A Public Policy Research Agenda in IST John W. Bagby Professor of IST Co-Dir. Inst. Info. Policy.

Slides:



Advertisements
Similar presentations
MEDEFs View on Dot EU Domain Day – 5 novembre 2002 – Palazzo Stelline – Milano Catherine GABAY – Director Innovation and Research - Medef.
Advertisements

Electronic commerce EDI (8 decade) – base of EC – “Netscape” – propose SSL (Secure Sockets Layer) 1995 – “Amazon.com” “eBay.com” 1998 – DSL (Digital.
Game Industry Roundtable Lessons from Video Game Litigation: Enforcing Rights and Avoiding Risks Susan Fahringer Will Rava.
Soft Law in China’s regulation of the Internet Professor of law Research Center for Cyber-law Beijing University of Posts & Telecommunications Deliang.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
Dr. Serge S. AZAROV iLaw-2004 Tallinn Informational Society Innovation EconomyCollision Collaboration Modification of National Information Infrastructure.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2011 Legal, Regulations, Compliance and Investigations.
Role of Law, Regulation & Public Policy in Information Sciences & Technology and Security & Risk Analysis John W. Bagby Professor of IST Co-Dir. Inst.
Asia-Pacific Finance and Development Centre 2006 Biennial Forum Shanghai, September 2006 Session V: Regional Cooperation and Innovation Development Presented.
Trust, Privacy, and Security Moderator: Bharat Bhargava Purdue University.
Framework for Global Electronic Commerce Communications 411 Relevant Site:
1 Trade Facilitation A narrow sense –A reduction/streamlining of the logistics of moving goods through ports or the documentation requirements at a customs.
Introduction to IT and E- Commerce Law and Policy Dr. Theodore H. K. Clark Associate Professor and Academic Director of MSc Program in IS Management Department.
PART FOUR – COMMERCIAL LEGISLATION in the UAE Legislative Structures affecting business in the UAE: An Overview Ch 16.
5 November 2012 PERMANENT MISSION OF THAILAND TO THE WTO 1 Intellectual Property and Development: Thailand’s Experience.
A European View of Privacy Protection John Woulds Director of Operations UK Data Protection Commissioner National Conference on Privacy, Technology & Criminal.
3rd Eurasian Corporate Governance Roundtable Shareholder Rights, Equitable Treatment and the Role of the State April 17-18, 2002 hosted by Securities and.
UNITED NATIONS COMMISION ON INTERNATIONAL TRADE LAW (UNCITRAL) Current issues on electronic contracting José Angelo Estrella Faria Legal Officer UNCITRAL.
Vilnius Lithuania BSc.: Biochemistry Neuropsychology J.D.: University of Oregon LL.M.:University College London Pacific Northwest National Laboratory.
Country Report for Nigeria for CI Regional Meeting on A2K, Kenya National President, Consumer Awareness Organisation, Enugu, Nigeria. 17 April 2009.
Computers and Legal Education at the Nicolaus Copernicus University in Toruń Methodology and Experiences Karol Dobrzeniecki, LLM.
Introduction to Health Law B. Barrowman September 2002.
E-Business Romania Adriana Ţicău State Secretary for Information Technology Conferinţele Piaţa Financiară Bucharest, the 26 th of March 2002.
Chapter 5 E-environment
Chapter 1. Electronic Commerce  Brief History of Commerce and Communication  Introduction to Electronic Commerce  Laws Guiding E-commerce  Are we.
11 – E-Commerce 1. What is Electronic Commerce? 2. What is a contract? 3. Elements of an enforceable contract 4. Standard terms of a contract 5. Form and.
The Political, Legal, and Regulatory Environments of Global Marketing Chapter 5.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Computer Law University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet Insurance and Information.
Legal aspects Based on Law in the Internet Age Sharon K. Black.
Class Discussion Notes MKT April 10, 2001.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Social and Professional Issues in IT Roshan Chitrakar.
Yours, Mine and Ours: Copyright in Cyberspace 2005 National LTAP Conference July 26, 2005 Nita Lovejoy Iowa State University.
Prepared by Douglas Peterson, University of Alberta 15-1 Part 3 – The Law of Contract Chapter 15 Electronic Business Law and Data Protection.
Role of Law, Regulation and Public Policy in Information Sciences & Techonlogy John W. Bagby Professor of IST Co-Dir. Inst. Info.Policy.
Implementing the WIPO Development Agenda: Comparing National Approaches to Promoting Coherence Between Public Policy Objectives and IP Laws ICTSD Roundtable.
Environmental Management System Definitions
© 2007 West Legal Studies in Business, A Division of Thomson Learning Chapter 5 Intellectual Property.
Tripping over IP in the SoLoMo World? Wee Choo Hua Senior Director & Legal Counsel, Head of Government Relations, Southeast Asia eBay Inc.
Regulatory Transparency and Efficiency in the Communications Industry in Australia Jennifer Bryant Office of Regulation Review Australia.
CHAPTER 3 INTERNATIONAL LAW DAVIDSON, KNOWLES & FORSYTHE Business Law: Cases and Principles in the Legal Environment (8 th Ed.)
1 GSC: Standardization Advancing Global Communications ISACC Opening Plenary Presentation GSC-11 SOURCE:ISACC TITLE:ISACC Opening Plenary Presentation.
THE LEGAL ENVIRONMENT OF BUSINESS © 2009 Pearson Education, Inc. publishing as Prentice Hall Ch. 6-1 The Legal Environment of Business A Critical Thinking.
Policy Development Unit 7. 2 Policy Development l Policy: Authoritative guidelines that direct human behavior toward specific goals l Politics: Use of.
Development of Company Law in Kazakhstan: Main Trends and Issues Supporting Materials to Main Presentation Tartu, 22 October 2015 Farkhad Karagussov.
John Wiley & Sons, Inc c POLITICAL AND LEGAL ENVIRONMENT Chapter Five.
National Information Communication Technologies Strategy Vasif Khalafov “National strategy” working group - Web -
THE LEGAL ENVIRONMENT OF BUSINESS © 2006 Prentice Hall Ch. 6-1 A Critical Thinking Approach Fourth Edition Nancy K. Kubasek Bartley A. Brennan M. Neil.
Chapter 4: Laws, Regulations, and Compliance
© 2016 Fox Rothschild Panelist Issues and Key Legal Issues Leonard N. Budow, Esq. Partner April 10, 2016.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
PRESENTATION OF THE FIRM. WHY SELECT US ? 2 Presentation of the firm - FIDAL© 2016.
IPR in Financial Markets
The Legal Context of Business
The Legal Context of Business
Regulation of Business
by John Bagby and F. William McCarty
Legal Resources in Cyberspace
Ethical, Social, and Political Issues in E-commerce
IIASA Governance Review
Regulatory Transparency and Efficiency in the Communications Industry in Australia Jennifer Bryant Office of Regulation Review Australia.
ETHICAL & SOCIAL IMPACT OF INFORMATION SYSTEMS
Munich Intellectual Property Law Center (MIPLC)
6. Politics, Ethics and Law
LAW 421 Competitive Success/snaptutorial.com
LAW 421 Education for Service-- snaptutorial.com
LAW 421 Teaching Effectively-- snaptutorial.com
IP and legal issues Super-project.eu.
Presentation transcript:

A Public Policy Research Agenda in IST John W. Bagby Professor of IST Co-Dir. Inst. Info. Policy

What is Information Policy? The impact of public policy on information creation, access, ownership and use Exerted by government, markets & private contracts; Includes: Intellectual Property, Technology Transfer, eGovernment, eCommerce, Privacy & Security law, Internet Regulation & IT governance, Legal & Regulatory Process

Public Policy, Law & Regulation IST spans many cutting-edge policy issues –Like in gaming environments today, the early cyber- libertarians demanded the Internet be exempt from traditional law –Cyberlaw history resoundingly rejected that demand IST public policy clustering of some traditional areas of law –Interesting additional areas dictated by social, political & economic idiosyncrasies caused of new technology

Traditionally Fields of Law Must adapt to Cyberspace & IT –Constitutional law (e.g., bill of rights, due process, takings, commerce clause, separation of powers, federalism, freedom of contract), –Litigation & dispute resolution (e.g., forensics, electronic and traditional discovery, alternative dispute resolution, privileges, role of scientific evidence in legislation, evidence admissibility), –Legislation (e.g., lobbying, Congressional watchdog committees, pluralist grassroots communities), –Administrative law & regulatory process (policy development, rulemaking, enforcement forensics, inter-agency co- operation/competition, dispute resolution), –Intellectual property (IP) –Corporate governance (corporation law, securities regulations, disclosure, contracts, conflicts of interest), –Commercial law, (contracting, payments, property transfers, technology transfer) –Tort liability (reform & risk management, product & service liability) –Sovereign immunity

Research Methods Useful in Public Policy of IST Doctrinal Legal Research, Public Policy Analysis, Conceptual Analysis, Model Building & Testing, Artifact Design, Development & Testing Simulation Various Empirical Methods

An Ontology for Public Policy Scholarship in IST IT Governance Standardization IP Policy and Strategy Security and Privacy Electronic Commerce (eCommerce) See:

IT Governance “specifying the decision rights and accountability framework to encourage desirable behavior in the use of IT.” “the leadership and organizational structures and processes that ensure that [IT serves strategic objectives].” Corporate governance constraints; impact of law, regulators, security & privacy standards; SOX –Implemented through: technology transfer agreements private contracts employment restrictions IP constraints eCommerce commercial practice

Standardization Standards Development Activities (SDA) –Expanding form of public policy development “Code is Law” Major foci: resolution of conflicts of interest –Antitrust & IP –International Aspects quickly Emerging EU through ISO & China –Due Process & Fair Political Representation Balanced against participants’ domain expertise

IP Policy and Strategy Pervasive to nearly all IST scholarship streams –artifacts, cooperative research, HCI, security, privacy, search, dB, data mining, domain-related informatics, cyber-infrastructure, GIS, enterprise systems –See Copyright, trade secret, patent, trademark: –IP Strategy & IP Reform –IP rights valuation, IP rights assessment, IP audit infringement risk analysis P2P, numerous urban legendary myths –Open Source & Antitrust aspects of IP –Software & BMPatents

Security and Privacy An Amalgam of: –Criminal Law –CyberForensics (EDD, ESI, ERM) –Sectoral privacy regulations e.g., privacy regulations in health, financial, online, telecommunications, law enforcement, international commerce) –IT governance : –Information Assurance –Electronic Surveillance –Money Laundering –Social Network Analysis Mapping using Graph Theory

Electronic Commerce (eCommerce) Online & Electronic Contracting Ubiquitous EULAs –Shrink, Click, Box & Browse Wrap Contracts Electronic Marketing & Auction Markets Electronic Payment Systems Financial Services IT Regulation –Money Laundering…again Automated Transaction Processing –AI, intelligent agents, electronic agents, ontologies & expert systems in eCommerce

Some Instruction Interests IST 423 IST 452 IST 453 SRA 211 IST 402 Please drop by in 301C IST Bldg