CSE590Y: Tech Policy Seminar (usually Security Seminar)
Overview
590Y is technically the computer security seminar in CSE. However, this quarter 590y will not focus on security. Instead, we will focus on a broad range of issues in tech policy. Emily McReynolds, from the UW Tech Policy Lab / UW School of Law, will organize things. We expect that 590Y will be interesting to any computer scientist with an interest in law or policy ... or to any law or policy expert with an interest in technology.
We are expecting an interdisciplinary group of students including some from Computer Science & Engineering, the Information School, and the School of Law. Through technical briefings and white papers, we’ll explore a different topic each week, beginning with an organizational meeting to determine which topics are of the most interest (privacy, robotics, internet of things, big data, open government etc.).
590Y will meet at 2:30pm on Wednesdays, in the Computer Science & Engineering building, room CSE 403.
Schedule
1/7 - Introduction to Tech Policy topics and selection
1/14 - How Intellectual Privacy Works – Alex & Will
1/21 - Bitcoin – Emily
1/28 - Scraping/TOS/CFAA – Greg & Matt
2/4 - IMSI Catchers – Ian & Peter
2/11 - Drones – Miriam & Kiron
2/18 - Mobile Privacy – Sam
2/25 - Online harassment/revenge porn/CDA 230 – Charlotte & Jeremy
3/4 - Net Neutrality – Anna & Aaron
3/11 - Sharing Economy
Links
- Crypto Currencies – Cryptographic Currencies from a Tech-Policy Perspective: Policy Issues and Technical Directions; Bitcoin a Primer for Policymakers (http://mercatus.org/publication/bitcoin-primer-policymakers)
- Robotics – A Code of Ethics for the Human-Robot Interaction Profession (http://robots.law.miami.edu/2014/wp-content/uploads/2014/03/a-code-of-ethics-for-the-human-robot-interaction-profession-riek-howard.pdf)
- Augmented Reality – Augmented Reality: Hard Problems of Law and Policy http://appanalysis.org/upside/upside-final14.pdf
- Drones – Considerations of a Legal Framework for the Safe and Resilient Operation of Autonomous Aerial Robots (http://robots.law.miami.edu/2014/wp-content/uploads/2013/06/Cloar-and-Dulo_Considerations-of-a-Legal-Framework-for-Aerial-Robots_WE-ROBOT-2014-Conference.pdf)
- Mobile Privacy – Privacy on the Go, California Attorney General (http://oag.ca.gov/sites/all/files/agweb/pdfs/privacy/privacy_on_the_go.pdf?)
- Technologists in Tech Policy – A Future of Failure, MacArthur Report (http://www.fordfoundation.org/pdfs/news/afutureoffailure.pdf)
- Communications Decency Act Section 230 - Mary Anne Franks, “The Lawless Internet? Myths and Misconceptions About CDA Section 230,” http://www.huffingtonpost.com/mary-anne-franks/section-230-the-lawless-internet_b_4455090.html
- Computer Fraud & Abuse Act – Congressional Research Service, Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws (http://www.fas.org/sgp/crs/misc/97-1025.pdf)
- How Intellectual Privacy Works – excerpts from http://www.amazon.com/gp/product/0615825958/ref=as_li_tl?ie=UTF8&camp=1789&creative=390957&creativeASIN=0615825958&linkCode=as2&tag=techandmarkla-20&linkId=BXCMM6PXAZ27FIIO
- Snowden/National Security Letters/FISA – Cory Doctorow: https://www.youtube.com/watch?v=dbec3qwRXvQ, and Pew Research, Public Perceptions of Privacy in a Post-Snowden era (http://www.pewinternet.org/files/2014/11/PI_PublicPerceptionsofPrivacy_111214.pdf)
- Net Neutrality – The Case for Rebooting the Network Neutrality Debate (http://www.theatlantic.com/technology/archive/2014/05/the-case-for-rebooting-the-network-neutrality-debate/361809/) and the current FCC proposal http://www.fcc.gov/openinternet
- Cybersecurity Research and Development – Trustworthy Cyberspace: A Research Development Plan for the Federal Cybersecurity Research and Development Program (http://www.whitehouse.gov/sites/default/files/microsites/ostp/fed_cybersecurity_rd_strategic_plan_2011.pdf)
- Sharing Economy (Uber, Airbnb) – The Rise of the Sharing Economy, The Economist (http://www.economist.com/news/leaders/21573104-internet-everything-hire-rise-sharing-economy)
- Online Harassment/Revenge Porn – Criminalizing Revenge Porn (http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2368946)
- Right to be Forgotten – by Eric Goldman, (http://blog.ericgoldman.org/archives/2014/08/primer-on-european-unions-right-to-be-forgotten-excerpt-from-my-internet-law-casebook-bonus-linkwrap.htm)
- Big Data – Big Data and Privacy: A Technological Perspective (http://www.whitehouse.gov/sites/default/files/microsites/ostp/PCAST/pcast_big_data_and_privacy_-_may_2014.pdf)
- Privacy policies – Making Your Privacy Practices Public, California Attorney General (http://oag.ca.gov/sites/all/files/agweb/pdfs/cybersecurity/making_your_privacy_practices_public.pdf?)
- Internet of Things – Federal Trade Commissioner Julie Brill, The Internet of Things: Building Trust and Maximizing Benefits Through Consumer Control (http://www.ftc.gov/system/files/documents/public_statements/289531/140314fordhamprivacyspeech.pdf)
- IMSI Catchers/Stingrays/Dirt boxes – Wall Street Journal Article (http://www.wsj.com/articles/americans-cellphones-targeted-in-secret-u-s-spy-program-1415917533), EFF 2014 IMSI stories summary (https://www.eff.org/deeplinks/2015/01/2014-review-stingrays-go-mainstream)
- Scraping – When Programmers Scrape By (http://www.newyorker.com/tech/elements/when-programmers-scrape-by)