ࡱ>  nVbjbj 0dd`N bbbbbvvv8RvF(P&Z["} ''''''',*H-'b[['9bb(999bb'9'99:I$,$1c0u$ '(0F($R-9-$9$be%D''9F(- (:   PUBP 710: The Public and Private Regulation of Technology Spring 2015 Monday, 7:20-10:00pm Professor: Siona Listokin Email (preferred): slistoki@gmu.edu Office: Founders Hall, 651 Phone: (703)-937-9756 Office Hours: Monday 5-7pm and by appointment. On nights with guest speakers, I will take a small group of students to dinner with the guest before class, pending interest and availability. Class website: http://sionalistokin.gmu.edu/techpolicy/ Description of the Course Todays global information economy is built on a free and open internet, while increasingly relying on data aggregation to fuel technological advances and industry revenue generation. The ability to collect, store, and process huge amounts of data and information opens exciting new capabilities that can improve standards of living and organizational productivity. New technology can also improve the effectiveness of national security and intelligence programs. At the same time, important questions of privacy, freedom and equity are at stake and many existing policy structures are not equipped to deal with the data revolution. This course is a seminar in technology policy, with a focus on the roles of government and industry in the rapid developments in information and communication technology. The class will review the economics of innovation and networks before tackling major issues in technology regulation in the U.S. and around the world. We will consider legal, economic, sociological and moral perspectives in our discussions of the new worlds of data, networks, surveillance, sharing, and hackers. Note: This is a new course, and suggestions are welcome. Learning Outcomes By the end of this course, students will be able to: Use the basic tools and vocabulary of microeconomic theory as it relates to new technologies and public policy Understand the basics of data science, and implications for technological advancements and privacy intrusions Identify the major issues surrounding national intelligence use of data mining Compare regulatory frameworks at national and local levels as it relates to the telecommunication and sharing economies Course Requirements Course Grades Participation 30% Policy Briefs 30% Final Project 40% Participation This is a seminar style course, and you are expected to participate in class. Class participation is based on in-class discussions, scheduled student presentations, and online discussions. We all have different styles of participating and contributing to group knowledge generation, but do not expect to mentally check out of class while refreshing March Madness scores and email for three hours (the occasional glance is fine); I notice and so does everyone else. Part of your participation grade will be based on midweek Twitter posts and conversations. We will be tweeting questions and comments about the readings and guest speakers under the hashtag #gmutechpolicy. If you do not have a Twitter account (or do not want to use your personal account), you should set one up. Each week, two students will be designated conversation starters, and everyone is expected to tweet their contributions by Sunday evening. This requirement alleviates much of the writing burden (a tweet or series of tweets must be short), but you are expected to be sharp and insightful. We will review the mechanics of Twitter during the first class of the semester. I recommend reading the Twitter privacy policy before posting anything. Policy Briefs There will be three in-class writing assignments scheduled through the semester. You will be asked to write a policy memo on a current topic, and base your answers on material covered in the course. You are expected to use all resources at your disposal, so bring a laptop (or sit in the computer lab), call your buddy who works in the Dept of Justice/Facebook Data Science/NSA/Palantir/DC Taxi Commission, and be prepared to think and write fast. Thinking critically and writing well under pressure is very difficult. I will be as forgiving as your she-seems-nice boss would be in a similar situation. I recommend swapping policy memos with a classmate at the ten-minute mark for copyediting. Final Project The major deliverable for this course is a final project. This is your chance to put all your knowledge and enthusiasm for technology policy to good, albeit hypothetical use. You can choose to take on the role of either an entrepreneur or a public servant with an eye on national security, economic prosperity, market failures and reelection. You may work with other classmates for this project. If you choose to collaborate, the scope/value of your project is expected to be twice (or three times) as impressive. If you choose the role of entrepreneur, you must develop a short business plan for an app, extension, or service that is related to the information and communication economy. You may be optimistically vague about your expected funding rounds and projected user growth (since we policy folks dont care much about these mundane issues). You must be precise about how your service model deals with or improves existing issues related to data, privacy and security, such as regulations, potential data issues such as breaches [at the macro (i.e., not engineering) level], government requests for data, personal privacy, foreign censorship etc. If you choose the role of public servant, choose a specific policy problem that is related to the information and communication economy. Fix it! Or explain why the fix should be left to the market or done in collaboration with industry. Be specific about the firms and end-users that will be impacted, winners and losers, high-level legal issues and good old practicality. You may be politically optimistic but not stupid. You should think big but not silly. No matter which role you take, your fellow classmates will be attacking your proposal, so be as thorough as possible in preparing your ideas. Your best defense is to anticipate the weaknesses of your own proposal and fix them. A third of your project proposal grade will be based on your written critique of two other (randomly chosen) students ideas. Your critical appraisal should be fact-based, concise and as brutal as necessary. PhD Students Doctoral students in the course must complete all the required deliverables EXCEPT the final project described above. Instead, PhD students should complete an academic literature review of an area related to information technology. PhD students should meet privately with me during the first few weeks of class to go over their areas of interest and formulate a reasonable topic for the article. Policy on Plagiarism The profession of scholarship and the intellectual life of a university as well as the field of public policy inquiry depend fundamentally on a foundation of trust. Thus any act of plagiarism strikes at the heart of the meaning of the university and the purpose of the School of Public Policy. It constitutes a serious breach of professional ethics and it is unacceptable. Plagiarism is the use of anothers words or ideas presented as ones own. It includes, among other things, the use of specific words, ideas, or frameworks that are the product of anothers work. Honesty and thoroughness in citing sources is essential to professional accountability and personal responsibility. Appropriate citation is necessary so that arguments, evidence, and claims can be critically examined. Plagiarism is wrong because of the injustice it does to the person whose ideas are stolen. But it is also wrong because it constitutes lying to ones professional colleagues. From a prudential perspective, it is shortsighted and self-defeating, and it can ruin a professional career. The faculty of the School of Public Policy takes plagiarism seriously and has adopted a zero tolerance policy. Any plagiarized assignment will receive an automatic grade of F. This may lead to failure for the course, resulting in dismissal from the University. This dismissal will be noted on the students transcript. For foreign students who are on a university-sponsored visa (eg. F-1, J-1 or J-2), dismissal also results in the revocation of their visa. To help enforce the SPP policy on plagiarism, all written work submitted in partial fulfillment of course or degree requirements must be available in electronic form so that it can be compared with electronic databases, as well as submitted to commercial services to which the School subscribes. Faculty may at any time submit students work without prior permission from the student. Individual instructors may require that written work be submitted in electronic as well as printed form. The SPP policy on plagiarism is supplementary to the George Mason University Honor Code; it is not intended to replace it or substitute for it. Academic Accommodation for a Disability If you are a student with a disability and you need academic accommodations, please see me and contact the Disability Resource Center (DRC) at 703-993-2474. All academic accommodations must be arranged through the DRC. Schedule January 26 hello world Economics of information; Networks; Regulation of new technology Easley and Kleinberg. Networks, Crowds and Markets: Reasoning About a Highly Connected World. Cambridge University Press. 2010. Chapter 1. Falzone, Anthony. Regulation and Technology. Journal of Law and Public Policy. January, 2013. Posner, Richard. The Economics of Privacy. The American Economic Review. 1981. Vol 71(2), pp. 405-409. The Economist. Technology: Looking Both Ways. February 22, 2014. Twitter.com. Getting Started with Twitter.  HYPERLINK "https://support.twitter.com/articles/215585-getting-started-with-twitter" https://support.twitter.com/articles/215585-getting-started-with-twitter Twitter.com Privacy Policy  HYPERLINK "https://twitter.com/privacy" https://twitter.com/privacy February 2 Privacy Law in the U.S. and EU US Privacy Law; Role of FTC; EU Privacy Rulings European Commission, Court of Justice Right to be Forgotten  HYPERLINK "http://ec.europa.eu/justice/data-protection/" http://ec.europa.eu/justice/data-protection/ GAO. Information Resellers: Consumer Privacy Framework Needs to Reflect Changes in Technology and the Marketplace. December 18, 2013. NHPR, The Exchange, July 14, 2014. Should the US Adopt a Right To Be Forgotten Online? Podcast available at NHPR.org Sengupta, Somini. No U.S. Action, So States Move on Privacy Law. The New York Times, October 30, 2013. The White House, Office of the Press Security. Securing Cyberspace: President Obama Announces New Cybersecurity Legislative Proposal and Other Cybersecurity Efforts. January 13, 2015.  HYPERLINK "http://www.whitehouse.gov/the-press-office/2015/01/13/securing-cyberspace-president-obama-announces-new-cybersecurity-legislat" http://www.whitehouse.gov/the-press-office/2015/01/13/securing-cyberspace-president-obama-announces-new-cybersecurity-legislat February 9 Guest Lecture: Peter Miller  HYPERLINK "https://www.linkedin.com/profile/view?id=29967695" https://www.linkedin.com/profile/view?id=29967695 Senior Counsel at Crowell and Moring LLP, former Chief Privacy Officer at FTC Whos Your Data? What is Big Data? Crash course on data science; What does your data say about you? Acxiom.com, AboutTheData,  HYPERLINK "http://www.aboutthedata.com/portal" www.aboutthedata.com/portal Anderson, Chris. The End of Theory: The Data Deluge Makes the Scientific Method Obsolete. Wired Magazine. June 23, 2008. Davenport and Patil. Data Science: The Sexiest Job of the 21st Century. Harvard Business Review, October 2012. Executive Office of the President. Big Data: Seizing Opportunities, Preserving Values. May 14 2014. FTC. Protecting Consumer Privacy in an Era of Rapid Change: Recommendations for Businesses and Policymakers. March 2012. Oracle.com. Data Mining Concepts.  HYPERLINK "http://docs.oracle.com/cd/B28359_01/datamine.111/b28129/process.htm#DMCON002" http://docs.oracle.com/cd/B28359_01/datamine.111/b28129/process.htm#DMCON002 Policy Brief I February 16 Guest Lecture: Alex Howard  HYPERLINK "https://www.linkedin.com/in/alexanderbhoward" https://www.linkedin.com/in/alexanderbhoward Writer and editor, focused on technology, journalism, government and society. Neutral Regulation Net Neutrality, TBD based on the FCC; Regulation of telecommunication Anders, George. The Right Way to Fix the Internet. MIT Technology Review. October 14, 2014. Crawford. Cable Regulation in the Internet Era. 2014, NBER FCC, The Open Internet. http://www.fcc.gov/openinternet Hausman and Sidak. Telecommunications Regulation: Current Approaches with the End in Sight. 2013. Howard, Alex. Whats Next for Net Neutrality? Reclassification or a Tiered Internet? E-Pluribusunum. January 16, 2014.  HYPERLINK "http://e-pluribusunum.com/2014/01/16/what-next-for-net-neutrality-reclassification-or-a-tiered-internet/" http://e-pluribusunum.com/2014/01/16/what-next-for-net-neutrality-reclassification-or-a-tiered-internet/ February 23 Guest Lecture: Lee Peeler  HYPERLINK "https://www.linkedin.com/pub/lee-peeler/20/78/5b0" https://www.linkedin.com/pub/lee-peeler/20/78/5b0 President, Advertising Self-Regulatory Council Glass Houses Economics of targeted ads; The internet of everything; Social norms IRL and online; Privacy breaches, price discrimination Duhigg. How Companies Learn Your Secrets. The New York Times. February 16, 2012. Lenard and Rubin. The Big Data Revolution: Privacy Considerations. Technology Policy Institute. December 2013. Manjoo. Larry Page On Googles Many Arms. The New York Times, June 25, 2014. Shiller. First Degree Price Discrimination Using Big Data. Brandeis University. July 31, 2013. Tanner. Different Customers, Different Prices, Thanks to Big Data. Forbes. March 26, 2014. (see also WSJ 12/24/12 Websites Vary Prices, Deals) Zarsky, Tal. Desperately Seeking Solutions: Using Implementation-Based Solutions for the Troubles of Information Privacy in the Age of Data Mining and the Internet Society. Maine Law Review, Vol 56(1). 2013. Project Proposals Due March 2 Sony! Target! Heartbleed! Data breaches; Responsibility across business, credit card companies, government; Pooled insurance for ID theft; Cracking down on hackers GAO. Cybersecurity: Threats Impacting the Nation. April 24, 2012. Moore, T. Introducing the Economics of Cybersecurity: Principles and Policy Options. Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy. 2010. Office of the Attorney General, California Department of Justice. California Data Breach Report. October 2014. Note: No Class March 9 (Spring Break) March 16 Guest Lecture: Ben Sperry  HYPERLINK "https://www.linkedin.com/in/rbensperry" https://www.linkedin.com/in/rbensperry Associate Director, International Center for Law and Economics and Legal Fellow, TechFreedom Meta Security Intelligence innovations; Legal framework for surveillance; Domestic v. foreign intelligence gathering; Prism, Snowden, NSA Center for Democracy and Technology. The USA Freedom Act (HR 3361) Summary and Analysis. June 3, 2014.  HYPERLINK "https://d1ovv0c9tw0h0c.cloudfront.net/files/2014/06/USA-FREEDOM-CDT-sum.pdf" https://d1ovv0c9tw0h0c.cloudfront.net/files/2014/06/USA-FREEDOM-CDT-sum.pdf Kehl, Danielle. Surveillance Costs: The NSAs Impact on the Economy, Internet Freedom and Cybersecurity. New Americas Open Technology Institute. July 2014. President Obama, Press Conference on NSA Surveillance, August 9, 2013.  HYPERLINK "https://www.youtube.com/watch?v=paZgOC7Wqo0" https://www.youtube.com/watch?v=paZgOC7Wqo0 Rotenberg. On International Privacy: A Path Forward for the US and Europe. Harvard International Review. June 15, 2014. Policy Brief II March 23 Guest Lecture: Evan Selinger  HYPERLINK "http://www.rit.edu/cla/philosophy/Selinger.html" http://www.rit.edu/cla/philosophy/Selinger.html Associate Professor, Department of Philosophy, Rochester Institute of Technology Security and Secrets Social networks and democratization; Domestic and Foreign censorship; International relations Heins, Marjorie. The Brave New World of Social Media Censorship. Harvard Law Review. June 20, 2014. The Aspen Institute. Is Social Media A Dangerous Force Against Democracy? August 6, 2014. Watch the lecture series at  HYPERLINK "http://www.aspeninstitute.org/about/blog/social-media-dangerous-force-against-democracy" http://www.aspeninstitute.org/about/blog/social-media-dangerous-force-against-democracy The Economist. Special Report: China and the Internet. April 6th, 2013. March 30 Sharing is Caring The Sharing Economy; Local Regulation; Regulatory Capture; Data and Regulation Dungca, Nicole. In first, Uber to Share Ride Data with Boston. The Boston Globe. January 13, 2015. Downes, Larry. Lessons from Uber: Why Innovation and Regulation Dont Mix. Forbes. February 6, 2013. The Economist. All Eyes on the Sharing Economy. March 9, 2013. Frizell, Sam. A Historical Argument Against Uber: Taxi Regulations are There for a Reason. Time Magazine. November 29, 2014. Listokin, Siona. Regulating Uber: Data Collection is Key. Slate.com, January 9, 2014. PayPal. 21st Century Regulation: Putting Innovation At the Heart of Payments Regulation.  HYPERLINK "http://www.ebaymainstreet.com/sites/default/files/PayPal-Payment-Regulations-Booklet-US.pdf" http://www.ebaymainstreet.com/sites/default/files/PayPal-Payment-Regulations-Booklet-US.pdf April 6 The Courts Fair Use and IP; Sexting, cyber bullying; Supreme Court and Technology Bazelon, Emily. How to Stop the Bullies. The Atlantic. March 2013. The Kojo Nnamdi Show. Supreme Court Rulings on TV Viewing and Cell Phone Searches. June 25, 2014 (listen to show or read transcript) Manjoo, Farhad. The Tech-Savvy Supreme Court. The New York Times. June 26, 2014 April 13 Guest Lecture: Chris Rasmussen  HYPERLINK "https://www.linkedin.com/pub/christopher-rasmussen/4/84b/a03" https://www.linkedin.com/pub/christopher-rasmussen/4/84b/a03 Senior Privacy Specialist, Blue Shield of California. Former Policy Analyst with the Center for Democracy and Technology. Brogrammers and Accountants Industry navel gazing: diversity, ageism, gentrification; STEM shortages; Tax avoidance and I <3 Ireland Houlder, Boland, Politi. Tax Avoidance: The Irish Inversion. The Financial Times. April 29, 2014. Scheiber. The Brutal Ageism of Tech. The New Republic. March 23, 2014. Vara, Vauhini. Can Intel Make Silicon Valley More Diverse? The New Yorker. January 11, 2015. Final Project Due April 20 Guest Lecture: Jen Golbeck  HYPERLINK "http://www.cs.umd.edu/~golbeck/" http://www.cs.umd.edu/~golbeck/ Director, Human-Computer Interaction Lab and Associate Professor, University of Maryland. The Sociology Network Social science and big data; Facebook News Feed; Google Flu Trends; Anonymous networks Golbeck, Jennifer. The Curly Fry Conundrum: Why Social Media likes Say More Than You Might Think. TED Talk. April 2014. Kramer, Guillory, Hancock. Experimental Evidence of Massive Scale Emotional Contagion Through Social Networks. Proceedings of the National Academy of Sciences of the USA June 2014, Vol 111 no 24, pgs 8788-8790. Lazer, David, Ryan Kennedy, Gary King, and Alessandro Vespignani. 2014. The Parable of Google Flu: Traps in Big Data Analysis. Science 343, no. 14 March: 1203-1205. Rudder, Christian. We Experiment on Human Beings! OkCupid Blog. July 28, 2014.  HYPERLINK "http://blog.okcupid.com/index.php/we-experiment-on-human-beings/" http://blog.okcupid.com/index.php/we-experiment-on-human-beings/ April 27 file I/O TBD. Project Presentations Project Critiques Due May 4 return 0; Other topics; Review; What will syllabus for this course look like in 2016? Policy Brief III      9:EFLvN R  L   ( Z [ BH}~34ARhijmnششȘఐhKhAh hkhh<5h5h5>*h_h!.6h_h_6h!.h5ph!.h5p>*hJh7>*h7hK:h$[hVbh_hu3Ch5hm h$[5 hK:5hJh55 hm54:F[\v [ \ AB}~4ijk $ & Fa$gd<5$a$gd7klmnxyst45gd<5$a$gd7n`)`r\z +̸̴ܰܬܬܬ蘓̸hSehA h<56 hy#6 hJhVhyOFh5hChS{4h7hhJh76hLhT_hy#hKh!.h<5hVh @Dh76 hJh7h!.h7>*hJh7>*6RUfqrsty 035cdeq~PZ[an %.dCLÿ˿ûûÿûûǻǻ˻ hyL@6h0hh$h>{mhchSdhKhyL@hy#hJh76 hy#6 hK6 h<5h<5h<5hAhS{4hSehCT_34  1 A A!K!a!"."/"0"1"F"##Z%[%w&x&E(F(**++++++ɶh%/h%/6OJQJh7>*OJQJh%/>*OJQJhJh7>*OJQJhJh7OJQJhJh7OJQJhJh7>* hJh7 hS{4hS{4h hS{46h{7hahTh7hahyL@hhS{42 0"1"F"##[%x&y&F(G(***+++++"$ & 0` P@1$7$8$H$a$gd7$a$gd7++++0,1,,,-----kkkkkkk&$ & 0` P@1$7$8$H$^a$gd-k&$ & 0` P@h1$7$8$H$^ha$gd7%$ & F & 0` P@1$7$8$H$a$gd7"$ & 0` P@1$7$8$H$a$gd7 +++++++,,,/,0,1,G,,,,,,, ---G-c---------Ž}}uiuaUajhgwOJQJUhgwOJQJh}!h}!6OJQJh}!OJQJhKhAjOJQJh2FhAj0JOJQJjhAjOJQJUjhAjOJQJUhAjOJQJhTXhAjOJQJ637383D3`33(4kI"$ & 0` P@1$7$8$H$a$gdyL@&$ & 0` P@h1$7$8$H$^ha$gdyL@&$ & 0` P@h1$7$8$H$^ha$gd7%$ & F & 0` P@1$7$8$H$a$gd7"$ & 0` P@1$7$8$H$a$gd7(4)4:444555555^6cccccccc*$ & 0` P@1$7$8$H$^`a$gdAj*$ & 0` P@h1$7$8$H$^h`a$gdAj&$ & 0` P@h1$7$8$H$^ha$gdAj"$ & 0` P@1$7$8$H$a$gdAj 44455c5r555556P666 7V7X7Y7Z77777777777ϺϠϕφ{wnb[SKhOJQJh`x]OJQJ hJh&Zh0h&Z5OJQJh&Z5OJQJhAjhL`hAjOJQJjhAjOJQJUhgwhAjOJQJh$hAj6OJQJhohAj6H*OJQJhohAj6OJQJhAj6OJQJhAjOJQJh2FhAj0JOJQJjhAjOJQJUj:hAjOJQJU^6_6667777f@&$ & 0` P@h1$7$8$H$^ha$gd&Z"$ & 0` P@1$7$8$H$a$gd7' & 0` P@1$7$8$H$^`gdAj&$ & 0` P@1$7$8$H$^a$gdAj*$ & 0` P@1$7$8$H$^`a$gdAj77777N888888kk&$ & 0` P@h1$7$8$H$^ha$gd&Z&$ & 0` P@h1$7$8$H$^ha$gdH%$ & F & 0` P@1$7$8$H$a$gd&Z"$ & 0` P@1$7$8$H$a$gd7 777777788 8L8M88888*9?9S9T9U9_9999999(:0::::::;; ;;;и񦝕ymymdиhH6OJQJh,Qh&Z6OJQJhEhEOJQJhE6OJQJhEOJQJh&ZOJQJh&Z6OJQJ#hHB*CJOJQJ^JaJph@@@h2FhH0JOJQJhHhHOJQJjhHOJQJUhH5OJQJhHhH5OJQJhHOJQJ hHh0'8S9T999990:1:gg&$ & 0` P@01$7$8$H$^0a$gd&Z&$ & 0` P@h1$7$8$H$^ha$gdE&$ & 0` P@h1$7$8$H$^ha$gd&Z&$ & 0` P@01$7$8$H$^0a$gdE1:;;;;;;;kE&$ & 0` P@h1$7$8$H$^ha$gd'2V"$ & 0` P@1$7$8$H$a$gd'2V%$ & F & 0` P@1$7$8$H$a$gd&Z&$ & 0` P@h1$7$8$H$^ha$gd&$ & 0` P@01$7$8$H$^0a$gdH;;;;;;;;;;;;;;;;;'<(<W<X<Y<e<f<<þ{n\SJ>hJh&Z6OJQJh&Z6OJQJh'2V6OJQJ#h'2VB*CJOJQJ^JaJph@@@h2Fh'2V0JOJQJjh'2VOJQJUh'2Vh'2VOJQJh'2VOJQJjh'2VOJQJUh'2V5OJQJhHh'2V5OJQJ h'2V6 h&Zh&Zh`x]OJQJh6OJQJhh&ZOJQJh&ZOJQJhHhHOJQJhHOJQJ;)<X<Y<f<<<3=4=====k"$ & 0` P@1$7$8$H$a$gd&Z&$ & 0` P@1$7$8$H$^a$gd&Z&$ & 0` P@h1$7$8$H$^ha$gd&Z&$ & 0` P@h1$7$8$H$^ha$gd'2V < =F=u====->]>>??????????????@@맲xpi`TPI hJhRhRhM2)hR6OJQJhR6OJQJ hRhRh6OJQJhJh7OJQJ hJh7h0h05OJQJh05OJQJh0OJQJhEIh&ZOJQJh&Z6OJQJh0h&Z6OJQJh8ph&Z6OJQJhOh&Z6OJQJhh&Z6OJQJh&ZOJQJh. h&Z6OJQJ=S>T>>>??????g%$ & F & 0` P@1$7$8$H$a$gdR&$ & 0` P@h1$7$8$H$^ha$gd7&$ & 0` P@1$7$8$H$^a$gdEI&$ & 0` P@1$7$8$H$^a$gd&Z ??@@@@AABBBccccc&$ & 0` P@1$7$8$H$^a$gd&$ & 0` P@h1$7$8$H$^ha$gd7*$ & 0` P@h1$7$8$H$^h`a$gdR&$ & 0` P@h1$7$8$H$^ha$gdR @@@@AAAABBB.B/B7B8B9BHBSBTB`BBBBBB CCCCƾ{n\SJh:6OJQJh'2V6OJQJ#h'2VB*CJOJQJ^JaJph@@@h2Fh'2V0JOJQJh'2Vh'2VOJQJjh'2VOJQJUh'2V5OJQJhHh'2V5OJQJh'2VOJQJ h:h0h<4OJQJh0h05 h05hR6OJQJh*h*OJQJh*6OJQJh\7OJQJh*OJQJhROJQJB.B/B8B9BSBBCCCCCkkkk&$ & 0` P@h1$7$8$H$^ha$gd:&$ & 0` P@h1$7$8$H$^ha$gd'2V%$ & F & 0` P@1$7$8$H$a$gd:"$ & 0` P@1$7$8$H$a$gd7 CCDDDYD[D\D]DDDEM?M@MIMTMMg%$ & F & 0` P@1$7$8$H$a$gd7&$ & 0` P@h1$7$8$H$^ha$gd7&$ & 0` P@h1$7$8$H$^ha$gd:&$ & 0` P@v1$7$8$H$^va$gd`^ KKKKL LL'L)LvLwLLLLLM?M@MAMHMIMTMsMMMMMMMM2NfNjNNü~sg_hWOJQJhRh:6OJQJhhOJQJh6OJQJhOJQJhS{4OJQJh:OJQJh:6OJQJh7hTOOOJQJh`x]OJQJ hJh! h0h`^h2Fh`^0Jjh`^Uh`^h`^H*h+h+6h+ h`^h`^h`^ h`^6#MMMMfNgNNNNNNk%$ & F & 0` P@1$7$8$H$a$gd7"$ & 0` P@1$7$8$H$a$gd7&$ & 0` P@01$7$8$H$^0a$gd:&$ & 0` P@h1$7$8$H$^ha$gd: NNNNNNNNNNN*O,O-OiOjOOOPPPPPPQSQĸxldXdLdDhh2OJQJhqh:6OJQJhh:6OJQJh:OJQJh @Dh:6OJQJh:6OJQJh:hOJQJh2Fh0JOJQJhhOJQJhOJQJjhOJQJUhh:5OJQJh'2V5OJQJ hJh7hTOOOJQJ hJh:hS{4hWOJQJhS{4OJQJhS{46OJQJNkOOOPlPmPPPQQuQvQh&$ & 0` P@h1$7$8$H$^ha$gd!$$ #  P@1$7$8$H$^a$gdh2&$ & 0` P@h1$7$8$H$^ha$gd:&$ & 0` P@h1$7$8$H$^ha$gd SQcQtQuQvQQQQQQQQQQQQQQQQQWRXRYRoRRRRRRR+S5SASBS]SĽ|wsokgsc^c h N6hthe8h*h>h! h!6 h:h Nh:h2Fh N0J h Nh Nh Njh NU h:5h Nh:5 h'2V5hTOOOJQJ hJh7h0h056OJQJh05OJQJh:OJQJhh2h0OJQJhh2OJQJhh26OJQJ#vQQQQQQQXRYRoRRRg&$ & 0` P@h1$7$8$H$^ha$gd N%$ & F & 0` P@1$7$8$H$a$gd7&$ & 0` P@h1$7$8$H$^ha$gd7&$ & 0` P@h1$7$8$H$^ha$gd! RASBSTTTTUUUUi%$ & F & 0` P@1$7$8$H$a$gd7&$ & 0` P@h1$7$8$H$^ha$gd!d-DM gdtd-DM ^gd&$ & 0` P@1$7$8$H$^a$gdt ]SST^TTTTT U UUYU[U\UUUUUUUUUUUUUUUUUUVʺòymdYPh!6OJQJh`x]h`x]OJQJh`x]6OJQJh0h05OJQJh05OJQJh0OJQJh$<OJQJhS{46OJQJhS{4OJQJ hJh7h!OJQJh!h!6h2FhS{40J hS{4hS{4jhS{4U hS{46hS{4hht6B*phhthtB*phhththt6UUUUUUUVkE&$ & 0` P@h1$7$8$H$^ha$gd!%$ & F & 0` P@1$7$8$H$a$gd`x]&$ & 0` P@h1$7$8$H$^ha$gd7&$ & 0` P@h1$7$8$H$^ha$gd#"$ & 0` P@1$7$8$H$a$gdS{4VVVHVLVMVNVOV_V`VaVcVdVfVgViVjVmVnVhyjhyUh0h05OJQJh05OJQJh0OJQJhOJQJh!OJQJh76OJQJVNVOV`VbVcVeVfVhViVkVlVmVnVgd_&$ & 0` P@h1$7$8$H$^ha$gd! .:p7/ =!"#$% DyK yK Zhttp://ec.europa.eu/justice/data-protection/oDyK yK http://www.whitehouse.gov/the-press-office/2015/01/13/securing-cyberspace-president-obama-announces-new-cybersecurity-legislatDyK yK Fhttp://www.aboutthedata.com/portalDyK  yK http://docs.oracle.com/cd/B28359_01/datamine.111/b28129/process.htm DMCON002DyK yK dhttps://www.linkedin.com/pub/lee-peeler/20/78/5b0 DyK yK https://d1ovv0c9tw0h0c.cloudfront.net/files/2014/06/USA-FREEDOM-CDT-sum.pdfDyK yK Xhttps://www.youtube.com/watch?v=paZgOC7Wqo0666666666vvvvvvvvv666666>6666666666666666666666666666666666666666666666666hH6666666666666666666666666666666666666666666666666666666666666666666666666662 0@P`p2( 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p8XV~_HmH nH sH tH @`@ NormalCJ_HaJmH sH tH DA D Default Paragraph FontRiR  Table Normal4 l4a (k (No List 44 _0Header  !6o6 _0 Header CharCJaJ4 4 _0Footer  !6o!6 _0 Footer CharCJaJ4U`14 t0 Hyperlink >*phFV`AF &Z0FollowedHyperlink >*B*phR^@RR H0 Normal (Web)dd[$\$CJOJQJaJB/aB Happle-converted-spacePK!pO[Content_Types].xmlj0Eжr(΢]yl#!MB;.n̨̽\A1&ҫ QWKvUbOX#&1`RT9<l#$>r `С-;c=1g~'}xPiB$IO1Êk9IcLHY<;*v7'aE\h>=^,*8q;^*4?Wq{nԉogAߤ>8f2*<")QHxK |]Zz)ӁMSm@\&>!7;wP3[EBU`1OC5VD Xa?p S4[NS28;Y[꫙,T1|n;+/ʕj\\,E:! t4.T̡ e1 }; [z^pl@ok0e g@GGHPXNT,مde|*YdT\Y䀰+(T7$ow2缂#G֛ʥ?q NK-/M,WgxFV/FQⷶO&ecx\QLW@H!+{[|{!KAi `cm2iU|Y+ ި [[vxrNE3pmR =Y04,!&0+WC܃@oOS2'Sٮ05$ɤ]pm3Ft GɄ-!y"ӉV . `עv,O.%вKasSƭvMz`3{9+e@eՔLy7W_XtlPK! ѐ'theme/theme/_rels/themeManager.xml.relsM 0wooӺ&݈Э5 6?$Q ,.aic21h:qm@RN;d`o7gK(M&$R(.1r'JЊT8V"AȻHu}|$b{P8g/]QAsم(#L[PK-!pO[Content_Types].xmlPK-!֧6 -_rels/.relsPK-!kytheme/theme/themeManager.xmlPK-!!Z!theme/theme/theme1.xmlPK-! ѐ'( theme/theme/_rels/themeManager.xml.relsPK]# nN  n+-4247;<@CF)IKNSQ]SVnV,/01468;>ACFHJLOQSVXk+-/63(4^6781:;=?BCFIGKMNvQRUVnV-.23579:<=?@BDEGIKMNPRTUWY%H&&&&&''('**4+`+++,,-.Y///0L023333'4S:::<\<<===>>?@(AAvDD>??c>?$@%@8@LBzB{BBC6CCCEEE3FwFFFFkGGGGHHHHI&ISIbIIWJ]KKKLLWLLLMMMMNN`NbNcNeNfNhNiNkNoN::::::::::::::::::::::::::::::::::::::::::::::::::: !Ĺi&Ezh^`OJQJo(hHh^`OJQJ^Jo(hHohp^p`OJQJo(hHh@ ^@ `OJQJo(hHh^`OJQJ^Jo(hHoh^`OJQJo(hHh^`OJQJo(hHh^`OJQJ^Jo(hHohP^P`OJQJo(hH^`o(. ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.i&                    N_M.9":t.9!MKWR.9LVl"[:t1}z:t0$<>K. HJ Y  / c6i y#($f$l'l,8b-%/pR/0h2<4S{4<5{71];h @@yL@A0Au3C{DE-SEyOF H NTOO,QBSV'2V&ZpG\`x]`^km^"Q_T_L`Vb cSdAj hk|yl>{miotgwCx+oR|&C(qy_$-k*mT*Se54e855Y8p#K:$[Oo$Ka7:B Ufw!.`NbN@ 1z nN@Unknown G*Ax Times New Roman5Symbol3 *Cx ArialkTimesNewRomanPSMTTimes New Roman;[xPHelvetica3Times? *Cx Courier New;WingdingsA$BCambria Math h021Gz1s1go B ( B (A%48N8N J#q?lQ2 ,2PUBP 720: Managerial Economics and Policy AnalysisSiona ListokinSiona   Oh+'0P   0< ` l x '4PUBP 720: Managerial Economics and Policy AnalysisSiona Listokin Normal.dotmSiona30Microsoft Macintosh Word@ZÎ@T70@`b)@lg0  BGPICTb HHb bHH|bbNww{ss{s{s{w{{s{{ww{{{k1ZF1s1Nswg9=RVBZZRBF1NswRJRF1ZVR^RF1s1ZVJRNsF1RNsZVVc^VJRNsRF1NsZg9O{w{{{w{w{w{ww{ww^w{w{w{s^{ g9cg9ckZw^g9g9kZ wg9so{^wo{ws{޷-kZkZwsg9s{{o{kZc{g9o{cco{o{{+o{g9g9c kZwo{g9skZsg9g9^g9s#s{wwwww/g9^ZRV^Zg9o{ZZVZg9g9NsZVVkZ-{{{{{{{Ag9g9^^g9kZ^^cc^g9ZkZsc^^Zg9g9c^^csg9Zs0ws{wo{wsw{wso{g9wsw{/kZZ^kZkZ{^kZ ckZg9o{^o{Zcco{1wo{skZo{{so{kZo{kZo{o{sskZo{wo{ww+kZ^wsw{o{co{kZwo{kZo{kZg9g9o{+o{kZc^g9{o{kZo{cskZsskZwsg9 sg9g9wwso{{{w{o{o{{wo{wkZ{o{ww{wwkZw{ww{s{wwso{w so{w{{o{o{{w{{wo{{ws{wo{sCo{^o{^co{g9c^^wkZccZZco{o{wcc^s^ZkZg9o{cZVg9^ZcZ^o{o{kZ^o{ZV^cskZ^^g9^Zg9kZV^^ZcckZo{skZco{Yww{sw{w{{ww{o{w{w{{C^NsZo{^cRVZkZNs^ZNsg9Zo{RVRVNsZg9ZkZVVRNswVVRkZR^kZZNs^kZRZZV^cZVZ{RRVRVVkZVRZZRo{RVkZ/{{www{wsg9kZg9^Z^c^kZw{swswwswTskZww{wwkZwswso{ss{wo{wso{ss{sww{o{wo{{o{swo{wUo{o{c^w^g9cg9^kZscZo{skZccZg9^c^g9c^g9^^kZc^Zcg9s {w{{{w/g9VZ^VZRZRo{VkZR^g9kZVV^^o{kZ^kZg9kZo{g9o{g9VkZs ^g9Zcso{g9Zccg9c.wo{kZg9cg9^c{o{o{kZccZg9ckZo{VkZkZ{^g9kZsccg9wo{^^g9^cw{sg9ZZo{{{so{s{o{o{wws{wsswsw{wswswso{w{{wsswssso{sw{kZsw{{so{wssw{{sswo{ kZskZkZo{c{so{g9o{4{kZw{g9kZs{o{o{kZo{o{g9o{o{wso{co{g9{kZsckZo{g9o{kZsg9o{cskZo{o{skZo{kZskZg9o{kZo{w)o{g9kZo{kZg9kZZkZwwo{g9skZZ{g9ssg9kZkZw^ZkZo{ZckZkZwwkZkZg9s{kZo{kZZg9kZg9co{kZg9g9o{o{ckZswkZg9o{o{ww{wwo{{w{g9s{{o{kZsw{w{so{{sw{w{o{ww{{w{sw{wws{{ws{o{o{{swwo{!kZg9cc^ZwVZ^cc^c^{kZZo{cc^cg9{cs^c^^kZwcwV^o{cc^co{^ZZ{Vc^ cwco{^^co{ZZkZ{{o{{{ws{{{{s{{w{{s{o{{{{ww{wwso{ww{{{sc^^ZZVcZVw^V^Vo{g9^g9Z/o{kZV^wkZZVZZcZZ^ZNskZo{cV{ZZVZccsg9^VVRZ^sg9g9sg9^ZVVVg9_{{{{{{w{{{{w{ww{ww g9^VRZcVVZVRZRZ^Zg9VsZwg9ZVZ"^^g9ZVo{o{ZVo{o{ZZVZccRVw^^ZcVg9^VZZ^kZO{o{{{{sw{kZw{{s{{{kZg9^g9g9kZ*g9o{c^kZcg9g9sc^c^cg9g9kZ{ccg9cg9ccg9g9s^g9g9g9co{o{cckZcg9^kZco{g9g9kZZg9cg9wg9g9wo{s$o{{wo{so{so{o{sw{so{wo{g9o{so{kZskZo{o{ss{{o{so{s{s {sskZsso{s{g9o{s{s{o{sskZg9o{o{wwkZkZ{o{o{sg9w{o{o{kZo{o{kZo{o{so{wo{{wkZo{o{kZswso{g9o{skZo{skZso{o{so{wsg9o{kZwsg9kZg97ssg9c{kZ^g9g9o{wg9o{{cg9cg9o{{cg9ssg9ckZsskZo{g9g9^sg9g9kZg9kZco{ckZg9kZo{wg9kZ{o{g9o{@{ww{sw{o{{s{wo{{kZ{o{ww{sww{Ag9V^VZkZg9kZZc^o{^ckZ^^sZVZo{ckZc^kZ{{{޲;ww{{{{w{{{kZkZ^g9g9^8Zw^wcg9cZ^ZRw^o{Z^^Z^Vcco{cZ^^g9ccRo{^wcZZg9o{Zo{V^wZZcg9o{Zs^^c^^Zg9_{{{{{wkZ{s{w{{{{{{{{{{ws{0kZg9^wc^kZkZ^o{scZg9{g9g9c^w^kZkZ^g9cckZg9^cwg9^cg9cg9^kZg9{cg9kZskZg9kZg9 ^kZcwg9o{^g9kZ^g9kZ{o{{o{wo{s{o{o{kZo{g9so{wo{wssg9so{so{o{o{{so{s kZo{ss{o{o{wsso{o{so{ so{o{so{o{so{ckZ{kZg9o{{o{o{w{wo{g9{o{o{so{s{co{sso{so{s{kZwkZo{sso{kZso{o{so{sskZwscsg9o{kZo{s g9kZo{swsso{ss sscg9ckZo{sg9kZ{g9o{cg9c{g9kZg9ckZwg9g9kZg9kZg9g9{^g9skZg9kZo{g9cg9{g9g9kZkZo{scg9ckZo{g9Zg9s{{s{{s{{wws{ ssws{{s{s{s{{ssg9w{{kZ{{{s{ww{&g9^VZg9kZZkZV^ZZ^^Vg9kZ^VZVZ^Vo{Zo{Zco{sg9o{o{RVsV^Zo{Zco{cZg9Z^cs^g9^o{cZVZZ^o{cVVs@wswwwww{sswwsccZRVc{VZcZVRZZVsRVkZV*o{ZVZVRZVg9^ckZZo{ZRsR^^RZVVZo{ZkZkZRckZRZscZVZVo{ZkZ({ww{{{QcZ^o{kZZ^Zg9skZc^cg9ZcVcskZVcZ^ccVg9Zcg9V^cI{w{w{{w{w{ww{ww{w g9{w{w{ww{w{Wo{sswkZg9s{s{ss{{w {swo{swswwo{ws{w{o{wwsw\(wg9g9kZsg9cwo{sscg9o{skZcsg9ssg9cwg9ZZco{g9g9csg9o{skZkZg9o{g9w{s'g9cRVRVVkZg9VR^RVZs1kZg9kZkZ^kZg9kZg9g9kZ{{{{Og9VwV^o{cckZckZVckZkZc{kZ^cVZcsZg9^g9^sZZkZckZMwswssw{ww{w{w{wwsww{{w{w{w{w{wg9o{o{ssg9so{o{ss{o{skZwwo{g9{wsscskZo{sso{wo{so{so{so{o{wsg9so{s{s{kZo{kZkZswsswso{w} {o{g9kZsg9kZsg9cg9{g9kZkZccg9g9o{g9c kZ{kZwg9g9o{g9g9kZg9o{sg9co{kZckZ^kZkZskZsco{s3w{s{s{ {s{{so{{s{{3Z^ZZ^^Z o{^Vc^VZ^g9g9^^ZcSw{{{s{{{{{w{{{+cg9^VR^ZZRcRZwkZZV^cwo{Zo{RRkZVc^R^o{^ZVkZZVZ V^Zg9ZZg9^VZ^^ZZg9;{{{{{{s{{kZ<c^kZcg9kZcg9g9co{kZc^o{cco{g9kZo{ccg9kZc1o{sso{o{s wsso{o{wwso{s{so{no{o{o{sskZswkZ{wwsw{wo{wo{sw{so{wo{wsso{kZw {w{{wo{kZsw{sw}!s^^g9ccg9scg9kZ^Zcsg9^^g9kZkZ^cc^c^cZo{^Zc^sc^kZcV^cg9w^^skZo{^Z^scZQww{{{ {{{{{{{{{ cg9cVZ^Zco{c^V^ZskZZ^Vcs^kZ^^Z^kZ^ZZkZcg9ZsZcc^o{^g9o{kZkZcZR^sZo{kZVg9g{w{s{ {g9{{w{w{w{w{{{{w{{{{{{{{{GZ^^kZ^c^ccZc^o{g9ZckZZ^g9^g9kZkZc^c^^cs.wsw{w{wswwg9ww{ws ՜.+,D՜.+,` hp|  '(8N 3PUBP 720: Managerial Economics and Policy Analysis Titlep  8@ _PID_HLINKS'A( r]6Ahttp://blog.okcupid.com/index.php/we-experiment-on-human-beings/k3 http://www.cs.umd.edu/~golbeck/0=https://www.linkedin.com/pub/christopher-rasmussen/4/84b/a03Y8-\http://www.ebaymainstreet.com/sites/default/files/PayPal-Payment-Regulations-Booklet-US.pdf5*Xhttp://www.aspeninstitute.org/about/blog/social-media-dangerous-force-against-democracyC}'0http://www.rit.edu/cla/philosophy/Selinger.html\"$,https://www.youtube.com/watch?v=paZgOC7Wqo0v!Lhttps://d1ovv0c9tw0h0c.cloudfront.net/files/2014/06/USA-FREEDOM-CDT-sum.pdf='https://www.linkedin.com/in/rbensperryi@2https://www.linkedin.com/pub/lee-peeler/20/78/5b0Eihttp://e-pluribusunum.com/2014/01/16/what-next-for-net-neutrality-reclassification-or-a-tiered-internet/P-https://www.linkedin.com/in/alexanderbhoward0`Dhttp://docs.oracle.com/cd/B28359_01/datamine.111/b28129/process.htm DMCON002;0#http://www.aboutthedata.com/portal1 2https://www.linkedin.com/profile/view?id=29967695o) http://www.whitehouse.gov/the-press-office/2015/01/13/securing-cyberspace-president-obama-announces-new-cybersecurity-legislatR-http://ec.europa.eu/justice/data-protection/T~https://twitter.com/privacyPIhttps://support.twitter.com/articles/215585-getting-started-with-twitter  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ\]^_`abdefghijklmnopqrstuvwxyz|}~Root Entry FKh0Data [1Tablec.WordDocument0SummaryInformation({DocumentSummaryInformation8CompObj` F Microsoft Word 97-2004 DocumentNB6WWord.Document.8