CFP96 Lunchtime Workshops

Saturday, March 30

Conference registration includes box lunches each day. During the noon breaks, you are invited unwind and relax, or bring your box lunch and join one of several workshops. Here are the workshops scheduled for Saturday, March 30:

Policing Cyberspace

Led by with Bruce Sterling (author of the cyber-classic, The Hacker Crackdown, Law and Disorder on the Electronic Frontier) has commented that on the Net, cybercops are like shy woodland creatures. Just who are these people and what do they want to do to (and on) the Net. The concept of Cyber-Community Policing on the Net is going to have to begin with a dialog with these folks about their plans. Here's one place where it can start.

Privacy and Computerized Medical Records

Led by Medical record databases, and medical expert systems will become increasingly more important as funding for medical care becomes more scarce. In this seminar we will examine issues such as privacy, and access to the information, as well as the potential impact of such information on the quality of health care.

Export control of cryptography: What's Happened Since August 17, 1995?

Led by This workshop will examine cryptography export developments since the Clinton Administration's August 17, 1995 policy announcement on export of key escrow encryption. The workshop discussion will explore the technology, policy, and business dimensions of cryptography deployment in a networked world and consider the range of possible answers to the question: So what happens next? People who are interested in cryptography policy and exports should come to this workshop.

Workshop convener: Joan D. Winston (Trusted Information Systems, Inc.). Short presentations by Lance Hoffman (Institute for Computer & Telecommunications Systems Policy, The George Washington University), Melanie Janin (U.S. Council for International Business), and Joan Winston will be followed by group discussion and Q&A.

The 1994 and 1995 Office of Technology Assessment reports on information security and privacy are available in the OTA publication archives being maintained at Idaho State University archives at and Segments from and comments on the 1995 Springer-Verlag book, Building in Big Brother, by Lance J. Hoffman (Ed.), are available at:

The Anonymous Remailer Network: Building a Robust Infrastructure for Anonymity

Led by We'll cover the current anonymous remailer infrastructure, and the problems/threats which could cause it problems. We'll then look at the future of the remailer network, including payment systems and stronger digital mixing of the messages.

Futures of Networked Access to the White House: From Public Access Email to Deliberative Knowledge Webs

Led by This workshop will begin with a review the development of the current electronic presence of the White House and conclude with brainstorming about future possibilities.

In January 1993, the White House began distributing press releases over the Internet via email, FTP, and gopher. This was the first time these these documents were available directly to the general public without the intermediation of journalists and scholars, who, before then, were the primary users the hardcopy versions. In June 1993, the White House began accepting correspondence to the President via email. In October 1994, the White House unveiled a public Web site that provided interactive citizen access with graphical user interfaces. In January 1996, it was revised and extended. The White House Web site provides single point of access to the Federal government also included in-bound correspondence and out-bound publications interfaces and even virtual tours of the White House. In December 1994, The Vice President convened an Open Meeting on the National Performance Review enabled 4000 Federal workers to help formulate tactics for achieving bureaucratic reforms using an argument-structured hypertext.

With this background, the workshop will turn to the future. The brainstorming will look at how the correspondence function can provide more personalized interfaces, how public comment might be solicited on proposed policies, how White House documents might be linked into the process of government, and how Presidential campaigns might use argument hypertext to layout their views on issues.

Key challenges include:

Back to CFP96 home page
Last updated March 20, 1996