Main Page: Difference between revisions
Line 19: | Line 19: | ||
|9:00 | |9:00 | ||
| | | | ||
| | |align="center"|'''Introductions''' | ||
9:00 to 10:30 | 9:00 to 10:30 | ||
|rowspan="3" align="center" | |rowspan="3" align="center" style="background-color:#CC3333;"|'''Digital Humanities''' | ||
9:00 to 10:30 | 9:00 to 10:30 | ||
|rowspan="3" align="center"|'''Cyber Security''' | |rowspan="3" align="center" style="background-color:#CC3333;"|'''Privacy''' | ||
9:00 to 10:30 | |||
|rowspan="3" align="center" style="background-color:#CC3333;"|'''Cyber Security''' | |||
9:00 to 10:30 | 9:00 to 10:30 | ||
|- | |- | ||
|9:30 | |9:30 | ||
| | | | ||
|rowspan="2" align="center" style="background-color:#709850;"|'''The Future of the Internet''' | |||
9:30 to 10:30 | |||
|- | |- | ||
|10:00 | |10:00 | ||
Line 43: | Line 45: | ||
|11:00 | |11:00 | ||
| | | | ||
|rowspan="3" align="center"|'''Open Systems/Access''' | |rowspan="3" align="center" style="background-color:#CC3333;"|'''Open Systems/Access''' | ||
11:00 to 12:30 | 11:00 to 12:30 | ||
|rowspan="2" align="center"|'''Digital Libraries and Archives''' | |rowspan="2" align="center" style="background-color:#709850;"|'''Digital Libraries and Archives''' | ||
Case Study | Case Study | ||
11:00 to 12:00 | 11:00 to 12:00 | ||
|rowspan="2" align="center"|'''Youth and Media''' | |rowspan="2" align="center" style="background-color:#709850;"|'''Youth and Media''' | ||
Case Study | Case Study | ||
11:00 to 12:00 | 11:00 to 12:00 | ||
|rowspan="3" align="center"|'''WikiLeaks''' | |rowspan="3" align="center" style="background-color:#709850;"|'''WikiLeaks''' | ||
11:00 to 12:30 | 11:00 to 12:30 | ||
|- | |- | ||
Line 76: | Line 78: | ||
60-minute session | 60-minute session | ||
1:00 to 2:00 | 1:00 to 2:00 | ||
|rowspan="2" align="center"|'''The Global Internet''' | |rowspan="2" align="center" style="background-color:#FC9B38;"|'''The Global Internet''' | ||
1:00 to 2:00 | 1:00 to 2:00 | ||
|- | |- | ||
|1:30 | |1:30 | ||
| | | | ||
|rowspan="2" align="center"|'''History of Cyberlaw and the Berkman Center''' | |rowspan="2" align="center" style="background-color:#FC9B38;"|'''History of Cyberlaw and the Berkman Center''' | ||
1:30 to 2:30 | 1:30 to 2:30 | ||
|rowspan="3" align="center"|'''Creative Wrap-up''' | |rowspan="3" align="center"|'''Creative Wrap-up''' | ||
Line 94: | Line 96: | ||
| | | | ||
|align="center"|30-minute break | |align="center"|30-minute break | ||
|rowspan="3" align="center"|'''Intellectual Property''' | |rowspan="3" align="center" style="background-color:#CC3333;"|'''Intellectual Property''' | ||
2:30 to 4:00 | 2:30 to 4:00 | ||
|rowspan="3" align="center"|'''TBD''' | |rowspan="3" align="center"|'''TBD''' | ||
Line 101: | Line 103: | ||
|3:00 | |3:00 | ||
| | | | ||
|rowspan="3" align="center"|'''Online Liberty and FOE''' | |rowspan="3" align="center" style="background-color:#CC3333;"|'''Online Liberty and FOE''' | ||
3:00 to 4:30 | 3:00 to 4:30 | ||
|align="center"|30-minute break | |align="center"|30-minute break | ||
Line 112: | Line 114: | ||
|4:00 | |4:00 | ||
| | | | ||
|rowspan="2" align="center"|'''User Innovation''' | |rowspan="2" align="center" style="background-color:#FC9B38;"|'''User Innovation''' | ||
4:00 to 5:00 | 4:00 to 5:00 | ||
|rowspan="2" align="center"|'''Methodologies''' | |rowspan="2" align="center" style="background-color:#FC9B38;"|'''Methodologies''' | ||
4:00 to 5:00 | 4:00 to 5:00 | ||
|- | |- | ||
|4:30 | |4:30 | ||
| | | | ||
|rowspan="2" align="center"|'''GNI/Country Case Study''' | |rowspan="2" align="center" style="background-color:#709850;"|'''GNI/Country Case Study''' | ||
4:30 to 5:00 | 4:30 to 5:00 | ||
|rowspan="4" align="center"|Final BBQ | |rowspan="4" align="center"|Final BBQ |
Revision as of 11:49, 5 July 2011
Program Overview
After a five year hiatus, the world-renowned iLaw Program is returning to the Harvard Law School. The Berkman Center’s Internet Law Program (iLaw) was initially launched in 2000 to offer the public a way to learn about national and international legal, economic, and public interest debates surrounding the Internet from leading experts in the field.
The 2011 iLaw Program will engage new topics and revisit older topics within the technology, law and policy, and social science fields over a four-day conference, over September 5-9, 2011. Conference participants will consist of current students from the Harvard Law School (HLS) and the Harvard School of Engineering and Applied Sciences (SEAS), as well as selected researchers, lawyers, executives, faculty members, and technologists from the Harvard community and beyond.
Logistics and Program Agenda
(to be added)
Monday | Tuesday | Wednesday | Thursday | Friday | |
---|---|---|---|---|---|
9:00 | Introductions
9:00 to 10:30 |
Digital Humanities
9:00 to 10:30 |
Privacy
9:00 to 10:30 |
Cyber Security
9:00 to 10:30 | |
9:30 | The Future of the Internet
9:30 to 10:30 | ||||
10:00 | |||||
10:30 | 30-minute break | 30-minute break | 30-minute break | 30-minute break | |
11:00 | Open Systems/Access
11:00 to 12:30 |
Digital Libraries and Archives
Case Study 11:00 to 12:00 |
Youth and Media
Case Study 11:00 to 12:00 |
WikiLeaks
11:00 to 12:30 | |
11:30 | |||||
12:00 | Lunch
12:00 to 1:00 |
Lunch
12:00 to 1:00 | |||
12:30 | Lunch
12:30 to 1:30 |
Lunch
12:30 to 1:30 | |||
1:00 | TBD
60-minute session 1:00 to 2:00 |
The Global Internet
1:00 to 2:00 | |||
1:30 | History of Cyberlaw and the Berkman Center
1:30 to 2:30 |
Creative Wrap-up
1:30 to 3:00 | |||
2:00 | 30-minute break | 30-minute break | |||
2:30 | 30-minute break | Intellectual Property
2:30 to 4:00 |
TBD
90-minute session | ||
3:00 | Online Liberty and FOE
3:00 to 4:30 |
30-minute break | |||
3:30 | Looking Ahead
3:30 to 4:00 | ||||
4:00 | User Innovation
4:00 to 5:00 |
Methodologies
4:00 to 5:00 | |||
4:30 | GNI/Country Case Study
4:30 to 5:00 |
Final BBQ
4:30 to 6:00+ | |||
5:00 | mid-point check-in | ||||
5:30 | |||||
6:00 | Berkman Center Open House
6:00 to 8:00 |
Optional Evening Session
6:00 to 8:00 |
Optional Evening Session
6:00 to 8:00 | ||
6:30 | |||||
7:00 | |||||
7:30 | |||||
8:00 |
Program Materials
(add description of typology here)
The Pillars of iLaw
Network Access and Open Systems
Privacy
Intellectual Property
Cybersecurity
Online Liberty
Digital Humanities
Cross-sectional Modules
History of Cyberlaw
Methodologies
The Global Internet and Internationalization
User Innovation
Examples and Case Studies
Digital Libraries and Archives
Youth and Media
Cloud Computing
Broadband
Case Study: WikiLeaks
Case Study: User Innovation
Case Study: GNI/Google/China
Case Study: Herdict