Information Policy In The Post-Attack Age
Oct 17, 2001
AbstractThere are many law and policy issues that computer scientists should know something about, but often don't. Especially in areas of privacy and intellectual property protection, the rules are constantly changing and computer code sometimes doesn't match up with legal code. Avoiding these situations is desirable but sometimes difficult to impossible.
This talk first discusses various perceptions of privacy, what can be monitored and by whom, the push for single sign-on identity checking, privacy-enhancing technologies, and privacy-invading technologies. We then consider the policy and cost implications of peer-to-peer information sharing mechanisms (including some new results using principal agent theory from economics applied to Napster), and other intellectual property questions currently the subject of debate in the computer science and legal communities. Other information policy topics may also be discussed.
We will end with a few thoughts on lessons from computer science for government policy makers in the current post-attack administration, along with lessons to the computer science community from someone with a foot in both camps.
About the SpeakerDr. Lance J. Hoffman is Professor of Computer Science at The George Washington University in Washington, D. C., where he is in charge of the computer security graduate program in computer science. He is the author or editor of five books and numerous articles on computer security and privacy. He founded the School of Engineering\'s Cyberspace Policy Institute.
A Fellow of the Association for Computing Machinery and a senior member of the Institute of Electrical and Electronic Engineers (IEEE), Dr. Hoffman recently served on the Advisory Committee on Online Access and Security of the Federal Trade Commission. He heads the Steering Committee of the ACM Conference on Computers, Freedom, and Privacy and is GWU\'s representative to the Advisory Committee of the World Wide Web Consortium.
His research interests include Internet voting and privacy policies for electronic commerce, and his recent teaching innovations include multidisciplinary courses on electronic commerce and information warfare.
The views, opinions and assumptions expressed in these videos are those of the presenter and do not necessarily reflect the official policy or position of CERIAS or Purdue University. All content included in these videos, are the property of Purdue University, the presenter and/or the presenter’s organization, and protected by U.S. and international copyright laws. The collection, arrangement and assembly of all content in these videos and on the hosting website exclusive property of Purdue University. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any other way exploit any part of copyrighted material without permission from CERIAS, Purdue University.