Successful innovation, which is essential to better health, safety and security, requires freedom to experiment and develop. But there is an array of government rules and processes that increasingly prohibit “permissionless” innovation.
3D Printing and Permissionless Innovation (Adam Thierer March 2016)Adam Thierer
presentation by Adam Thierer of the Mercatus Center at George Mason University. Made at Univ. of Minnesota Law School symposium on "Legal Concerns in 3D Printing" on March 4, 2016.
Hunter Moore created a revenge porn website called IsAnyoneUp that posted explicit photos of individuals without their consent, often ruining their lives. While his actions cultivated an online following, they also seriously harmed many victims. The document discusses the evolving concept of privacy throughout history with the development of new technologies, and examines related legal issues and protections around privacy between individuals and from government intrusion. It notes businesses like Google are pushing privacy boundaries with data collection and raises questions about expectations of privacy in the digital era.
Canadian Copyright Law, Technology and Cultural Management CAMT
The document provides an overview of copyright and the internet from the perspective of artists and copyright lawyers. It discusses how the internet can be used as a platform for promotion, income, and circumventing traditional career paths for artists. It also examines issues for copyright lawyers, such as balancing rights holders' interests with user access. Current Canadian copyright law and proposals for reform are reviewed, including debates around technological protection measures, safe harbors for internet service providers, and other challenges posed by new technologies.
The document discusses ethics and technology. It introduces some key concepts in ethics like cultural relativism and utilitarianism. It then discusses different views of technology, including technology as objects, knowledge, activities, and sociotechnical systems. It also examines patterns of technology adoption from initial optimism to concerns about social media and control of technology through law and regulation. Finally, it discusses issues like technological determinism, privacy, and how technology shapes communication, society, and democracy.
Bill Hulsey Patent Lawyer - Intellectual Property - Reasons for ProtectionBill Hulsey Lawyer
Bill Hulsey Patent Lawyer outlines reasons for and benefits from identifying and protecting intellectual property with patents, trade secrets, trade marks, and company policies.
Hacking away at Discrimination: Section 508 and Accessibility GuidelinesMichael Johnson
Presented at the “Issues in Computer Ethics: Practical and Theoretical” lecture series at St. John Fisher College in 2002.
Michael discusses the benefits of designing and building your websites using standards-based code to support accessibility and to adhere to Section 508 and Accessibility Guidelines. These measures are taken in development to insure equal opportunities and benefit to all users.
A Call to Patents:
A look at the current state of patents held by social media and technological companies.
The intellectual property of social media businesses has seen a rise in the acquisition of patents. For such a fast growing industry, will this “arming” of corporate enterprises and the verdict of one monstrous case determine what could be a legal onslaught within the technological industry?
3D Printing and Permissionless Innovation (Adam Thierer March 2016)Adam Thierer
presentation by Adam Thierer of the Mercatus Center at George Mason University. Made at Univ. of Minnesota Law School symposium on "Legal Concerns in 3D Printing" on March 4, 2016.
Hunter Moore created a revenge porn website called IsAnyoneUp that posted explicit photos of individuals without their consent, often ruining their lives. While his actions cultivated an online following, they also seriously harmed many victims. The document discusses the evolving concept of privacy throughout history with the development of new technologies, and examines related legal issues and protections around privacy between individuals and from government intrusion. It notes businesses like Google are pushing privacy boundaries with data collection and raises questions about expectations of privacy in the digital era.
Canadian Copyright Law, Technology and Cultural Management CAMT
The document provides an overview of copyright and the internet from the perspective of artists and copyright lawyers. It discusses how the internet can be used as a platform for promotion, income, and circumventing traditional career paths for artists. It also examines issues for copyright lawyers, such as balancing rights holders' interests with user access. Current Canadian copyright law and proposals for reform are reviewed, including debates around technological protection measures, safe harbors for internet service providers, and other challenges posed by new technologies.
The document discusses ethics and technology. It introduces some key concepts in ethics like cultural relativism and utilitarianism. It then discusses different views of technology, including technology as objects, knowledge, activities, and sociotechnical systems. It also examines patterns of technology adoption from initial optimism to concerns about social media and control of technology through law and regulation. Finally, it discusses issues like technological determinism, privacy, and how technology shapes communication, society, and democracy.
Bill Hulsey Patent Lawyer - Intellectual Property - Reasons for ProtectionBill Hulsey Lawyer
Bill Hulsey Patent Lawyer outlines reasons for and benefits from identifying and protecting intellectual property with patents, trade secrets, trade marks, and company policies.
Hacking away at Discrimination: Section 508 and Accessibility GuidelinesMichael Johnson
Presented at the “Issues in Computer Ethics: Practical and Theoretical” lecture series at St. John Fisher College in 2002.
Michael discusses the benefits of designing and building your websites using standards-based code to support accessibility and to adhere to Section 508 and Accessibility Guidelines. These measures are taken in development to insure equal opportunities and benefit to all users.
A Call to Patents:
A look at the current state of patents held by social media and technological companies.
The intellectual property of social media businesses has seen a rise in the acquisition of patents. For such a fast growing industry, will this “arming” of corporate enterprises and the verdict of one monstrous case determine what could be a legal onslaught within the technological industry?
The document outlines the schedule and content for a technology specialism course, including presentations by students on feature writing and issues in technology. It discusses different types of technology features such as analysis, profiles, and reviews. It provides guidance on researching and writing features, emphasizing focusing narrowly, using data and quotes to support points, and choosing anecdotes carefully. The document presents brief overviews of the issues of piracy and privacy in technology at the beginning of 2010, how new technologies have challenged business models and shifted piracy methods, and debates around enforcement versus new business models for piracy, and concerns with data collection, security and control for privacy.
What every product manager needs to know about online privacyTrevor Fox
This seminar will introduce the issue and describe the potential for new privacy laws in the US and in the EU that could affect the business model of social medial/Web 2.0/mobile app vendors.
Intellectual Property & User Rights in Digital EnvironmentCharles Mok
Charles Mok, a Legislative Councillor, discusses updating Hong Kong's Copyright Ordinance to balance freedom of expression, intellectual property rights, and access to information in the digital age. He proposes expanding exemptions for derivative works like parodies, remixes, and user-generated content. While copyright holders want to protect artists, netizens argue for more exemptions to spur creativity and uphold freedom of expression. The government proposes balancing stakeholder interests by focusing exemptions on activities responding to current events and limiting internet service provider liability. However, many questions remain around how to define exemptions and interpret "transformativeness". Mok calls for more public discussion on keeping copyright laws up-to-date and promoting an open copyright
The document discusses conditions that can result in disruptive innovation, including the need for survival, movement, immortality, competition, accumulated wealth, and lack of spiritual fulfillment. It also discusses qualities of disruptive innovators, such as being young, having active listening skills, embracing risk, seeing transfer potential, and projecting from the past. Finally, it lists some mini-trends of note, such as cognitive computing, remote sensing, synthetic biology, 3D printing, and augmented reality.
Legal and Ethical Issues Associated with Modern Technologiesemilyjmail
This document discusses legal and ethical issues related to implementing modern technologies. It introduces intellectual property, copyright, fair use, first sale, and privacy policies as important considerations. The document then explains what intellectual property and copyright are and discusses the rights of copyright owners. It defines fair use and first sale and explains what privacy policies are. The document notes opportunities for business owners when implementing new systems and stresses the importance of adhering to intellectual property laws and regulations to secure proprietary rights when using new technologies.
Digital Citizenship involves preparing users of technology for responsible use in a digital society. It encompasses several areas: ensuring digital access for all, appropriate digital communication, understanding digital commerce, developing digital literacy skills, maintaining digital security and abiding by digital laws. It also involves understanding digital rights and responsibilities, digital health and wellness issues, and practicing good digital etiquette. The goal is to educate all technology users so they can safely and ethically participate in an increasingly digital world.
the music industry has many problems, and , some would say, enemies. THis talk looks at some of these and summarises the outcomes to date of the "war on piracy". It also however foresees a newer threat - the algorithmic curation and , perhaps, creation, of popular music. Do we need new music and human musicians any more?
This is a lesson I created for an assignment in my EdTech program. It can be used in middle school & high school technology classes to introduce the basics of copyrights, and guidelines for reducing infringement on copyrighted material.
This document discusses various ethical, social, and political issues related to information systems. It provides examples of companies like Enron that misused information systems unethically. It presents models for analyzing the ripple effects of new technologies and how ethical analysis involves identifying facts, stakeholders, options, and consequences. The document also discusses principles that can guide ethical decisions, such as responsibility, accountability, and privacy rights. It emphasizes that as technology changes society rapidly, ethics are needed to make choices in legally gray areas.
The Digital Millennium Copyright Act (DMCA) is the main law governing copyright in digital media. Passed in 1998, the DMCA protects copyright holders by prohibiting the unauthorized distribution of copyrighted works online and implementing two World Intellectual Property Organization treaties. The DMCA contains five titles that address issues like online copyright infringement and computer program protection. It restricts activities like illegally sharing copyrighted music, movies, books, software, and video games without permission. While the DMCA protects copyright holders' rights, it also allows for limitations like fair use for educational purposes.
The Future of Innovation of Policy - Adam Thierer - Mercatus CenterAdam Thierer
An overview of the future of innovation policy and what governance vision will drive it -- the precautionary principle or permissionless innovation. (By Adam Thierer, Senior Research Fellow, Mercatus Center at George Mason University).
Capitol Hill Campus: Drones, Bitcoin, and 3-D Printing: Regulating Emerging T...Mercatus Center
This document discusses the concepts of "permissionless innovation" and the "precautionary principle" as approaches to new technologies. It argues that permissionless innovation, which allows open experimentation, is important for driving progress and should be applied to both digital and physical innovations. The precautionary principle of requiring technologies to be pre-approved can stifle innovation and entrepreneurship. The document uses examples like commercial drones, Bitcoin, and 3D printing to show how permissionless innovation could benefit those technologies by allowing open-ended development, while precautionary rules could hamper their potential. It concludes that adopting a permissionless approach offline as well as online can help create new opportunities.
This document discusses key issues related to privacy and the internet. It outlines different approaches to defining and protecting privacy, noting that privacy means different things to different people and cultures. It also discusses the trade-offs associated with privacy regulation and the challenge of controlling information online given factors like digitization, ubiquitous networks, and the user generation of large amounts of content. The document advocates for an alternative approach focused on education, empowerment, and targeted enforcement rather than anticipatory regulation.
[SLIDES] Internet of Things presentation at AEI (Sept 2014)Adam Thierer
This document summarizes a presentation given by Adam Thierer on the Internet of Things (IoT) and wearable technology. It discusses:
- Definitions of the IoT and its key components, including sensors, wireless networks, data storage, and analytics capabilities.
- The large number of connected devices expected by 2020, and the economic opportunities of the IoT. Health and fitness are major drivers.
- Privacy and security as the most significant social policy concerns raised by the IoT. The IoT challenges traditional privacy frameworks due to its always-on data collection capabilities.
- Constructive solutions like privacy by design, consumer education, and allowing legal and social norms to adapt over time in
Permissionless Innovation and the Future of Tech Policy (Thierer - Oct 2017 ed)Adam Thierer
This document discusses the concept of "permissionless innovation" and contrasts it with the "precautionary principle" approach to regulating emerging technologies. It argues that the US embraced permissionless innovation in the 1990s, allowing new technologies like the internet and smartphones to develop freely, while Europe adopted a more precautionary approach and saw less technological innovation as a result. The document outlines some concerns related to new technologies but asserts that restrictive regulation can stifle innovation and economic growth. Instead, it advocates for a bottom-up, adaptive approach relying on education, social norms, and limited legal interventions only as a last resort.
“Permissionless Innovation” & the Clash of Visions over Emerging TechnologiesAdam Thierer
"Permissionless Innovation & the Clash of Visions over Emerging Technologies." A presentation created by Adam Thierer (Mercatus Center at George Mason University). It focuses on coming public policy fights over various emerging technologies, such as: driverless cars, the Internet of Things, wearable technology, commercial drones, mobile medical innovations, virtual reality, and more.
This presentation has been updated to reflect most recent version.
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...Adam Thierer
"Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Driven Innovation." A presentation by Adam Thierer (Mercatus Center at George Mason University) made on September 11, 2014 at AEI-FCC Conference on "Regulating the Evolving Broadband Ecosystem."
How Can Policymakers and Regulators Better Engage the Internet of Things? Mercatus Center
The world today is seemingly always plugged into the Internet and technologies are constantly sharing data about our personal and professional lives. Device connectivity is on an upward trend with Cisco estimating that 50 billion devices will be connected to the Internet by 2020. Collection and data sharing by these devices introduces a host of new vulnerabilities, raising concerns about safety, security, and privacy for policymakers and regulators.
The document outlines the schedule and content for a technology specialism course, including presentations by students on feature writing and issues in technology. It discusses different types of technology features such as analysis, profiles, and reviews. It provides guidance on researching and writing features, emphasizing focusing narrowly, using data and quotes to support points, and choosing anecdotes carefully. The document presents brief overviews of the issues of piracy and privacy in technology at the beginning of 2010, how new technologies have challenged business models and shifted piracy methods, and debates around enforcement versus new business models for piracy, and concerns with data collection, security and control for privacy.
What every product manager needs to know about online privacyTrevor Fox
This seminar will introduce the issue and describe the potential for new privacy laws in the US and in the EU that could affect the business model of social medial/Web 2.0/mobile app vendors.
Intellectual Property & User Rights in Digital EnvironmentCharles Mok
Charles Mok, a Legislative Councillor, discusses updating Hong Kong's Copyright Ordinance to balance freedom of expression, intellectual property rights, and access to information in the digital age. He proposes expanding exemptions for derivative works like parodies, remixes, and user-generated content. While copyright holders want to protect artists, netizens argue for more exemptions to spur creativity and uphold freedom of expression. The government proposes balancing stakeholder interests by focusing exemptions on activities responding to current events and limiting internet service provider liability. However, many questions remain around how to define exemptions and interpret "transformativeness". Mok calls for more public discussion on keeping copyright laws up-to-date and promoting an open copyright
The document discusses conditions that can result in disruptive innovation, including the need for survival, movement, immortality, competition, accumulated wealth, and lack of spiritual fulfillment. It also discusses qualities of disruptive innovators, such as being young, having active listening skills, embracing risk, seeing transfer potential, and projecting from the past. Finally, it lists some mini-trends of note, such as cognitive computing, remote sensing, synthetic biology, 3D printing, and augmented reality.
Legal and Ethical Issues Associated with Modern Technologiesemilyjmail
This document discusses legal and ethical issues related to implementing modern technologies. It introduces intellectual property, copyright, fair use, first sale, and privacy policies as important considerations. The document then explains what intellectual property and copyright are and discusses the rights of copyright owners. It defines fair use and first sale and explains what privacy policies are. The document notes opportunities for business owners when implementing new systems and stresses the importance of adhering to intellectual property laws and regulations to secure proprietary rights when using new technologies.
Digital Citizenship involves preparing users of technology for responsible use in a digital society. It encompasses several areas: ensuring digital access for all, appropriate digital communication, understanding digital commerce, developing digital literacy skills, maintaining digital security and abiding by digital laws. It also involves understanding digital rights and responsibilities, digital health and wellness issues, and practicing good digital etiquette. The goal is to educate all technology users so they can safely and ethically participate in an increasingly digital world.
the music industry has many problems, and , some would say, enemies. THis talk looks at some of these and summarises the outcomes to date of the "war on piracy". It also however foresees a newer threat - the algorithmic curation and , perhaps, creation, of popular music. Do we need new music and human musicians any more?
This is a lesson I created for an assignment in my EdTech program. It can be used in middle school & high school technology classes to introduce the basics of copyrights, and guidelines for reducing infringement on copyrighted material.
This document discusses various ethical, social, and political issues related to information systems. It provides examples of companies like Enron that misused information systems unethically. It presents models for analyzing the ripple effects of new technologies and how ethical analysis involves identifying facts, stakeholders, options, and consequences. The document also discusses principles that can guide ethical decisions, such as responsibility, accountability, and privacy rights. It emphasizes that as technology changes society rapidly, ethics are needed to make choices in legally gray areas.
The Digital Millennium Copyright Act (DMCA) is the main law governing copyright in digital media. Passed in 1998, the DMCA protects copyright holders by prohibiting the unauthorized distribution of copyrighted works online and implementing two World Intellectual Property Organization treaties. The DMCA contains five titles that address issues like online copyright infringement and computer program protection. It restricts activities like illegally sharing copyrighted music, movies, books, software, and video games without permission. While the DMCA protects copyright holders' rights, it also allows for limitations like fair use for educational purposes.
The Future of Innovation of Policy - Adam Thierer - Mercatus CenterAdam Thierer
An overview of the future of innovation policy and what governance vision will drive it -- the precautionary principle or permissionless innovation. (By Adam Thierer, Senior Research Fellow, Mercatus Center at George Mason University).
Capitol Hill Campus: Drones, Bitcoin, and 3-D Printing: Regulating Emerging T...Mercatus Center
This document discusses the concepts of "permissionless innovation" and the "precautionary principle" as approaches to new technologies. It argues that permissionless innovation, which allows open experimentation, is important for driving progress and should be applied to both digital and physical innovations. The precautionary principle of requiring technologies to be pre-approved can stifle innovation and entrepreneurship. The document uses examples like commercial drones, Bitcoin, and 3D printing to show how permissionless innovation could benefit those technologies by allowing open-ended development, while precautionary rules could hamper their potential. It concludes that adopting a permissionless approach offline as well as online can help create new opportunities.
This document discusses key issues related to privacy and the internet. It outlines different approaches to defining and protecting privacy, noting that privacy means different things to different people and cultures. It also discusses the trade-offs associated with privacy regulation and the challenge of controlling information online given factors like digitization, ubiquitous networks, and the user generation of large amounts of content. The document advocates for an alternative approach focused on education, empowerment, and targeted enforcement rather than anticipatory regulation.
[SLIDES] Internet of Things presentation at AEI (Sept 2014)Adam Thierer
This document summarizes a presentation given by Adam Thierer on the Internet of Things (IoT) and wearable technology. It discusses:
- Definitions of the IoT and its key components, including sensors, wireless networks, data storage, and analytics capabilities.
- The large number of connected devices expected by 2020, and the economic opportunities of the IoT. Health and fitness are major drivers.
- Privacy and security as the most significant social policy concerns raised by the IoT. The IoT challenges traditional privacy frameworks due to its always-on data collection capabilities.
- Constructive solutions like privacy by design, consumer education, and allowing legal and social norms to adapt over time in
Permissionless Innovation and the Future of Tech Policy (Thierer - Oct 2017 ed)Adam Thierer
This document discusses the concept of "permissionless innovation" and contrasts it with the "precautionary principle" approach to regulating emerging technologies. It argues that the US embraced permissionless innovation in the 1990s, allowing new technologies like the internet and smartphones to develop freely, while Europe adopted a more precautionary approach and saw less technological innovation as a result. The document outlines some concerns related to new technologies but asserts that restrictive regulation can stifle innovation and economic growth. Instead, it advocates for a bottom-up, adaptive approach relying on education, social norms, and limited legal interventions only as a last resort.
“Permissionless Innovation” & the Clash of Visions over Emerging TechnologiesAdam Thierer
"Permissionless Innovation & the Clash of Visions over Emerging Technologies." A presentation created by Adam Thierer (Mercatus Center at George Mason University). It focuses on coming public policy fights over various emerging technologies, such as: driverless cars, the Internet of Things, wearable technology, commercial drones, mobile medical innovations, virtual reality, and more.
This presentation has been updated to reflect most recent version.
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...Adam Thierer
"Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Driven Innovation." A presentation by Adam Thierer (Mercatus Center at George Mason University) made on September 11, 2014 at AEI-FCC Conference on "Regulating the Evolving Broadband Ecosystem."
How Can Policymakers and Regulators Better Engage the Internet of Things? Mercatus Center
The world today is seemingly always plugged into the Internet and technologies are constantly sharing data about our personal and professional lives. Device connectivity is on an upward trend with Cisco estimating that 50 billion devices will be connected to the Internet by 2020. Collection and data sharing by these devices introduces a host of new vulnerabilities, raising concerns about safety, security, and privacy for policymakers and regulators.
This document summarizes a presentation given by Ian Brown and Chris Marsden. Some key points:
[1] Brown and Marsden are working on a book about regulating code and internet governance.
[2] They propose developing a "prosumer law" approach that enhances competitive production of public goods like innovation, safety, and democratic rights.
[3] The presentation outlines several case studies that will be analyzed in the book, including data protection, copyright, filtering, social networks, and net neutrality.
Cyber Libertarianism - Real Internet Freedom (Thierer & Szoka)Adam Thierer
Adam Thierer & Berin Szoka of The Progress & Freedom Foundation are attempting to articulate the core principles of cyber-libertarianism to provide the public and policymakers with a better understanding of this alternative vision for ordering the affairs of cyberspace. We invite comments and suggestions regarding how we should refine and build-out this outline. We hope this outline serves as the foundation of a book we eventually want to pen defending what we regard as “Real Internet Freedom.”
This document discusses several ethical, social, and political issues raised by information systems. It addresses principles of responsibility, accountability, and liability regarding data use and privacy protection. Contemporary technologies like data mining and predictive modeling pose challenges to privacy and intellectual property. Laws and policies are still developing to address these issues.
This document summarizes key points from a discussion on regulating the internet. It discusses arguments for net neutrality and challenges to claims of a "data explosion" necessitating tiered internet access. It also analyzes cases involving Google, including its settlements with regulators, and argues for a "prosumer law" approach focused on search neutrality, interoperability and truthful advertising rather than large fines. Overall it advocates for evidence-based internet policymaking that considers complex realities rather than ideological positions.
Regulating Code discusses regulating the internet through code and technology. It analyzes 5 case studies on data protection, copyright, filtering, social networks, and network neutrality. The book argues for an interoperability framework that enhances competition and protects fundamental rights like privacy and free expression. It suggests mandating interoperability and choice through open standards to address issues like dominant social platforms locking users into proprietary systems. Overall, the document advocates for a balanced approach to internet governance that considers both economic and human rights concerns.
This document contains review questions about ethical, social, and political issues related to technology. It discusses how ethics, society, and politics are interconnected and provides examples. Key technology trends like increasing computer power and data storage capabilities are highlighted as heightening ethical concerns due to their impact on privacy, data analysis, and system dependence. The document also defines responsibility, accountability, and liability and outlines the five steps of an ethical analysis. It identifies six ethical principles and discusses professional codes of conduct, privacy, and how technology challenges privacy protection. Intellectual property rights and challenges posed by the Internet are also addressed.
Cyber Libertarianism: Real Internet Freedom (Thierer & Szoka)Berin Szoka
Adam Thierer & I are attempting to articulate the core principles of cyber-libertarianism to provide the public and policymakers with a better understanding of this alternative vision for ordering the affairs of cyberspace. We invite comments and suggestions regarding how we should refine and build-out this outline. We hope this outline serves as the foundation of a book we eventually want to pen defending what we regard as “Real Internet Freedom.”
Cybersecurity Strategies - time for the next generationHinne Hettema
In this talk, presented in June 2016 at KAIST, I argue that it is time for the next generation of cybersecurity strategies. These must have a governance focus, and be based on international laws, declarations and agreements, basic internet rights and public good provisions.
Ehsan Kabir Solicitor is telling the Ethics Frameworks. Ehsan Kabir has past experience in dealing with civil litigation and advising on complex matters.
Similar to “Permissionless Innovation” & the Grand Tech Policy Clash of Visions to Come (20)
ACA Has Worsened Medicaid's Structural ProblemsMercatus Center
The document summarizes evidence that the Affordable Care Act (ACA) has exacerbated Medicaid's existing structural problems. It notes that ACA Medicaid expansion incentives have led to higher-than-expected enrollment and spending. States receive a higher federal matching rate for expansion enrollees, creating an incentive to increase fees and payments for their care while favoring them over traditional enrollees. Open-ended federal reimbursement also makes Medicaid difficult to cut. The document also finds higher spending per expansion enrollee, a proliferation of Medicaid waste, and a lack of clear health benefits from the expansion. It calls for Medicaid reform to reduce federal spending while preserving safety nets and giving states more flexibility and control over their programs.
Evaluating a Sluggish Economy with Bruce YandleMercatus Center
In the first half of 2016, the US economy skirted close to recession territory but so far has registered positive growth. What are the major forces that seem to be driving the slow-growth economy? Is the economy getting stronger? Or, will we hit recession territory before the end of the year?
The document discusses the 6 year anniversary of the Affordable Care Act and provides information on 2016 exchange enrollment, the makeup of the risk pool, and what has been learned. It notes that 12.7 million people signed up for exchange plans in 2016, slightly higher than the 11 million projected. However, the risk pool skewed older and poorer than expected. Many healthy and young individuals did not find the plans attractive without subsidies. The individual mandate also did not work as intended to increase coverage as many found ways to take advantage of ACA rules. Large attrition in enrollment occurred during 2016.
This document discusses several factors contributing to slower economic growth in the United States, including geographic differences, monetary policy, and regulatory uncertainty. It notes that real GDP growth has declined since 2000 and that unemployment rates varied widely by state from 2010. The document also examines how regulations can be influenced by interested parties and how targeting regulations to distribute benefits can impact economic performance.
This document discusses the advantages of targeting the growth rate of the money supply rather than interest rates. It lists advantages as not needing to know the money supply, inflation becoming less sensitive to short-run changes, monetary policy becoming more predictable, and less need to consider the real economy. The document also cites F.A. Hayek and Milton Friedman discussing how the money supply must change to offset movements in velocity to maintain monetary neutrality.
The Affordable Care Act fundamentally changed the landscape of the U.S. health care system. With more than five years since the law’s passage, questions remain about how to fix a system that remains broken despite recent reform efforts. Did the Affordable Care Act adequately reform a failing health system, or did that prescription only treat the symptoms of a much larger illness?
The document summarizes wireless spectrum policy in the United States in 2016 and discusses potential future policy directions. It provides an overview of spectrum characteristics, increasing demand but constrained supply, the history of spectrum policy, current federal and non-federal allocation and management, recent auctions that generated billions for the Treasury, and proposals to repurpose underutilized federal spectrum through incentive auctions, geographic sharing, and overlay license auctions. The goal is to increase commercial access and use of spectrum to spur innovation while balancing federal needs.
Buchanan Speaker Series: Education, Inequality, and IncentivesMercatus Center
The F. A. Hayek Program for Advanced Study in Philosophy, Politics, and Economics welcomed Roland G. Fryer, Jr., the Henry Lee Professor of Economics at Harvard University and faculty director of the Education Innovation Laboratory, for the inaugural Buchanan Speaker Series event on “Education, Inequality, and Incentives.”
Modernizing Freight Rail Regulation: Recommendations from the TRB StudyMercatus Center
The document summarizes the key findings and recommendations from a TRB study on modernizing freight rail regulation. It discusses how the Staggers Act of 1980 partially deregulated the freight rail industry and the positive effects this had. However, it notes some lingering issues like rate regulation, switching rules, and merger approvals. The speaker recommends using rate benchmarking models based on competitive markets to identify rates qualifying for arbitration. The proposal also suggests streamlining switching, service complaints, and merger processes while reviewing rail industry data collection.
Modernizing the SSDI Eligibility Criteria: Trends in Demographics and Labor M...Mercatus Center
This document discusses how changes in demographics and labor markets affect eligibility criteria for Social Security Disability Insurance (SSDI). It notes that SSDI outlays and participation have doubled in recent decades. While the aging workforce partly explains this, disability rates have remained flat. The document also discusses how a growing share of SSDI awards are decided based on vocational factors like age, education, and experience rather than medical conditions alone. However, it argues these vocational criteria are outdated and no longer reflect today's labor market which has shifted away from manual work to more sedentary, service jobs. The document recommends eliminating or modifying vocational criteria in SSDI eligibility determinations to better align with modern labor market realities.
The document discusses options for addressing increasing cyber attacks, particularly against the US Federal government. It notes several existing information sharing programs between government and private sectors. While a new program called CISA is proposed, the document questions if another program is needed given existing overlap. Instead, it suggests prioritizing security over surveillance, responsibly disclosing vulnerabilities, enforcing two-factor authentication, limiting contractors, and allowing security research to strengthen defenses long-term through a strategic, systematic approach rather than an urgent "sprint".
Tools for Tracking the Economic Impact of LegislationMercatus Center
Laws passed by Congress impact the economy, but Congress has no systematic way to comprehensively track and assess the economic impact of legislative actions. This is especially difficult when laws empower federal agencies to regulate. While the current budget process scores and tracks the economic impact of spending and taxes, it does not account for the economic consequences of regulation.
The Sharing Economy: Perspectives on Policies in the New EconomyMercatus Center
The document discusses the sharing economy, how it works, and implications for policymakers. It explains that the sharing economy involves taking assets one owns and making them available to others for a fee via platforms like Uber and Airbnb. This allows individuals to earn income from underutilized assets. However, it poses challenges for policymakers accustomed to traditional employment models. The document argues that policymakers must adapt regulations to 21st century sharing platforms rather than try to apply outdated 20th century frameworks.
Sustaining Surface Transportation: Overview of the Highway Trust Fund and Ide...Mercatus Center
This document summarizes a presentation about reforming the federal highway transportation funding system. It outlines that the presentation covers:
1) The basics of the current federal Highway Trust Fund and issues with disconnect between revenues and system performance.
2) Areas for improvement like strategies to reduce congestion being inadequate and more efficient allocation of funds.
3) Options for reform like tolls, public-private partnerships, and charging drivers for vehicle miles traveled with considerations for implementing VMT charges.
Stephen C. Goss Presentation for Mercatus Center SSDI PanelMercatus Center
The Social Security Disability Insurance (DI) trust fund’s projected 2016 depletion will require Congress to act soon to prevent large, sudden benefit cuts.
Experts on both sides of the aisle have noted that a “quick fix” of simply shifting payroll taxes from Social Security’s much larger retirement trust fund (OASI) into DI, without further reform, could cost Congress its last chance to solve Social Security’s broader financing problems before it is too late. What more responsible reform options are available?
The Mercatus Center and the Committee for a Responsible Federal Budget hosted a discussion on May 12 on how best to respond to SSDI’s financing crisis.
David Stapleton Presentation for Mercatus Center SSDI PanelMercatus Center
The Social Security Disability Insurance (DI) trust fund’s projected 2016 depletion will require Congress to act soon to prevent large, sudden benefit cuts.
Experts on both sides of the aisle have noted that a “quick fix” of simply shifting payroll taxes from Social Security’s much larger retirement trust fund (OASI) into DI, without further reform, could cost Congress its last chance to solve Social Security’s broader financing problems before it is too late. What more responsible reform options are available?
The Mercatus Center and the Committee for a Responsible Federal Budget hosted a discussion on May 12 on how best to respond to SSDI’s financing crisis.
Jason J. Fichtner Presentation for Mercatus Center SSDI PanelMercatus Center
The Social Security Disability Insurance (DI) trust fund’s projected 2016 depletion will require Congress to act soon to prevent large, sudden benefit cuts.
Experts on both sides of the aisle have noted that a “quick fix” of simply shifting payroll taxes from Social Security’s much larger retirement trust fund (OASI) into DI, without further reform, could cost Congress its last chance to solve Social Security’s broader financing problems before it is too late. What more responsible reform options are available?
The Mercatus Center and the Committee for a Responsible Federal Budget hosted a discussion on May 12 on how best to respond to SSDI’s financing crisis.
Stephen C. Goss Presentation for Mercatus Center SSDI PanelMercatus Center
The Social Security Disability Insurance (DI) trust fund’s projected 2016 depletion will require Congress to act soon to prevent large, sudden benefit cuts.
Experts on both sides of the aisle have noted that a “quick fix” of simply shifting payroll taxes from Social Security’s much larger retirement trust fund (OASI) into DI, without further reform, could cost Congress its last chance to solve Social Security’s broader financing problems before it is too late. What more responsible reform options are available?
The Mercatus Center and the Committee for a Responsible Federal Budget hosted a discussion on May 12 on how best to respond to SSDI’s financing crisis.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Project Management Semester Long Project - Acuityjpupo2018
Acuity is an innovative learning app designed to transform the way you engage with knowledge. Powered by AI technology, Acuity takes complex topics and distills them into concise, interactive summaries that are easy to read & understand. Whether you're exploring the depths of quantum mechanics or seeking insight into historical events, Acuity provides the key information you need without the burden of lengthy texts.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
OpenID AuthZEN Interop Read Out - AuthorizationDavid Brossard
During Identiverse 2024 and EIC 2024, members of the OpenID AuthZEN WG got together and demoed their authorization endpoints conforming to the AuthZEN API
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to Come
1. “Permissionless Innovation” & the Grand
Tech Policy Clash of Visions to Come
Adam Thierer
Senior Research Fellow
Mercatus Center at George Mason University
June 6, 2014
2. Outline of Discussion
1. The Digital Revolution… How’d It Happen?
2. Competing Policy Visions: “Permissionless
innovation” vs. the “precautionary principle”
3. Future Tech Policy Battles / Case Studies
– driverless vehicles
– the Internet of Things & “wearable” tech
– private drones
– other emerging tech issues to watch
4. Principles to Foster Innovation
2
6. Question: How Did U.S. Become Global
Tech Innovation Leader?
6
Source: Booz & Company
• 9 of the top 10 most innovative global companies are based in U.S.
• 7 of the 10 are involved in computing, software & digital technology
7. 7
How Did This US-EU Tech Imbalance
Develop?
Source: Alberto Onetti, Mind the Bridge Foundation
8. Answer = “Permissionless Innovation”
• Permissionless innovation = the general
freedom to experiment & learn through trial-and-
error experimentation.
• The U.S. embraced this ethos & made it the
basis of policy for the digital economy in the
1990s and beyond.
8
9. In the old days, the Internet was
“permissioned” (pre-1990s)
This warning to students appeared in a 1982 MIT
handbook for the use of ARPAnet, the progenitor
of what would become the Internet:
“It is considered illegal to use the ARPAnet for
anything which is not in direct support of
government business... Sending electronic mail
over the ARPAnet for commercial profit or political
purposes is both anti-social and illegal. By
sending such messages, you can offend many
people, and it is possible to get MIT in serious
trouble with the government agencies which
manage the ARPAnet.”
9
10. But once we opened up the Net, the digital
revolution took off
• Again, before early 1990s, online innovation &
commercial activity wasn’t even allowed.
• But the commercial opening of the Net changed all
that. The rest is history.
• Permissionless innovation has driven the
explosion of Internet entreprenuerialism over past
2 decades.
• Nobody needed a license or permission to launch
the great technological innovations of the digital
age.
10
11. What’s good for cyberspace
is good for meatspace!
We need same general policy approach to other
sectors and technologies,
whether based on bits (digital economy) or atoms
(industrial economy).
Our policy default should be
Innovation Allowed
11
12. But What about the Risks?
(or, Why Some Still Favor “Precautionary
Principle” Policies)
12
13. The “Precautionary Principle”
= Crafting public policies to control or limit new
innovations until their creators can prove that they won’t
cause any harms.
– this “better to be safe than sorry” mentality
– “Mother, May I” (“permissioned”) policy prescriptions &
preemptive regulation
– It is the opposite of permissionless innovation
• Rationales for “precautionary” regulation
– safety
– security
– privacy
– economic (automation & job dislocation concerns)
– IP
13
14. General problem with
“permissioning” innovation
If we spend all our time living in constant fear of
worst-case scenarios—and premising public policy
upon such fears—it means that best-case
scenarios will never come about.
Wisdom and progress are born from experience,
including experiences that involve risk and the
possibility of occasional mistakes and failures.
14
15. Specific problems with
“permissioning” innovation
• less entreprenurialism / lost opportunities
• diminished marketplace entry / rivalry
• stagnant markets & potential cronyism
• loss of int’l competitive advantage
• higher prices
• fewer choices for consumers
15
17. Better way to respond to risk
posed by technological innovations
Bottom-up approaches to new tech risks:
• Education / etiquette
• Empowerment
• Social pressure / media pressure
• New social norms
• Resiliency & adaptation
• Self-regulation & new competition / choices
• Torts, property rights, contracts
• other targeted & limited legal interventions
17
18. Give adaptation a chance!
• Remember, faced such challenges before & muddled through
• Recall reaction to camera & photography in late 1800’s…
“Instantaneous photographs and newspaper enterprise have invaded the
sacred precincts of private and domestic life; and numerous mechanical
devices threaten to make good the prediction that ‘what is whispered in the
closet shall be proclaimed from the house-tops.’”
— Samuel D. Warren and Louis D. Brandeis, 1890
• But we got through it! We adjusted our societal norms and personal
expectations to accommodate photography.
• Instead of rejecting cameras, we bought a lot of them! (But then learned
how to use them respectfully, too.)
18
19. The Precautionary Principle vs. Permissionless Innovation
A Range of Responses to Technological Risk
Prohibition
Censorship
Info suppression
Product bans
Anticipatory
Regulation
Administrative mandates
Restrictive defaults
Licensing & permits
Industry guidance
Resiliency
Education & Media Literacy
Labeling / Transparency
User empowerment
Self-regulation
Adaptation
Experience / Experiments
Learning / Coping
Social norms & pressure
Top-down
Solutions
Bottom-up
Solutions
Precautionary Principle
Permissionless Innovation
19
24. Case Study #1:
“Internet of Things” & Wearables
• The Promise: “Always-on” sensor devices that
can collect data, track activities, and customize
experiences to users’ needs and desires
• The Fear:
– Privacy: How much data are they collecting /
sharing?
– Security: What if all this stuff gets hacked?
– Discrimination: Will these devices & services
be used to disadvantage users?
24
26. Addressing Concerns about IoT &
Wearables
• Privacy & security best practices (“privacy by design”)
• Education & tech etiquette efforts
• Social pressure & social sanctions will play big role (current ex:
phones in theaters & locker rooms)
• Common law adjudication via existing legal standards (privacy
torts, contracts, property rights)
• Likely policy outcome
– FTC (Section 5) “unfair & deceptive practices” enforcement
– Targeted data use restrictions for most serious concerns
• A certain amount of social adaptation will be required.
26
27. Case Study #2: Intelligent Vehicles
• Autonomous cars on the way but legality remains
unclear in some states
• The Promise:
– Huge reduction in car accidents & deaths
– Traffic reduction
– Potential environmental benefits
• The Fear:
– Will robot cars make smart decisions?
– Who’s liable when accidents still happen?
– Are driverless cars hackable?
– What about privacy? How much info is collected?
27
28. Addressing Concerns about Intelligent Cars
28
• Privacy & security best practices by industry
• Evolution of insurance & liability norms
• Possible policy tweaks:
– Revised licensing procedures for “drivers”?
– Liability changes? (likely common law will
handle)
– Possible data use restrictions for privacy?
29. Case Study #3: Private Drones
• Currently illegal to operate a drone for profit
– FAA must integrate commercial drones in US airspace
by 2015
– Regulations are under consideration now
• The Promise:
– Countless beneficial applications (agriculture,
environmental monitoring, hazardous work, shipping,
journalism, entertainment)
– Could be safer than cars for routine delivery tasks
• The Fear:
– Safety (they’ll fall on our heads or run into stuff!)
– Privacy (they monitor our every move)
29
30. Addressing Concerns about Private Drones
• Common law adjudication
– already federal, state, and local laws that
protect property rights & privacy (ex: “peeping
Tom” laws)
• Possible policy tweaks:
– Targeted FAA no-fly safety zones
– Drone identification mandates?
• Again, be patient! Social adaptation likely.
30
31. 3 Other Big Disruptions to Watch
• 3-D printing
• “Biohacking”
• Genetic diagnostics (“23 & me” fight)
31
32. General Policy Lessons / Values
to Help Promote Innovation
• Forbearance (or “First, Do No Harm”): Don’t jump to
regulate new tech based on worst-case scenarios.
• Patience: Wait to see how individuals & institutions
adapt.
• Humility: Understand limits of knowledge & ability to
predict the future.
• Restraint: Limit & target interventions after exhausting
all other options
• Reevaluate (constantly): Conduct strict cost-benefit
analysis for all new proposals & periodically sunset old
rules before they hinder future progress.
32
33. Related Mercatus Center Research
Books, Papers & Filings
• Book: Permissionless Innovation: The Continuing Case for Comprehensive Technological
Freedom (Thierer)
• Mercatus filing to FAA on Unmanned Aircraft System Test Site Program
• Mercatus filing to FTC on Privacy and Security Implications of the Internet of Things
• Technopanics, Threat Inflation, and the Danger of an Information Technology Precautionary
Principle (Thierer)
• Bitcoin: A Primer for Policymakers (Brito)
Articles & Blog Posts
• Who Really Believes in “Permissionless Innovation”? (Thierer)
• “Permissionless Innovation” Offline as Well as On (Thierer)
• The Third Industrial Revolution Has Only Just Begun (Dourado)
• Mr. Bitcoin Goes to Washington (Brito)
• The Next Internet-Like Platform for Innovation? Airspace (Think Drones) (Dourado)
• Domestic Drones Are Coming Your Way (Brito)
• When It Comes to Information Control, Everybody Has a Pet Issue & Everyone Will Be
Disappointed (Thierer)
33