Volume 10, Issue 33 September 9, 2011

Patient Data Posted Online in Major Breach of A medical privacy breach at Stanford University’s hospital in Palo Alto, Calif., led to the public posting of medical records for 20,000 emergency room patients, including names and diagnosis codes, on a commercial Web site for nearly a year, the hospital has confirmed.

By Kevin Sack, in The New York Times

Since discovering the breach last month, the hospital has been investigating how a detailed spreadsheet made its way from one of its vendors, a billing contractor identified as Multi-Specialty Collection Services, to a Web site called Student of Fortune, which allows students to solicit paid assistance with their schoolwork. Gary Migdol, a spokesman for Stanford Hospital and Clinics, said the spreadsheet first appeared on the site on Sept. 9, 2010, as an attachment to a question about how to convert the data into a bar graph.

Even as government regulators strengthen oversight by requiring public reporting of breaches and imposing heavy fines, experts on medical security said the Stanford episode spotlights the persistent vulnerability posed by legions of outside contractors that gain access to private data.

The spreadsheet contained names, diagnosis codes, account numbers, admission and discharge dates, and billing charges for patients seen at Stanford Hospital‘s emergency room during a six-month period in 2009, Mr. Migdol said. It did not include Social Security numbers, birthdates, credit-card accounts or other information used to perpetrate , he said, but the hospital is offering free identity protection services to affected patients. Figure of the week The breach was discovered by a patient and reported to the hospital on Aug. 22, according to a letter written four days later to affected patients by Diane Meyer, Stanford Hospital‘s chief privacy officer. The hospital took ―aggressive steps,‖ and the 28% Web site removed the post the next day, Ms. Meyer wrote. It also notified state and federal agencies, Mr. Migdol said. Twenty-eight percent of American adults use their mobile phones to ―It is clearly disturbing when this information gets public,‖ he said. ―It is our intent access location-based mobile and 100 percent of the time to keep this information confidential and private, and we work hard every day to ensure that.‖ social services according to a new survey issued by the Pew More at http://www.nytimes.com/2011/09/09/us/09breach.html?_r=1 Internet & American Life Project. Volume 10, Issue 33 September 9, 2011 Page 2

Privacy and Security

Naming Names on the Internet

By Eric Pfanner, The New York Times Why, then, are the calls for restrictions on Internet Three years ago, after the suicide of a popular actress who had growing? been bullied via the Internet, South Korea introduced a radical policy aimed at stamping out online hate. It required Last month, Interior Minister Hans-Peter Friedrich of contributors to Web portals and other popular sites to use their Germany said bloggers should disclose their true identities. He real names, rather than pseudonyms. cited the case of the Norwegian terrorist suspect Anders Behring Breivik, who had professed admiration for a blogger Last month, after a huge security breach, the government said who wrote under the pseudonym ―Fjordman.‖ it would abandon the system. Hackers stole 35 million Internet users‘ national identification numbers, which they had been ―Normally people use their names when they take a position,‖ required to supply when registering on Web sites to verify their Mr. Friedrich told Der Spiegel. ―Why shouldn‘t this be identities. something that is also self-evident on the Internet?‖

The South Korean experience shows that ―real name‖ policies His words were echoed by Eric E. Schmidt, the executive are a lousy idea, and privacy threats are only one reason. chairman of Google, who said during a media conference in Online anonymity is essential for political dissidents, whose Edinburgh last month: ―The Internet would be better if we had role has been highlighted in the uprisings in the Arab world, an accurate notion that you were a real person as opposed to a and for corporate whistle-blowers. In the United States, the dog, or a fake person, or a spammer.‖ Supreme Court has found a constitutional basis for protecting anonymity. More at http://nyti.ms/qWjwa5

Health Portability and Accountability Act (HIPAA) at 15: HITECH Tightens Health if they're under investigation. Care Data Privacy Laws "It does give patients rights to their records and the rights to Fifteen years after Congress enacted the HIPAA data know who's seen their records, and that's important," John Moore, an analyst at Chilmark Research, told eWEEK. The law privacy laws, health care IT is adapting to guidelines doesn't tell hospitals what to do with the data, however, Moore made more stringent by the 2009 HITECH Act. added. By Brian T. Horowitz, eWeek.com HIPAA has also influenced the passage of the Obama With 2011 marking the 15th anniversary of the Health administration's 2009 Health Information Technology for Insurance Portability and Accountability Act, health care Economic and Clinical Health (HITECH) Act, which made providers and IT companies continue to evaluate how to keep penalties for data breaches more severe. Data breaches can electronic secure. now cost companies up to $250,000, Moore noted.

On Aug. 21, 1996, President Clinton signed into law a set of The 2009 HITECH Act widened the scope of privacy rules detailing who can access personal health information. protection under HIPAA following criticism that the privacy Under HIPAA, health information may not be disclosed laws had not been rigorously enforced, according to Amit without a patient's consent unless disclosure is necessary to Trivedi, health care program manager for ICSA Labs, a administer benefits, payment or health care. division of Verizon. ICSA tests electronic health records (EHRs) to see if they satisfy federal mandates on meaningful Under HIPAA, providers must regularly disclose privacy use. practices to patients, and parties must also disclose information to the Department of Health and Human Services More at http://bit.ly/nV4ocm Volume 10, Issue 33 September 9, 2011 Page 3

Privacy and Security - (cont.)

10 Years After 9/11, Cyberattacks Pose National Threat, Committee Says

Catastrophic cyberattacks are not 'science fiction,' says the Bipartisan Policy Center

By Jaikumar Vijayan, Computerworld

Ten years after the terrorist attacks of Sept. 11, 2001, the nation faces a critical threat to its security from cyberattacks, a new report by a bipartisan think tank warns.

The report, released last week by the Bipartisan Policy Center's National Security Preparedness Group (NSPG), offers a broad assessment of the progress that the public sector has made in implementing the security recommendations of the 9/11 Commission. The comments about cybersecurity are part of broader discussion on nine security recommendations that have yet to be implemented.

The report, the foreword to which is signed by Lee Hamilton, a targets remain woefully underprepared for dealing with former Democratic representative from Indiana, and Thomas cyberattacks. Over the past few years, there have been Kean, former governor of New Jersey, notes that catastrophic numerous attacks targeting government and military cyberattacks against U.S. critical infrastructure targets are not networks. Most of the attacks are believed to be the work of a mere theoretical threat. highly organized, well-funded, state-sponsored groups.

"This is not science fiction," the NSPG said in its report. "It is Despite the attacks, some believe that those within government possible to take down cyber systems and trigger cascading are not taking the threat seriously enough. Just a few weeks disruptions and damage. Defending the U.S. against such ago, for instance, Cofer Black, former director of the CIA's attacks must be an urgent priority." Counterterrorism Center during the Bush administration, warned about cyberthreats not being taken seriously enough. The report highlights concerns expressed by the Department of Homeland Security (DHS) and the U.S. intelligence Though many security experts agree that future conflicts will community about terrorists using cyberspace to attack the likely be fought in cyberspace, military and government country without physically crossing its borders. "Successive officials have shown a hesitancy to act until they see a [intelligence chiefs] have warned that the cyber threat to validation of the threats, Black said during a keynote address critical infrastructure systems -- to electrical, financial, water, at the Black Hat conference in August. It was the same sort of energy, food supply, military, and telecommunications skepticism that many government officials had showed toward networks -- is grave." the alarms sounded prior to the Sept. 11, 2001, Black had noted. The report makes note of a briefing in which DHS officials described a "nightmare scenario" of terrorists hacking into the The Bipartisan Policy Center (BPC) is a Washington-based U.S. electric grid and shutting down power across large think tank that was established in 2007 by former Senate sections of the country for several weeks. "As the current crisis Majority leaders Howard Baker, Tom Daschle, Bob Dole and in Japan demonstrates, disruption of power grids and basic George Mitchell. The NSPG is a group that was established by infrastructure can have devastating effects on society," the the BPC to monitor the implementation of the 9/11 report noted. Commission's recommendations for bolstering national security in the aftermath of the terrorists attacks. The committee's report is sure to reinforce perceptions among many within the security industry that critical infrastructure More at http://bit.ly/nDokDT Volume 10, Issue 33 September 9, 2011 Page 4

Health IT

NYC Program Shows EHRs Can Boost Preventive Care

Program led by Farzad Mostashari, before he became Workforce Optimization improves staff productivity and national health IT coordinator, supports entering performance in the back office. structured data into an EHR to monitor a population's Since 2007, the Primary Care Improvement Project (PCIP) has health. helped primary care doctors in underserved areas acquire By Ken Terry, InformationWeek EHRs. Quality data has been transmitted automatically from those EHRs to the department of health on a monthly basis. In a New York City program that subsidized doctors' electronic health records (EHRs) in return for sharing quality data with The JAMIA study focused on 309 small practices that adopted the city, physicians showed significant improvements on eight EHRs under PCIP between 2007 and 2010. Most of these of 10 preventive care indicators, according to a new study in practices contained only one or two physicians, and 53% of the Journal of the American Medical Informatics Association their patients were on Medicaid or uninsured. (JAMIA). Over the course of a year, the researchers found, the rates of The findings provide some perspectives on the federal preventive care among the PCIP practices increased by up to government's Meaningful Use program, which requires 2.4% per month, depending on the indicator. The percentage attestation-of-quality data this year and electronic reporting in of adult patients who had seen their primary care doctor in the 2012. Not coincidently, the national coordinator of health IT, past 12 months rose by only 0.1%, perhaps because it was Farzad Mostashari, MD, who has responsibility for already high at baseline. But the percentage of patients with implementing the federal incentive program, led the team that diabetes who had received an HbA1c test within the past six created the New York EHR program when he was assistant months jumped 2.4%. commissioner of the city's department of health and mental hygiene. More at http://bit.ly/pjW4w7

Sacramento region whose early efforts to rein in variation S.F. Experiment in Improving resulted in training doctors in newer medical techniques and Patient Health Care offering patients less-invasive treatment options. By Emily Bazar, San Francisco Chronicle In the case of weight-loss surgeries, procedures fell in one year Researchers long ago established that certain medical by 13 percent. procedures are performed at dramatically different rates from place to place, and that these disparities affect the quality and "When you have over-utilization, it is both a cost and quality cost of health care. issue," said Paul Markovich, Blue Shield's chief operating officer. "Hospitals are not really safe places to be. ... You only Now, health insurers, hospitals and government agencies from want to be there if you have to be there." the Bay Area to Washington, D.C., are getting more aggressive about tackling variation in medical care. Also this summer, the Centers for Medicare & Medicaid Services (CMS) started using a new data-mining technology to The issue will surface in San Francisco with a collaboration detect and prevent fraud in the Medicare program, the federal that started this summer among Blue Shield of California and program for people 65 and older. some local hospitals and physicians, aimed at better coordination of patient care for about 26,000 public Extreme variation in care is one pattern the technology will be employees. looking for.

The partnership is modeled after a similar one in the More at http://bit.ly/p4i8Aw Volume 10, Issue 33 September 9, 2011 Page 5

Health IT - (cont.)

Tracking Vital Signs, Without the Wires

By Randall Stross, The New York Times

Confined to their hospital beds, patients can only fantasize about stripping off all the wires that connect them to monitors and bolting for the door.

Suppose, however, that all of a convalescent patient‘s electrode patches were consolidated into a single, nearly invisible and weightless version — as thin as a temporary, press-on tattoo. And suppose that a tiny radio transmitter eliminated the need for any wires tethering the patient to monitoring machines.

―Epidermal electronics‖ — a term coined by researchers who have produced prototype devices at the University of Illinois at Urbana-Champaign — may enable constant medical monitoring anywhere. At the University of Illinois, researchers are working on ultrathin, electronic medical monitors that attach to a pa- tient's skin and transmit data wirelessly. The devices are part of a growing field, called mHealth, that uses mobile technologies. Simpler forms include smartphone apps for patient education or disease management. More complex ones include wireless sensors to monitor vital signs. the devices are retrieved at the end of the study. In other cases, the technology has been approved only for hospital settings ―MHealth is managing conditions continuously, so that they where a doctor is present. But, looking ahead, the promise of don‘t reach a crisis,‖ says Donald M. Casey, chief executive of epidermal electronics has excited mHealth advocates. the West Wireless Health Institute, a nonprofit research organization in San Diego. Mr. Casey singled out the work of the University of Illinois researchers, led by John A. Rogers, an engineering professor Wireless sensor technology is advancing rapidly. Last year, for and a 2009 MacArthur Fellow. Their work on epidermal example, Corventis, a medical device company based in San electronics was published last month in the journal Science. Jose, Calif., received Food and Drug Administration approval While the monitor patch made by Corventis weighs 1.8 ounces, to market its Nuvant Mobile Cardiac Telemetry System, used the ultrathin one created at Illinois weighs only three- to detect arrhythmias. A 2-by-6-inch electronic gizmo on a thousandths of an ounce. patient‘s chest sends an electrocardiogram to a nearby transmitter, which relays it to a central monitoring center. ―If the technology delivers as promised,‖ Mr. Casey says, ―then we believe that‘s when we‘ll move from sensors on people ―Sensors on everyone, including a 60-year-old watching a diagnosed with a disease to literally everybody.‖ football game who doesn‘t know he‘s at risk for a heart attack, would greatly reduce the chances of a fatal attack,‖ says Dr. Professor Rogers is a co-founder of MC10, an electronics Leslie A. Saxon, a cardiologist at the University of Southern company in Cambridge, Mass., that is aiming to turn the California. epidermal monitor prototype into a commercial product in 2013. David A. Icke, MC10‘s chief executive, said the One form of the monitoring will be tested on the football field company‘s skinlike device consists of tiny components that are itself. With a grant from the National Football League, Dr. physically separated, like electronic ―islands.‖ They are Saxon will study one unnamed N.F.L. team this fall. Each connected with squiggles he calls ―serpentines,‖ which are player will wear a monitoring patch for a week. designed to bend and absorb strain without breaking. The technology can theoretically be used both inside the body and Not all mobile monitoring technology can transmit data on the skin. wirelessly. The patches that Dr. Saxon will use, for example, store their data within; the information will be uploaded when More at http://nyti.ms/nMPq02 Volume 10, Issue 33 September 9, 2011 Page 6

New Reports and Papers University and the study‘s lead author who I was able to speak with earlier today. ―They were influenced by several factors, EHR Incentives Likely to Improve Quality including our public reporting on agreed-upon standards of By Brian Ahier, Healthcare IT News care and the willingness of our clinical partners to share their EHR-based best practices while simultaneously competing on Healthcare is one of the last industries in the United States to their execution.‖ universally incorporate technological advancements. While most sectors have made significant investments in information The research involved more than 500 primary care physicians technology to improve efficiency and consumer relationships, in 46 practices that are partners in a region-wide collaborative America‘s health care system is still largely paper-driven. As a known as Better Health Greater Cleveland (Better Health). result the healthcare system is plagued by inefficiency and This alliance of providers, businesses and other stakeholders is poor quality. dedicated to enhancing the value of care for patients with chronic medical conditions in the region. Delivery is slower, more prone to errors, and harder to measure and coordinate than it should be. Investments in Launched in 2007, the organization is one of 16 that the Robert health information technology can help improve this situation. Wood Johnson Foundation chose to support in its nationwide Research published in the New England Journal of Medicine initiative, called Aligning Forces for Quality. This initiative is gives cause for optimism that efforts to increase adoption of the foundation‘s signature effort to lift the overall quality of electronic health records (EHRs) will provide major benefits in health care in targeted communities as well as reduce racial better patient care and health outcomes. Perhaps we can and ethnic disparities and provide models that will help propel finally move away from using a dead tree medical recod system national reform. Common themes across the communities in this country. include public reporting of performance and community-wide initiatives to improve care. ―We were not surprised by these results,‖ said Randall D. Cebul, M.D., a professor of medicine at Case Western Reserve More at http://bit.ly/oqaxPG

Poll: OK to Trade Some Freedoms to Fight of Americans' emails and phone calls. For some Terrorism Americans, their reluctance to give up any freedoms is a By Jennifer Agiesta & Nancy Benac, Associated Press reflection of their belief that the terrorists eventually will succeed no matter what. Surveillance cameras in public places? Sure. Body scans at airports? Maybe. Snooping in personal email? Not so fast. "If somebody wants to do something, they'll find a way," says David Barker, a retired high school teacher from Wynne, Ark., The same Americans who are increasingly splashing their who says he's not ready to sacrifice any freedoms in return for personal lives across Facebook and Twitter trace a meandering more security. path when asked where the government should draw the line between protecting civil liberties and pursuing terrorism. Others worry that giving up one freedom will lead to the loss of others. Ten years after the 9/11 attacks led to amped-up government surveillance efforts, two-thirds of Americans say it's fitting to "It's like opening a crack in the door, and then the door is sacrifice some privacy and freedoms in the fight against opened wide," says Keri Jean, a homemaker from Elk Ridge, terrorism, according to a poll by The Associated Press-NORC Utah. Center for Public Affairs Research. The poll asked people to grapple with some of same quandaries A slim majority — 54 percent — say that if they had to choose that the government and the courts have been wrestling with between preserving their rights and freedoms and protecting over the past decade, and even before the 2001 terrorist people from terrorists, they'd come down on the side of civil attacks. liberties. The public is particularly protective of the privacy of U.S. citizens, voicing sharp opposition to government More at http://apne.ws/nVyRC6 Volume 10, Issue 33 September 9, 2011 Page 7

Reports and Papers - (cont.)

Secrecy Report 2011 transparent, accountable, and participatory. Countries that By Patrice McDermott, Amy Bennett & Abby Paulson elect to participate, including the US, must deliver a concrete action plan, developed with public consultation and feedback Introduction and commit to independent reporting on their progress going forward. In this Introduction, we have highlighted progress OpenTheGovernment.org issued the first Secrecy Report Card that we hope to see continued and strengthened as well as in 2004, chronicling the trends in secrecy and openness in trends we would like to see reversed. 2003. As readers will recall, that was the year of the U.S. invasion and occupation of Iraq and the third year of the Bush Creating and maintaining open and accountable government –Cheney Administration. requires the committed focus of both the public and the government. What follows is a brief look at how the main Over the course of that Administration, we charted a indicators we examine have changed over time. Unless significant increase in secrecy which led to a decrease in otherwise noted, all years are Fiscal Years (FY). accountability—to the public and to Congress. As we gather more data from the Obama Administration, we will continue to 2010 Highlights look at how, and if, trends change. This report on trends in secrecy and openness in Fiscal Year 2010 includes data from The government continued to spend on declassification almost two years of the Obama Administration (January 2009 only .5% of overall security classifications costs. Put –October 2010). It also launches the new name of the report— differently, for every $1 the government spent declassifying Secrecy Report. secrets it spent 2000% more ($201) on protecting other secrets. While expenditures to maintain secrecy (10.17 billion) Our 2011 report takes on a new significance with the increased 13%, agencies declassified only 1% more pages than Administration‘s new Open Government Partnership, an were declassified in 2009. initiative that will bring together partners from many countries and sectors to support governments‘ efforts to become more More at http://bit.ly/oetN4Q

Measuring the Value of Search Search, takes a more comprehensive view of this phenomenon and its rising value. We looked at five key developed and New McKinsey research estimates the impact of developing economies—Brazil, France, Germany, India, and the United States—indentifying nine activities that are primary Internet search in the global economy, pinpointing the sources of search value, as well as 11 private, public, and sources of value and the beneficiaries. individual constituencies that reap the benefits.1 Among the By the McKinsey Global Institute key findings:

Searching the Internet has become an almost reflexive act. Using country-level analysis as a base, we estimated that the Each day, tens of millions of global citizens fire up their total gross value of Internet search across the global economy personal computers and handheld devices to troll for was $780 billion in 2009, equivalent to the GDP of the information on products or to glean insights that will help or Turkey. By this estimate, each search is worth guide business decisions. Yet the economic value of this about $0.50. enormous current of search activity remains largely unknown. Current estimates rely mainly on brute measures, such as the Of that value, $540 billion—69 percent of the total and 25 number of searches performed or revenues times the annual value added (profits) of search companies— reported by search companies themselves. These estimates fail flowed directly to global GDP, chiefly in the form of e- to take account of how trillions of clicks combine to boost commerce, advertising revenues, and higher corporate productivity, open new pathways to problem solving, or simply productivity. Search accounted for 1.2 percent of US and for make life easier. 0.5 percent of India‘s GDP.

A new McKinsey study, The impact of Internet technologies: More at http://bit.ly/nVqb78 Volume 10, Issue 33 September 9, 2011 Page 8

Reports and Papers - (cont.)

Data Breaches Cost Organizations a Staggering records per day/15,000 records per hour every single day for $156.7 Billion Over Six Years the past six years, according to the report, which studied 3,765 publicly disclosed data breach incidents from 2005 through Data breaches cost organizations $156.7 billion over a 2010. six-year period, according to new data breach study In 65% of the data breach cases, the data disclosed included by Digital Forensics Association. the subject‘s name, address, and social security number. In By infosecurity.com contrast, only 15% of the incidents disclosed credit card numbers, and 16% disclosed medical information. The study presents data breach information collected from 2005 through 2010, including the disclosure of more than 800 Medical disclosures saw a significant increase with the million records over that period. addition of the 2010 data. This is more likely due to the reporting requirement of existing regulations going into effect The association said the overall data breach dollar figure did than an actual increase in incidents, the report observed. not include the costs that the organizations downstream or upstream incurred, or the losses sustained by the data breach The data breach incidents where criminal use of the data was victims. confirmed increased by 58% from the prior report.

Further, the report, The Leaking Vault 2011, said the data The two vectors most likely to show criminal use were the breach cost estimate was low because 35% of the incidents did fraud and hacker vectors. Hackers were responsible for 48% of not name a figure for records lost. the records disclosed in the study.

On average, these organizations lost over 388,000 people‘s More at http://bit.ly/mWt4bP

Privacy Papers for Policy Makers 2011

By Mary J. Culnan, Bentley University The paper analyzes the requirements of three information Executive Summary security laws (GLB Safeguards Rule, HIPAA Security Rule and the Massachusetts Standards for the Protection of Personal The predominate approach to regulation in Information) which require organizations to adopt the US is grounded in two principles: notice and choice. Firms comprehensive security programs against the elements of provide notice describing their information practices while accountability and concludes that these laws provide a starting choice provides consumers with limited rights to opt out of point for designing a new privacy regulatory regime. certain uses of their personal information. Companies that break these promises may be subject to an FTC investigation. Based on this analysis, the paper describes what a sample This paper argues that this current approach to regulating privacy program might look like including the types of privacy is not effective and needs to be revisited. evidence that could be maintained to demonstrate compliance. An accountability analysis of three recent FTC enforcement The current approach places too much burden on the actions illustrates how this approach might work in practice. individual, frequently deals with harm only after the fact, and has failed to motivate organizations to proactively prevent While current security laws provide a good starting point, privacy or security incidents resulting from their also raises new implementation challenges that will processing activities. need to be addressed including the absence of standards for ―reasonable privacy,‖ identifying the types of records As an alternative, the paper proposes augmenting the current organizations need to maintain to document their compliance approach with new regulations based on accountability where with the regulations, and how firms with different contexts firms are delegated responsibility to develop risk management should operationalize fair information principles. programs for privacy tailored to their individual circumstances. More at http://prn.to/nmCEv4 Volume 10, Issue 33 September 9, 2011 Page 9

Reports and Papers - (cont.)

Toward an Epistemology of ISP Secondary Liability and the question of corporate knowledge is generally under By Dan L. Burk, University of California theorized. But consideration of ISP 'knowledge' in this context points the way to consideration of corporate epistemology that Abstract must be foundational to determining corporate responsibility in copyright protection. At common law, contributory infringement for copyright infringement requires 'knowledge' of the infringing activity by Introduction a direct infringer before secondary liability can attach. In the United States, the 'safe harbor' provisions of the Digital Law and legal procedure function in society as a system of Millennium Copyright Act, that shield Internet Service formalized ethics, bestowing rights and imposing Providers (ISPs) from secondary copyright liability, are responsibilities on the entities under their jurisdiction. The concomitantly available only to ISPs that lack the common law responsibilities that are either undertaken or imposed on an knowledge prerequisites for such liability. But this leads to the Internet Service Provider (ISP) will frequently have their origin question of when a juridical corporate entity can be said to in such legal requirements. Among the legal duties and have 'knowledge' under the statute. liabilities associated with provision of Internet services is some degree of responsibility for the activity of subscribers and users Legal institutions have well-established processes for inferring of the service. Across the globe, ISPs have with varying degrees the knowledge state of natural persons, but corporations are of success been subjected to lawsuits, legislation, and complex sociotechnical networks of human and non-human regulation for failure to police a range of user content that elements whose information state does not map well onto such includes libel, threatening speech, hate speech, and inferential methods. This question is of course not unique to unauthorized posting or distribution of copyrighted material. copyright liability; corporate entities may be responsible for 'knowing' actions under a variety of applicable legal provisions, More at http://bit.ly/oJC3vN

The Changing Face of Trust in Health Websites assess online trust across a number of domains including By Liz Sillence, Phoenix Mo, & Pamela Briggs, University of health (Briggs et al., 2002). The data from the questionnaire Northumbria at Newcastle; Peter R. Harris, University of was used to develop a staged model of trust. This model noted Sheffield that design factors and visual appeal appeared to be strong Abstract predictors of early rejection and mistrust of a health website whilst content features such as source credibility and Over the last ten years the number of people using the Internet personalisation appeared to be more predictive of trust and for health information and advice has grown rapidly. Many selection. people trust the information and advice they find online although this trust may be misplaced. Indeed in a systematic In 2005 the researchers sampled online health consumers meta-analysis of health website evaluations, 70% of studies again with two main objectives. Firstly, to generate an updated concluded that quality is a problem on the Internet (Eysenbach picture of the online health landscape, providing information et al., 2002). on the kinds of websites people were accessing and the types of information they were seeking. Secondly, to build upon the In the face of such variable quality, how do health consumers original staged model of trust and so increase understanding of decide whether or not to trust the information and advice they the process by which trust perceptions are translated into find online? To address this question a review of Internet relevant behaviour. To these ends a revised trust questionnaire health use over the last ten years has been instigated with the was developed reflecting the importance of both design and intention of examining the attitudes and behaviour of online social identity issues. In addition questions specific to e-health health consumers at 5 year intervals. This paper reports on the (notably perceived threat, coping, and information checking findings of that decade in e-health. and corroboration) were included.

In the year 2000 a large scale questionnaire was developed to More at http://bit.ly/nlgmgj Volume 10, Issue 33 September 9, 2011 Page 10

Reports and Papers - (cont.) brought about by technological advances in the last century. The Internet as a Celestial TiVo These then-novel forms of entertainment diffused throughout By Stan J. Liebowitz & Alejandro Zentner, University of Texas countries and populations at varying rates depending on wealth, technological sophistication, government policy and It appears that the Internet is soon going to fulfill its potential other country characteristics. to become a giant on-demand repository of television shows (and movies) available asynchronously. As companies such as The Internet is currently the new technology on the block. The Netflix and Hulu increase their activities in this sphere, there Internet may not have changed everything, as was commonly are many unanswered questions about the impacts of this suggested during the heyday of the tech bubble, but it is transition. In this paper we attempt to foretell the impact of changing many aspects of daily life (Brynjolfsson and Smith this shift on one key aspect of television viewing: the amount 2000; Goolsbee 2000), including communications, of time viewers devote to it. We use cable and satellite advertising, distribution, and the focus of this paper, television television‘s impact on viewing as a proxy for the likely impact viewing. The Internet has already shown that it can greatly that future Internet transmission of programs will have. Using alter entertainment activities by allowing users experiences country-based panel data going back to the mid 1990s we find that were not previously available, such as social networking that the increased variety brought about by cable and satellite and altering other traditional activities, such as music listening has had virtually no impact on time devoted to television with sites such as Pandora or Spotify. viewing. We discuss the import of this finding for Internet business models of television transmission. Our interest in this paper is to examine how the Internet is likely to influence one aspect of the most popular Recreational activities are often greatly changed by new entertainment activity of all: television viewing. technologies—the current leading recreational activities— watching movies and television, listening to radio—were all More at http://bit.ly/nPKr3s

To Track or 'Do Not Track': Advancing Transparency and Individual Control implementing user choice in the context of online privacy. in Online Behavioral Advertising Practical progress advancing user privacy will be best served if By Omer Tene, College of Management - School of Law, policymakers and industry focus their debate on the desirable Israel & Jules Polonetsky, balance between efficiency and individual rights and if businesses implement tracking mechanisms fairly and Abstract responsibly. Policymakers must engage with these underlying The past decade has seen a proliferation of online data normative questions; they cannot continue to sidestep these collection, processing, analysis and storage capacities leading issues in the hope that ―users will decide‖ for themselves. businesses to employ increasingly sophisticated technologies to track and profile individual users. The use of online Introduction behavioral tracking for advertising purposes has drawn For many years, internet users considered online activity to be criticism from journalists, privacy advocates and regulators. confidential, their whereabouts protected by a veil of Indeed, the behavioral tracking industry is currently the focus anonymity. This approach was best captured by the famous of the online privacy debate. New Yorker cartoon-cum-adage ―On the internet, nobody knows you're a dog‖. The reality alas is quite different. The At the center of the discussion is the Federal Trade actions of most internet users, every search, query, click, page Commission‘s Do Not Track (DNT) proposal. The debate view and link, are logged, retained, analyzed and used by a raging around DNT and the specific details of its host of third parties, including websites (also known as implementation disguises a more fundamental disagreement ―publishers‖), advertisers, and a multitude of advertising among stakeholders about deeper societal values and norms. intermediaries, including ad networks, ad exchanges, analytics Unless policymakers address this underlying normative providers, re-targeters, market researchers, and more. question – is online behavioral tracking a social good or an unnecessary evil – they may not be able to find a solution for More at http://bit.ly/qtJ5Hc Volume 10, Issue 33 September 9, 2011 Page 11

Reports and Papers - (cont.) human data trail now begins prior to conception and continues A Day in the Digital Life: A Preliminary after death. We aim to develop a methodology to enable us to Sousveillance Study quantify this trail and to examine the impact that such amassment of data has on society, communities, and personal By Gordon Fletcher, Marie Griffiths, & Maria Kutar, University of Salford identities within the UK. The reality is that the digital footprint is a significant research challenge to identify and then Abstract quantify. There is a critical need to capture relevant activities in a holistic and interconnected manner in order to enable A decade ago, Castells argued that most surveillance would understanding of the societal implications. We describe a have no directly damaging consequences. He proposed that preliminary study which will be used as a starting point to what should be of more concern were the unpredictable develop appropriate methods for quantification and analysis of consequences of our over-exposed lives, the lack of explicit the 21st century digital footprint. rules for on-line behaviour and how this then was interpreted by a ‗multitude of little sisters‘ who process and store this Finding the Digital Footprint information, forever (Castells 2001:180). A decade later, these conjectures are still valid but are now at a critical level as There is a lack of established functional research individuals passively volunteer personal information while methodologies that provide sufficient structure or clarity of government and commercial organisations aggressively amass resolution to aid the collection and analysis of data these snippets into correlated data. surrounding individual digital footprints. Attempting to track and document an individual‟s digital footprint requires a high As boundaries between on-line and off-line blur, and geo- degree of methodological pluralism given that data is drawn locative applications grow in popularity, we echo Castells by from a diverse range of digital and analogue settings. asking, what will be, and what are, the privacy implications of existing in a technologically saturated environment? The More at http://bit.ly/qCZMRb

Balancing Privacy, Autonomy, and Scientific human experimentation, the traditional, autonomy-dominated Needs in Electronic Health Records Research model should give way to one that emphasizes the common good. In record-based studies, the limited benefits of By Sharona Hoffman & Andy Podgurski, Case Western individual informed consent come at too high a cost - difficult Reserve University administrative burdens, significant expenses, and a tendency Abstract to create selection biases that distort study outcomes.

The ongoing transition from paper medical files to electronic Other mechanisms can better protect data subjects‘ privacy health records will provide unprecedented amounts of data for and dignitary interests without compromising research biomedical research, with the potential to catalyze significant opportunities. advances in medical knowledge. In this Article, we formulate a novel, mufti-faceted approach to But this potential can be fully realized only if the data available achieve these ends. This approach recognizes that technical to researchers is representative of the patient population as a means for achieving identity concealment and information whole. Thus, allowing individual patients to exclude their security are necessary but not sufficient to protect patients‘ health information, in keeping with traditional notions of medical privacy and foster public trust while facilitating informed consent, may compromise the research enterprise research. Hence, we call for supplementing such means with and the medical benefits it produces. (1) an oversight process that is tailored to record-based research and applies even to De-identified patient records, This Article analyzes the tension between realizing societal which are currently exempt from scrutiny, and (2) public benefits from medical research and granting individual notice and education about the nature and potential benefits of preferences for privacy. It argues for a shift in the conceptual such research. and regulatory frameworks that govern biomedical research. When studies involve electronic record review rather than More at http://bit.ly/ot7CmV Volume 10, Issue 33 September 9, 2011 Page 12

Reports and Papers - (cont.)

Considering Privacy as a Public Good and its Policy Ramifications for Business Organizations

By Shaheen Borna, Ball State University & Dheeraj Sharma, University of Winnipeg (4) If the answer to question three is in affirmative, what are Abstract the philosophical and legal foundations of that right?

The main objective of this study is to discuss the ramifications (5) How can an individual's privacy be invaded? of considering privacy as a public good for business organizations. (6) Is privacy right an individual right or does it have a societal value? Using an extensive literature review, an attempt to achieve this objective is made by trying to answer the following questions: (7) What are the reasons for considering privacy as a public good? (1) What are the historical and philosophical roots of privacy? Finally, the article offers prescriptive insights for organizations (2) How is the concept of privacy defined and what are the to successfully obtain information from consumer while controversies surrounding different definitions of privacy? respecting their privacy.

(3) Does an individual have a ? More at http://bit.ly/qWxSsv

U.S. Exports of Advanced Technology Products Comparison of data from 2010 with data from 2009 reverses Declined Less Than Other U.S. Exports in 2009 this picture. U.S. ATP exports showed signs of recovery, advancing by 11% over 2009. But other types of U.S. exports By Derek Hill, National Science Foundation expanded at twice that rate (23%) (figure 1).

This InfoBrief presents recent trends in U.S. advanced The economic impact was far more severe during the 2008–09 technology product (ATP) exports. It uses U.S. Census Bureau recession than during the 2001 recession. However, in the data available through 2010 to examine the changes in these more recent recession the downturn of U.S. ATP exports was exports during the recent U.S. recession ("2008–09 relatively milder and the recovery of these exports was recession") and to offer a brief comparison between the 2008– relatively faster (figure 2). 09 recession and the 2001 recession. Similarly, the U.S. computer and electronics industry, a major It focuses on 4 of the 10 ATP areas defined by the Census source of U.S. ATP exports, showed a shorter and shallower Bureau. These are aerospace, electronics, information and decline in production in the 2008–09 recession when communications technology (ICT), and life science, which compared with the 2001 recession. together accounted for 85% of U.S. ATP exports in 2010. This InfoBrief also describes U.S. ATP trade with selected major U.S. Advanced Technology Product Exports: Four Selected economies and regions. Technologies

U.S. ATP exports contracted 9% during the recent U.S. U.S. ATP exports varied between the recent recession (2008– recession, from $270 billion in 2008 to $245 billion in 2009 09) and the period surrounding the end of the recent recession (figure 1 and tables 1 and 2)—less than half the 20% rate of loss (2009–10) among the four largest technologies—aerospace, of non-ATP exports, excluding petroleum. U.S. ATP imports electronics, ICT, and life science (table 2). fell by the same percentage as exports, whereas other types of U.S. imports contracted by 24%. More at http://1.usa.gov/n3IyGj Volume 10, Issue 33 September 9, 2011 Page 13

Reports and Papers - (cont.)

Intelligence to Protect the Homeland...Taking In that environment, there was no perceived need for a robust Stock Ten Years Later and Looking Ahead... national intelligence gathering capability within the U.S. for any purpose other than catching Soviet-era spies and serious By the Homeland Security Intelligence Council, Intelligence drug traffickers. and National Security Alliance

Introduction While other criminal activities presented challenges, they were handled relatively well by a complex, well-trained and In the aftermath of the tragic events of 9/11, Americans slowly decentralized law-enforcement system operating under strict came to the realization that while the country had spent Constitutional and other legal norms. Prior to 9/11 some considerable national treasure on intelligence capabilities over observers expressed concerns about threats at home due to the years to protect the nation and had prevailed in the Cold globalization, the changing dynamics of immigration, and the War for which the U.S. Intelligence Community (IC) had rise in extremism and radicalization associated with ethnic largely been designed, this IC was not designed, equipped, or strife, poverty, and lack of opportunity in many parts of the ever primarily intended to detect significant national security post-Cold War world. threats originating or residing within our nation‘s own borders. Instead, it had been a longstanding and unique set of Still, no one advocated for a significant domestic intelligence circumstances that had allowed Americans the good fortune of capability to address them. That all changed on September 11, feeling safe within those borders. 2001.

This sense of security was facilitated by two oceans and the Following the 9/11 attacks, the need for a better domestic Gulf of Mexico; two friendly neighbors to the north and south intelligence capability to keep Americans safe without violating along relatively peaceful land borders; and a long history their privacy, civil rights, and civil liberties was obvious, but wherein immigrants, who are the lifeblood of this nation, came how to achieve it was not. for opportunity and a hopeful future for their children, not to try to destroy the nation. More at http://bit.ly/qYJLwG

Study: Nearly Half of Personal-Computer confused about what is legal. For example, 47 percent of Users Steal Software respondents incorrectly believed that it is legal to buy a single By Josh Smith, National Journal software license and then install it on multiple computers, according to the report. Almost half of the world‘s personal-computer users rely almost exclusively on pirated software, according to a study ―The evidence is clear: The way to lower software piracy is by commissioned by the Business Software Alliance. educating businesses and individuals about what is legal—and ramping up enforcement of intellectual property laws to send The study, conducted by Ipsos Public Affairs, found that 47 clearer deterrent signals to the marketplace,‖ BSA President percent of personal-computer users worldwide acquire Robert Holleyman said in a statement. software illegally most or all of the time. Thirteen percent of those surveyed said they would use only legal software, According to the data, an average software pirate would be an according to the Ipsos survey of 15,000 computer users in 32 ―18-to-34-year-old man who lives in China, works at a countries company with less than 100 employees, and uses a computer in his job.‖ Developing countries have a higher rate of illegal software use, including China, where 86 percent of computer users are BSA reported that $59 billion worth of software was stolen in regular software pirates. The countries with the most offenders 2010. The White House and members of Congress have called were China, Nigeria, Vietnam, and Ukraine. for tougher penalties for people who steal copyrighted material online, but updated legislation has yet to be approved. The survey, billed by BSA as the most extensive study of software theft ever, also discovered that many people are More at http://bit.ly/qm7L0t Volume 10, Issue 33 September 9, 2011 Page 14

Points of View

Political Repression 2.0

By Evgeny Morozov, The New York Times companies, fostered by Western governments for domestic surveillance needs, have helped suppress them. Agents of the East German Stasi could only have dreamed of the sophisticated electronic equipment that powered Col. Libya is only the latest place where Western surveillance Muammar el-Qaddafi‘s extensive spying apparatus, which the technology has turned up. Human rights activists arrested and Libyan transitional government uncovered earlier this week. later released in Bahrain report being presented with The monitoring of text messages, e-mails and online chats — transcripts of their own text messages — a capacity their no communications seemed beyond the reach of the eccentric government acquired through equipment from Siemens, the colonel. German industrial giant, and maintained by Nokia Siemens Networks, based in Finland, and Trovicor, another German What is even more surprising is where Colonel Qaddafi got his company. spying gear: software and technology companies from France, South Africa and other countries. Narus, an American Earlier this year, after storming the secret police headquarters, company owned by Boeing, met with Colonel Qaddafi‘s people Egyptian activists discovered that the Mubarak government just as the protests were getting under way, but shied away had been using a trial version of a tool — developed by from striking a deal. As Narus had previously supplied similar Britain‘s Gamma International — that allowed them to technology to Egypt and Saudi Arabia, it was probably a matter eavesdrop on Skype conversations, widely believed to be safe of public relations, not business ethics. from wiretapping.

Amid the cheerleading over recent events in the Middle East, And it‘s not just off-the-shelf technology; some Western it‘s easy to forget the more repressive uses of technology. In companies supply dictators with customized solutions to block addition to the rosy narrative celebrating how Facebook and offensive Web sites. Twitter have enabled freedom movements around the world, we need to confront a more sinister tale: how greedy More at http://nyti.ms/o18yRs

A Federal Jump-start for Health IT assistant health commissioner in New York City. He spoke Farzad Mostashari leads push to improve with Technology Review's chief correspondent, David Talbot, about when we'll start seeing evidence that the technology is health-care IT with billions in stimulus funds. working. By David Talbot, Technology Review TR: What problems are we attacking with this huge medical In a landmark government effort to drive American health care IT outlay? into the information age, the February 2009 stimulus bill earmarked about $30 billion in incentives for doctors and Mostashari: Start with "First, do no harm." Right now we do hospitals who install electronic medical records—paying up to harm to patients through health care. The estimates, conserva- $63,750 to individual physicians and millions to hospitals. tively, are 100,000 to 200,000 people killed each year by things like hospital-acquired infections and adverse drug Now comes the tough part: implementing "EMRs" and proving events. they really can reduce medical errors or get doctors to keep better track of chronically ill people. Electronic medical records provide an opportunity to create standardized protocols, to provide decision support and re- As National Coordinator for Health IT, Farzad Mostashari minders for doctors, and to tell them about the patient's medi- oversees federal efforts to promote adoption of EMRs and to cations and drug allergies, as well as any dangerous drug inter- prod reluctant hospitals to share patient data. actions, at the point of care. Those are all proven interventions.

Mostashari was recruited to take over the federal effort in More at http://bit.ly/ocdPVD Volume 10, Issue 33 September 9, 2011 Page 15

Points of View - (cont.)

A Digital 9/11 Might Be Under Way Already

By Kevin McCaney, Government Computer News

The impact of the 2001 terrorist attacks has been nearly decade, work and personal business has moved increasingly universal, affecting everything from individual lives to global online, shadowing a boom in interactive websites, social media politics in ways that will be recounted, examined and analyzed platforms and mobile communications. And aside from spam, everywhere as we approach the 10th anniversary of the attacks. cyber theft and other criminal activities that would be with us regardless, the threat of terrorism, espionage and attacks on In terms of IT, its impact can be summed up in three words: critical infrastructure has expanded online. security, security and security. You need only look at some recent, high-profile attacks to see In the past decade, IT systems have become more integral than how the landscape has changed. The Stuxnet worm, for one, is ever to military and homeland security operations. The an example of a finely tuned, targeted attack that can inflict Defense Department has moved steadily toward integrated, damage on an industrial system, such as a nuclear facility in networked operations, reaching from command centers to Iran. The suspicion that the United States and/or Israel was networked warfighters on the battlefield. Homeland security behind Stuxnet has not been confirmed, but regardless of who efforts — whether related to borders, travel, shipping or cross- was behind it, the existence of such a sophisticated piece of jurisdictional data sharing — run on information systems. And malware means that something similar could be used against security underpins every aspect of them. U.S. systems.

And then there is the increasingly urgent matter of cyber Other recent attacks on government agencies and contractors defense. have taken a targeted, spear-phishing approach to gaining entry to networks before making off with sensitive Certainly, cybersecurity has been a concern for as long as information. there‘s been a World Wide Web, and it would be at the top of any IT worry list if the attacks hadn‘t happened. But in the past More at http://bit.ly/pEYHfN

How 9/11 Transformed intelligence agencies failed to link critical fragments of information that could have revealed al Qaeda's plot, and the Intelligence Community prevented the attacks, began to take hold. It's no longer about 'need to know.' Our guiding The criticisms hit the intelligence community hard. Piecing principle is 'responsibility to share.' together shards of information to gain a better understanding By James R. Clapper, The Wall Street Journal of our adversaries' capabilities and intentions is a mission- critical function of the intelligence community, and a core It has been a decade since our nation suffered the greatest competency of intelligence professionals. strategic surprise on American soil since the attack on Pearl Harbor. In the aftermath of September 11, as the country Prior to the 9/11 attacks, the community had recognized that sought to understand how such a complex attack could go reorganization, integration of intelligence activities, and a shift undetected, much attention was focused on the intelligence in intelligence culture was necessary to adapt to evolving community. Pundits, scholars, commentators and others threats. But progress on these initiatives came slowly—too quickly labeled 9/11 an intelligence failure. slowly to impact the events of 9/11.

Some suggested that on 9/11 the intelligence community was The intelligence community got the message. Ten years later, still operating in a Cold War mindset with too much of its we have made great strides in addressing the shortfalls that attention and resources focused on threats from nation-states. plagued us that tragic day. Others argued that intelligence agencies were resistant to change and unwilling to work together. The belief that More at http://on.wsj.com/oFBcGi Volume 10, Issue 33 September 9, 2011 Page 16

Points of View - (cont.)

Information Sharing in 2011 and Beyond: Remaining Challenges and Opportunities

By Rick “Ozzie” Nelson, Center for Strategic and International Information Sharing Environment, seek to embrace ―the Studies totality of terrorism related-information sharing‖ (http:// www.ise.gov/national-information-sharing-environment- This summer, the CSIS Homeland Security and strategy). At the same time, though, the new strategy Counterterrorism Program begins its second annual year-long document and larger information sharing regime will have to series on information sharing in security and grapple with recent criticism that expanded sharing has gone counterterrorism, sponsored by IBM. Last year‘s events too far. Such criticism has been propelled by WikiLeaks‘ illegal examined information sharing from a range of perspectives. disclosure of hundreds of thousands of classified U.S. Among the topics explored was the role of information sharing government documents in 2010. Especially troubling was the in federal, state, and local counterterrorism cooperation; in release of several hundred thousand State Department cables, national border security efforts; and in the use of new which were allegedly accessed by a U.S. Army private serving technologies by government and the private sector. in Iraq—an individual whose narrow, tactical responsibilities should not have necessitated such broad access to sensitive This year‘s series begins as the Obama administration drafts diplomatic information. the National Information Sharing Environment Strategy, which builds on the October 2007 National Strategy for In the aftermath of last year‘s leaks, the Departments of Information Sharing. The formulation of a new strategy Defense and State, along with other federal entities, took swift document is coming at an appropriate time given the 10th action to close the most glaring technical and policy loopholes anniversary of the September 11 attacks. 9/11 catalyzed that allowed such a massive document disclosure. The Defense sweeping legislation—particularly the 2004 Intelligence Department, for instance, limited the ability of individuals to Reform and Terrorism Prevention Act—that changed the way use removable media like compact discs to remove data from government agencies share terrorism-related information. In classified networks. the spirit of those reforms, the updated national strategy will, in the words of the Program Management Office for the More at http://bit.ly/ondqk3

Accelerating Discovery by Outsourcing the Mundane: An Interview with Ian Foster international ISC Cloud'11 conference end of September in By Wolfgang Gentzsch, HPC In the Cloud Germany which will focus on big data and high performance computing, or, short, HPC in the Cloud. What kind of HPC are On September 26 – 27, 2011 cloud computing experts and end- you addressing these days which is worth discussing in keynote users from around the world will gather at the ISC Cloud‘11 lecture? Conference at the Dorint Hotel in Mannheim, Germany. The conference will focus on compute and data intensive Foster: I am delighted to be invited to speak at ISC Cloud'11, applications, their resources needs in the cloud, and strategies because it gives me an opportunity to speak to my current on implementing and deploying cloud infrastructures. passion, which is the vital role that software as a service (SaaS) can play in accelerating discovery. ISC Cloud Conference Chairman Wolfgang Gentzsch spoke with Ian Foster, Director of the Computation Institute, a joint Most discussion of computational science ("HPC") and cloud institute of the University of Chicago and Argonne National emphasizes on-demand computing and storage. But if we focus Laboratory. He is also an Argonne Senior Scientist and on hardware alone, we miss the real benefits of the large-scale Distinguished Fellow, and the Arthur Holly Compton outsourcing and consequent economies of scale that cloud is Distinguished Service Professor of Computer Science at the about. The biggest IT challenge facing research today is University of Chicago. The Conference Early Bird registration complexity. Certainly, big data demands new storage and ends August 31. computing solutions.

HPCc: Can, you will be the Keynote Speaker at the second More at http://bit.ly/qr4evg Volume 10, Issue 33 September 9, 2011 Page 17

Internet Governance

China State Paper Urges Internet

Rethink to Gag Foes

China's Communist Party control is at risk unless the government takes firmer steps to stop Internet opinion being shaped by increasingly organized political foes, a team of party writers warned in a commentary published on Friday.

By Chris Buckley, Reuters

The long commentary in the overseas edition of the People's Daily, the main newspaper of China's ruling Communist Party, added to signs that Beijing, jolted by the growing audience and influence of Twitter-like microblogging websites, is weighing fresh ways to tame and channel online opinion. Customers use computers at an internet cafe in Hefei, Anhui province, January 25, 2010. Chinese officials and media have recently complained about the spread of damaging and unfounded "rumors" on the Internet. [ID:nL4E7JU152] But this commentary raised the political stakes by arguing that organized, subversive opponents are exploiting tardy regulation to inflame opinion growth of microblog, or "weibo," users, who reached 195 and spread their views. million by the end of June, an increase of 209 percent on the number at the end of 2010. The commentary urged changes in how China controls Internet innovations. But a preface to the newspaper commentary singled out a recent string of public uproars that have spread through "Internet opinion is spontaneous, but increasingly shows signs microblogs, especially the "Weibo" site of Sina Corp, which of becoming organized," said the commentary, written by a dominates the sector in China. team of writers for the Communist Party's top theoretical journal, "Qiushi," which means "Seeking Truth." Those uproars included a bullet train crash in July that drew outrage aimed at government officials over evasive statements, "Among the many controversies stirred up on the Internet, safety failures and the feverish expansion of high-speed rail. many are organized, with goals and meticulous planning and direction, and some clearly have commercial interests or A “Light” Hand political intentions in the background," said the commentary. That sort of growth is a key reason why investors remain "Unless administration is vigorous, criminal forces, hostile cautiously optimistic -- for the long term -- on Internet and forces, terrorist organizations and others could manipulate social-media players such as Sina, Tencent and RenRen Inc, public sentiment by manufacturing bogus opinion on the billed as a Chinese version of Facebook. Internet, damaging social stability and national security." Wall Street hopes that rapid growth in mobile and social- A commentary in the People's Daily does not amount to a media adoption in -- the world's second-largest Internet government policy pronouncement, and indeed this one may market and already the biggest social-media playground by reflect a more conservative current in official debate. But it users -- will offset persistent fears about a widespread adds to signals that Beijing is leaning to tougher controls. crackdown on Weibo or other rapidly expanding media.

China already heavily filters the Internet, and blocks popular Sina's shares on the Nasdaq slid more than 3 percent to foreign sites such as Facebook, YouTube and Twitter. $100.95 in afternoon trading, while RenRen was off 1 percent.

The People's Daily commentary did not single out the explosive More at http://reut.rs/onFyLK Volume 10, Issue 33 September 9, 2011 Page 18

September Calendar of Events Sun Mon Tue Wed Thu Fri Sat SEPTEMBER 11-13 28 29 30 31 01 02 03 Transform 2011: Designing Solutions. Inspiring Health. Mayo Clinic hosts this premier multidisciplinary event focusing on innovations and designing solutions 04 05 06 07 08 09 10 to transform the experience and delivery of health care. An expected audience of approximately 1,000 attendees from around the world to participate in person — thousands more will engage online. There will be ample opportunities for networking 11 12 13 14 15 16 17 and collaborations, numerous surprises, and incredible talks from world renowned experts in their field. 18 19 20 21 22 23 24 Location: Rochester, MN 25 26 27 28 29 30 01 More at http://centerforinnovation.mayo.edu/transform/index.html

SEPTEMBER 13 9:30 - 11:00 AM. The Information Technology and Innovation Foundation (ITIF) will host a panel discussion titled "Spectrum Policy for Innovation". The speakers will be Richard Bennett (ITIF), Larry Downes (TechFreedom), and Blair Levin Featured Conference (Aspen Institute). ITIF will be unveiling a report that advocates a set of policies that of the Week will make more spectrum available to innovative uses. It proposes to accelerate the re -assignment of spectrum from legacy single-purpose networks such as over-the-air TV to high-demand, multi-purpose networks such as mobile broadband. Incentive The Digital Agenda Summit auctions, a second DTV transition, clear spectrum rights, and reassignment of government spectrum to public use are key recommendations. Towards a Common Goal: Location: Washington, DC

Achieving a Sustainable More at http://www.itif.org/events/spectrum-policy-innovation

Internet Model 10:00 AM. The Senate Homeland Security and Governmental Affairs Committee (SHSGAC) will hold a hearing titled "Ten Years After 9/11: Are We Safer?". The witnesses will be Janet Napolitano (Secretary of Homeland Security), Robert Mueller OCTOBER 3, 2011 (FBI Director), and Matthew Olsen (Director of the National Counterterrorism Center). As fully recognised by the EU 2020 Location: Washington, DC Strategy and the Digital Agenda, the Internet is increasingly changing our More at http://1.usa.gov/obVD7d daily lives in a positive way and used as SEPTEMBER 15 a key enabler for industry sectors and 9:00 - 11:00 AM. The Information Technology and Innovation Foundation (ITIF) contributor to societal challenges such will host a panel discussion titled "Explaining International Leadership in as climate change and an ageing Electronic Identification Systems". The speakers will be Daniel Castro (ITIF) population. High performance networks and Jeremy Grant (NIST). Countries around the world are investing in electronic providing fast access to innovative, identification systems to increase e-commerce, improve cybersecurity and enhance online government services. Technologies including mobile phones, smart cards quality services and products are and digital certificates enable individuals to more securely authenticate to online essential for the success of the Digital services and sign digital messages. Agenda for Europe. Location: Washington, DC

The exponential growth in data traffic More at http://bit.ly/nZPI4h over fixed and mobile broadband networks, driven mainly by over-the- SEPTEMBER 16 top (OTT) applications such as video, 8:30 - 10:00 AM. Rep. Mike Rogers (R-MI), Chairman of the House Intelligence Committee (HIC), will give a speech titled "The Evolution of American requires huge investment in order to Intelligence and National Security in the Decade since 9/11". Webcast. Free. deploy additional network capacity. Location: American Enterprise Institute (AEI), Washington, DC

More at http://bit.ly/nAu2qp More at http://bit.ly/ofabYj Volume 10, Issue 33 September 9, 2011 Page 19

Sites Compendium Book Review www.computerworld.com Imagery in the 21st Century www.eweek.com By Oliver Grau and Thomas Veigl, MIT Press www.ftconferences.com We are surrounded by images as never before: on Flickr, Facebook, and YouTube; on thousands of television channels; www.gcn.com in digital games and virtual worlds; in media art and science. www.healthcareitnews.com Without new efforts to visualize complex ideas, structures, and systems, today‘s information explosion would be www.hpcinthecloud.com unmanageable. The digital image represents endless options for manipulation; images seem capable of changing www.informationweek.com interactively or even autonomously. This volume offers www.infosecurity-us.com systematic and interdisciplinary www.innovationwatch.com reflections on these new image www.mckinseyquarterly.com worlds and new www.nationaljournal.com analytical approaches to www.nsf.gov the visual. www.nytimes.com Imagery in the www.openthegovernment.org 21st Century examines this www.prnewswire.com revolution in various fields, www.reuters.com with researchers www.sfgate.com from the natural sciences and the www.technologyreview.com humanities meeting to www.wsj.com achieve a deeper understanding of the meaning and impact of the image in our time.

The contributors explore and discuss new critical terms of multidisciplinary scope, from database economy to the dramaturgy of hypermedia, from visualizations in neurosciences to the image in bio art. They consider the power of the image in the development of human consciousness, Research and Selection: Stefaan Verhulst pursue new definitions of visual phenomena, and examine new Production: Kathryn Carissimi & Lauren Hunt tools for image research and visual analysis. The goal is to expand visual competence in investigating new visual worlds Please send your questions, observations and suggestions to and to build cross-disciplinary exchanges among the arts, [email protected] humanities, and natural sciences. The views expressed in the Weekly Digest do not necessarily reflect those of the Markle Foundation. More at http://bit.ly/mWJAMg