17.01.2015 Views

Download - Future of the Internet – And how to stop it.

Download - Future of the Internet – And how to stop it.

Download - Future of the Internet – And how to stop it.

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

338<br />

Index<br />

ORBS (Open Relay Behavior Modification<br />

System), 169<br />

Owad, Tom, 215<br />

Oxford <strong>Internet</strong> Inst<strong>it</strong>ute, 159, 170<br />

Papert, Seymour, 236<br />

parental filters, 111<br />

passwords, 32, 37, 42<br />

patent infringement, 190–92<br />

PATRIOT Act. See September 11 attacks<br />

and PATRIOT Act<br />

PDAs (personal dig<strong>it</strong>al assistants), 58–59<br />

peer production, 206–16<br />

perfect enforcement, 107–10, 112, 122,<br />

134, 161, 166<br />

personal computers (PCs): accessibil<strong>it</strong>y<br />

via broadband, 4; business adoption <strong>of</strong>,<br />

15–16; connected by modems, 25;<br />

connectiv<strong>it</strong>y vs. design <strong>of</strong>, 166; data<br />

sharing on, 160; desk<strong>to</strong>p, 17; development<br />

<strong>of</strong>, 15; as electronic workbooks,<br />

236; as endpoints, 167; flexible arch<strong>it</strong>ecture<br />

<strong>of</strong>, 16; generative technology<br />

<strong>of</strong>, 2, 3, 5, 19, 34, 72; government investigations<br />

<strong>of</strong>, 186–88; Green and<br />

Red, 155; <strong>of</strong> hobbyists, 13, 14, 15, 18,<br />

19, 34; hourglass arch<strong>it</strong>ecture <strong>of</strong>, 69–<br />

71; increasing reliance on, 102; independent<br />

functioning <strong>of</strong>, 15; as information<br />

(te<strong>the</strong>red) appliances, 4, 59–<br />

61, 102, 185–88; information appliances<br />

vs., 18, 29, 57–59; and <strong>Internet</strong><br />

compatibil<strong>it</strong>y, 28–29; lockdown <strong>of</strong>, 4,<br />

5, 57, 102, 155–56, 164, 165; model<br />

<strong>of</strong> computing, 17; modularization <strong>of</strong>,<br />

156; PC revolution, 3, 18; potential<br />

functional<strong>it</strong>y sold w<strong>it</strong>h, 13; regulabil<strong>it</strong>y<br />

<strong>of</strong>, 106; search across computers,<br />

185; secur<strong>it</strong>y dilemma <strong>of</strong>, 241; in<br />

s<strong>it</strong>es where users are not owners, 4;<br />

and third-party s<strong>to</strong>rage, 186–88;<br />

“trapped,” 77; unsecured on <strong>Internet</strong>,<br />

45; users as programmers for, 14, 15;<br />

virtual, 156; zombies, 46, 52, 54, 57,<br />

166<br />

personal ident<strong>it</strong>y management, 32–33<br />

Pew <strong>Internet</strong> & American Life Project, 51<br />

phishing, 47, 53, 99<br />

pho<strong>to</strong> recogn<strong>it</strong>ion, 214–15<br />

physical layer, 67–69<br />

placeholders, 56<br />

plagiarism, 244<br />

plastic, adaptabil<strong>it</strong>y <strong>of</strong>, 72<br />

PlayMedia, 104, 108<br />

Pledgebank, 148, 243<br />

pornography, child, 111<br />

Posner, Eric, 213<br />

Post, David, 123<br />

Postel’s Law, 134<br />

post hoc remedies, 122<br />

post hoc scrubs, 116<br />

Postman, Neil, 93<br />

preemption, 108<br />

press conference behavior, 212–13, 229<br />

prime time, being ready for (and <strong>the</strong> generative<br />

Net), 153–54<br />

prior restraints, 115, 122<br />

Privacy Act (1974), 202<br />

privacy: administrative burdens <strong>of</strong>, 221–<br />

22; and captchas, 208; and cheap sensors,<br />

206, 208–9, 210, 216, 221;<br />

code-backed norms, 223–28; Const<strong>it</strong>utional<br />

support <strong>of</strong>, 112, 185–86,<br />

188; and consumer protection law,<br />

177; contextualization, 229–31; data<br />

genealogy, 225–28; enforceabil<strong>it</strong>y <strong>of</strong>,<br />

112–14; and generation gap, 231–34;<br />

and government power, 117–19, 186–<br />

88; HEW report (1973) on, 201–5,<br />

222, 233–34; and industry self-regulation,<br />

203; involuntary celebr<strong>it</strong>ies,<br />

210–14; “just deal w<strong>it</strong>h <strong>it</strong>,” 111–12;<br />

and peer production, 206–16; personal<br />

information secur<strong>it</strong>y, 203–4; Privacy<br />

1.0, 201–5, 208, 215, 216, 222,<br />

232; Privacy 2.0, 205–34; as proxies

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!