17.01.2015 Views

Download - Future of the Internet – And how to stop it.

Download - Future of the Internet – And how to stop it.

Download - Future of the Internet – And how to stop it.

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Index 331<br />

15; and endpoint control, 125; Mill<br />

on, 98–99, 100; post hoc scrubs, 116;<br />

retroactive, 109<br />

CERT/CC (Computer Emergency Response<br />

Team Coordination Center),<br />

39, 147–48<br />

chaos, in absence <strong>of</strong> law, 128<br />

Chapman v. Un<strong>it</strong>ed States, 188<br />

Chickasaw, Alabama, ownership <strong>of</strong>, 172<br />

child abuse, online images <strong>of</strong>, 111<br />

children: Children’s <strong>Internet</strong> Protection<br />

Act (CIPA), 325n148; Children’s Online<br />

Privacy Protection Act <strong>of</strong> 1998<br />

(COPPA), 232; One Lap<strong>to</strong>p Per<br />

Child, 235–41, 244; restricted online<br />

use by, 232–33<br />

China: Google in, 113, 147; information<br />

regulation in, 105, 108, 114, 147, 180,<br />

196; surveillance in, 113; Wikipedia<br />

in, 144<br />

Christensen, Clay<strong>to</strong>n, The Innova<strong>to</strong>r’s<br />

Dilemma, 83–84, 86<br />

Christian Gallery News Service, 215<br />

chuckroast.com, 170–71<br />

C<strong>it</strong>izendium, 145<br />

c<strong>it</strong>izen reporters, 216<br />

Clark, David, 31, 156<br />

Clarke, Richard, 51<br />

clickworkers, 206<br />

code: abstract concepts in, 190; and copyright<br />

infringement, 189–92; corruption<br />

<strong>of</strong>, 4, 43, 44; and cyberlaw, 104–<br />

8, 197, 310n92; data paths separate<br />

from, 40–41; easy <strong>to</strong> wr<strong>it</strong>e, 19; embedded<br />

in<strong>to</strong> hardware, 13; good and<br />

useful, 31; outside, 4, 16–17, 56; poisoned,<br />

189; proprietary, 192; renegade,<br />

36–38; sharing <strong>of</strong>, 16; transmission <strong>of</strong>,<br />

14; view source, 121; “west coast,”<br />

105. See also worms and viruses<br />

code-backed norms, 223–28<br />

code-based enforcement mechanisms,<br />

105<br />

code thickets, 188–92<br />

collaboration, online, 95–96<br />

commercial filtering programs, 114–15<br />

common law, 110<br />

commons, 78–79, 90<br />

Communications Decency Act, 195<br />

commun<strong>it</strong>arianism, 293n71<br />

CompuServe, 23, 24, 27; central control<br />

by, 3, 7, 57, 74, 81, 82, 106–7; data<br />

paths <strong>of</strong>, 40–41; and Dig<strong>it</strong>al Millennium<br />

Copyright Act, 119; and dumb<br />

terminals, 41, 101–2; “Electronic<br />

Mall” <strong>of</strong>, 29–30; era at an end, 34,<br />

174, 255n7, 256n24; and hyperlinks,<br />

89; measurement in, 157<br />

computers: cus<strong>to</strong>mized <strong>to</strong> user’s needs,<br />

17, 30; “dumb” terminals, 15, 20, 41,<br />

101–2; hardware and s<strong>of</strong>tware bundled<br />

in, 9; mainframes, 12, 15, 24, 57;<br />

minicomputers, 15; pr<strong>of</strong>essional management<br />

<strong>of</strong>, 17, 44; rogue applications<br />

for, 24; unbundling <strong>of</strong>, 12, 14; vendor<br />

programming, 8–9, 17<br />

conduct rules, 122–23<br />

Const<strong>it</strong>ution, U.S.: and anonymous<br />

speech, 213; and free speech, 114, 230;<br />

and gun control, 117; and privacy policies,<br />

112, 185–86, 188; and private<br />

property, 172<br />

constructionism (constructivism), 236–<br />

37<br />

consumer protection law, 177<br />

content layer, 67<br />

contextualization, 229–31<br />

coordinate coexistence producing information,<br />

207<br />

COPPA (Children’s Online Privacy Protection<br />

Act <strong>of</strong> 1998), 232<br />

copyright infringement, 111, 119–20,<br />

175; and code production, 189–92;<br />

and content thickets, 192–93; and<br />

Creative Commons licenses, 225; and<br />

“creative cultural bricolage,” 192; and<br />

employment agreements, 189; patent<br />

thicket, 190–92; and peer-leveraging

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!