This is the old version of the H2O platform and is now read-only. This means you can view content but cannot create content. You can access the new platform at https://opencasebook.org. Thank you.
Edit playlist item notes below to have a mix of public & private notes, or:MAKE ALL NOTES PUBLIC (10/10 playlist item notes are public) MAKE ALL NOTES PRIVATE (0/10 playlist item notes are private)
|1||Show/Hide More||Introduction to Cyberlaw and Owned/Unowned Platforms|
|1.2.4||Show/Hide More||Maria Andersen, "Is Facebook Zero the Future of Public Internet Access?," ICTWorks (Aug. 29, 2014)|
|2||Show/Hide More||Intermediaries, Jurisdiction, and Speech|
|5.2.2||Show/Hide More||Dan Geer, “Cybersecurity and National Policy,” Harvard National Security Journal (Jan 10, 2011)|
|5.4||Show/Hide More||[SKIM] State-based Attacks|
|6.2||Show/Hide More||[ONLY AS NEEDED OR FOR REFERENCE] “Copyright,” Digital Media Law Project (Aug 22, 2011)|
|8.1.1||Show/Hide More||Stacey Higginbotham, "A Net Neutrality Timeline: How We Got Here," GigaOM (Dec. 21, 2010)|
|8.1.5||Show/Hide More||Barbara van Schewick and Morgan Weiland, "Evaluating the Chairman's Revised Net Neutrality Proposal," The Center for Internet and Society Blog (May 12, 2014)|
|8.2.1||Show/Hide More||Josh Howell, “Level 3 Communications Issues Statement Concerning Comcast’s Actions,” Business Wire (Nov 29, 2010)|
|8.2.2||Show/Hide More||Marguerite Reardon, "Understanding the Level 3-Comcast spat (FAQ)," CNet (Nov. 30, 2010)|
|9||Show/Hide More||Information Intermediaries & Algorithmic Accountability|
December 16, 2014
This is the old version of the H2O platform and is now read-only. This means you can view content but cannot create content. If you would like access to the new version of the H2O platform and have not already been contacted by a member of our team, please contact us at email@example.com. Thank you.