ideas discussed in the Best Practices, such as chat rooms for employees that simulate a virtual water cooler? &lt;br /&gt;
&lt;br /&gt;
(Sorry, forgot to log in, this is Erin) OK so to keep in mind what our goal is — we&#039;re supposed to put together some sort of agenda to talk about with the people who think about this day-in and day-out, and we have about half an hour?  So it seems like we should try to focus in on a particularly compelling angle.  The list above is good but can we prioritize?  I really liked the point made in class last week that pointed out that if we can identify some sort of way for interesting technology to &amp;quot;fix&amp;quot; the &amp;quot;problems&amp;quot; that we see arising out of crowdsourcing, we&#039;ll have a much more receptive audience.  Nothing jumps out at me from any particular section of the Best Practices document, but if we combine some of it maybe we can come up with something interesting?&lt;br /&gt;
* Maybe combining some of the aspects of portability and reviews with the identity movement more generally would be interesting?&lt;br /&gt;
* Frankly a lot of the best practices aren&#039;t super interesting in terms of the required technology — is there some other way to get them excited about a particular angle on something?&lt;br /&gt;
* Is there a way to frame a problem that we&#039;re particularly concerned about that will speak to them?  Don&#039;t mean to make this an &amp;quot;us-against-them&amp;quot; thing — but the way that technologists think about technology is a little different from the way that lawyers do, so we want to be able to frame the issue in a way that will resonate with the audience...&lt;br /&gt;
**What about praising the technology (maybe have a few specific examples), but then asking them if they&#039;ve met any resistance from, or thought about, any of the potential actors who may block or alter the technology&#039;s use? Have you (the technologist) talked with local/state/federal government? Have you discussed potential roadblocks with companies that will implement the technology?&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Crowdsourcing Science&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Jenny here: I&#039;ve been reading some blog posts on crowdsourcing, and one comment from a scientist (found in the comments section here: http://money.usnews.com/money/blogs/outside-voices-small-business/2009/01/27/using-social-media-and-crowd-sourcing-for-quick-and-simple-market-research ) got me thinking that scientific research and development could suffer if companies move from hiring a dedicated team of scientists to farming all of their scientific problems out to a crowdsourcing lottery payment system (ie, first one to do this gets all of this money; the others get nothing). Honestly, worst case scenario, we&#039;d have even fewer people going into sophisticated scientific fields than we do now, because there wouldn&#039;t be any guarantee of a stable living, and I wonder if this could really hinder the development of solutions to scientific problems or if it would limit the scientific fields to scientists who are business-savvy enough to be connected to venture capitalists, etc. Either way, the outcome could be scary. &lt;br /&gt;
&lt;br /&gt;
I&#039;d be interested to hear from crowdsourcing experts about how they think crowdsourcing scientific problems affects the quality of scientific research, and if there could be any safeguards implemented to prevent the aforementioned problems from occurring (ie -- could the crowdsourcing community fund a dedicated pool of scientists, with extra prizes going to those who successfully complete R&amp;amp;D tasks, or would this go against the very core of the crowdsourcing movement?)&lt;br /&gt;
&lt;br /&gt;
*(Heather): I&#039;m not sure this is a novel problem in the crowdsourcing context. I&#039;ve never worked in a lab or been involved in research, but this concern about stable living and a consistent funding source seems to be pretty common (at least in the academic context, where it seems like a lot of time and energy is spent chasing down grants and competing for funding). Obviously the decentralization of oDesk and similar websites exacerbates the problem by breaking down competition into individual tasks and individual workers instead of across entire projects or teams, but it doesn&#039;t seem to me to create an entirely new economic incentive structure. Then again, I&#039;m not an expert on this and we&#039;ll be talking to people who are. &lt;br /&gt;
&lt;br /&gt;
*(Davis): I question whether crowdsourcing has the potential to displace much scientific research.  Most commercially viable research projects (such as pharmaceuticals) require significant capital investments in sophisticated experimental equipment, or access to tightly regulated materials (such as dangerous chemicals or radioactive sources).  There is simply no way to crowdsource around the need for a spectrometer or a chromatograph.  &#039;&#039;&#039;The types of scientific problems that are readily solved through crowdsourcing will tend to be idea-based&#039;&#039;&#039; (rather than experiment-based), and correct solutions must be easily verifiable.  These criteria alone suffice to tightly restrict the class of problems that are amenable to solution through, say, Innocentive.  Moreover, companies will need to employ scientific experts simply to know what questions to ask (and how to divide larger problems into smaller ones), and so a significant amount of centralization will still be necessary even with distributable projects.&lt;br /&gt;
&lt;br /&gt;
**And of course much scientific research is basic research, and therefore not (immediately) commercially viable.  Thus we&#039;re unlikely to see a large category of research go the way of Innocentive.  Something like the Large Hadron Collider is the very antithesis of crowdsourcing; such large collaborative projects seem to be the direction physics research will be headed for some time to come.  The same will probably become true for other scientific fields as they mature.&lt;br /&gt;
&lt;br /&gt;
**(As a side note, I also feel the need to add that the concern we often hear about having an insufficient number of people pursuing the hard sciences is overblown.  In most fields, there simply aren&#039;t enough jobs out there to absorb the quantity of science PhDs we produce.)&lt;br /&gt;
&lt;br /&gt;
*(Rachel): As an offshoot of what Davis said, I&#039;m curious as to whether we can discern general principles of when crowdsourcing is or is not viable -- not so much in terms of Rene&#039;s question about public acceptance of crowdsourcing, but rather in terms of when it can actually be done or not, as in Davis&#039; Large Hadron Collider example. Or what about litigation? Doc review is being outsourced more and more to contract lawyers working as independent contractors, both within the U.S. and abroad, so that seems like fair game for crowdsourcing (assuming we can get &#039;specialized&#039; crowds), but it does not seem like the same could be said for actual trial or appellate practice in court. Is it merely a question of skill and experience? Given projects like Innocentive, where scientific issues requiring a lot of skill and experience are crowdsourced, that does not seem to be the case, and yet what is it about things like Large Hadron Colliders and trials that appear to be resistant to crowdsourcing?&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Case Study: oDesk&#039;&#039;&#039; (Rene)&lt;br /&gt;
&lt;br /&gt;
* I have used oDesk a lot of times over the summer to outsource smaller programming projects for my startup to developers, mainly in India and Southeast Asia. For those who haven&#039;t used oDesk, you post a job with a budget, oDesk workers apply for the job, you can interview them and then hire one; a small portion of the overall payment might be upfront, the rest is paid at completion of the project at discretion of the employer. oDesk has standard terms (NDA, etc.) to facilitate the transactions, but I have asked the developers I hired to sign additional documentation. The biggest issue is quality control; despite the fact that there is a rating system, it is quite difficult to evaluate whether someone is able to get a certain job done or not. I really like Jenny&#039;s question around recommendation systems / quality control as and extension of point (2) above and would like to hear what technologist have in mind to address this important challenge.&lt;br /&gt;
&lt;br /&gt;
I would like to hear a &#039;&#039;&#039;discussion about the general public&#039;s acceptance of crowdsourcing&#039;&#039;&#039;. As mentioned in class, our knowledge and opinions of crowdsourcing is very much a minority viewpoint. Although to us it presents a really novel and theoretically interesting development, I imagine different entities (investors, crowdsourcing employees, workers outside of the field) would view this new practice through the lens of their own interests. I would like to hear these crowdsourcing leaders discuss their interactions with these groups, either through an open question or a directed one.&lt;br /&gt;
* Can a parallel be made to outsourcing? When jobs are outsourced, domestic workers feel outrage and a sense that they are being cheated or dealt with unfairly. One can imagine a similar response on a micro-level to crowdsourcing, where formerly dedicated employees are let go in favor of crowdsourcing, but employers are happy because it is more economically efficient. &lt;br /&gt;
*If people have made parallels to outsourcing, is that even a fair parallel to make? One can certainly make an argument that the small tasks being accomplished by 100s of people are not necessarily displacing jobs on a 1 to 1 level. Also, these jobs are not disappearing from the United States entirely. If your job has been replaced by crowdsourcing, you could just become one of the crowd at that point and do tasks for a wider array of companies. Are claims of outsourcing just knee jerk reactions to something that actually has the potential to offer the same amount or more opportunities for workers?&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Lessig Framework&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
What if we approach the best practices document with a view to Lessig&#039;s four modes of regulation, and frame our discussion of crowdsourcing in terms of which combination of modes could best achieve the desired outcomes?  For example, assume a crowdsourcing application that has an architecture in place forcing disclosure pursuant to the best practices model.  With such a system in place, norms may then provide the best solution to the fairness problem: workers would share information about employers who are known to violate users&#039; sense of fairness in worker forums, and discourage others from doing the work.  Or workers could &amp;quot;strike&amp;quot; by making a concerted effort to accept all that employer&#039;s tasks and intentionally perform poorly, thereby obstructing completion of the disfavored company&#039;s assignments (sort of like 4Chan meets Mechanical Turk).&lt;br /&gt;
&lt;br /&gt;
On a related question, could a crowdsourcing approach solve any of the crowdsourcing best practices problems?  For example, is there a way to implement a feedback and monitoring system whereby the quality of a submission is judged by crowd workers?&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Mobile Online Devices&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This probably won&#039;t appeal to the tech crowd as much, but I&#039;m interested in how we will deal with the mobile devices problem mentioned above.  If you&#039;re working from your phone, which jurisdiction&#039;s labor laws apply?  Is it the state where your phone was issued, the state where you live, or the state where you&#039;re using the device?  &lt;br /&gt;
*How can companies protect themselves when they want crowdsourcing work done, but want to avoid certain states?&lt;br /&gt;
**i.e. if I want to avoid CA labor laws, I can block CA IP addresses, but that wouldn&#039;t necessarily prevent me from taking my TX iPhone and working for a crowdsourcing company when I&#039;m in CA.&lt;br /&gt;
*What about international workers?&lt;br /&gt;
*Should we use architecture by forcing workers to log in through a mobile application that requires assent to certain terms (i.e. I&#039;m not working in CA)?&lt;/div&gt;</summary>
		<author><name>Andrewsegna</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/difficultproblems/?title=CrowdConf_Brainstorm_page&amp;diff=145</id>
		<title>CrowdConf Brainstorm page</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/difficultproblems/?title=CrowdConf_Brainstorm_page&amp;diff=145"/>
		<updated>2010-10-03T00:33:00Z</updated>

		<summary type="html">&lt;p&gt;Andrewsegna: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Use this page to discuss the best practices reading we did not have time for in class, and brainstorm questions and topics that we might present as a class at the CrowdConf Future of Work Conference next week.&lt;br /&gt;
&lt;br /&gt;
Crowdsourcing (Human Computing) is one of the most promising technologies, which has already been  successfully in many different areas (Examples: X-Prize, 99designs, Amazon Mechanical Turk) and we believe has a huge potential for the future. It has the potential to significantly shape and change the way the labor market works. That said, it also creates challenges which need to be addressed. We would love to hear your thoughts on how technology could be leveraged to solve some of these challenges: &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;(1) Preserving Confidentiality in Complex Tasks&#039;&#039;. As the best practices document notes, some tasks require worker exposure to proprietary information. The Best Practices mention contracts as a way of dealing with this issues. Do we think that contractual relationships can assuage companies&#039; fears of workers disclosing propriety information? Does the sheer volume (and potential geographical spread) of workers on a given task make enforcing such an agreement impossible? &lt;br /&gt;
**Is there a way the technology can account for this problem?&lt;br /&gt;
**Could the problem be solved potentially by drafting specific tasks to specific information, the disclosure of which would make the individual who divulged the info identifiable? &lt;br /&gt;
**What are the costs of drafting such complex contracts?&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;(2) Feedback Mechanisms and Dispute Resolution&#039;&#039;. When there is little or no direct contact between employers and employees and when tasks are completed on a one-off basis, it can be tough to encourage fair feedback or to verify a potential worker&#039;s competence in advance. Workers themselves face portability problems; a good rating on Mechanical Turk doesn&#039;t necessarily carry over to other crowdsourcing sites or offline careers. &lt;br /&gt;
**Could the technology facilitate a cyber dispute-resolution forum? (What if the dispute-resolution process was, in turn, crowd-sourced?!). &lt;br /&gt;
**Could the platform have a rating system that suggested a fair rate based on the type of tasks requested? There could be a &amp;quot;survey&amp;quot; that each employer fills out before submitting the task, which would calculate a suggested rate. Perhaps it could be based off of past rates, as tracked by the platform operator? (Does Amazon&#039;s &amp;quot;recommended&amp;quot; technology do this in a different form already?)&lt;br /&gt;
**Is there any way to use technology to prevent abuse of feedback systems, or at least encourage people to use the feedback system in good faith?&lt;br /&gt;
**Have platforms set up features to facilitate the creation of online worker unions? (See SECTION BELOW for more questions on Online Worker Unions)&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;(3) Disclosure&#039;&#039;. The anonymity of cyber-space and the possibility to divide a large project into a a large number of small tasks so that the ultimate product is unidentifiable raises a number of ethical concerns. Have companies, clients and platforms alike, explored setting up or mandating an ethical commission investigating these concerns? What about a voluntary code of conduct created and agreed on by the industry as a quality management system to prevent black sheep from ruining the reputation of the entire industry in case of misconduct and as a preemptive action towards governmental regulation? --&amp;gt; How do you prevent a private-run &amp;quot;Manhattan Project&amp;quot; implemented through crowdsourcing and sold to the highest bidder?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Follow-Up Questions / Further discussion points&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Online Worker Unions&#039;&#039;. Crowdsourcing&#039;s success is dependent on finding ways to engage its labor pool, whether it be through offering money or gamesque points. However, as mentioned in class and in the best practices document, there are many ways for these laborers to become dissatisfied with their work, whether it be through a lack of transparency, stress, low wages, etc. Is there a potential for a crowdsourcing labor movement in response to these dissatisfactions? As an inherently digital workforce, these individuals&#039; attempts to share discontents and act upon them are facilitated by their familiarity with and access to online communities. However, how far will this unity go? Do you feel that workers will only offer critiques of certain employers to others or could there be the formation of unions and similar entities in the crowdsourcing world?&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Overlap of legal frameworks&#039;&#039;. Some countries have a state pension fund that is financed by a tax deducted from a worker&#039;s salary. How are these legal requirements adhered to in the realm of crowd-sourcing? How is the location/jurisdiction of the worker determined? If the company&#039;s location is chosen, how measures are taken for the worker to have access to that respective legal system?&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Compensation&#039;&#039;. Crowdsourcing appears to rely on monetary compensation, a gamelike points system, or personal gratification to motivate people to participate in these tasks. Which of these compensation forms is the most effective in ensuring a large labor pool and the best results for employers? Which (if any) of these forms will be the most prominent system of compensation in the future and which do you think would be the most ideal compensation structure for crowdsourcing in the future?&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Mobile Online Devices&#039;&#039;. Mobile and closed platforms with constant connection to the Internet have been supplanting sedentary workplaces in popularity.. How has crowdsourcing taken advantage of this change or has it struggled to do so? What advantages/challenges do these mobile devices offer workers, employees, and crowdsourcing agencies?&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Recommendation System / Performance Tracking&#039;&#039;. It seems like sharing information about workers as suggested in the Best Practices document is a bit invasive for my taste, and perhaps something would have to be written into workers&#039; contracts to explicitly allow this type of information sharing? (I&#039;m not exactly what sure this law would implicate, but I seem to remember that when a potential employer calls a jobseeker&#039;s former employers, the employers can only share information that the person worked there, but can&#039;t reveal performance evaluations, etc.) Perhaps it&#039;s just me, but I&#039;d feel more comfortable if companies enabled performance-tracking software, but didn&#039;t go so far as to share it with all other similar companies. (Question from Jenny)&lt;br /&gt;
&lt;br /&gt;
(Sorry, forgot to log in, this is Erin) OK so to keep in mind what our goal is — we&#039;re supposed to put together some sort of agenda to talk about with the people who think about this day-in and day-out, and we have about half an hour?  So it seems like we should try to focus in on a particularly compelling angle.  The list above is good but can we prioritize?  I really liked the point made in class last week that pointed out that if we can identify some sort of way for interesting technology to &amp;quot;fix&amp;quot; the &amp;quot;problems&amp;quot; that we see arising out of crowdsourcing, we&#039;ll have a much more receptive audience.  Nothing jumps out at me from any particular section of the Best Practices document, but if we combine some of it maybe we can come up with something interesting?&lt;br /&gt;
* Maybe combining some of the aspects of portability and reviews with the identity movement more generally would be interesting?&lt;br /&gt;
* Frankly a lot of the best practices aren&#039;t super interesting in terms of the required technology — is there some other way to get them excited about a particular angle on something?&lt;br /&gt;
* Is there a way to frame a problem that we&#039;re particularly concerned about that will speak to them?  Don&#039;t mean to make this an &amp;quot;us-against-them&amp;quot; thing — but the way that technologists think about technology is a little different from the way that lawyers do, so we want to be able to frame the issue in a way that will resonate with the audience...&lt;br /&gt;
**What about praising the technology (maybe have a few specific examples), but then asking them if they&#039;ve met any resistance from, or thought about, any of the potential actors who may block or alter the technology&#039;s use? Have you (the technologist) talked with local/state/federal government? Have you discussed potential roadblocks with companies that will implement the technology?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Jenny here: I&#039;ve been reading some blog posts on crowdsourcing, and one comment from a scientist (found in the comments section here: http://money.usnews.com/money/blogs/outside-voices-small-business/2009/01/27/using-social-media-and-crowd-sourcing-for-quick-and-simple-market-research ) got me thinking that scientific research and development could suffer if companies move from hiring a dedicated team of scientists to farming all of their scientific problems out to a crowdsourcing lottery payment system (ie, first one to do this gets all of this money; the others get nothing). Honestly, worst case scenario, we&#039;d have even fewer people going into sophisticated scientific fields than we do now, because there wouldn&#039;t be any guarantee of a stable living, and I wonder if this could really hinder the development of solutions to scientific problems or if it would limit the scientific fields to scientists who are business-savvy enough to be connected to venture capitalists, etc. Either way, the outcome could be scary. &lt;br /&gt;
&lt;br /&gt;
I&#039;d be interested to hear from crowdsourcing experts about how they think crowdsourcing scientific problems affects the quality of scientific research, and if there could be any safeguards implemented to prevent the aforementioned problems from occurring (ie -- could the crowdsourcing community fund a dedicated pool of scientists, with extra prizes going to those who successfully complete R&amp;amp;D tasks, or would this go against the very core of the crowdsourcing movement?)&lt;br /&gt;
&lt;br /&gt;
(Heather): I&#039;m not sure this is a novel problem in the crowdsourcing context. I&#039;ve never worked in a lab or been involved in research, but this concern about stable living and a consistent funding source seems to be pretty common (at least in the academic context, where it seems like a lot of time and energy is spent chasing down grants and competing for funding). Obviously the decentralization of oDesk and similar websites exacerbates the problem by breaking down competition into individual tasks and individual workers instead of across entire projects or teams, but it doesn&#039;t seem to me to create an entirely new economic incentive structure. Then again, I&#039;m not an expert on this and we&#039;ll be talking to people who are. &lt;br /&gt;
&lt;br /&gt;
Case Study: oDesk (Rene)&lt;br /&gt;
* I have used oDesk a lot of times over the summer to outsource smaller programming projects for my startup to developers, mainly in India and Southeast Asia. For those who haven&#039;t used oDesk, you post a job with a budget, oDesk workers apply for the job, you can interview them and then hire one; a small portion of the overall payment might be upfront, the rest is paid at completion of the project at discretion of the employer. oDesk has standard terms (NDA, etc.) to facilitate the transactions, but I have asked the developers I hired to sign additional documentation. The biggest issue is quality control; despite the fact that there is a rating system, it is quite difficult to evaluate whether someone is able to get a certain job done or not. I really like Jenny&#039;s question around recommendation systems / quality control as and extension of point (2) above and would like to hear what technologist have in mind to address this important challenge.&lt;br /&gt;
&lt;br /&gt;
I would like to hear a discussion about the general public&#039;s acceptance of crowdsourcing. As mentioned in class, our knowledge and opinions of crowdsourcing is very much a minority viewpoint. Although to us it presents a really novel and theoretically interesting development, I imagine different entities (investors, crowdsourcing employees, workers outside of the field) would view this new practice through the lens of their own interests. I would like to hear these crowdsourcing leaders discuss their interactions with these groups, either through an open question or a directed one.&lt;/div&gt;</summary>
		<author><name>Andrewsegna</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/difficultproblems/?title=CrowdConf_Brainstorm_page&amp;diff=144</id>
		<title>CrowdConf Brainstorm page</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/difficultproblems/?title=CrowdConf_Brainstorm_page&amp;diff=144"/>
		<updated>2010-10-03T00:32:41Z</updated>

		<summary type="html">&lt;p&gt;Andrewsegna: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Use this page to discuss the best practices reading we did not have time for in class, and brainstorm questions and topics that we might present as a class at the CrowdConf Future of Work Conference next week.&lt;br /&gt;
&lt;br /&gt;
Crowdsourcing (Human Computing) is one of the most promising technologies, which has already been  successfully in many different areas (Examples: X-Prize, 99designs, Amazon Mechanical Turk) and we believe has a huge potential for the future. It has the potential to significantly shape and change the way the labor market works. That said, it also creates challenges which need to be addressed. We would love to hear your thoughts on how technology could be leveraged to solve some of these challenges: &lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;(1) Preserving Confidentiality in Complex Tasks&#039;&#039;. As the best practices document notes, some tasks require worker exposure to proprietary information. The Best Practices mention contracts as a way of dealing with this issues. Do we think that contractual relationships can assuage companies&#039; fears of workers disclosing propriety information? Does the sheer volume (and potential geographical spread) of workers on a given task make enforcing such an agreement impossible? &lt;br /&gt;
**Is there a way the technology can account for this problem?&lt;br /&gt;
**Could the problem be solved potentially by drafting specific tasks to specific information, the disclosure of which would make the individual who divulged the info identifiable? &lt;br /&gt;
**What are the costs of drafting such complex contracts?&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;(2) Feedback Mechanisms and Dispute Resolution&#039;&#039;. When there is little or no direct contact between employers and employees and when tasks are completed on a one-off basis, it can be tough to encourage fair feedback or to verify a potential worker&#039;s competence in advance. Workers themselves face portability problems; a good rating on Mechanical Turk doesn&#039;t necessarily carry over to other crowdsourcing sites or offline careers. &lt;br /&gt;
**Could the technology facilitate a cyber dispute-resolution forum? (What if the dispute-resolution process was, in turn, crowd-sourced?!). &lt;br /&gt;
**Could the platform have a rating system that suggested a fair rate based on the type of tasks requested? There could be a &amp;quot;survey&amp;quot; that each employer fills out before submitting the task, which would calculate a suggested rate. Perhaps it could be based off of past rates, as tracked by the platform operator? (Does Amazon&#039;s &amp;quot;recommended&amp;quot; technology do this in a different form already?)&lt;br /&gt;
**Is there any way to use technology to prevent abuse of feedback systems, or at least encourage people to use the feedback system in good faith?&lt;br /&gt;
**Have platforms set up features to facilitate the creation of online worker unions? (See SECTION BELOW for more questions on Online Worker Unions)&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;(3) Disclosure&#039;&#039;. The anonymity of cyber-space and the possibility to divide a large project into a a large number of small tasks so that the ultimate product is unidentifiable raises a number of ethical concerns. Have companies, clients and platforms alike, explored setting up or mandating an ethical commission investigating these concerns? What about a voluntary code of conduct created and agreed on by the industry as a quality management system to prevent black sheep from ruining the reputation of the entire industry in case of misconduct and as a preemptive action towards governmental regulation? --&amp;gt; How do you prevent a private-run &amp;quot;Manhattan Project&amp;quot; implemented through crowdsourcing and sold to the highest bidder?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Follow-Up Questions / Further discussion points&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Online Worker Unions&#039;&#039;. Crowdsourcing&#039;s success is dependent on finding ways to engage its labor pool, whether it be through offering money or gamesque points. However, as mentioned in class and in the best practices document, there are many ways for these laborers to become dissatisfied with their work, whether it be through a lack of transparency, stress, low wages, etc. Is there a potential for a crowdsourcing labor movement in response to these dissatisfactions? As an inherently digital workforce, these individuals&#039; attempts to share discontents and act upon them are facilitated by their familiarity with and access to online communities. However, how far will this unity go? Do you feel that workers will only offer critiques of certain employers to others or could there be the formation of unions and similar entities in the crowdsourcing world?&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Overlap of legal frameworks&#039;&#039;. Some countries have a state pension fund that is financed by a tax deducted from a worker&#039;s salary. How are these legal requirements adhered to in the realm of crowd-sourcing? How is the location/jurisdiction of the worker determined? If the company&#039;s location is chosen, how measures are taken for the worker to have access to that respective legal system?&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Compensation&#039;&#039;. Crowdsourcing appears to rely on monetary compensation, a gamelike points system, or personal gratification to motivate people to participate in these tasks. Which of these compensation forms is the most effective in ensuring a large labor pool and the best results for employers? Which (if any) of these forms will be the most prominent system of compensation in the future and which do you think would be the most ideal compensation structure for crowdsourcing in the future?&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Mobile Online Devices&#039;&#039;. Mobile and closed platforms with constant connection to the Internet have been supplanting sedentary workplaces in popularity.. How has crowdsourcing taken advantage of this change or has it struggled to do so? What advantages/challenges do these mobile devices offer workers, employees, and crowdsourcing agencies?&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Recommendation System / Performance Tracking&#039;&#039;. It seems like sharing information about workers as suggested in the Best Practices document is a bit invasive for my taste, and perhaps something would have to be written into workers&#039; contracts to explicitly allow this type of information sharing? (I&#039;m not exactly what sure this law would implicate, but I seem to remember that when a potential employer calls a jobseeker&#039;s former employers, the employers can only share information that the person worked there, but can&#039;t reveal performance evaluations, etc.) Perhaps it&#039;s just me, but I&#039;d feel more comfortable if companies enabled performance-tracking software, but didn&#039;t go so far as to share it with all other similar companies. (Question from Jenny)&lt;br /&gt;
&lt;br /&gt;
(Sorry, forgot to log in, this is Erin) OK so to keep in mind what our goal is — we&#039;re supposed to put together some sort of agenda to talk about with the people who think about this day-in and day-out, and we have about half an hour?  So it seems like we should try to focus in on a particularly compelling angle.  The list above is good but can we prioritize?  I really liked the point made in class last week that pointed out that if we can identify some sort of way for interesting technology to &amp;quot;fix&amp;quot; the &amp;quot;problems&amp;quot; that we see arising out of crowdsourcing, we&#039;ll have a much more receptive audience.  Nothing jumps out at me from any particular section of the Best Practices document, but if we combine some of it maybe we can come up with something interesting?&lt;br /&gt;
* Maybe combining some of the aspects of portability and reviews with the identity movement more generally would be interesting?&lt;br /&gt;
* Frankly a lot of the best practices aren&#039;t super interesting in terms of the required technology — is there some other way to get them excited about a particular angle on something?&lt;br /&gt;
* Is there a way to frame a problem that we&#039;re particularly concerned about that will speak to them?  Don&#039;t mean to make this an &amp;quot;us-against-them&amp;quot; thing — but the way that technologists think about technology is a little different from the way that lawyers do, so we want to be able to frame the issue in a way that will resonate with the audience...&lt;br /&gt;
**What about praising the technology (maybe have a few specific examples), but then asking them if they&#039;ve met any resistance from, or thought about, any of the potential actors who may block or alter the technology&#039;s use? Have you (the technologist) talked with local/state/federal government? Have you discussed potential roadblocks with companies that will implement the technology?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Jenny here: I&#039;ve been reading some blog posts on crowdsourcing, and one comment from a scientist (found in the comments section here: http://money.usnews.com/money/blogs/outside-voices-small-business/2009/01/27/using-social-media-and-crowd-sourcing-for-quick-and-simple-market-research ) got me thinking that scientific research and development could suffer if companies move from hiring a dedicated team of scientists to farming all of their scientific problems out to a crowdsourcing lottery payment system (ie, first one to do this gets all of this money; the others get nothing). Honestly, worst case scenario, we&#039;d have even fewer people going into sophisticated scientific fields than we do now, because there wouldn&#039;t be any guarantee of a stable living, and I wonder if this could really hinder the development of solutions to scientific problems or if it would limit the scientific fields to scientists who are business-savvy enough to be connected to venture capitalists, etc. Either way, the outcome could be scary. &lt;br /&gt;
&lt;br /&gt;
I&#039;d be interested to hear from crowdsourcing experts about how they think crowdsourcing scientific problems affects the quality of scientific research, and if there could be any safeguards implemented to prevent the aforementioned problems from occurring (ie -- could the crowdsourcing community fund a dedicated pool of scientists, with extra prizes going to those who successfully complete R&amp;amp;D tasks, or would this go against the very core of the crowdsourcing movement?)&lt;br /&gt;
&lt;br /&gt;
(Heather): I&#039;m not sure this is a novel problem in the crowdsourcing context. I&#039;ve never worked in a lab or been involved in research, but this concern about stable living and a consistent funding source seems to be pretty common (at least in the academic context, where it seems like a lot of time and energy is spent chasing down grants and competing for funding). Obviously the decentralization of oDesk and similar websites exacerbates the problem by breaking down competition into individual tasks and individual workers instead of across entire projects or teams, but it doesn&#039;t seem to me to create an entirely new economic incentive structure. Then again, I&#039;m not an expert on this and we&#039;ll be talking to people who are. &lt;br /&gt;
&lt;br /&gt;
Case Study: oDesk (Rene)&lt;br /&gt;
* I have used oDesk a lot of times over the summer to outsource smaller programming projects for my startup to developers, mainly in India and Southeast Asia. For those who haven&#039;t used oDesk, you post a job with a budget, oDesk workers apply for the job, you can interview them and then hire one; a small portion of the overall payment might be upfront, the rest is paid at completion of the project at discretion of the employer. oDesk has standard terms (NDA, etc.) to facilitate the transactions, but I have asked the developers I hired to sign additional documentation. The biggest issue is quality control; despite the fact that there is a rating system, it is quite difficult to evaluate whether someone is able to get a certain job done or not. I really like Jenny&#039;s question around recommendation systems / quality control as and extension of point (2) above and would like to hear what technologist have in mind to address this important challenge.&lt;br /&gt;
&lt;br /&gt;
*I would like to hear a discussion about the general public&#039;s acceptance of crowdsourcing. As mentioned in class, our knowledge and opinions of crowdsourcing is very much a minority viewpoint. Although to us it presents a really novel and theoretically interesting development, I imagine different entities (investors, crowdsourcing employees, workers outside of the field) would view this new practice through the lens of their own interests. I would like to hear these crowdsourcing leaders discuss their interactions with these groups, either through an open question or a directed one.&lt;/div&gt;</summary>
		<author><name>Andrewsegna</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/difficultproblems/?title=CrowdConf_Brainstorm_page&amp;diff=132</id>
		<title>CrowdConf Brainstorm page</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/difficultproblems/?title=CrowdConf_Brainstorm_page&amp;diff=132"/>
		<updated>2010-10-01T03:27:52Z</updated>

		<summary type="html">&lt;p&gt;Andrewsegna: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Use this page to discuss the best practices reading we did not have time for in class, and brainstorm questions and topics that we might present as a class at the CrowdConf Future of Work Conference next week.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Preserving Confidentiality in Complex Tasks&#039;&#039;. As the best practices document notes, some tasks require worker exposure to proprietary information. The Best Practices mention contracts as a way of dealing with this issues. Do we think that contractual relationships can assuage companies&#039; fears of workers disclosing propriety information? Does the sheer volume of workers on a given task make enforcing such an agreement impossible? &lt;br /&gt;
**Could the problem be solved potentially by drafting specific tasks to specific information, the disclosure of which would make the individual who divulged the info identifiable? &lt;br /&gt;
**What are the costs of drafting such complex contracts?&lt;br /&gt;
**Is there a way the technology can account for this problem?&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Worker Fairness&#039;&#039;. The Best Practices document suggests that the crowd-sourcing platform should facilitate easy payment and provide a forum for dispute resolution.&lt;br /&gt;
**Could the platform have a rating system that suggested a fair rate based on the type of tasks requested? There could be a &amp;quot;survey&amp;quot; that each employer fills out before submitting the task, which would calculate a suggested rate. Perhaps it could be based off of past rates, as tracked by the platform operator? (Does Amazon&#039;s &amp;quot;recommended&amp;quot; technology do this in a different form already?)&lt;br /&gt;
**Could the technology facilitate a cyber dispute-resolution forum? (What if the dispute-resolution process was, in turn, crowd-sourced?!)&lt;br /&gt;
**Have platforms set up features to facilitate the creation of online worker unions?&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Feedback Loops&#039;&#039;. The Best Practices suggests that workers and companies use a feedback mechanism in good faith.&lt;br /&gt;
**Is there any way to use technology to prevent abuse of feedback systems, or at least encourage people to use the feedback system in good faith?&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Labor Movement&#039;&#039; Crowdsourcing&#039;s success is dependent on finding ways to engage its labor pool, whether it be through offering money or gamesque points. However, as mentioned in class and in the best practices document, there are many ways for these laborers to become dissatisfied with their work, whether it be through a lack of transparency, stress, low wages, etc. Is there a potential for a crowdsourcing labor movement in response to these dissatisfactions? As an inherently digital workforce, these individuals&#039; attempts to share discontents and act upon them are facilitated by their familiarity with and access to online communities. However, how far will this unity go? Do you feel that workers will only offer critiques of certain employers to others or could there be the formation of unions and similar entities in the crowdsourcing world?&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Disclosure&#039;&#039;. The anonymity of cyber-space and the possibility to divide a large project into a a large number of small tasks so that the ultimate product is unidentifiable raises a number of ethical concerns. Have companies, clients and platforms alike, explored setting up or mandating an ethical commission investigating these concerns? What about a voluntary code of conduct created and agreed on by the indudtry as a quality management system to prevent black sheep from ruining the reputation of the entire industry in case of misconduct and as a preemptive action towards governmental regulation? --&amp;gt; How do you prevent a private run &amp;quot;Manhattan Project&amp;quot; implemented through crowdsourcing and sold to the highest bidder?&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Overlap of legal frameworks&#039;&#039;. Some countries have a state pension fund that is financed by a tax deducted from a worker&#039;s salary. How are these legal requirements adhered to in the realm of crowd-sourcing? How is the location/jurisdiction of the worker determined? If the company&#039;s location is chosen, how measures are taken for the worker to have access to that respective legal system?&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Compensation&#039;&#039;. Crowdsourcing appears to rely on monetary compensation, a gamelike points system, or personal gratification to motivate people to participate in these tasks. Which of these compensation forms is the most effective in ensuring a large labor pool and the best results for employers? Which (if any) of these forms will be the most prominent system of compensation in the future and which do you think would be the most ideal compensation structure for crowdsourcing in the future?&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Mobile Online Devices&#039;&#039;. Mobile and closed platforms with constant connection to the Internet have been supplanting sedentary workplaces in popularity.. How has crowdsourcing taken advantage of this change or has it struggled to do so? What advantages/challenges do these mobile devices offer workers, employees, and crowdsourcing agencies?&lt;/div&gt;</summary>
		<author><name>Andrewsegna</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/difficultproblems/?title=CrowdConf_Brainstorm_page&amp;diff=131</id>
		<title>CrowdConf Brainstorm page</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/difficultproblems/?title=CrowdConf_Brainstorm_page&amp;diff=131"/>
		<updated>2010-10-01T03:23:22Z</updated>

		<summary type="html">&lt;p&gt;Andrewsegna: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Use this page to discuss the best practices reading we did not have time for in class, and brainstorm questions and topics that we might present as a class at the CrowdConf Future of Work Conference next week.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Preserving Confidentiality in Complex Tasks&#039;&#039;. As the best practices document notes, some tasks require worker exposure to proprietary information. The Best Practices mention contracts as a way of dealing with this issues. Do we think that contractual relationships can assuage companies&#039; fears of workers disclosing propriety information? Does the sheer volume of workers on a given task make enforcing such an agreement impossible? &lt;br /&gt;
**Could the problem be solved potentially by drafting specific tasks to specific information, the disclosure of which would make the individual who divulged the info identifiable? &lt;br /&gt;
**What are the costs of drafting such complex contracts?&lt;br /&gt;
**Is there a way the technology can account for this problem?&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Worker Fairness&#039;&#039;. The Best Practices document suggests that the crowd-sourcing platform should facilitate easy payment and provide a forum for dispute resolution.&lt;br /&gt;
**Could the platform have a rating system that suggested a fair rate based on the type of tasks requested? There could be a &amp;quot;survey&amp;quot; that each employer fills out before submitting the task, which would calculate a suggested rate. Perhaps it could be based off of past rates, as tracked by the platform operator? (Does Amazon&#039;s &amp;quot;recommended&amp;quot; technology do this in a different form already?)&lt;br /&gt;
**Could the technology facilitate a cyber dispute-resolution forum? (What if the dispute-resolution process was, in turn, crowd-sourced?!)&lt;br /&gt;
**Have platforms set up features to facilitate the creation of online worker unions?&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Feedback Loops&#039;&#039;. The Best Practices suggests that workers and companies use a feedback mechanism in good faith.&lt;br /&gt;
**Is there any way to use technology to prevent abuse of feedback systems, or at least encourage people to use the feedback system in good faith?&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Labor Movement&#039;&#039; Crowdsourcing&#039;s success is dependent on finding ways to engage its labor pool, whether it be through offering money or gamesque points. However, as mentioned in class and in the best practices document, there are many ways for these laborers to become dissatisfied with their work, whether it be through a lack of transparency, stress, low wages, etc. Is there a potential for a crowdsourcing labor movement in response to these dissatisfactions? As an inherently digital workforce, these individuals&#039; attempts to share discontents and act upon them are facilitated by their familiarity with and access to online communities. However, how far will this unity go? Do you feel that workers will only offer critiques of certain employers to others or could there be the formation of unions and similar entities in the crowdsourcing world?&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Disclosure&#039;&#039;. The anonymity of cyber-space and the possibility to divide a large project into a a large number of small tasks so that the ultimate product is unidentifiable raises a number of ethical concerns. Have companies, clients and platforms alike, explored setting up or mandating an ethical commission investigating these concerns? What about a voluntary code of conduct created and agreed on by the indudtry as a quality management system to prevent black sheep from ruining the reputation of the entire industry in case of misconduct and as a preemptive action towards governmental regulation? --&amp;gt; How do you prevent a private run &amp;quot;Manhattan Project&amp;quot; implemented through crowdsourcing and sold to the highest bidder?&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Overlap of legal frameworks&#039;&#039;. Some countries have a state pension fund that is financed by a tax deducted from a worker&#039;s salary. How are these legal requirements adhered to in the realm of crowd-sourcing? How is the location/jurisdiction of the worker determined? If the company&#039;s location is chosen, how measures are taken for the worker to have access to that respective legal system?&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Compensation&#039;&#039;. Crowdsourcing appears to rely on monetary compensation, a gamelike points system, or personal gratification to motivate people to participate in these tasks. Which of these compensation forms is the most effective in ensuring a large labor pool and the best results for employers? Which (if any) of these forms will be the most prominent system of compensation in the future and which do you think would be the most ideal compensation structure for crowdsourcing in the future?&lt;/div&gt;</summary>
		<author><name>Andrewsegna</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/difficultproblems/?title=CrowdConf_Brainstorm_page&amp;diff=128</id>
		<title>CrowdConf Brainstorm page</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/difficultproblems/?title=CrowdConf_Brainstorm_page&amp;diff=128"/>
		<updated>2010-10-01T03:07:35Z</updated>

		<summary type="html">&lt;p&gt;Andrewsegna: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Use this page to discuss the best practices reading we did not have time for in class, and brainstorm questions and topics that we might present as a class at the CrowdConf Future of Work Conference next week.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Preserving Confidentiality in Complex Tasks&#039;&#039;. As the best practices document notes, some tasks require worker exposure to proprietary information. The Best Practices mention contracts as a way of dealing with this issues. Do we think that contractual relationships can assuage companies&#039; fears of workers disclosing propriety information? Does the sheer volume of workers on a given task make enforcing such an agreement impossible? &lt;br /&gt;
**Could the problem be solved potentially by drafting specific tasks to specific information, the disclosure of which would make the individual who divulged the info identifiable? &lt;br /&gt;
**What are the costs of drafting such complex contracts?&lt;br /&gt;
**Is there a way the technology can account for this problem?&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Worker Fairness&#039;&#039;. The Best Practices document suggests that the crowd-sourcing platform should facilitate easy payment and provide a forum for dispute resolution.&lt;br /&gt;
**Could the platform have a rating system that suggested a fair rate based on the type of tasks requested? There could be a &amp;quot;survey&amp;quot; that each employer fills out before submitting the task, which would calculate a suggested rate. Perhaps it could be based off of past rates, as tracked by the platform operator? (Does Amazon&#039;s &amp;quot;recommended&amp;quot; technology do this in a different form already?)&lt;br /&gt;
**Could the technology facilitate a cyber dispute-resolution forum? (What if the dispute-resolution process was, in turn, crowd-sourced?!)&lt;br /&gt;
**Have platforms set up features to facilitate the creation of online worker unions?&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Feedback Loops&#039;&#039;. The Best Practices suggests that workers and companies use a feedback mechanism in good faith.&lt;br /&gt;
**Is there any way to use technology to prevent abuse of feedback systems, or at least encourage people to use the feedback system in good faith?&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;Labor Movement&#039;&#039; Crowdsourcing&#039;s success is dependent on finding ways to engage its labor pool, whether it be through offering money or gamesque points. However, as mentioned in class and in the best practices document, there are many ways for these laborers to become dissatisfied with their work, whether it be through a lack of transparency, stress, low wages, etc. Is there a potential for a crowdsourcing labor movement in response to these dissatisfactions? As an inherently digital workforce, these individuals&#039; attempts to share discontents and act upon them are facilitated by their familiarity with and access to online communities. However, how far will this unity go? Do you feel that workers will only offer critiques of certain employers to others or could there be the formation of unions and similar entities in the crowdsourcing world?&lt;/div&gt;</summary>
		<author><name>Andrewsegna</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/difficultproblems/?title=Class_2&amp;diff=98</id>
		<title>Class 2</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/difficultproblems/?title=Class_2&amp;diff=98"/>
		<updated>2010-09-26T21:20:42Z</updated>

		<summary type="html">&lt;p&gt;Andrewsegna: /* Group One: */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Group One:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
-Identity revealed beyond your comfort zone (ex. WOW message boards: forced real identity).&lt;br /&gt;
-Can online identity be protected as a possession? Who owns profile pages?&lt;br /&gt;
-Data portability as a privacy policy (who owns shared data?)(single sign-in)(facebook &lt;br /&gt;
Connect)(OpenID)(persistent identity online).&lt;br /&gt;
-Cyberbullies, multiple identities online.&lt;br /&gt;
-How/can IRL ethics/morality be imposed in online spaces?  Should they be?&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1. The Right to Speak Anonymously&#039;&#039;&#039;&lt;br /&gt;
* It would seem that the easiest way to impose IRL ethics/morality in online spaces is to make our online identities tied more closely to our &#039;real&#039; identities. But at the extreme, with everyone having a single, unique online identity tied to something like Social Security numbers, we would be sacrificing our right to speak and act anonymously online. Is there a happy medium?&lt;br /&gt;
* Then again, it&#039;s likely that with cyberbullying, for example, that the kids being bullied know exactly who their antagonists are, meaning that anonymity is not at the heart of the problem. So what is? Is it a lack of consequences? Or consequences that, because they are in &#039;real&#039; life, are insufficiently tied to their online behavior?&lt;br /&gt;
** Although in some cases, such as the highly publicized [http://en.wikipedia.org/wiki/Megan_Meier Megan Meier case], it was not known who the cyberbully was. In fact, in that case, the &amp;quot;real world&amp;quot; bully was unknown in large part because the profile was of a fictitious person to mask the real identity of the bullies.&lt;br /&gt;
** Perhaps we should split it into two categories -- &amp;quot;real name&amp;quot; bullying and &amp;quot;masked&amp;quot; bullying. &amp;quot;Real name&amp;quot; bullying usually takes place on sites like Facebook and MySpace (the Meier case notwithstanding) and over IM, and may be a group of middle school or high schoolers who have taken to picking on one kid online. The total lack of adult or authoritative supervision (ie, no threat of a teacher walking around the hallway corner to see the taunting) could be what fuels this. Thus, some mode of authoritative supervision could calm this type of bullying. On the other hand, &amp;quot;masked&amp;quot; bullying takes place in larger arenas, such as JuicyCampus, CollegeACB (see http://www.collegeacb.com/ and a corresponding article: http://ksusentinel.com/arts-living/students-become-source-of-anonymous-bullying/ ), or perhaps even message boards like World of Warcraft, where the the bullies are anonymous posters or use pseudonyms not connected to their legal names. Here, it may be harder to have any notion of supervision, because the sites themselves facilitate and promote anonymity and likely will invoke free speech claims to avoid working with regulators. -- JPaul (Jenny) &lt;br /&gt;
*World of Warcraft Real Names Controversy&lt;br /&gt;
**[http://blogs.cisco.com/security/comments/blizzard_real_id_privacy_concerns/ Cisco article] describing Blizzard&#039;s proposed changes to its message board identification system.&lt;br /&gt;
**[http://forums.worldofwarcraft.com/thread.html?topicId=25968987278&amp;amp;sid=1 Blizzard&#039;s response] to the controversy the proposal created. In this message board post, Blizzard gives up its plan.&lt;br /&gt;
**Blizzard&#039;s proposal was tied to its [http://us.battle.net/en/realid/faq Real ID] plan, which is an interesting way to bring real world identity to the online realm in an unobtrusive manner.&lt;br /&gt;
* Is the Right to Speak Anonymously (or even the Right to Freedom of Expression?) harmed by forcing online users to sign in with &amp;quot;real identities&amp;quot; (achieved by requiring either verified credit-card billing names, or in less strict cases Facebook Connect) to leave comments on newspaper websites rather than leaving them anonymously as common practice in the early days of the internet&lt;br /&gt;
** The analogy to traditional &#039;letters to the editor&#039; in print editions does not hold as it was much more difficult - if not impossible - to conduct a search of all the comments a given person had submitted to newspapers - in today&#039;s world, such as search would allow anyone to quickly pull together a portfolio of comments left by a given person across multiple publications.&lt;br /&gt;
*** Humorous example of this: [http://www.mcsweeneys.net/links/commenter/ &amp;quot;Get to Know an Internet Commentator&amp;quot; by Kevin Collier.] &lt;br /&gt;
** Another case to consider with anonymity and the internet is the situation where people seek to keep their real-world actions (part of their real-world identity) off the internet. We have discussed that online identities have been increasingly merging with real-world identities through the use of real names, photographs, etc. on Facebook and similar sites. We have also mentioned, in the context of WoW/XBOX among others, some people seeking to maintain fictitious or anonymous online identities. A recent Supreme Court decision in [http://www.supremecourt.gov/opinions/09pdf/09-559.pdf &#039;&#039;Doe v. Reed&#039;&#039;], however, considered when real-world acts are publicized, and importantly for our purposes publicized on the internet. In that case, petition signers hoping to repeal a Washington state law which granted same-sex couples rights akin to marriage sought to prohibit others from gaining access to the petitions under the First Amendment. Opponents of the petitions intended to put the names and addresses on the petitions online in a searchable format. The Supreme Court held that public disclosures of referendum petition signers and their addresses, on its face, did not present a First Amendment violation.&lt;br /&gt;
* If there is a right to speak anonymously, what are its limits? Are third parties required to reveal real identities when necessary to name a party to a lawsuit? What showing of harm to another person might be required? Under what circumstances are subpoenas of internet service providers legal? It seems to me that the First Amendment justifications for anonymity are lacking in cases that cause harm to others, like cyberbullying, such that any right is extinguished. How absolute is this right?&lt;br /&gt;
*What is the effectiveness though of a single, unique online identity?&lt;br /&gt;
*&#039;&#039;&#039;&#039;&#039;Possible case study: Microsoft&#039;s XBOX Live online service&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
**Microsoft&#039;s XBOX Live services assign users a unique online username that identifies the user across all the games and services offered by XBOX Live. This unified identity allows a user to easily maintain relationships with other users, compare past accomplishments and activities, and effectively establish an online community. &lt;br /&gt;
**From a Lessig framework, Microsoft has used 3 of the 4 regulators to motivate people to become attached to one identity and work hard to preserve its reputation.&lt;br /&gt;
***&#039;&#039;Norms&#039;&#039;: Microsoft allows users to rate other users and assign positive and negative feedback. Other users can easily access this information and determine if this is someone they want to associate with. A user&#039;s accomplishments and stats from playing games are tied to his unique identity, making it a valuable indicator of skill and status in the online community.&lt;br /&gt;
***&#039;&#039;Market&#039;&#039;: In order to acquire an XBOX Live account, a user must pay $60 for a year-long subscription. A subscription only gives a user access to one username and, therefore, one identity. If someone wanted to create another identity or if Microsoft banned a user from XBOX Live, that user would have to pay for another account.&lt;br /&gt;
***&#039;&#039;Architecture&#039;&#039;: Microsoft has built in the rating system listed above. As a closed platform, Microsoft also has the ability to ban a user from online activities. This would force the user to purchase another account and would prevent that user from associating himself or herself with past accomplishments and reputation. Given this ominous power, one should be extra careful not to do anything to warrant banning.&lt;br /&gt;
***&#039;&#039;Laws&#039;&#039;: nothing outside of normal tort laws&lt;br /&gt;
**Result: this requires more research and testing. However, common wisdom (note: this is from my own personal experience has someone who has played online and has read many opinions about the service) is that communication on XBOX Live is a morass of racist, sexist, and violent comments. Many individuals refuse to communicate online anymore. Despite all of Microsoft&#039;s safeguards, there is not an effective deterrant to this type of behavior.&lt;br /&gt;
*Are entities like Microsoft hampered by the fact that these online identities, in a sense, don&#039;t matter? If I have a unique XBOX Live identity, how am I harmed outside of the XBOX Live community if I act poorly online and am banned? This won&#039;t harm my relationships outside of this online realm or ability to get jobs.&lt;br /&gt;
*Do we need to make more &amp;quot;real world&amp;quot; ramifications? For example, if law firms required me to list my XBOX Live account name, my Facebook account URL, and my Twitter name (and required me to make all of them public), that would greatly change how I act online. Is the notion of an online identity affected by OCS telling all students seeking law firm positions to make their Facebook profiles as secret as possible?&lt;br /&gt;
*How does requiring a persistent identity mesh with policies behind law? Minors may have opportunity to expunge or seal criminal records under the concept of learning and youthful mistakes. However, this is a system completely controlled by the government. Given the nature of the Internet, it may be impossible to offer a similar service, as website could continue to cite the damages caused by an online user, who is easily traceable to a real world individual. If we could expunge a minor&#039;s record, do we want to? For security reasons, we may not want minors to be identified as such online. Therefore, people will treat an online identity that belongs to a minor as if it belonged to an adult. Similar to minor being held to adult standards when participating in adult activities under tort law, should we hold minors to adult standards if they are perceived as adults in the online realm (which would include not allowing their record to be erased)? &lt;br /&gt;
**Google CEO Eric Schmidt predicts, according to an August 4, 2010 interview in the WSJ, that &amp;quot;every young person one day will be entitled automatically to change his or her name on reaching adulthood in order to disown youthful hijinks stored on their friends&#039; social media sites.&amp;quot;  &lt;br /&gt;
**However, allowing someone upon turning 18 to disown &amp;quot;youthful hijinks&amp;quot; promotes a culture that separates consequences from actions. Instead of eliminating the past, why don&#039;t we provide it with more context? As a proposal, why don&#039;t we use the architecture/law prongs of the Lessig test to create a structure in which the online activities of an individual, from his first entry into the online world to the last, are stored on a server (this is extremely big brother-ish but let&#039;s just play this out). The user can establish as many identities online to represent themselves to other uses, but all of these identities are connected to the user&#039;s real world identity. All of the actions a user takes as a minor are branded as the actions of a minor. The way we would then use this information would be similar to a background or credit check. Employers looking to hire the user can request a report on his Internet activity. They would then receive a report that details his actions. This could either be exhaustive, a general overview, or just if others have complained about his actions. This report will indicate what the user did and when in his lifetime he did it. Therefore, if the user did something embarassing or bad, this report will provide more context than a mere Google search.&lt;br /&gt;
*** Should the notion of an online identity include search results? If so, how should this information be controlled? Wikis indicate when an entry is in dispute. Could search engines provide a similar service for websites attacking individuals? Is it technically possible to screen for negative publicity and separate out these websites in a search? &lt;br /&gt;
*In an [http://futureoftheinternet.org/reputation-bankruptcy article] on his blog, Professor Zittrain discusses the concept of reputation bankruptcy.&lt;br /&gt;
**I find the tie between the solution to identity issues and bankruptcy to be troubling. First off, one of the major problems with online reputation is not a completely toxic reputation, but a singular occasion of poor discretion or the malicious agendas of a few individuals. In the [http://www.washingtonpost.com/wp-dyn/content/article/2007/03/06/AR2007030602705.html AutoAdmit] case, users of a law school message board maliciously attacked a Yale Law student. These negative posts were among the first page of hits in a Google search of the student&#039;s name. The student received no offers from law firms and although no causal connection was proved, these negative posts could have been a reason why she did not receive offers. In cases like these, individuals need selective erasing of third party attacks or a past mistake that are unfair restrictions on a promising future. However, Professor Zittrain suggests that reputation bankruptcy could involve wiping everything cleaing, &amp;quot;throwing out the good along with the bad.&amp;quot; The new start of bankruptcy is a dramatic change and should be used for dire situations. For many cases, it may be a case of using a sledgehammer to kill a fly.&lt;br /&gt;
**Another concern is similar to the one I proposed to the idea of &amp;quot;disown[ing] youthful hijinks.&amp;quot; If someone can declare reputation bankruptcy, that individual is saved but the communities he or she was a part of are still scarred by that individual&#039;s actions. If, in the aforementioned XBOX Live case study, a user could declare reputational bankruptcy, that would do nothing to help XBOX Live&#039;s negative reputation and people&#039;s unwillingness to engage in that community. Under bankruptcy, creditors are able to receive some amount of compensation for the debts owed to them. What kind of compensation can online communities receive in reputation bankruptcy?&lt;br /&gt;
*How do we teach youths just entering the online world how to interact with it and maintain a praiseworthy identity? [WSJ&lt;br /&gt;
&#039;&#039;&#039;2(a). Facebook Profile Portability&#039;&#039;&#039;&lt;br /&gt;
Let&#039;s do more research into data portability as a privacy policy, which relates to above. Facebook could be a good case study.  What options and protections are there to port an online identity / profile i.e. Facebook messages, friend listings, and wall-postings?  What can and can not be permanently deleted?&lt;br /&gt;
* It has been argued that Facebook has created a &amp;quot;semipublic&amp;quot; shared space for exchange of information. [http://www.nytimes.com/2009/02/19/technology/internet/19facebook.html?_r=1 NYT] If I send a private message or make a post on my wall, such information would be owned by me. But what about posts made by other people on my wall, or pictures and video I have been tagged in?&lt;br /&gt;
** What happens to these shared data if I close my account?&lt;br /&gt;
** Should information uploaded by other people become part of my online identity? If I look at my facebook wall I can see that only a minor part of it is made of my own contribution. Would my online identity be the same without other people&#039;s contributions?&lt;br /&gt;
** And what about my posts on other people&#039;s wall? Are those part of my online identity? If we own our personal information, should we own also our posts on other people&#039;s walls?&lt;br /&gt;
** Let&#039;s assume we have complete online portability of our online identity, including material submitted by third parties: what are the privacy implication of this from a third party&#039;s perspective? Are we ok with the third party&#039;s posts and tagged pictures being transferred? Should the third party be notified? Should the third party give express consent?&lt;br /&gt;
&#039;&#039;&#039;2(b). General Online Identity Portability&#039;&#039;&#039;&lt;br /&gt;
While 2(a) focuses on Facebook, how about tackling the more general question about our online identities: &lt;br /&gt;
* How should online identity be regulated?&lt;br /&gt;
** Lessig&#039;s framework, incl. benefit analysis of potential laws, norms, market mechanisms?&lt;br /&gt;
*** re laws: 3 privacy laws passed at state level, federal privacy law potentially coming in next Congress - what will (should?) it include regarding online identity?&lt;br /&gt;
*** re norms: self-regulation: could talk about OAuth, OpenID here and what role they could play&lt;br /&gt;
*** re market place: thinking about Google&#039;s leaked internal communication from 2008 about creating a market place for privacy/personal data)? See: [[http://bit.ly/crHT3J]]&lt;br /&gt;
* What frameworks / initiatives do currently exist? Who has, should have control - Government vs private sector (Could Facebook be &#039;&#039;the&#039;&#039; personal online ID provider)? &lt;br /&gt;
** NSTIC (National Strategy for Trusted Identities in Cyberspace) [[http://www.nstic.ideascale.com/]], first draft strategy document published in June 2010, available for download on homepage&lt;br /&gt;
*** Goal of initiative: Identify solutions ensuring (1) Privacy, (2) Security, (3) Interoperability, (4) Ease-of-Use &lt;br /&gt;
*** Key roles and perspectives to analyze: Individuals, Identity Providers, Attribute Providers, Relying Party&lt;br /&gt;
***(Source: NSTIC Presentation, Trusted Identities Panel, OTA Online Security and Cybersecurity Forum, Washington D.C., September 24, 2010) --[[User:Reinsberg|Reinsberg]] 19:33, 26 September 2010 (UTC)&lt;br /&gt;
&#039;&#039;&#039;3. Applying Privacy Policies Worldwide&#039;&#039;&#039;&lt;br /&gt;
What are the challenges social networks face at the international level and in countries other than the US?&lt;br /&gt;
* Are privacy policies adopted by social networks enforceable everywhere?&lt;br /&gt;
** Consider Facebook approach: Facebook adheres to the Safe Harbor framework developed between US and EU as regards the processing of users&#039; personal information. [http://www.export.gov/safeharbor/eu/eg_main_018476.asp Safe Harbor] Is this enough to shield Facebook from privacy claims coming from outside the US? What about countries outside the UE?&lt;br /&gt;
** Should Facebook be concerned at all about its international responsibility? Consider the case of the Google executives convicted in Italy for a breach of privacy legislation. Assuming the conviction is upheld in appeal, can it ever be enforced? Where are the offices of the company? Where are the servers? Where are the data actually stored and processed?&lt;br /&gt;
* More generally, what types of information created by users is &#039;personal data&#039; about which they have/should have a reasonable expectation of privacy and should be subject to regulation? &lt;br /&gt;
**The line between personal information about which people have a reasonable expectation of privacy and information that is not personal and that need not have restrictions relating to privacy can be a difficult one to define. For example, is information about how a driver drives a car that gets recorded on an in-car computer and potentially transmitted to a car rental or the car manufacturer &#039;personal&#039; information that is/should be covered by data protection laws? What about information that is picked up by google when taking images for google street view (e.g. IP addresses of neighbouring properties)? (See discussion in Information Commissioner’s Office (UK), Statement on Google Street View, August 2010). The problem is that in many cases this information on its own does not identify a particular individual but that it could be used in combination with other information to identify people. Yet when we use the internet so much information is created and it may not all be information that should be subject to privacy regulation.  See discussion about this problem in a New Zealand context in Review of the Privacy Act 1993, NZLC 17, Wellington, 2010 (Australia and the UK are considering similar issues).&lt;br /&gt;
*Who/what are the main sources of privacy invasion that people anticipate? Is it the same privacy invasion if it comes from a company (Google), a government looking for potential terrorist activity, or just an acquaintance who likes to facebook-stalk others? &lt;br /&gt;
**Do we hold private companies to a higher standard if we know that they have the means to protect our privacy more? Should such companies be held to the same standard in every country? If not, aren&#039;t there problems with information that is accessible in some countries but not in others? &lt;br /&gt;
&#039;&#039;&#039;4. Cyber-security&#039;&#039;&#039;&lt;br /&gt;
* Cyber-space was first used by script-kiddies as a playground for web defacement, etc, then discovered by criminals as a new means to expand their activity followed by transnational crime syndicates, followed by hackers with a political - &amp;quot;hacktivists&amp;quot; - until eventually also government discovered cyber-space. Since the DDoS attacks on Estonian websites in 2007 pushed the issue in NATO circles, cyber-security has been increasingly in the headlines. A number of questions emerge from this:&lt;br /&gt;
* Real threat vs. threat inflation. How much of the what is written in newspaper articles and books is much ado about nothing and what can be considered a real risk? If there is a risk, is there also a threat? What determines what constitutes a threat? Richard Clarke&#039;s book &amp;quot;Cyber-war&amp;quot; paints a gloomy picture. Self-interest by an author working as a cyber-security consultant or is there more to it? &lt;br /&gt;
* Cyber-crime &amp;lt;-&amp;gt; cyber-espionage &amp;lt;-&amp;gt; cyber-hacktivism &amp;lt;-&amp;gt; cyber-terrorism &amp;lt;-&amp;gt; cyber-war (cyber-intrastate war/cyber-interstate war). Costs today? Costs tomorrow? Technical solutions? Policy/legal solutions? National/international level? State vs non-state actors? Public/private?&lt;br /&gt;
* Cyber-war vs. cyber-peace. Why is much of the literature using language such as &amp;quot;cyber-war&amp;quot;, &amp;quot;cyber-attack&amp;quot;, etc and not language such as &amp;quot;cyber-peace&amp;quot;, &amp;quot;cyber-cooperation&amp;quot;&lt;br /&gt;
* Terminology. What is the difference between a cyber-hacktivist and a cyber-terrorist? What constitutes a &amp;quot;cyber-attack&amp;quot;? Given cyber-space&#039;s virtual borderlessness is it appropriate to speak of defense/offense or active/passive (e.g. the Outer Space convention)? Is cyber-space a territorium like the High Seas, Antarctica or Outer Space? Or a new field after land (army), sea (navy), air (air force), cyber? Is cyberspace a &amp;quot;cultural heritage of mankind&amp;quot;? Relationship between virtual and kinetic.&lt;br /&gt;
* Civilian vs military. How is cyber-security changing the relationship between civilian and military? DoD is responsible to defend .mil, DHS responsible to defend .gov. What about the other domains? The German DoD is responsible to defend the German military network, the Ministry of Interior responsible for the government websites. How do civilian Ministries of Interior with police forces relate to a cyber-attack outside the country usually an international attack being the responsibility of the military branch of a democratic government? What are the lines of authority, e.g. for the planting of logic bombs or trapdoors?&lt;br /&gt;
**What would the authority of the military be in addressing attacks on civilian networks, if any? Does the government have a role or responsibility to address non-government networks? Structurally and legally, how would implementing this role be done? Would there be any problems of privacy protection and government over-interference? &lt;br /&gt;
*If the government is going to take a role in strengthening private network security, which networks should it protect first? Who should be involved in the oversight of this protection--military, civilian gov. actors, private actors? &lt;br /&gt;
**Would these actions fall under the Cyber Command?&lt;br /&gt;
** The New York Times reports that &amp;quot;the new commander of the military’s cyberwarfare operations is advocating the creation of a separate, secure computer network to protect civilian government agencies and critical industries like the nation’s power grid against attacks mounted over the Internet.&amp;quot; [http://http://www.nytimes.com/2010/09/24/us/24cyber.html?scp=4&amp;amp;sq=department%20of%20defense&amp;amp;st=cse]&lt;br /&gt;
*** Are &amp;quot;secure zones&amp;quot; a viable solution to protecting critical infrastructure? Is this an oversimplified vision of secure systems that assumes cybersecurity is analogous to real space? What are the drawbacks to this approach? The article notes that the cyberwarfare commander did not demarcate the line between public and restricted government access. &lt;br /&gt;
* Role of private actors. How are ISPs, hardware and software companies integrated into the discussions/policy-/law-making process? How much power do they have? Allegiance to profit? Allegiance to country? Allegiance to open cyber-space? Are there public private partnerships? Do they work? What are their strengths/weaknesses?&lt;br /&gt;
* Role of hackers. In the early days, the battle was government vs. hacker or state vs. hacker guided by a hacker ethics. This was before the internet expanded around the globe and in the Western tradition of state vs individual. After the expansion, how has this relationship changed? Is there a transnational hacker-culture or are hackers of country X more closely aligned with government of country X vs hackers of country Y more closely aligned with government of country Y rather than hackers of X and Y aligned vs governments of X and Y? &lt;br /&gt;
* With the attribution problem and the transition problem (virtual-physical world) how much security is necessary and how much generativity possible? What can be done to reduce the risk? What can be done to reduce the threat? International convention? Code of conduct among major companies? International confidence-building measures?&lt;br /&gt;
* Enforcement. How could an international regime/agency look like solving the security dilemma? A cyber-IAEA? Or could a regime that exists now (such as NATO) be more effective? &lt;br /&gt;
**What responsibility would countries have for hackers / attacks originating from their own countries? How could one separate attacks from a private individual (that a country could disaffirm responsibility from) and from a government-sponsored initiative? &lt;br /&gt;
**What are the main sources of the threats that the US and other countries are anticipating? Are they state-based? How, if at all, would this affect our relationships and foreign relations with those states?&lt;br /&gt;
**What kind of retaliation would be appropriate, once an attack has been discovered? If necessary, would a country engage in counter-cyber attacks, or more traditional retaliation such as economic sanctions or even military action?&lt;br /&gt;
**Does the US have special responsibilities for a global safe and free internet? Should it take the lead in preventing attacks in other countries that are less equipped to protect themselves?&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Group Two:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
-property&lt;br /&gt;
-online things acquiring IRL value&lt;br /&gt;
-what happens to digital possessions after death?&lt;br /&gt;
-who has access to your accounts (fb, twit, gmail, etc) after death&lt;br /&gt;
-(TOS after death)&lt;br /&gt;
-first sale doctrine in software&lt;br /&gt;
-first amendment rights with online comms (going through someone’s infrastructure)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1. Death and digital accounts&#039;&#039;&#039;&lt;br /&gt;
*[http://arstechnica.com/tech-policy/news/2010/03/death-and-social-media-what-happens-to-your-life-online.ars Ars Technica] article on how Facebook, MySpace, Twitter, and Google subsidiaries treat death.&lt;br /&gt;
*  Whole set of websites attempting to address this issue, and allow some users autonomy to make decisions about what happens to their accounts after they are unable to manage them anymore:&lt;br /&gt;
**  [http://legacylocker.com/ Legacy Locker] &amp;quot;is a safe, secure repository for your vital digital property that lets you grant access to online assets for friends and loved ones in the event of loss, death, or disability.&amp;quot;&lt;br /&gt;
** [http://www.mywebwill.com My Webwill] &amp;quot;allows you to make decisions about your online life after death. You can choose to deactivate, change or transfer your accounts, like Twitter, Facebook or your blog. At the time of your death we perform your wishes.&amp;quot;&lt;br /&gt;
** But given the transience and uncertain future of so many of these companies, can someone really interested in this trust that the sites will still be around?  Do you need to keep updating it for every new service that you sign up for which, over the course of several years, will presumably include several different sites?  Should it either be a more centralized solution (say, a service provided by the government that has a feeling of more permanence) or more decentralized (say, a last will and testament that you can basically draft on your own).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;2. Speech and Censorship&#039;&#039;&#039;&lt;br /&gt;
* &#039;&#039;Speech, Censorship, Statistics.&#039;&#039; Should we be concerned with an ISPs&#039; and website owners&#039; ability to aggregate and control information and speech. It seems that at least Google thinks that Internet users may be concerned with this topic. Google recently announced the &amp;quot;Transparency Report,&amp;quot; which (incompletely) tracks usage statistics by country, as well as Google&#039;s removal of online material at the Government&#039;s request.[http://www.google.com/transparencyreport/ Google] How should corporations manage such governmental requests. What rules should it apply? How should it decide on a set of rules and whether they are catholic or case specific? What benefits are realized by providing publicly this information--particularly the tracking information? How can users or other entities use this information?&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Group Three:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
-liability for security breaches (negligent design/management)&lt;br /&gt;
-wikileaks! (jurisdictional problems, prosecution) (how does filtering affect wikileaks?)&lt;br /&gt;
-transparency on internet services (google: how does it work?)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1. Liability for Security Breaches and Flaws&#039;&#039;&#039;&lt;br /&gt;
*Software insecurity:&lt;br /&gt;
** Security guru Bruce Schneier has argued that imposing tort liability is desirable as a method of forcing vendors to internalize the costs of insecure software.  See [http://www.schneier.com/essay-025.html Liability Changes Everything] and [http://www.schneier.com/blog/archives/2004/11/computer_securi.html Computer Security and Liability].&lt;br /&gt;
***How convincing is his suggestion?  What sorts of costs would this impose on software companies?  Would such a rule drive small players out of the security market?  Would individual contributors to open source projects potentially face liability?&lt;br /&gt;
** Law professor Michael D. Scott makes a similar argument, and notes that Sarbanes-Oxley requires publicly traded companies to certify that their systems are secure, while imposing no obligations on the vendors who actually provide the software.  See [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1010069 Tort Liability for Vendors of Insecure Software: Has the Time Finally Come?]&lt;br /&gt;
&lt;br /&gt;
*Database insecurity:&lt;br /&gt;
** Summaries of a few recent cases that address database breaches: [http://www.sidley.com/files/News/97324419-8e7b-4c3b-93fa-166d4b2bafb3/Presentation/NewsAttachment/17f372d1-e3f6-4170-b914-37bb3d2d695b/PrivacyUpdate062609%25282%2529.pdf&amp;amp;sa=D&amp;amp;sntz=1&amp;amp;usg=AFQjCNGVbZLeoS0joQgDT7_gE5jF8w6ivg Developments in Data Breach Liability].&lt;br /&gt;
**Law professor Vincent R. Johnson argues that tort liability is an appropriate mechanism for creating incentives and managing risks associated with cybersecurity: [http://www.stmarytx.edu/law/pdf/Johnsoncyber.pdf Cybersecurity, Identity Theft, and the Limits of Tort Liability].  Some issues he raises:&lt;br /&gt;
***&#039;&#039;Duty to protect information&#039;&#039;: California&#039;s Security Breach Information Act imposes such a duty.  The obligations that Graham-Leach-Blilely imposes on financial institutions arguably support liability on a theory of negligence per se.&lt;br /&gt;
****Can market forces adequately address insufficient database security?&lt;br /&gt;
***&amp;quot;Duty to inform of security breaches&amp;quot;: This could be analogous to a failure to warn theory of negligence liability.&lt;br /&gt;
***The economic harms rule seems to impose a significant bar to recovery.  What about requiring the database-owner to pay for security monitoring?  A risk-creation theory might support this approach.&lt;br /&gt;
&lt;br /&gt;
--[[Special:Contributions/98.210.154.54|98.210.154.54]] 23:13, 21 September 2010 (UTC)Davis&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;2. WikiLeaks&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Note: It seems to me, after reading the cybersecurity entry, that the &amp;quot;WikiLeaks&amp;quot; problem could be moved under that category and used as an example of how the Internet can magnify the consequences of a data breach in the physical world. Does anyone else agree? (I&#039;d say no.  There are other issues I&#039;ve added that make it distinct.  See below. -- Austin)&lt;br /&gt;
&lt;br /&gt;
*Real-world data breach: Soldier suspected of leaking classified military reporters to whistleblower website WikiLeaks [http://abcnews.go.com/WN/wikileaks-case-pvt-bradley-manningss-alleged-role-leaking/story?id=11254454]&lt;br /&gt;
**This kind of leak is made much more likely by the growth of digital information.  Spending two minutes to copy thousands of records to a CD labeled &amp;quot;Lady Gaga&amp;quot; v. making copies of the Pentagon Papers and smuggling them out under your shirt.  Do we live in a more &amp;quot;leaky&amp;quot; age?  If Wikileaks proves capable of protecting the anonymity of its contributors, should we come to expect that any information that is sufficiently important to public discourse will eventually find its way into the wild?&lt;br /&gt;
***If these sorts of leaks become increasingly common, will there be a significant effect on the public&#039;s expectations as to government(s) transparency?  Will Wikileaks-like organizations become an accepted &amp;quot;unofficial&amp;quot; path to the release of information?  Or will an increased public expectation of transparency force less government secrecy (fewer documents classified, documents declassified sooner)?&lt;br /&gt;
***What effect will Wikileaks have on transparency in private entities with significant public impact?  Will the public or traditional press treat a leak from Monsanto the same way as a leak from the Department of Defense?&lt;br /&gt;
*WikiLeaks posts documents without redacting the names of Afghans who provided intelligence to the United States. [http://www.cbsnews.com/stories/2010/07/29/eveningnews/main6725935.shtml?tag=contentMain;contentBody] The Taliban said it was using the WikiLeaks site to comb for names of Afghan informants, while the traditional press/gatekeepers said they had redacted the documents they posted to avoid &amp;quot;jeopardizing the lives of informants.&amp;quot; [http://thelede.blogs.nytimes.com/2010/07/30/taliban-study-wikileaks-to-hunt-informants/] It seems as if the Internet has allowed people to bypass the traditional gatekeepers -- be they the government or the press -- and that this magnified the effects of the real-world data breach.&lt;br /&gt;
**Wikileaks _did_ provide the Pentagon the opportunity to redact sensitive information from documents.  [http://www.newsweek.com/blogs/declassified/2010/08/20/wikileaks-lawyer-says-pentagon-has-been-given-codes-granting-access-to-unpublished-secret-documents.html]  The Pentagon refused.  To what degree should the Pentagon and other groups targeted by Wikileaks and similar organizations be willing to work with those organizations?  From the perspective of the targeted group, cooperation with such a group legitimizes it and increases its public statute.  From the perspective of the media organization, a working relationship with a targeted group may cause supporters to question the organization&#039;s independence.  Is there a balance to be struck here?  Do the formation of these relationships make &amp;quot;new media&amp;quot; organizations like Wikileaks look too similar to the &amp;quot;old media&amp;quot; organizations that depend greatly on relationships with government officials for content?&lt;br /&gt;
*Jurisdictional problems and prosecution: The U.S. government is able to prosecute the real-world leaker, but likely won&#039;t be able to prosecute WikiLeaks -- the organization that used the Internet to magnify the effects of the leak, etc. -- because of jurisdictional problems and because of a lack of on-point law. [http://blogs.wsj.com/law/2010/07/26/pentagon-papers-ii-on-wikileaks-and-the-first-amendment/]&lt;br /&gt;
--JPaul (Jenny)&lt;br /&gt;
*What is the role of the primary source in our media landscape?  The Wikileaks hasn&#039;t quite figured this out yet.  In the Collateral Murder video release, for example, Wikileaks was criticized for releasing an edited video alongside the raw footage from a helicopter attack on journalists and civilians in Afghanistan.  In the War Diaries release, however, Wikileaks received sharp criticism as described above.  What is the role of the &amp;quot;gatekeeper&amp;quot; in today&#039;s media?  Can primary source documents contribute effectively to discourse or do they provide so much information that a reader cannot process it all?  Would the War Diaries release had greater focus if the vast number of reports had been reviewed by crowdsourcing?&lt;br /&gt;
*How will Wikileaks shift public opinion with regard to the use of anonymous sources?  As some media critics have pointed out, traditional media sources, even while criticizing anonymous or pseudonymous bloggers, rely heavily on the statements of anonymous officials in their reporting.  [http://www.salon.com/news/opinion/glenn_greenwald/2010/07/24/anonymity]  Will there be a backlash against anonymity or will it become more widely accepted?  Is there a distinction to be made between anonymous sources and anonymous reporters?  How do trust and reputation fit into all this?  (this issue fits pretty well into Group 1&#039;s anonymity issue above)&lt;br /&gt;
*Can the Wikileaks model of funding (releasing a big story and then relying upon donations) be a more widely applied to other forms of independent journalism?&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Group Four:&#039;&#039;&#039; ==&lt;br /&gt;
- &#039;&#039;&#039;The legal or regulatory meaning of Net Neutrality Principle&#039;&#039;&#039;&lt;br /&gt;
* According to Lessig, there is no fixed architecture for the Internet - they are all &amp;quot;code&amp;quot; written by human. The Net Neutrality principle and Prof Zittrain&#039;s concept of a &amp;quot;generative Internet&amp;quot; are attempts to lay down some fundamental values of what Internet architecture, given all possibilities, is the most desirable model that we should pursue.&lt;br /&gt;
* Suppose the concept of Net Neutrality is clear (which is actually not), what are the practical regulatory implications of this principle should bring? There are seemingly contradictory practices in the name of Net Neutrality. For example, ISPs prohibit P2P file-sharing, alleging it takes up too much band width and other users are able to use the networks equally. These practical issues remind us of rethinking some fundamental problems on what neutrality means to the Internet.&lt;br /&gt;
* Layers in regulations that protects Net Neutrality: Are there certain applications that should be given high priorities to run on the Internet, or should all applications be given the same weight? (For instance, should our policy equates the band width used for emails and web browsing to high-resolution video or gaming?)&lt;br /&gt;
&lt;br /&gt;
-“to what extent is our judgment about tech related to the “coolness” of the tech itself?”&lt;br /&gt;
* &#039;&#039;&#039;User Satisfaction versus Company Profitability.&#039;&#039;&#039; Closed platforms like the iPhone present significant benefits at a cost. It may be helpful to frame benefits and costs in terms of user satisfaction and company profitability, rather than any particular feature of the device using the platform. We can, of course, ask about particular features that create or diminish user satisfaction or company profitability, but we won&#039;t talk about the features as if they confer some independent benefit. This is just a way of conceptualizing when society will tolerate certain technological constraints.&lt;br /&gt;
** &#039;&#039;The iPhone.&#039;&#039; Steve Jobs has a vision for the iPhone, and that includes regulating a large portion of what goes on and can go on the phone. Let&#039;s take a look at how the user satisfaction/company profitability model applies. &lt;br /&gt;
*** &#039;&#039;Profitability.&#039;&#039; The iPhone&#039;s closed platform provides at least two valuable and related benefits. First, it allows Apple to keep its operating environment &amp;quot;safe.&amp;quot; Without unauthorized third-party applications--i.e., with all apps being Apple-approved--there is less risk for the introduction and dissemination of malware. This reduces costs for Apple, which doesn&#039;t have to respond to consumers whose phones have been destroyed by viruses. A second related benefit is branding. Because Apple can keep its system closed, it can design the environment in which it operates and market that environment as a product. This design means Apple can extract profits form third-party apps by conditioning access upon, among other things, payment. It also makes the company more profitable because Apple can advertise and promote itself as a &amp;quot;safe&amp;quot; place that operates seamlessly. Nevertheless, this raises issues about how far Apple will regulate its platform. Will it simply condition access by third-party applications, or will it go further and monitor its users. If Jobs is concerned that users will upload pornographic pictures on his phone, will the future iPhone be programmed to identify automatically and remove or block such photos? Does Jobs&#039; vision relate to profitability, or simply personal preference? (This last question will be relevant to considering user satisfaction). &lt;br /&gt;
*** &#039;&#039;User Satisfaction.&#039;&#039; For most users, the iPhone&#039;s closed platform doesn&#039;t seem to cause any immediate problems. There are plenty of cool apps that individuals can download and use. The iPhone certainly scores high on aesthetics, even if some of its features are low on performance. Users tend to love aesthetics, and have overlooked the fact that, for instance, the iPhone can run only one program at a time. The closed platform&#039;s safety also provides a benefit to users, who don&#039;t have to worry about protecting their phones from malware. So far, user satisfaction is high. The balance between user satisfaction and profitability seems to be in equipoise--for now. The question for the future is whether Apple will close off more territory, and whether its current sectioning will stifle the actions of users in the future. As to the former, Apple might meet substantial resistance from the public if it begins regulating their private behavior more explicitly. As to the latter, the future is hard to predict. If users become more adept with their phones or demand new features that the closed system stifles, Apple may have to modify just &#039;how&#039; closed its system should be. Of course, it may respond by making even &amp;quot;cooler&amp;quot; design, thereby satisfying users sufficiently to distract attention from the new (or old) restrictions that remain in place. If consumers detect that Jobs&#039; personal preferences are dictating the ways they can use their phones, their dissatisfaction may win the day.&lt;br /&gt;
**&amp;quot;Pandora Hour Limits.&amp;quot; Pandora&#039;s 40-hour (not sure if that is the exact number, but the important part is that there is a limit) limit for free users has had an impact for avid-users, taking away from their satisfaction.&lt;br /&gt;
*** &amp;quot;Profitability.&amp;quot; The only way to take advantage of a freemium model of revenue is to provide users with more incentive to go premium rather than the non display of ads. Users seem to be satisfied with this because of the loophole of just creating new accounts, however, this is also a process not liked by consumers.&lt;br /&gt;
*** &amp;quot;User Satisfaction.&amp;quot; Often times unnoticed, not causing immediate problems. There are plenty ways users have gotten around this restriction, especially by just creating a new account that requires only an email address. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Lack of Humans in Online Transactions&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The process of purchasing something online has almost become too easy for users and is a process that is generally irreversible especially for a website like Ebay. Amazon introduced one-click purchasing where, with the input of a single word, your credit card is charge and the item is shipped. There is no human contact on the receiving end of a transaction, leading to a significant amount of error and non-intended expenditure. More human contact is needed and the process needs to be slowed down to ensure privacy and accuracy.&lt;br /&gt;
&lt;br /&gt;
-online transaction speed: feature or bug?&lt;br /&gt;
-lack of humans in online transactions: feature or bug?&lt;br /&gt;
- Computers and people gone wild! (please don’t google this)&lt;br /&gt;
&lt;br /&gt;
- Should everything be open-source?&lt;br /&gt;
* A closed platform means that things can be innovative only within a predetermined limit; that is, we can only work within the realm of the expected (e.g., apps for the iPhone). But some of the greatest innovations have changed the paradigm for innovation completely, the obvious example being the Internet. The cost of closed platforms is that we do not even know what we&#039;re missing -- are security and cool apps worth it?&lt;br /&gt;
** Alternatively, if everything &#039;&#039;were&#039;&#039; open-source, would we face some variant of the tragedy of the commons? (&#039;&#039;Tragedy of the commons&#039;&#039; -- In ye olde England, there was a public commons where everyone could let their cattle graze. But because it was a public space, no one took responsibility for it, so all the grass ran out and the place was a mess. Then the commons was privatized, and lo and behold, private ownership meant that the owner now had an investment and interest in the land, so the land became nice and green again. Even if the owner now charged people to let their cattle graze there. [http://en.wikipedia.org/wiki/Tragedy_of_the_commons])  Or is there something different about the ethos of the Internet, or about cyberspace as a &#039;&#039;space&#039;&#039;, that makes the tragedy of the commons a non-issue?&lt;/div&gt;</summary>
		<author><name>Andrewsegna</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/difficultproblems/?title=Class_2&amp;diff=76</id>
		<title>Class 2</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/difficultproblems/?title=Class_2&amp;diff=76"/>
		<updated>2010-09-24T21:41:07Z</updated>

		<summary type="html">&lt;p&gt;Andrewsegna: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Group One:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
-Identity revealed beyond your comfort zone (ex. WOW message boards: forced real identity).&lt;br /&gt;
-Can online identity be protected as a possession? Who owns profile pages?&lt;br /&gt;
-Data portability as a privacy policy (who owns shared data?)(single sign-in)(facebook &lt;br /&gt;
Connect)(OpenID)(persistent identity online).&lt;br /&gt;
-Cyberbullies, multiple identities online.&lt;br /&gt;
-How/can IRL ethics/morality be imposed in online spaces?  Should they be?&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1. The Right to Speak Anonymously&#039;&#039;&#039;&lt;br /&gt;
* It would seem that the easiest way to impose IRL ethics/morality in online spaces is to make our online identities tied more closely to our &#039;real&#039; identities. But at the extreme, with everyone having a single, unique online identity tied to something like Social Security numbers, we would be sacrificing our right to speak and act anonymously online. Is there a happy medium?&lt;br /&gt;
* Then again, it&#039;s likely that with cyberbullying, for example, that the kids being bullied know exactly who their antagonists are, meaning that anonymity is not at the heart of the problem. So what is? Is it a lack of consequences? Or consequences that, because they are in &#039;real&#039; life, are insufficiently tied to their online behavior?&lt;br /&gt;
** Although in some cases, such as the highly publicized [http://en.wikipedia.org/wiki/Megan_Meier Megan Meier case], it was not known who the cyberbully was. In fact, in that case, the &amp;quot;real world&amp;quot; bully was unknown in large part because the profile was of a fictitious person to mask the real identity of the bullies.&lt;br /&gt;
* Is the Right to Speak Anonymously (or even the Right to Freedom of Expression?) harmed by forcing online users to sign in with &amp;quot;real identities&amp;quot; (achieved by requiring either verified credit-card billing names, or in less strict cases Facebook Connect) to leave comments on newspaper websites rather than leaving them anonymously as common practice in the early days of the internet&lt;br /&gt;
** The analogy to traditional &#039;letters to the editor&#039; in print editions does not hold as it was much more difficult - if not impossible - to conduct a search of all the comments a given person had submitted to newspapers - in today&#039;s world, such as search would allow anyone to quickly pull together a portfolio of comments left by a given person across multiple publications.&lt;br /&gt;
** Another case to consider with anonymity and the internet is the situation where people seek to keep their real-world actions (part of their real-world identity) off the internet. We have discussed that online identities have been increasingly merging with real-world identities through the use of real names, photographs, etc. on Facebook and similar sites. We have also mentioned, in the context of WoW/XBOX among others, some people seeking to maintain fictitious or anonymous online identities. A recent Supreme Court decision in [http://www.supremecourt.gov/opinions/09pdf/09-559.pdf &#039;&#039;Doe v. Reed&#039;&#039;], however, considered when real-world acts are publicized, and importantly for our purposes publicized on the internet. In that case, petition signers hoping to repeal a Washington state law which granted same-sex couples rights akin to marriage sought to prohibit others from gaining access to the petitions under the First Amendment. Opponents of the petitions intended to put the names and addresses on the petitions online in a searchable format. The Supreme Court held that public disclosures of referendum petition signers and their addresses, on its face, did not present a First Amendment violation.&lt;br /&gt;
*What is the effectiveness though of a single, unique online identity?&lt;br /&gt;
*&#039;&#039;&#039;&#039;&#039;Possible case study: Microsoft&#039;s XBOX Live online service&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
**Microsoft&#039;s XBOX Live services assign users a unique online username that identifies the user across all the games and services offered by XBOX Live. This unified identity allows a user to easily maintain relationships with other users, compare past accomplishments and activities, and effectively establish an online community. &lt;br /&gt;
**From a Lessig framework, Microsoft has used 3 of the 4 regulators to motivate people to become attached to one identity and work hard to preserve its reputation.&lt;br /&gt;
***&#039;&#039;Norms&#039;&#039;: Microsoft allows users to rate other users and assign positive and negative feedback. Other users can easily access this information and determine if this is someone they want to associate with. A user&#039;s accomplishments and stats from playing games are tied to his unique identity, making it a valuable indicator of skill and status in the online community.&lt;br /&gt;
***&#039;&#039;Market&#039;&#039;: In order to acquire an XBOX Live account, a user must pay $60 for a year-long subscription. A subscription only gives a user access to one username and, therefore, one identity. If someone wanted to create another identity or if Microsoft banned a user from XBOX Live, that user would have to pay for another account.&lt;br /&gt;
***&#039;&#039;Architecture&#039;&#039;: Microsoft has built in the rating system listed above. As a closed platform, Microsoft also has the ability to ban a user from online activities. This would force the user to purchase another account and would prevent that user from associating himself or herself with past accomplishments and reputation. Given this ominous power, one should be extra careful not to do anything to warrant banning.&lt;br /&gt;
***&#039;&#039;Laws&#039;&#039;: nothing outside of normal tort laws&lt;br /&gt;
**Result: this requires more research and testing. However, common wisdom (note: this is from my own personal experience has someone who has played online and has read many opinions about the service) is that communication on XBOX Live is a morass of racist, sexist, and violent comments. Many individuals refuse to communicate online anymore. Despite all of Microsoft&#039;s safeguards, there is not an effective deterrant to this type of behavior.&lt;br /&gt;
*Are entities like Microsoft hampered by the fact that these online identities, in a sense, don&#039;t matter? If I have a unique XBOX Live identity, how am I harmed outside of the XBOX Live community if I act poorly online and am banned? This won&#039;t harm my relationships outside of this online realm or ability to get jobs.&lt;br /&gt;
*Do we need to make more &amp;quot;real world&amp;quot; ramifications? For example, if law firms required me to list my XBOX Live account name, my Facebook account URL, and my Twitter name (and required me to make all of them public), that would greatly change how I act online. Is the notion of an online identity affected by OCS telling all students seeking law firm positions to make their Facebook profiles as secret as possible?&lt;br /&gt;
*How does requiring a persistent identity mesh with policies behind law? Minors may have opportunity to expunge or seal criminal records under the concept of learning and youthful mistakes. However, this is a system completely controlled by the government. Given the nature of the Internet, it may be impossible to offer a similar service, as website could continue to cite the damages caused by an online user, who is easily traceable to a real world individual. If we could expunge a minor&#039;s record, do we want to? For security reasons, we may not want minors to be identified as such online. Therefore, people will treat an online identity that belongs to a minor as if it belonged to an adult. Similar to minor being held to adult standards when participating in adult activities under tort law, should we hold minors to adult standards if they are perceived as adults in the online realm (which would include not allowing their record to be erased)? &lt;br /&gt;
**Google CEO Eric Schmidt predicts, according to an August 4, 2010 interview in the WSJ, that &amp;quot;every young person one day will be entitled automatically to change his or her name on reaching adulthood in order to disown youthful hijinks stored on their friends&#039; social media sites.&amp;quot;  &lt;br /&gt;
**However, allowing someone upon turning 18 to disown &amp;quot;youthful hijinks&amp;quot; promotes a culture that separates consequences from actions. Instead of eliminating the past, why don&#039;t we provide it with more context? As a proposal, why don&#039;t we use the architecture/law prongs of the Lessig test to create a structure in which the online activities of an individual, from his first entry into the online world to the last, are stored on a server (this is extremely big brother-ish but let&#039;s just play this out). The user can establish as many identities online to represent themselves to other uses, but all of these identities are connected to the user&#039;s real world identity. All of the actions a user takes as a minor are branded as the actions of a minor. The way we would then use this information would be similar to a background or credit check. Employers looking to hire the user can request a report on his Internet activity. They would then receive a report that details his actions. This could either be exhaustive, a general overview, or just if others have complained about his actions. This report will indicate what the user did and when in his lifetime he did it. Therefore, if the user did something embarassing or bad, this report will provide more context than a mere Google search.&lt;br /&gt;
*In an [http://futureoftheinternet.org/reputation-bankruptcy article] on his blog, Professor Zittrain discusses the concept of reputation bankruptcy.&lt;br /&gt;
**I find the tie between the solution to identity issues and bankruptcy to be troubling. First off, one of the major problems with online reputation is not a completely toxic reputation, but a singular occasion of poor discretion or the malicious agendas of a few individuals. In the [http://www.washingtonpost.com/wp-dyn/content/article/2007/03/06/AR2007030602705.html AutoAdmit] case, users of a law school message board maliciously attacked a Yale Law student. These negative posts were among the first page of hits in a Google search of the student&#039;s name. The student received no offers from law firms and although no causal connection was proved, these negative posts could have been a reason why she did not receive offers. In cases like these, individuals need selective erasing of third party attacks or a past mistake that are unfair restrictions on a promising future. However, Professor Zittrain suggests that reputation bankruptcy could involve wiping everything cleaing, &amp;quot;throwing out the good along with the bad.&amp;quot; The new start of bankruptcy is a dramatic change and should be used for dire situations. For many cases, it may be a case of using a sledgehammer to kill a fly.&lt;br /&gt;
**Another concern is similar to the one I proposed to the idea of &amp;quot;disown[ing] youthful hijinks.&amp;quot; If someone can declare reputation bankruptcy, that individual is saved but the communities he or she was a part of are still scarred by that individual&#039;s actions. If, in the aforementioned XBOX Live case study, a user could declare reputational bankruptcy, that would do nothing to help XBOX Live&#039;s negative reputation and people&#039;s unwillingness to engage in that community. Under bankruptcy, creditors are able to receive some amount of compensation for the debts owed to them. What kind of compensation can online communities receive in reputation bankruptcy?&lt;br /&gt;
*How do we teach youths just entering the online world how to interact with it and maintain a praiseworthy identity? [WSJ&lt;br /&gt;
&#039;&#039;&#039;2. Facebook Profile Portability&#039;&#039;&#039;&lt;br /&gt;
Let&#039;s do more research into data portability as a privacy policy, which relates to above. Facebook could be a good case study.  What options and protections are there to port an online identity / profile i.e. Facebook messages, friend listings, and wall-postings?  What can and can not be permanently deleted?&lt;br /&gt;
* It has been argued that Facebook has created a &amp;quot;semipublic&amp;quot; shared space for exchange of information. [http://www.nytimes.com/2009/02/19/technology/internet/19facebook.html?_r=1 NYT] If I send a private message or make a post on my wall, such information would be owned by me. But what about posts made by other people on my wall, or pictures and video I have been tagged in?&lt;br /&gt;
** What happens to these shared data if I close my account?&lt;br /&gt;
** Should information uploaded by other people become part of my online identity? If I look at my facebook wall I can see that only a minor part of it is made of my own contribution. Would my online identity be the same without other people&#039;s contributions?&lt;br /&gt;
** And what about my posts on other people&#039;s wall? Are those part of my online identity? If we own our personal information, should we own also our posts on other people&#039;s walls?&lt;br /&gt;
** Let&#039;s assume we have complete online portability of our online identity, including material submitted by third parties: what are the privacy implication of this from a third party&#039;s perspective? Are we ok with the third party&#039;s posts and tagged pictures being transferred? Should the third party be notified? Should the third party give express consent?&lt;br /&gt;
&#039;&#039;&#039;3. Applying Privacy Policies Worldwide&#039;&#039;&#039;&lt;br /&gt;
What are the challenges social networks face at the international level and in countries other than the US?&lt;br /&gt;
* Are privacy policies adopted by social networks enforceable everywhere?&lt;br /&gt;
** Consider Facebook approach: Facebook adheres to the Safe Harbor framework developed between US and EU as regards the processing of users&#039; personal information. [http://www.export.gov/safeharbor/eu/eg_main_018476.asp Safe Harbor] Is this enough to shield Facebook from privacy claims coming from outside the US? What about countries outside the UE?&lt;br /&gt;
** Should Facebook be concerned at all about its international responsibility? Consider the case of the Google executives convicted in Italy for a breach of privacy legislation. Assuming the conviction is upheld in appeal, can it ever be enforced? Where are the offices of the company? Where are the servers? Where are the data actually stored and processed?&lt;br /&gt;
* More generally, what types of information created by users is &#039;personal data&#039; about which they have/should have a reasonable expectation of privacy and should be subject to regulation? &lt;br /&gt;
**The line between personal information about which people have a reasonable expectation of privacy and information that is not personal and that need not have restrictions relating to privacy can be a difficult one to define. For example, is information about how a driver drives a car that gets recorded on an in-car computer and potentially transmitted to a car rental or the car manufacturer &#039;personal&#039; information that is/should be covered by data protection laws? What about information that is picked up by google when taking images for google street view (e.g. IP addresses of neighbouring properties)? (See discussion in Information Commissioner’s Office (UK), Statement on Google Street View, August 2010). The problem is that in many cases this information on its own does not identify a particular individual but that it could be used in combination with other information to identify people. Yet when we use the internet so much information is created and it may not all be information that should be subject to privacy regulation.  See discussion about this problem in a New Zealand context in Review of the Privacy Act 1993, NZLC 17, Wellington, 2010 (Australia and the UK are considering similar issues).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;4. Cyber-security&#039;&#039;&#039;&lt;br /&gt;
* Cyber-space was first used by script-kiddies as a playground for web defacement, etc, then discovered by criminals as a new means to expand their activity followed by transnational crime syndicates, followed by hackers with a political - &amp;quot;hacktivists&amp;quot; - until eventually also government discovered cyber-space. Since the DDoS attacks on Estonian websites in 2007 pushed the issue in NATO circles, cyber-security has been increasingly in the headlines. A number of questions emerge from this:&lt;br /&gt;
* Real threat vs. threat inflation. How much of the what is written in newspaper articles and books is much ado about nothing and what can be considered a real risk? If there is a risk, is there also a threat? What determines what constitutes a threat? Richard Clarke&#039;s book &amp;quot;Cyber-war&amp;quot; paints a gloomy picture. Self-interest by an author working as a cyber-security consultant or is there more to it? &lt;br /&gt;
* Cyber-crime &amp;lt;-&amp;gt; cyber-espionage &amp;lt;-&amp;gt; cyber-hacktivism &amp;lt;-&amp;gt; cyber-terrorism &amp;lt;-&amp;gt; cyber-war (cyber-intrastate war/cyber-interstate war). Costs today? Costs tomorrow? Technical solutions? Policy/legal solutions? National/international level? State vs non-state actors? Public/private?&lt;br /&gt;
* Cyber-war vs. cyber-peace. Why is much of the literature using language such as &amp;quot;cyber-war&amp;quot;, &amp;quot;cyber-attack&amp;quot;, etc and not language such as &amp;quot;cyber-peace&amp;quot;, &amp;quot;cyber-cooperation&amp;quot;&lt;br /&gt;
* Terminology. What is the difference between a cyber-hacktivist and a cyber-terrorist? What constitutes a &amp;quot;cyber-attack&amp;quot;? Given cyber-space&#039;s virtual borderlessness is it appropriate to speak of defense/offense or active/passive (e.g. the Outer Space convention)? Is cyber-space a territorium like the High Seas, Antarctica or Outer Space? Or a new field after land (army), sea (navy), air (air force), cyber? Is cyberspace a &amp;quot;cultural heritage of mankind&amp;quot;? Relationship between virtual and kinetic.&lt;br /&gt;
* Civilian vs military. How is cyber-security changing the relationship between civilian and military? DoD is responsible to defend .mil, DHS responsible to defend .gov. What about the other domains? The German DoD is responsible to defend the German military network, the Ministry of Interior responsible for the government websites. How do civilian Ministries of Interior with police forces relate to a cyber-attack outside the country usually an international attack being the responsibility of the military branch of a democratic government? What are the lines of authority, e.g. for the planting of logic bombs or trapdoors?&lt;br /&gt;
* Role of private actors. How are ISPs, hardware and software companies integrated into the discussions/policy-/law-making process? How much power do they have? Allegiance to profit? Allegiance to country? Allegiance to open cyber-space? Are there public private partnerships? Do they work? What are their strengths/weaknesses?&lt;br /&gt;
* Role of hackers. In the early days, the battle was government vs. hacker or state vs. hacker guided by a hacker ethics. This was before the internet expanded around the globe and in the Western tradition of state vs individual. After the expansion, how has this relationship changed? Is there a transnational hacker-culture or are hackers of country X more closely aligned with government of country X vs hackers of country Y more closely aligned with government of country Y rather than hackers of X and Y aligned vs governments of X and Y? &lt;br /&gt;
* With the attribution problem and the transition problem (virtual-physical world) how much security is necessary and how much generativity possible? What can be done to reduce the risk? What can be done to reduce the threat? International convention? Code of conduct among major companies? International confidence-building measures?&lt;br /&gt;
* Enforcement. How could an international regime/agency look like solving the security dilemma? A cyber-IAEA?&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Group Two:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
-property&lt;br /&gt;
-online things acquiring IRL value&lt;br /&gt;
-what happens to digital possessions after death?&lt;br /&gt;
-who has access to your accounts (fb, twit, gmail, etc) after death&lt;br /&gt;
-(TOS after death)&lt;br /&gt;
-first sale doctrine in software&lt;br /&gt;
-first amendment rights with online comms (going through someone’s infrastructure)&lt;br /&gt;
&lt;br /&gt;
*[http://arstechnica.com/tech-policy/news/2010/03/death-and-social-media-what-happens-to-your-life-online.ars Ars Technica] article on how Facebook, MySpace, Twitter, and Google subsidiaries treat death.&lt;br /&gt;
* &#039;&#039;Speech, Censorship, Statistics.&#039;&#039; Should we be concerned with an ISPs&#039; and website owners&#039; ability to aggregate and control information and speech. It seems that at least Google thinks that Internet users may be concerned with this topic. Google recently announced the &amp;quot;Transparency Report,&amp;quot; which (incompletely) tracks usage statistics by country, as well as Google&#039;s removal of online material at the Government&#039;s request.[http://www.google.com/transparencyreport/ Google] How should corporations manage such governmental requests. What rules should it apply? How should it decide on a set of rules and whether they are catholic or case specific? What benefits are realized by providing publicly this information--particularly the tracking information? How can users or other entities use this information?&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Group Three:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
-liability for security breaches (negligent design/management)&lt;br /&gt;
-wikileaks! (jurisdictional problems, prosecution) (how does filtering affect wikileaks?)&lt;br /&gt;
-transparency on internet services (google: how does it work?)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1. Liability for Security Breaches and Flaws&#039;&#039;&#039;&lt;br /&gt;
*Software insecurity:&lt;br /&gt;
** Security guru Bruce Schneier has argued that imposing tort liability is desirable as a method of forcing vendors to internalize the costs of insecure software.  See [http://www.schneier.com/essay-025.html Liability Changes Everything] and [http://www.schneier.com/blog/archives/2004/11/computer_securi.html Computer Security and Liability].&lt;br /&gt;
***How convincing is his suggestion?  What sorts of costs would this impose on software companies?  Would such a rule drive small players out of the security market?  Would individual contributors to open source projects potentially face liability?&lt;br /&gt;
** Law professor Michael D. Scott makes a similar argument, and notes that Sarbanes-Oxley requires publicly traded companies to certify that their systems are secure, while imposing no obligations on the vendors who actually provide the software.  See [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1010069 Tort Liability for Vendors of Insecure Software: Has the Time Finally Come?]&lt;br /&gt;
&lt;br /&gt;
*Database insecurity:&lt;br /&gt;
** Summaries of a few recent cases that address database breaches: [http://www.sidley.com/files/News/97324419-8e7b-4c3b-93fa-166d4b2bafb3/Presentation/NewsAttachment/17f372d1-e3f6-4170-b914-37bb3d2d695b/PrivacyUpdate062609%25282%2529.pdf&amp;amp;sa=D&amp;amp;sntz=1&amp;amp;usg=AFQjCNGVbZLeoS0joQgDT7_gE5jF8w6ivg Developments in Data Breach Liability].&lt;br /&gt;
**Law professor Vincent R. Johnson argues that tort liability is an appropriate mechanism for creating incentives and managing risks associated with cybersecurity: [http://www.stmarytx.edu/law/pdf/Johnsoncyber.pdf Cybersecurity, Identity Theft, and the Limits of Tort Liability].  Some issues he raises:&lt;br /&gt;
***&#039;&#039;Duty to protect information&#039;&#039;: California&#039;s Security Breach Information Act imposes such a duty.  The obligations that Graham-Leach-Blilely imposes on financial institutions arguably support liability on a theory of negligence per se.&lt;br /&gt;
****Can market forces adequately address insufficient database security?&lt;br /&gt;
***&amp;quot;Duty to inform of security breaches&amp;quot;: This could be analogous to a failure to warn theory of negligence liability.&lt;br /&gt;
***The economic harms rule seems to impose a significant bar to recovery.  What about requiring the database-owner to pay for security monitoring?  A risk-creation theory might support this approach.&lt;br /&gt;
&lt;br /&gt;
--[[Special:Contributions/98.210.154.54|98.210.154.54]] 23:13, 21 September 2010 (UTC)Davis&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Group Four:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
-“to what extent is our judgment about tech related to the “coolness” of the tech itself?”&lt;br /&gt;
* &#039;&#039;&#039;User Satisfaction versus Company Profitability.&#039;&#039;&#039; Closed platforms like the iPhone present significant benefits at a cost. It may be helpful to frame benefits and costs in terms of user satisfaction and company profitability, rather than any particular feature of the device using the platform. We can, of course, ask about particular features that create or diminish user satisfaction or company profitability, but we won&#039;t talk about the features as if they confer some independent benefit. This is just a way of conceptualizing when society will tolerate certain technological constraints.&lt;br /&gt;
** &#039;&#039;The iPhone.&#039;&#039; Steve Jobs has a vision for the iPhone, and that includes regulating a large portion of what goes on and can go on the phone. Let&#039;s take a look at how the user satisfaction/company profitability model applies. &lt;br /&gt;
*** &#039;&#039;Profitability.&#039;&#039; The iPhone&#039;s closed platform provides at least two valuable and related benefits. First, it allows Apple to keep its operating environment &amp;quot;safe.&amp;quot; Without unauthorized third-party applications--i.e., with all apps being Apple-approved--there is less risk for the introduction and dissemination of malware. This reduces costs for Apple, which doesn&#039;t have to respond to consumers whose phones have been destroyed by viruses. A second related benefit is branding. Because Apple can keep its system closed, it can design the environment in which it operates and market that environment as a product. This design means Apple can extract profits form third-party apps by conditioning access upon, among other things, payment. It also makes the company more profitable because Apple can advertise and promote itself as a &amp;quot;safe&amp;quot; place that operates seamlessly. Nevertheless, this raises issues about how far Apple will regulate its platform. Will it simply condition access by third-party applications, or will it go further and monitor its users. If Jobs is concerned that users will upload pornographic pictures on his phone, will the future iPhone be programmed to identify automatically and remove or block such photos? Does Jobs&#039; vision relate to profitability, or simply personal preference? (This last question will be relevant to considering user satisfaction). &lt;br /&gt;
*** &#039;&#039;User Satisfaction.&#039;&#039; For most users, the iPhone&#039;s closed platform doesn&#039;t seem to cause any immediate problems. There are plenty of cool apps that individuals can download and use. The iPhone certainly scores high on aesthetics, even if some of its features are low on performance. Users tend to love aesthetics, and have overlooked the fact that, for instance, the iPhone can run only one program at a time. The closed platform&#039;s safety also provides a benefit to users, who don&#039;t have to worry about protecting their phones from malware. So far, user satisfaction is high. The balance between user satisfaction and profitability seems to be in equipoise--for now. The question for the future is whether Apple will close off more territory, and whether its current sectioning will stifle the actions of users in the future. As to the former, Apple might meet substantial resistance from the public if it begins regulating their private behavior more explicitly. As to the latter, the future is hard to predict. If users become more adept with their phones or demand new features that the closed system stifles, Apple may have to modify just &#039;how&#039; closed its system should be. Of course, it may respond by making even &amp;quot;cooler&amp;quot; design, thereby satisfying users sufficiently to distract attention from the new (or old) restrictions that remain in place. If consumers detect that Jobs&#039; personal preferences are dictating the ways they can use their phones, their dissatisfaction may win the day.&lt;br /&gt;
**[&#039;&#039;Please add another example.&#039;&#039;]&lt;br /&gt;
&lt;br /&gt;
-online transaction speed: feature or bug?&lt;br /&gt;
-lack of humans in online transactions: feature or bug?&lt;br /&gt;
- Computers and people gone wild! (please don’t google this)&lt;br /&gt;
&lt;br /&gt;
- Should everything be open-source?&lt;br /&gt;
* A closed platform means that things can be innovative only within a predetermined limit; that is, we can only work within the realm of the expected (e.g., apps for the iPhone). But some of the greatest innovations have changed the paradigm for innovation completely, the obvious example being the Internet. The cost of closed platforms is that we do not even know what we&#039;re missing -- are security and cool apps worth it?&lt;br /&gt;
** Alternatively, if everything &#039;&#039;were&#039;&#039; open-source, would we face some variant of the tragedy of the commons? (&#039;&#039;Tragedy of the commons&#039;&#039; -- In ye olde England, there was a public commons where everyone could let their cattle graze. But because it was a public space, no one took responsibility for it, so all the grass ran out and the place was a mess. Then the commons was privatized, and lo and behold, private ownership meant that the owner now had an investment and interest in the land, so the land became nice and green again. Even if the owner now charged people to let their cattle graze there. [http://en.wikipedia.org/wiki/Tragedy_of_the_commons])  Or is there something different about the ethos of the Internet, or about cyberspace as a &#039;&#039;space&#039;&#039;, that makes the tragedy of the commons a non-issue?&lt;/div&gt;</summary>
		<author><name>Andrewsegna</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/difficultproblems/?title=Class_2&amp;diff=75</id>
		<title>Class 2</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/difficultproblems/?title=Class_2&amp;diff=75"/>
		<updated>2010-09-24T21:37:21Z</updated>

		<summary type="html">&lt;p&gt;Andrewsegna: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Group One:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
-Identity revealed beyond your comfort zone (ex. WOW message boards: forced real identity).&lt;br /&gt;
-Can online identity be protected as a possession? Who owns profile pages?&lt;br /&gt;
-Data portability as a privacy policy (who owns shared data?)(single sign-in)(facebook &lt;br /&gt;
Connect)(OpenID)(persistent identity online).&lt;br /&gt;
-Cyberbullies, multiple identities online.&lt;br /&gt;
-How/can IRL ethics/morality be imposed in online spaces?  Should they be?&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1. The Right to Speak Anonymously&#039;&#039;&#039;&lt;br /&gt;
* It would seem that the easiest way to impose IRL ethics/morality in online spaces is to make our online identities tied more closely to our &#039;real&#039; identities. But at the extreme, with everyone having a single, unique online identity tied to something like Social Security numbers, we would be sacrificing our right to speak and act anonymously online. Is there a happy medium?&lt;br /&gt;
* Then again, it&#039;s likely that with cyberbullying, for example, that the kids being bullied know exactly who their antagonists are, meaning that anonymity is not at the heart of the problem. So what is? Is it a lack of consequences? Or consequences that, because they are in &#039;real&#039; life, are insufficiently tied to their online behavior?&lt;br /&gt;
** Although in some cases, such as the highly publicized [http://en.wikipedia.org/wiki/Megan_Meier Megan Meier case], it was not known who the cyberbully was. In fact, in that case, the &amp;quot;real world&amp;quot; bully was unknown in large part because the profile was of a fictitious person to mask the real identity of the bullies.&lt;br /&gt;
* Is the Right to Speak Anonymously (or even the Right to Freedom of Expression?) harmed by forcing online users to sign in with &amp;quot;real identities&amp;quot; (achieved by requiring either verified credit-card billing names, or in less strict cases Facebook Connect) to leave comments on newspaper websites rather than leaving them anonymously as common practice in the early days of the internet&lt;br /&gt;
** The analogy to traditional &#039;letters to the editor&#039; in print editions does not hold as it was much more difficult - if not impossible - to conduct a search of all the comments a given person had submitted to newspapers - in today&#039;s world, such as search would allow anyone to quickly pull together a portfolio of comments left by a given person across multiple publications.&lt;br /&gt;
** Another case to consider with anonymity and the internet is the situation where people seek to keep their real-world actions (part of their real-world identity) off the internet. We have discussed that online identities have been increasingly merging with real-world identities through the use of real names, photographs, etc. on Facebook and similar sites. We have also mentioned, in the context of WoW/XBOX among others, some people seeking to maintain fictitious or anonymous online identities. A recent Supreme Court decision in [http://www.supremecourt.gov/opinions/09pdf/09-559.pdf &#039;&#039;Doe v. Reed&#039;&#039;], however, considered when real-world acts are publicized, and importantly for our purposes publicized on the internet. In that case, petition signers hoping to repeal a Washington state law which granted same-sex couples rights akin to marriage sought to prohibit others from gaining access to the petitions under the First Amendment. Opponents of the petitions intended to put the names and addresses on the petitions online in a searchable format. The Supreme Court held that public disclosures of referendum petition signers and their addresses, on its face, did not present a First Amendment violation.&lt;br /&gt;
*What is the effectiveness though of a single, unique online identity?&lt;br /&gt;
*&#039;&#039;&#039;&#039;&#039;Possible case study: Microsoft&#039;s XBOX Live online service&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
**Microsoft&#039;s XBOX Live services assign users a unique online username that identifies the user across all the games and services offered by XBOX Live. This unified identity allows a user to easily maintain relationships with other users, compare past accomplishments and activities, and effectively establish an online community. &lt;br /&gt;
**From a Lessig framework, Microsoft has used 3 of the 4 regulators to motivate people to become attached to one identity and work hard to preserve its reputation.&lt;br /&gt;
***&#039;&#039;Norms&#039;&#039;: Microsoft allows users to rate other users and assign positive and negative feedback. Other users can easily access this information and determine if this is someone they want to associate with. A user&#039;s accomplishments and stats from playing games are tied to his unique identity, making it a valuable indicator of skill and status in the online community.&lt;br /&gt;
***&#039;&#039;Market&#039;&#039;: In order to acquire an XBOX Live account, a user must pay $60 for a year-long subscription. A subscription only gives a user access to one username and, therefore, one identity. If someone wanted to create another identity or if Microsoft banned a user from XBOX Live, that user would have to pay for another account.&lt;br /&gt;
***&#039;&#039;Architecture&#039;&#039;: Microsoft has built in the rating system listed above. As a closed platform, Microsoft also has the ability to ban a user from online activities. This would force the user to purchase another account and would prevent that user from associating himself or herself with past accomplishments and reputation. Given this ominous power, one should be extra careful not to do anything to warrant banning.&lt;br /&gt;
***&#039;&#039;Laws&#039;&#039;: nothing outside of normal tort laws&lt;br /&gt;
**Result: this requires more research and testing. However, common wisdom (note: this is from my own personal experience has someone who has played online and has read many opinions about the service) is that communication on XBOX Live is a morass of racist, sexist, and violent comments. Many individuals refuse to communicate online anymore. Despite all of Microsoft&#039;s safeguards, there is not an effective deterrant to this type of behavior.&lt;br /&gt;
*Are entities like Microsoft hampered by the fact that these online identities, in a sense, don&#039;t matter? If I have a unique XBOX Live identity, how am I harmed outside of the XBOX Live community if I act poorly online and am banned? This won&#039;t harm my relationships outside of this online realm or ability to get jobs.&lt;br /&gt;
*Do we need to make more &amp;quot;real world&amp;quot; ramifications? For example, if law firms required me to list my XBOX Live account name, my Facebook account URL, and my Twitter name (and required me to make all of them public), that would greatly change how I act online. Is the notion of an online identity affected by OCS telling all students seeking law firm positions to make their Facebook profiles as secret as possible?&lt;br /&gt;
*How does requiring a persistent identity mesh with policies behind law? Minors may have opportunity to expunge or seal criminal records under the concept of learning and youthful mistakes. However, this is a system completely controlled by the government. Given the nature of the Internet, it may be impossible to offer a similar service, as website could continue to cite the damages caused by an online user, who is easily traceable to a real world individual. If we could expunge a minor&#039;s record, do we want to? For security reasons, we may not want minors to be identified as such online. Therefore, people will treat an online identity that belongs to a minor as if it belonged to an adult. Similar to minor being held to adult standards when participating in adult activities under tort law, should we hold minors to adult standards if they are perceived as adults in the online realm (which would include not allowing their record to be erased)? &lt;br /&gt;
**Google CEO Eric Schmidt predicts, according to an August 4, 2010 interview in the WSJ, that &amp;quot;every young person one day will be entitled automatically to change his or her name on reaching adulthood in order to disown youthful hijinks stored on their friends&#039; social media sites.&amp;quot;  &lt;br /&gt;
**However, allowing someone upon turning 18 to disown &amp;quot;youthful hijinks&amp;quot; promotes a culture that separates consequences from actions. Instead of eliminating the past, why don&#039;t we provide it with more context? As a proposal, why don&#039;t we use the architecture/law prongs of the Lessig test to create a structure in which the online activities of an individual, from his first entry into the online world to the last, are stored on a server (this is extremely big brother-ish but let&#039;s just play this out). The user can establish as many identities online to represent themselves to other uses, but all of these identities are connected to the user&#039;s real world identity. All of the actions a user takes as a minor are branded as the actions of a minor. The way we would then use this information would be similar to a background or credit check. Employers looking to hire the user can request a report on his Internet activity. They would then receive a report that details his actions. This could either be exhaustive, a general overview, or just if others have complained about his actions. This report will indicate what the user did and when in his lifetime he did it. Therefore, if the user did something embarassing or bad, this report will provide more context than a mere Google search.&lt;br /&gt;
*In an [http://futureoftheinternet.org/reputation-bankruptcy article] on his blog, Professor Zittrain discusses the concept of reputation bankruptcy.&lt;br /&gt;
**I find the tie between the solution to identity issues and bankruptcy to be troubling. First off, one of the major problems with online reputation is not a completely toxic reputation, but a singular occasion of poor discretion or the malicious agendas of a few individuals. In the [http://www.washingtonpost.com/wp-dyn/content/article/2007/03/06/AR2007030602705.html AutoAdmit] case, users of a law school message board maliciously attacked a Yale Law student. These negative posts were among the first page of hits in a Google search of the student&#039;s name. The student received no offers from law firms and although no causal connection was proved, these negative posts could have been a reason why she did not receive offers. In cases like these, individuals need selective erasing of third party attacks or a past mistake that are unfair restrictions on a promising future. However, Professor Zittrain suggests that reputation bankruptcy could involve wiping everything cleaing, &amp;quot;throwing out the good along with the bad.&amp;quot; The new start of bankruptcy is a dramatic change and should be used for dire situations. For many cases, it may be a case of using a sledgehammer to kill a fly.&lt;br /&gt;
**Another concern is similar to the one I proposed to the idea of &amp;quot;disown[ing] youthful hijinks.&amp;quot; If someone can declare reputation bankruptcy&lt;br /&gt;
*How do we teach youths just entering the online world how to interact with it and maintain a praiseworthy identity? [WSJ&lt;br /&gt;
&#039;&#039;&#039;2. Facebook Profile Portability&#039;&#039;&#039;&lt;br /&gt;
Let&#039;s do more research into data portability as a privacy policy, which relates to above. Facebook could be a good case study.  What options and protections are there to port an online identity / profile i.e. Facebook messages, friend listings, and wall-postings?  What can and can not be permanently deleted?&lt;br /&gt;
* It has been argued that Facebook has created a &amp;quot;semipublic&amp;quot; shared space for exchange of information. [http://www.nytimes.com/2009/02/19/technology/internet/19facebook.html?_r=1 NYT] If I send a private message or make a post on my wall, such information would be owned by me. But what about posts made by other people on my wall, or pictures and video I have been tagged in?&lt;br /&gt;
** What happens to these shared data if I close my account?&lt;br /&gt;
** Should information uploaded by other people become part of my online identity? If I look at my facebook wall I can see that only a minor part of it is made of my own contribution. Would my online identity be the same without other people&#039;s contributions?&lt;br /&gt;
** And what about my posts on other people&#039;s wall? Are those part of my online identity? If we own our personal information, should we own also our posts on other people&#039;s walls?&lt;br /&gt;
** Let&#039;s assume we have complete online portability of our online identity, including material submitted by third parties: what are the privacy implication of this from a third party&#039;s perspective? Are we ok with the third party&#039;s posts and tagged pictures being transferred? Should the third party be notified? Should the third party give express consent?&lt;br /&gt;
&#039;&#039;&#039;3. Applying Privacy Policies Worldwide&#039;&#039;&#039;&lt;br /&gt;
What are the challenges social networks face at the international level and in countries other than the US?&lt;br /&gt;
* Are privacy policies adopted by social networks enforceable everywhere?&lt;br /&gt;
** Consider Facebook approach: Facebook adheres to the Safe Harbor framework developed between US and EU as regards the processing of users&#039; personal information. [http://www.export.gov/safeharbor/eu/eg_main_018476.asp Safe Harbor] Is this enough to shield Facebook from privacy claims coming from outside the US? What about countries outside the UE?&lt;br /&gt;
** Should Facebook be concerned at all about its international responsibility? Consider the case of the Google executives convicted in Italy for a breach of privacy legislation. Assuming the conviction is upheld in appeal, can it ever be enforced? Where are the offices of the company? Where are the servers? Where are the data actually stored and processed?&lt;br /&gt;
* More generally, what types of information created by users is &#039;personal data&#039; about which they have/should have a reasonable expectation of privacy and should be subject to regulation? &lt;br /&gt;
**The line between personal information about which people have a reasonable expectation of privacy and information that is not personal and that need not have restrictions relating to privacy can be a difficult one to define. For example, is information about how a driver drives a car that gets recorded on an in-car computer and potentially transmitted to a car rental or the car manufacturer &#039;personal&#039; information that is/should be covered by data protection laws? What about information that is picked up by google when taking images for google street view (e.g. IP addresses of neighbouring properties)? (See discussion in Information Commissioner’s Office (UK), Statement on Google Street View, August 2010). The problem is that in many cases this information on its own does not identify a particular individual but that it could be used in combination with other information to identify people. Yet when we use the internet so much information is created and it may not all be information that should be subject to privacy regulation.  See discussion about this problem in a New Zealand context in Review of the Privacy Act 1993, NZLC 17, Wellington, 2010 (Australia and the UK are considering similar issues).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;4. Cyber-security&#039;&#039;&#039;&lt;br /&gt;
* Cyber-space was first used by script-kiddies as a playground for web defacement, etc, then discovered by criminals as a new means to expand their activity followed by transnational crime syndicates, followed by hackers with a political - &amp;quot;hacktivists&amp;quot; - until eventually also government discovered cyber-space. Since the DDoS attacks on Estonian websites in 2007 pushed the issue in NATO circles, cyber-security has been increasingly in the headlines. A number of questions emerge from this:&lt;br /&gt;
* Real threat vs. threat inflation. How much of the what is written in newspaper articles and books is much ado about nothing and what can be considered a real risk? If there is a risk, is there also a threat? What determines what constitutes a threat? Richard Clarke&#039;s book &amp;quot;Cyber-war&amp;quot; paints a gloomy picture. Self-interest by an author working as a cyber-security consultant or is there more to it? &lt;br /&gt;
* Cyber-crime &amp;lt;-&amp;gt; cyber-espionage &amp;lt;-&amp;gt; cyber-hacktivism &amp;lt;-&amp;gt; cyber-terrorism &amp;lt;-&amp;gt; cyber-war (cyber-intrastate war/cyber-interstate war). Costs today? Costs tomorrow? Technical solutions? Policy/legal solutions? National/international level? State vs non-state actors? Public/private?&lt;br /&gt;
* Cyber-war vs. cyber-peace. Why is much of the literature using language such as &amp;quot;cyber-war&amp;quot;, &amp;quot;cyber-attack&amp;quot;, etc and not language such as &amp;quot;cyber-peace&amp;quot;, &amp;quot;cyber-cooperation&amp;quot;&lt;br /&gt;
* Terminology. What is the difference between a cyber-hacktivist and a cyber-terrorist? What constitutes a &amp;quot;cyber-attack&amp;quot;? Given cyber-space&#039;s virtual borderlessness is it appropriate to speak of defense/offense or active/passive (e.g. the Outer Space convention)? Is cyber-space a territorium like the High Seas, Antarctica or Outer Space? Or a new field after land (army), sea (navy), air (air force), cyber? Is cyberspace a &amp;quot;cultural heritage of mankind&amp;quot;? Relationship between virtual and kinetic.&lt;br /&gt;
* Civilian vs military. How is cyber-security changing the relationship between civilian and military? DoD is responsible to defend .mil, DHS responsible to defend .gov. What about the other domains? The German DoD is responsible to defend the German military network, the Ministry of Interior responsible for the government websites. How do civilian Ministries of Interior with police forces relate to a cyber-attack outside the country usually an international attack being the responsibility of the military branch of a democratic government? What are the lines of authority, e.g. for the planting of logic bombs or trapdoors?&lt;br /&gt;
* Role of private actors. How are ISPs, hardware and software companies integrated into the discussions/policy-/law-making process? How much power do they have? Allegiance to profit? Allegiance to country? Allegiance to open cyber-space? Are there public private partnerships? Do they work? What are their strengths/weaknesses?&lt;br /&gt;
* Role of hackers. In the early days, the battle was government vs. hacker or state vs. hacker guided by a hacker ethics. This was before the internet expanded around the globe and in the Western tradition of state vs individual. After the expansion, how has this relationship changed? Is there a transnational hacker-culture or are hackers of country X more closely aligned with government of country X vs hackers of country Y more closely aligned with government of country Y rather than hackers of X and Y aligned vs governments of X and Y? &lt;br /&gt;
* With the attribution problem and the transition problem (virtual-physical world) how much security is necessary and how much generativity possible? What can be done to reduce the risk? What can be done to reduce the threat? International convention? Code of conduct among major companies? International confidence-building measures?&lt;br /&gt;
* Enforcement. How could an international regime/agency look like solving the security dilemma? A cyber-IAEA?&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Group Two:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
-property&lt;br /&gt;
-online things acquiring IRL value&lt;br /&gt;
-what happens to digital possessions after death?&lt;br /&gt;
-who has access to your accounts (fb, twit, gmail, etc) after death&lt;br /&gt;
-(TOS after death)&lt;br /&gt;
-first sale doctrine in software&lt;br /&gt;
-first amendment rights with online comms (going through someone’s infrastructure)&lt;br /&gt;
&lt;br /&gt;
*[http://arstechnica.com/tech-policy/news/2010/03/death-and-social-media-what-happens-to-your-life-online.ars Ars Technica] article on how Facebook, MySpace, Twitter, and Google subsidiaries treat death.&lt;br /&gt;
* &#039;&#039;Speech, Censorship, Statistics.&#039;&#039; Should we be concerned with an ISPs&#039; and website owners&#039; ability to aggregate and control information and speech. It seems that at least Google thinks that Internet users may be concerned with this topic. Google recently announced the &amp;quot;Transparency Report,&amp;quot; which (incompletely) tracks usage statistics by country, as well as Google&#039;s removal of online material at the Government&#039;s request.[http://www.google.com/transparencyreport/ Google] How should corporations manage such governmental requests. What rules should it apply? How should it decide on a set of rules and whether they are catholic or case specific? What benefits are realized by providing publicly this information--particularly the tracking information? How can users or other entities use this information?&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Group Three:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
-liability for security breaches (negligent design/management)&lt;br /&gt;
-wikileaks! (jurisdictional problems, prosecution) (how does filtering affect wikileaks?)&lt;br /&gt;
-transparency on internet services (google: how does it work?)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1. Liability for Security Breaches and Flaws&#039;&#039;&#039;&lt;br /&gt;
*Software insecurity:&lt;br /&gt;
** Security guru Bruce Schneier has argued that imposing tort liability is desirable as a method of forcing vendors to internalize the costs of insecure software.  See [http://www.schneier.com/essay-025.html Liability Changes Everything] and [http://www.schneier.com/blog/archives/2004/11/computer_securi.html Computer Security and Liability].&lt;br /&gt;
***How convincing is his suggestion?  What sorts of costs would this impose on software companies?  Would such a rule drive small players out of the security market?  Would individual contributors to open source projects potentially face liability?&lt;br /&gt;
** Law professor Michael D. Scott makes a similar argument, and notes that Sarbanes-Oxley requires publicly traded companies to certify that their systems are secure, while imposing no obligations on the vendors who actually provide the software.  See [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1010069 Tort Liability for Vendors of Insecure Software: Has the Time Finally Come?]&lt;br /&gt;
&lt;br /&gt;
*Database insecurity:&lt;br /&gt;
** Summaries of a few recent cases that address database breaches: [http://www.sidley.com/files/News/97324419-8e7b-4c3b-93fa-166d4b2bafb3/Presentation/NewsAttachment/17f372d1-e3f6-4170-b914-37bb3d2d695b/PrivacyUpdate062609%25282%2529.pdf&amp;amp;sa=D&amp;amp;sntz=1&amp;amp;usg=AFQjCNGVbZLeoS0joQgDT7_gE5jF8w6ivg Developments in Data Breach Liability].&lt;br /&gt;
**Law professor Vincent R. Johnson argues that tort liability is an appropriate mechanism for creating incentives and managing risks associated with cybersecurity: [http://www.stmarytx.edu/law/pdf/Johnsoncyber.pdf Cybersecurity, Identity Theft, and the Limits of Tort Liability].  Some issues he raises:&lt;br /&gt;
***&#039;&#039;Duty to protect information&#039;&#039;: California&#039;s Security Breach Information Act imposes such a duty.  The obligations that Graham-Leach-Blilely imposes on financial institutions arguably support liability on a theory of negligence per se.&lt;br /&gt;
****Can market forces adequately address insufficient database security?&lt;br /&gt;
***&amp;quot;Duty to inform of security breaches&amp;quot;: This could be analogous to a failure to warn theory of negligence liability.&lt;br /&gt;
***The economic harms rule seems to impose a significant bar to recovery.  What about requiring the database-owner to pay for security monitoring?  A risk-creation theory might support this approach.&lt;br /&gt;
&lt;br /&gt;
--[[Special:Contributions/98.210.154.54|98.210.154.54]] 23:13, 21 September 2010 (UTC)Davis&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Group Four:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
-“to what extent is our judgment about tech related to the “coolness” of the tech itself?”&lt;br /&gt;
* &#039;&#039;&#039;User Satisfaction versus Company Profitability.&#039;&#039;&#039; Closed platforms like the iPhone present significant benefits at a cost. It may be helpful to frame benefits and costs in terms of user satisfaction and company profitability, rather than any particular feature of the device using the platform. We can, of course, ask about particular features that create or diminish user satisfaction or company profitability, but we won&#039;t talk about the features as if they confer some independent benefit. This is just a way of conceptualizing when society will tolerate certain technological constraints.&lt;br /&gt;
** &#039;&#039;The iPhone.&#039;&#039; Steve Jobs has a vision for the iPhone, and that includes regulating a large portion of what goes on and can go on the phone. Let&#039;s take a look at how the user satisfaction/company profitability model applies. &lt;br /&gt;
*** &#039;&#039;Profitability.&#039;&#039; The iPhone&#039;s closed platform provides at least two valuable and related benefits. First, it allows Apple to keep its operating environment &amp;quot;safe.&amp;quot; Without unauthorized third-party applications--i.e., with all apps being Apple-approved--there is less risk for the introduction and dissemination of malware. This reduces costs for Apple, which doesn&#039;t have to respond to consumers whose phones have been destroyed by viruses. A second related benefit is branding. Because Apple can keep its system closed, it can design the environment in which it operates and market that environment as a product. This design means Apple can extract profits form third-party apps by conditioning access upon, among other things, payment. It also makes the company more profitable because Apple can advertise and promote itself as a &amp;quot;safe&amp;quot; place that operates seamlessly. Nevertheless, this raises issues about how far Apple will regulate its platform. Will it simply condition access by third-party applications, or will it go further and monitor its users. If Jobs is concerned that users will upload pornographic pictures on his phone, will the future iPhone be programmed to identify automatically and remove or block such photos? Does Jobs&#039; vision relate to profitability, or simply personal preference? (This last question will be relevant to considering user satisfaction). &lt;br /&gt;
*** &#039;&#039;User Satisfaction.&#039;&#039; For most users, the iPhone&#039;s closed platform doesn&#039;t seem to cause any immediate problems. There are plenty of cool apps that individuals can download and use. The iPhone certainly scores high on aesthetics, even if some of its features are low on performance. Users tend to love aesthetics, and have overlooked the fact that, for instance, the iPhone can run only one program at a time. The closed platform&#039;s safety also provides a benefit to users, who don&#039;t have to worry about protecting their phones from malware. So far, user satisfaction is high. The balance between user satisfaction and profitability seems to be in equipoise--for now. The question for the future is whether Apple will close off more territory, and whether its current sectioning will stifle the actions of users in the future. As to the former, Apple might meet substantial resistance from the public if it begins regulating their private behavior more explicitly. As to the latter, the future is hard to predict. If users become more adept with their phones or demand new features that the closed system stifles, Apple may have to modify just &#039;how&#039; closed its system should be. Of course, it may respond by making even &amp;quot;cooler&amp;quot; design, thereby satisfying users sufficiently to distract attention from the new (or old) restrictions that remain in place. If consumers detect that Jobs&#039; personal preferences are dictating the ways they can use their phones, their dissatisfaction may win the day.&lt;br /&gt;
**[&#039;&#039;Please add another example.&#039;&#039;]&lt;br /&gt;
&lt;br /&gt;
-online transaction speed: feature or bug?&lt;br /&gt;
-lack of humans in online transactions: feature or bug?&lt;br /&gt;
- Computers and people gone wild! (please don’t google this)&lt;br /&gt;
&lt;br /&gt;
- Should everything be open-source?&lt;br /&gt;
* A closed platform means that things can be innovative only within a predetermined limit; that is, we can only work within the realm of the expected (e.g., apps for the iPhone). But some of the greatest innovations have changed the paradigm for innovation completely, the obvious example being the Internet. The cost of closed platforms is that we do not even know what we&#039;re missing -- are security and cool apps worth it?&lt;br /&gt;
** Alternatively, if everything &#039;&#039;were&#039;&#039; open-source, would we face some variant of the tragedy of the commons? (&#039;&#039;Tragedy of the commons&#039;&#039; -- In ye olde England, there was a public commons where everyone could let their cattle graze. But because it was a public space, no one took responsibility for it, so all the grass ran out and the place was a mess. Then the commons was privatized, and lo and behold, private ownership meant that the owner now had an investment and interest in the land, so the land became nice and green again. Even if the owner now charged people to let their cattle graze there. [http://en.wikipedia.org/wiki/Tragedy_of_the_commons])  Or is there something different about the ethos of the Internet, or about cyberspace as a &#039;&#039;space&#039;&#039;, that makes the tragedy of the commons a non-issue?&lt;/div&gt;</summary>
		<author><name>Andrewsegna</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/difficultproblems/?title=Class_2&amp;diff=74</id>
		<title>Class 2</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/difficultproblems/?title=Class_2&amp;diff=74"/>
		<updated>2010-09-24T21:36:48Z</updated>

		<summary type="html">&lt;p&gt;Andrewsegna: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Group One:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
-Identity revealed beyond your comfort zone (ex. WOW message boards: forced real identity).&lt;br /&gt;
-Can online identity be protected as a possession? Who owns profile pages?&lt;br /&gt;
-Data portability as a privacy policy (who owns shared data?)(single sign-in)(facebook &lt;br /&gt;
Connect)(OpenID)(persistent identity online).&lt;br /&gt;
-Cyberbullies, multiple identities online.&lt;br /&gt;
-How/can IRL ethics/morality be imposed in online spaces?  Should they be?&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1. The Right to Speak Anonymously&#039;&#039;&#039;&lt;br /&gt;
* It would seem that the easiest way to impose IRL ethics/morality in online spaces is to make our online identities tied more closely to our &#039;real&#039; identities. But at the extreme, with everyone having a single, unique online identity tied to something like Social Security numbers, we would be sacrificing our right to speak and act anonymously online. Is there a happy medium?&lt;br /&gt;
* Then again, it&#039;s likely that with cyberbullying, for example, that the kids being bullied know exactly who their antagonists are, meaning that anonymity is not at the heart of the problem. So what is? Is it a lack of consequences? Or consequences that, because they are in &#039;real&#039; life, are insufficiently tied to their online behavior?&lt;br /&gt;
** Although in some cases, such as the highly publicized [http://en.wikipedia.org/wiki/Megan_Meier Megan Meier case], it was not known who the cyberbully was. In fact, in that case, the &amp;quot;real world&amp;quot; bully was unknown in large part because the profile was of a fictitious person to mask the real identity of the bullies.&lt;br /&gt;
* Is the Right to Speak Anonymously (or even the Right to Freedom of Expression?) harmed by forcing online users to sign in with &amp;quot;real identities&amp;quot; (achieved by requiring either verified credit-card billing names, or in less strict cases Facebook Connect) to leave comments on newspaper websites rather than leaving them anonymously as common practice in the early days of the internet&lt;br /&gt;
** The analogy to traditional &#039;letters to the editor&#039; in print editions does not hold as it was much more difficult - if not impossible - to conduct a search of all the comments a given person had submitted to newspapers - in today&#039;s world, such as search would allow anyone to quickly pull together a portfolio of comments left by a given person across multiple publications.&lt;br /&gt;
** Another case to consider with anonymity and the internet is the situation where people seek to keep their real-world actions (part of their real-world identity) off the internet. We have discussed that online identities have been increasingly merging with real-world identities through the use of real names, photographs, etc. on Facebook and similar sites. We have also mentioned, in the context of WoW/XBOX among others, some people seeking to maintain fictitious or anonymous online identities. A recent Supreme Court decision in [http://www.supremecourt.gov/opinions/09pdf/09-559.pdf &#039;&#039;Doe v. Reed&#039;&#039;], however, considered when real-world acts are publicized, and importantly for our purposes publicized on the internet. In that case, petition signers hoping to repeal a Washington state law which granted same-sex couples rights akin to marriage sought to prohibit others from gaining access to the petitions under the First Amendment. Opponents of the petitions intended to put the names and addresses on the petitions online in a searchable format. The Supreme Court held that public disclosures of referendum petition signers and their addresses, on its face, did not present a First Amendment violation.&lt;br /&gt;
*What is the effectiveness though of a single, unique online identity?&lt;br /&gt;
*&#039;&#039;&#039;&#039;&#039;Possible case study: Microsoft&#039;s XBOX Live online service&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
**Microsoft&#039;s XBOX Live services assign users a unique online username that identifies the user across all the games and services offered by XBOX Live. This unified identity allows a user to easily maintain relationships with other users, compare past accomplishments and activities, and effectively establish an online community. &lt;br /&gt;
**From a Lessig framework, Microsoft has used 3 of the 4 regulators to motivate people to become attached to one identity and work hard to preserve its reputation.&lt;br /&gt;
***&#039;&#039;Norms&#039;&#039;: Microsoft allows users to rate other users and assign positive and negative feedback. Other users can easily access this information and determine if this is someone they want to associate with. A user&#039;s accomplishments and stats from playing games are tied to his unique identity, making it a valuable indicator of skill and status in the online community.&lt;br /&gt;
***&#039;&#039;Market&#039;&#039;: In order to acquire an XBOX Live account, a user must pay $60 for a year-long subscription. A subscription only gives a user access to one username and, therefore, one identity. If someone wanted to create another identity or if Microsoft banned a user from XBOX Live, that user would have to pay for another account.&lt;br /&gt;
***&#039;&#039;Architecture&#039;&#039;: Microsoft has built in the rating system listed above. As a closed platform, Microsoft also has the ability to ban a user from online activities. This would force the user to purchase another account and would prevent that user from associating himself or herself with past accomplishments and reputation. Given this ominous power, one should be extra careful not to do anything to warrant banning.&lt;br /&gt;
***&#039;&#039;Laws&#039;&#039;: nothing outside of normal tort laws&lt;br /&gt;
**Result: this requires more research and testing. However, common wisdom (note: this is from my own personal experience has someone who has played online and has read many opinions about the service) is that communication on XBOX Live is a morass of racist, sexist, and violent comments. Many individuals refuse to communicate online anymore. Despite all of Microsoft&#039;s safeguards, there is not an effective deterrant to this type of behavior.&lt;br /&gt;
*Are entities like Microsoft hampered by the fact that these online identities, in a sense, don&#039;t matter? If I have a unique XBOX Live identity, how am I harmed outside of the XBOX Live community if I act poorly online and am banned? This won&#039;t harm my relationships outside of this online realm or ability to get jobs.&lt;br /&gt;
*Do we need to make more &amp;quot;real world&amp;quot; ramifications? For example, if law firms required me to list my XBOX Live account name, my Facebook account URL, and my Twitter name (and required me to make all of them public), that would greatly change how I act online. Is the notion of an online identity affected by OCS telling all students seeking law firm positions to make their Facebook profiles as secret as possible?&lt;br /&gt;
*How does requiring a persistent identity mesh with policies behind law? Minors may have opportunity to expunge or seal criminal records under the concept of learning and youthful mistakes. However, this is a system completely controlled by the government. Given the nature of the Internet, it may be impossible to offer a similar service, as website could continue to cite the damages caused by an online user, who is easily traceable to a real world individual. If we could expunge a minor&#039;s record, do we want to? For security reasons, we may not want minors to be identified as such online. Therefore, people will treat an online identity that belongs to a minor as if it belonged to an adult. Similar to minor being held to adult standards when participating in adult activities under tort law, should we hold minors to adult standards if they are perceived as adults in the online realm (which would include not allowing their record to be erased)? &lt;br /&gt;
**Google CEO Eric Schmidt predicts, according to an August 4, 2010 interview in the WSJ, that &amp;quot;every young person one day will be entitled automatically to change his or her name on reaching adulthood in order to disown youthful hijinks stored on their friends&#039; social media sites.&amp;quot;  &lt;br /&gt;
**However, allowing someone upon turning 18 to disown &amp;quot;youthful hijinks&amp;quot; promotes a culture that separates consequences from actions. Instead of eliminating the past, why don&#039;t we provide it with more context? As a proposal, why don&#039;t we use the architecture/law prongs of the Lessig test to create a structure in which the online activities of an individual, from his first entry into the online world to the last, are stored on a server (this is extremely big brother-ish but let&#039;s just play this out). The user can establish as many identities online to represent themselves to other uses, but all of these identities are connected to the user&#039;s real world identity. All of the actions a user takes as a minor are branded as the actions of a minor. The way we would then use this information would be similar to a background or credit check. Employers looking to hire the user can request a report on his Internet activity. They would then receive a report that details his actions. This could either be exhaustive, a general overview, or just if others have complained about his actions. This report will indicate what the user did and when in his lifetime he did it. Therefore, if the user did something embarassing or bad, this report will provide more context than a mere Google search.&lt;br /&gt;
*In an [http://futureoftheinternet.org/reputation-bankruptcy article] on his blog, Professor Zittrain discusses the concept of reputation bankruptcy.&lt;br /&gt;
**I find the tie between the solution to identity issues and bankruptcy to be troubling. First off, one of the major problems with online reputation is not a completely toxic reputation, but a singular occasion of poor discretion or the malicious agendas of a few individuals. In the (http://www.washingtonpost.com/wp-dyn/content/article/2007/03/06/AR2007030602705.html AutoAdmit) case, users of a law school message board maliciously attacked a Yale Law student. These negative posts were among the first page of hits in a Google search of the student&#039;s name. The student received no offers from law firms and although no causal connection was proved, these negative posts could have been a reason why she did not receive offers. In cases like these, individuals need selective erasing of third party attacks or a past mistake that are unfair restrictions on a promising future. However, Professor Zittrain suggests that reputation bankruptcy could involve wiping everything cleaing, &amp;quot;throwing out the good along with the bad.&amp;quot; The new start of bankruptcy is a dramatic change and should be used for dire situations. For many cases, it may be a case of using a sledgehammer to kill a fly.&lt;br /&gt;
**Another concern is similar to the one I proposed to the idea of &amp;quot;disown[ing] youthful hijinks.&amp;quot; If someone can declare reputation bankruptcy&lt;br /&gt;
*How do we teach youths just entering the online world how to interact with it and maintain a praiseworthy identity? [WSJ&lt;br /&gt;
&#039;&#039;&#039;2. Facebook Profile Portability&#039;&#039;&#039;&lt;br /&gt;
Let&#039;s do more research into data portability as a privacy policy, which relates to above. Facebook could be a good case study.  What options and protections are there to port an online identity / profile i.e. Facebook messages, friend listings, and wall-postings?  What can and can not be permanently deleted?&lt;br /&gt;
* It has been argued that Facebook has created a &amp;quot;semipublic&amp;quot; shared space for exchange of information. [http://www.nytimes.com/2009/02/19/technology/internet/19facebook.html?_r=1 NYT] If I send a private message or make a post on my wall, such information would be owned by me. But what about posts made by other people on my wall, or pictures and video I have been tagged in?&lt;br /&gt;
** What happens to these shared data if I close my account?&lt;br /&gt;
** Should information uploaded by other people become part of my online identity? If I look at my facebook wall I can see that only a minor part of it is made of my own contribution. Would my online identity be the same without other people&#039;s contributions?&lt;br /&gt;
** And what about my posts on other people&#039;s wall? Are those part of my online identity? If we own our personal information, should we own also our posts on other people&#039;s walls?&lt;br /&gt;
** Let&#039;s assume we have complete online portability of our online identity, including material submitted by third parties: what are the privacy implication of this from a third party&#039;s perspective? Are we ok with the third party&#039;s posts and tagged pictures being transferred? Should the third party be notified? Should the third party give express consent?&lt;br /&gt;
&#039;&#039;&#039;3. Applying Privacy Policies Worldwide&#039;&#039;&#039;&lt;br /&gt;
What are the challenges social networks face at the international level and in countries other than the US?&lt;br /&gt;
* Are privacy policies adopted by social networks enforceable everywhere?&lt;br /&gt;
** Consider Facebook approach: Facebook adheres to the Safe Harbor framework developed between US and EU as regards the processing of users&#039; personal information. [http://www.export.gov/safeharbor/eu/eg_main_018476.asp Safe Harbor] Is this enough to shield Facebook from privacy claims coming from outside the US? What about countries outside the UE?&lt;br /&gt;
** Should Facebook be concerned at all about its international responsibility? Consider the case of the Google executives convicted in Italy for a breach of privacy legislation. Assuming the conviction is upheld in appeal, can it ever be enforced? Where are the offices of the company? Where are the servers? Where are the data actually stored and processed?&lt;br /&gt;
* More generally, what types of information created by users is &#039;personal data&#039; about which they have/should have a reasonable expectation of privacy and should be subject to regulation? &lt;br /&gt;
**The line between personal information about which people have a reasonable expectation of privacy and information that is not personal and that need not have restrictions relating to privacy can be a difficult one to define. For example, is information about how a driver drives a car that gets recorded on an in-car computer and potentially transmitted to a car rental or the car manufacturer &#039;personal&#039; information that is/should be covered by data protection laws? What about information that is picked up by google when taking images for google street view (e.g. IP addresses of neighbouring properties)? (See discussion in Information Commissioner’s Office (UK), Statement on Google Street View, August 2010). The problem is that in many cases this information on its own does not identify a particular individual but that it could be used in combination with other information to identify people. Yet when we use the internet so much information is created and it may not all be information that should be subject to privacy regulation.  See discussion about this problem in a New Zealand context in Review of the Privacy Act 1993, NZLC 17, Wellington, 2010 (Australia and the UK are considering similar issues).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;4. Cyber-security&#039;&#039;&#039;&lt;br /&gt;
* Cyber-space was first used by script-kiddies as a playground for web defacement, etc, then discovered by criminals as a new means to expand their activity followed by transnational crime syndicates, followed by hackers with a political - &amp;quot;hacktivists&amp;quot; - until eventually also government discovered cyber-space. Since the DDoS attacks on Estonian websites in 2007 pushed the issue in NATO circles, cyber-security has been increasingly in the headlines. A number of questions emerge from this:&lt;br /&gt;
* Real threat vs. threat inflation. How much of the what is written in newspaper articles and books is much ado about nothing and what can be considered a real risk? If there is a risk, is there also a threat? What determines what constitutes a threat? Richard Clarke&#039;s book &amp;quot;Cyber-war&amp;quot; paints a gloomy picture. Self-interest by an author working as a cyber-security consultant or is there more to it? &lt;br /&gt;
* Cyber-crime &amp;lt;-&amp;gt; cyber-espionage &amp;lt;-&amp;gt; cyber-hacktivism &amp;lt;-&amp;gt; cyber-terrorism &amp;lt;-&amp;gt; cyber-war (cyber-intrastate war/cyber-interstate war). Costs today? Costs tomorrow? Technical solutions? Policy/legal solutions? National/international level? State vs non-state actors? Public/private?&lt;br /&gt;
* Cyber-war vs. cyber-peace. Why is much of the literature using language such as &amp;quot;cyber-war&amp;quot;, &amp;quot;cyber-attack&amp;quot;, etc and not language such as &amp;quot;cyber-peace&amp;quot;, &amp;quot;cyber-cooperation&amp;quot;&lt;br /&gt;
* Terminology. What is the difference between a cyber-hacktivist and a cyber-terrorist? What constitutes a &amp;quot;cyber-attack&amp;quot;? Given cyber-space&#039;s virtual borderlessness is it appropriate to speak of defense/offense or active/passive (e.g. the Outer Space convention)? Is cyber-space a territorium like the High Seas, Antarctica or Outer Space? Or a new field after land (army), sea (navy), air (air force), cyber? Is cyberspace a &amp;quot;cultural heritage of mankind&amp;quot;? Relationship between virtual and kinetic.&lt;br /&gt;
* Civilian vs military. How is cyber-security changing the relationship between civilian and military? DoD is responsible to defend .mil, DHS responsible to defend .gov. What about the other domains? The German DoD is responsible to defend the German military network, the Ministry of Interior responsible for the government websites. How do civilian Ministries of Interior with police forces relate to a cyber-attack outside the country usually an international attack being the responsibility of the military branch of a democratic government? What are the lines of authority, e.g. for the planting of logic bombs or trapdoors?&lt;br /&gt;
* Role of private actors. How are ISPs, hardware and software companies integrated into the discussions/policy-/law-making process? How much power do they have? Allegiance to profit? Allegiance to country? Allegiance to open cyber-space? Are there public private partnerships? Do they work? What are their strengths/weaknesses?&lt;br /&gt;
* Role of hackers. In the early days, the battle was government vs. hacker or state vs. hacker guided by a hacker ethics. This was before the internet expanded around the globe and in the Western tradition of state vs individual. After the expansion, how has this relationship changed? Is there a transnational hacker-culture or are hackers of country X more closely aligned with government of country X vs hackers of country Y more closely aligned with government of country Y rather than hackers of X and Y aligned vs governments of X and Y? &lt;br /&gt;
* With the attribution problem and the transition problem (virtual-physical world) how much security is necessary and how much generativity possible? What can be done to reduce the risk? What can be done to reduce the threat? International convention? Code of conduct among major companies? International confidence-building measures?&lt;br /&gt;
* Enforcement. How could an international regime/agency look like solving the security dilemma? A cyber-IAEA?&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Group Two:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
-property&lt;br /&gt;
-online things acquiring IRL value&lt;br /&gt;
-what happens to digital possessions after death?&lt;br /&gt;
-who has access to your accounts (fb, twit, gmail, etc) after death&lt;br /&gt;
-(TOS after death)&lt;br /&gt;
-first sale doctrine in software&lt;br /&gt;
-first amendment rights with online comms (going through someone’s infrastructure)&lt;br /&gt;
&lt;br /&gt;
*[http://arstechnica.com/tech-policy/news/2010/03/death-and-social-media-what-happens-to-your-life-online.ars Ars Technica] article on how Facebook, MySpace, Twitter, and Google subsidiaries treat death.&lt;br /&gt;
* &#039;&#039;Speech, Censorship, Statistics.&#039;&#039; Should we be concerned with an ISPs&#039; and website owners&#039; ability to aggregate and control information and speech. It seems that at least Google thinks that Internet users may be concerned with this topic. Google recently announced the &amp;quot;Transparency Report,&amp;quot; which (incompletely) tracks usage statistics by country, as well as Google&#039;s removal of online material at the Government&#039;s request.[http://www.google.com/transparencyreport/ Google] How should corporations manage such governmental requests. What rules should it apply? How should it decide on a set of rules and whether they are catholic or case specific? What benefits are realized by providing publicly this information--particularly the tracking information? How can users or other entities use this information?&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Group Three:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
-liability for security breaches (negligent design/management)&lt;br /&gt;
-wikileaks! (jurisdictional problems, prosecution) (how does filtering affect wikileaks?)&lt;br /&gt;
-transparency on internet services (google: how does it work?)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1. Liability for Security Breaches and Flaws&#039;&#039;&#039;&lt;br /&gt;
*Software insecurity:&lt;br /&gt;
** Security guru Bruce Schneier has argued that imposing tort liability is desirable as a method of forcing vendors to internalize the costs of insecure software.  See [http://www.schneier.com/essay-025.html Liability Changes Everything] and [http://www.schneier.com/blog/archives/2004/11/computer_securi.html Computer Security and Liability].&lt;br /&gt;
***How convincing is his suggestion?  What sorts of costs would this impose on software companies?  Would such a rule drive small players out of the security market?  Would individual contributors to open source projects potentially face liability?&lt;br /&gt;
** Law professor Michael D. Scott makes a similar argument, and notes that Sarbanes-Oxley requires publicly traded companies to certify that their systems are secure, while imposing no obligations on the vendors who actually provide the software.  See [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1010069 Tort Liability for Vendors of Insecure Software: Has the Time Finally Come?]&lt;br /&gt;
&lt;br /&gt;
*Database insecurity:&lt;br /&gt;
** Summaries of a few recent cases that address database breaches: [http://www.sidley.com/files/News/97324419-8e7b-4c3b-93fa-166d4b2bafb3/Presentation/NewsAttachment/17f372d1-e3f6-4170-b914-37bb3d2d695b/PrivacyUpdate062609%25282%2529.pdf&amp;amp;sa=D&amp;amp;sntz=1&amp;amp;usg=AFQjCNGVbZLeoS0joQgDT7_gE5jF8w6ivg Developments in Data Breach Liability].&lt;br /&gt;
**Law professor Vincent R. Johnson argues that tort liability is an appropriate mechanism for creating incentives and managing risks associated with cybersecurity: [http://www.stmarytx.edu/law/pdf/Johnsoncyber.pdf Cybersecurity, Identity Theft, and the Limits of Tort Liability].  Some issues he raises:&lt;br /&gt;
***&#039;&#039;Duty to protect information&#039;&#039;: California&#039;s Security Breach Information Act imposes such a duty.  The obligations that Graham-Leach-Blilely imposes on financial institutions arguably support liability on a theory of negligence per se.&lt;br /&gt;
****Can market forces adequately address insufficient database security?&lt;br /&gt;
***&amp;quot;Duty to inform of security breaches&amp;quot;: This could be analogous to a failure to warn theory of negligence liability.&lt;br /&gt;
***The economic harms rule seems to impose a significant bar to recovery.  What about requiring the database-owner to pay for security monitoring?  A risk-creation theory might support this approach.&lt;br /&gt;
&lt;br /&gt;
--[[Special:Contributions/98.210.154.54|98.210.154.54]] 23:13, 21 September 2010 (UTC)Davis&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Group Four:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
-“to what extent is our judgment about tech related to the “coolness” of the tech itself?”&lt;br /&gt;
* &#039;&#039;&#039;User Satisfaction versus Company Profitability.&#039;&#039;&#039; Closed platforms like the iPhone present significant benefits at a cost. It may be helpful to frame benefits and costs in terms of user satisfaction and company profitability, rather than any particular feature of the device using the platform. We can, of course, ask about particular features that create or diminish user satisfaction or company profitability, but we won&#039;t talk about the features as if they confer some independent benefit. This is just a way of conceptualizing when society will tolerate certain technological constraints.&lt;br /&gt;
** &#039;&#039;The iPhone.&#039;&#039; Steve Jobs has a vision for the iPhone, and that includes regulating a large portion of what goes on and can go on the phone. Let&#039;s take a look at how the user satisfaction/company profitability model applies. &lt;br /&gt;
*** &#039;&#039;Profitability.&#039;&#039; The iPhone&#039;s closed platform provides at least two valuable and related benefits. First, it allows Apple to keep its operating environment &amp;quot;safe.&amp;quot; Without unauthorized third-party applications--i.e., with all apps being Apple-approved--there is less risk for the introduction and dissemination of malware. This reduces costs for Apple, which doesn&#039;t have to respond to consumers whose phones have been destroyed by viruses. A second related benefit is branding. Because Apple can keep its system closed, it can design the environment in which it operates and market that environment as a product. This design means Apple can extract profits form third-party apps by conditioning access upon, among other things, payment. It also makes the company more profitable because Apple can advertise and promote itself as a &amp;quot;safe&amp;quot; place that operates seamlessly. Nevertheless, this raises issues about how far Apple will regulate its platform. Will it simply condition access by third-party applications, or will it go further and monitor its users. If Jobs is concerned that users will upload pornographic pictures on his phone, will the future iPhone be programmed to identify automatically and remove or block such photos? Does Jobs&#039; vision relate to profitability, or simply personal preference? (This last question will be relevant to considering user satisfaction). &lt;br /&gt;
*** &#039;&#039;User Satisfaction.&#039;&#039; For most users, the iPhone&#039;s closed platform doesn&#039;t seem to cause any immediate problems. There are plenty of cool apps that individuals can download and use. The iPhone certainly scores high on aesthetics, even if some of its features are low on performance. Users tend to love aesthetics, and have overlooked the fact that, for instance, the iPhone can run only one program at a time. The closed platform&#039;s safety also provides a benefit to users, who don&#039;t have to worry about protecting their phones from malware. So far, user satisfaction is high. The balance between user satisfaction and profitability seems to be in equipoise--for now. The question for the future is whether Apple will close off more territory, and whether its current sectioning will stifle the actions of users in the future. As to the former, Apple might meet substantial resistance from the public if it begins regulating their private behavior more explicitly. As to the latter, the future is hard to predict. If users become more adept with their phones or demand new features that the closed system stifles, Apple may have to modify just &#039;how&#039; closed its system should be. Of course, it may respond by making even &amp;quot;cooler&amp;quot; design, thereby satisfying users sufficiently to distract attention from the new (or old) restrictions that remain in place. If consumers detect that Jobs&#039; personal preferences are dictating the ways they can use their phones, their dissatisfaction may win the day.&lt;br /&gt;
**[&#039;&#039;Please add another example.&#039;&#039;]&lt;br /&gt;
&lt;br /&gt;
-online transaction speed: feature or bug?&lt;br /&gt;
-lack of humans in online transactions: feature or bug?&lt;br /&gt;
- Computers and people gone wild! (please don’t google this)&lt;br /&gt;
&lt;br /&gt;
- Should everything be open-source?&lt;br /&gt;
* A closed platform means that things can be innovative only within a predetermined limit; that is, we can only work within the realm of the expected (e.g., apps for the iPhone). But some of the greatest innovations have changed the paradigm for innovation completely, the obvious example being the Internet. The cost of closed platforms is that we do not even know what we&#039;re missing -- are security and cool apps worth it?&lt;br /&gt;
** Alternatively, if everything &#039;&#039;were&#039;&#039; open-source, would we face some variant of the tragedy of the commons? (&#039;&#039;Tragedy of the commons&#039;&#039; -- In ye olde England, there was a public commons where everyone could let their cattle graze. But because it was a public space, no one took responsibility for it, so all the grass ran out and the place was a mess. Then the commons was privatized, and lo and behold, private ownership meant that the owner now had an investment and interest in the land, so the land became nice and green again. Even if the owner now charged people to let their cattle graze there. [http://en.wikipedia.org/wiki/Tragedy_of_the_commons])  Or is there something different about the ethos of the Internet, or about cyberspace as a &#039;&#039;space&#039;&#039;, that makes the tragedy of the commons a non-issue?&lt;/div&gt;</summary>
		<author><name>Andrewsegna</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/difficultproblems/?title=Class_2&amp;diff=73</id>
		<title>Class 2</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/difficultproblems/?title=Class_2&amp;diff=73"/>
		<updated>2010-09-24T14:40:17Z</updated>

		<summary type="html">&lt;p&gt;Andrewsegna: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Group One:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
-Identity revealed beyond your comfort zone (ex. WOW message boards: forced real identity).&lt;br /&gt;
-Can online identity be protected as a possession? Who owns profile pages?&lt;br /&gt;
-Data portability as a privacy policy (who owns shared data?)(single sign-in)(facebook &lt;br /&gt;
Connect)(OpenID)(persistent identity online).&lt;br /&gt;
-Cyberbullies, multiple identities online.&lt;br /&gt;
-How/can IRL ethics/morality be imposed in online spaces?  Should they be?&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1. The Right to Speak Anonymously&#039;&#039;&#039;&lt;br /&gt;
* It would seem that the easiest way to impose IRL ethics/morality in online spaces is to make our online identities tied more closely to our &#039;real&#039; identities. But at the extreme, with everyone having a single, unique online identity tied to something like Social Security numbers, we would be sacrificing our right to speak and act anonymously online. Is there a happy medium?&lt;br /&gt;
* Then again, it&#039;s likely that with cyberbullying, for example, that the kids being bullied know exactly who their antagonists are, meaning that anonymity is not at the heart of the problem. So what is? Is it a lack of consequences? Or consequences that, because they are in &#039;real&#039; life, are insufficiently tied to their online behavior?&lt;br /&gt;
** Although in some cases, such as the highly publicized [http://en.wikipedia.org/wiki/Megan_Meier Megan Meier case], it was not known who the cyberbully was. In fact, in that case, the &amp;quot;real world&amp;quot; bully was unknown in large part because the profile was of a fictitious person to mask the real identity of the bullies.&lt;br /&gt;
* Is the Right to Speak Anonymously (or even the Right to Freedom of Expression?) harmed by forcing online users to sign in with &amp;quot;real identities&amp;quot; (achieved by requiring either verified credit-card billing names, or in less strict cases Facebook Connect) to leave comments on newspaper websites rather than leaving them anonymously as common practice in the early days of the internet&lt;br /&gt;
** The analogy to traditional &#039;letters to the editor&#039; in print editions does not hold as it was much more difficult - if not impossible - to conduct a search of all the comments a given person had submitted to newspapers - in today&#039;s world, such as search would allow anyone to quickly pull together a portfolio of comments left by a given person across multiple publications.&lt;br /&gt;
** Another case to consider with anonymity and the internet is the situation where people seek to keep their real-world actions (part of their real-world identity) off the internet. We have discussed that online identities have been increasingly merging with real-world identities through the use of real names, photographs, etc. on Facebook and similar sites. We have also mentioned, in the context of WoW/XBOX among others, some people seeking to maintain fictitious or anonymous online identities. A recent Supreme Court decision in [http://www.supremecourt.gov/opinions/09pdf/09-559.pdf &#039;&#039;Doe v. Reed&#039;&#039;], however, considered when real-world acts are publicized, and importantly for our purposes publicized on the internet. In that case, petition signers hoping to repeal a Washington state law which granted same-sex couples rights akin to marriage sought to prohibit others from gaining access to the petitions under the First Amendment. Opponents of the petitions intended to put the names and addresses on the petitions online in a searchable format. The Supreme Court held that public disclosures of referendum petition signers and their addresses, on its face, did not present a First Amendment violation.&lt;br /&gt;
*What is the effectiveness though of a single, unique online identity?&lt;br /&gt;
*&#039;&#039;&#039;&#039;&#039;Possible case study: Microsoft&#039;s XBOX Live online service&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
**Microsoft&#039;s XBOX Live services assign users a unique online username that identifies the user across all the games and services offered by XBOX Live. This unified identity allows a user to easily maintain relationships with other users, compare past accomplishments and activities, and effectively establish an online community. &lt;br /&gt;
**From a Lessig framework, Microsoft has used 3 of the 4 regulators to motivate people to become attached to one identity and work hard to preserve its reputation.&lt;br /&gt;
***&#039;&#039;Norms&#039;&#039;: Microsoft allows users to rate other users and assign positive and negative feedback. Other users can easily access this information and determine if this is someone they want to associate with. A user&#039;s accomplishments and stats from playing games are tied to his unique identity, making it a valuable indicator of skill and status in the online community.&lt;br /&gt;
***&#039;&#039;Market&#039;&#039;: In order to acquire an XBOX Live account, a user must pay $60 for a year-long subscription. A subscription only gives a user access to one username and, therefore, one identity. If someone wanted to create another identity or if Microsoft banned a user from XBOX Live, that user would have to pay for another account.&lt;br /&gt;
***&#039;&#039;Architecture&#039;&#039;: Microsoft has built in the rating system listed above. As a closed platform, Microsoft also has the ability to ban a user from online activities. This would force the user to purchase another account and would prevent that user from associating himself or herself with past accomplishments and reputation. Given this ominous power, one should be extra careful not to do anything to warrant banning.&lt;br /&gt;
***&#039;&#039;Laws&#039;&#039;: nothing outside of normal tort laws&lt;br /&gt;
**Result: this requires more research and testing. However, common wisdom (note: this is from my own personal experience has someone who has played online and has read many opinions about the service) is that communication on XBOX Live is a morass of racist, sexist, and violent comments. Many individuals refuse to communicate online anymore. Despite all of Microsoft&#039;s safeguards, there is not an effective deterrant to this type of behavior.&lt;br /&gt;
*Are entities like Microsoft hampered by the fact that these online identities, in a sense, don&#039;t matter? If I have a unique XBOX Live identity, how am I harmed outside of the XBOX Live community if I act poorly online and am banned? This won&#039;t harm my relationships outside of this online realm or ability to get jobs.&lt;br /&gt;
*Do we need to make more &amp;quot;real world&amp;quot; ramifications? For example, if law firms required me to list my XBOX Live account name, my Facebook account URL, and my Twitter name (and required me to make all of them public), that would greatly change how I act online. Is the notion of an online identity affected by OCS telling all students seeking law firm positions to make their Facebook profiles as secret as possible?&lt;br /&gt;
*How does requiring a persistent identity mesh with policies behind law? Minors may have opportunity to expunge or seal criminal records under the concept of learning and youthful mistakes. However, this is a system completely controlled by the government. Given the nature of the Internet, it may be impossible to offer a similar service, as website could continue to cite the damages caused by an online user, who is easily traceable to a real world individual. If we could expunge a minor&#039;s record, do we want to? For security reasons, we may not want minors to be identified as such online. Therefore, people will treat an online identity that belongs to a minor as if it belonged to an adult. Similar to minor being held to adult standards when participating in adult activities under tort law, should we hold minors to adult standards if they are perceived as adults in the online realm (which would include not allowing their record to be erased)? &lt;br /&gt;
**Google CEO Eric Schmidt predicts, according to an August 4, 2010 interview in the WSJ, that &amp;quot;every young person one day will be entitled automatically to change his or her name on reaching adulthood in order to disown youthful hijinks stored on their friends&#039; social media sites.&amp;quot;  &lt;br /&gt;
**However, allowing someone upon turning 18 to disown &amp;quot;youthful hijinks&amp;quot; promotes a culture that separates consequences from actions. Instead of eliminating the past, why don&#039;t we provide it with more context? As a proposal, why don&#039;t we use the architecture/law prongs of the Lessig test to create a structure in which the online activities of an individual, from his first entry into the online world to the last, are stored on a server (this is extremely big brother-ish but let&#039;s just play this out). The user can establish as many identities online to represent themselves to other uses, but all of these identities are connected to the user&#039;s real world identity. All of the actions a user takes as a minor are branded as the actions of a minor. The way we would then use this information would be similar to a background or credit check. Employers looking to hire the user can request a report on his Internet activity. They would then receive a report that details his actions. This could either be exhaustive, a general overview, or just if others have complained about his actions. This report will indicate what the user did and when in his lifetime he did it. Therefore, if the user did something embarassing or bad, this report will provide more context than a mere Google search.&lt;br /&gt;
*How do we teach youths just entering the online world how to interact with it and maintain a praiseworthy identity? [WSJ&lt;br /&gt;
&#039;&#039;&#039;2. Facebook Profile Portability&#039;&#039;&#039;&lt;br /&gt;
Let&#039;s do more research into data portability as a privacy policy, which relates to above. Facebook could be a good case study.  What options and protections are there to port an online identity / profile i.e. Facebook messages, friend listings, and wall-postings?  What can and can not be permanently deleted?&lt;br /&gt;
* It has been argued that Facebook has created a &amp;quot;semipublic&amp;quot; shared space for exchange of information. [http://www.nytimes.com/2009/02/19/technology/internet/19facebook.html?_r=1 NYT] If I send a private message or make a post on my wall, such information would be owned by me. But what about posts made by other people on my wall, or pictures and video I have been tagged in?&lt;br /&gt;
** What happens to these shared data if I close my account?&lt;br /&gt;
** Should information uploaded by other people become part of my online identity? If I look at my facebook wall I can see that only a minor part of it is made of my own contribution. Would my online identity be the same without other people&#039;s contributions?&lt;br /&gt;
** And what about my posts on other people&#039;s wall? Are those part of my online identity? If we own our personal information, should we own also our posts on other people&#039;s walls?&lt;br /&gt;
** Let&#039;s assume we have complete online portability of our online identity, including material submitted by third parties: what are the privacy implication of this from a third party&#039;s perspective? Are we ok with the third party&#039;s posts and tagged pictures being transferred? Should the third party be notified? Should the third party give express consent?&lt;br /&gt;
&#039;&#039;&#039;3. Applying Privacy Policies Worldwide&#039;&#039;&#039;&lt;br /&gt;
What are the challenges social networks face at the international level and in countries other than the US?&lt;br /&gt;
* Are privacy policies adopted by social networks enforceable everywhere?&lt;br /&gt;
** Consider Facebook approach: Facebook adheres to the Safe Harbor framework developed between US and EU as regards the processing of users&#039; personal information. [http://www.export.gov/safeharbor/eu/eg_main_018476.asp Safe Harbor] Is this enough to shield Facebook from privacy claims coming from outside the US? What about countries outside the UE?&lt;br /&gt;
** Should Facebook be concerned at all about its international responsibility? Consider the case of the Google executives convicted in Italy for a breach of privacy legislation. Assuming the conviction is upheld in appeal, can it ever be enforced? Where are the offices of the company? Where are the servers? Where are the data actually stored and processed?&lt;br /&gt;
* More generally, what types of information created by users is &#039;personal data&#039; about which they have/should have a reasonable expectation of privacy and should be subject to regulation? &lt;br /&gt;
**The line between personal information about which people have a reasonable expectation of privacy and information that is not personal and that need not have restrictions relating to privacy can be a difficult one to define. For example, is information about how a driver drives a car that gets recorded on an in-car computer and potentially transmitted to a car rental or the car manufacturer &#039;personal&#039; information that is/should be covered by data protection laws? What about information that is picked up by google when taking images for google street view (e.g. IP addresses of neighbouring properties)? (See discussion in Information Commissioner’s Office (UK), Statement on Google Street View, August 2010). The problem is that in many cases this information on its own does not identify a particular individual but that it could be used in combination with other information to identify people. Yet when we use the internet so much information is created and it may not all be information that should be subject to privacy regulation.  See discussion about this problem in a New Zealand context in Review of the Privacy Act 1993, NZLC 17, Wellington, 2010 (Australia and the UK are considering similar issues).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;4. Cyber-security&#039;&#039;&#039;&lt;br /&gt;
* Cyber-space was first used by script-kiddies as a playground for web defacement, etc, then discovered by criminals as a new means to expand their activity followed by transnational crime syndicates, followed by hackers with a political - &amp;quot;hacktivists&amp;quot; - until eventually also government discovered cyber-space. Since the DDoS attacks on Estonian websites in 2007 pushed the issue in NATO circles, cyber-security has been increasingly in the headlines. A number of questions emerge from this:&lt;br /&gt;
* Real threat vs. threat inflation. How much of the what is written in newspaper articles and books is much ado about nothing and what can be considered a real risk? If there is a risk, is there also a threat? What determines what constitutes a threat? Richard Clarke&#039;s book &amp;quot;Cyber-war&amp;quot; paints a gloomy picture. Self-interest by an author working as a cyber-security consultant or is there more to it? &lt;br /&gt;
* Cyber-crime &amp;lt;-&amp;gt; cyber-espionage &amp;lt;-&amp;gt; cyber-hacktivism &amp;lt;-&amp;gt; cyber-terrorism &amp;lt;-&amp;gt; cyber-war (cyber-intrastate war/cyber-interstate war). Costs today? Costs tomorrow? Technical solutions? Policy/legal solutions? National/international level? State vs non-state actors? Public/private?&lt;br /&gt;
* Cyber-war vs. cyber-peace. Why is much of the literature using language such as &amp;quot;cyber-war&amp;quot;, &amp;quot;cyber-attack&amp;quot;, etc and not language such as &amp;quot;cyber-peace&amp;quot;, &amp;quot;cyber-cooperation&amp;quot;&lt;br /&gt;
* Terminology. What is the difference between a cyber-hacktivist and a cyber-terrorist? What constitutes a &amp;quot;cyber-attack&amp;quot;? Given cyber-space&#039;s virtual borderlessness is it appropriate to speak of defense/offense or active/passive (e.g. the Outer Space convention)? Is cyber-space a territorium like the High Seas, Antarctica or Outer Space? Or a new field after land (army), sea (navy), air (air force), cyber? Is cyberspace a &amp;quot;cultural heritage of mankind&amp;quot;? Relationship between virtual and kinetic.&lt;br /&gt;
* Civilian vs military. How is cyber-security changing the relationship between civilian and military? DoD is responsible to defend .mil, DHS responsible to defend .gov. What about the other domains? The German DoD is responsible to defend the German military network, the Ministry of Interior responsible for the government websites. How do civilian Ministries of Interior with police forces relate to a cyber-attack outside the country usually an international attack being the responsibility of the military branch of a democratic government? What are the lines of authority, e.g. for the planting of logic bombs or trapdoors?&lt;br /&gt;
* Role of private actors. How are ISPs, hardware and software companies integrated into the discussions/policy-/law-making process? How much power do they have? Allegiance to profit? Allegiance to country? Allegiance to open cyber-space? Are there public private partnerships? Do they work? What are their strengths/weaknesses?&lt;br /&gt;
* Role of hackers. In the early days, the battle was government vs. hacker or state vs. hacker guided by a hacker ethics. This was before the internet expanded around the globe and in the Western tradition of state vs individual. After the expansion, how has this relationship changed? Is there a transnational hacker-culture or are hackers of country X more closely aligned with government of country X vs hackers of country Y more closely aligned with government of country Y rather than hackers of X and Y aligned vs governments of X and Y? &lt;br /&gt;
* With the attribution problem and the transition problem (virtual-physical world) how much security is necessary and how much generativity possible? What can be done to reduce the risk? What can be done to reduce the threat? International convention? Code of conduct among major companies? International confidence-building measures?&lt;br /&gt;
* Enforcement. How could an international regime/agency look like solving the security dilemma? A cyber-IAEA?&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Group Two:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
-property&lt;br /&gt;
-online things acquiring IRL value&lt;br /&gt;
-what happens to digital possessions after death?&lt;br /&gt;
-who has access to your accounts (fb, twit, gmail, etc) after death&lt;br /&gt;
-(TOS after death)&lt;br /&gt;
-first sale doctrine in software&lt;br /&gt;
-first amendment rights with online comms (going through someone’s infrastructure)&lt;br /&gt;
&lt;br /&gt;
*[http://arstechnica.com/tech-policy/news/2010/03/death-and-social-media-what-happens-to-your-life-online.ars Ars Technica] article on how Facebook, MySpace, Twitter, and Google subsidiaries treat death.&lt;br /&gt;
* &#039;&#039;Speech, Censorship, Statistics.&#039;&#039; Should we be concerned with an ISPs&#039; and website owners&#039; ability to aggregate and control information and speech. It seems that at least Google thinks that Internet users may be concerned with this topic. Google recently announced the &amp;quot;Transparency Report,&amp;quot; which (incompletely) tracks usage statistics by country, as well as Google&#039;s removal of online material at the Government&#039;s request.[http://www.google.com/transparencyreport/ Google] How should corporations manage such governmental requests. What rules should it apply? How should it decide on a set of rules and whether they are catholic or case specific? What benefits are realized by providing publicly this information--particularly the tracking information? How can users or other entities use this information?&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Group Three:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
-liability for security breaches (negligent design/management)&lt;br /&gt;
-wikileaks! (jurisdictional problems, prosecution) (how does filtering affect wikileaks?)&lt;br /&gt;
-transparency on internet services (google: how does it work?)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1. Liability for Security Breaches and Flaws&#039;&#039;&#039;&lt;br /&gt;
*Software insecurity:&lt;br /&gt;
** Security guru Bruce Schneier has argued that imposing tort liability is desirable as a method of forcing vendors to internalize the costs of insecure software.  See [http://www.schneier.com/essay-025.html Liability Changes Everything] and [http://www.schneier.com/blog/archives/2004/11/computer_securi.html Computer Security and Liability].&lt;br /&gt;
***How convincing is his suggestion?  What sorts of costs would this impose on software companies?  Would such a rule drive small players out of the security market?  Would individual contributors to open source projects potentially face liability?&lt;br /&gt;
** Law professor Michael D. Scott makes a similar argument, and notes that Sarbanes-Oxley requires publicly traded companies to certify that their systems are secure, while imposing no obligations on the vendors who actually provide the software.  See [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1010069 Tort Liability for Vendors of Insecure Software: Has the Time Finally Come?]&lt;br /&gt;
&lt;br /&gt;
*Database insecurity:&lt;br /&gt;
** Summaries of a few recent cases that address database breaches: [http://www.sidley.com/files/News/97324419-8e7b-4c3b-93fa-166d4b2bafb3/Presentation/NewsAttachment/17f372d1-e3f6-4170-b914-37bb3d2d695b/PrivacyUpdate062609%25282%2529.pdf&amp;amp;sa=D&amp;amp;sntz=1&amp;amp;usg=AFQjCNGVbZLeoS0joQgDT7_gE5jF8w6ivg Developments in Data Breach Liability].&lt;br /&gt;
**Law professor Vincent R. Johnson argues that tort liability is an appropriate mechanism for creating incentives and managing risks associated with cybersecurity: [http://www.stmarytx.edu/law/pdf/Johnsoncyber.pdf Cybersecurity, Identity Theft, and the Limits of Tort Liability].  Some issues he raises:&lt;br /&gt;
***&#039;&#039;Duty to protect information&#039;&#039;: California&#039;s Security Breach Information Act imposes such a duty.  The obligations that Graham-Leach-Blilely imposes on financial institutions arguably support liability on a theory of negligence per se.&lt;br /&gt;
****Can market forces adequately address insufficient database security?&lt;br /&gt;
***&amp;quot;Duty to inform of security breaches&amp;quot;: This could be analogous to a failure to warn theory of negligence liability.&lt;br /&gt;
***The economic harms rule seems to impose a significant bar to recovery.  What about requiring the database-owner to pay for security monitoring?  A risk-creation theory might support this approach.&lt;br /&gt;
&lt;br /&gt;
--[[Special:Contributions/98.210.154.54|98.210.154.54]] 23:13, 21 September 2010 (UTC)Davis&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Group Four:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
-“to what extent is our judgment about tech related to the “coolness” of the tech itself?”&lt;br /&gt;
* &#039;&#039;&#039;User Satisfaction versus Company Profitability.&#039;&#039;&#039; Closed platforms like the iPhone present significant benefits at a cost. It may be helpful to frame benefits and costs in terms of user satisfaction and company profitability, rather than any particular feature of the device using the platform. We can, of course, ask about particular features that create or diminish user satisfaction or company profitability, but we won&#039;t talk about the features as if they confer some independent benefit. This is just a way of conceptualizing when society will tolerate certain technological constraints.&lt;br /&gt;
** &#039;&#039;The iPhone.&#039;&#039; Steve Jobs has a vision for the iPhone, and that includes regulating a large portion of what goes on and can go on the phone. Let&#039;s take a look at how the user satisfaction/company profitability model applies. &lt;br /&gt;
*** &#039;&#039;Profitability.&#039;&#039; The iPhone&#039;s closed platform provides at least two valuable and related benefits. First, it allows Apple to keep its operating environment &amp;quot;safe.&amp;quot; Without unauthorized third-party applications--i.e., with all apps being Apple-approved--there is less risk for the introduction and dissemination of malware. This reduces costs for Apple, which doesn&#039;t have to respond to consumers whose phones have been destroyed by viruses. A second related benefit is branding. Because Apple can keep its system closed, it can design the environment in which it operates and market that environment as a product. This design means Apple can extract profits form third-party apps by conditioning access upon, among other things, payment. It also makes the company more profitable because Apple can advertise and promote itself as a &amp;quot;safe&amp;quot; place that operates seamlessly. Nevertheless, this raises issues about how far Apple will regulate its platform. Will it simply condition access by third-party applications, or will it go further and monitor its users. If Jobs is concerned that users will upload pornographic pictures on his phone, will the future iPhone be programmed to identify automatically and remove or block such photos? Does Jobs&#039; vision relate to profitability, or simply personal preference? (This last question will be relevant to considering user satisfaction). &lt;br /&gt;
*** &#039;&#039;User Satisfaction.&#039;&#039; For most users, the iPhone&#039;s closed platform doesn&#039;t seem to cause any immediate problems. There are plenty of cool apps that individuals can download and use. The iPhone certainly scores high on aesthetics, even if some of its features are low on performance. Users tend to love aesthetics, and have overlooked the fact that, for instance, the iPhone can run only one program at a time. The closed platform&#039;s safety also provides a benefit to users, who don&#039;t have to worry about protecting their phones from malware. So far, user satisfaction is high. The balance between user satisfaction and profitability seems to be in equipoise--for now. The question for the future is whether Apple will close off more territory, and whether its current sectioning will stifle the actions of users in the future. As to the former, Apple might meet substantial resistance from the public if it begins regulating their private behavior more explicitly. As to the latter, the future is hard to predict. If users become more adept with their phones or demand new features that the closed system stifles, Apple may have to modify just &#039;how&#039; closed its system should be. Of course, it may respond by making even &amp;quot;cooler&amp;quot; design, thereby satisfying users sufficiently to distract attention from the new (or old) restrictions that remain in place. If consumers detect that Jobs&#039; personal preferences are dictating the ways they can use their phones, their dissatisfaction may win the day.&lt;br /&gt;
**[&#039;&#039;Please add another example.&#039;&#039;]&lt;br /&gt;
&lt;br /&gt;
-online transaction speed: feature or bug?&lt;br /&gt;
-lack of humans in online transactions: feature or bug?&lt;br /&gt;
- Computers and people gone wild! (please don’t google this)&lt;br /&gt;
&lt;br /&gt;
- Should everything be open-source?&lt;br /&gt;
* A closed platform means that things can be innovative only within a predetermined limit; that is, we can only work within the realm of the expected (e.g., apps for the iPhone). But some of the greatest innovations have changed the paradigm for innovation completely, the obvious example being the Internet. The cost of closed platforms is that we do not even know what we&#039;re missing -- are security and cool apps worth it?&lt;br /&gt;
** Alternatively, if everything &#039;&#039;were&#039;&#039; open-source, would we face some variant of the tragedy of the commons? (&#039;&#039;Tragedy of the commons&#039;&#039; -- In ye olde England, there was a public commons where everyone could let their cattle graze. But because it was a public space, no one took responsibility for it, so all the grass ran out and the place was a mess. Then the commons was privatized, and lo and behold, private ownership meant that the owner now had an investment and interest in the land, so the land became nice and green again. Even if the owner now charged people to let their cattle graze there. [http://en.wikipedia.org/wiki/Tragedy_of_the_commons])  Or is there something different about the ethos of the Internet, or about cyberspace as a &#039;&#039;space&#039;&#039;, that makes the tragedy of the commons a non-issue?&lt;/div&gt;</summary>
		<author><name>Andrewsegna</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/difficultproblems/?title=Class_2&amp;diff=72</id>
		<title>Class 2</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/difficultproblems/?title=Class_2&amp;diff=72"/>
		<updated>2010-09-24T14:39:51Z</updated>

		<summary type="html">&lt;p&gt;Andrewsegna: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Group One:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
-Identity revealed beyond your comfort zone (ex. WOW message boards: forced real identity).&lt;br /&gt;
-Can online identity be protected as a possession? Who owns profile pages?&lt;br /&gt;
-Data portability as a privacy policy (who owns shared data?)(single sign-in)(facebook &lt;br /&gt;
Connect)(OpenID)(persistent identity online).&lt;br /&gt;
-Cyberbullies, multiple identities online.&lt;br /&gt;
-How/can IRL ethics/morality be imposed in online spaces?  Should they be?&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1. The Right to Speak Anonymously&#039;&#039;&#039;&lt;br /&gt;
* It would seem that the easiest way to impose IRL ethics/morality in online spaces is to make our online identities tied more closely to our &#039;real&#039; identities. But at the extreme, with everyone having a single, unique online identity tied to something like Social Security numbers, we would be sacrificing our right to speak and act anonymously online. Is there a happy medium?&lt;br /&gt;
* Then again, it&#039;s likely that with cyberbullying, for example, that the kids being bullied know exactly who their antagonists are, meaning that anonymity is not at the heart of the problem. So what is? Is it a lack of consequences? Or consequences that, because they are in &#039;real&#039; life, are insufficiently tied to their online behavior?&lt;br /&gt;
** Although in some cases, such as the highly publicized [http://en.wikipedia.org/wiki/Megan_Meier Megan Meier case], it was not known who the cyberbully was. In fact, in that case, the &amp;quot;real world&amp;quot; bully was unknown in large part because the profile was of a fictitious person to mask the real identity of the bullies.&lt;br /&gt;
* Is the Right to Speak Anonymously (or even the Right to Freedom of Expression?) harmed by forcing online users to sign in with &amp;quot;real identities&amp;quot; (achieved by requiring either verified credit-card billing names, or in less strict cases Facebook Connect) to leave comments on newspaper websites rather than leaving them anonymously as common practice in the early days of the internet&lt;br /&gt;
** The analogy to traditional &#039;letters to the editor&#039; in print editions does not hold as it was much more difficult - if not impossible - to conduct a search of all the comments a given person had submitted to newspapers - in today&#039;s world, such as search would allow anyone to quickly pull together a portfolio of comments left by a given person across multiple publications.&lt;br /&gt;
** Another case to consider with anonymity and the internet is the situation where people seek to keep their real-world actions (part of their real-world identity) off the internet. We have discussed that online identities have been increasingly merging with real-world identities through the use of real names, photographs, etc. on Facebook and similar sites. We have also mentioned, in the context of WoW/XBOX among others, some people seeking to maintain fictitious or anonymous online identities. A recent Supreme Court decision in [http://www.supremecourt.gov/opinions/09pdf/09-559.pdf &#039;&#039;Doe v. Reed&#039;&#039;], however, considered when real-world acts are publicized, and importantly for our purposes publicized on the internet. In that case, petition signers hoping to repeal a Washington state law which granted same-sex couples rights akin to marriage sought to prohibit others from gaining access to the petitions under the First Amendment. Opponents of the petitions intended to put the names and addresses on the petitions online in a searchable format. The Supreme Court held that public disclosures of referendum petition signers and their addresses, on its face, did not present a First Amendment violation.&lt;br /&gt;
*What is the effectiveness though of a single, unique online identity?&lt;br /&gt;
*&#039;&#039;&#039;&#039;&#039;Possible case study: Microsoft&#039;s XBOX Live online service&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
**Microsoft&#039;s XBOX Live services assign users a unique online username that identifies the user across all the games and services offered by XBOX Live. This unified identity allows a user to easily maintain relationships with other users, compare past accomplishments and activities, and effectively establish an online community. &lt;br /&gt;
**From a Lessig framework, Microsoft has used 3 of the 4 regulators to motivate people to become attached to one identity and work hard to preserve its reputation.&lt;br /&gt;
***&#039;&#039;Norms&#039;&#039;: Microsoft allows users to rate other users and assign positive and negative feedback. Other users can easily access this information and determine if this is someone they want to associate with. A user&#039;s accomplishments and stats from playing games are tied to his unique identity, making it a valuable indicator of skill and status in the online community.&lt;br /&gt;
***&#039;&#039;Market&#039;&#039;: In order to acquire an XBOX Live account, a user must pay $60 for a year-long subscription. A subscription only gives a user access to one username and, therefore, one identity. If someone wanted to create another identity or if Microsoft banned a user from XBOX Live, that user would have to pay for another account.&lt;br /&gt;
***&#039;&#039;Architecture&#039;&#039;: Microsoft has built in the rating system listed above. As a closed platform, Microsoft also has the ability to ban a user from online activities. This would force the user to purchase another account and would prevent that user from associating himself or herself with past accomplishments and reputation. Given this ominous power, one should be extra careful not to do anything to warrant banning.&lt;br /&gt;
***&#039;&#039;Laws&#039;&#039;: nothing outside of normal tort laws&lt;br /&gt;
**Result: this requires more research and testing. However, common wisdom (note: this is from my own personal experience has someone who has played online and has read many opinions about the service) is that communication on XBOX Live is a morass of racist, sexist, and violent comments. Many individuals refuse to communicate online anymore. Despite all of Microsoft&#039;s safeguards, there is not an effective deterrant to this type of behavior.&lt;br /&gt;
*Are entities like Microsoft hampered by the fact that these online identities, in a sense, don&#039;t matter? If I have a unique XBOX Live identity, how am I harmed outside of the XBOX Live community if I act poorly online and am banned? This won&#039;t harm my relationships outside of this online realm or ability to get jobs.&lt;br /&gt;
*Do we need to make more &amp;quot;real world&amp;quot; ramifications? For example, if law firms required me to list my XBOX Live account name, my Facebook account URL, and my Twitter name (and required me to make all of them public), that would greatly change how I act online. Is the notion of an online identity affected by OCS telling all students seeking law firm positions to make their Facebook profiles as secret as possible?&lt;br /&gt;
*How does requiring a persistent identity mesh with policies behind law? Minors may have opportunity to expunge or seal criminal records under the concept of learning and youthful mistakes. However, this is a system completely controlled by the government. Given the nature of the Internet, it may be impossible to offer a similar service, as website could continue to cite the damages caused by an online user, who is easily traceable to a real world individual. If we could expunge a minor&#039;s record, do we want to? For security reasons, we may not want minors to be identified as such online. Therefore, people will treat an online identity that belongs to a minor as if it belonged to an adult. Similar to minor being held to adult standards when participating in adult activities under tort law, should we hold minors to adult standards if they are perceived as adults in the online realm (which would include not allowing their record to be erased)? &lt;br /&gt;
**Google CEO Eric Schmidt predicts, according to an August 4, 2010 interview in the WSJ, that &amp;quot;every young person one day will be entitled automatically to change his or her name on reaching adulthood in order to disown youthful hijinks stored on their friends&#039; social media sites.&amp;quot;  &lt;br /&gt;
**However, allowing someone upon turning 18 to disown &amp;quot;youthful hijinks&amp;quot; promotes a culture that separates consequences from actions. Instead of eliminating the past, why don&#039;t we provide it with more context? As a proposal, why don&#039;t we use the architecture/law prongs of the Lessig test to create a structure in which the online activities of an individual, from his first entry into the online world to the last, are stored on a server (this is extremely big brother-ish but let&#039;s just play this out). The user can establish as many identities online to represent themselves to other uses, but all of these identities are connected to the user&#039;s real world identity. All of the actions a user takes as a minor are branded as the actions of a minor. The way we would then use this information would be similar to a background or credit check. Employers looking to hire the user can request a report on his Internet activity. They would then receive a report that details his actions. This could either be exhaustive, a general overview, or just if others have complained about his actions. This report will indicate what the user did and when in his lifetime he did it. Therefore, if the user did something embarassing or bad, this report will provide more context than a mere Google search.&lt;br /&gt;
*How do we teach youths just entering the online world how to interact with it and maintain a praiseworthy identity? [WSJ&lt;br /&gt;
&#039;&#039;&#039;2. Facebook Profile Portability&#039;&#039;&#039;&lt;br /&gt;
Let&#039;s do more research into data portability as a privacy policy, which relates to above. Facebook could be a good case study.  What options and protections are there to port an online identity / profile i.e. Facebook messages, friend listings, and wall-postings?  What can and can not be permanently deleted?&lt;br /&gt;
* It has been argued that Facebook has created a &amp;quot;semipublic&amp;quot; shared space for exchange of information. [http://www.nytimes.com/2009/02/19/technology/internet/19facebook.html?_r=1 NYT] If I send a private message or make a post on my wall, such information would be owned by me. But what about posts made by other people on my wall, or pictures and video I have been tagged in?&lt;br /&gt;
** What happens to these shared data if I close my account?&lt;br /&gt;
** Should information uploaded by other people become part of my online identity? If I look at my facebook wall I can see that only a minor part of it is made of my own contribution. Would my online identity be the same without other people&#039;s contributions?&lt;br /&gt;
** And what about my posts on other people&#039;s wall? Are those part of my online identity? If we own our personal information, should we own also our posts on other people&#039;s walls?&lt;br /&gt;
** Let&#039;s assume we have complete online portability of our online identity, including material submitted by third parties: what are the privacy implication of this from a third party&#039;s perspective? Are we ok with the third party&#039;s posts and tagged pictures being transferred? Should the third party be notified? Should the third party give express consent?&lt;br /&gt;
&#039;&#039;&#039;3. Applying Privacy Policies Worldwide&#039;&#039;&#039;&lt;br /&gt;
What are the challenges social networks face at the international level and in countries other than the US?&lt;br /&gt;
* Are privacy policies adopted by social networks enforceable everywhere?&lt;br /&gt;
** Consider Facebook approach: Facebook adheres to the Safe Harbor framework developed between US and EU as regards the processing of users&#039; personal information. [http://www.export.gov/safeharbor/eu/eg_main_018476.asp Safe Harbor] Is this enough to shield Facebook from privacy claims coming from outside the US? What about countries outside the UE?&lt;br /&gt;
** Should Facebook be concerned at all about its international responsibility? Consider the case of the Google executives convicted in Italy for a breach of privacy legislation. Assuming the conviction is upheld in appeal, can it ever be enforced? Where are the offices of the company? Where are the servers? Where are the data actually stored and processed?&lt;br /&gt;
* More generally, what types of information created by users is &#039;personal data&#039; about which they have/should have a reasonable expectation of privacy and should be subject to regulation? &lt;br /&gt;
**The line between personal information about which people have a reasonable expectation of privacy and information that is not personal and that need not have restrictions relating to privacy can be a difficult one to define. For example, is information about how a driver drives a car that gets recorded on an in-car computer and potentially transmitted to a car rental or the car manufacturer &#039;personal&#039; information that is/should be covered by data protection laws? What about information that is picked up by google when taking images for google street view (e.g. IP addresses of neighbouring properties)? (See discussion in Information Commissioner’s Office (UK), Statement on Google Street View, August 2010). The problem is that in many cases this information on its own does not identify a particular individual but that it could be used in combination with other information to identify people. Yet when we use the internet so much information is created and it may not all be information that should be subject to privacy regulation.  See discussion about this problem in a New Zealand context in Review of the Privacy Act 1993, NZLC 17, Wellington, 2010 (Australia and the UK are considering similar issues).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;4. Cyber-security&#039;&#039;&#039;&lt;br /&gt;
* Cyber-space was first used by script-kiddies as a playground for web defacement, etc, then discovered by criminals as a new means to expand their activity followed by transnational crime syndicates, followed by hackers with a political - &amp;quot;hacktivists&amp;quot; - until eventually also government discovered cyber-space. Since the DDoS attacks on Estonian websites in 2007 pushed the issue in NATO circles, cyber-security has been increasingly in the headlines. A number of questions emerge from this:&lt;br /&gt;
* Real threat vs. threat inflation. How much of the what is written in newspaper articles and books is much ado about nothing and what can be considered a real risk? If there is a risk, is there also a threat? What determines what constitutes a threat? Richard Clarke&#039;s book &amp;quot;Cyber-war&amp;quot; paints a gloomy picture. Self-interest by an author working as a cyber-security consultant or is there more to it? &lt;br /&gt;
* Cyber-crime &amp;lt;-&amp;gt; cyber-espionage &amp;lt;-&amp;gt; cyber-hacktivism &amp;lt;-&amp;gt; cyber-terrorism &amp;lt;-&amp;gt; cyber-war (cyber-intrastate war/cyber-interstate war). Costs today? Costs tomorrow? Technical solutions? Policy/legal solutions? National/international level? State vs non-state actors? Public/private?&lt;br /&gt;
* Cyber-war vs. cyber-peace. Why is much of the literature using language such as &amp;quot;cyber-war&amp;quot;, &amp;quot;cyber-attack&amp;quot;, etc and not language such as &amp;quot;cyber-peace&amp;quot;, &amp;quot;cyber-cooperation&amp;quot;&lt;br /&gt;
* Terminology. What is the difference between a cyber-hacktivist and a cyber-terrorist? What constitutes a &amp;quot;cyber-attack&amp;quot;? Given cyber-space&#039;s virtual borderlessness is it appropriate to speak of defense/offense or active/passive (e.g. the Outer Space convention)? Is cyber-space a territorium like the High Seas, Antarctica or Outer Space? Or a new field after land (army), sea (navy), air (air force), cyber? Is cyberspace a &amp;quot;cultural heritage of mankind&amp;quot;? Relationship between virtual and kinetic.&lt;br /&gt;
* Civilian vs military. How is cyber-security changing the relationship between civilian and military? DoD is responsible to defend .mil, DHS responsible to defend .gov. What about the other domains? The German DoD is responsible to defend the German military network, the Ministry of Interior responsible for the government websites. How do civilian Ministries of Interior with police forces relate to a cyber-attack outside the country usually an international attack being the responsibility of the military branch of a democratic government? What are the lines of authority, e.g. for the planting of logic bombs or trapdoors?&lt;br /&gt;
* Role of private actors. How are ISPs, hardware and software companies integrated into the discussions/policy-/law-making process? How much power do they have? Allegiance to profit? Allegiance to country? Allegiance to open cyber-space? Are there public private partnerships? Do they work? What are their strengths/weaknesses?&lt;br /&gt;
* Role of hackers. In the early days, the battle was government vs. hacker or state vs. hacker guided by a hacker ethics. This was before the internet expanded around the globe and in the Western tradition of state vs individual. After the expansion, how has this relationship changed? Is there a transnational hacker-culture or are hackers of country X more closely aligned with government of country X vs hackers of country Y more closely aligned with government of country Y rather than hackers of X and Y aligned vs governments of X and Y? &lt;br /&gt;
* With the attribution problem and the transition problem (virtual-physical world) how much security is necessary and how much generativity possible? What can be done to reduce the risk? What can be done to reduce the threat? International convention? Code of conduct among major companies? International confidence-building measures?&lt;br /&gt;
* Enforcement. How could an international regime/agency look like solving the security dilemma? A cyber-IAEA?&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Group Two:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
-property&lt;br /&gt;
-online things acquiring IRL value&lt;br /&gt;
-what happens to digital possessions after death?&lt;br /&gt;
-who has access to your accounts (fb, twit, gmail, etc) after death&lt;br /&gt;
-(TOS after death)&lt;br /&gt;
-first sale doctrine in software&lt;br /&gt;
-first amendment rights with online comms (going through someone’s infrastructure)&lt;br /&gt;
&lt;br /&gt;
**[http://arstechnica.com/tech-policy/news/2010/03/death-and-social-media-what-happens-to-your-life-online.ars Ars Technica] article on how Facebook, MySpace, Twitter, and Google subsidiaries treat death.&lt;br /&gt;
* &#039;&#039;Speech, Censorship, Statistics.&#039;&#039; Should we be concerned with an ISPs&#039; and website owners&#039; ability to aggregate and control information and speech. It seems that at least Google thinks that Internet users may be concerned with this topic. Google recently announced the &amp;quot;Transparency Report,&amp;quot; which (incompletely) tracks usage statistics by country, as well as Google&#039;s removal of online material at the Government&#039;s request.[http://www.google.com/transparencyreport/ Google] How should corporations manage such governmental requests. What rules should it apply? How should it decide on a set of rules and whether they are catholic or case specific? What benefits are realized by providing publicly this information--particularly the tracking information? How can users or other entities use this information?&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Group Three:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
-liability for security breaches (negligent design/management)&lt;br /&gt;
-wikileaks! (jurisdictional problems, prosecution) (how does filtering affect wikileaks?)&lt;br /&gt;
-transparency on internet services (google: how does it work?)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1. Liability for Security Breaches and Flaws&#039;&#039;&#039;&lt;br /&gt;
*Software insecurity:&lt;br /&gt;
** Security guru Bruce Schneier has argued that imposing tort liability is desirable as a method of forcing vendors to internalize the costs of insecure software.  See [http://www.schneier.com/essay-025.html Liability Changes Everything] and [http://www.schneier.com/blog/archives/2004/11/computer_securi.html Computer Security and Liability].&lt;br /&gt;
***How convincing is his suggestion?  What sorts of costs would this impose on software companies?  Would such a rule drive small players out of the security market?  Would individual contributors to open source projects potentially face liability?&lt;br /&gt;
** Law professor Michael D. Scott makes a similar argument, and notes that Sarbanes-Oxley requires publicly traded companies to certify that their systems are secure, while imposing no obligations on the vendors who actually provide the software.  See [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1010069 Tort Liability for Vendors of Insecure Software: Has the Time Finally Come?]&lt;br /&gt;
&lt;br /&gt;
*Database insecurity:&lt;br /&gt;
** Summaries of a few recent cases that address database breaches: [http://www.sidley.com/files/News/97324419-8e7b-4c3b-93fa-166d4b2bafb3/Presentation/NewsAttachment/17f372d1-e3f6-4170-b914-37bb3d2d695b/PrivacyUpdate062609%25282%2529.pdf&amp;amp;sa=D&amp;amp;sntz=1&amp;amp;usg=AFQjCNGVbZLeoS0joQgDT7_gE5jF8w6ivg Developments in Data Breach Liability].&lt;br /&gt;
**Law professor Vincent R. Johnson argues that tort liability is an appropriate mechanism for creating incentives and managing risks associated with cybersecurity: [http://www.stmarytx.edu/law/pdf/Johnsoncyber.pdf Cybersecurity, Identity Theft, and the Limits of Tort Liability].  Some issues he raises:&lt;br /&gt;
***&#039;&#039;Duty to protect information&#039;&#039;: California&#039;s Security Breach Information Act imposes such a duty.  The obligations that Graham-Leach-Blilely imposes on financial institutions arguably support liability on a theory of negligence per se.&lt;br /&gt;
****Can market forces adequately address insufficient database security?&lt;br /&gt;
***&amp;quot;Duty to inform of security breaches&amp;quot;: This could be analogous to a failure to warn theory of negligence liability.&lt;br /&gt;
***The economic harms rule seems to impose a significant bar to recovery.  What about requiring the database-owner to pay for security monitoring?  A risk-creation theory might support this approach.&lt;br /&gt;
&lt;br /&gt;
--[[Special:Contributions/98.210.154.54|98.210.154.54]] 23:13, 21 September 2010 (UTC)Davis&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Group Four:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
-“to what extent is our judgment about tech related to the “coolness” of the tech itself?”&lt;br /&gt;
* &#039;&#039;&#039;User Satisfaction versus Company Profitability.&#039;&#039;&#039; Closed platforms like the iPhone present significant benefits at a cost. It may be helpful to frame benefits and costs in terms of user satisfaction and company profitability, rather than any particular feature of the device using the platform. We can, of course, ask about particular features that create or diminish user satisfaction or company profitability, but we won&#039;t talk about the features as if they confer some independent benefit. This is just a way of conceptualizing when society will tolerate certain technological constraints.&lt;br /&gt;
** &#039;&#039;The iPhone.&#039;&#039; Steve Jobs has a vision for the iPhone, and that includes regulating a large portion of what goes on and can go on the phone. Let&#039;s take a look at how the user satisfaction/company profitability model applies. &lt;br /&gt;
*** &#039;&#039;Profitability.&#039;&#039; The iPhone&#039;s closed platform provides at least two valuable and related benefits. First, it allows Apple to keep its operating environment &amp;quot;safe.&amp;quot; Without unauthorized third-party applications--i.e., with all apps being Apple-approved--there is less risk for the introduction and dissemination of malware. This reduces costs for Apple, which doesn&#039;t have to respond to consumers whose phones have been destroyed by viruses. A second related benefit is branding. Because Apple can keep its system closed, it can design the environment in which it operates and market that environment as a product. This design means Apple can extract profits form third-party apps by conditioning access upon, among other things, payment. It also makes the company more profitable because Apple can advertise and promote itself as a &amp;quot;safe&amp;quot; place that operates seamlessly. Nevertheless, this raises issues about how far Apple will regulate its platform. Will it simply condition access by third-party applications, or will it go further and monitor its users. If Jobs is concerned that users will upload pornographic pictures on his phone, will the future iPhone be programmed to identify automatically and remove or block such photos? Does Jobs&#039; vision relate to profitability, or simply personal preference? (This last question will be relevant to considering user satisfaction). &lt;br /&gt;
*** &#039;&#039;User Satisfaction.&#039;&#039; For most users, the iPhone&#039;s closed platform doesn&#039;t seem to cause any immediate problems. There are plenty of cool apps that individuals can download and use. The iPhone certainly scores high on aesthetics, even if some of its features are low on performance. Users tend to love aesthetics, and have overlooked the fact that, for instance, the iPhone can run only one program at a time. The closed platform&#039;s safety also provides a benefit to users, who don&#039;t have to worry about protecting their phones from malware. So far, user satisfaction is high. The balance between user satisfaction and profitability seems to be in equipoise--for now. The question for the future is whether Apple will close off more territory, and whether its current sectioning will stifle the actions of users in the future. As to the former, Apple might meet substantial resistance from the public if it begins regulating their private behavior more explicitly. As to the latter, the future is hard to predict. If users become more adept with their phones or demand new features that the closed system stifles, Apple may have to modify just &#039;how&#039; closed its system should be. Of course, it may respond by making even &amp;quot;cooler&amp;quot; design, thereby satisfying users sufficiently to distract attention from the new (or old) restrictions that remain in place. If consumers detect that Jobs&#039; personal preferences are dictating the ways they can use their phones, their dissatisfaction may win the day.&lt;br /&gt;
**[&#039;&#039;Please add another example.&#039;&#039;]&lt;br /&gt;
&lt;br /&gt;
-online transaction speed: feature or bug?&lt;br /&gt;
-lack of humans in online transactions: feature or bug?&lt;br /&gt;
- Computers and people gone wild! (please don’t google this)&lt;br /&gt;
&lt;br /&gt;
- Should everything be open-source?&lt;br /&gt;
* A closed platform means that things can be innovative only within a predetermined limit; that is, we can only work within the realm of the expected (e.g., apps for the iPhone). But some of the greatest innovations have changed the paradigm for innovation completely, the obvious example being the Internet. The cost of closed platforms is that we do not even know what we&#039;re missing -- are security and cool apps worth it?&lt;br /&gt;
** Alternatively, if everything &#039;&#039;were&#039;&#039; open-source, would we face some variant of the tragedy of the commons? (&#039;&#039;Tragedy of the commons&#039;&#039; -- In ye olde England, there was a public commons where everyone could let their cattle graze. But because it was a public space, no one took responsibility for it, so all the grass ran out and the place was a mess. Then the commons was privatized, and lo and behold, private ownership meant that the owner now had an investment and interest in the land, so the land became nice and green again. Even if the owner now charged people to let their cattle graze there. [http://en.wikipedia.org/wiki/Tragedy_of_the_commons])  Or is there something different about the ethos of the Internet, or about cyberspace as a &#039;&#039;space&#039;&#039;, that makes the tragedy of the commons a non-issue?&lt;/div&gt;</summary>
		<author><name>Andrewsegna</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/difficultproblems/?title=Class_2&amp;diff=55</id>
		<title>Class 2</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/difficultproblems/?title=Class_2&amp;diff=55"/>
		<updated>2010-09-21T22:02:36Z</updated>

		<summary type="html">&lt;p&gt;Andrewsegna: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Group One:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
-Identity revealed beyond your comfort zone (ex. WOW message boards: forced real identity).&lt;br /&gt;
-Can online identity be protected as a possession? Who owns profile pages?&lt;br /&gt;
-Data portability as a privacy policy (who owns shared data?)(single sign-in)(facebook &lt;br /&gt;
Connect)(OpenID)(persistent identity online).&lt;br /&gt;
-Cyberbullies, multiple identities online.&lt;br /&gt;
-How/can IRL ethics/morality be imposed in online spaces?  Should they be?&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;1. The Right to Speak Anonymously&#039;&#039;&#039;&lt;br /&gt;
* It would seem that the easiest way to impose IRL ethics/morality in online spaces is to make our online identities tied more closely to our &#039;real&#039; identities. But at the extreme, with everyone having a single, unique online identity tied to something like Social Security numbers, we would be sacrificing our right to speak and act anonymously online. Is there a happy medium?&lt;br /&gt;
* Then again, it&#039;s likely that with cyberbullying, for example, that the kids being bullied know exactly who their antagonists are, meaning that anonymity is not at the heart of the problem. So what is? Is it a lack of consequences? Or consequences that, because they are in &#039;real&#039; life, are insufficiently tied to their online behavior?&lt;br /&gt;
* Is the Right to Speak Anonymously (or even the Right to Freedom of Expression?) harmed by forcing online users to sign in with &amp;quot;real identities&amp;quot; (achieved by requiring either verified credit-card billing names, or in less strict cases Facebook Connect) to leave comments on newspaper websites rather than leaving them anonymously as common practice in the early days of the internet&lt;br /&gt;
** The analogy to traditional &#039;letters to the editor&#039; in print editions does not hold as it was much more difficult - if not impossible - to conduct a search of all the comments a given person had submitted to newspapers - in today&#039;s world, such as search would allow anyone to quickly pull together a portfolio of comments left by a given person across multiple publications.&lt;br /&gt;
*What is the effectiveness though of a single, unique online identity?&lt;br /&gt;
*&#039;&#039;&#039;&#039;&#039;Possible case study: Microsoft&#039;s XBOX Live online service&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
**Microsoft&#039;s XBOX Live services assign users a unique online username that identifies the user across all the games and services offered by XBOX Live. This unified identity allows a user to easily maintain relationships with other users, compare past accomplishments and activities, and effectively establish an online community. &lt;br /&gt;
**From a Lessig framework, Microsoft has used 3 of the 4 regulators to motivate people to become attached to one identity and work hard to preserve its reputation.&lt;br /&gt;
***&#039;&#039;Norms&#039;&#039;: Microsoft allows users to rate other users and assign positive and negative feedback. Other users can easily access this information and determine if this is someone they want to associate with. A user&#039;s accomplishments and stats from playing games are tied to his unique identity, making it a valuable indicator of skill and status in the online community.&lt;br /&gt;
***&#039;&#039;Market&#039;&#039;: In order to acquire an XBOX Live account, a user must pay $60 for a year-long subscription. A subscription only gives a user access to one username and, therefore, one identity. If someone wanted to create another identity or if Microsoft banned a user from XBOX Live, that user would have to pay for another account.&lt;br /&gt;
***&#039;&#039;Architecture&#039;&#039;: Microsoft has built in the rating system listed above. As a closed platform, Microsoft also has the ability to ban a user from online activities. This would force the user to purchase another account and would prevent that user from associating himself or herself with past accomplishments and reputation. Given this ominous power, one should be extra careful not to do anything to warrant banning.&lt;br /&gt;
***&#039;&#039;Laws&#039;&#039;: nothing outside of normal tort laws&lt;br /&gt;
**Result: this requires more research and testing. However, common wisdom (note: this is from my own personal experience has someone who has played online and has read many opinions about the service) is that communication on XBOX Live is a morass of racist, sexist, and violent comments. Many individuals refuse to communicate online anymore. Despite all of Microsoft&#039;s safeguards, there is not an effective deterrant to this type of behavior.&lt;br /&gt;
*Are entities like Microsoft hampered by the fact that these online identities, in a sense, don&#039;t matter? If I have a unique XBOX Live identity, how am I harmed outside of the XBOX Live community if I act poorly online and am banned? This won&#039;t harm my relationships outside of this online realm or ability to get jobs.&lt;br /&gt;
*Do we need to make more &amp;quot;real world&amp;quot; ramifications? For example, if law firms required me to list my XBOX Live account name, my Facebook account URL, and my Twitter name (and required me to make all of them public), that would greatly change how I act online. Is the notion of an online identity affected by OCS telling all students seeking law firm positions to make their Facebook profiles as secret as possible?&lt;br /&gt;
*How does requiring a persistent identity mesh with policies behind law? Minors may have opportunity to expunge or seal criminal records under the concept of learning and youthful mistakes. However, this is a system completely controlled by the government. Given the nature of the Internet, it may be impossible to offer a similar service, as website could continue to cite the damages caused by an online user, who is easily traceable to a real world individual. If we could expunge a minor&#039;s record, do we want to? For security reasons, we may not want minors to be identified as such online. Therefore, people will treat an online identity that belongs to a minor as if it belonged to an adult. Similar to minor being held to adult standards when participating in adult activities under tort law, should we hold minors to adult standards if they are perceived as adults in the online realm (which would include not allowing their record to be erased)? &lt;br /&gt;
**Google CEO Eric Schmidt predicts, according to an August 4, 2010 interview in the WSJ, that &amp;quot;every young person one day will be entitled automatically to change his or her name on reaching adulthood in order to disown youthful hijinks stored on their friends&#039; social media sites.&amp;quot;  &lt;br /&gt;
**However, allowing someone upon turning 18 to disown &amp;quot;youthful hijinks&amp;quot; promotes a culture that separates consequences from actions. Instead of eliminating the past, why don&#039;t we provide it with more context? As a proposal, why don&#039;t we use the architecture/law prongs of the Lessig test to create a structure in which the online activities of an individual, from his first entry into the online world to the last, are stored on a server (this is extremely big brother-ish but let&#039;s just play this out). The user can establish as many identities online to represent themselves to other uses, but all of these identities are connected to the user&#039;s real world identity. All of the actions a user takes as a minor are branded as the actions of a minor. The way we would then use this information would be similar to a background or credit check. Employers looking to hire the user can request a report on his Internet activity. They would then receive a report that details his actions. This could either be exhaustive, a general overview, or just if others have complained about his actions. This report will indicate what the user did and when in his lifetime he did it. Therefore, if the user did something embarassing or bad, this report will provide more context than a mere Google search.&lt;br /&gt;
*How do we teach youths just entering the online world how to interact with it and maintain a praiseworthy identity? [WSJ&lt;br /&gt;
&#039;&#039;&#039;2. Facebook Profile Portability&#039;&#039;&#039;&lt;br /&gt;
Let&#039;s do more research into data portability as a privacy policy, which relates to above. Facebook could be a good case study.  What options and protections are there to port an online identity / profile i.e. Facebook messages, friend listings, and wall-postings?  What can and can not be permanently deleted?&lt;br /&gt;
* It has been argued that Facebook has created a &amp;quot;semipublic&amp;quot; shared space for exchange of information. [http://www.nytimes.com/2009/02/19/technology/internet/19facebook.html?_r=1 NYT] If I send a private message or make a post on my wall, such information would be owned by me. But what about posts made by other people on my wall, or pictures and video I have been tagged in?&lt;br /&gt;
** What happens to these shared data if I close my account?&lt;br /&gt;
** Should information uploaded by other people become part of my online identity? If I look at my facebook wall I can see that only a minor part of it is made of my own contribution. Would my online identity be the same without other people&#039;s contributions?&lt;br /&gt;
** And what about my posts on other people&#039;s wall? Are those part of my online identity? If we own our personal information, should we own also our posts on other people&#039;s walls?&lt;br /&gt;
** Let&#039;s assume we have complete online portability of our online identity, including material submitted by third parties: what are the privacy implication of this from a third party&#039;s perspective? Are we ok with the third party&#039;s posts and tagged pictures being transferred? Should the third party be notified? Should the third party give express consent?&lt;br /&gt;
&#039;&#039;&#039;3. Applying Privacy Policies Worldwide&#039;&#039;&#039;&lt;br /&gt;
What are the challenges social networks face at the international level and in countries other than the US?&lt;br /&gt;
* Are privacy policies adopted by social networks enforceable everywhere?&lt;br /&gt;
** Consider Facebook approach: Facebook adheres to the Safe Harbor framework developed between US and EU as regards the processing of users&#039; personal information. [http://www.export.gov/safeharbor/eu/eg_main_018476.asp Safe Harbor] Is this enough to shield Facebook from privacy claims coming from outside the US? What about countries outside the UE?&lt;br /&gt;
** Should Facebook be concerned at all about its international responsibility? Consider the case of the Google executives convicted in Italy for a breach of privacy legislation. Assuming the conviction is upheld in appeal, can it ever be enforced? Where are the offices of the company? Where are the servers? Where are the data actually stored and processed?&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Group Two:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
-property&lt;br /&gt;
-online things acquiring IRL value&lt;br /&gt;
-what happens to digital possessions after death?&lt;br /&gt;
-who has access to your accounts (fb, twit, gmail, etc) after death&lt;br /&gt;
-(TOS after death)&lt;br /&gt;
-first sale doctrine in software&lt;br /&gt;
-first amendment rights with online comms (going through someone’s infrastructure)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Group Three:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
-liability for security breaches (negligent design/management)&lt;br /&gt;
-wikileaks! (jurisdictional problems, prosecution) (how does filtering affect wikileaks?)&lt;br /&gt;
-transparency on internet services (google: how does it work?)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== &#039;&#039;&#039;Group Four:&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
-“to what extent is our judgment about tech related to the “coolness” of the tech itself?”&lt;br /&gt;
* &#039;&#039;&#039;User Satisfaction versus Company Profitability.&#039;&#039;&#039; Closed platforms like the iPhone present significant benefits at a cost. It may be helpful to frame benefits and costs in terms of user satisfaction and company profitability, rather than any particular feature of the device using the platform. We can, of course, ask about particular features that create or diminish user satisfaction or company profitability, but we won&#039;t talk about the features as if they confer some independent benefit. This is just a way of conceptualizing when society will tolerate certain technological constraints.&lt;br /&gt;
** &#039;&#039;The iPhone.&#039;&#039; Steve Jobs has a vision for the iPhone, and that includes regulating a large portion of what goes on and can go on the phone. Let&#039;s take a look at how the user satisfaction/company profitability model applies. &lt;br /&gt;
*** &#039;&#039;Profitability.&#039;&#039; The iPhone&#039;s closed platform provides at least two valuable and related benefits. First, it allows Apple to keep its operating environment &amp;quot;safe.&amp;quot; Without unauthorized third-party applications--i.e., with all apps being Apple-approved--there is less risk for the introduction and dissemination of malware. This reduces costs for Apple, which doesn&#039;t have to respond to consumers whose phones have been destroyed by viruses. A second related benefit is branding. Because Apple can keep its system closed, it can design the environment in which it operates and market that environment as a product. This design means Apple can extract profits form third-party apps by conditioning access upon, among other things, payment. It also makes the company more profitable because Apple can advertise and promote itself as a &amp;quot;safe&amp;quot; place that operates seamlessly. Nevertheless, this raises issues about how far Apple will regulate its platform. Will it simply condition access by third-party applications, or will it go further and monitor its users. If Jobs is concerned that users will upload pornographic pictures on his phone, will the future iPhone be programmed to identify automatically and remove or block such photos? Does Jobs&#039; vision relate to profitability, or simply personal preference? (This last question will be relevant to considering user satisfaction). &lt;br /&gt;
*** &#039;&#039;User Satisfaction.&#039;&#039; For most users, the iPhone&#039;s closed platform doesn&#039;t seem to cause any immediate problems. There are plenty of cool apps that individuals can download and use. The iPhone certainly scores high on aesthetics, even if some of its features are low on performance. Users tend to love aesthetics, and have overlooked the fact that, for instance, the iPhone can run only one program at a time. The closed platform&#039;s safety also provides a benefit to users, who don&#039;t have to worry about protecting their phones from malware. So far, user satisfaction is high. The balance between user satisfaction and profitability seems to be in equipoise--for now. The question for the future is whether Apple will close off more territory, and whether its current sectioning will stifle the actions of users in the future. As to the former, Apple might meet substantial resistance from the public if it begins regulating their private behavior more explicitly. As to the latter, the future is hard to predict. If users become more adept with their phones or demand new features that the closed system stifles, Apple may have to modify just &#039;how&#039; closed its system should be. Of course, it may respond by making even &amp;quot;cooler&amp;quot; design, thereby satisfying users sufficiently to distract attention from the new (or old) restrictions that remain in place. If consumers detect that Jobs&#039; personal preferences are dictating the ways they can use their phones, their dissatisfaction may win the day.&lt;br /&gt;
**[&#039;&#039;Please add another example.&#039;&#039;]&lt;br /&gt;
&lt;br /&gt;
-online transaction speed: feature or bug?&lt;br /&gt;
-lack of humans in online transactions: feature or bug?&lt;br /&gt;
- Computers and people gone wild! (please don’t google this)&lt;br /&gt;
&lt;br /&gt;
- Should everything be open-source?&lt;br /&gt;
* A closed platform means that things can be innovative only within a predetermined limit; that is, we can only work within the realm of the expected (e.g., apps for the iPhone). But some of the greatest innovations have changed the paradigm for innovation completely, the obvious example being the Internet. The cost of closed platforms is that we do not even know what we&#039;re missing -- are security and cool apps worth it?&lt;br /&gt;
** Alternatively, if everything &#039;&#039;were&#039;&#039; open-source, would we face some variant of the tragedy of the commons? (&#039;&#039;Tragedy of the commons&#039;&#039; -- In ye olde England, there was a public commons where everyone could let their cattle graze. But because it was a public space, no one took responsibility for it, so all the grass ran out and the place was a mess. Then the commons was privatized, and lo and behold, private ownership meant that the owner now had an investment and interest in the land, so the land became nice and green again. Even if the owner now charged people to let their cattle graze there. [http://en.wikipedia.org/wiki/Tragedy_of_the_commons])  Or is there something different about the ethos of the Internet, or about cyberspace as a &#039;&#039;space&#039;&#039;, that makes the tragedy of the commons a non-issue?&lt;/div&gt;</summary>
		<author><name>Andrewsegna</name></author>
	</entry>
</feed>