| Abstract:
This seminar was inspired by a course taught at Princeton University by Ed
Felton:
http://www.cs.princeton.edu/courses/archive/spring09/cos586/. In the
current year we will start off with a set of readings adopted from the above
course. But, over time, we will add/replace material to tailor the seminar
to issues that are specific to Germany or the European Union.
| Synopsis:
- Seminar, Praktische Informatik
- 1 meeting per week, over one semester (2SWS).
- Prerequisites: Basic knowledge in computer
security and Internet technology.
Credits and grading:
- Participants who want to obtain credits (Seminarschein)
for this seminar are expected to work in groups of 1-2 students. Each
group must:
- Give a 5-10 minutes elevator speech of their 1st
topic.
- Give a 75 minutes presentation of their 1st
topic, followed by up to 15 minutes discussion with the audience.
- Give a 5-10 minutes elevator speech of a 2nd
topic.
- Give a 30 minutes conference-style presentations
of the 2nd topic
Suggested Readings:
Topic |
Reading |
Electronic Voting |
U.S. Election Assistance Commission,
U.S. Constitutional Provisions (Regarding Elections) [cache]
Pew Center on the States,
The Help America Vote Act at 5, 2007 [cache]
Clive Thompson,
Can You Count on Voting Machines?, New York Times Magazine,
January 6, 2008 [cache]
|
Naming and Internet Governance |
Kathleen Fuller,
ICANN: The Debate Over Governing the Internet, Duke Law and
Technology Review, 2001 [cache]
Kenneth Neil Cukier,
Who Will Control the Internet?, Foreign Affairs, Nov./Dec. 2005.
[cache]
Kenneth Neil Cukier,
No Joke, Foreign Affairs online update, Dec. 28, 2005 [cache]
|
Spectrum Policy |
Kevin Werbach,
Radio
Revolution: The Coming Age of Unlicensed Wireless, New America
Foundation, 2004.
Gerald R. Faulhaber and David Farber,
Spectrum Management: Property Rights, Markets, and the Commons,
Telecommunications Policy Research Conference, 2003.
Drew Clark,
Spectrum Wars, National Journal Technology Daily, Feb. 18, 2005.
|
Privacy |
Daniel J. Solove and Chris Jay Hoofnagle,
A Model Regime of Privacy Protection (Version 3.0), Illinois Law
Review, 2006. |
Patents |
Cornell Legal Information Institute.
Patent Law: An
Overview.
James J. Bessen and Michael J. Meurer.
Of Patents and Property. Regulation, Winter 2008-2009 issue.
Mark A. Lemley.
Ignoring Patents. Michigan State Law Review, Vol. 2008, No. 19,
2008. |
Copyright |
William M. Landes and Douglas Lichtman.
Indirect Liability for Copyright Infringement: An Economic
Perspective. U. Chicago Law and Economics Working Paper, Feb.
2003.
Supreme Court decision in
MGM v.
Grokster, 2005. |
Competition |
Carl Shapiro,
Competition Policy in the Information Economy, 1999.
Timothy F. Bresnahan,
Pro-Innovation
Competition Policy: Microsoft and Beyond, 2003. |
Infotech in health care |
Hillestad, Bigelow, Bower, Girosi, Meili,
Scovilld, and Taylor.
Can Electronic Medical Record Systems Transform Health Care?
Potential Health Benefits, Savings, and Costs. Health Affairs,
24(5):1103-17.
Taylor, Bower, Girosi, Bigelow, Fonkych, and Hillestad.
Promoting Health Information Technology: Is There A Case For
More-Aggressive Government Action?. Health Affairs,
24(5):1234-45.
Office of the National Coordinator for Health Information
Technology.
Nationwide Privacy and Security Framework For Electronic Exchange of
Individually Identifiable Health Information. December 2008.
|
Network Neutrality |
Tim Wu.
The Broadband Debate: A User's Guide. Journal of
Telecommunications and High Technology Law, Vol. 3, No. 69, 2004.
|
E-Government |
Beth Simone Noveck.
Wiki-Government. Democracy, Winter 2008.
Dvid Robinson, Harlan Yu, William P. Zeller, and Edward W. Felten.
Government Data and the Invisible Hand, Yale Journal of Law &
Technology, Vol. 11, 2008. |
Computer Security |
Wikipedia entries for
computer virus,
computer worm,
botnet
Douglas Barnes,
Deworming the Internet, Texas Law Review, Vol. 83, No. 1, Nov.
2004. |
Telecom, VoIP, and Wiretapping |
Federal Communications Commission,
VoIP /
Internet Voice Fact Sheet.
Orin S. Kerr,
Internet Surveillance Law After the USA Patriot Act: The Big Brother
That Isn't, Northwestern University Law Review, Vol. 97, 2003.
(Part I (pp. 610-623) only)
Charlie Savage,
Wiretaps Said to Sift All Overseas Contacts, Boston Globe, Dec.
23, 2005.
K.A. Taipale,
Whispering Wires and Warrantless Wiretaps: Data Mining and Foreign
Intelligence Surveillance, NYU Rev. Law & Security, Spring 2006.
|
Presentation Schedule:
Date |
Presenter |
Topic |
Slides |
|
|
|
|
18.5. |
Jenny Krause |
"Privacy" |
|
Toni Neumann |
"Computer Security" |
|
|
|
|
|
1.6. |
Toni Neumann |
to be announced |
|
Jenny Krause |
"Copyright" |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
|