Summer
2010

IT and Public Policy
(seminar)

Tuesday, 15:00-16:30, RUD 26, 1'306
Instructor: Prof. Redlich


 


Computer Science Department
Systems Architecture Group

 

 
Abstract: This seminar was inspired by a course taught at Princeton University by Ed Felton: http://www.cs.princeton.edu/courses/archive/spring09/cos586/. In the current year we will start off with a set of readings adopted from the above course. But, over time, we will add/replace material to tailor the seminar to issues that are specific to Germany or the European Union.
 
Synopsis:
  • Seminar, Praktische Informatik
  • 1 meeting per week, over one semester (2SWS).
  • Prerequisites: Basic knowledge in computer security and Internet technology.

Credits and grading:

  • Participants who want to obtain credits (Seminarschein) for this seminar are expected to work in groups of 1-2 students. Each group must:
  • Give a 5-10 minutes elevator speech of their 1st topic.
  • Give a 75 minutes presentation of their 1st topic, followed by up to 15 minutes discussion with the audience.
  • Give a 5-10 minutes elevator speech of a 2nd topic.
  • Give a 30 minutes conference-style presentations of the 2nd topic

 

Suggested Readings:

TopicReading
Electronic VotingU.S. Election Assistance Commission, U.S. Constitutional Provisions (Regarding Elections) [cache]
Pew Center on the States, The Help America Vote Act at 5, 2007 [cache]
Clive Thompson, Can You Count on Voting Machines?, New York Times Magazine, January 6, 2008  [cache]
 
Naming and Internet GovernanceKathleen Fuller, ICANN: The Debate Over Governing the Internet, Duke Law and Technology Review, 2001 [cache]
Kenneth Neil Cukier, Who Will Control the Internet?, Foreign Affairs, Nov./Dec. 2005. [cache]
Kenneth Neil Cukier, No Joke, Foreign Affairs online update, Dec. 28, 2005 [cache]
Spectrum Policy Kevin Werbach, Radio Revolution: The Coming Age of Unlicensed Wireless, New America Foundation, 2004.
Gerald R. Faulhaber and David Farber, Spectrum Management: Property Rights, Markets, and the Commons, Telecommunications Policy Research Conference, 2003.
Drew Clark, Spectrum Wars, National Journal Technology Daily, Feb. 18, 2005.
Privacy Daniel J. Solove and Chris Jay Hoofnagle, A Model Regime of Privacy Protection (Version 3.0), Illinois Law Review, 2006.
Patents Cornell Legal Information Institute. Patent Law: An Overview.
James J. Bessen and Michael J. Meurer. Of Patents and Property. Regulation, Winter 2008-2009 issue.
Mark A. Lemley. Ignoring Patents. Michigan State Law Review, Vol. 2008, No. 19, 2008.
Copyright William M. Landes and Douglas Lichtman. Indirect Liability for Copyright Infringement: An Economic Perspective. U. Chicago Law and Economics Working Paper, Feb. 2003.
Supreme Court decision in MGM v. Grokster, 2005.
Competition Carl Shapiro, Competition Policy in the Information Economy, 1999.
Timothy F. Bresnahan, Pro-Innovation Competition Policy: Microsoft and Beyond, 2003.
Infotech in health care Hillestad, Bigelow, Bower, Girosi, Meili, Scovilld, and Taylor. Can Electronic Medical Record Systems Transform Health Care? Potential Health Benefits, Savings, and Costs. Health Affairs, 24(5):1103-17.
Taylor, Bower, Girosi, Bigelow, Fonkych, and Hillestad. Promoting Health Information Technology: Is There A Case For More-Aggressive Government Action?. Health Affairs, 24(5):1234-45.
Office of the National Coordinator for Health Information Technology. Nationwide Privacy and Security Framework For Electronic Exchange of Individually Identifiable Health Information. December 2008.
Network Neutrality Tim Wu. The Broadband Debate: A User's Guide. Journal of Telecommunications and High Technology Law, Vol. 3, No. 69, 2004.
E-Government Beth Simone Noveck. Wiki-Government. Democracy, Winter 2008.
Dvid Robinson, Harlan Yu, William P. Zeller, and Edward W. Felten. Government Data and the Invisible Hand, Yale Journal of Law & Technology, Vol. 11, 2008.
Computer Security Wikipedia entries for computer virus, computer worm, botnet
Douglas Barnes, Deworming the Internet, Texas Law Review, Vol. 83, No. 1, Nov. 2004.
Telecom, VoIP, and Wiretapping Federal Communications Commission, VoIP / Internet Voice Fact Sheet.
Orin S. Kerr, Internet Surveillance Law After the USA Patriot Act: The Big Brother That Isn't, Northwestern University Law Review, Vol. 97, 2003. (Part I (pp. 610-623) only)
Charlie Savage, Wiretaps Said to Sift All Overseas Contacts, Boston Globe, Dec. 23, 2005.
K.A. Taipale, Whispering Wires and Warrantless Wiretaps: Data Mining and Foreign Intelligence Surveillance, NYU Rev. Law & Security, Spring 2006.
 

 

Presentation Schedule:

Date

Presenter 

Topic

Slides
    
18.5.Jenny Krause    "Privacy" 
Toni Neumann    "Computer Security" 
    
1.6.Toni Neumann    to be announced 
Jenny Krause    "Copyright"  
    
    
    
    
    
    
    
 

 

  
    

 

 Links
Princeton University
COS 586: Information Technology and Public Policy
Princeton University
COS 586: Information Technology and Public Policy
Princeton University
COS 586: Information Technology and Public Policy

Legal disclaimer. .  © 2024 Humboldt-Universität zu Berlin, Computer Science Department, Systems Architecture Group.Contact: sar@informatik.hu-berlin.de .