The schedule and reading list are subject to change. Changes are especially likely before and during the first week. Please re-check this page periodically.
|Feb 4||Electronic Voting||
U.S. Election Assistance Commission, U.S. Constitutional Provisions [Regarding Elections]|
Pew Center on the States, The Help America Vote Act at 5, 2007
Clive Thompson, Can You Count on Voting Machines?, New York Times Magazine, January 6, 2008
|Feb 11||Naming and Internet Governance||
Kathleen Fuller, ICANN: The Debate Over Governing the Internet, Duke Law and Technology Review, 2001|
Kenneth Neil Cukier, Who Will Control the Internet?, Foreign Affairs, Nov./Dec. 2005.
Kenneth Neil Cukier, No Joke, Foreign Affairs online update, Dec. 28, 2005
|Feb 18||Spectrum Policy||
Kevin Werbach, Radio Revolution: The Coming Age of Unlicensed Wireless, New America Foundation, 2004.|
Gerald R. Faulhaber and David Farber, Spectrum Management: Property Rights, Markets, and the Commons, Telecommunications Policy Research Conference, 2003.
Drew Clark, Spectrum Wars, National Journal Technology Daily, Feb. 18, 2005.
|Feb 25||Privacy||Daniel J. Solove and Chris Jay Hoofnagle, A Model Regime of Privacy Protection (Version 3.0), Illinois Law Review, 2006.|
Cornell Legal Information Institute. Patent Law: An Overview.|
James J. Bessen and Michael J. Meurer. Of Patents and Property. Regulation, Winter 2008-2009 issue.
Mark A. Lemley. Ignoring Patents. Michigan State Law Review, Vol. 2008, No. 19, 2008.
William M. Landes and Douglas Lichtman. Indirect Liability for Copyright Infringement: An Economic Perspective. U. Chicago Law and Economics Working Paper, Feb. 2003.|
Supreme Court decision in MGM v. Grokster, 2005.
Carl Shapiro, Competition Policy in the Information Economy, 1999.|
Timothy F. Bresnahan, Pro-Innovation Competition Policy: Microsoft and Beyond, 2003.
|Apr 1||Infotech in health care||
Hillestad, Bigelow, Bower, Girosi, Meili, Scovilld, and Taylor. Can Electronic Medical Record Systems Transform Health Care? Potential Health Benefits, Savings, and Costs. Health Affairs, 24(5):1103-17.|
Taylor, Bower, Girosi, Bigelow, Fonkych, and Hillestad. Promoting Health Information Technology: Is There A Case For More-Aggressive Government Action?. Health Affairs, 24(5):1234-45.
Office of the National Coordinator for Health Information Technology. Nationwide Privacy and Security Framework For Electronic Exchange of Individually Identifiable Health Information. December 2008.
|Apr 8||Network Neutrality||Tim Wu. The Broadband Debate: A User's Guide. Journal of Telecommunications and High Technology Law, Vol. 3, No. 69, 2004.|
Beth Simone Noveck. Wiki-Government. Democracy, Winter 2008.|
Dvid Robinson, Harlan Yu, William P. Zeller, and Edward W. Felten. Government Data and the Invisible Hand, Yale Journal of Law & Technology, Vol. 11, 2008.
|Apr 22||Computer Security||
Wikipedia entries for computer virus, computer worm, botnet|
Douglas Barnes, Deworming the Internet, Texas Law Review, Vol. 83, No. 1, Nov. 2004.
|Apr 29||Telecom, VoIP, and Wiretapping||
Federal Communications Commission, VoIP / Internet Voice Fact Sheet.|
Orin S. Kerr, Internet Surveillance Law After the USA Patriot Act: The Big Brother That Isn't, Northwestern University Law Review, Vol. 97, 2003. (Part I (pp. 610-623) only)
Charlie Savage, Wiretaps Said to Sift All Overseas Contacts, Boston Globe, Dec. 23, 2005.
K.A. Taipale, Whispering Wires and Warrantless Wiretaps: Data Mining and Foreign Intelligence Surveillance, NYU Rev. Law & Security, Spring 2006.