| Abstract: This seminar was inspired by a course taught at Princeton University by Ed Felton: http://www.cs.princeton.edu/courses/archive/spring09/cos586/. In the current year we will start off with a set of readings adopted from the above course. But, over time, we will add/replace material to tailor the seminar to issues that are specific to Germany or the European Union.
| Synopsis:- Seminar, Praktische Informatik
- 1 meeting per week, over one semester (2SWS).
- Prerequisites: Basic knowledge in computer security and Internet technology.
Credits and grading: - Participants who want to obtain credits (Seminarschein) for this seminar are expected to work in groups of 1-2 students. Each group must:
- Give a 5-10 minutes elevator speech of their 1st topic.
- Give a 75 minutes presentation of their 1st topic, followed by up to 15 minutes discussion with the audience.
- Give a 5-10 minutes elevator speech of a 2nd topic.
- Give a 30 minutes conference-style presentations of the 2nd topic
Suggested Readings: Topic | Reading | Electronic Voting | U.S. Election Assistance Commission, U.S. Constitutional Provisions (Regarding Elections) [cache] Pew Center on the States, The Help America Vote Act at 5, 2007 [cache] Clive Thompson, Can You Count on Voting Machines?, New York Times Magazine, January 6, 2008 [cache] | Naming and Internet Governance | Kathleen Fuller, ICANN: The Debate Over Governing the Internet, Duke Law and Technology Review, 2001 [cache] Kenneth Neil Cukier, Who Will Control the Internet?, Foreign Affairs, Nov./Dec. 2005. [cache] Kenneth Neil Cukier, No Joke, Foreign Affairs online update, Dec. 28, 2005 [cache] | Spectrum Policy | Kevin Werbach, Radio Revolution: The Coming Age of Unlicensed Wireless, New America Foundation, 2004. Gerald R. Faulhaber and David Farber, Spectrum Management: Property Rights, Markets, and the Commons, Telecommunications Policy Research Conference, 2003. Drew Clark, Spectrum Wars, National Journal Technology Daily, Feb. 18, 2005. | Privacy | Daniel J. Solove and Chris Jay Hoofnagle, A Model Regime of Privacy Protection (Version 3.0), Illinois Law Review, 2006. | Patents | Cornell Legal Information Institute. Patent Law: An Overview. James J. Bessen and Michael J. Meurer. Of Patents and Property. Regulation, Winter 2008-2009 issue. Mark A. Lemley. Ignoring Patents. Michigan State Law Review, Vol. 2008, No. 19, 2008. | Copyright | William M. Landes and Douglas Lichtman. Indirect Liability for Copyright Infringement: An Economic Perspective. U. Chicago Law and Economics Working Paper, Feb. 2003. Supreme Court decision in MGM v. Grokster, 2005. | Competition | Carl Shapiro, Competition Policy in the Information Economy, 1999. Timothy F. Bresnahan, Pro-Innovation Competition Policy: Microsoft and Beyond, 2003. | Infotech in health care | Hillestad, Bigelow, Bower, Girosi, Meili, Scovilld, and Taylor. Can Electronic Medical Record Systems Transform Health Care? Potential Health Benefits, Savings, and Costs. Health Affairs, 24(5):1103-17. Taylor, Bower, Girosi, Bigelow, Fonkych, and Hillestad. Promoting Health Information Technology: Is There A Case For More-Aggressive Government Action?. Health Affairs, 24(5):1234-45. Office of the National Coordinator for Health Information Technology. Nationwide Privacy and Security Framework For Electronic Exchange of Individually Identifiable Health Information. December 2008. | Network Neutrality | Tim Wu. The Broadband Debate: A User's Guide. Journal of Telecommunications and High Technology Law, Vol. 3, No. 69, 2004. | E-Government | Beth Simone Noveck. Wiki-Government. Democracy, Winter 2008. Dvid Robinson, Harlan Yu, William P. Zeller, and Edward W. Felten. Government Data and the Invisible Hand, Yale Journal of Law & Technology, Vol. 11, 2008. | Computer Security | Wikipedia entries for computer virus, computer worm, botnet Douglas Barnes, Deworming the Internet, Texas Law Review, Vol. 83, No. 1, Nov. 2004. | Telecom, VoIP, and Wiretapping | Federal Communications Commission, VoIP / Internet Voice Fact Sheet. Orin S. Kerr, Internet Surveillance Law After the USA Patriot Act: The Big Brother That Isn't, Northwestern University Law Review, Vol. 97, 2003. (Part I (pp. 610-623) only) Charlie Savage, Wiretaps Said to Sift All Overseas Contacts, Boston Globe, Dec. 23, 2005. K.A. Taipale, Whispering Wires and Warrantless Wiretaps: Data Mining and Foreign Intelligence Surveillance, NYU Rev. Law & Security, Spring 2006. |
Presentation Schedule: Date | Presenter | Topic | Slides | | | | | 18.5. | Jenny Krause | "Privacy" | | Toni Neumann | "Computer Security" | | | | | | 1.6. | Toni Neumann | to be announced | | Jenny Krause | "Copyright" | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
| |
|