330 Index appliances (continued ) worries w<strong>it</strong>h, 106–7, 123–24, 150; smarter, 107; te<strong>the</strong>red, 3, 4, 5, 8–9, 59, 101–3, 106, 107. See also information appliances application layer, 67–69 application programming interface (API), 124, 184–85, 215 application space, 17 arch<strong>it</strong>ecture, as law, 108 ARPANET, 256–57n32 Association for Computing Machinery, 38 AT&T: centralized control structure <strong>of</strong>, 40; compet<strong>it</strong>ion <strong>of</strong>, 24; connect charges <strong>of</strong>, 23; and iPhone, 2, 182; long-distance network <strong>of</strong>, 40; and modems, 22–23, 25–26; as monopoly, 21, 81, 182; and online services, 23– 25; and outside innovations, 21–22, 82, 89, 121, 182; regulation <strong>of</strong>, 21, 81, 183, 221; telephone network controlled by, 21–24; and third-party hardware, 81; <strong>to</strong>ne frequency <strong>of</strong>, 40 ATMs (au<strong>to</strong>mated teller machines), 20 au<strong>to</strong>ma<strong>to</strong>ns, creation <strong>of</strong>, 211 Avvo, 320n97 Azureus, 121 ba<strong>it</strong> and sw<strong>it</strong>ch, 183, 184 Bank <strong>of</strong> America, 203–4 bank vaults, 32 Barlow, John Perry, 161 BBC (Br<strong>it</strong>ish Broadcasting Corporation), 121 BBS (bulletin board system) s<strong>of</strong>tware, 25–26 Beesley, Angela, 143 Benkler, Yochai, 91–92, 93, 98, 99, 146, 160, 192, 193, 206, 207, 228 Benner, Mary, 24 Berkman Center. See Harvard Univers<strong>it</strong>y, Berkman Center Berners-Lee, Tim, 95 Bessen, James, 190 Bidder’s Edge, 224, 225 biometric readers, 228 B<strong>it</strong>Torrent, 90, 121, 287n113 BlackBerries, 57, 101, 118, 176 Black Hat Europe hacker convention (2006), 56–57 blogs: from au<strong>to</strong>mated robots, 207–8; captcha boxes <strong>of</strong>, 207–8; censorship <strong>of</strong>, 113; Libertarian model in, 131; power <strong>of</strong>, 88, 95; spread <strong>of</strong>, 148, 151; <strong>of</strong> teens, 231 Blossom, 195–96 Bomis search engine, 133, 289n19 bookmarks, 58 books.google.com (Web s<strong>it</strong>e), 224–25, 242 Bork, Robert, 202 Bostic, Ke<strong>it</strong>h, 38 Bos<strong>to</strong>n College, data loss by, 204 botnets, 45–47 Boyle, James, 113 Bricklin, Dan, 2 Brin, David, 209 broadband: PC accessibil<strong>it</strong>y via, 4; remote updates <strong>of</strong>, 53; tragedies <strong>of</strong> <strong>the</strong> commons in, 158 Bro<strong>the</strong>r, “smart” typewr<strong>it</strong>ers, 19, 20, 34 browsers, development <strong>of</strong>, 29 Burning Man festival, 34 business, “long tail” <strong>of</strong>, 214 “Bus Uncle” <strong>of</strong> Hong Kong, 211 cable television, 181–82, 183 Camp, Jean, 160 Cap’n Crunch whistle, 40, 42 captcha boxes, 207–8, 227 cars. See mo<strong>to</strong>r vehicles Carter, Tom, 22 Carterfone, 22, 25, 26, 81, 121, 182 CB simula<strong>to</strong>r, 23 censorship, 105, 113–17; amplification <strong>of</strong>, 114–17; circumventing, 180; by commercial filtering programs, 114–
Index 331 15; and endpoint control, 125; Mill on, 98–99, 100; post hoc scrubs, 116; retroactive, 109 CERT/CC (Computer Emergency Response Team Coordination Center), 39, 147–48 chaos, in absence <strong>of</strong> law, 128 Chapman v. Un<strong>it</strong>ed States, 188 Chickasaw, Alabama, ownership <strong>of</strong>, 172 child abuse, online images <strong>of</strong>, 111 children: Children’s <strong>Internet</strong> Protection Act (CIPA), 325n148; Children’s Online Privacy Protection Act <strong>of</strong> 1998 (COPPA), 232; One Lap<strong>to</strong>p Per Child, 235–41, 244; restricted online use by, 232–33 China: Google in, 113, 147; information regulation in, 105, 108, 114, 147, 180, 196; surveillance in, 113; Wikipedia in, 144 Christensen, Clay<strong>to</strong>n, The Innova<strong>to</strong>r’s Dilemma, 83–84, 86 Christian Gallery News Service, 215 chuckroast.com, 170–71 C<strong>it</strong>izendium, 145 c<strong>it</strong>izen reporters, 216 Clark, David, 31, 156 Clarke, Richard, 51 clickworkers, 206 code: abstract concepts in, 190; and copyright infringement, 189–92; corruption <strong>of</strong>, 4, 43, 44; and cyberlaw, 104– 8, 197, 310n92; data paths separate from, 40–41; easy <strong>to</strong> wr<strong>it</strong>e, 19; embedded in<strong>to</strong> hardware, 13; good and useful, 31; outside, 4, 16–17, 56; poisoned, 189; proprietary, 192; renegade, 36–38; sharing <strong>of</strong>, 16; transmission <strong>of</strong>, 14; view source, 121; “west coast,” 105. See also worms and viruses code-backed norms, 223–28 code-based enforcement mechanisms, 105 code thickets, 188–92 collaboration, online, 95–96 commercial filtering programs, 114–15 common law, 110 commons, 78–79, 90 Communications Decency Act, 195 commun<strong>it</strong>arianism, 293n71 CompuServe, 23, 24, 27; central control by, 3, 7, 57, 74, 81, 82, 106–7; data paths <strong>of</strong>, 40–41; and Dig<strong>it</strong>al Millennium Copyright Act, 119; and dumb terminals, 41, 101–2; “Electronic Mall” <strong>of</strong>, 29–30; era at an end, 34, 174, 255n7, 256n24; and hyperlinks, 89; measurement in, 157 computers: cus<strong>to</strong>mized <strong>to</strong> user’s needs, 17, 30; “dumb” terminals, 15, 20, 41, 101–2; hardware and s<strong>of</strong>tware bundled in, 9; mainframes, 12, 15, 24, 57; minicomputers, 15; pr<strong>of</strong>essional management <strong>of</strong>, 17, 44; rogue applications for, 24; unbundling <strong>of</strong>, 12, 14; vendor programming, 8–9, 17 conduct rules, 122–23 Const<strong>it</strong>ution, U.S.: and anonymous speech, 213; and free speech, 114, 230; and gun control, 117; and privacy policies, 112, 185–86, 188; and private property, 172 constructionism (constructivism), 236– 37 consumer protection law, 177 content layer, 67 contextualization, 229–31 coordinate coexistence producing information, 207 COPPA (Children’s Online Privacy Protection Act <strong>of</strong> 1998), 232 copyright infringement, 111, 119–20, 175; and code production, 189–92; and content thickets, 192–93; and Creative Commons licenses, 225; and “creative cultural bricolage,” 192; and employment agreements, 189; patent thicket, 190–92; and peer-leveraging
- Page 2:
The Future of the Internet— And H
- Page 5 and 6:
A Caravan book. For more informatio
- Page 7 and 8:
vi Contents Part III Solutions—14
- Page 9 and 10:
viii Foreword porn on the Net. But
- Page 11 and 12:
x Preface to the Paperback Edition
- Page 13 and 14:
Introduction On January 9, 2007, St
- Page 15 and 16:
Introduction 3 Jobs was not shy abo
- Page 17 and 18:
Introduction 5 some might welcome t
- Page 19 and 20:
I The Rise and Stall of the Generat
- Page 21 and 22:
The Rise and Stall of the Generativ
- Page 23 and 24:
1 Battle of the Boxes Herman Holler
- Page 25 and 26:
Battle of the Boxes 13 Rethreading
- Page 27 and 28:
Battle of the Boxes 15 The business
- Page 29 and 30:
Battle of the Boxes 17 writing new
- Page 31 and 32:
2 Battle of the Networks As the pri
- Page 33 and 34:
Battle of the Networks 21 sumptions
- Page 35 and 36:
Battle of the Networks 23 collectin
- Page 37 and 38:
Battle of the Networks 25 expense o
- Page 39 and 40:
Battle of the Networks 27 The Inter
- Page 41 and 42:
Battle of the Networks 29 compatibi
- Page 43 and 44:
Battle of the Networks 31 cess and
- Page 45 and 46:
Battle of the Networks 33 tance. Be
- Page 47 and 48:
Battle of the Networks 35 proved by
- Page 49 and 50:
Cybersecurity and the Generative Di
- Page 51 and 52:
Cybersecurity and the Generative Di
- Page 53 and 54:
Cybersecurity and the Generative Di
- Page 55 and 56:
Cybersecurity and the Generative Di
- Page 57 and 58:
Cybersecurity and the Generative Di
- Page 59 and 60:
Cybersecurity and the Generative Di
- Page 61 and 62:
Table 3.1. Rankings of malicious ac
- Page 63 and 64:
Cybersecurity and the Generative Di
- Page 65 and 66:
Cybersecurity and the Generative Di
- Page 67 and 68:
Cybersecurity and the Generative Di
- Page 69 and 70:
Cybersecurity and the Generative Di
- Page 71 and 72:
Cybersecurity and the Generative Di
- Page 73 and 74:
Cybersecurity and the Generative Di
- Page 75 and 76:
II After the Stall In Part I of thi
- Page 77 and 78:
After the Stall 65 systems function
- Page 79 and 80:
4 The Generative Pattern Anyone can
- Page 81 and 82:
The Generative Pattern 69 themselve
- Page 83 and 84:
The Generative Pattern 71 istics, b
- Page 85 and 86:
The Generative Pattern 73 is. Barri
- Page 87 and 88:
Table 4.1. Examples of generative t
- Page 89 and 90:
The Generative Pattern 77 GENERATIV
- Page 91 and 92:
The Generative Pattern 79 Creative
- Page 93 and 94:
The Generative Pattern 81 We have a
- Page 95 and 96:
The Generative Pattern 83 machines
- Page 97 and 98:
The Generative Pattern 85 even smal
- Page 99 and 100:
The Generative Pattern 87 pipes to
- Page 101 and 102:
The Generative Pattern 89 work, 46
- Page 103 and 104:
The Generative Pattern 91 But indep
- Page 105 and 106:
The Generative Pattern 93 PowerPoin
- Page 107 and 108:
The Generative Pattern 95 RECURSION
- Page 109 and 110:
The Generative Pattern 97 adaptable
- Page 111 and 112:
The Generative Pattern 99 chained u
- Page 113 and 114:
5 Tethered Appliances, Software as
- Page 115 and 116:
Perfect Enforcement 103 wish to ope
- Page 117 and 118:
Perfect Enforcement 105 for when we
- Page 119 and 120:
Perfect Enforcement 107 for which o
- Page 121 and 122:
Perfect Enforcement 109 specific, u
- Page 123 and 124:
Perfect Enforcement 111 by purchase
- Page 125 and 126:
Perfect Enforcement 113 Governments
- Page 127 and 128:
Perfect Enforcement 115 ernment, th
- Page 129 and 130:
Perfect Enforcement 117 cle cannot
- Page 131 and 132:
Perfect Enforcement 119 text, but b
- Page 133 and 134:
Perfect Enforcement 121 party innov
- Page 135 and 136:
Perfect Enforcement 123 very least,
- Page 137 and 138:
Perfect Enforcement 125 Continuous
- Page 139 and 140:
6 The Lessons of Wikipedia The Dutc
- Page 141 and 142:
The Lessons of Wikipedia 129 alized
- Page 143 and 144:
The Lessons of Wikipedia 131 THE RI
- Page 145 and 146:
The Lessons of Wikipedia 133 “not
- Page 147 and 148:
The Lessons of Wikipedia 135 decidi
- Page 149 and 150:
The Lessons of Wikipedia 137 Qualit
- Page 151 and 152:
The Lessons of Wikipedia 139 does l
- Page 153 and 154:
The Lessons of Wikipedia 141 der th
- Page 155 and 156:
The Lessons of Wikipedia 143 text,
- Page 157 and 158:
The Lessons of Wikipedia 145 trator
- Page 159 and 160:
The Lessons of Wikipedia 147 “sem
- Page 161 and 162:
III Solutions This book has explain
- Page 163 and 164:
Solutions 151 make it more difficul
- Page 165 and 166:
7 Stopping the Future of the Intern
- Page 167 and 168:
Stability on a Generative Net 155 o
- Page 169 and 170:
Stability on a Generative Net 157 c
- Page 171 and 172:
Stability on a Generative Net 159 g
- Page 173 and 174:
Stability on a Generative Net 161 n
- Page 175 and 176:
Stability on a Generative Net 163 d
- Page 177 and 178:
Stability on a Generative Net 165 e
- Page 179 and 180:
Stability on a Generative Net 167 e
- Page 181 and 182:
Stability on a Generative Net 169 a
- Page 183 and 184:
Stability on a Generative Net 171 G
- Page 185 and 186:
Stability on a Generative Net 173 m
- Page 187 and 188:
8 Strategies for a Generative Futur
- Page 189 and 190:
Strategies for a Generative Future
- Page 191 and 192:
Strategies for a Generative Future
- Page 193 and 194:
Strategies for a Generative Future
- Page 195 and 196:
Strategies for a Generative Future
- Page 197 and 198:
Strategies for a Generative Future
- Page 199 and 200:
Strategies for a Generative Future
- Page 201 and 202:
Strategies for a Generative Future
- Page 203 and 204:
Strategies for a Generative Future
- Page 205 and 206:
Strategies for a Generative Future
- Page 207 and 208:
Strategies for a Generative Future
- Page 209 and 210:
Strategies for a Generative Future
- Page 211 and 212:
Strategies for a Generative Future
- Page 213 and 214:
Meeting the Risks of Generativity:
- Page 215 and 216:
Meeting the Risks of Generativity:
- Page 217 and 218:
Meeting the Risks of Generativity:
- Page 219 and 220:
Meeting the Risks of Generativity:
- Page 221 and 222:
Meeting the Risks of Generativity:
- Page 223 and 224:
Meeting the Risks of Generativity:
- Page 225 and 226:
Meeting the Risks of Generativity:
- Page 227 and 228:
Meeting the Risks of Generativity:
- Page 229 and 230:
Meeting the Risks of Generativity:
- Page 231 and 232:
Meeting the Risks of Generativity:
- Page 233 and 234:
Meeting the Risks of Generativity:
- Page 235 and 236:
Meeting the Risks of Generativity:
- Page 237 and 238:
Meeting the Risks of Generativity:
- Page 239 and 240:
Meeting the Risks of Generativity:
- Page 241 and 242:
Meeting the Risks of Generativity:
- Page 243 and 244:
Meeting the Risks of Generativity:
- Page 245 and 246:
Meeting the Risks of Generativity:
- Page 247 and 248:
Conclusion Nicholas Negroponte, for
- Page 249 and 250:
Conclusion 237 dren in the developi
- Page 251 and 252:
Conclusion 239 ture, and they are a
- Page 253 and 254:
Conclusion 241 can convincingly put
- Page 255 and 256:
Conclusion 243 niqués that emerge
- Page 257 and 258:
Conclusion 245 education project, a
- Page 259 and 260:
Acknowledgments Many people helped
- Page 261 and 262:
Notes INTRODUCTION 1. Steve Jobs, C
- Page 263 and 264:
Notes to Pages 11-13 251 CHAPTER 1.
- Page 265 and 266:
Notes to Pages 17-21 253 States v.
- Page 267 and 268:
Notes to Pages 23-26 255 General El
- Page 269 and 270:
Notes to Pages 28-29 257 approach,
- Page 271 and 272:
Notes to Pages 32-36 259 47. See, e
- Page 273 and 274:
Notes to Pages 38-42 261 of cyber a
- Page 275 and 276:
Notes to Pages 45-47 263 .org/pdfs/
- Page 277 and 278:
Notes to Pages 51-54 265 84. See Pa
- Page 279 and 280:
Notes to Pages 61-72 267 111. U.S.
- Page 281 and 282:
Notes to Pages 82-88 269 havioral A
- Page 283 and 284:
Notes to Page 89 271 tor, http://so
- Page 285 and 286:
Notes to Pages 91-95 273 62. Id. 63
- Page 287 and 288:
Notes to Pages 96-102 275 (last vis
- Page 289 and 290:
Notes to Pages 104-5 277 ality in y
- Page 291 and 292: Notes to Pages 108-10 279 sion, Sec
- Page 293 and 294: Notes to Pages 111-13 281 and simpl
- Page 295 and 296: Notes to Pages 115-17 283 on Our Na
- Page 297 and 298: Notes to Pages 119-22 285 88. See,
- Page 299 and 300: Notes to Pages 124-28 287 available
- Page 301 and 302: Notes to Pages 130-33 289 11. Norma
- Page 303 and 304: Notes to Pages 137-40 291 See Nate
- Page 305 and 306: Notes to Page 143 293 cal Foundatio
- Page 307 and 308: Notes to Pages 146-52 295 81. But s
- Page 309 and 310: Notes to Pages 157-62 297 6. See Wi
- Page 311 and 312: Notes to Pages 169-71 299 31. Paul
- Page 313 and 314: Notes to Page 178 301 6. Wikipedia
- Page 315 and 316: Notes to Pages 179-81 303 13. One s
- Page 317 and 318: Notes to Pages 182-84 305 delays wi
- Page 319 and 320: Notes to Pages 187-90 307 Secret Co
- Page 321 and 322: Notes to Pages 192-96 309 laches de
- Page 323 and 324: Notes to Pages 197-202 311 96. See
- Page 325 and 326: Notes to Pages 204-7 313 uncommon.
- Page 327 and 328: Notes to Pages 209-12 315 a Real Bu
- Page 329 and 330: Notes to Pages 214-15 317 idence in
- Page 331 and 332: Notes to Pages 217-18 319 sored lin
- Page 333 and 334: Notes to Pages 224-25 321 1, 2007);
- Page 335 and 336: Notes to Pages 227-30 323 avoided w
- Page 337 and 338: Notes to Pages 232-34 325 something
- Page 339 and 340: Notes to Pages 237-44 327 7. See, e
- Page 341: Index accessibility, 29, 72-73, 77,
- Page 345 and 346: Index 333 EMI (music company), 121
- Page 347 and 348: Index 335 compared to, 73-76; limit
- Page 349 and 350: Index 337 Microsoft Windows, 3, 4;
- Page 351 and 352: Index 339 for other limitations, 11
- Page 353 and 354: Index 341 Timex/Sinclair Z-1000, 13