332 Index copyright infringement (continued ) technologies, 216; penalties for, 286n99; and robot scanning, 224–25; statute <strong>of</strong> lim<strong>it</strong>ations on, 191; Wikipedia policy on, 143, 168, 189, 195 copyright law, 79, 111, 112, 197; and Dig<strong>it</strong>al Millennium Copyright Act, 119–20; fair use defense in, 115; and free s<strong>of</strong>tware, 189; online, 123–26; and prior restraints, 115–16; and <strong>to</strong>lerated uses, 119–22 Cornell Univers<strong>it</strong>y, 39 couchsurfing.com, 243, 301n7 Craigslist, 85 Creative Commons, 79, 193, 225, 226, 227 Cuff, Dana, 210 Cunningham, Ward, 95, 96, 133, 151 Currah, <strong>And</strong>rew, 83 CVS (concurrent versions system), 94 cyberlaw: acoustic separation in, 122; amplification <strong>of</strong>, 114–17; code as, 104– 8, 197, 310n92; conduct rules, 122– 23; consumer protection, 177; and contraband rules, 103–4; and data portabil<strong>it</strong>y, 177; decision rules, 122– 23; and due process, 172–74; and end<strong>to</strong>-end neutral<strong>it</strong>y, 164–65; ex ante legislative-style drafting <strong>of</strong>, 109; flexibil<strong>it</strong>y <strong>of</strong>, 107; illegal online file sharing, 111– 12; impoundment remedies in, 104; and individual liabil<strong>it</strong>y, 193–95; information aggrega<strong>to</strong>rs protected in, 138; lim<strong>it</strong>ations <strong>of</strong>, 168; and lockdown, 102, 177; notice-and-takedown regime in, 119–20; objections <strong>to</strong>, 111–12; perfect enforcement <strong>of</strong>, 107–10, 112, 122, 134, 166; and preemption, 108; and prior restraints, 115, 122; and responsibil<strong>it</strong>y, 162–64; rule and sanction approach <strong>to</strong>, 129; rules vs. standards in, 128; as self-enforcing, 107; sources <strong>of</strong>, 128; specific injunction, 108–9; and surveillance, 109–10; and <strong>to</strong>lerated uses, 119–22, 190–91; trad<strong>it</strong>ional frameworks <strong>of</strong>, 242; and unwanted robot access, 224–25 cyberspace, map <strong>of</strong>, 166 Cyworld, 218 Dagon, Dave, 46 Dan-Cohen, Meir, 122 darknets, 197 databases, 88; centralized, 208; government, 202; and privacy law, 202; relational, 15; search, 224; <strong>of</strong> worms and viruses, 53 data ga<strong>the</strong>ring, 160 data genealogy, 225–28 data mining, 204–5 data portabil<strong>it</strong>y, 176–78 data reposi<strong>to</strong>ries, 186–88 decision rules, 122–23 Defense Department, U.S., 38 democracy, semiotic, 146 differential pricing, 204–5 Dig<strong>it</strong>al Millennium Copyright Act <strong>of</strong> 1998 (DMCA), 119–20, 224 dig<strong>it</strong>al rights management (DRM) systems, 105 dig<strong>it</strong>al video recorders (DVRs), 57, 103– 4, 109, 121 domain names, 96, 171, 239 DVD players, copy protection in, 108, 123 eBay, 85, 148, 151; vs. Bidder’s Edge, 224, 225; and ident<strong>it</strong>y <strong>to</strong>kens, 228; reputation system on, 217–18 e-books, 109 EchoStar, 103–4, 107, 108, 121 educa<strong>to</strong>rs, fear as response <strong>of</strong>, 244 electric<strong>it</strong>y, adaptabil<strong>it</strong>y <strong>of</strong>, 72 Electronic Frontier Foundation, 161 e-mail: government surveillance <strong>of</strong>, 118, 187; as necess<strong>it</strong>y, 137; and sender au<strong>the</strong>ntication, 193–94; third-party s<strong>to</strong>rage <strong>of</strong>, 185–88. See also spam
Index 333 EMI (music company), 121 Encarta Web s<strong>it</strong>e, 146, 160 encryption, 208 Encyclopaedia Br<strong>it</strong>annica, 131, 137, 198, 226 endpoint: control over, 125–26; disconnectedness <strong>of</strong>, 33, 41; end-<strong>to</strong>-end <strong>the</strong>ory, 31, 164–67, 250n2; generative, 105; importance <strong>of</strong>, 8, 18, 180; lockdown <strong>of</strong>, 106, 155; non-generative, 106, 164; potential compromise <strong>of</strong>, 41–42, 167–68; regulation applied <strong>to</strong>, 8, 105–6; secur<strong>it</strong>y worries about, 106–7, 164, 166; varying levels <strong>of</strong> accessibil<strong>it</strong>y, 30 envelope information, 187 epinions.com, 146 “ESP” game, 207 Facebook, 184, 226 facial recogn<strong>it</strong>ion technology, 214–15 fair use defense, 115, 121–22 FBI, 110, 113, 118, 187 FCC (Federal Communications Commission): and AT&T, 21, 26; Fairness Doctrine, 323n135 Federalist Papers, 317n67 FIDOnet, 25–26, 27, 29, 237 Fifth Amendment, 112 file sharing, illegal, 111–12, 197 filtering systems, 46, 111, 114–15 FIND in<strong>it</strong>iative. See National Science Foundation, FIND in<strong>it</strong>iative <strong>of</strong> Firefox, 54, 184 firewalls, 59 First Amendment, 114, 172, 230 Fisher, William, 92 Fiske, John, 92 Flickr, 123, 214, 226 floppies, virus spread by, 44 FON, 180, 194–95 Foreign Intelligence Surveillance Act (FISA), 187 Fourth Amendment, 112, 188 Freedom <strong>of</strong> Access <strong>to</strong> Clinic Entrances Act, 215 Freeman, Jody, 224 Free S<strong>of</strong>tware Foundation, 131, 189 free s<strong>of</strong>tware philosophy, 77, 94, 131, 189, 190, 191–92 Friden Flexowr<strong>it</strong>er, 12–13, 174 Friedman, Allan, 160 Funcade, 54 games, 15, 47, 57, 88 gated commun<strong>it</strong>ies, 165 gatekeepers, 81, 93, 174, 286n101, 318n84 Gates, Bill, 3, 16, 184, 205 Gawker Stalker, 214 generative systems: absence <strong>of</strong> measurement in, 157–59; future strategies for, 175–99; legal responsibil<strong>it</strong>y in, 163– 64; maintaining, 126, 173; maintaining regula<strong>to</strong>rs’ <strong>to</strong>lerance <strong>of</strong>, 193–99; non-generative vs., 188–92; and procrastination principle, 152, 164, 180, 242, 245; secur<strong>it</strong>y in, 166; stabil<strong>it</strong>y <strong>of</strong>, 153–74; use <strong>of</strong> term, 74; as what we make <strong>the</strong>m, 242, 244–46; as works in progress, 152 generative technology: accessibil<strong>it</strong>y <strong>of</strong>, 72–73, 93; and accountabil<strong>it</strong>y, 162– 63; adaptabil<strong>it</strong>y <strong>of</strong>, 71–72, 93, 125; affordance <strong>the</strong>ory, 78; Apple II, 2; benef<strong>it</strong>s <strong>of</strong>, 64, 79–80, 84–85; blending <strong>of</strong> models for innovation, 86–90; control vs. anarchy in, 98, 150, 157–62; design features <strong>of</strong>, 43; ease <strong>of</strong> mastery, 72; end-<strong>to</strong>-end neutral<strong>it</strong>y <strong>of</strong>, 165; expansion <strong>of</strong>, 34; features <strong>of</strong>, 71–73; freedom vs. secur<strong>it</strong>y in, 3–5, 40–43, 151; free s<strong>of</strong>tware philosophy, 77; and generative content, 245; group creativ<strong>it</strong>y, 94, 95; hourglass arch<strong>it</strong>ecture, 67– 71, 99; innovation as output <strong>of</strong>, 80– 84, 90; input/participation in, 90–94; leverage in, 71, 92–93; non-generative
- Page 2:
The Future of the Internet— And H
- Page 5 and 6:
A Caravan book. For more informatio
- Page 7 and 8:
vi Contents Part III Solutions—14
- Page 9 and 10:
viii Foreword porn on the Net. But
- Page 11 and 12:
x Preface to the Paperback Edition
- Page 13 and 14:
Introduction On January 9, 2007, St
- Page 15 and 16:
Introduction 3 Jobs was not shy abo
- Page 17 and 18:
Introduction 5 some might welcome t
- Page 19 and 20:
I The Rise and Stall of the Generat
- Page 21 and 22:
The Rise and Stall of the Generativ
- Page 23 and 24:
1 Battle of the Boxes Herman Holler
- Page 25 and 26:
Battle of the Boxes 13 Rethreading
- Page 27 and 28:
Battle of the Boxes 15 The business
- Page 29 and 30:
Battle of the Boxes 17 writing new
- Page 31 and 32:
2 Battle of the Networks As the pri
- Page 33 and 34:
Battle of the Networks 21 sumptions
- Page 35 and 36:
Battle of the Networks 23 collectin
- Page 37 and 38:
Battle of the Networks 25 expense o
- Page 39 and 40:
Battle of the Networks 27 The Inter
- Page 41 and 42:
Battle of the Networks 29 compatibi
- Page 43 and 44:
Battle of the Networks 31 cess and
- Page 45 and 46:
Battle of the Networks 33 tance. Be
- Page 47 and 48:
Battle of the Networks 35 proved by
- Page 49 and 50:
Cybersecurity and the Generative Di
- Page 51 and 52:
Cybersecurity and the Generative Di
- Page 53 and 54:
Cybersecurity and the Generative Di
- Page 55 and 56:
Cybersecurity and the Generative Di
- Page 57 and 58:
Cybersecurity and the Generative Di
- Page 59 and 60:
Cybersecurity and the Generative Di
- Page 61 and 62:
Table 3.1. Rankings of malicious ac
- Page 63 and 64:
Cybersecurity and the Generative Di
- Page 65 and 66:
Cybersecurity and the Generative Di
- Page 67 and 68:
Cybersecurity and the Generative Di
- Page 69 and 70:
Cybersecurity and the Generative Di
- Page 71 and 72:
Cybersecurity and the Generative Di
- Page 73 and 74:
Cybersecurity and the Generative Di
- Page 75 and 76:
II After the Stall In Part I of thi
- Page 77 and 78:
After the Stall 65 systems function
- Page 79 and 80:
4 The Generative Pattern Anyone can
- Page 81 and 82:
The Generative Pattern 69 themselve
- Page 83 and 84:
The Generative Pattern 71 istics, b
- Page 85 and 86:
The Generative Pattern 73 is. Barri
- Page 87 and 88:
Table 4.1. Examples of generative t
- Page 89 and 90:
The Generative Pattern 77 GENERATIV
- Page 91 and 92:
The Generative Pattern 79 Creative
- Page 93 and 94:
The Generative Pattern 81 We have a
- Page 95 and 96:
The Generative Pattern 83 machines
- Page 97 and 98:
The Generative Pattern 85 even smal
- Page 99 and 100:
The Generative Pattern 87 pipes to
- Page 101 and 102:
The Generative Pattern 89 work, 46
- Page 103 and 104:
The Generative Pattern 91 But indep
- Page 105 and 106:
The Generative Pattern 93 PowerPoin
- Page 107 and 108:
The Generative Pattern 95 RECURSION
- Page 109 and 110:
The Generative Pattern 97 adaptable
- Page 111 and 112:
The Generative Pattern 99 chained u
- Page 113 and 114:
5 Tethered Appliances, Software as
- Page 115 and 116:
Perfect Enforcement 103 wish to ope
- Page 117 and 118:
Perfect Enforcement 105 for when we
- Page 119 and 120:
Perfect Enforcement 107 for which o
- Page 121 and 122:
Perfect Enforcement 109 specific, u
- Page 123 and 124:
Perfect Enforcement 111 by purchase
- Page 125 and 126:
Perfect Enforcement 113 Governments
- Page 127 and 128:
Perfect Enforcement 115 ernment, th
- Page 129 and 130:
Perfect Enforcement 117 cle cannot
- Page 131 and 132:
Perfect Enforcement 119 text, but b
- Page 133 and 134:
Perfect Enforcement 121 party innov
- Page 135 and 136:
Perfect Enforcement 123 very least,
- Page 137 and 138:
Perfect Enforcement 125 Continuous
- Page 139 and 140:
6 The Lessons of Wikipedia The Dutc
- Page 141 and 142:
The Lessons of Wikipedia 129 alized
- Page 143 and 144:
The Lessons of Wikipedia 131 THE RI
- Page 145 and 146:
The Lessons of Wikipedia 133 “not
- Page 147 and 148:
The Lessons of Wikipedia 135 decidi
- Page 149 and 150:
The Lessons of Wikipedia 137 Qualit
- Page 151 and 152:
The Lessons of Wikipedia 139 does l
- Page 153 and 154:
The Lessons of Wikipedia 141 der th
- Page 155 and 156:
The Lessons of Wikipedia 143 text,
- Page 157 and 158:
The Lessons of Wikipedia 145 trator
- Page 159 and 160:
The Lessons of Wikipedia 147 “sem
- Page 161 and 162:
III Solutions This book has explain
- Page 163 and 164:
Solutions 151 make it more difficul
- Page 165 and 166:
7 Stopping the Future of the Intern
- Page 167 and 168:
Stability on a Generative Net 155 o
- Page 169 and 170:
Stability on a Generative Net 157 c
- Page 171 and 172:
Stability on a Generative Net 159 g
- Page 173 and 174:
Stability on a Generative Net 161 n
- Page 175 and 176:
Stability on a Generative Net 163 d
- Page 177 and 178:
Stability on a Generative Net 165 e
- Page 179 and 180:
Stability on a Generative Net 167 e
- Page 181 and 182:
Stability on a Generative Net 169 a
- Page 183 and 184:
Stability on a Generative Net 171 G
- Page 185 and 186:
Stability on a Generative Net 173 m
- Page 187 and 188:
8 Strategies for a Generative Futur
- Page 189 and 190:
Strategies for a Generative Future
- Page 191 and 192:
Strategies for a Generative Future
- Page 193 and 194:
Strategies for a Generative Future
- Page 195 and 196:
Strategies for a Generative Future
- Page 197 and 198:
Strategies for a Generative Future
- Page 199 and 200:
Strategies for a Generative Future
- Page 201 and 202:
Strategies for a Generative Future
- Page 203 and 204:
Strategies for a Generative Future
- Page 205 and 206:
Strategies for a Generative Future
- Page 207 and 208:
Strategies for a Generative Future
- Page 209 and 210:
Strategies for a Generative Future
- Page 211 and 212:
Strategies for a Generative Future
- Page 213 and 214:
Meeting the Risks of Generativity:
- Page 215 and 216:
Meeting the Risks of Generativity:
- Page 217 and 218:
Meeting the Risks of Generativity:
- Page 219 and 220:
Meeting the Risks of Generativity:
- Page 221 and 222:
Meeting the Risks of Generativity:
- Page 223 and 224:
Meeting the Risks of Generativity:
- Page 225 and 226:
Meeting the Risks of Generativity:
- Page 227 and 228:
Meeting the Risks of Generativity:
- Page 229 and 230:
Meeting the Risks of Generativity:
- Page 231 and 232:
Meeting the Risks of Generativity:
- Page 233 and 234:
Meeting the Risks of Generativity:
- Page 235 and 236:
Meeting the Risks of Generativity:
- Page 237 and 238:
Meeting the Risks of Generativity:
- Page 239 and 240:
Meeting the Risks of Generativity:
- Page 241 and 242:
Meeting the Risks of Generativity:
- Page 243 and 244:
Meeting the Risks of Generativity:
- Page 245 and 246:
Meeting the Risks of Generativity:
- Page 247 and 248:
Conclusion Nicholas Negroponte, for
- Page 249 and 250:
Conclusion 237 dren in the developi
- Page 251 and 252:
Conclusion 239 ture, and they are a
- Page 253 and 254:
Conclusion 241 can convincingly put
- Page 255 and 256:
Conclusion 243 niqués that emerge
- Page 257 and 258:
Conclusion 245 education project, a
- Page 259 and 260:
Acknowledgments Many people helped
- Page 261 and 262:
Notes INTRODUCTION 1. Steve Jobs, C
- Page 263 and 264:
Notes to Pages 11-13 251 CHAPTER 1.
- Page 265 and 266:
Notes to Pages 17-21 253 States v.
- Page 267 and 268:
Notes to Pages 23-26 255 General El
- Page 269 and 270:
Notes to Pages 28-29 257 approach,
- Page 271 and 272:
Notes to Pages 32-36 259 47. See, e
- Page 273 and 274:
Notes to Pages 38-42 261 of cyber a
- Page 275 and 276:
Notes to Pages 45-47 263 .org/pdfs/
- Page 277 and 278:
Notes to Pages 51-54 265 84. See Pa
- Page 279 and 280:
Notes to Pages 61-72 267 111. U.S.
- Page 281 and 282:
Notes to Pages 82-88 269 havioral A
- Page 283 and 284:
Notes to Page 89 271 tor, http://so
- Page 285 and 286:
Notes to Pages 91-95 273 62. Id. 63
- Page 287 and 288:
Notes to Pages 96-102 275 (last vis
- Page 289 and 290:
Notes to Pages 104-5 277 ality in y
- Page 291 and 292:
Notes to Pages 108-10 279 sion, Sec
- Page 293 and 294: Notes to Pages 111-13 281 and simpl
- Page 295 and 296: Notes to Pages 115-17 283 on Our Na
- Page 297 and 298: Notes to Pages 119-22 285 88. See,
- Page 299 and 300: Notes to Pages 124-28 287 available
- Page 301 and 302: Notes to Pages 130-33 289 11. Norma
- Page 303 and 304: Notes to Pages 137-40 291 See Nate
- Page 305 and 306: Notes to Page 143 293 cal Foundatio
- Page 307 and 308: Notes to Pages 146-52 295 81. But s
- Page 309 and 310: Notes to Pages 157-62 297 6. See Wi
- Page 311 and 312: Notes to Pages 169-71 299 31. Paul
- Page 313 and 314: Notes to Page 178 301 6. Wikipedia
- Page 315 and 316: Notes to Pages 179-81 303 13. One s
- Page 317 and 318: Notes to Pages 182-84 305 delays wi
- Page 319 and 320: Notes to Pages 187-90 307 Secret Co
- Page 321 and 322: Notes to Pages 192-96 309 laches de
- Page 323 and 324: Notes to Pages 197-202 311 96. See
- Page 325 and 326: Notes to Pages 204-7 313 uncommon.
- Page 327 and 328: Notes to Pages 209-12 315 a Real Bu
- Page 329 and 330: Notes to Pages 214-15 317 idence in
- Page 331 and 332: Notes to Pages 217-18 319 sored lin
- Page 333 and 334: Notes to Pages 224-25 321 1, 2007);
- Page 335 and 336: Notes to Pages 227-30 323 avoided w
- Page 337 and 338: Notes to Pages 232-34 325 something
- Page 339 and 340: Notes to Pages 237-44 327 7. See, e
- Page 341 and 342: Index accessibility, 29, 72-73, 77,
- Page 343: Index 331 15; and endpoint control,
- Page 347 and 348: Index 335 compared to, 73-76; limit
- Page 349 and 350: Index 337 Microsoft Windows, 3, 4;
- Page 351 and 352: Index 339 for other limitations, 11
- Page 353 and 354: Index 341 Timex/Sinclair Z-1000, 13