Year: 2012
-
Broken Ballots
A important new book has just been published on the technology and policy of elections. Broken Ballots: Will Your Vote Count by Douglas W. Jones and Barbara Simons, covers voting systems from the 19th century to the present, with particular focus on the last two decades. The authors describe the strengths and weaknesses of the…
-
Contract hacking and community organizing
I discussed community discontent with copyright terms of some scholarly publishers, and I proposed an economic analysis. Now let’s consider two other approaches. Contract hacking I have published quite a few scholarly papers, and with each one I am invited to sign a copyright form. This is a contract between author and publisher, which which…
-
Modest Proposals for Academic Authors
In the scuffles over copyright policies on scholarly articles, what is the academic author to do? First, inform yourself. Find and read the copyright policy of the journals (or refereed conferences) to which you submit the articles describing research results. Find out the subscription price (dead-tree-edition or online) that the publisher charges individuals and institutions,…
-
Copyright in Scholarly Publishing, 2012 Edition
I’ve heard a lot recently about copyright policies of scholarly journals. Over 9000 researchers signed a pledge to boycott Elsevier, on three grounds: (1) high prices for journal subscriptions, (2) bundling practices for institutional subscriptions; (3) lobbying regarding SOPA, PIPA, and the Research Works Act. Meanwhile, other organizations such as the ACM (scholarly/professional society for…
-
The Latest in Nationwide Internet User Identification – Part 2 (the All-New, So-Called Federal Co-Conspirator Theory)
Since Part 1 in this series a few months ago, Plaintiffs have continued to file “pure bill of discovery” suits in Florida state court. These proceedings typically involve “John Does” who are accused of copyright infringement via peer-to-peer networks. The Plaintiffs (copyright-holders or their delegates) have continued to name as defendants in those “pure discovery”…
-
My Public Comments to the CA/Browser Forum Organizational Reform Working Group
Today, I submitted public comments to the CA/Browser Forum. CA/B Forum is an industry group started by Certificate Authorities — the companies that sell digital certificates to web sites so that your browser can encrypt your communications and can tell you whether it’s connecting to the genuine site. It is important that CAs do a…
-
Tech@FTC
Professor Ed Felten, while on loan to the Federal Trade Commission for 2011 and Spring 2012, has a new Tech Policy Blog, Tech@FTC. When he’s in his role as Chief Technologist of the FTC, he’ll blog there; when he’s wearing his regular hat as Professor of Computer Science and Director of the Center for Information…
-
Join Us at Princeton Tomorrow for "Copyright Cat-and-Mouse: New Developments in Online Enforcement"
Tomorrow afternoon, the Center for Information Technology Policy is hosting an event that looks at the state of online copyright enforcement and the policy perspectives of the parties involved. We’ve got a great lineup, with folks from the content industry, internet service providers, web companies, academics, and the press. Date: Tuesday, March 13, 2012 Time:…
-
Don't Upset the Intellectual Property Fashion Police
A student group at the University of Pennsylvania Law School has put together a fantastic symposium on the state of fashion law, but along the way they (allegedly) snagged themselves on Louis Vuitton’s trademarks. After creating a poster with a creative parody of the Louis Vuitton logo, they received a Cease & Desist letter from…