<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://cyber.harvard.edu/is2012/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Dardia</id>
	<title>Technologies of Politics and Control - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://cyber.harvard.edu/is2012/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Dardia"/>
	<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/Special:Contributions/Dardia"/>
	<updated>2026-04-04T08:05:35Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.43.6</generator>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Cybersecurity_and_Cyberwarfare&amp;diff=6686</id>
		<title>Cybersecurity and Cyberwarfare</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Cybersecurity_and_Cyberwarfare&amp;diff=6686"/>
		<updated>2011-04-27T03:17:00Z</updated>

		<summary type="html">&lt;p&gt;Dardia: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;May 3&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Cybersecurity has been identified as one of the greatest challenges facing the United States today, but it is ill-defined and almost impossible to address. How can we frame this problem to better inspire solutions? How should government, military, businesses, and technologists approach the problem from different angles and do these different approaches work together?  &lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
* [http://www.lawfareblog.com/2010/12/senator-cardin%E2%80%99s-bill-to-explore-isp-enforcement-of-digital-security/ Jack Goldsmith: Senator Cardin’s Bill to Explore ISP Enforcement of Digital Security]&lt;br /&gt;
* [http://yupnet.org/zittrain/ Zittrain, The Future of the Internet: And How to Stop It; Chapter 3]&lt;br /&gt;
* [http://www.chathamhouse.org.uk/files/17827_r1110_cyberwarfare_es.pdf Chatham House Report On Cyberwarfare - Executive Summary]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Stuxnet Wikipedia entry on Stuxnet]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
* Whitehouse.gov, [http://www.whitehouse.gov/cybersecurity Comprehensive National Cybersecurity Initiative, Cyberspace Policy Review]&lt;br /&gt;
* Jack Goldsmith, [http://www.brookings.edu/papers/2010/1208_4th_amendment_goldsmith.aspx The Cyberthreat, Government Network Operations, and the Fourth Amendment]&lt;br /&gt;
* Jane Holl Lute and Bruce McConnell, [http://www.wired.com/threatlevel/2011/02/dhs-op-ed/ Op-Ed: A Civil Perspective on Cybersecurity]&lt;br /&gt;
* Zittrain, [http://www.scientificamerican.com/article.cfm?id=freedom-and-anonymity Freedom and Anonymity]&lt;br /&gt;
* Infoweek, [http://informationweek.com/news/security/attacks/229401866 Leaked Cables Indicate Chinese Military Hackers Attacked U.S.]&lt;br /&gt;
* CNET, [http://news.cnet.com/8301-27080_3-20055091-245.html Cyber attacks rise at critical infrastructure firms]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.chathamhouse.org.uk/publications/papers/view/-/id/967/ On Cyber Warfare]&lt;br /&gt;
A little early for this, but I would like to share this nice paper written by analysts and researchers at Chatham House. It&#039;s pretty fundamental, I would recommend it to anyone who encounters this subject for the very first time. --[[User:Jastify|Jastify]] 22:55, 31 January 2011 (UTC)&lt;br /&gt;
: Great recommendation.  I&#039;ve added the executive summary to the required readings list. --[[User:Dardia|Dardia]] 23:50, 10 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Dardia</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Cybersecurity_and_Cyberwarfare&amp;diff=6673</id>
		<title>Cybersecurity and Cyberwarfare</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Cybersecurity_and_Cyberwarfare&amp;diff=6673"/>
		<updated>2011-04-26T16:14:43Z</updated>

		<summary type="html">&lt;p&gt;Dardia: /* Optional Readings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;May 3&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Cybersecurity has been identified as one of the greatest threats facing the United States today, but it is ill-defined and almost impossible to address. How can we frame this problem to better inspire solutions? How should government, military, businesses, and technologists approach the problem from different angles and do these different approaches work together?  &lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
* [http://www.lawfareblog.com/2010/12/senator-cardin%E2%80%99s-bill-to-explore-isp-enforcement-of-digital-security/ Jack Goldsmith: Senator Cardin’s Bill to Explore ISP Enforcement of Digital Security]&lt;br /&gt;
* [http://yupnet.org/zittrain/ Zittrain, The Future of the Internet: And How to Stop It; Chapter 3]&lt;br /&gt;
* [http://www.chathamhouse.org.uk/files/17827_r1110_cyberwarfare_es.pdf Chatham House Report On Cyberwarfare - Executive Summary]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Stuxnet Wikipedia entry on Stuxnet]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
* Whitehouse.gov, [http://www.whitehouse.gov/cybersecurity Comprehensive National Cybersecurity Initiative, Cyberspace Policy Review]&lt;br /&gt;
* Jack Goldsmith, [http://www.brookings.edu/papers/2010/1208_4th_amendment_goldsmith.aspx The Cyberthreat, Government Network Operations, and the Fourth Amendment]&lt;br /&gt;
* Jane Holl Lute and Bruce McConnell, [http://www.wired.com/threatlevel/2011/02/dhs-op-ed/ Op-Ed: A Civil Perspective on Cybersecurity]&lt;br /&gt;
* Zittrain, [http://www.scientificamerican.com/article.cfm?id=freedom-and-anonymity Freedom and Anonymity]&lt;br /&gt;
* Infoweek, [http://informationweek.com/news/security/attacks/229401866 Leaked Cables Indicate Chinese Military Hackers Attacked U.S.]&lt;br /&gt;
* CNET, [http://news.cnet.com/8301-27080_3-20055091-245.html Cyber attacks rise at critical infrastructure firms]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.chathamhouse.org.uk/publications/papers/view/-/id/967/ On Cyber Warfare]&lt;br /&gt;
A little early for this, but I would like to share this nice paper written by analysts and researchers at Chatham House. It&#039;s pretty fundamental, I would recommend it to anyone who encounters this subject for the very first time. --[[User:Jastify|Jastify]] 22:55, 31 January 2011 (UTC)&lt;br /&gt;
: Great recommendation.  I&#039;ve added the executive summary to the required readings list. --[[User:Dardia|Dardia]] 23:50, 10 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Dardia</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Cybersecurity_and_Cyberwarfare&amp;diff=6672</id>
		<title>Cybersecurity and Cyberwarfare</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Cybersecurity_and_Cyberwarfare&amp;diff=6672"/>
		<updated>2011-04-26T15:47:51Z</updated>

		<summary type="html">&lt;p&gt;Dardia: /* Optional Readings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;May 3&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Cybersecurity has been identified as one of the greatest threats facing the United States today, but it is ill-defined and almost impossible to address. How can we frame this problem to better inspire solutions? How should government, military, businesses, and technologists approach the problem from different angles and do these different approaches work together?  &lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
* [http://www.lawfareblog.com/2010/12/senator-cardin%E2%80%99s-bill-to-explore-isp-enforcement-of-digital-security/ Jack Goldsmith: Senator Cardin’s Bill to Explore ISP Enforcement of Digital Security]&lt;br /&gt;
* [http://yupnet.org/zittrain/ Zittrain, The Future of the Internet: And How to Stop It; Chapter 3]&lt;br /&gt;
* [http://www.chathamhouse.org.uk/files/17827_r1110_cyberwarfare_es.pdf Chatham House Report On Cyberwarfare - Executive Summary]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Stuxnet Wikipedia entry on Stuxnet]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
* Jack Goldsmith, [http://www.brookings.edu/papers/2010/1208_4th_amendment_goldsmith.aspx The Cyberthreat, Government Network Operations, and the Fourth Amendment]&lt;br /&gt;
* Jane Holl Lute and Bruce McConnell, [http://www.wired.com/threatlevel/2011/02/dhs-op-ed/ Op-Ed: A Civil Perspective on Cybersecurity]&lt;br /&gt;
* Zittrain, [http://www.scientificamerican.com/article.cfm?id=freedom-and-anonymity Freedom and Anonymity]&lt;br /&gt;
* Infoweek, [http://informationweek.com/news/security/attacks/229401866 Leaked Cables Indicate Chinese Military Hackers Attacked U.S.]&lt;br /&gt;
* CNET, [http://news.cnet.com/8301-27080_3-20055091-245.html Cyber attacks rise at critical infrastructure firms]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.chathamhouse.org.uk/publications/papers/view/-/id/967/ On Cyber Warfare]&lt;br /&gt;
A little early for this, but I would like to share this nice paper written by analysts and researchers at Chatham House. It&#039;s pretty fundamental, I would recommend it to anyone who encounters this subject for the very first time. --[[User:Jastify|Jastify]] 22:55, 31 January 2011 (UTC)&lt;br /&gt;
: Great recommendation.  I&#039;ve added the executive summary to the required readings list. --[[User:Dardia|Dardia]] 23:50, 10 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Dardia</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Control_and_Code:_Privacy_Online&amp;diff=6480</id>
		<title>Control and Code: Privacy Online</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Control_and_Code:_Privacy_Online&amp;diff=6480"/>
		<updated>2011-04-06T23:23:44Z</updated>

		<summary type="html">&lt;p&gt;Dardia: /* Readings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;April 12&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Code is law; the architecture of the Internet and the software that runs on it will determine to a large extent how the Net is regulated in a way that goes far deeper than legal means could ever achieve (or at least ever achieve alone). Technological advances have also produced many tempting options for regulation and surveillance that may severely alter the balance of privacy, access to information and sharing of intellectual property. By regulating behavior, technological architectures or codes embed different values and political choices. Yet code is often treated as a technocratic affair, or something best left to private economic actors pursuing their own interests.  If code is law, then control of code is power. If important questions of social ordering are at stake, shouldn&#039;t the design and development of code be brought within the political process? In this class we delve into the technological alternatives that will shape interactions over the Internet, as well as the implications of each on personal freedom, privacy and combating cyber-crime. &lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
==Readings== &lt;br /&gt;
&lt;br /&gt;
* [http://futureoftheinternet.org/download Jonathan Zittrain, Future of the Internet, Chapter 9: Privacy 2.0]&lt;br /&gt;
* [http://www.bitsbook.com/wp-content/uploads/2008/12/chapter2.pdf Abelson, Ledeen, Lewis, Blown to Bits, Chapter 2: Naked in the Sunlight: Privacy Lost, Privacy Abandoned]&lt;br /&gt;
* [http://www.cato.org/pubs/pas/pa-295.html Solveig Singleton, Privacy as Censorship (CATO)]&lt;br /&gt;
* [http://www.nytimes.com/2011/03/26/business/media/26privacy.html Noam Cohen, It’s Tracking Your Every Move and You May Not Even Know (NYTimes, March 26, 2011)]&lt;br /&gt;
&lt;br /&gt;
==Optional Readings==&lt;br /&gt;
&lt;br /&gt;
* [http://www.onthemedia.org/episodes/2010/04/02/segments/152890 NPR On the Media Story &amp;quot;Anonymous Justice&amp;quot;]&lt;br /&gt;
* [http://www.danah.org/papers/talks/2010/SXSW2010.html &amp;quot;Making Sense of Privacy and Publicity.&amp;quot; Transcript of talk given by Danah Boyd at SXSW. Austin, Texas, March 13, 2010]&lt;br /&gt;
* [https://www.socialtext.net/codev2/privacy Lawrence Lessig, Code 2.0: Privacy]&lt;br /&gt;
* http://paranoia.dubfire.net/2009/12/8-million-reasons-for-real-surveillance.html&lt;br /&gt;
* http://en.wikipedia.org/wiki/Human_flesh_search_engine&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
[http://www.networkworld.com/community/blog/get-ring-us-europe-vow-bash-out-internet-pers Get in the ring: US, Europe vow to bash out Internet personal privacy protection] --[[User:Gclinch|Gclinch]] 21:51, 30 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
New York Times op-ed on new privacy legislation being considered by Sen. Kerry:  http://www.nytimes.com/2011/03/19/opinion/19sat2.html?_r=1&amp;amp;scp=1&amp;amp;sq=privacy%20on%20the%20internet&amp;amp;st=cse  --[[[[User:Sjennings|sjennings]] 20:03, 6 April 2011 (UTC)]]&lt;/div&gt;</summary>
		<author><name>Dardia</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Copyright_in_Cyberspace&amp;diff=6461</id>
		<title>Copyright in Cyberspace</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Copyright_in_Cyberspace&amp;diff=6461"/>
		<updated>2011-04-04T17:43:50Z</updated>

		<summary type="html">&lt;p&gt;Dardia: /* Optional Readings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;April 5&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Internet has enabled individuals to become involved in the production of media and to distribute their contributions widely at a very low cost.  The former bastion of the entertainment industry is opening up to what many are calling a democratization of culture. The copyright doctrine of fair use seemingly bolsters the right to &amp;quot;recut, reframe, and recycle&amp;quot; previous works, but the protection fair use gives to those re-purposing copyrighted material is notoriously uncertain. &lt;br /&gt;
&lt;br /&gt;
Digital and file-sharing technologies also spawned the proliferation of sharing of media and music, which has led to a number of controversial legal and technological strategies.  The &amp;quot;notice-and-takedown&amp;quot; provisions of the  Digital Millennium Copyright Act (&amp;quot;DMCA&amp;quot;) allow Internet service providers to limit their liability for the copyright infringements of their users if the ISPs expeditiously remove material in response to complaints from copyright owners. The DMCA provides for counter-notice and &amp;quot;put-back&amp;quot; of removed material, but some argue that the statutory mechanism can chill innovative, constitutionally-protected speech.&lt;br /&gt;
&lt;br /&gt;
This class provides an overview of some major copyright law concepts and takes up some of the issues swirling around copyright in cyberspace.&lt;br /&gt;
&lt;br /&gt;
==Assignments==&lt;br /&gt;
&lt;br /&gt;
== Required Readings ==&lt;br /&gt;
* [http://www.copyright.gov/circs/circ01.pdf U.S. Copyright Office, Copyright Basics]&lt;br /&gt;
* [http://www.copyright.gov/title17/92chap1.html#107 17 U.S.C. § 107 (&amp;quot;Limitations on Exclusive Rights:  Fair Use&amp;quot;)]&lt;br /&gt;
* [http://www.copyright.gov/title17/92chap5.html#512 17 U.S.C. § 512(c) (&amp;quot;Information Residing on Systems or Networks at Direction of Users&amp;quot;)]&lt;br /&gt;
* [http://www.free-culture.cc/freecontent/ Lawrence Lessig, Free Culture] (pp. 1-20)&lt;br /&gt;
* Viacom v. YouTube: [http://www.nytimes.com/2010/03/19/technology/19youtube.html?pagewanted=1&amp;amp;sq=viacom&amp;amp;st=cse&amp;amp;scp=2 &amp;quot;Viacom Says YouTube Ignored Copyrights&amp;quot; (M. Helft, NY Times, 3/18/2010)], [http://www.pbs.org/mediashift/2010/07/what-the-viacom-vs-youtube-verdict-means-for-copyright-law183.html What the Viacom vs. YouTube Verdict Means for Copyright Law]&lt;br /&gt;
* Righthaven Copyright Lawsuits: [http://www.lasvegassun.com/news/2011/mar/29/righthaven-wins-round-litigation-campaign/ Las Vegas Sun, Righthaven wins round in litigation campaign], [http://www.lasvegassun.com/blogs/business-notebook/2011/mar/19/righthaven-lawsuits-backfire-reduce-protections-ne/ Las Vegas Sun, Righthaven lawsuits backfire, reduce protections for newspapers], and skim [http://www.righthavenlawsuits.com/ this].&lt;br /&gt;
* [http://www.citmedialaw.org/sites/citmedialaw.org/files/news%20aggregation%20white%20paper.pdf The Rise of the News Aggregator: Legal Implications and Best Practices]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings  ==&lt;br /&gt;
* [http://wendy.seltzer.org/blog/archives/2011/02/02/super-bust-due-process-and-domain-name-seizure.html Super Bust: Due Process and Domain Name Seizure]&lt;br /&gt;
* [http://creativecommons.org/about/licenses/comics1 Creative Commons: A Spectrum of Rights (comic)]&lt;br /&gt;
* [http://www.centerforsocialmedia.org/resources/publications/recut_reframe_recycle/ Center for Social Media, Recut, Reframe, Recyle] (full report optional)&lt;br /&gt;
* [http://scholar.google.com/scholar_case?case=8647956476676426155&amp;amp;q=545+U.S.+913&amp;amp;hl=en&amp;amp;as_sdt=2002 MGM v. Grokster, 545 U.S. 913 (2005)] (Sec. II, pp. 928 - 937)&lt;br /&gt;
* [http://www.nytimes.com/2008/09/09/nyregion/09potter.html?_r=1 &amp;quot;Rowling Wins Lawsuit Against Potter Lexicon&amp;quot; (J. Eligon, NY Times, 9/8/08)]&lt;br /&gt;
* [http://bits.blogs.nytimes.com/2008/01/16/830/index.html New York Times Bits Blog: Mixing It Up Over Remixes and Fair Use]&lt;br /&gt;
* [http://www.eff.org/files/20030926_unsafe_harbors.pdf EFF, Unsafe Harbors: Abusive DMCA Subpoenas and Takedown Demands]&lt;br /&gt;
* [http://www.whitehouse.gov/blog/2011/03/15/concrete-steps-congress-can-take-protect-americas-intellectual-property The White House Blog: Concrete Steps Congress Can Take to Protect America&#039;s Intellectual Property]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
For the mind map software, I found [http://vue.tufts.edu/ VUE] easy to use. I was especially impressed by the rendering in PDF. Everything fit neatly on the page. This was a big surprise after being a Microsoft Office User ;-). Also, PC Users, if you need to print to PDF, [http://www.pdfforge.org/ PDF Creator] is wonderful. --[[User:SCL|SCL]] 22:17, 3 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
Interesting question: [http://paidcontent.org/article/419-have-media-companies-destroyed-their-copyrights-with-the-share-button/# Have Media Companies Destroyed Their Copyrights With The ‘Share’ Button?] --[[User:Gclinch|Gclinch]] 23:06, 3 April 2011 (UTC)&lt;/div&gt;</summary>
		<author><name>Dardia</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Copyright_in_Cyberspace&amp;diff=6438</id>
		<title>Copyright in Cyberspace</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Copyright_in_Cyberspace&amp;diff=6438"/>
		<updated>2011-03-29T22:00:35Z</updated>

		<summary type="html">&lt;p&gt;Dardia: /* Required Readings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;April 5&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Internet has enabled individuals to become involved in the production of media and to distribute their contributions widely at a very low cost.  The former bastion of the entertainment industry is opening up to what many are calling a democratization of culture. The copyright doctrine of fair use seemingly bolsters the right to &amp;quot;recut, reframe, and recycle&amp;quot; previous works, but the protection fair use gives to those re-purposing copyrighted material is notoriously uncertain. &lt;br /&gt;
&lt;br /&gt;
Digital and file-sharing technologies also spawned the proliferation of sharing of media and music, which has led to a number of controversial legal and technological strategies.  The &amp;quot;notice-and-takedown&amp;quot; provisions of the  Digital Millennium Copyright Act (&amp;quot;DMCA&amp;quot;) allow Internet service providers to limit their liability for the copyright infringements of their users if the ISPs expeditiously remove material in response to complaints from copyright owners. The DMCA provides for counter-notice and &amp;quot;put-back&amp;quot; of removed material, but some argue that the statutory mechanism can chill innovative, constitutionally-protected speech.&lt;br /&gt;
&lt;br /&gt;
This class provides an overview of some major copyright law concepts and takes up some of the issues swirling around copyright in cyberspace.&lt;br /&gt;
&lt;br /&gt;
==Assignments==&lt;br /&gt;
&lt;br /&gt;
[[Assignments#Assignment_4:_Rough_Draft_and_Bonus_AV_Credit|Assignment 4 due]]&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Required Readings ==&lt;br /&gt;
* [http://www.copyright.gov/circs/circ01.pdf U.S. Copyright Office, Copyright Basics]&lt;br /&gt;
* [http://www.copyright.gov/title17/92chap1.html#107 17 U.S.C. § 107 (&amp;quot;Limitations on Exclusive Rights:  Fair Use&amp;quot;)]&lt;br /&gt;
* [http://www.copyright.gov/title17/92chap5.html#512 17 U.S.C. § 512(c) (&amp;quot;Information Residing on Systems or Networks at Direction of Users&amp;quot;)]&lt;br /&gt;
* [http://www.free-culture.cc/freecontent/ Lawrence Lessig, Free Culture] (pp. 1-20)&lt;br /&gt;
* Viacom v. YouTube: [http://www.nytimes.com/2010/03/19/technology/19youtube.html?pagewanted=1&amp;amp;sq=viacom&amp;amp;st=cse&amp;amp;scp=2 &amp;quot;Viacom Says YouTube Ignored Copyrights&amp;quot; (M. Helft, NY Times, 3/18/2010)], [http://www.pbs.org/mediashift/2010/07/what-the-viacom-vs-youtube-verdict-means-for-copyright-law183.html What the Viacom vs. YouTube Verdict Means for Copyright Law]&lt;br /&gt;
* Righthaven Copyright Lawsuits: [http://www.lasvegassun.com/news/2011/mar/29/righthaven-wins-round-litigation-campaign/ Las Vegas Sun, Righthaven wins round in litigation campaign], [http://www.lasvegassun.com/blogs/business-notebook/2011/mar/19/righthaven-lawsuits-backfire-reduce-protections-ne/ Las Vegas Sun, Righthaven lawsuits backfire, reduce protections for newspapers], and skim [http://www.righthavenlawsuits.com/ this].&lt;br /&gt;
* [http://www.citmedialaw.org/sites/citmedialaw.org/files/news%20aggregation%20white%20paper.pdf The Rise of the News Aggregator: Legal Implications and Best Practices]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings  ==&lt;br /&gt;
* [http://wendy.seltzer.org/blog/archives/2011/02/02/super-bust-due-process-and-domain-name-seizure.html Super Bust: Due Process and Domain Name Seizure]&lt;br /&gt;
* [http://creativecommons.org/about/licenses/comics1 Creative Commons: A Spectrum of Rights (comic)]&lt;br /&gt;
* [http://www.centerforsocialmedia.org/resources/publications/recut_reframe_recycle/ Center for Social Media, Recut, Reframe, Recyle] (full report optional)&lt;br /&gt;
* [http://scholar.google.com/scholar_case?case=8647956476676426155&amp;amp;q=545+U.S.+913&amp;amp;hl=en&amp;amp;as_sdt=2002 MGM v. Grokster, 545 U.S. 913 (2005)] (Sec. II, pp. 928 - 937)&lt;br /&gt;
* [http://www.nytimes.com/2008/09/09/nyregion/09potter.html?_r=1 &amp;quot;Rowling Wins Lawsuit Against Potter Lexicon&amp;quot; (J. Eligon, NY Times, 9/8/08)]&lt;br /&gt;
* [http://bits.blogs.nytimes.com/2008/01/16/830/index.html New York Times Bits Blog: Mixing It Up Over Remixes and Fair Use]&lt;br /&gt;
* [http://www.eff.org/files/20030926_unsafe_harbors.pdf EFF, Unsafe Harbors: Abusive DMCA Subpoenas and Takedown Demands]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Dardia</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Copyright_in_Cyberspace&amp;diff=6436</id>
		<title>Copyright in Cyberspace</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Copyright_in_Cyberspace&amp;diff=6436"/>
		<updated>2011-03-29T21:59:56Z</updated>

		<summary type="html">&lt;p&gt;Dardia: /* Required Readings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;April 5&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Internet has enabled individuals to become involved in the production of media and to distribute their contributions widely at a very low cost.  The former bastion of the entertainment industry is opening up to what many are calling a democratization of culture. The copyright doctrine of fair use seemingly bolsters the right to &amp;quot;recut, reframe, and recycle&amp;quot; previous works, but the protection fair use gives to those re-purposing copyrighted material is notoriously uncertain. &lt;br /&gt;
&lt;br /&gt;
Digital and file-sharing technologies also spawned the proliferation of sharing of media and music, which has led to a number of controversial legal and technological strategies.  The &amp;quot;notice-and-takedown&amp;quot; provisions of the  Digital Millennium Copyright Act (&amp;quot;DMCA&amp;quot;) allow Internet service providers to limit their liability for the copyright infringements of their users if the ISPs expeditiously remove material in response to complaints from copyright owners. The DMCA provides for counter-notice and &amp;quot;put-back&amp;quot; of removed material, but some argue that the statutory mechanism can chill innovative, constitutionally-protected speech.&lt;br /&gt;
&lt;br /&gt;
This class provides an overview of some major copyright law concepts and takes up some of the issues swirling around copyright in cyberspace.&lt;br /&gt;
&lt;br /&gt;
==Assignments==&lt;br /&gt;
&lt;br /&gt;
[[Assignments#Assignment_4:_Rough_Draft_and_Bonus_AV_Credit|Assignment 4 due]]&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Required Readings ==&lt;br /&gt;
* [http://www.copyright.gov/circs/circ01.pdf U.S. Copyright Office, Copyright Basics]&lt;br /&gt;
* [http://www.copyright.gov/title17/92chap1.html#107 17 U.S.C. § 107 (&amp;quot;Limitations on Exclusive Rights:  Fair Use&amp;quot;)]&lt;br /&gt;
* [http://www.copyright.gov/title17/92chap5.html#512 17 U.S.C. § 512(c) (&amp;quot;Information Residing on Systems or Networks at Direction of Users&amp;quot;)]&lt;br /&gt;
* [http://www.free-culture.cc/freecontent/ Lawrence Lessig, Free Culture] (pp. 1-20)&lt;br /&gt;
* [http://www.nytimes.com/2010/03/19/technology/19youtube.html?pagewanted=1&amp;amp;sq=viacom&amp;amp;st=cse&amp;amp;scp=2 &amp;quot;Viacom Says YouTube Ignored Copyrights&amp;quot; (M. Helft, NY Times, 3/18/2010)], [http://www.pbs.org/mediashift/2010/07/what-the-viacom-vs-youtube-verdict-means-for-copyright-law183.html What the Viacom vs. YouTube Verdict Means for Copyright Law]&lt;br /&gt;
* Righthaven Copyright Lawsuits: [http://www.lasvegassun.com/news/2011/mar/29/righthaven-wins-round-litigation-campaign/ Las Vegas Sun, Righthaven wins round in litigation campaign], [http://www.lasvegassun.com/blogs/business-notebook/2011/mar/19/righthaven-lawsuits-backfire-reduce-protections-ne/ Las Vegas Sun, Righthaven lawsuits backfire, reduce protections for newspapers], and skim [http://www.righthavenlawsuits.com/ this].&lt;br /&gt;
* [http://www.citmedialaw.org/sites/citmedialaw.org/files/news%20aggregation%20white%20paper.pdf The Rise of the News Aggregator: Legal Implications and Best Practices]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings  ==&lt;br /&gt;
* [http://wendy.seltzer.org/blog/archives/2011/02/02/super-bust-due-process-and-domain-name-seizure.html Super Bust: Due Process and Domain Name Seizure]&lt;br /&gt;
* [http://creativecommons.org/about/licenses/comics1 Creative Commons: A Spectrum of Rights (comic)]&lt;br /&gt;
* [http://www.centerforsocialmedia.org/resources/publications/recut_reframe_recycle/ Center for Social Media, Recut, Reframe, Recyle] (full report optional)&lt;br /&gt;
* [http://scholar.google.com/scholar_case?case=8647956476676426155&amp;amp;q=545+U.S.+913&amp;amp;hl=en&amp;amp;as_sdt=2002 MGM v. Grokster, 545 U.S. 913 (2005)] (Sec. II, pp. 928 - 937)&lt;br /&gt;
* [http://www.nytimes.com/2008/09/09/nyregion/09potter.html?_r=1 &amp;quot;Rowling Wins Lawsuit Against Potter Lexicon&amp;quot; (J. Eligon, NY Times, 9/8/08)]&lt;br /&gt;
* [http://bits.blogs.nytimes.com/2008/01/16/830/index.html New York Times Bits Blog: Mixing It Up Over Remixes and Fair Use]&lt;br /&gt;
* [http://www.eff.org/files/20030926_unsafe_harbors.pdf EFF, Unsafe Harbors: Abusive DMCA Subpoenas and Takedown Demands]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Dardia</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Copyright_in_Cyberspace&amp;diff=6434</id>
		<title>Copyright in Cyberspace</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Copyright_in_Cyberspace&amp;diff=6434"/>
		<updated>2011-03-29T21:58:03Z</updated>

		<summary type="html">&lt;p&gt;Dardia: /* Optional Readings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;April 5&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Internet has enabled individuals to become involved in the production of media and to distribute their contributions widely at a very low cost.  The former bastion of the entertainment industry is opening up to what many are calling a democratization of culture. The copyright doctrine of fair use seemingly bolsters the right to &amp;quot;recut, reframe, and recycle&amp;quot; previous works, but the protection fair use gives to those re-purposing copyrighted material is notoriously uncertain. &lt;br /&gt;
&lt;br /&gt;
Digital and file-sharing technologies also spawned the proliferation of sharing of media and music, which has led to a number of controversial legal and technological strategies.  The &amp;quot;notice-and-takedown&amp;quot; provisions of the  Digital Millennium Copyright Act (&amp;quot;DMCA&amp;quot;) allow Internet service providers to limit their liability for the copyright infringements of their users if the ISPs expeditiously remove material in response to complaints from copyright owners. The DMCA provides for counter-notice and &amp;quot;put-back&amp;quot; of removed material, but some argue that the statutory mechanism can chill innovative, constitutionally-protected speech.&lt;br /&gt;
&lt;br /&gt;
This class provides an overview of some major copyright law concepts and takes up some of the issues swirling around copyright in cyberspace.&lt;br /&gt;
&lt;br /&gt;
==Assignments==&lt;br /&gt;
&lt;br /&gt;
[[Assignments#Assignment_4:_Rough_Draft_and_Bonus_AV_Credit|Assignment 4 due]]&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Required Readings ==&lt;br /&gt;
* [http://www.copyright.gov/circs/circ01.pdf U.S. Copyright Office, Copyright Basics]&lt;br /&gt;
* [http://www.copyright.gov/title17/92chap1.html#107 17 U.S.C. § 107 (&amp;quot;Limitations on Exclusive Rights:  Fair Use&amp;quot;)]&lt;br /&gt;
* [http://www.copyright.gov/title17/92chap5.html#512 17 U.S.C. § 512(c) (&amp;quot;Information Residing on Systems or Networks at Direction of Users&amp;quot;)]&lt;br /&gt;
* [http://www.free-culture.cc/freecontent/ Lawrence Lessig, Free Culture] (pp. 1-20)&lt;br /&gt;
* [http://www.nytimes.com/2010/03/19/technology/19youtube.html?pagewanted=1&amp;amp;sq=viacom&amp;amp;st=cse&amp;amp;scp=2 &amp;quot;Viacom Says YouTube Ignored Copyrights&amp;quot; (M. Helft, NY Times, 3/18/2010)]&lt;br /&gt;
* Righthaven Copyright Lawsuits: [http://www.lasvegassun.com/news/2011/mar/29/righthaven-wins-round-litigation-campaign/ Las Vegas Sun, Righthaven wins round in litigation campaign], [http://www.lasvegassun.com/blogs/business-notebook/2011/mar/19/righthaven-lawsuits-backfire-reduce-protections-ne/ Las Vegas Sun, Righthaven lawsuits backfire, reduce protections for newspapers], and skim [http://www.righthavenlawsuits.com/ this].&lt;br /&gt;
* [http://www.citmedialaw.org/sites/citmedialaw.org/files/news%20aggregation%20white%20paper.pdf The Rise of the News Aggregator: Legal Implications and Best Practices]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings  ==&lt;br /&gt;
* [http://wendy.seltzer.org/blog/archives/2011/02/02/super-bust-due-process-and-domain-name-seizure.html Super Bust: Due Process and Domain Name Seizure]&lt;br /&gt;
* [http://creativecommons.org/about/licenses/comics1 Creative Commons: A Spectrum of Rights (comic)]&lt;br /&gt;
* [http://www.centerforsocialmedia.org/resources/publications/recut_reframe_recycle/ Center for Social Media, Recut, Reframe, Recyle] (full report optional)&lt;br /&gt;
* [http://scholar.google.com/scholar_case?case=8647956476676426155&amp;amp;q=545+U.S.+913&amp;amp;hl=en&amp;amp;as_sdt=2002 MGM v. Grokster, 545 U.S. 913 (2005)] (Sec. II, pp. 928 - 937)&lt;br /&gt;
* [http://www.nytimes.com/2008/09/09/nyregion/09potter.html?_r=1 &amp;quot;Rowling Wins Lawsuit Against Potter Lexicon&amp;quot; (J. Eligon, NY Times, 9/8/08)]&lt;br /&gt;
* [http://bits.blogs.nytimes.com/2008/01/16/830/index.html New York Times Bits Blog: Mixing It Up Over Remixes and Fair Use]&lt;br /&gt;
* [http://www.eff.org/files/20030926_unsafe_harbors.pdf EFF, Unsafe Harbors: Abusive DMCA Subpoenas and Takedown Demands]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Dardia</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Copyright_in_Cyberspace&amp;diff=6433</id>
		<title>Copyright in Cyberspace</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Copyright_in_Cyberspace&amp;diff=6433"/>
		<updated>2011-03-29T21:57:34Z</updated>

		<summary type="html">&lt;p&gt;Dardia: /* Optional Readings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;April 5&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Internet has enabled individuals to become involved in the production of media and to distribute their contributions widely at a very low cost.  The former bastion of the entertainment industry is opening up to what many are calling a democratization of culture. The copyright doctrine of fair use seemingly bolsters the right to &amp;quot;recut, reframe, and recycle&amp;quot; previous works, but the protection fair use gives to those re-purposing copyrighted material is notoriously uncertain. &lt;br /&gt;
&lt;br /&gt;
Digital and file-sharing technologies also spawned the proliferation of sharing of media and music, which has led to a number of controversial legal and technological strategies.  The &amp;quot;notice-and-takedown&amp;quot; provisions of the  Digital Millennium Copyright Act (&amp;quot;DMCA&amp;quot;) allow Internet service providers to limit their liability for the copyright infringements of their users if the ISPs expeditiously remove material in response to complaints from copyright owners. The DMCA provides for counter-notice and &amp;quot;put-back&amp;quot; of removed material, but some argue that the statutory mechanism can chill innovative, constitutionally-protected speech.&lt;br /&gt;
&lt;br /&gt;
This class provides an overview of some major copyright law concepts and takes up some of the issues swirling around copyright in cyberspace.&lt;br /&gt;
&lt;br /&gt;
==Assignments==&lt;br /&gt;
&lt;br /&gt;
[[Assignments#Assignment_4:_Rough_Draft_and_Bonus_AV_Credit|Assignment 4 due]]&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Required Readings ==&lt;br /&gt;
* [http://www.copyright.gov/circs/circ01.pdf U.S. Copyright Office, Copyright Basics]&lt;br /&gt;
* [http://www.copyright.gov/title17/92chap1.html#107 17 U.S.C. § 107 (&amp;quot;Limitations on Exclusive Rights:  Fair Use&amp;quot;)]&lt;br /&gt;
* [http://www.copyright.gov/title17/92chap5.html#512 17 U.S.C. § 512(c) (&amp;quot;Information Residing on Systems or Networks at Direction of Users&amp;quot;)]&lt;br /&gt;
* [http://www.free-culture.cc/freecontent/ Lawrence Lessig, Free Culture] (pp. 1-20)&lt;br /&gt;
* [http://www.nytimes.com/2010/03/19/technology/19youtube.html?pagewanted=1&amp;amp;sq=viacom&amp;amp;st=cse&amp;amp;scp=2 &amp;quot;Viacom Says YouTube Ignored Copyrights&amp;quot; (M. Helft, NY Times, 3/18/2010)]&lt;br /&gt;
* Righthaven Copyright Lawsuits: [http://www.lasvegassun.com/news/2011/mar/29/righthaven-wins-round-litigation-campaign/ Las Vegas Sun, Righthaven wins round in litigation campaign], [http://www.lasvegassun.com/blogs/business-notebook/2011/mar/19/righthaven-lawsuits-backfire-reduce-protections-ne/ Las Vegas Sun, Righthaven lawsuits backfire, reduce protections for newspapers], and skim [http://www.righthavenlawsuits.com/ this].&lt;br /&gt;
* [http://www.citmedialaw.org/sites/citmedialaw.org/files/news%20aggregation%20white%20paper.pdf The Rise of the News Aggregator: Legal Implications and Best Practices]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings  ==&lt;br /&gt;
* [http://wendy.seltzer.org/blog/archives/2011/02/02/super-bust-due-process-and-domain-name-seizure.html Super Bust: Due Process and Domain Name Seizure]&lt;br /&gt;
* [http://creativecommons.org/about/licenses/comics1 Creative Commons: A Spectrum of Rights (comic)]&lt;br /&gt;
* [http://www.centerforsocialmedia.org/resources/publications/recut_reframe_recycle/ Center for Social Media, Recut, Reframe, Recyle] (full report optional)&lt;br /&gt;
* [http://scholar.google.com/scholar_case?case=8647956476676426155&amp;amp;q=545+U.S.+913&amp;amp;hl=en&amp;amp;as_sdt=2002 MGM v. Grokster, 545 U.S. 913 (2005)] (Sec. II, pp. 928 - 937)&lt;br /&gt;
* [http://www.nytimes.com/2008/09/09/nyregion/09potter.html?_r=1 &amp;quot;Rowling Wins Lawsuit Against Potter Lexicon&amp;quot; (J. Eligon, NY Times, 9/8/08)]&lt;br /&gt;
* [http://bits.blogs.nytimes.com/2008/01/16/830/index.html New York Times Bits Blog: Mixing It Up Over Remixes and Fair Use]&lt;br /&gt;
* [http://wendy.seltzer.org/blog-bak/archives/DMCA.html Wendy Seltzer&#039;s Blog, NFL Saga]&lt;br /&gt;
* [http://www.eff.org/files/20030926_unsafe_harbors.pdf EFF, Unsafe Harbors: Abusive DMCA Subpoenas and Takedown Demands]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Dardia</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Copyright_in_Cyberspace&amp;diff=6430</id>
		<title>Copyright in Cyberspace</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Copyright_in_Cyberspace&amp;diff=6430"/>
		<updated>2011-03-29T21:55:15Z</updated>

		<summary type="html">&lt;p&gt;Dardia: /* Required Readings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;April 5&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Internet has enabled individuals to become involved in the production of media and to distribute their contributions widely at a very low cost.  The former bastion of the entertainment industry is opening up to what many are calling a democratization of culture. The copyright doctrine of fair use seemingly bolsters the right to &amp;quot;recut, reframe, and recycle&amp;quot; previous works, but the protection fair use gives to those re-purposing copyrighted material is notoriously uncertain. &lt;br /&gt;
&lt;br /&gt;
Digital and file-sharing technologies also spawned the proliferation of sharing of media and music, which has led to a number of controversial legal and technological strategies.  The &amp;quot;notice-and-takedown&amp;quot; provisions of the  Digital Millennium Copyright Act (&amp;quot;DMCA&amp;quot;) allow Internet service providers to limit their liability for the copyright infringements of their users if the ISPs expeditiously remove material in response to complaints from copyright owners. The DMCA provides for counter-notice and &amp;quot;put-back&amp;quot; of removed material, but some argue that the statutory mechanism can chill innovative, constitutionally-protected speech.&lt;br /&gt;
&lt;br /&gt;
This class provides an overview of some major copyright law concepts and takes up some of the issues swirling around copyright in cyberspace.&lt;br /&gt;
&lt;br /&gt;
==Assignments==&lt;br /&gt;
&lt;br /&gt;
[[Assignments#Assignment_4:_Rough_Draft_and_Bonus_AV_Credit|Assignment 4 due]]&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Required Readings ==&lt;br /&gt;
* [http://www.copyright.gov/circs/circ01.pdf U.S. Copyright Office, Copyright Basics]&lt;br /&gt;
* [http://www.copyright.gov/title17/92chap1.html#107 17 U.S.C. § 107 (&amp;quot;Limitations on Exclusive Rights:  Fair Use&amp;quot;)]&lt;br /&gt;
* [http://www.copyright.gov/title17/92chap5.html#512 17 U.S.C. § 512(c) (&amp;quot;Information Residing on Systems or Networks at Direction of Users&amp;quot;)]&lt;br /&gt;
* [http://www.free-culture.cc/freecontent/ Lawrence Lessig, Free Culture] (pp. 1-20)&lt;br /&gt;
* [http://www.nytimes.com/2010/03/19/technology/19youtube.html?pagewanted=1&amp;amp;sq=viacom&amp;amp;st=cse&amp;amp;scp=2 &amp;quot;Viacom Says YouTube Ignored Copyrights&amp;quot; (M. Helft, NY Times, 3/18/2010)]&lt;br /&gt;
* Righthaven Copyright Lawsuits: [http://www.lasvegassun.com/news/2011/mar/29/righthaven-wins-round-litigation-campaign/ Las Vegas Sun, Righthaven wins round in litigation campaign], [http://www.lasvegassun.com/blogs/business-notebook/2011/mar/19/righthaven-lawsuits-backfire-reduce-protections-ne/ Las Vegas Sun, Righthaven lawsuits backfire, reduce protections for newspapers], and skim [http://www.righthavenlawsuits.com/ this].&lt;br /&gt;
* [http://www.citmedialaw.org/sites/citmedialaw.org/files/news%20aggregation%20white%20paper.pdf The Rise of the News Aggregator: Legal Implications and Best Practices]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings  ==&lt;br /&gt;
* [http://wendy.seltzer.org/blog/archives/2011/02/02/super-bust-due-process-and-domain-name-seizure.html Super Bust: Due Process and Domain Name Seizure]&lt;br /&gt;
* [http://creativecommons.org/about/licenses/comics1 Creative Commons: A Spectrum of Rights (comic)]&lt;br /&gt;
* [http://scholar.google.com/scholar_case?case=2589269115679339204&amp;amp;q=410+F.3d+792&amp;amp;hl=en&amp;amp;as_sdt=2002 Bridgeport v. Dimension, 410 F.3d 792 (6th Cir. 2005)] (Secs. I - II, pp. 795 - 805)&lt;br /&gt;
* [http://www.centerforsocialmedia.org/resources/publications/recut_reframe_recycle/ Center for Social Media, Recut, Reframe, Recyle] (full report optional)&lt;br /&gt;
* [http://scholar.google.com/scholar_case?case=8647956476676426155&amp;amp;q=545+U.S.+913&amp;amp;hl=en&amp;amp;as_sdt=2002 MGM v. Grokster, 545 U.S. 913 (2005)] (Sec. II, pp. 928 - 937)&lt;br /&gt;
* [http://www.nytimes.com/2008/09/09/nyregion/09potter.html?_r=1 &amp;quot;Rowling Wins Lawsuit Against Potter Lexicon&amp;quot; (J. Eligon, NY Times, 9/8/08)]&lt;br /&gt;
* [http://bits.blogs.nytimes.com/2008/01/16/830/index.html New York Times Bits Blog: Mixing It Up Over Remixes and Fair Use]&lt;br /&gt;
* [http://wendy.seltzer.org/blog-bak/archives/DMCA.html Wendy Seltzer&#039;s Blog, NFL Saga]&lt;br /&gt;
* [http://www.eff.org/files/20030926_unsafe_harbors.pdf EFF, Unsafe Harbors: Abusive DMCA Subpoenas and Takedown Demands]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Dardia</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Copyright_in_Cyberspace&amp;diff=6429</id>
		<title>Copyright in Cyberspace</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Copyright_in_Cyberspace&amp;diff=6429"/>
		<updated>2011-03-29T21:44:48Z</updated>

		<summary type="html">&lt;p&gt;Dardia: /* Required Readings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;April 5&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Internet has enabled individuals to become involved in the production of media and to distribute their contributions widely at a very low cost.  The former bastion of the entertainment industry is opening up to what many are calling a democratization of culture. The copyright doctrine of fair use seemingly bolsters the right to &amp;quot;recut, reframe, and recycle&amp;quot; previous works, but the protection fair use gives to those re-purposing copyrighted material is notoriously uncertain. &lt;br /&gt;
&lt;br /&gt;
Digital and file-sharing technologies also spawned the proliferation of sharing of media and music, which has led to a number of controversial legal and technological strategies.  The &amp;quot;notice-and-takedown&amp;quot; provisions of the  Digital Millennium Copyright Act (&amp;quot;DMCA&amp;quot;) allow Internet service providers to limit their liability for the copyright infringements of their users if the ISPs expeditiously remove material in response to complaints from copyright owners. The DMCA provides for counter-notice and &amp;quot;put-back&amp;quot; of removed material, but some argue that the statutory mechanism can chill innovative, constitutionally-protected speech.&lt;br /&gt;
&lt;br /&gt;
This class provides an overview of some major copyright law concepts and takes up some of the issues swirling around copyright in cyberspace.&lt;br /&gt;
&lt;br /&gt;
==Assignments==&lt;br /&gt;
&lt;br /&gt;
[[Assignments#Assignment_4:_Rough_Draft_and_Bonus_AV_Credit|Assignment 4 due]]&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Required Readings ==&lt;br /&gt;
* [http://www.copyright.gov/circs/circ01.pdf U.S. Copyright Office, Copyright Basics]&lt;br /&gt;
* [http://www.copyright.gov/title17/92chap1.html#107 17 U.S.C. § 107 (&amp;quot;Limitations on Exclusive Rights:  Fair Use&amp;quot;)]&lt;br /&gt;
* [http://www.copyright.gov/title17/92chap5.html#512 17 U.S.C. § 512(c) (&amp;quot;Information Residing on Systems or Networks at Direction of Users&amp;quot;)]&lt;br /&gt;
* [http://www.free-culture.cc/freecontent/ Lawrence Lessig, Free Culture] (pp. 1-20)&lt;br /&gt;
* [http://www.nytimes.com/2010/03/19/technology/19youtube.html?pagewanted=1&amp;amp;sq=viacom&amp;amp;st=cse&amp;amp;scp=2 &amp;quot;Viacom Says YouTube Ignored Copyrights&amp;quot; (M. Helft, NY Times, 3/18/2010)]&lt;br /&gt;
* [http://www.citmedialaw.org/sites/citmedialaw.org/files/news%20aggregation%20white%20paper.pdf The Rise of the News Aggregator: Legal Implications and Best Practices]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings  ==&lt;br /&gt;
* [http://wendy.seltzer.org/blog/archives/2011/02/02/super-bust-due-process-and-domain-name-seizure.html Super Bust: Due Process and Domain Name Seizure]&lt;br /&gt;
* [http://creativecommons.org/about/licenses/comics1 Creative Commons: A Spectrum of Rights (comic)]&lt;br /&gt;
* [http://scholar.google.com/scholar_case?case=2589269115679339204&amp;amp;q=410+F.3d+792&amp;amp;hl=en&amp;amp;as_sdt=2002 Bridgeport v. Dimension, 410 F.3d 792 (6th Cir. 2005)] (Secs. I - II, pp. 795 - 805)&lt;br /&gt;
* [http://www.centerforsocialmedia.org/resources/publications/recut_reframe_recycle/ Center for Social Media, Recut, Reframe, Recyle] (full report optional)&lt;br /&gt;
* [http://scholar.google.com/scholar_case?case=8647956476676426155&amp;amp;q=545+U.S.+913&amp;amp;hl=en&amp;amp;as_sdt=2002 MGM v. Grokster, 545 U.S. 913 (2005)] (Sec. II, pp. 928 - 937)&lt;br /&gt;
* [http://www.nytimes.com/2008/09/09/nyregion/09potter.html?_r=1 &amp;quot;Rowling Wins Lawsuit Against Potter Lexicon&amp;quot; (J. Eligon, NY Times, 9/8/08)]&lt;br /&gt;
* [http://bits.blogs.nytimes.com/2008/01/16/830/index.html New York Times Bits Blog: Mixing It Up Over Remixes and Fair Use]&lt;br /&gt;
* [http://wendy.seltzer.org/blog-bak/archives/DMCA.html Wendy Seltzer&#039;s Blog, NFL Saga]&lt;br /&gt;
* [http://www.eff.org/files/20030926_unsafe_harbors.pdf EFF, Unsafe Harbors: Abusive DMCA Subpoenas and Takedown Demands]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Dardia</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Control_and_Code:_Privacy_Online&amp;diff=6289</id>
		<title>Control and Code: Privacy Online</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Control_and_Code:_Privacy_Online&amp;diff=6289"/>
		<updated>2011-03-22T16:22:17Z</updated>

		<summary type="html">&lt;p&gt;Dardia: /* Optional Readings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;April 12&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Code is law; the architecture of the Internet and the software that runs on it will determine to a large extent how the Net is regulated in a way that goes far deeper than legal means could ever achieve (or at least ever achieve alone). Technological advances have also produced many tempting options for regulation and surveillance that may severely alter the balance of privacy, access to information and sharing of intellectual property. By regulating behavior, technological architectures or codes embed different values and political choices. Yet code is often treated as a technocratic affair, or something best left to private economic actors pursuing their own interests.  If code is law, then control of code is power. If important questions of social ordering are at stake, shouldn&#039;t the design and development of code be brought within the political process? In this class we delve into the technological alternatives that will shape interactions over the Internet, as well as the implications of each on personal freedom, privacy and combating cyber-crime. &lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
==Readings== &lt;br /&gt;
&lt;br /&gt;
* [http://futureoftheinternet.org/download Jonathan Zittrain, Future of the Internet, Chapter 9: Privacy 2.0]&lt;br /&gt;
* [http://www.bitsbook.com/wp-content/uploads/2008/12/chapter2.pdf Abelson, Ledeen, Lewis, Blown to Bits, Chapter 2: Naked in the Sunlight: Privacy Lost, Privacy Abandoned]&lt;br /&gt;
* [http://www.cato.org/pubs/pas/pa-295.html Solveig Singleton, Privacy as Censorship (CATO)]&lt;br /&gt;
&lt;br /&gt;
==Optional Readings==&lt;br /&gt;
&lt;br /&gt;
* [http://www.onthemedia.org/episodes/2010/04/02/segments/152890 NPR On the Media Story &amp;quot;Anonymous Justice&amp;quot;]&lt;br /&gt;
* [http://www.danah.org/papers/talks/2010/SXSW2010.html &amp;quot;Making Sense of Privacy and Publicity.&amp;quot; Transcript of talk given by Danah Boyd at SXSW. Austin, Texas, March 13, 2010]&lt;br /&gt;
* [https://www.socialtext.net/codev2/privacy Lawrence Lessig, Code 2.0: Privacy]&lt;br /&gt;
* http://paranoia.dubfire.net/2009/12/8-million-reasons-for-real-surveillance.html&lt;br /&gt;
* http://en.wikipedia.org/wiki/Human_flesh_search_engine&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Dardia</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Regulating_Speech_Online&amp;diff=6257</id>
		<title>Regulating Speech Online</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Regulating_Speech_Online&amp;diff=6257"/>
		<updated>2011-03-21T21:55:22Z</updated>

		<summary type="html">&lt;p&gt;Dardia: /* Optional Readings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;March 22&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Internet has the potential to revolutionize public discourse. It is a profoundly democratizing force. Instead of large media companies and corporate advertisers controlling the channels of speech, anyone with an Internet connection can &amp;quot;become a town crier with a voice that resonates farther than it could from any soapbox.&amp;quot;  Reno v. ACLU, 521 U.S. 884, 896-97 (1997). Internet speakers can reach vast audiences of readers, viewers, researchers, and buyers that stretch across real space borders, or they can concentrate on niche audiences that share a common interest or geographical location. What&#039;s more, with the rise of web 2.0, speech on the Internet has truly become a conversation, with different voices and viewpoints mingling together to create a single &amp;quot;work.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
With this great potential, however, comes new questions. What happens when anyone can publish to a national (and global) audience with virtually no oversight? How can a society protect its children from porn and its inboxes from spam?  Does defamation law apply to online publishers in the same way it applied to newspapers and other traditional print publications? Is online anonymity part of a noble tradition in political discourse stretching back to the founding fathers or the electronic equivalent of graffiti on the bathroom wall?  In this class, we will look at how law and social norms are struggling to adapt to this new electronic terrain.  &lt;br /&gt;
&lt;br /&gt;
==Assignments==&lt;br /&gt;
&lt;br /&gt;
[[Assignments#Assignment_3:_Project_Outline|Assignment 3 due]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1625820 David Ardia, Free Speech Savior or Shield for Scoundrels: An Empirical Study of Intermediary Immunity Under Section 230 of the Communications Decency Act] (Parts I &amp;amp; II)&lt;br /&gt;
* [http://www.law.cornell.edu/uscode/html/uscode47/usc_sec_47_00000230----000-.html Communications Decency Act § 230]&lt;br /&gt;
* [http://www.nytimes.com/2010/02/25/technology/companies/25google.html Larger Threat is Seen in Google Case NYT]&lt;br /&gt;
* [http://www.portfolio.com/news-markets/national-news/portfolio/2009/02/11/Two-Lawyers-Fight-Cyber-Bullying/index.html David Margolick, &amp;quot;Slimed Online,&amp;quot; Portfolio.com, February 11, 2009, read all]&lt;br /&gt;
* [http://arstechnica.com/tech-policy/news/2009/03/a-friendly-exchange-about-the-future-of-online-liability.ars John Palfrey and Adam Thierer, &amp;quot;Dialogue:  The Future of Online Obscenity and Social Networks,&amp;quot; Ars Technica, March 5, 2009, read all]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Reno_v._American_Civil_Liberties_Union Wikipedia on Reno v. ACLU].&lt;br /&gt;
* [http://www.socialtext.net/codev2/index.cgi?free_speech Lawrence Lessig, Code 2.0, Chapter 12: Free Speech]&lt;br /&gt;
* [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1689865 David Ardia, Reputation in a Networked World: Revisiting the Social Foundations of Defamation Law] (Part III) &lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
This comment really applies to a previous class, but you might be interested in reading about the latest counter-tactics in the struggle for a &amp;quot;borderless Internet&amp;quot; against government control in this article: [http://www.economist.com/node/18386151 Unorthodox links to the internet: Signalling dissent] [[User:Smithbc|Smithbc]] 16:56, 19 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links from Class ==&lt;/div&gt;</summary>
		<author><name>Dardia</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Copyright_in_Cyberspace&amp;diff=6226</id>
		<title>Copyright in Cyberspace</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Copyright_in_Cyberspace&amp;diff=6226"/>
		<updated>2011-03-16T22:10:59Z</updated>

		<summary type="html">&lt;p&gt;Dardia: /* Required Readings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;April 5&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Internet has enabled individuals to become involved in the production of media and to distribute their contributions widely at a very low cost.  The former bastion of the entertainment industry is opening up to what many are calling a democratization of culture. The copyright doctrine of fair use seemingly bolsters the right to &amp;quot;recut, reframe, and recycle&amp;quot; previous works, but the protection fair use gives to those re-purposing copyrighted material is notoriously uncertain. &lt;br /&gt;
&lt;br /&gt;
Digital and file-sharing technologies also spawned the proliferation of sharing of media and music, which has led to a number of controversial legal and technological strategies.  The &amp;quot;notice-and-takedown&amp;quot; provisions of the  Digital Millennium Copyright Act (&amp;quot;DMCA&amp;quot;) allow Internet service providers to limit their liability for the copyright infringements of their users if the ISPs expeditiously remove material in response to complaints from copyright owners. The DMCA provides for counter-notice and &amp;quot;put-back&amp;quot; of removed material, but some argue that the statutory mechanism can chill innovative, constitutionally-protected speech.&lt;br /&gt;
&lt;br /&gt;
This class provides an overview of some major copyright law concepts and takes up some of the issues swirling around copyright in cyberspace.&lt;br /&gt;
&lt;br /&gt;
==Assignments==&lt;br /&gt;
&lt;br /&gt;
[[Assignments#Assignment_4:_Rough_Draft_and_Bonus_AV_Credit|Assignment 4 due]]&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Required Readings ==&lt;br /&gt;
* [http://www.copyright.gov/circs/circ01.pdf U.S. Copyright Office, Copyright Basics]&lt;br /&gt;
* [http://scholar.google.com/scholar_case?case=4721801243812962515&amp;amp;q=204+F.Supp.2d+1244+&amp;amp;hl=en&amp;amp;as_sdt=2002 Newton v. Diamond, 204 F.Supp.2d 1244 (C.D. Cal. 2002)] (Secs. I - IV(a), pp. 1246 - 1259) ([http://scholar.google.com/scholar_case?case=7229536370368292204&amp;amp;q=349+F.3d+591&amp;amp;hl=en&amp;amp;as_sdt=40000002 9th Circuit Decision] Optional)&lt;br /&gt;
* [http://www.copyright.gov/title17/92chap1.html#107 17 U.S.C. § 107 (&amp;quot;Limitations on Exclusive Rights:  Fair Use&amp;quot;)]&lt;br /&gt;
* [http://www.free-culture.cc/freecontent/ Lawrence Lessig, Free Culture] (pp. 1-20)&lt;br /&gt;
* [http://www.copyright.gov/title17/92chap5.html#512 17 U.S.C. § 512(c) (&amp;quot;Information Residing on Systems or Networks at Direction of Users&amp;quot;)]&lt;br /&gt;
* [http://www.nytimes.com/2010/03/19/technology/19youtube.html?pagewanted=1&amp;amp;sq=viacom&amp;amp;st=cse&amp;amp;scp=2 &amp;quot;Viacom Says YouTube Ignored Copyrights&amp;quot; (M. Helft, NY Times, 3/18/2010)]&lt;br /&gt;
* [http://www.citmedialaw.org/sites/citmedialaw.org/files/news%20aggregation%20white%20paper.pdf The Rise of the News Aggregator: Legal Implications and Best Practices]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings  ==&lt;br /&gt;
* [http://wendy.seltzer.org/blog/archives/2011/02/02/super-bust-due-process-and-domain-name-seizure.html Super Bust: Due Process and Domain Name Seizure]&lt;br /&gt;
* [http://creativecommons.org/about/licenses/comics1 Creative Commons: A Spectrum of Rights (comic)]&lt;br /&gt;
* [http://scholar.google.com/scholar_case?case=2589269115679339204&amp;amp;q=410+F.3d+792&amp;amp;hl=en&amp;amp;as_sdt=2002 Bridgeport v. Dimension, 410 F.3d 792 (6th Cir. 2005)] (Secs. I - II, pp. 795 - 805)&lt;br /&gt;
* [http://www.centerforsocialmedia.org/resources/publications/recut_reframe_recycle/ Center for Social Media, Recut, Reframe, Recyle] (full report optional)&lt;br /&gt;
* [http://scholar.google.com/scholar_case?case=8647956476676426155&amp;amp;q=545+U.S.+913&amp;amp;hl=en&amp;amp;as_sdt=2002 MGM v. Grokster, 545 U.S. 913 (2005)] (Sec. II, pp. 928 - 937)&lt;br /&gt;
* [http://www.nytimes.com/2008/09/09/nyregion/09potter.html?_r=1 &amp;quot;Rowling Wins Lawsuit Against Potter Lexicon&amp;quot; (J. Eligon, NY Times, 9/8/08)]&lt;br /&gt;
* [http://bits.blogs.nytimes.com/2008/01/16/830/index.html New York Times Bits Blog: Mixing It Up Over Remixes and Fair Use]&lt;br /&gt;
* [http://wendy.seltzer.org/blog-bak/archives/DMCA.html Wendy Seltzer&#039;s Blog, NFL Saga]&lt;br /&gt;
* [http://www.eff.org/files/20030926_unsafe_harbors.pdf EFF, Unsafe Harbors: Abusive DMCA Subpoenas and Takedown Demands]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Dardia</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Copyright_in_Cyberspace&amp;diff=6225</id>
		<title>Copyright in Cyberspace</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Copyright_in_Cyberspace&amp;diff=6225"/>
		<updated>2011-03-16T22:10:01Z</updated>

		<summary type="html">&lt;p&gt;Dardia: /* Required Readings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;April 5&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Internet has enabled individuals to become involved in the production of media and to distribute their contributions widely at a very low cost.  The former bastion of the entertainment industry is opening up to what many are calling a democratization of culture. The copyright doctrine of fair use seemingly bolsters the right to &amp;quot;recut, reframe, and recycle&amp;quot; previous works, but the protection fair use gives to those re-purposing copyrighted material is notoriously uncertain. &lt;br /&gt;
&lt;br /&gt;
Digital and file-sharing technologies also spawned the proliferation of sharing of media and music, which has led to a number of controversial legal and technological strategies.  The &amp;quot;notice-and-takedown&amp;quot; provisions of the  Digital Millennium Copyright Act (&amp;quot;DMCA&amp;quot;) allow Internet service providers to limit their liability for the copyright infringements of their users if the ISPs expeditiously remove material in response to complaints from copyright owners. The DMCA provides for counter-notice and &amp;quot;put-back&amp;quot; of removed material, but some argue that the statutory mechanism can chill innovative, constitutionally-protected speech.&lt;br /&gt;
&lt;br /&gt;
This class provides an overview of some major copyright law concepts and takes up some of the issues swirling around copyright in cyberspace.&lt;br /&gt;
&lt;br /&gt;
==Assignments==&lt;br /&gt;
&lt;br /&gt;
[[Assignments#Assignment_4:_Rough_Draft_and_Bonus_AV_Credit|Assignment 4 due]]&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Required Readings ==&lt;br /&gt;
* [http://www.copyright.gov/circs/circ01.pdf U.S. Copyright Office, Copyright Basics]&lt;br /&gt;
* [http://scholar.google.com/scholar_case?case=4721801243812962515&amp;amp;q=204+F.Supp.2d+1244+&amp;amp;hl=en&amp;amp;as_sdt=2002 Newton v. Diamond, 204 F.Supp.2d 1244 (C.D. Cal. 2002)] (Secs. I - IV(a), pp. 1246 - 1259) ([http://scholar.google.com/scholar_case?case=7229536370368292204&amp;amp;q=349+F.3d+591&amp;amp;hl=en&amp;amp;as_sdt=40000002 9th Circuit Decision] Optional)&lt;br /&gt;
* [http://www.copyright.gov/title17/92chap1.html#107 17 U.S.C. § 107 (&amp;quot;Limitations on Exclusive Rights:  Fair Use&amp;quot;)]&lt;br /&gt;
* [http://www.free-culture.cc/freecontent/ Lawrence Lessig, Free Culture] (pp. 1-20)&lt;br /&gt;
* [http://www.copyright.gov/title17/92chap5.html#512 17 U.S.C. § 512(c) (&amp;quot;Information Residing on Systems or Networks at Direction of Users&amp;quot;)]&lt;br /&gt;
* [http://www.nytimes.com/2010/03/19/technology/19youtube.html?pagewanted=1&amp;amp;sq=viacom&amp;amp;st=cse&amp;amp;scp=2 &amp;quot;Viacom Says YouTube Ignored Copyrights&amp;quot; (M. Helft, NY Times, 3/18/2010)]&lt;br /&gt;
* [http://www.citmedialaw.org/sites/citmedialaw.org/files/news_aggregation_white_paper.pdf The Rise of the News Aggregator: Legal Implications and Best Practices]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings  ==&lt;br /&gt;
* [http://wendy.seltzer.org/blog/archives/2011/02/02/super-bust-due-process-and-domain-name-seizure.html Super Bust: Due Process and Domain Name Seizure]&lt;br /&gt;
* [http://creativecommons.org/about/licenses/comics1 Creative Commons: A Spectrum of Rights (comic)]&lt;br /&gt;
* [http://scholar.google.com/scholar_case?case=2589269115679339204&amp;amp;q=410+F.3d+792&amp;amp;hl=en&amp;amp;as_sdt=2002 Bridgeport v. Dimension, 410 F.3d 792 (6th Cir. 2005)] (Secs. I - II, pp. 795 - 805)&lt;br /&gt;
* [http://www.centerforsocialmedia.org/resources/publications/recut_reframe_recycle/ Center for Social Media, Recut, Reframe, Recyle] (full report optional)&lt;br /&gt;
* [http://scholar.google.com/scholar_case?case=8647956476676426155&amp;amp;q=545+U.S.+913&amp;amp;hl=en&amp;amp;as_sdt=2002 MGM v. Grokster, 545 U.S. 913 (2005)] (Sec. II, pp. 928 - 937)&lt;br /&gt;
* [http://www.nytimes.com/2008/09/09/nyregion/09potter.html?_r=1 &amp;quot;Rowling Wins Lawsuit Against Potter Lexicon&amp;quot; (J. Eligon, NY Times, 9/8/08)]&lt;br /&gt;
* [http://bits.blogs.nytimes.com/2008/01/16/830/index.html New York Times Bits Blog: Mixing It Up Over Remixes and Fair Use]&lt;br /&gt;
* [http://wendy.seltzer.org/blog-bak/archives/DMCA.html Wendy Seltzer&#039;s Blog, NFL Saga]&lt;br /&gt;
* [http://www.eff.org/files/20030926_unsafe_harbors.pdf EFF, Unsafe Harbors: Abusive DMCA Subpoenas and Takedown Demands]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Dardia</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Copyright_in_Cyberspace&amp;diff=6224</id>
		<title>Copyright in Cyberspace</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Copyright_in_Cyberspace&amp;diff=6224"/>
		<updated>2011-03-16T22:09:32Z</updated>

		<summary type="html">&lt;p&gt;Dardia: /* Required Readings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;April 5&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Internet has enabled individuals to become involved in the production of media and to distribute their contributions widely at a very low cost.  The former bastion of the entertainment industry is opening up to what many are calling a democratization of culture. The copyright doctrine of fair use seemingly bolsters the right to &amp;quot;recut, reframe, and recycle&amp;quot; previous works, but the protection fair use gives to those re-purposing copyrighted material is notoriously uncertain. &lt;br /&gt;
&lt;br /&gt;
Digital and file-sharing technologies also spawned the proliferation of sharing of media and music, which has led to a number of controversial legal and technological strategies.  The &amp;quot;notice-and-takedown&amp;quot; provisions of the  Digital Millennium Copyright Act (&amp;quot;DMCA&amp;quot;) allow Internet service providers to limit their liability for the copyright infringements of their users if the ISPs expeditiously remove material in response to complaints from copyright owners. The DMCA provides for counter-notice and &amp;quot;put-back&amp;quot; of removed material, but some argue that the statutory mechanism can chill innovative, constitutionally-protected speech.&lt;br /&gt;
&lt;br /&gt;
This class provides an overview of some major copyright law concepts and takes up some of the issues swirling around copyright in cyberspace.&lt;br /&gt;
&lt;br /&gt;
==Assignments==&lt;br /&gt;
&lt;br /&gt;
[[Assignments#Assignment_4:_Rough_Draft_and_Bonus_AV_Credit|Assignment 4 due]]&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Required Readings ==&lt;br /&gt;
* [http://www.copyright.gov/circs/circ01.pdf U.S. Copyright Office, Copyright Basics]&lt;br /&gt;
* [http://scholar.google.com/scholar_case?case=4721801243812962515&amp;amp;q=204+F.Supp.2d+1244+&amp;amp;hl=en&amp;amp;as_sdt=2002 Newton v. Diamond, 204 F.Supp.2d 1244 (C.D. Cal. 2002)] (Secs. I - IV(a), pp. 1246 - 1259) ([http://scholar.google.com/scholar_case?case=7229536370368292204&amp;amp;q=349+F.3d+591&amp;amp;hl=en&amp;amp;as_sdt=40000002 9th Circuit Decision] Optional)&lt;br /&gt;
* [http://www.copyright.gov/title17/92chap1.html#107 17 U.S.C. § 107 (&amp;quot;Limitations on Exclusive Rights:  Fair Use&amp;quot;)]&lt;br /&gt;
* [http://www.free-culture.cc/freecontent/ Lawrence Lessig, Free Culture] (pp. 1-20)&lt;br /&gt;
* [http://www.copyright.gov/title17/92chap5.html#512 17 U.S.C. § 512(c) (&amp;quot;Information Residing on Systems or Networks at Direction of Users&amp;quot;)]&lt;br /&gt;
* [http://www.nytimes.com/2010/03/19/technology/19youtube.html?pagewanted=1&amp;amp;sq=viacom&amp;amp;st=cse&amp;amp;scp=2 &amp;quot;Viacom Says YouTube Ignored Copyrights&amp;quot; (M. Helft, NY Times, 3/18/2010)]&lt;br /&gt;
* [http://www.citmedialaw.org/sites/citmedialaw.org/files/news aggregation white paper.pdf The Rise of the News Aggregator: Legal Implications and Best Practices]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings  ==&lt;br /&gt;
* [http://wendy.seltzer.org/blog/archives/2011/02/02/super-bust-due-process-and-domain-name-seizure.html Super Bust: Due Process and Domain Name Seizure]&lt;br /&gt;
* [http://creativecommons.org/about/licenses/comics1 Creative Commons: A Spectrum of Rights (comic)]&lt;br /&gt;
* [http://scholar.google.com/scholar_case?case=2589269115679339204&amp;amp;q=410+F.3d+792&amp;amp;hl=en&amp;amp;as_sdt=2002 Bridgeport v. Dimension, 410 F.3d 792 (6th Cir. 2005)] (Secs. I - II, pp. 795 - 805)&lt;br /&gt;
* [http://www.centerforsocialmedia.org/resources/publications/recut_reframe_recycle/ Center for Social Media, Recut, Reframe, Recyle] (full report optional)&lt;br /&gt;
* [http://scholar.google.com/scholar_case?case=8647956476676426155&amp;amp;q=545+U.S.+913&amp;amp;hl=en&amp;amp;as_sdt=2002 MGM v. Grokster, 545 U.S. 913 (2005)] (Sec. II, pp. 928 - 937)&lt;br /&gt;
* [http://www.nytimes.com/2008/09/09/nyregion/09potter.html?_r=1 &amp;quot;Rowling Wins Lawsuit Against Potter Lexicon&amp;quot; (J. Eligon, NY Times, 9/8/08)]&lt;br /&gt;
* [http://bits.blogs.nytimes.com/2008/01/16/830/index.html New York Times Bits Blog: Mixing It Up Over Remixes and Fair Use]&lt;br /&gt;
* [http://wendy.seltzer.org/blog-bak/archives/DMCA.html Wendy Seltzer&#039;s Blog, NFL Saga]&lt;br /&gt;
* [http://www.eff.org/files/20030926_unsafe_harbors.pdf EFF, Unsafe Harbors: Abusive DMCA Subpoenas and Takedown Demands]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Dardia</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Internet_Infrastructure_and_Regulation&amp;diff=5844</id>
		<title>Internet Infrastructure and Regulation</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Internet_Infrastructure_and_Regulation&amp;diff=5844"/>
		<updated>2011-02-22T23:53:14Z</updated>

		<summary type="html">&lt;p&gt;Dardia: /* Optional Readings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;March 29&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this class, we will cover the politics, policy, economics and technology of deploying broadband infrastructure.  We will look at the hot-off-the-presses US National Broadband Plan and the recent Berkman Center review of international experiences in broadband policy. Additionally, we will look at the substance and politics of the net neutrality debate. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
==Readings==&lt;br /&gt;
&lt;br /&gt;
* Executive Summary of the National Broadband Plan [http://www.broadband.gov/plan/executive-summary/]&lt;br /&gt;
&lt;br /&gt;
* National Broadband Plan Commission Meeting: National Purposes Update, February 18th 2010 [http://hraunfoss.fcc.gov/edocs_public/attachmatch/DOC-296353A1.pdf ]&lt;br /&gt;
&lt;br /&gt;
* Next Generation Connectivity: A review of broadband Internet transitions and policy from around the world, Berkman Center [http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/Berkman_Center_Broadband_Final_Report-C1_15Feb2010.pdf ]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings==&lt;br /&gt;
&lt;br /&gt;
* [http://www.fcc.gov The Federal Communications Commission]&lt;br /&gt;
* [http://www.broadband.gov National Broadband Plan]&lt;br /&gt;
* [http://www.openinternet.gov OpenInternet.gov]&lt;br /&gt;
* [http://www.ietf.org The Internet Engineering Task Force (IETF)]&lt;br /&gt;
* [http://www.icann.org The Internet Corporation for Assigned Names and Numbers]&lt;br /&gt;
* [http://www.fcc.gov/Reports/tcom1996.txt The Telecommunications Act of 1996]&lt;br /&gt;
* [http://wireless.fcc.gov/auctions/default.htm?job=auctions_home  FCC - Wireless Spectrum Auctions]&lt;br /&gt;
* [http://www.isp-planet.com/cplanet/tech/2004/prime_letter_040301_powell.html Powell&#039;s Four Freedoms]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Links from Class ==&lt;/div&gt;</summary>
		<author><name>Dardia</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Cybersecurity_and_Cyberwarfare&amp;diff=5686</id>
		<title>Cybersecurity and Cyberwarfare</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Cybersecurity_and_Cyberwarfare&amp;diff=5686"/>
		<updated>2011-02-21T13:43:17Z</updated>

		<summary type="html">&lt;p&gt;Dardia: /* Optional Readings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;May 3&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Cybersecurity has been identified as one of the greatest threats facing the United States today, but it is ill-defined and almost impossible to address. How can we frame this problem to better inspire solutions? How should government, military, businesses, and technologists approach the problem from different angles and do these different approaches work together?  &lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
* [http://www.lawfareblog.com/2010/12/senator-cardin%E2%80%99s-bill-to-explore-isp-enforcement-of-digital-security/ Jack Goldsmith: Senator Cardin’s Bill to Explore ISP Enforcement of Digital Security]&lt;br /&gt;
* [http://yupnet.org/zittrain/ Zittrain, The Future of the Internet: And How to Stop It; Chapter 3]&lt;br /&gt;
* [http://www.chathamhouse.org.uk/files/17827_r1110_cyberwarfare_es.pdf Chatham House Report On Cyberwarfare - Executive Summary]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Stuxnet Wikipedia entry on Stuxnet]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
* Jack Goldsmith, [http://www.brookings.edu/papers/2010/1208_4th_amendment_goldsmith.aspx The Cyberthreat, Government Network Operations, and the Fourth Amendment]&lt;br /&gt;
* Jane Holl Lute and Bruce McConnell, [http://www.wired.com/threatlevel/2011/02/dhs-op-ed/ Op-Ed: A Civil Perspective on Cybersecurity]&lt;br /&gt;
* Zittrain, [http://www.scientificamerican.com/article.cfm?id=freedom-and-anonymity Freedom and Anonymity]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.chathamhouse.org.uk/publications/papers/view/-/id/967/ On Cyber Warfare]&lt;br /&gt;
A little early for this, but I would like to share this nice paper written by analysts and researchers at Chatham House. It&#039;s pretty fundamental, I would recommend it to anyone who encounters this subject for the very first time. --[[User:Jastify|Jastify]] 22:55, 31 January 2011 (UTC)&lt;br /&gt;
: Great recommendation.  I&#039;ve added the executive summary to the required readings list. --[[User:Dardia|Dardia]] 23:50, 10 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Dardia</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Cybersecurity_and_Cyberwarfare&amp;diff=5676</id>
		<title>Cybersecurity and Cyberwarfare</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Cybersecurity_and_Cyberwarfare&amp;diff=5676"/>
		<updated>2011-02-18T20:32:27Z</updated>

		<summary type="html">&lt;p&gt;Dardia: /* Optional Readings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;May 3&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Cybersecurity has been identified as one of the greatest threats facing the United States today, but it is ill-defined and almost impossible to address. How can we frame this problem to better inspire solutions? How should government, military, businesses, and technologists approach the problem from different angles and do these different approaches work together?  &lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
* [http://www.lawfareblog.com/2010/12/senator-cardin%E2%80%99s-bill-to-explore-isp-enforcement-of-digital-security/ Jack Goldsmith: Senator Cardin’s Bill to Explore ISP Enforcement of Digital Security]&lt;br /&gt;
* [http://yupnet.org/zittrain/ Zittrain, The Future of the Internet: And How to Stop It; Chapter 3]&lt;br /&gt;
* [http://www.chathamhouse.org.uk/files/17827_r1110_cyberwarfare_es.pdf Chatham House Report On Cyberwarfare - Executive Summary]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Stuxnet Wikipedia entry on Stuxnet]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
* Jack Goldsmith, [http://www.brookings.edu/papers/2010/1208_4th_amendment_goldsmith.aspx The Cyberthreat, Government Network Operations, and the Fourth Amendment]&lt;br /&gt;
* Jane Holl Lute and Bruce McConnell, [http://www.wired.com/threatlevel/2011/02/dhs-op-ed/ Op-Ed: A Civil Perspective on Cybersecurity]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.chathamhouse.org.uk/publications/papers/view/-/id/967/ On Cyber Warfare]&lt;br /&gt;
A little early for this, but I would like to share this nice paper written by analysts and researchers at Chatham House. It&#039;s pretty fundamental, I would recommend it to anyone who encounters this subject for the very first time. --[[User:Jastify|Jastify]] 22:55, 31 January 2011 (UTC)&lt;br /&gt;
: Great recommendation.  I&#039;ve added the executive summary to the required readings list. --[[User:Dardia|Dardia]] 23:50, 10 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Dardia</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Cybersecurity_and_Cyberwarfare&amp;diff=5675</id>
		<title>Cybersecurity and Cyberwarfare</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Cybersecurity_and_Cyberwarfare&amp;diff=5675"/>
		<updated>2011-02-18T20:31:55Z</updated>

		<summary type="html">&lt;p&gt;Dardia: /* Optional Readings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;May 3&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Cybersecurity has been identified as one of the greatest threats facing the United States today, but it is ill-defined and almost impossible to address. How can we frame this problem to better inspire solutions? How should government, military, businesses, and technologists approach the problem from different angles and do these different approaches work together?  &lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
* [http://www.lawfareblog.com/2010/12/senator-cardin%E2%80%99s-bill-to-explore-isp-enforcement-of-digital-security/ Jack Goldsmith: Senator Cardin’s Bill to Explore ISP Enforcement of Digital Security]&lt;br /&gt;
* [http://yupnet.org/zittrain/ Zittrain, The Future of the Internet: And How to Stop It; Chapter 3]&lt;br /&gt;
* [http://www.chathamhouse.org.uk/files/17827_r1110_cyberwarfare_es.pdf Chatham House Report On Cyberwarfare - Executive Summary]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Stuxnet Wikipedia entry on Stuxnet]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
* [http://www.brookings.edu/papers/2010/1208_4th_amendment_goldsmith.aspx Jack Goldsmith: The Cyberthreat, Government Network Operations, and the Fourth Amendment]&lt;br /&gt;
* Jane Holl Lute and Bruce McConnell, [http://www.wired.com/threatlevel/2011/02/dhs-op-ed/ Op-Ed: A Civil Perspective on Cybersecurity]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.chathamhouse.org.uk/publications/papers/view/-/id/967/ On Cyber Warfare]&lt;br /&gt;
A little early for this, but I would like to share this nice paper written by analysts and researchers at Chatham House. It&#039;s pretty fundamental, I would recommend it to anyone who encounters this subject for the very first time. --[[User:Jastify|Jastify]] 22:55, 31 January 2011 (UTC)&lt;br /&gt;
: Great recommendation.  I&#039;ve added the executive summary to the required readings list. --[[User:Dardia|Dardia]] 23:50, 10 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Dardia</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Assignment_2_Submissions&amp;diff=5630</id>
		<title>Assignment 2 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Assignment_2_Submissions&amp;diff=5630"/>
		<updated>2011-02-15T23:15:57Z</updated>

		<summary type="html">&lt;p&gt;Dardia: /* Comments */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 5&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
This assignment is due on February 22.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;The &#039;&#039;&#039;upload file&#039;&#039;&#039; link is to the left, under &#039;&#039;&#039;toolbox&#039;&#039;&#039;.&#039;&#039;  Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name:&lt;br /&gt;
*Prospectus title:&lt;br /&gt;
*Link to prospectus: (the file you uploaded)&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
===Comments===&lt;br /&gt;
Everyone will receive an additional participation grade for this assignment. You should read through everyone&#039;s proposals after they are uploaded and add constructive comments below the proposal on which you&#039;re commenting. Comments should be submitted by March 6 so you have time to incorporate them, if applicable, into your project outline. (&#039;&#039;&#039;Remember to sign your comments!&#039;&#039;&#039;)&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
&lt;br /&gt;
*Name:&lt;br /&gt;
*Prospectus title:&lt;br /&gt;
*Link to prospectus:&lt;br /&gt;
*Comments:&lt;/div&gt;</summary>
		<author><name>Dardia</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Assignment_2_Submissions&amp;diff=5629</id>
		<title>Assignment 2 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Assignment_2_Submissions&amp;diff=5629"/>
		<updated>2011-02-15T23:15:31Z</updated>

		<summary type="html">&lt;p&gt;Dardia: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 5&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
This assignment is due on February 22.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;The &#039;&#039;&#039;upload file&#039;&#039;&#039; link is to the left, under &#039;&#039;&#039;toolbox&#039;&#039;&#039;.&#039;&#039;  Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name:&lt;br /&gt;
*Prospectus title:&lt;br /&gt;
*Link to prospectus: (the file you uploaded)&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
===Comments===&lt;br /&gt;
Everyone will receive an additional participation grade for this assignment. You should read through everyone&#039;s proposals after they are uploaded and add constructive comments below the proposal on which you&#039;re commenting. Comments should be submitted by March 6 so you have time to incorporate them, if applicable, into your project outline. (Remember to sign your comments!)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
&lt;br /&gt;
*Name:&lt;br /&gt;
*Prospectus title:&lt;br /&gt;
*Link to prospectus:&lt;br /&gt;
*Comments:&lt;/div&gt;</summary>
		<author><name>Dardia</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Law%27s_Role_in_Regulating_Online_Conduct_and_Speech&amp;diff=5577</id>
		<title>Law&#039;s Role in Regulating Online Conduct and Speech</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Law%27s_Role_in_Regulating_Online_Conduct_and_Speech&amp;diff=5577"/>
		<updated>2011-02-14T18:23:57Z</updated>

		<summary type="html">&lt;p&gt;Dardia: /* Optional Readings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;March 8&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
What is law&#039;s role in regulating online conduct and speech?  At this point in the course you should be ready to tackle this question from a number of different perspectives. In this class we will begin to explore what role law is &#039;&#039;capable&#039;&#039; of playing as well as what role it &#039;&#039;should&#039;&#039; play.  Remember John Perry Barlow&#039;s [http://www.cs.mu.oz.au/~zs/decl.html Declaration of Independence of Cyberspace] which you read earlier in the course?  Has his view of law&#039;s limited role been borne out?  The sources of law impacting online conduct and speech are many, from intellectual property to tort to the First Amendment.  Throughout today&#039;s class, we’ll tie the legal doctrines together with three themes:&lt;br /&gt;
&lt;br /&gt;
* How regulation changes when it’s carried out by computers, rather than by people.&lt;br /&gt;
* Whether going online increases or decreases government control.&lt;br /&gt;
* The new kinds of power possessed by online intermediaries.&lt;br /&gt;
&lt;br /&gt;
==Assignments==&lt;br /&gt;
&lt;br /&gt;
[[Assignments#Assignment_3:_Project_Outline|Assignment 3 due]]&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2011/sites/is2011/images/JohnsonPost.pdf David Johnson &amp;amp; David Post, Law and Borders] (excerpts)&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2011/sites/is2011/images/Kerr.pdf Orin Kerr, The Problem of Perspective in Internet Law] (excerpts)&lt;br /&gt;
&lt;br /&gt;
* [http://www.wired.com/wired/archive/8.07/haven_pr.html Simson Garfinkel, Welcome to Sealand, Now Bugger Off, Wired (July 2000)]&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2011/sites/is2011/images/Yahoo.pdf Yahoo! Inc v. La Ligue Contra Le Racisme, 433 F.3d 1199 (9th Cir. 2006)]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
* [http://www.ejiltalk.org/in-the-dock-in-paris/ Prof. Joseph Weiler: In the Dock, in Paris]&lt;br /&gt;
* [http://www.salon.com/technology/dan_gillmor/2010/12/03/the_net_s_soft_underbelly/index.html Salon: Online, the censors are scoring big wins]&lt;br /&gt;
* [https://www.eff.org/deeplinks/2010/12/amazon-and-wikileaks-first-amendment-only-strong EFF: Amazon and WikiLeaks - Online Speech is Only as Strong as the Weakest Intermediary]&lt;br /&gt;
* David Ardia, [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1689865 Reputation in a Networked World: Revisiting the Social Foundations of Defamation Law] (Part IV) &lt;br /&gt;
* James Grimmelmann, [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1760151 Sealand, HavenCo, and the Rule of Law]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Dardia</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Law%27s_Role_in_Regulating_Online_Conduct_and_Speech&amp;diff=5576</id>
		<title>Law&#039;s Role in Regulating Online Conduct and Speech</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Law%27s_Role_in_Regulating_Online_Conduct_and_Speech&amp;diff=5576"/>
		<updated>2011-02-14T18:23:30Z</updated>

		<summary type="html">&lt;p&gt;Dardia: /* Optional Readings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;March 8&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
What is law&#039;s role in regulating online conduct and speech?  At this point in the course you should be ready to tackle this question from a number of different perspectives. In this class we will begin to explore what role law is &#039;&#039;capable&#039;&#039; of playing as well as what role it &#039;&#039;should&#039;&#039; play.  Remember John Perry Barlow&#039;s [http://www.cs.mu.oz.au/~zs/decl.html Declaration of Independence of Cyberspace] which you read earlier in the course?  Has his view of law&#039;s limited role been borne out?  The sources of law impacting online conduct and speech are many, from intellectual property to tort to the First Amendment.  Throughout today&#039;s class, we’ll tie the legal doctrines together with three themes:&lt;br /&gt;
&lt;br /&gt;
* How regulation changes when it’s carried out by computers, rather than by people.&lt;br /&gt;
* Whether going online increases or decreases government control.&lt;br /&gt;
* The new kinds of power possessed by online intermediaries.&lt;br /&gt;
&lt;br /&gt;
==Assignments==&lt;br /&gt;
&lt;br /&gt;
[[Assignments#Assignment_3:_Project_Outline|Assignment 3 due]]&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2011/sites/is2011/images/JohnsonPost.pdf David Johnson &amp;amp; David Post, Law and Borders] (excerpts)&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2011/sites/is2011/images/Kerr.pdf Orin Kerr, The Problem of Perspective in Internet Law] (excerpts)&lt;br /&gt;
&lt;br /&gt;
* [http://www.wired.com/wired/archive/8.07/haven_pr.html Simson Garfinkel, Welcome to Sealand, Now Bugger Off, Wired (July 2000)]&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2011/sites/is2011/images/Yahoo.pdf Yahoo! Inc v. La Ligue Contra Le Racisme, 433 F.3d 1199 (9th Cir. 2006)]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
* [http://www.ejiltalk.org/in-the-dock-in-paris/ Prof. Joseph Weiler: In the Dock, in Paris]&lt;br /&gt;
* [http://www.salon.com/technology/dan_gillmor/2010/12/03/the_net_s_soft_underbelly/index.html Salon: Online, the censors are scoring big wins]&lt;br /&gt;
* [https://www.eff.org/deeplinks/2010/12/amazon-and-wikileaks-first-amendment-only-strong EFF: Amazon and WikiLeaks - Online Speech is Only as Strong as the Weakest Intermediary]&lt;br /&gt;
* [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1689865 David Ardia, Reputation in a Networked World: Revisiting the Social Foundations of Defamation Law] (Part IV) &lt;br /&gt;
* James Grimmelmann, [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1760151 Sealand, HavenCo, and the Rule of Law]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Dardia</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Cybersecurity_and_Cyberwarfare&amp;diff=5545</id>
		<title>Cybersecurity and Cyberwarfare</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Cybersecurity_and_Cyberwarfare&amp;diff=5545"/>
		<updated>2011-02-10T23:52:44Z</updated>

		<summary type="html">&lt;p&gt;Dardia: /* Readings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;May 3&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Cybersecurity has been identified as one of the greatest threats facing the United States today, but it is ill-defined and almost impossible to address. How can we frame this problem to better inspire solutions? How should government, military, businesses, and technologists approach the problem from different angles and do these different approaches work together?  &lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
* [http://www.lawfareblog.com/2010/12/senator-cardin%E2%80%99s-bill-to-explore-isp-enforcement-of-digital-security/ Jack Goldsmith: Senator Cardin’s Bill to Explore ISP Enforcement of Digital Security]&lt;br /&gt;
* [http://yupnet.org/zittrain/ Zittrain, The Future of the Internet: And How to Stop It; Chapter 3]&lt;br /&gt;
* [http://www.chathamhouse.org.uk/files/17827_r1110_cyberwarfare_es.pdf Chatham House Report On Cyberwarfare - Executive Summary]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Stuxnet Wikipedia entry on Stuxnet]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
* [http://www.brookings.edu/papers/2010/1208_4th_amendment_goldsmith.aspx Jack Goldsmith: The Cyberthreat, Government Network Operations, and the Fourth Amendment]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.chathamhouse.org.uk/publications/papers/view/-/id/967/ On Cyber Warfare]&lt;br /&gt;
A little early for this, but I would like to share this nice paper written by analysts and researchers at Chatham House. It&#039;s pretty fundamental, I would recommend it to anyone who encounters this subject for the very first time. --[[User:Jastify|Jastify]] 22:55, 31 January 2011 (UTC)&lt;br /&gt;
: Great recommendation.  I&#039;ve added the executive summary to the required readings list. --[[User:Dardia|Dardia]] 23:50, 10 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Dardia</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Cybersecurity_and_Cyberwarfare&amp;diff=5544</id>
		<title>Cybersecurity and Cyberwarfare</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Cybersecurity_and_Cyberwarfare&amp;diff=5544"/>
		<updated>2011-02-10T23:51:43Z</updated>

		<summary type="html">&lt;p&gt;Dardia: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;May 3&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Cybersecurity has been identified as one of the greatest threats facing the United States today, but it is ill-defined and almost impossible to address. How can we frame this problem to better inspire solutions? How should government, military, businesses, and technologists approach the problem from different angles and do these different approaches work together?  &lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
* [http://www.lawfareblog.com/2010/12/senator-cardin%E2%80%99s-bill-to-explore-isp-enforcement-of-digital-security/ Jack Goldsmith: Senator Cardin’s Bill to Explore ISP Enforcement of Digital Security]&lt;br /&gt;
* [http://yupnet.org/zittrain/ Zittrain, The Future of the Internet: And How to Stop It; Chapter 3]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Stuxnet Wikipedia entry on Stuxnet]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
* [http://www.brookings.edu/papers/2010/1208_4th_amendment_goldsmith.aspx Jack Goldsmith: The Cyberthreat, Government Network Operations, and the Fourth Amendment]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.chathamhouse.org.uk/publications/papers/view/-/id/967/ On Cyber Warfare]&lt;br /&gt;
A little early for this, but I would like to share this nice paper written by analysts and researchers at Chatham House. It&#039;s pretty fundamental, I would recommend it to anyone who encounters this subject for the very first time. --[[User:Jastify|Jastify]] 22:55, 31 January 2011 (UTC)&lt;br /&gt;
: Great recommendation.  I&#039;ve added the executive summary to the required readings list. --[[User:Dardia|Dardia]] 23:50, 10 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Dardia</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Cybersecurity_and_Cyberwarfare&amp;diff=5543</id>
		<title>Cybersecurity and Cyberwarfare</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Cybersecurity_and_Cyberwarfare&amp;diff=5543"/>
		<updated>2011-02-10T23:51:11Z</updated>

		<summary type="html">&lt;p&gt;Dardia: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;May 3&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Cybersecurity has been identified as one of the greatest threats facing the United States today, but it is ill-defined and almost impossible to address. How can we frame this problem to better inspire solutions? How should government, military, businesses, and technologists approach the problem from different angles and do these different approaches work together?  &lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
* [http://www.lawfareblog.com/2010/12/senator-cardin%E2%80%99s-bill-to-explore-isp-enforcement-of-digital-security/ Jack Goldsmith: Senator Cardin’s Bill to Explore ISP Enforcement of Digital Security]&lt;br /&gt;
* [http://yupnet.org/zittrain/ Zittrain, The Future of the Internet: And How to Stop It; Chapter 3]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Stuxnet Wikipedia entry on Stuxnet]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
* [http://www.brookings.edu/papers/2010/1208_4th_amendment_goldsmith.aspx Jack Goldsmith: The Cyberthreat, Government Network Operations, and the Fourth Amendment]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.chathamhouse.org.uk/publications/papers/view/-/id/967/ On Cyber Warfare]&lt;br /&gt;
A little early for this, but I would like to share this nice paper written by analysts and researchers at Chatham House. It&#039;s pretty fundamental, I would recommend it to anyone who encounters this subject for the very first time. --[[User:Jastify|Jastify]] 22:55, 31 January 2011 (UTC)&lt;br /&gt;
 : Great recommendation.  I&#039;ve added the executive summary to the required readings list. --[[User:Dardia|Dardia]] 23:50, 10 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Dardia</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Cybersecurity_and_Cyberwarfare&amp;diff=5542</id>
		<title>Cybersecurity and Cyberwarfare</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Cybersecurity_and_Cyberwarfare&amp;diff=5542"/>
		<updated>2011-02-10T23:50:15Z</updated>

		<summary type="html">&lt;p&gt;Dardia: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;May 3&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Cybersecurity has been identified as one of the greatest threats facing the United States today, but it is ill-defined and almost impossible to address. How can we frame this problem to better inspire solutions? How should government, military, businesses, and technologists approach the problem from different angles and do these different approaches work together?  &lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
* [http://www.lawfareblog.com/2010/12/senator-cardin%E2%80%99s-bill-to-explore-isp-enforcement-of-digital-security/ Jack Goldsmith: Senator Cardin’s Bill to Explore ISP Enforcement of Digital Security]&lt;br /&gt;
* [http://yupnet.org/zittrain/ Zittrain, The Future of the Internet: And How to Stop It; Chapter 3]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Stuxnet Wikipedia entry on Stuxnet]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
* [http://www.brookings.edu/papers/2010/1208_4th_amendment_goldsmith.aspx Jack Goldsmith: The Cyberthreat, Government Network Operations, and the Fourth Amendment]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.chathamhouse.org.uk/publications/papers/view/-/id/967/ On Cyber Warfare]&lt;br /&gt;
A little early for this, but I would like to share this nice paper written by analysts and researchers at Chatham House. It&#039;s pretty fundamental, I would recommend it to anyone who encounters this subject for the very first time. --[[User:Jastify|Jastify]] 22:55, 31 January 2011 (UTC)&lt;br /&gt;
| Great recommendation.  I&#039;ve added the executive summary to the required readings list. --[[User:Dardia|Dardia]] 23:50, 10 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Dardia</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Cybersecurity_and_Cyberwarfare&amp;diff=5541</id>
		<title>Cybersecurity and Cyberwarfare</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Cybersecurity_and_Cyberwarfare&amp;diff=5541"/>
		<updated>2011-02-10T23:48:28Z</updated>

		<summary type="html">&lt;p&gt;Dardia: /* Readings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;May 3&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Cybersecurity has been identified as one of the greatest threats facing the United States today, but it is ill-defined and almost impossible to address. How can we frame this problem to better inspire solutions? How should government, military, businesses, and technologists approach the problem from different angles and do these different approaches work together?  &lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
* [http://www.lawfareblog.com/2010/12/senator-cardin%E2%80%99s-bill-to-explore-isp-enforcement-of-digital-security/ Jack Goldsmith: Senator Cardin’s Bill to Explore ISP Enforcement of Digital Security]&lt;br /&gt;
* [http://yupnet.org/zittrain/ Zittrain, The Future of the Internet: And How to Stop It; Chapter 3]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Stuxnet Wikipedia entry on Stuxnet]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
* [http://www.brookings.edu/papers/2010/1208_4th_amendment_goldsmith.aspx Jack Goldsmith: The Cyberthreat, Government Network Operations, and the Fourth Amendment]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.chathamhouse.org.uk/publications/papers/view/-/id/967/ On Cyber Warfare]&lt;br /&gt;
A little early for this, but I would like to share this nice paper written by analysts and researchers at Chatham House. It&#039;s pretty fundamental, I would recommend it to anyone who encounters this subject for the very first time. --[[User:Jastify|Jastify]] 22:55, 31 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Dardia</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Cybersecurity_and_Cyberwarfare&amp;diff=5540</id>
		<title>Cybersecurity and Cyberwarfare</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Cybersecurity_and_Cyberwarfare&amp;diff=5540"/>
		<updated>2011-02-10T23:44:09Z</updated>

		<summary type="html">&lt;p&gt;Dardia: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;May 3&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Cybersecurity has been identified as one of the greatest threats facing the United States today, but it is ill-defined and almost impossible to address. How can we frame this problem to better inspire solutions? How should government, military, businesses, and technologists approach the problem from different angles and do these different approaches work together?  &lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
* [http://www.lawfareblog.com/2010/12/senator-cardin%E2%80%99s-bill-to-explore-isp-enforcement-of-digital-security/ Jack Goldsmith: Senator Cardin’s Bill to Explore ISP Enforcement of Digital Security]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
* [http://www.brookings.edu/papers/2010/1208_4th_amendment_goldsmith.aspx Jack Goldsmith: The Cyberthreat, Government Network Operations, and the Fourth Amendment]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.chathamhouse.org.uk/publications/papers/view/-/id/967/ On Cyber Warfare]&lt;br /&gt;
A little early for this, but I would like to share this nice paper written by analysts and researchers at Chatham House. It&#039;s pretty fundamental, I would recommend it to anyone who encounters this subject for the very first time. --[[User:Jastify|Jastify]] 22:55, 31 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Dardia</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Control_and_Code:_Privacy_Online&amp;diff=5539</id>
		<title>Control and Code: Privacy Online</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Control_and_Code:_Privacy_Online&amp;diff=5539"/>
		<updated>2011-02-10T23:39:53Z</updated>

		<summary type="html">&lt;p&gt;Dardia: /* Readings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;April 12&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Code is law; the architecture of the Internet and the software that runs on it will determine to a large extent how the Net is regulated in a way that goes far deeper than legal means could ever achieve (or at least ever achieve alone). Technological advances have also produced many tempting options for regulation and surveillance that may severely alter the balance of privacy, access to information and sharing of intellectual property. By regulating behavior, technological architectures or codes embed different values and political choices. Yet code is often treated as a technocratic affair, or something best left to private economic actors pursuing their own interests.  If code is law, then control of code is power. If important questions of social ordering are at stake, shouldn&#039;t the design and development of code be brought within the political process? In this class we delve into the technological alternatives that will shape interactions over the Internet, as well as the implications of each on personal freedom, privacy and combating cyber-crime. &lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
==Readings== &lt;br /&gt;
&lt;br /&gt;
* [http://futureoftheinternet.org/download Jonathan Zittrain, Future of the Internet, Chapter 9: Privacy 2.0]&lt;br /&gt;
* [http://www.bitsbook.com/wp-content/uploads/2008/12/chapter2.pdf Abelson, Ledeen, Lewis, Blown to Bits, Chapter 2: Naked in the Sunlight: Privacy Lost, Privacy Abandoned]&lt;br /&gt;
* [http://www.cato.org/pubs/pas/pa-295.html Solveig Singleton, Privacy as Censorship (CATO)]&lt;br /&gt;
&lt;br /&gt;
==Optional Readings==&lt;br /&gt;
&lt;br /&gt;
* [http://www.onthemedia.org/episodes/2010/04/02/segments/152890 NPR On the Media Story &amp;quot;Anonymous Justice&amp;quot;]&lt;br /&gt;
* [http://www.danah.org/papers/talks/2010/SXSW2010.html &amp;quot;Making Sense of Privacy and Publicity.&amp;quot; Transcript of talk given by Danah Boyd at SXSW. Austin, Texas, March 13, 2010]&lt;br /&gt;
* http://paranoia.dubfire.net/2009/12/8-million-reasons-for-real-surveillance.html&lt;br /&gt;
* http://en.wikipedia.org/wiki/Human_flesh_search_engine&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Dardia</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Law%27s_Role_in_Regulating_Online_Conduct_and_Speech&amp;diff=5538</id>
		<title>Law&#039;s Role in Regulating Online Conduct and Speech</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Law%27s_Role_in_Regulating_Online_Conduct_and_Speech&amp;diff=5538"/>
		<updated>2011-02-10T23:32:27Z</updated>

		<summary type="html">&lt;p&gt;Dardia: /* Assignments */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;March 8&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
What is law&#039;s role in regulating online conduct and speech?  At this point in the course you should be ready to tackle this question from a number of different perspectives. In this class we will begin to explore what role law is &#039;&#039;capable&#039;&#039; of playing as well as what role it &#039;&#039;should&#039;&#039; play.  Remember John Perry Barlow&#039;s [http://www.cs.mu.oz.au/~zs/decl.html Declaration of Independence of Cyberspace] which you read earlier in the course?  Has his view of law&#039;s limited role been borne out?  The sources of law impacting online conduct and speech are many, from intellectual property to tort to the First Amendment.  Throughout today&#039;s class, we’ll tie the legal doctrines together with three themes:&lt;br /&gt;
&lt;br /&gt;
* How regulation changes when it’s carried out by computers, rather than by people.&lt;br /&gt;
* Whether going online increases or decreases government control.&lt;br /&gt;
* The new kinds of power possessed by online intermediaries.&lt;br /&gt;
&lt;br /&gt;
==Assignments==&lt;br /&gt;
&lt;br /&gt;
[[Assignments#Assignment_3:_Project_Outline|Assignment 3 due]]&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2011/sites/is2011/images/JohnsonPost.pdf David Johnson &amp;amp; David Post, Law and Borders] (excerpts)&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2011/sites/is2011/images/Kerr.pdf Orin Kerr, The Problem of Perspective in Internet Law] (excerpts)&lt;br /&gt;
&lt;br /&gt;
* [http://www.wired.com/wired/archive/8.07/haven_pr.html Simson Garfinkel, Welcome to Sealand, Now Bugger Off, Wired (July 2000)]&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2011/sites/is2011/images/Yahoo.pdf Yahoo! Inc v. La Ligue Contra Le Racisme, 433 F.3d 1199 (9th Cir. 2006)]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
* [http://www.ejiltalk.org/in-the-dock-in-paris/ Prof. Joseph Weiler: In the Dock, in Paris]&lt;br /&gt;
* [http://www.salon.com/technology/dan_gillmor/2010/12/03/the_net_s_soft_underbelly/index.html Salon: Online, the censors are scoring big wins]&lt;br /&gt;
* [https://www.eff.org/deeplinks/2010/12/amazon-and-wikileaks-first-amendment-only-strong EFF: Amazon and WikiLeaks - Online Speech is Only as Strong as the Weakest Intermediary]&lt;br /&gt;
* [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1689865 David Ardia, Reputation in a Networked World: Revisiting the Social Foundations of Defamation Law] (Part IV) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Dardia</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Regulating_Speech_Online&amp;diff=5537</id>
		<title>Regulating Speech Online</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Regulating_Speech_Online&amp;diff=5537"/>
		<updated>2011-02-10T23:31:26Z</updated>

		<summary type="html">&lt;p&gt;Dardia: /* Readings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;March 22&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Internet has the potential to revolutionize public discourse. It is a profoundly democratizing force. Instead of large media companies and corporate advertisers controlling the channels of speech, anyone with an Internet connection can &amp;quot;become a town crier with a voice that resonates farther than it could from any soapbox.&amp;quot;  Reno v. ACLU, 521 U.S. 884, 896-97 (1997). Internet speakers can reach vast audiences of readers, viewers, researchers, and buyers that stretch across real space borders, or they can concentrate on niche audiences that share a common interest or geographical location. What&#039;s more, with the rise of web 2.0, speech on the Internet has truly become a conversation, with different voices and viewpoints mingling together to create a single &amp;quot;work.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
With this great potential, however, comes new questions. What happens when anyone can publish to a national (and global) audience with virtually no oversight? How can a society protect its children from porn and its inboxes from spam?  Does defamation law apply to online publishers in the same way it applied to newspapers and other traditional print publications? Is online anonymity part of a noble tradition in political discourse stretching back to the founding fathers or the electronic equivalent of graffiti on the bathroom wall?  In this class, we will look at how law and social norms are struggling to adapt to this new electronic terrain.  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1625820 David Ardia, Free Speech Savior or Shield for Scoundrels: An Empirical Study of Intermediary Immunity Under Section 230 of the Communications Decency Act] (Parts I &amp;amp; II)&lt;br /&gt;
* [http://www.law.cornell.edu/uscode/html/uscode47/usc_sec_47_00000230----000-.html Communications Decency Act § 230]&lt;br /&gt;
* [http://www.nytimes.com/2010/02/25/technology/companies/25google.html Larger Threat is Seen in Google Case NYT]&lt;br /&gt;
* [http://www.portfolio.com/news-markets/national-news/portfolio/2009/02/11/Two-Lawyers-Fight-Cyber-Bullying/index.html David Margolick, &amp;quot;Slimed Online,&amp;quot; Portfolio.com, February 11, 2009, read all]&lt;br /&gt;
* [http://arstechnica.com/tech-policy/news/2009/03/a-friendly-exchange-about-the-future-of-online-liability.ars John Palfrey and Adam Thierer, &amp;quot;Dialogue:  The Future of Online Obscenity and Social Networks,&amp;quot; Ars Technica, March 5, 2009, read all]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Reno_v._American_Civil_Liberties_Union Wikipedia on Reno v. ACLU].&lt;br /&gt;
* [http://www.paed.uscourts.gov/documents/opinions/07D0346P.pdf ACLU v. Gonzales], 478 F.Supp2d 775 (E.D.Pa. 2007), read pp. 1-7, 61-74, 82-83; skim pp. 74-81.&lt;br /&gt;
* [http://www.socialtext.net/codev2/index.cgi?free_speech Lawrence Lessig, Code 2.0, Chapter 12: Free Speech]&lt;br /&gt;
* [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1689865 David Ardia, Reputation in a Networked World: Revisiting the Social Foundations of Defamation Law] (Part III) &lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
== Links from Class ==&lt;/div&gt;</summary>
		<author><name>Dardia</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Regulating_Speech_Online&amp;diff=5536</id>
		<title>Regulating Speech Online</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Regulating_Speech_Online&amp;diff=5536"/>
		<updated>2011-02-10T23:29:13Z</updated>

		<summary type="html">&lt;p&gt;Dardia: /* Optional Readings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;March 22&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Internet has the potential to revolutionize public discourse. It is a profoundly democratizing force. Instead of large media companies and corporate advertisers controlling the channels of speech, anyone with an Internet connection can &amp;quot;become a town crier with a voice that resonates farther than it could from any soapbox.&amp;quot;  Reno v. ACLU, 521 U.S. 884, 896-97 (1997). Internet speakers can reach vast audiences of readers, viewers, researchers, and buyers that stretch across real space borders, or they can concentrate on niche audiences that share a common interest or geographical location. What&#039;s more, with the rise of web 2.0, speech on the Internet has truly become a conversation, with different voices and viewpoints mingling together to create a single &amp;quot;work.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
With this great potential, however, comes new questions. What happens when anyone can publish to a national (and global) audience with virtually no oversight? How can a society protect its children from porn and its inboxes from spam?  Does defamation law apply to online publishers in the same way it applied to newspapers and other traditional print publications? Is online anonymity part of a noble tradition in political discourse stretching back to the founding fathers or the electronic equivalent of graffiti on the bathroom wall?  In this class, we will look at how law and social norms are struggling to adapt to this new electronic terrain.  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.law.cornell.edu/uscode/html/uscode47/usc_sec_47_00000230----000-.html Communications Decency Act § 230]&lt;br /&gt;
* [http://www.nytimes.com/2010/02/25/technology/companies/25google.html Larger Threat is Seen in Google Case NYT]&lt;br /&gt;
* [http://www.portfolio.com/news-markets/national-news/portfolio/2009/02/11/Two-Lawyers-Fight-Cyber-Bullying/index.html David Margolick, &amp;quot;Slimed Online,&amp;quot; Portfolio.com, February 11, 2009, read all]&lt;br /&gt;
* [http://arstechnica.com/tech-policy/news/2009/03/a-friendly-exchange-about-the-future-of-online-liability.ars John Palfrey and Adam Thierer, &amp;quot;Dialogue:  The Future of Online Obscenity and Social Networks,&amp;quot; Ars Technica, March 5, 2009, read all]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Reno_v._American_Civil_Liberties_Union Wikipedia on Reno v. ACLU].&lt;br /&gt;
* [http://www.paed.uscourts.gov/documents/opinions/07D0346P.pdf ACLU v. Gonzales], 478 F.Supp2d 775 (E.D.Pa. 2007), read pp. 1-7, 61-74, 82-83; skim pp. 74-81.&lt;br /&gt;
* [http://www.socialtext.net/codev2/index.cgi?free_speech Lawrence Lessig, Code 2.0, Chapter 12: Free Speech]&lt;br /&gt;
* [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1689865 David Ardia, Reputation in a Networked World: Revisiting the Social Foundations of Defamation Law] (Part III) &lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
== Links from Class ==&lt;/div&gt;</summary>
		<author><name>Dardia</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Regulating_Speech_Online&amp;diff=5535</id>
		<title>Regulating Speech Online</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Regulating_Speech_Online&amp;diff=5535"/>
		<updated>2011-02-10T23:28:33Z</updated>

		<summary type="html">&lt;p&gt;Dardia: /* Readings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;March 22&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Internet has the potential to revolutionize public discourse. It is a profoundly democratizing force. Instead of large media companies and corporate advertisers controlling the channels of speech, anyone with an Internet connection can &amp;quot;become a town crier with a voice that resonates farther than it could from any soapbox.&amp;quot;  Reno v. ACLU, 521 U.S. 884, 896-97 (1997). Internet speakers can reach vast audiences of readers, viewers, researchers, and buyers that stretch across real space borders, or they can concentrate on niche audiences that share a common interest or geographical location. What&#039;s more, with the rise of web 2.0, speech on the Internet has truly become a conversation, with different voices and viewpoints mingling together to create a single &amp;quot;work.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
With this great potential, however, comes new questions. What happens when anyone can publish to a national (and global) audience with virtually no oversight? How can a society protect its children from porn and its inboxes from spam?  Does defamation law apply to online publishers in the same way it applied to newspapers and other traditional print publications? Is online anonymity part of a noble tradition in political discourse stretching back to the founding fathers or the electronic equivalent of graffiti on the bathroom wall?  In this class, we will look at how law and social norms are struggling to adapt to this new electronic terrain.  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.law.cornell.edu/uscode/html/uscode47/usc_sec_47_00000230----000-.html Communications Decency Act § 230]&lt;br /&gt;
* [http://www.nytimes.com/2010/02/25/technology/companies/25google.html Larger Threat is Seen in Google Case NYT]&lt;br /&gt;
* [http://www.portfolio.com/news-markets/national-news/portfolio/2009/02/11/Two-Lawyers-Fight-Cyber-Bullying/index.html David Margolick, &amp;quot;Slimed Online,&amp;quot; Portfolio.com, February 11, 2009, read all]&lt;br /&gt;
* [http://arstechnica.com/tech-policy/news/2009/03/a-friendly-exchange-about-the-future-of-online-liability.ars John Palfrey and Adam Thierer, &amp;quot;Dialogue:  The Future of Online Obscenity and Social Networks,&amp;quot; Ars Technica, March 5, 2009, read all]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Reno_v._American_Civil_Liberties_Union Wikipedia on Reno v. ACLU].&lt;br /&gt;
* [http://www.paed.uscourts.gov/documents/opinions/07D0346P.pdf ACLU v. Gonzales], 478 F.Supp2d 775 (E.D.Pa. 2007), read pp. 1-7, 61-74, 82-83; skim pp. 74-81.&lt;br /&gt;
* [http://www.socialtext.net/codev2/index.cgi?free_speech Lawrence Lessig, Code 2.0, Chapter 12: Free Speech]&lt;br /&gt;
* [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1625820 David Ardia, Free Speech Savior or Shield for Scoundrels: An Empirical Study of Intermediary Immunity Under Section 230 of the Communications Decency Act] (Parts I &amp;amp; II)&lt;br /&gt;
* [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1689865 David Ardia, Reputation in a Networked World: Revisiting the Social Foundations of Defamation Law] (Part III) &lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
== Links from Class ==&lt;/div&gt;</summary>
		<author><name>Dardia</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=New_and_Old_Media,_Participation,_and_Information&amp;diff=5534</id>
		<title>New and Old Media, Participation, and Information</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=New_and_Old_Media,_Participation,_and_Information&amp;diff=5534"/>
		<updated>2011-02-10T23:19:21Z</updated>

		<summary type="html">&lt;p&gt;Dardia: /* Readings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;March 1&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The profusion of low-cost media production and distribution has led to the rise of an alternative citizen-led media sector.  Is this a passing fad of enthusiastic amateurs or the beginning of a fundamental restructuring of the way media and news are produced and consumed?   Will the current trends lead to more information, better information, and better informed people or to an infinite stream of unreliable chatter?  Will it lead to a more politically engaged populace or to an increasingly polarized society that picks its sources of information to match its biases and ignorance?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
==Readings==&lt;br /&gt;
* John Nichols and Robert W. McChesney, [http://www.thenation.com/article/death-and-life-great-american-newspapers The Life and Death of Great American Newspapers]&lt;br /&gt;
* [http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/Overview_MR.pdf Media Re:public Overview] - Read at least the executive summary&lt;br /&gt;
* [https://secure.nmmstream.net/anon.newmediamill/aspen/kcfinalenglishbookweb.pdf Knight Commission Report on Information Needs of Communities in a Democracy] - Read at least the executive summary, recommendations and conclusions&lt;br /&gt;
* Nieman Journalism Lab, [http://www.niemanlab.org/2009/06/four-crowdsourcing-lessons-from-the-guardians-spectacular-expenses-scandal-experiment/ Four crowdsourcing lessons from the Guardian’s (spectacular) expenses-scandal experiment]&lt;br /&gt;
* [http://sunlightfoundation.com/ Sunlight Foundation website] - just look around the site to see what they are up to&lt;br /&gt;
* Pennenberg, [http://www.washingtonpost.com/wp-dyn/content/article/2011/01/28/AR2011012803042.html WikiLeaks&#039; Julian Assange: &#039;Anarchist,&#039; &#039;agitator,&#039; &#039;arrogant&#039; and a journalist]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.ftc.gov/opp/workshops/news/jun15/docs/new-staff-discussion.pdf FTC Staff Discussion Draft, Potential Policy Recommendations to Support the Reinvention of Journalism] - just skim it&lt;br /&gt;
* Leonard Downie, Jr., and Michael Schudson, [http://www.cjr.org/reconstruction/the_reconstruction_of_american.php?page=all The Reconstruction of American Journalism]&lt;br /&gt;
* [http://www.oreilly.com/catalog/wemedia/book/index.csp We The Media, Dan Gillmor] (the [http://www.oreilly.com/catalog/wemedia/book/ch00.pdf Introduction] is a good start, so to speak)&lt;br /&gt;
* [http://journalism.nyu.edu/pubzone/weblogs/pressthink/2005/01/21/berk_essy.html Jay Rosen, Bloggers vs. Journalists Is Over]&lt;br /&gt;
* [http://www.ted.com/talks/clay_shirky_how_cellphones_twitter_facebook_can_make_history.html Shirky on Social Media]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
== Links from Class ==&lt;/div&gt;</summary>
		<author><name>Dardia</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=New_and_Old_Media,_Participation,_and_Information&amp;diff=5533</id>
		<title>New and Old Media, Participation, and Information</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=New_and_Old_Media,_Participation,_and_Information&amp;diff=5533"/>
		<updated>2011-02-10T23:17:49Z</updated>

		<summary type="html">&lt;p&gt;Dardia: /* Optional Readings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;March 1&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The profusion of low-cost media production and distribution has led to the rise of an alternative citizen-led media sector.  Is this a passing fad of enthusiastic amateurs or the beginning of a fundamental restructuring of the way media and news are produced and consumed?   Will the current trends lead to more information, better information, and better informed people or to an infinite stream of unreliable chatter?  Will it lead to a more politically engaged populace or to an increasingly polarized society that picks its sources of information to match its biases and ignorance?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
==Readings==&lt;br /&gt;
* John Nichols and Robert W. McChesney, [http://www.thenation.com/article/death-and-life-great-american-newspapers The Life and Death of Great American Newspapers]&lt;br /&gt;
* [http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/Overview_MR.pdf Media Re:public Overview] - Read at least the executive summary&lt;br /&gt;
* [https://secure.nmmstream.net/anon.newmediamill/aspen/kcfinalenglishbookweb.pdf Knight Commission Report on Information Needs of Communities in a Democracy] - Read at least the executive summary, recommendations and conclusions&lt;br /&gt;
* Nieman Journalism Lab, [http://www.niemanlab.org/2009/06/four-crowdsourcing-lessons-from-the-guardians-spectacular-expenses-scandal-experiment/ Four crowdsourcing lessons from the Guardian’s (spectacular) expenses-scandal experiment]&lt;br /&gt;
* Pennenberg, [http://www.washingtonpost.com/wp-dyn/content/article/2011/01/28/AR2011012803042.html WikiLeaks&#039; Julian Assange: &#039;Anarchist,&#039; &#039;agitator,&#039; &#039;arrogant&#039; and a journalist]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.ftc.gov/opp/workshops/news/jun15/docs/new-staff-discussion.pdf FTC Staff Discussion Draft, Potential Policy Recommendations to Support the Reinvention of Journalism] - just skim it&lt;br /&gt;
* Leonard Downie, Jr., and Michael Schudson, [http://www.cjr.org/reconstruction/the_reconstruction_of_american.php?page=all The Reconstruction of American Journalism]&lt;br /&gt;
* [http://www.oreilly.com/catalog/wemedia/book/index.csp We The Media, Dan Gillmor] (the [http://www.oreilly.com/catalog/wemedia/book/ch00.pdf Introduction] is a good start, so to speak)&lt;br /&gt;
* [http://journalism.nyu.edu/pubzone/weblogs/pressthink/2005/01/21/berk_essy.html Jay Rosen, Bloggers vs. Journalists Is Over]&lt;br /&gt;
* [http://www.ted.com/talks/clay_shirky_how_cellphones_twitter_facebook_can_make_history.html Shirky on Social Media]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
== Links from Class ==&lt;/div&gt;</summary>
		<author><name>Dardia</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=New_and_Old_Media,_Participation,_and_Information&amp;diff=5532</id>
		<title>New and Old Media, Participation, and Information</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=New_and_Old_Media,_Participation,_and_Information&amp;diff=5532"/>
		<updated>2011-02-10T23:15:00Z</updated>

		<summary type="html">&lt;p&gt;Dardia: /* Readings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;March 1&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The profusion of low-cost media production and distribution has led to the rise of an alternative citizen-led media sector.  Is this a passing fad of enthusiastic amateurs or the beginning of a fundamental restructuring of the way media and news are produced and consumed?   Will the current trends lead to more information, better information, and better informed people or to an infinite stream of unreliable chatter?  Will it lead to a more politically engaged populace or to an increasingly polarized society that picks its sources of information to match its biases and ignorance?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
==Readings==&lt;br /&gt;
* John Nichols and Robert W. McChesney, [http://www.thenation.com/article/death-and-life-great-american-newspapers The Life and Death of Great American Newspapers]&lt;br /&gt;
* [http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/Overview_MR.pdf Media Re:public Overview] - Read at least the executive summary&lt;br /&gt;
* [https://secure.nmmstream.net/anon.newmediamill/aspen/kcfinalenglishbookweb.pdf Knight Commission Report on Information Needs of Communities in a Democracy] - Read at least the executive summary, recommendations and conclusions&lt;br /&gt;
* Nieman Journalism Lab, [http://www.niemanlab.org/2009/06/four-crowdsourcing-lessons-from-the-guardians-spectacular-expenses-scandal-experiment/ Four crowdsourcing lessons from the Guardian’s (spectacular) expenses-scandal experiment]&lt;br /&gt;
* Pennenberg, [http://www.washingtonpost.com/wp-dyn/content/article/2011/01/28/AR2011012803042.html WikiLeaks&#039; Julian Assange: &#039;Anarchist,&#039; &#039;agitator,&#039; &#039;arrogant&#039; and a journalist]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://blogs.law.harvard.edu/mediaberkman/2006/11/14/jay-rosen-on-open-source-journalism-2/ Jay Rosen, Open Source Journalism (video)] &lt;br /&gt;
* [http://www.oreilly.com/catalog/wemedia/book/index.csp We The Media, Dan Gillmor] (the [http://www.oreilly.com/catalog/wemedia/book/ch00.pdf Introduction] is a good start, so to speak)&lt;br /&gt;
* [http://journalism.nyu.edu/pubzone/weblogs/pressthink/2005/01/21/berk_essy.html Jay Rosen, Bloggers vs. Journalists Is Over]&lt;br /&gt;
* [http://www.ted.com/talks/clay_shirky_how_cellphones_twitter_facebook_can_make_history.html Shirky on Social Media]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
== Links from Class ==&lt;/div&gt;</summary>
		<author><name>Dardia</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=New_and_Old_Media,_Participation,_and_Information&amp;diff=5530</id>
		<title>New and Old Media, Participation, and Information</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=New_and_Old_Media,_Participation,_and_Information&amp;diff=5530"/>
		<updated>2011-02-10T23:05:03Z</updated>

		<summary type="html">&lt;p&gt;Dardia: /* Readings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;March 1&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The profusion of low-cost media production and distribution has led to the rise of an alternative citizen-led media sector.  Is this a passing fad of enthusiastic amateurs or the beginning of a fundamental restructuring of the way media and news are produced and consumed?   Will the current trends lead to more information, better information, and better informed people or to an infinite stream of unreliable chatter?  Will it lead to a more politically engaged populace or to an increasingly polarized society that picks its sources of information to match its biases and ignorance?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
==Readings==&lt;br /&gt;
* [http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/Overview_MR.pdf Media Re:public Overview] - Read at least the executive summary&lt;br /&gt;
* [https://secure.nmmstream.net/anon.newmediamill/aspen/kcfinalenglishbookweb.pdf Knight Commission Report on Information Needs of Communities in a Democracy] - Read at least the executive summary, recommendations and conclusions&lt;br /&gt;
* [http://report.knightcomm.org/communal-and-personal-needs-intersect Knight Commission report website]&lt;br /&gt;
* Pennenberg, [http://www.washingtonpost.com/wp-dyn/content/article/2011/01/28/AR2011012803042.html WikiLeaks&#039; Julian Assange: &#039;Anarchist,&#039; &#039;agitator,&#039; &#039;arrogant&#039; and a journalist]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://blogs.law.harvard.edu/mediaberkman/2006/11/14/jay-rosen-on-open-source-journalism-2/ Jay Rosen, Open Source Journalism (video)] &lt;br /&gt;
* [http://www.oreilly.com/catalog/wemedia/book/index.csp We The Media, Dan Gillmor] (the [http://www.oreilly.com/catalog/wemedia/book/ch00.pdf Introduction] is a good start, so to speak)&lt;br /&gt;
* [http://journalism.nyu.edu/pubzone/weblogs/pressthink/2005/01/21/berk_essy.html Jay Rosen, Bloggers vs. Journalists Is Over]&lt;br /&gt;
* [http://www.ted.com/talks/clay_shirky_how_cellphones_twitter_facebook_can_make_history.html Shirky on Social Media]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
== Links from Class ==&lt;/div&gt;</summary>
		<author><name>Dardia</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Peer_Production_and_Collaboration&amp;diff=5488</id>
		<title>Peer Production and Collaboration</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Peer_Production_and_Collaboration&amp;diff=5488"/>
		<updated>2011-02-10T20:53:17Z</updated>

		<summary type="html">&lt;p&gt;Dardia: /* Readings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;February 15&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;&#039;&#039;&#039;Note: To make up for the snow day on February 1, tonight&#039;s class will run an extra hour, until 8:30pm.&#039;&#039;&#039;&amp;lt;/div&amp;gt;&lt;br /&gt;
The free software movement is one example of a trend towards distributed volunteer networks of individuals collaborating on collective projects that were formerly the domain of the for-profit private sector.  In this session, we explore how far such peer production can go in redefining the economic and social structures of modern society. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
==Readings== &lt;br /&gt;
* Yochai Benkler, [http://mitworld.mit.edu/play/394/ News, Information and the Wealth of Networks] (watch from 8:32 to 26:07)&lt;br /&gt;
* Zittrain, [http://yupnet.org/zittrain/archives/13 Chapter 4: The Generative Pattern]&lt;br /&gt;
* Joseph Reagle, [http://reagle.org/joseph/2010/06/reagle-nrhm-special-collab-norms.html ”Be Nice”: Wikipedia Norms for Supportive Communication]&lt;br /&gt;
&lt;br /&gt;
== Additional Resources==&lt;br /&gt;
The following audio streams from NPR may be interesting:&lt;br /&gt;
* [http://www.npr.org/templates/story/story.php?storyId=4986453 Wikipedia, Open Source and the Future of the Web]&lt;br /&gt;
* [http://www.npr.org/templates/story/story.php?storyId=6051103 Wikipedia Wins Users and Critics by Jenny Lawton]&lt;br /&gt;
* [http://www.npr.org/templates/story/story.php?storyId=4506421 Wikipedia&#039;s Growth Comes with Concerns by Laura Sydell]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
== Links  ==&lt;br /&gt;
Chris Anderson: [http://www.wired.com/wired/archive/14.07/people.html People Power]&lt;br /&gt;
&lt;br /&gt;
Business Week: [http://www.businessweek.com/magazine/content/05_25/b3938601.htm The Power of Us]&lt;br /&gt;
&lt;br /&gt;
Nasa: [http://clickworkers.arc.nasa.gov/top Clickworkers Study]&lt;br /&gt;
&lt;br /&gt;
Yochai Benkler&#039;s Seminal Work on Peer Production: [http://www.benkler.org/CoasesPenguin.html Coase&#039;s Penguin]&lt;br /&gt;
&lt;br /&gt;
Jimbo Wales: [http://webcast.oii.ox.ac.uk/?view=Webcast&amp;amp;ID=20050711_76 Talk on the Wikipedia Community]&lt;/div&gt;</summary>
		<author><name>Dardia</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Peer_Production_and_Collaboration&amp;diff=5487</id>
		<title>Peer Production and Collaboration</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Peer_Production_and_Collaboration&amp;diff=5487"/>
		<updated>2011-02-10T20:52:54Z</updated>

		<summary type="html">&lt;p&gt;Dardia: /* Readings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;February 15&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;&#039;&#039;&#039;Note: To make up for the snow day on February 1, tonight&#039;s class will run an extra hour, until 8:30pm.&#039;&#039;&#039;&amp;lt;/div&amp;gt;&lt;br /&gt;
The free software movement is one example of a trend towards distributed volunteer networks of individuals collaborating on collective projects that were formerly the domain of the for-profit private sector.  In this session, we explore how far such peer production can go in redefining the economic and social structures of modern society. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
==Readings== &lt;br /&gt;
* Yochai Benkler, [http://mitworld.mit.edu/play/394/ News, Information and the Wealth of Networks] (watch from 8:32 to 26:07)&lt;br /&gt;
* Zittrain, [http://yupnet.org/zittrain/archives/13 Chapter 4: The Generative Pattern]&lt;br /&gt;
* [http://reagle.org/joseph/2010/06/reagle-nrhm-special-collab-norms.html Joseph Reagle, ”Be Nice”: Wikipedia Norms for Supportive Communication]&lt;br /&gt;
&lt;br /&gt;
== Additional Resources==&lt;br /&gt;
The following audio streams from NPR may be interesting:&lt;br /&gt;
* [http://www.npr.org/templates/story/story.php?storyId=4986453 Wikipedia, Open Source and the Future of the Web]&lt;br /&gt;
* [http://www.npr.org/templates/story/story.php?storyId=6051103 Wikipedia Wins Users and Critics by Jenny Lawton]&lt;br /&gt;
* [http://www.npr.org/templates/story/story.php?storyId=4506421 Wikipedia&#039;s Growth Comes with Concerns by Laura Sydell]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
== Links  ==&lt;br /&gt;
Chris Anderson: [http://www.wired.com/wired/archive/14.07/people.html People Power]&lt;br /&gt;
&lt;br /&gt;
Business Week: [http://www.businessweek.com/magazine/content/05_25/b3938601.htm The Power of Us]&lt;br /&gt;
&lt;br /&gt;
Nasa: [http://clickworkers.arc.nasa.gov/top Clickworkers Study]&lt;br /&gt;
&lt;br /&gt;
Yochai Benkler&#039;s Seminal Work on Peer Production: [http://www.benkler.org/CoasesPenguin.html Coase&#039;s Penguin]&lt;br /&gt;
&lt;br /&gt;
Jimbo Wales: [http://webcast.oii.ox.ac.uk/?view=Webcast&amp;amp;ID=20050711_76 Talk on the Wikipedia Community]&lt;/div&gt;</summary>
		<author><name>Dardia</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Copyright_in_Cyberspace&amp;diff=5423</id>
		<title>Copyright in Cyberspace</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Copyright_in_Cyberspace&amp;diff=5423"/>
		<updated>2011-02-08T20:46:33Z</updated>

		<summary type="html">&lt;p&gt;Dardia: /* Optional Readings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;April 5&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Internet has enabled individuals to become involved in the production of media and to distribute their contributions widely at a very low cost.  The former bastion of the entertainment industry is opening up to what many are calling a democratization of culture. The copyright doctrine of fair use seemingly bolsters the right to &amp;quot;recut, reframe, and recycle&amp;quot; previous works, but the protection fair use gives to those re-purposing copyrighted material is notoriously uncertain. &lt;br /&gt;
&lt;br /&gt;
Digital and file-sharing technologies also spawned the proliferation of sharing of media and music, which has led to a number of controversial legal and technological strategies.  The &amp;quot;notice-and-takedown&amp;quot; provisions of the  Digital Millennium Copyright Act (&amp;quot;DMCA&amp;quot;) allow Internet service providers to limit their liability for the copyright infringements of their users if the ISPs expeditiously remove material in response to complaints from copyright owners. The DMCA provides for counter-notice and &amp;quot;put-back&amp;quot; of removed material, but some argue that the statutory mechanism can chill innovative, constitutionally-protected speech.&lt;br /&gt;
&lt;br /&gt;
This class provides an overview of some major copyright law concepts and takes up some of the issues swirling around copyright in cyberspace.&lt;br /&gt;
&lt;br /&gt;
==Assignments==&lt;br /&gt;
&lt;br /&gt;
[[Assignments#Assignment_4:_Rough_Draft_and_Bonus_AV_Credit|Assignment 4 due]]&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Required Readings ==&lt;br /&gt;
* [http://www.copyright.gov/circs/circ01.pdf U.S. Copyright Office, Copyright Basics]&lt;br /&gt;
* [http://scholar.google.com/scholar_case?case=4721801243812962515&amp;amp;q=204+F.Supp.2d+1244+&amp;amp;hl=en&amp;amp;as_sdt=2002 Newton v. Diamond, 204 F.Supp.2d 1244 (C.D. Cal. 2002)] (Secs. I - IV(a), pp. 1246 - 1259) ([http://scholar.google.com/scholar_case?case=7229536370368292204&amp;amp;q=349+F.3d+591&amp;amp;hl=en&amp;amp;as_sdt=40000002 9th Circuit Decision] Optional)&lt;br /&gt;
* [http://www.copyright.gov/title17/92chap1.html#107 17 U.S.C. § 107 (&amp;quot;Limitations on Exclusive Rights:  Fair Use&amp;quot;)]&lt;br /&gt;
* [http://www.free-culture.cc/freecontent/ Lawrence Lessig, Free Culture] (pp. 1-20)&lt;br /&gt;
* [http://www.copyright.gov/title17/92chap5.html#512 17 U.S.C. § 512(c) (&amp;quot;Information Residing on Systems or Networks at Direction of Users&amp;quot;)]&lt;br /&gt;
* [http://www.nytimes.com/2010/03/19/technology/19youtube.html?pagewanted=1&amp;amp;sq=viacom&amp;amp;st=cse&amp;amp;scp=2 &amp;quot;Viacom Says YouTube Ignored Copyrights&amp;quot; (M. Helft, NY Times, 3/18/2010)]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings  ==&lt;br /&gt;
* [http://wendy.seltzer.org/blog/archives/2011/02/02/super-bust-due-process-and-domain-name-seizure.html Super Bust: Due Process and Domain Name Seizure]&lt;br /&gt;
* [http://creativecommons.org/about/licenses/comics1 Creative Commons: A Spectrum of Rights (comic)]&lt;br /&gt;
* [http://scholar.google.com/scholar_case?case=2589269115679339204&amp;amp;q=410+F.3d+792&amp;amp;hl=en&amp;amp;as_sdt=2002 Bridgeport v. Dimension, 410 F.3d 792 (6th Cir. 2005)] (Secs. I - II, pp. 795 - 805)&lt;br /&gt;
* [http://www.centerforsocialmedia.org/resources/publications/recut_reframe_recycle/ Center for Social Media, Recut, Reframe, Recyle] (full report optional)&lt;br /&gt;
* [http://scholar.google.com/scholar_case?case=8647956476676426155&amp;amp;q=545+U.S.+913&amp;amp;hl=en&amp;amp;as_sdt=2002 MGM v. Grokster, 545 U.S. 913 (2005)] (Sec. II, pp. 928 - 937)&lt;br /&gt;
* [http://www.nytimes.com/2008/09/09/nyregion/09potter.html?_r=1 &amp;quot;Rowling Wins Lawsuit Against Potter Lexicon&amp;quot; (J. Eligon, NY Times, 9/8/08)]&lt;br /&gt;
* [http://bits.blogs.nytimes.com/2008/01/16/830/index.html New York Times Bits Blog: Mixing It Up Over Remixes and Fair Use]&lt;br /&gt;
* [http://wendy.seltzer.org/blog-bak/archives/DMCA.html Wendy Seltzer&#039;s Blog, NFL Saga]&lt;br /&gt;
* [http://www.eff.org/files/20030926_unsafe_harbors.pdf EFF, Unsafe Harbors: Abusive DMCA Subpoenas and Takedown Demands]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Dardia</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Copyright_in_Cyberspace&amp;diff=5422</id>
		<title>Copyright in Cyberspace</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Copyright_in_Cyberspace&amp;diff=5422"/>
		<updated>2011-02-08T20:45:17Z</updated>

		<summary type="html">&lt;p&gt;Dardia: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;April 5&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Internet has enabled individuals to become involved in the production of media and to distribute their contributions widely at a very low cost.  The former bastion of the entertainment industry is opening up to what many are calling a democratization of culture. The copyright doctrine of fair use seemingly bolsters the right to &amp;quot;recut, reframe, and recycle&amp;quot; previous works, but the protection fair use gives to those re-purposing copyrighted material is notoriously uncertain. &lt;br /&gt;
&lt;br /&gt;
Digital and file-sharing technologies also spawned the proliferation of sharing of media and music, which has led to a number of controversial legal and technological strategies.  The &amp;quot;notice-and-takedown&amp;quot; provisions of the  Digital Millennium Copyright Act (&amp;quot;DMCA&amp;quot;) allow Internet service providers to limit their liability for the copyright infringements of their users if the ISPs expeditiously remove material in response to complaints from copyright owners. The DMCA provides for counter-notice and &amp;quot;put-back&amp;quot; of removed material, but some argue that the statutory mechanism can chill innovative, constitutionally-protected speech.&lt;br /&gt;
&lt;br /&gt;
This class provides an overview of some major copyright law concepts and takes up some of the issues swirling around copyright in cyberspace.&lt;br /&gt;
&lt;br /&gt;
==Assignments==&lt;br /&gt;
&lt;br /&gt;
[[Assignments#Assignment_4:_Rough_Draft_and_Bonus_AV_Credit|Assignment 4 due]]&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Required Readings ==&lt;br /&gt;
* [http://www.copyright.gov/circs/circ01.pdf U.S. Copyright Office, Copyright Basics]&lt;br /&gt;
* [http://scholar.google.com/scholar_case?case=4721801243812962515&amp;amp;q=204+F.Supp.2d+1244+&amp;amp;hl=en&amp;amp;as_sdt=2002 Newton v. Diamond, 204 F.Supp.2d 1244 (C.D. Cal. 2002)] (Secs. I - IV(a), pp. 1246 - 1259) ([http://scholar.google.com/scholar_case?case=7229536370368292204&amp;amp;q=349+F.3d+591&amp;amp;hl=en&amp;amp;as_sdt=40000002 9th Circuit Decision] Optional)&lt;br /&gt;
* [http://www.copyright.gov/title17/92chap1.html#107 17 U.S.C. § 107 (&amp;quot;Limitations on Exclusive Rights:  Fair Use&amp;quot;)]&lt;br /&gt;
* [http://www.free-culture.cc/freecontent/ Lawrence Lessig, Free Culture] (pp. 1-20)&lt;br /&gt;
* [http://www.copyright.gov/title17/92chap5.html#512 17 U.S.C. § 512(c) (&amp;quot;Information Residing on Systems or Networks at Direction of Users&amp;quot;)]&lt;br /&gt;
* [http://www.nytimes.com/2010/03/19/technology/19youtube.html?pagewanted=1&amp;amp;sq=viacom&amp;amp;st=cse&amp;amp;scp=2 &amp;quot;Viacom Says YouTube Ignored Copyrights&amp;quot; (M. Helft, NY Times, 3/18/2010)]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings  ==&lt;br /&gt;
* [http://wendy.seltzer.org/blog/archives/2011/02/02/super-bust-due-process-and-domain-name-seizure.html Super Bust: Due Process and Domain Name Seizure]&lt;br /&gt;
* [http://creativecommons.org/about/licenses/comics1 Creative Commons: A Spectrum of Rights (comic)]&lt;br /&gt;
* [http://www.youtube.com/watch?v=5SaFTm2bcac Amen Break Video]&lt;br /&gt;
* [http://scholar.google.com/scholar_case?case=2589269115679339204&amp;amp;q=410+F.3d+792&amp;amp;hl=en&amp;amp;as_sdt=2002 Bridgeport v. Dimension, 410 F.3d 792 (6th Cir. 2005)] (Secs. I - II, pp. 795 - 805)&lt;br /&gt;
* [http://www.centerforsocialmedia.org/resources/publications/recut_reframe_recycle/ Center for Social Media, Recut, Reframe, Recyle] (full report optional)&lt;br /&gt;
* [http://scholar.google.com/scholar_case?case=8647956476676426155&amp;amp;q=545+U.S.+913&amp;amp;hl=en&amp;amp;as_sdt=2002 MGM v. Grokster, 545 U.S. 913 (2005)] (Sec. II, pp. 928 - 937)&lt;br /&gt;
* [http://www.nytimes.com/2008/09/09/nyregion/09potter.html?_r=1 &amp;quot;Rowling Wins Lawsuit Against Potter Lexicon&amp;quot; (J. Eligon, NY Times, 9/8/08)]&lt;br /&gt;
* [http://bits.blogs.nytimes.com/2008/01/16/830/index.html New York Times Bits Blog: Mixing It Up Over Remixes and Fair Use]&lt;br /&gt;
* [http://cyberlaw.stanford.edu/biguploads/Fairey_v_AP_complaint_with_exhibits.pdf Fairey v. AP (SDNY Civ. Action No. 09-01123), Fairey Complaint] (Pars. 9 - 40, pp. 2 - 10)&lt;br /&gt;
* [http://docs.justia.com/cases/federal/district-courts/new-york/nysdce/1:2009cv01123/340121/13/ Fairey v. AP (SDNY Civ. Action No. 09-01123), AP Answer and Counterclaims] (Pars. 73 - 162, pp. 16 - 49)&lt;br /&gt;
* [http://wendy.seltzer.org/blog-bak/archives/DMCA.html Wendy Seltzer&#039;s Blog, NFL Saga]&lt;br /&gt;
* [http://www.eff.org/files/20030926_unsafe_harbors.pdf EFF, Unsafe Harbors: Abusive DMCA Subpoenas and Takedown Demands]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Dardia</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=New_and_Old_Media,_Participation,_and_Information&amp;diff=5374</id>
		<title>New and Old Media, Participation, and Information</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=New_and_Old_Media,_Participation,_and_Information&amp;diff=5374"/>
		<updated>2011-02-07T23:16:25Z</updated>

		<summary type="html">&lt;p&gt;Dardia: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;March 1&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The profusion of low-cost media production and distribution has led to the rise of an alternative citizen-led media sector.  Is this a passing fad of enthusiastic amateurs or the beginning of a fundamental restructuring of the way media and news are produced and consumed?   Will the current trends lead to more information, better information, and better informed people or to an infinite stream of unreliable chatter?  Will it lead to a more politically engaged populace or to an increasingly polarized society that picks its sources of information to match its biases and ignorance?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
==Readings==&lt;br /&gt;
* [http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/Overview_MR.pdf Media Re:public Overview] - Read at least the executive summary&lt;br /&gt;
* [https://secure.nmmstream.net/anon.newmediamill/aspen/kcfinalenglishbookweb.pdf Knight Commission Report on Information Needs of Communities in a Democracy] - Read at least the executive summary, recommendations and conclusions&lt;br /&gt;
* [http://cyber.law.harvard.edu/pubrelease/mediarepublic/downloads.html Media Re:Public website]&lt;br /&gt;
* [http://report.knightcomm.org/communal-and-personal-needs-intersect Knight Commission report website]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://blogs.law.harvard.edu/mediaberkman/2006/11/14/jay-rosen-on-open-source-journalism-2/ Jay Rosen, Open Source Journalism (video)] &lt;br /&gt;
* [http://www.oreilly.com/catalog/wemedia/book/index.csp We The Media, Dan Gillmor] (the [http://www.oreilly.com/catalog/wemedia/book/ch00.pdf Introduction] is a good start, so to speak)&lt;br /&gt;
* [http://journalism.nyu.edu/pubzone/weblogs/pressthink/2005/01/21/berk_essy.html Jay Rosen, Bloggers vs. Journalists Is Over]&lt;br /&gt;
* [http://www.ted.com/talks/clay_shirky_how_cellphones_twitter_facebook_can_make_history.html Shirky on Social Media]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
== Links from Class ==&lt;/div&gt;</summary>
		<author><name>Dardia</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Law%27s_Role_in_Regulating_Online_Conduct_and_Speech&amp;diff=5373</id>
		<title>Law&#039;s Role in Regulating Online Conduct and Speech</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Law%27s_Role_in_Regulating_Online_Conduct_and_Speech&amp;diff=5373"/>
		<updated>2011-02-07T23:14:04Z</updated>

		<summary type="html">&lt;p&gt;Dardia: /* Optional Readings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;March 8&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
What is law&#039;s role in regulating online conduct and speech?  At this point in the course you should be ready to tackle this question from a number of different perspectives. In this class we will begin to explore what role law is &#039;&#039;capable&#039;&#039; of playing as well as what role it &#039;&#039;should&#039;&#039; play.  Remember John Perry Barlow&#039;s [http://www.cs.mu.oz.au/~zs/decl.html Declaration of Independence of Cyberspace] which you read earlier in the course?  Has his view of law&#039;s limited role been borne out?  The sources of law impacting online conduct and speech are many, from intellectual property to tort to the First Amendment.  Throughout today&#039;s class, we’ll tie the legal doctrines together with three themes:&lt;br /&gt;
&lt;br /&gt;
* How regulation changes when it’s carried out by computers, rather than by people.&lt;br /&gt;
* Whether going online increases or decreases government control.&lt;br /&gt;
* The new kinds of power possessed by online intermediaries.&lt;br /&gt;
&lt;br /&gt;
==Assignments==&lt;br /&gt;
&lt;br /&gt;
[[Assignments#Assignment_3:_Project_Outline|Assignment 3 due]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2011/sites/is2011/images/JohnsonPost.pdf David Johnson &amp;amp; David Post, Law and Borders] (excerpts)&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2011/sites/is2011/images/Kerr.pdf Orin Kerr, The Problem of Perspective in Internet Law] (excerpts)&lt;br /&gt;
&lt;br /&gt;
* [http://www.wired.com/wired/archive/8.07/haven_pr.html Simson Garfinkel, Welcome to Sealand, Now Bugger Off, Wired (July 2000)]&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2011/sites/is2011/images/Yahoo.pdf Yahoo! Inc v. La Ligue Contra Le Racisme, 433 F.3d 1199 (9th Cir. 2006)]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
* [http://www.ejiltalk.org/in-the-dock-in-paris/ Prof. Joseph Weiler: In the Dock, in Paris]&lt;br /&gt;
* [http://www.salon.com/technology/dan_gillmor/2010/12/03/the_net_s_soft_underbelly/index.html Salon: Online, the censors are scoring big wins]&lt;br /&gt;
* [https://www.eff.org/deeplinks/2010/12/amazon-and-wikileaks-first-amendment-only-strong EFF: Amazon and WikiLeaks - Online Speech is Only as Strong as the Weakest Intermediary]&lt;br /&gt;
* [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1689865 David Ardia, Reputation in a Networked World: Revisiting the Social Foundations of Defamation Law] (Part IV) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Dardia</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Law%27s_Role_in_Regulating_Online_Conduct_and_Speech&amp;diff=5372</id>
		<title>Law&#039;s Role in Regulating Online Conduct and Speech</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Law%27s_Role_in_Regulating_Online_Conduct_and_Speech&amp;diff=5372"/>
		<updated>2011-02-07T23:13:24Z</updated>

		<summary type="html">&lt;p&gt;Dardia: /* Optional Readings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;March 8&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
What is law&#039;s role in regulating online conduct and speech?  At this point in the course you should be ready to tackle this question from a number of different perspectives. In this class we will begin to explore what role law is &#039;&#039;capable&#039;&#039; of playing as well as what role it &#039;&#039;should&#039;&#039; play.  Remember John Perry Barlow&#039;s [http://www.cs.mu.oz.au/~zs/decl.html Declaration of Independence of Cyberspace] which you read earlier in the course?  Has his view of law&#039;s limited role been borne out?  The sources of law impacting online conduct and speech are many, from intellectual property to tort to the First Amendment.  Throughout today&#039;s class, we’ll tie the legal doctrines together with three themes:&lt;br /&gt;
&lt;br /&gt;
* How regulation changes when it’s carried out by computers, rather than by people.&lt;br /&gt;
* Whether going online increases or decreases government control.&lt;br /&gt;
* The new kinds of power possessed by online intermediaries.&lt;br /&gt;
&lt;br /&gt;
==Assignments==&lt;br /&gt;
&lt;br /&gt;
[[Assignments#Assignment_3:_Project_Outline|Assignment 3 due]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2011/sites/is2011/images/JohnsonPost.pdf David Johnson &amp;amp; David Post, Law and Borders] (excerpts)&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2011/sites/is2011/images/Kerr.pdf Orin Kerr, The Problem of Perspective in Internet Law] (excerpts)&lt;br /&gt;
&lt;br /&gt;
* [http://www.wired.com/wired/archive/8.07/haven_pr.html Simson Garfinkel, Welcome to Sealand, Now Bugger Off, Wired (July 2000)]&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2011/sites/is2011/images/Yahoo.pdf Yahoo! Inc v. La Ligue Contra Le Racisme, 433 F.3d 1199 (9th Cir. 2006)]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
* [http://www.ejiltalk.org/in-the-dock-in-paris/ Prof. Joseph Weiler: In the Dock, in Paris]&lt;br /&gt;
* [https://www.eff.org/deeplinks/2010/12/amazon-and-wikileaks-first-amendment-only-strong EFF: Amazon and WikiLeaks - Online Speech is Only as Strong as the Weakest Intermediary]&lt;br /&gt;
* [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1689865 David Ardia, Reputation in a Networked World: Revisiting the Social Foundations of Defamation Law] (Part IV) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Dardia</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Law%27s_Role_in_Regulating_Online_Conduct_and_Speech&amp;diff=5371</id>
		<title>Law&#039;s Role in Regulating Online Conduct and Speech</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Law%27s_Role_in_Regulating_Online_Conduct_and_Speech&amp;diff=5371"/>
		<updated>2011-02-07T23:08:07Z</updated>

		<summary type="html">&lt;p&gt;Dardia: /* Optional Readings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;March 8&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
What is law&#039;s role in regulating online conduct and speech?  At this point in the course you should be ready to tackle this question from a number of different perspectives. In this class we will begin to explore what role law is &#039;&#039;capable&#039;&#039; of playing as well as what role it &#039;&#039;should&#039;&#039; play.  Remember John Perry Barlow&#039;s [http://www.cs.mu.oz.au/~zs/decl.html Declaration of Independence of Cyberspace] which you read earlier in the course?  Has his view of law&#039;s limited role been borne out?  The sources of law impacting online conduct and speech are many, from intellectual property to tort to the First Amendment.  Throughout today&#039;s class, we’ll tie the legal doctrines together with three themes:&lt;br /&gt;
&lt;br /&gt;
* How regulation changes when it’s carried out by computers, rather than by people.&lt;br /&gt;
* Whether going online increases or decreases government control.&lt;br /&gt;
* The new kinds of power possessed by online intermediaries.&lt;br /&gt;
&lt;br /&gt;
==Assignments==&lt;br /&gt;
&lt;br /&gt;
[[Assignments#Assignment_3:_Project_Outline|Assignment 3 due]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2011/sites/is2011/images/JohnsonPost.pdf David Johnson &amp;amp; David Post, Law and Borders] (excerpts)&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2011/sites/is2011/images/Kerr.pdf Orin Kerr, The Problem of Perspective in Internet Law] (excerpts)&lt;br /&gt;
&lt;br /&gt;
* [http://www.wired.com/wired/archive/8.07/haven_pr.html Simson Garfinkel, Welcome to Sealand, Now Bugger Off, Wired (July 2000)]&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2011/sites/is2011/images/Yahoo.pdf Yahoo! Inc v. La Ligue Contra Le Racisme, 433 F.3d 1199 (9th Cir. 2006)]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
* [http://www.ejiltalk.org/in-the-dock-in-paris/ Prof. Joseph Weiler: In the Dock, in Paris]&lt;br /&gt;
* [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1689865 David Ardia, Reputation in a Networked World: Revisiting the Social Foundations of Defamation Law] (Part IV) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Dardia</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=Law%27s_Role_in_Regulating_Online_Conduct_and_Speech&amp;diff=5370</id>
		<title>Law&#039;s Role in Regulating Online Conduct and Speech</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=Law%27s_Role_in_Regulating_Online_Conduct_and_Speech&amp;diff=5370"/>
		<updated>2011-02-07T23:07:46Z</updated>

		<summary type="html">&lt;p&gt;Dardia: /* Optional Readings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;March 8&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
What is law&#039;s role in regulating online conduct and speech?  At this point in the course you should be ready to tackle this question from a number of different perspectives. In this class we will begin to explore what role law is &#039;&#039;capable&#039;&#039; of playing as well as what role it &#039;&#039;should&#039;&#039; play.  Remember John Perry Barlow&#039;s [http://www.cs.mu.oz.au/~zs/decl.html Declaration of Independence of Cyberspace] which you read earlier in the course?  Has his view of law&#039;s limited role been borne out?  The sources of law impacting online conduct and speech are many, from intellectual property to tort to the First Amendment.  Throughout today&#039;s class, we’ll tie the legal doctrines together with three themes:&lt;br /&gt;
&lt;br /&gt;
* How regulation changes when it’s carried out by computers, rather than by people.&lt;br /&gt;
* Whether going online increases or decreases government control.&lt;br /&gt;
* The new kinds of power possessed by online intermediaries.&lt;br /&gt;
&lt;br /&gt;
==Assignments==&lt;br /&gt;
&lt;br /&gt;
[[Assignments#Assignment_3:_Project_Outline|Assignment 3 due]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2011/sites/is2011/images/JohnsonPost.pdf David Johnson &amp;amp; David Post, Law and Borders] (excerpts)&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2011/sites/is2011/images/Kerr.pdf Orin Kerr, The Problem of Perspective in Internet Law] (excerpts)&lt;br /&gt;
&lt;br /&gt;
* [http://www.wired.com/wired/archive/8.07/haven_pr.html Simson Garfinkel, Welcome to Sealand, Now Bugger Off, Wired (July 2000)]&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2011/sites/is2011/images/Yahoo.pdf Yahoo! Inc v. La Ligue Contra Le Racisme, 433 F.3d 1199 (9th Cir. 2006)]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
* [Prof. Joseph Weiler: In the Dock, in Paris http://www.ejiltalk.org/in-the-dock-in-paris/]&lt;br /&gt;
* [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1689865 David Ardia, Reputation in a Networked World: Revisiting the Social Foundations of Defamation Law] (Part IV) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>Dardia</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=List_of_User_Profiles&amp;diff=5248</id>
		<title>List of User Profiles</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=List_of_User_Profiles&amp;diff=5248"/>
		<updated>2011-01-30T21:31:20Z</updated>

		<summary type="html">&lt;p&gt;Dardia: /* Jedmonds */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a list of user profiles on this wiki.  Until a consensus on policy is come to, this listing will be voluntary.&lt;br /&gt;
&lt;br /&gt;
This page differs from the [[Special:ListUsers|User List]] page in that this page contains only active profiles of individuals who wish to contribute to this wiki.  Please add yourself by clicking on the appropriate edit button next to the letter range that corresponds to your user name.&lt;br /&gt;
&lt;br /&gt;
==Users==&lt;br /&gt;
&lt;br /&gt;
===A-G===&lt;br /&gt;
=====adavies01=====&lt;br /&gt;
I&#039;m Alan Davies-Gavin.  I&#039;m an ALB candidate in computer science.  I&#039;ve worked in the IT field for a number of years and am now returning to finish my BA.  I&#039;m originally from NH, and have lived on the west coast and Europe.  I&#039;m actually used to reading blogs for information, I&#039;m not actually a blogger (subject to change).  I do have a lot to say on the subject matter that we&#039;ll be covering and I&#039;m also looking forward to discussions.&lt;br /&gt;
&lt;br /&gt;
=====alexleavitt=====&lt;br /&gt;
I am a research assistant at Microsoft Research, as well as a researcher for the Comparative Media Studies department at MIT, Microsoft Entertainment &amp;amp; Devices, and the Web Ecology Project. I graduated Boston University in 2009, and I am currently applying to graduate school.&lt;br /&gt;
&lt;br /&gt;
=====Alexsolomon=====&lt;br /&gt;
I&#039;m an ALB degree candidate at Harvard Extension School (Concentration: Humanities, Field of study: Journalism, Citation: Business/Marketing). I&#039;m originally from Toronto, Canada. But I currently work as a public relations (PR) coordinator at an elite PR firm in Manhattan and I live in Manhattan too. I&#039;m also an avid fashion blogger, and Twitter and Facebook user.&lt;br /&gt;
&lt;br /&gt;
=====BrandonAndrzej=====&lt;br /&gt;
A former ex-patriot English teacher, I have returned to the US with the intention of perusing a degree in international law. I have a deep and abiding love for history and a strong interest in things geo-political.  &lt;br /&gt;
&lt;br /&gt;
=====Dardia=====&lt;br /&gt;
I am a fellow at the [http://cyber.law.harvard.edu/ Berkman Center for Internet &amp;amp; Society] and the director of the [http://dmlp.org/ Digital Media Law Project].  In a past life I was assistant counsel at The Washington Post and before that was an associate at Williams &amp;amp; Connolly in Washington, DC, where I handled a range of intellectual property and media litigation.&lt;br /&gt;
&lt;br /&gt;
=====donaldphussey=====&lt;br /&gt;
I am an ALB student in Social Sciences with a focus in Government.  By day, I am an SVP for Global Internet Strategy for a big bank.  I live in New York and am attending online.&lt;br /&gt;
&lt;br /&gt;
=====Earboleda=====&lt;br /&gt;
I work for a large financial institution in the Northeast, and will be attending class on-site and online.&lt;br /&gt;
&lt;br /&gt;
=====Gclinch=====&lt;br /&gt;
My name is Guy Clinch. I create communications technology solutions solving problems for organizations across the globe.  I specialize in helping government agencies use communications solutions to serve the requirements of their citizens. Should you be interested: [http://www.avaya.com/blogs/archives/author/authord18df/ My blog], [http://www.linkedin.com/in/guywclinch my professional profile] Looking forward to sharing a dynamic and engaging semester!&lt;br /&gt;
&lt;br /&gt;
===H-M===&lt;br /&gt;
=====Jastify=====&lt;br /&gt;
My name is Sergey, I am a recent graduate from Moscow State University. Here to get some perspective on the subject which interests me quit a lot.&lt;br /&gt;
&lt;br /&gt;
=====Jedmonds=====&lt;br /&gt;
My name is Jennifer Edmonds. I am a Legislative Analyst with the State of California. This is my first semester at the Harvard Extension, and although I would love to attend class in person, because of my locale, I am forced to participate asynchronously. I&#039;m looking forward to achieving a better understanding of the government&#039;s current role in technology and the issues that will influence its future involvement.&lt;br /&gt;
&lt;br /&gt;
=====KimberlyNevas=====&lt;br /&gt;
I am an ALB candidate focusing primarily on economics and law.  I took a year off from college to be a newspaper reporter in Connecticut.  My dad is a fan of the Berkman Center and recommended I take this class.&lt;br /&gt;
&lt;br /&gt;
===N-S===&lt;br /&gt;
&lt;br /&gt;
=====RebekahHeacock=====&lt;br /&gt;
I&#039;m a project coordinator at the [http://cyber.law.harvard.edu/ Berkman Center for Internet &amp;amp; Society] and the co-director of the [http://transparency.globalvoicesonline.org/ Technology for Transparency Network].  I recently graduated from the Columbia University School of International and Public Affairs, where I studied the relationship between communications technologies and development.&lt;br /&gt;
&lt;br /&gt;
=====RobertCu=====&lt;br /&gt;
I&#039;m a card carrying member of the eff and the fsf and one of the inaugural viewers of zdtv. I went to the same prep school as the founder of wired magazine and personally lobbied she get a well deserved alumni award.  I&#039;ve attended many different colleges everywhere from st. johns college the great books school in Annapolis where I had a dsl line installed to my dorm room giving me more bandwidth then the rest of campus combined, to where I am now, the Harvard extension school where I am a alb degree candidate. Even though I&#039;m conversant in python, html, c++, and ti-basic I&#039;m a humanities concentrator. My favorite authors are Borges, O&#039;brien, Doctorow(cory not e.l), Aristotle, and Lessig.&lt;br /&gt;
&lt;br /&gt;
=====Saambat=====&lt;br /&gt;
Currently, I work at the Computer Science and Artificial Intelligence Laboratory at MIT managing annotations for computational linguistics research.  I&#039;m here at the Extension School to finish up my BLA, and this is my last semester.  Of course, the internet is a large part of my life, much like many others, and I seek to better understand the beast and how it is controlled.&lt;br /&gt;
&lt;br /&gt;
===T-Z===&lt;/div&gt;</summary>
		<author><name>Dardia</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2012/?title=List_of_User_Profiles&amp;diff=5247</id>
		<title>List of User Profiles</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2012/?title=List_of_User_Profiles&amp;diff=5247"/>
		<updated>2011-01-30T21:30:51Z</updated>

		<summary type="html">&lt;p&gt;Dardia: /* adavies01= */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a list of user profiles on this wiki.  Until a consensus on policy is come to, this listing will be voluntary.&lt;br /&gt;
&lt;br /&gt;
This page differs from the [[Special:ListUsers|User List]] page in that this page contains only active profiles of individuals who wish to contribute to this wiki.  Please add yourself by clicking on the appropriate edit button next to the letter range that corresponds to your user name.&lt;br /&gt;
&lt;br /&gt;
==Users==&lt;br /&gt;
&lt;br /&gt;
===A-G===&lt;br /&gt;
=====adavies01=====&lt;br /&gt;
I&#039;m Alan Davies-Gavin.  I&#039;m an ALB candidate in computer science.  I&#039;ve worked in the IT field for a number of years and am now returning to finish my BA.  I&#039;m originally from NH, and have lived on the west coast and Europe.  I&#039;m actually used to reading blogs for information, I&#039;m not actually a blogger (subject to change).  I do have a lot to say on the subject matter that we&#039;ll be covering and I&#039;m also looking forward to discussions.&lt;br /&gt;
&lt;br /&gt;
=====alexleavitt=====&lt;br /&gt;
I am a research assistant at Microsoft Research, as well as a researcher for the Comparative Media Studies department at MIT, Microsoft Entertainment &amp;amp; Devices, and the Web Ecology Project. I graduated Boston University in 2009, and I am currently applying to graduate school.&lt;br /&gt;
&lt;br /&gt;
=====Alexsolomon=====&lt;br /&gt;
I&#039;m an ALB degree candidate at Harvard Extension School (Concentration: Humanities, Field of study: Journalism, Citation: Business/Marketing). I&#039;m originally from Toronto, Canada. But I currently work as a public relations (PR) coordinator at an elite PR firm in Manhattan and I live in Manhattan too. I&#039;m also an avid fashion blogger, and Twitter and Facebook user.&lt;br /&gt;
&lt;br /&gt;
=====BrandonAndrzej=====&lt;br /&gt;
A former ex-patriot English teacher, I have returned to the US with the intention of perusing a degree in international law. I have a deep and abiding love for history and a strong interest in things geo-political.  &lt;br /&gt;
&lt;br /&gt;
=====Dardia=====&lt;br /&gt;
I am a fellow at the [http://cyber.law.harvard.edu/ Berkman Center for Internet &amp;amp; Society] and the director of the [http://dmlp.org/ Digital Media Law Project].  In a past life I was assistant counsel at The Washington Post and before that was an associate at Williams &amp;amp; Connolly in Washington, DC, where I handled a range of intellectual property and media litigation.&lt;br /&gt;
&lt;br /&gt;
=====donaldphussey=====&lt;br /&gt;
I am an ALB student in Social Sciences with a focus in Government.  By day, I am an SVP for Global Internet Strategy for a big bank.  I live in New York and am attending online.&lt;br /&gt;
&lt;br /&gt;
=====Earboleda=====&lt;br /&gt;
I work for a large financial institution in the Northeast, and will be attending class on-site and online.&lt;br /&gt;
&lt;br /&gt;
=====Gclinch=====&lt;br /&gt;
My name is Guy Clinch. I create communications technology solutions solving problems for organizations across the globe.  I specialize in helping government agencies use communications solutions to serve the requirements of their citizens. Should you be interested: [http://www.avaya.com/blogs/archives/author/authord18df/ My blog], [http://www.linkedin.com/in/guywclinch my professional profile] Looking forward to sharing a dynamic and engaging semester!&lt;br /&gt;
&lt;br /&gt;
===H-M===&lt;br /&gt;
=====Jastify=====&lt;br /&gt;
My name is Sergey, I am a recent graduate from Moscow State University. Here to get some perspective on the subject which interests me quit a lot.&lt;br /&gt;
&lt;br /&gt;
====Jedmonds====&lt;br /&gt;
My name is Jennifer Edmonds. I am a Legislative Analyst with the State of California. This is my first semester at the Harvard Extension, and although I would love to attend class in person, because of my locale, I am forced to participate asynchronously. I&#039;m looking forward to achieving a better understanding of the government&#039;s current role in technology and the issues that will influence its future involvement.&lt;br /&gt;
&lt;br /&gt;
=====KimberlyNevas=====&lt;br /&gt;
I am an ALB candidate focusing primarily on economics and law.  I took a year off from college to be a newspaper reporter in Connecticut.  My dad is a fan of the Berkman Center and recommended I take this class.&lt;br /&gt;
&lt;br /&gt;
===N-S===&lt;br /&gt;
&lt;br /&gt;
=====RebekahHeacock=====&lt;br /&gt;
I&#039;m a project coordinator at the [http://cyber.law.harvard.edu/ Berkman Center for Internet &amp;amp; Society] and the co-director of the [http://transparency.globalvoicesonline.org/ Technology for Transparency Network].  I recently graduated from the Columbia University School of International and Public Affairs, where I studied the relationship between communications technologies and development.&lt;br /&gt;
&lt;br /&gt;
=====RobertCu=====&lt;br /&gt;
I&#039;m a card carrying member of the eff and the fsf and one of the inaugural viewers of zdtv. I went to the same prep school as the founder of wired magazine and personally lobbied she get a well deserved alumni award.  I&#039;ve attended many different colleges everywhere from st. johns college the great books school in Annapolis where I had a dsl line installed to my dorm room giving me more bandwidth then the rest of campus combined, to where I am now, the Harvard extension school where I am a alb degree candidate. Even though I&#039;m conversant in python, html, c++, and ti-basic I&#039;m a humanities concentrator. My favorite authors are Borges, O&#039;brien, Doctorow(cory not e.l), Aristotle, and Lessig.&lt;br /&gt;
&lt;br /&gt;
=====Saambat=====&lt;br /&gt;
Currently, I work at the Computer Science and Artificial Intelligence Laboratory at MIT managing annotations for computational linguistics research.  I&#039;m here at the Extension School to finish up my BLA, and this is my last semester.  Of course, the internet is a large part of my life, much like many others, and I seek to better understand the beast and how it is controlled.&lt;br /&gt;
&lt;br /&gt;
===T-Z===&lt;/div&gt;</summary>
		<author><name>Dardia</name></author>
	</entry>
</feed>