National Academies Press: OpenBook
« Previous: D Keynote Speech: Networked Communities and the Laws of Cyberspace
Suggested Citation:"E Biographical Sketches." National Research Council. 1994. Rights and Responsibilities of Participants in Networked Communities. Washington, DC: The National Academies Press. doi: 10.17226/4814.
×

APPENDIX E Biographical Sketches

STEERING COMMITTEE

Dorothy E. Denning (steering committee chair) is a professor of computer science at Georgetown University, where she is currently working on policy and technical issues relating to cryptography and wiretapping, and has served as an independent reviewer of the government's escrowed encryption system. Before coming to Georgetown in 1991, she was a member of the research staff at Digital Equipment Corporation's Systems Research Center, a senior staff scientist at SRI, and an associate professor of computer science at Purdue University. She is author of Cryptography and Data Security and numerous papers on information security, and in 1990 received the Distinguished Lecturer in Computer Security Award. Dr. Denning is chair of the International Cryptography Institute sponsored by the National Intellectual Property Law Institute and cochair of the Association of Computing Machinery's Conference on Computer and Communications Security. She is past president of the International Association for Cryptologic Research. She received a Ph.D. degree in computer science from Purdue.

Anne Wells Branscomb is a member of the Center for Information Policy Research at Harvard University. She is a communications lawyer with practical experience representing broadcasters, cable television

Suggested Citation:"E Biographical Sketches." National Research Council. 1994. Rights and Responsibilities of Participants in Networked Communities. Washington, DC: The National Academies Press. doi: 10.17226/4814.
×

companies, database providers, semiconductor chip manufacturers, and publishers of newsletters, newspapers, and books. Ms. Branscomb is an honors graduate of the George Washington University Law School, holds degrees in political science from Harvard University and the University of North Carolina, spent a year as a visiting scholar at the Yale University Law School, and studied international relations at the London School of Economics as a Rotary Foundation Fellow. She has served as chair of the Communications Law Division of the American Bar Association's Science and Technology Section. She is also a member of the U.S. Department of Commerce Technical Advisory Board, a trustee of EDUCOM, a member of the Commission on Freedom and Equality of Access to Information, a trustee of the Pacific Telecommunications Council, and a contributing editor to the Information Society and the Journal of Communication.

Mitchell D. Kapor is cofounder and chair of the Electronic Frontier Foundation, an organization that works to develop and implement public policies to promote openness, diversity, and innovation in emerging electronic social environments. He is also chair of ON Technology, a developer of local area network applications for collaborative computing. He received a B.A. (psychology, linguistics, and computer science, 1971) from Yale College and an M.A. (psychology, 1978) from Beacon College, and studied management as a postgraduate at the Massachusetts Institute of Technology's Sloan School of Management (1979). Mr. Kapor is founder of the Lotus Development Corporation and served as its chief executive officer and president (1982-1984), and also chair (1984-1986). He is the designer of Lotus 1-2-3, Agenda, and many other software applications. Mr. Kapor is the chair of the Commercial Internet Exchange (CIX), a not-for-profit association involved in the development of arrangements and facilities that connect independent networking carriers into a global information infrastructure. Mr. Kapor served on the Computer Science and Telecommunications Board of the National Research Council. He is also an adjunct research fellow at Harvard University's John F. Kennedy School of Government in the area of information technology policy.

Stephen T. Kent is chief scientist, Security Technology, for Bolt, Beranek, and Newman Inc., where he works with commercial and government clients to develop solutions for network and computer security problems. He served as a member of the Internet Architecture Board from 1985 to 1994, and chairs the Privacy and Security Research Group of the Internet Research Task Force. Dr. Kent served on the Presidential SKIPJACK Review panel and various National Research Council

Suggested Citation:"E Biographical Sketches." National Research Council. 1994. Rights and Responsibilities of Participants in Networked Communities. Washington, DC: The National Academies Press. doi: 10.17226/4814.
×

technical panels, and was a member of the board of directors of the International Association for Cryptologic Research from 1982 to 1989. He received the S.M., E.E., and Ph.D. degrees in computer science from the Massachusetts Institute of Technology. He is the author of numerous articles on network security and has lectured on the topic throughout the United States, Europe, and Australia.

George M. Perry is vice president and general counsel for Prodigy Services Company, which he joined in 1984 (then called TRINTEX); he has oversight of issues relating to the rights and responsibilities of a commercial electronic information and transaction provider. He is also responsible for tracking federal and state regulatory policies as they relate to PRODIGY's provision of competitive services and technologies. He received a B.A. (1961) from Columbia University and a J.D. (1964) from the University of California at Berkeley. Mr. Perry is currently concentrating on issues and policies that impinge on the delivery of information services to the general public in the constantly changing technology and regulatory environment.

Suggested Citation:"E Biographical Sketches." National Research Council. 1994. Rights and Responsibilities of Participants in Networked Communities. Washington, DC: The National Academies Press. doi: 10.17226/4814.
×
Page 158
Suggested Citation:"E Biographical Sketches." National Research Council. 1994. Rights and Responsibilities of Participants in Networked Communities. Washington, DC: The National Academies Press. doi: 10.17226/4814.
×
Page 159
Suggested Citation:"E Biographical Sketches." National Research Council. 1994. Rights and Responsibilities of Participants in Networked Communities. Washington, DC: The National Academies Press. doi: 10.17226/4814.
×
Page 160
Rights and Responsibilities of Participants in Networked Communities Get This Book
×
Buy Paperback | $27.00
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

This book describes a number of social and legal issues as they relate to various members of electronically networked communities. After a brief introduction to relevant legal precedents and to the manner in which societies develop norms for social behavior, the book explores right and responsibilities related to free speech, vandalism, property interests, and privacy.

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    Switch between the Original Pages, where you can read the report as it appeared in print, and Text Pages for the web version, where you can highlight and search the text.

    « Back Next »
  6. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  7. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  8. ×

    View our suggested citation for this chapter.

    « Back Next »
  9. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!