This is the old version of the H2O platform and is now read-only. This means you can view content but cannot create content. You can access the new platform at https://opencasebook.org. Thank you.
Edit playlist item notes below to have a mix of public & private notes, or:
MAKE ALL NOTES PUBLIC (10/10 playlist item notes are public) MAKE ALL NOTES PRIVATE (0/10 playlist item notes are private)1 | Show/Hide More | Introduction to Cyberlaw and Owned/Unowned Platforms |
1.2 | Show/Hide More | Owned/Unowned Platforms |
1.2.4 | Show/Hide More | Maria Andersen, "Is Facebook Zero the Future of Public Internet Access?," ICTWorks (Aug. 29, 2014) |
1.3 | Show/Hide More | Internet Governance |
2 | Show/Hide More | Intermediaries, Jurisdiction, and Speech |
2.1 | Show/Hide More | Traditional Cyberlaw |
2.2 | Show/Hide More | The Right to Be Forgotten |
3 | Show/Hide More | Privacy |
3.1 | Show/Hide More | Background/Theory |
3.2 | Show/Hide More | Importance of Privacy |
3.3 | Show/Hide More | Privacy in the Internet Age |
4 | Show/Hide More | Surveillance |
4.1 | Show/Hide More | Application Layer Surveillance |
4.2 | Show/Hide More | Data v. Metadata |
4.3 | Show/Hide More | Return of the Clipper Chip |
4.4 | Show/Hide More | Time Capsule Cryptography |
4.5 | Show/Hide More | Gov-to-Gov |
4.6 | Show/Hide More | Corporate Surveillance |
5 | Show/Hide More | Cybersecurity |
5.1 | Show/Hide More | Historical Perspective |
5.2 | Show/Hide More | Security Theory |
5.2.2 | Show/Hide More | Dan Geer, “Cybersecurity and National Policy,” Harvard National Security Journal (Jan 10, 2011) |
5.3 | Show/Hide More | Security Examples |
5.4 | Show/Hide More | [SKIM] State-based Attacks |
6 | Show/Hide More | Copyright |
6.2 | Show/Hide More | [ONLY AS NEEDED OR FOR REFERENCE] “Copyright,” Digital Media Law Project (Aug 22, 2011) |
7 | Show/Hide More | Gamification/Crowdsourcing |
8 | Show/Hide More | Net Neutrality |
8.1 | Show/Hide More | Classic Debate |
8.1.1 | Show/Hide More | Stacey Higginbotham, "A Net Neutrality Timeline: How We Got Here," GigaOM (Dec. 21, 2010) |
8.1.5 | Show/Hide More | Barbara van Schewick and Morgan Weiland, "Evaluating the Chairman's Revised Net Neutrality Proposal," The Center for Internet and Society Blog (May 12, 2014) |
8.2 | Show/Hide More | Comcast/Level 3 |
8.2.1 | Show/Hide More | Josh Howell, “Level 3 Communications Issues Statement Concerning Comcast’s Actions,” Business Wire (Nov 29, 2010) |
8.2.2 | Show/Hide More | Marguerite Reardon, "Understanding the Level 3-Comcast spat (FAQ)," CNet (Nov. 30, 2010) |
8.3 | Show/Hide More | But What About the CDNs? |
9 | Show/Hide More | Information Intermediaries & Algorithmic Accountability |
10 | Show/Hide More | Cryptocurrencies and the Future |
10.1 | Show/Hide More | Bitcoin: Adding 1s and 0s to the Ledger |
10.2 | Show/Hide More | The Future |
December 16, 2014
InternetSociety
Find Items |
Search below to find items, then drag and drop items onto playlists you own. To add items to nested playlists, you must first expand those playlists.
This is the old version of the H2O platform and is now read-only. This means you can view content but cannot create content. If you would like access to the new version of the H2O platform and have not already been contacted by a member of our team, please contact us at h2o@cyber.law.harvard.edu. Thank you.