Skip to content
Cornell University School of Continuing Education and Summer Sessions

Cornell University Institute for Internet Culture, Policy, and Law (ICPL)

September 15-17, 2015

Program sessions

Technology: Higher Ed Threat and Opportunity

Doug Lederman

Silicon Valley investors and some pundits and policymakers portray technology either as higher education's savior or as the force that will rightfully bulldoze it into submission. Many faculty members fear it will eliminate their jobs or diminish academic quality beyond repair. The truth is likely somewhere in between—but it's beyond dispute that technology is already influencing institutional business models, the role(s) of faculty members (and how they are compensated), federal law and policy, and the nature of the "campus," physical and otherwise. Lederman will address these and several other related issues.

University Librarians and Chief Information Officers: Partners or Competitors?

Anne Kenney

Technology, digital access, globalization, new approaches to research, teaching and learning, and economic challenges have all contributed to the blurring of lines between libraries and IT organizations on campuses. In some cases the two divisions have been consolidated, reporting variously to the university librarian or the CIO. On some campuses the two compete for dwindling resources and positions of power as the academy becomes more heavily invested in a digital knowledge infrastructure. Much rarer is the circumstance whereby the senior leadership of both have joined forces to position their universities to succeed in the digital age. This presentation will focus on points of intersection, duplication, commonality, and divergence between the library and IT organization and suggest areas where the two can benefit from closer collaboration.

Analytics and Privacy

Clifford Lynch

Lynch will focus on two particular case studies, the first on reading analytics with an emphasis on higher education settings (rather than mass consumer markets) and the second on academic performance analytics. He'll also explore the bridges between the two areas represented by e-textbooks, and records of the use of libraries and library resources.

Copyright in the Digital Age

Steve McDonald

Why may I lend a book to a friend, but not my Kindle? Why may I bequeath my collection of records to a favored beneficiary, but not my iPod? Why is it illegal to unlock my smart phone? Why are reserve rooms safe, and e-reserves not? Why am I threatened if I want to use generic printer toner cartridges or a substitute garage door opener? Copyright! In this session, we'll take a look at why and how copyright law is being made to do things that seem well beyond the traditional conception.

ICPL through the Years

Bob Hamilton, Marjorie Hodges Shaw, David Post, Steve Worona

In recognition of the twentieth anniversary of ICPL, we're bringing back co-founders Margie Hodges Shaw and Steve Worona, plus two other speakers whose association with the annual conference goes back to those early years. They will speak about what has and hasn't changed over the past twenty years, what lessons we can learn from our successes and failures, and how campuses should plan to meet the new challenges posed by computer and network technologies.

What's Past is Prologue

Bob Hamilton, Marjorie Hodges Shaw, David Post, Steve Worona

Shakespeare said, "What's past is prologue"—and ICPL's prologue started in 1995 when Cornell's Computer Policy and Law Program opened for business. Even though Facebook and Napster and JuicyCampus were many years in the future, campuses were already struggling to develop workable policies for intellectual property, privacy, acceptable use, online civility, collaboration with law enforcement, pending legislation, harassment, and plagiarism. Sound familiar?

Where’s the Perimeter? Emerging Technology Threats to Security and Privacy

Anne Manning, David Sherry

Technology is rapidly changing in its capability and its use, and emerging technologies provide both promise and threat. In this session we will examine how new technologies are impacting security, privacy, and reputation in higher education and how risk management and security programs are working to address the threats they create. How can we foster a sense of shared responsibility within our communities for the role we each play in this evolving environment?

Federal Technology Policy Issues

Dipayan Ghosh

A White House liaison for the drafting of the landmark Polis-Messer Student Data Privacy Bill in Congress, Ghosh will talk about a number of technology policy issues that he has worked on at the federal level, including consumer privacy, Internet policy, and big data.

Policy and Law in Software Development: A Practitioner's Perspective

Ben Cole

How do law and policy play into the process of software development? In this talk, Cole will speak from his time as a product manager and data scientist at Google, Facebook, and Kickstarter. He will address how these different companies have viewed privacy over the years, his experience grappling with legal implications of product development, and the natural tension between regulation and innovation.