![]() |
![]() |
The George Washington University Marvin Center
800 21st St NW
Washington, D.C. 20052
Thursday, June 2, 2016
|
|
8:30 AM // Breakfast |
Grand Ballroom |
9:00 AM // Welcoming Remarks |
|
9:15 AM – 10:30 AM // Workshop 1 |
|
Performative Privacy, by Scott Skinner-Thompson, New York University School of Law. Comment by Peter Winn | 301 |
Engineering Humans with Contracts, by Brett Frischmann, Cardozo Law; Evan Selinger, RIT. Comment by Lauren Henry Scholz | 302 |
Designing Privacy Policies, by Ari Waldman, New York Law School. Comment by Bill McGeveran | 307 |
Cost-Benefit Analysis, Precautionary Principles, and Counterterrorism Surveillance, by Katherine Strandburg, NYU School of Law. Comment by Irina Manta | 405 |
Another Shot at Technological Exceptionalism: Legal Constructions of Novelty from Brownies to Drones, by Meg Jones, Georgetown University. Comment by Dan Bouk | 310 |
The Internet of Bodies, by Andrea Matwyshyn, Northeastern/Princeton/Stanford. Comment by Jay Kesan | 403 |
Algorithms and the Law, by Deven Desai, Georgia Institute of Technology, Scheller College of Business; Joshua Kroll, Center for Information Technology Policy, Princeton. Comment by Christo Wilson | 407 |
Critical Data Theory, by Margaret Hu, Washington and Lee School of Law. Comment by Kate Crawford | 402-404 |
The Privacy Policymaking of State Attorneys General, by Danielle Citron, University of Maryland School of Law. Comment by Julie Brill | Continental Ballroom |
11:00 AM – 12:15 PM // Workshop 2 |
|
PrIncipedia: A Privacy Incidents Encyclopedia, by Jessica Staddon, N. C. State; Heather Lipford, UNCC; Bart Knijnenburg, Clemson University. Comment by Anne Washington | 302 |
In the Public Interest – The Privacy Implications of International Business-to-Business Sharing of Cyber-Threat Intelligence, by Clare Sullivan, Law Center, Georgetown University; Eric Burger, Dept Computer Science, Georgetown University. Comment by Alvaro Bedoya | 307 |
UnMarginalizing Workers: How Big Data Drives Lower Wages and How Reframing Labor Law Can Restore Information Parity and Equality in the Workplace, by Nathan Newman, Data Justice. Comment by Peter Swire | 405 |
“I’ll See”: How Surveillance Undermines Privacy By Eroding Trust, by Robert Sloan, Computer Science, UIC; Richard Warner, Chicago-Kent College of Law. Comment by Jocelyn Aqua | 310 |
Technical Standards and Privacy Law, by Aaron Massey, University of Maryland, Baltimore County. Comment by Tara Whalen. | 403 |
The Declining Significance of Home: Privacy “Whilst Quiet” and of No Use to Artists or Anyone, by Anita Allen, University of Pennsylvania. Comment by Danielle Citron | 407 |
Privacy of Public Data, by Kirsten Martin, George Washington University; Helen Nissenbaum, New York University. Comment by Felix Wu | 402-404 |
Privacy and Data Security Harms, by Daniel Solove, GW Law School; Danielle Citron, U. Maryland Law School. Comment by Joel Reidenberg | Continental Ballroom |
12:15 PM – 2:00 PM // Lunch(There is no keynote this year.) |
Grand Ballroom |
2:00 PM – 3:15 PM // Workshop 3 |
|
Policy Recommendations for Use of Learning Analytics in Higher Education, by Alan Rubel, University of Wisconsin-Madison; Kyle Jones, University of Wisconsin-Madison. Comment by Elana Zeide |
308 |
Privacy in Service-Oriented Architectures Or Privacy After the Agile Turn, by Seda Gürses, Princeton; Joris Van Hoboken, NYU. Comment by Deborah Hurley |
301 |
Plausible Cause, by Kiel Brennan-Marquez, New York University. Comment by Andrew Ferguson |
302 |
Knowledge and Fourth Amendment Privacy, by Matthew Tokson, Salmon P. Chase College of Law, Northern Kentucky University. Comment by Bryan Choi |
307 |
The Value of Respect: Reclaiming the Philosophical and Political Foundations of Informed Consent, by Elaine Sedenberg, UC Berkeley School of Information; Anna Lauren Hoffmann, UC Berkeley School of Information. Comment by Luke Stark |
405 |
Privacy as Europe’s First Amendment, by Bilyana Petkova, EUI. Comment by Samantha Barbas |
310 |
“Proof of Work”: Learning from Computer Scientific Approaches to Desirable Inefficiency, by Paul Ohm, Georgetown University Law Center; Jonathan Frankle, Georgetown University Law Center. Comment by Arvind Narayan |
403 |
Limitless Worker Surveillance, by Ifeoma Ajunwa, University of the District of Columbia; Kate Crawford, Microsoft Research; Jason Schultz, NYU Law School. Comment by Cheryl Brown |
407 |
Bridging the Gap between Computer Science and Legal Approaches to Privacy, by Kobbi Nissim, Center for Research on Computation and Society (Harvard University); Aaron Bembenek; Alexandra Wood, Berkman Center for Internet & Society; Mark Bun, Marco Gaboardi, Urs Gasser, David R. O’Brien, Thomas Steinke, and Salil Vadhan. Comment by Jody Blanke |
402-404 |
Who Benefits From Targeted Advertising?, by Veronica Marotta, CMU; Kaifu Zhang, CMU; Alessandro Acquisti, CMU. Comment by Andrew Odlyzko |
Continental Ballroom |
3:30 PM – 4:45 PM // Workshop 4 |
|
Regulatory Data Mandates and Administrative Searches, by Gautam Hans, Center for Democracy & Technology. Comment by Meg Young | 301 |
Online Price Discrimination and EU Data Privacy Law, by Frederik Zuiderveen Borgesius & Joost Poort, IViR Institute for Information Law, Amsterdam. Comment by Andrew Selbst | 302 |
“If these Canadians lived in the United States, how would they protect their privacy? The Functional Equivalence of Privacy Redress Mechanisms in Canada and the US,” by Priscilla Regan, George Mason University; Colin Bennett, University of Victoria, BC; Robin M. Bayley, Linden Consulting. Comment by Bob Gellman | 307 |
Privacy, The Philosopher’s Stone, and the Delusions of ‘Balancing,’ by James Rule, UC Berkeley Law. Comment by Seda Gurses | 405 |
Measuring Privacy Control and Risk from the Users Perspective, by Masooda Bashir, UIUC; Hsiao-Ying Huang, UIUC. Comment by Pam Dixon | 310 |
The Effect of Legislation on Fourth Amendment Protection, by Orin Kerr, George Washington University Law School. Comment by Catherine Crump | 403 |
Privacy at Work: How Customer Tracking Implicates Workers, by Karen Levy, Cornell University / Data & Society Research Institute; Solon Barocas, Princeton University/Data & Society Research Institute. Comment by Mara Einstein | 407 |
Taming the Golem: Challenges of Ethical Algorithmic Decision Making, by Omer Tene, IAPP; Jules Polonetsky, FPF. Comment by Joseph Turow | 402-404 |
The Reputation Engine, by Julie Cohen, Georgetown Law. Comment by Gordon Hull | Continental Ballroom |
6:00 PM // ReceptionBoth the reception and dinner will be at Sequoia Restaurant 6:45 PM // DinnerTo change things up, we’ll have several buffets and a mixed seating/standing format so that participants can mingle more easily. |
Sequoia Restaurant |
Friday, June 3, 2016
|
|
8:30 AM // Breakfast |
Grand Ballroom |
9:00 AM – 10:15 AM // Workshop 5 |
|
The Upside of Monopolies in Data Privacy Law, by Ignacio Cofone, Yale Law School; Klaus Heine, Erasmus University. Comment by Siona Listokin | 301 |
Where is the harm in a privacy violation? Calculating the damages afforded in privacy cases by the European Court of Human Rights, by Bart Van der Sloot, Institute for Information Law, University of Amsterdam. Comment by Gerald Stegmaier | 302 |
Big Brother is Nudging You – Fundamental Rights and Democratic Principles in the Context of Nudging Strategies, by Eva Beyvers, DFG Research Training Group “Privacy”, University of Passau; Henning Hofmann, DFG Research Training Group “Privacy”, University of Passau. Comment by Anna Slomovic | 307 |
Redefining Cybersecurity, by David Thaw, University of Pittsburgh. Comment by Serge Egelman | 405 |
Privacy Crimes, by Bryce Newell, Tilburg Institute for Law, Technology, and Society (TILT); Bert-Jaap Koops, Tilburg Institute for Law, Technology, and Society (TILT); Ivan Škorvánek, Tilburg Institute for Law, Technology, and Society (TILT); Andrew Roberts, Melbourne Law School, University of Melbourne (Australia); Maša Galič, Tilburg Institute for Law, Technology, and Society (TILT); Tomislav Chokrevski, Tilburg Institute for Law, Technology, and Society (TILT). Comment by Mary Leary | 310 |
Privacy and Court Records: Online Access and the Loss of Practical Obscurity, by David Ardia, UNC School of Law. Comment by Robert Deyling | 403 |
An Expressive Theory of Privacy Intrusions, by Craig Konnoth. Comment by Laura Donohue | 407 |
Privacy’s Blueprint: The Battle to Control the Design of New Technologies, by Woodrow Hartzog, Samford University’s Cumberland School of Law. Comment by Lorrie Cranor | 402-404 |
Privacy and the Future of the Cloud, by Neil Richards, Washington University Law. Comment by Ed McNicholas | Continental Ballroom |
10:45 AM – 12:00 PM // Workshop 6 |
|
CalECPA: Putting Communications Privacy Law Reform in Context, by Susan Freiwald, USF School of Law. Comment by Ron Lee | 308 |
News Readers’ Privacy and Fair Algorithmic Media Practices: Lessons to be Learned from Media Law and Theory, by Natali Helberger, UvA. Comment by Jasmine McNeal | 301 |
The Hidden Human Rights Curriculum of Surveillance Cameras in Schools, by Michael Birnhack, Tel Aviv University; Lotem Perry-Hazan, Haifa University. Comment by Chris Conley | 302 |
A User-Centered Perspective on Algorithmic Personalization, by Alethea Lange, Center for Democracy & Technology; Rena Coen, University of California, Berkeley School of Information; Emily Paul, University of California, Berkeley School of Information; Pavel Vanessa, University of California, Berkeley School of Information; Gautam Hans, Center for Democracy & Technology. Comment by Jeff Jonas | 307 |
OWNED: How the Internet of Things Took Our Property and Privacy (Chapter 5: “Private Property”), by Joshua Fairfield, Washington & Lee University School of Law. Comment by Edina Harbinja | 405 |
Privacy Restrictions and Contextual Harm: A Contribution to Social Theories of Privacy, by Mark MacCarthy, Georgetown University. Comment by Arnold Roosndaal | 310 |
The Credentialing Effect: Psychological Implications of Ubiquitous Capture and Constant Assessment, by Elana Zeide, New York University. Comment by Dawn Schrader | 403 |
Cybersecurity and Internet Stewardship, by Jeffrey Vagle, University of Pennsylvania Law School. Comment by Deirdre Mulligan | 407 |
The Class Differential in Privacy Vulnerability, by Mary Madden, Data & Society Research Institute; Michele Gilman, University of Baltimore; Karen Levy, Cornell University; Alice Marwick, Fordham University. Comment by Seeta Gangadharan | 402-404 |
(Encore) Privacy and Data Security Harms, by Daniel Solove, GW Law School; Danielle Citron, U. Maryland Law School. Comment by Will DeVries | Continental Ballroom |
12:00 PM – 1:15 PM // Lunch |
Grand Ballroom |
1:15 PM – 2:30 PM // Workshop 7 |
|
“Substantial Injury” in Information Security Incidents After LabMD, by Reed Rubinstein, Dinsmore; Jon Neiditz, Kilpatrick Townsend. Comment by Ryan Calo | 302 |
Does Rejection of the Third Party Doctrine Change Use of Electronic Surveillance? Evidence from the Wiretap Reports, by Anne Boustead, Pardee RAND Graduate School. Comment by Brian Owsley | 307 |
Smart Homes Strike Back: A New Hope for the Fourth Amendment, by Joseph Jerome, WilmerHale; Stacey Gray, Future of Privacy Forum. Comment by Jay Stanley | 405 |
A Defense of Privacy as the Central Value Protected by the Fourth Amendment’s Prohibition on Unreasonable Searches, by Christopher Slobogin, Vanderbilt. Comment by Amitai Etzioni | 310 |
“Nobody sees it, nobody gets mad”: Social Media, Privacy, and Personal Responsibility Among Low-SES Youth, by Alice Marwick, Fordham University; Claire Fontaine, Data & Society; Danah Boyd, Data & Society. Comment by Yang Wang | 403 |
Privacy and the Right to Record, by Margot Kaminski, The Ohio State University Moritz College of Law. Comment by Heather Shoenberger | 407 |
Notice After Notice-and-Consent, by Daniel Susser, NYU Information Law Institute. Comment by David Medine | 402-404 |
(Encore) What is Private about ‘Public’ Data?, by Kirsten Martin, George Washington University; Helen Nissenbaum, New York University. Comment by David Gray | Continental Ballroom |
3:00 PM– 4:15 PM // Workshop 8 |
|
Privacy and Remote Sensing Satellites, by Juan Gonzalez Allonca, Universidad de Buenos Aires. Comment by Khaliah Barnes | 301 |
Saving Face: The Screen of Chinese Privacy Law Unfolds, by Jill Bronfman, University of California Hastings College of the Law. Comment by Malavika Jayaram | 302 |
Quantifying Criminal Procedure: How to Unlock the Potential of Big Data in our Criminal Justice System, by Ric Simmons, Moritz College of Law The Ohio State University. Comment by Judge Stephen Smith | 307 |
Platforms and the Privacy Ecosystem: The Construction of Privacy in iOS and Android Development, by Daniel Greene, University of Maryland; Katie Shilton, University of Maryland. Comment by Michael Zimmer | 405 |
Privacy and Accountability in Black-Box Medicine, by Roger Ford, University of New Hampshire School of Law; W. Nicholson Price II, University of Michigan School of Law. Comment by Maya Bernstein | 310 |
Cross-Context Tracking, Cross-Device Tracking, and a Market Definition Test for What Constitutes a Privacy Context, by Peter Swire, GA Tech; Justin Hemmings, GA Tech. Comment by James Grimmelmann | 403 |
Privacy and Power: The Rule of Law in the Information State, by Lisa Austin, University of Toronto Faculty of Law. Comment by Alan Rubel | 407 |
Building Privacy into the Infrastructure: Towards a New Identity Management Architecture, by A. Michael Froomkin, U Miami School of Law. Comment by David Thaw | 402-404 |
Data Driven Discrimination at Work, by Pauline Kim, Washington University School of Law. Comment by Danah Boyd | Continental Ballroom |