338 Index ORBS (Open Relay Behavior Modification System), 169 Owad, Tom, 215 Oxford <strong>Internet</strong> Inst<strong>it</strong>ute, 159, 170 Papert, Seymour, 236 parental filters, 111 passwords, 32, 37, 42 patent infringement, 190–92 PATRIOT Act. See September 11 attacks and PATRIOT Act PDAs (personal dig<strong>it</strong>al assistants), 58–59 peer production, 206–16 perfect enforcement, 107–10, 112, 122, 134, 161, 166 personal computers (PCs): accessibil<strong>it</strong>y via broadband, 4; business adoption <strong>of</strong>, 15–16; connected by modems, 25; connectiv<strong>it</strong>y vs. design <strong>of</strong>, 166; data sharing on, 160; desk<strong>to</strong>p, 17; development <strong>of</strong>, 15; as electronic workbooks, 236; as endpoints, 167; flexible arch<strong>it</strong>ecture <strong>of</strong>, 16; generative technology <strong>of</strong>, 2, 3, 5, 19, 34, 72; government investigations <strong>of</strong>, 186–88; Green and Red, 155; <strong>of</strong> hobbyists, 13, 14, 15, 18, 19, 34; hourglass arch<strong>it</strong>ecture <strong>of</strong>, 69– 71; increasing reliance on, 102; independent functioning <strong>of</strong>, 15; as information (te<strong>the</strong>red) appliances, 4, 59– 61, 102, 185–88; information appliances vs., 18, 29, 57–59; and <strong>Internet</strong> compatibil<strong>it</strong>y, 28–29; lockdown <strong>of</strong>, 4, 5, 57, 102, 155–56, 164, 165; model <strong>of</strong> computing, 17; modularization <strong>of</strong>, 156; PC revolution, 3, 18; potential functional<strong>it</strong>y sold w<strong>it</strong>h, 13; regulabil<strong>it</strong>y <strong>of</strong>, 106; search across computers, 185; secur<strong>it</strong>y dilemma <strong>of</strong>, 241; in s<strong>it</strong>es where users are not owners, 4; and third-party s<strong>to</strong>rage, 186–88; “trapped,” 77; unsecured on <strong>Internet</strong>, 45; users as programmers for, 14, 15; virtual, 156; zombies, 46, 52, 54, 57, 166 personal ident<strong>it</strong>y management, 32–33 Pew <strong>Internet</strong> & American Life Project, 51 phishing, 47, 53, 99 pho<strong>to</strong> recogn<strong>it</strong>ion, 214–15 physical layer, 67–69 placeholders, 56 plagiarism, 244 plastic, adaptabil<strong>it</strong>y <strong>of</strong>, 72 PlayMedia, 104, 108 Pledgebank, 148, 243 pornography, child, 111 Posner, Eric, 213 Post, David, 123 Postel’s Law, 134 post hoc remedies, 122 post hoc scrubs, 116 Postman, Neil, 93 preemption, 108 press conference behavior, 212–13, 229 prime time, being ready for (and <strong>the</strong> generative Net), 153–54 prior restraints, 115, 122 Privacy Act (1974), 202 privacy: administrative burdens <strong>of</strong>, 221– 22; and captchas, 208; and cheap sensors, 206, 208–9, 210, 216, 221; code-backed norms, 223–28; Const<strong>it</strong>utional support <strong>of</strong>, 112, 185–86, 188; and consumer protection law, 177; contextualization, 229–31; data genealogy, 225–28; enforceabil<strong>it</strong>y <strong>of</strong>, 112–14; and generation gap, 231–34; and government power, 117–19, 186– 88; HEW report (1973) on, 201–5, 222, 233–34; and industry self-regulation, 203; involuntary celebr<strong>it</strong>ies, 210–14; “just deal w<strong>it</strong>h <strong>it</strong>,” 111–12; and peer production, 206–16; personal information secur<strong>it</strong>y, 203–4; Privacy 1.0, 201–5, 208, 215, 216, 222, 232; Privacy 2.0, 205–34; as proxies
Index 339 for o<strong>the</strong>r lim<strong>it</strong>ations, 112; public vs. private behavior, 212–16; and reputation, 216–21, 228–29; search and seizure, 112; sens<strong>it</strong>iv<strong>it</strong>y identified w<strong>it</strong>h, 202; and third-party s<strong>to</strong>rage, 185–88; and ubiqui<strong>to</strong>us surveillance, 109–10, 206, 209–16; on Web s<strong>it</strong>es, 203, 226 privacy “tags,” 227 procrastination principle: and Dig<strong>it</strong>al Millennium Copyright Act, 119–20; in generative systems, 152, 164, 180, 242, 245; in <strong>Internet</strong> design, 33, 34; and Morris worm, 39–40; in networks, 31, 33, 99, 164; in operating systems, 69; and Wikipedia, 134, 135; in XO, 237, 240 Prodigy, 7, 23, 24, 81, 157 proprietary rights thickets, 188–92 pro<strong>to</strong>col layer, 39, 67–69 punch card system, 11 QTel, 157 quasi-contracts, 184 Radin, Margaret, 233 radio broadcasts, jamming <strong>of</strong>, 106 radio frequency identifiers (RFIDs), 203 Radio Shack, 75-in-1 Electronic Project K<strong>it</strong>, 14, 73 Rand, Ayn, 143 Raymond, Eric, 137 “Realtime Blackhole List,” 169 reCAPTCHA, 208, 227 Reed, David, 31 Reidenberg, Joel, 104 reputation bankruptcy, 228–29 reputationdefender.com, 230 reputation systems, 216–21; buddy lists, 219–20; correcting or identifying mistakes on, 220; ident<strong>it</strong>y systems, 220; search engines, 217, 220–21; user rankings, 146, 217–18, 221; wholeperson ratings, 218–19 RFC 1135, “The Helminthiasis <strong>of</strong> <strong>the</strong> <strong>Internet</strong>,” 39 robots, spam messages from, 207–8 robot signaling, 223 robots.txt, 223–25, 227, 243 Rosen, Jeffrey, 216 RSS (really simple syndication), 56 Saltzer, Jerry, 31 Samuelson, Pamela, 225–26 Sanger, Larry, 133, 142–43, 145 Sapphire/Slammer worm, 47 satell<strong>it</strong>e TV, 181, 182 Saudi Arabia, information control in, 113, 180 Scherf, Steve, 145–46 search engines, 220–21, 223, 226, 227; creation <strong>of</strong>, 224; user rankings, 217 Second Amendment, 117 SEC v. Jerry T. O’Brien, Inc., 185, 188 Seigenthaler, John, Sr., 138, 141, 145 semiotic democracy, 147 Sender ID, 193–94 sensors: cheap, 206, 208–9, 210, 221; ubiqui<strong>to</strong>us, 212–13 September 11 attacks and PATRIOT Act, 186–87 SETI@home, 90 ShotSpotter, 314n43 signal neutral<strong>it</strong>y, 182 Simpson, Jessica, 53 Skype, 56–57, 58, 59, 60, 102, 113, 178, 180, 182 Slashdot, 217 smoking bans, 118 snopes.com, 230 sobig.f virus, 47 social layer, 67 sock puppetry, 136, 228 s<strong>of</strong>tware: BBS, 25; collaboration, 96; copylefted, 309n75; cross-licensing <strong>of</strong>, 190; and cyberlaw, 104–7; and data portabil<strong>it</strong>y, 177; flexible, 15–16; free,
- Page 2:
The Future of the Internet— And H
- Page 5 and 6:
A Caravan book. For more informatio
- Page 7 and 8:
vi Contents Part III Solutions—14
- Page 9 and 10:
viii Foreword porn on the Net. But
- Page 11 and 12:
x Preface to the Paperback Edition
- Page 13 and 14:
Introduction On January 9, 2007, St
- Page 15 and 16:
Introduction 3 Jobs was not shy abo
- Page 17 and 18:
Introduction 5 some might welcome t
- Page 19 and 20:
I The Rise and Stall of the Generat
- Page 21 and 22:
The Rise and Stall of the Generativ
- Page 23 and 24:
1 Battle of the Boxes Herman Holler
- Page 25 and 26:
Battle of the Boxes 13 Rethreading
- Page 27 and 28:
Battle of the Boxes 15 The business
- Page 29 and 30:
Battle of the Boxes 17 writing new
- Page 31 and 32:
2 Battle of the Networks As the pri
- Page 33 and 34:
Battle of the Networks 21 sumptions
- Page 35 and 36:
Battle of the Networks 23 collectin
- Page 37 and 38:
Battle of the Networks 25 expense o
- Page 39 and 40:
Battle of the Networks 27 The Inter
- Page 41 and 42:
Battle of the Networks 29 compatibi
- Page 43 and 44:
Battle of the Networks 31 cess and
- Page 45 and 46:
Battle of the Networks 33 tance. Be
- Page 47 and 48:
Battle of the Networks 35 proved by
- Page 49 and 50:
Cybersecurity and the Generative Di
- Page 51 and 52:
Cybersecurity and the Generative Di
- Page 53 and 54:
Cybersecurity and the Generative Di
- Page 55 and 56:
Cybersecurity and the Generative Di
- Page 57 and 58:
Cybersecurity and the Generative Di
- Page 59 and 60:
Cybersecurity and the Generative Di
- Page 61 and 62:
Table 3.1. Rankings of malicious ac
- Page 63 and 64:
Cybersecurity and the Generative Di
- Page 65 and 66:
Cybersecurity and the Generative Di
- Page 67 and 68:
Cybersecurity and the Generative Di
- Page 69 and 70:
Cybersecurity and the Generative Di
- Page 71 and 72:
Cybersecurity and the Generative Di
- Page 73 and 74:
Cybersecurity and the Generative Di
- Page 75 and 76:
II After the Stall In Part I of thi
- Page 77 and 78:
After the Stall 65 systems function
- Page 79 and 80:
4 The Generative Pattern Anyone can
- Page 81 and 82:
The Generative Pattern 69 themselve
- Page 83 and 84:
The Generative Pattern 71 istics, b
- Page 85 and 86:
The Generative Pattern 73 is. Barri
- Page 87 and 88:
Table 4.1. Examples of generative t
- Page 89 and 90:
The Generative Pattern 77 GENERATIV
- Page 91 and 92:
The Generative Pattern 79 Creative
- Page 93 and 94:
The Generative Pattern 81 We have a
- Page 95 and 96:
The Generative Pattern 83 machines
- Page 97 and 98:
The Generative Pattern 85 even smal
- Page 99 and 100:
The Generative Pattern 87 pipes to
- Page 101 and 102:
The Generative Pattern 89 work, 46
- Page 103 and 104:
The Generative Pattern 91 But indep
- Page 105 and 106:
The Generative Pattern 93 PowerPoin
- Page 107 and 108:
The Generative Pattern 95 RECURSION
- Page 109 and 110:
The Generative Pattern 97 adaptable
- Page 111 and 112:
The Generative Pattern 99 chained u
- Page 113 and 114:
5 Tethered Appliances, Software as
- Page 115 and 116:
Perfect Enforcement 103 wish to ope
- Page 117 and 118:
Perfect Enforcement 105 for when we
- Page 119 and 120:
Perfect Enforcement 107 for which o
- Page 121 and 122:
Perfect Enforcement 109 specific, u
- Page 123 and 124:
Perfect Enforcement 111 by purchase
- Page 125 and 126:
Perfect Enforcement 113 Governments
- Page 127 and 128:
Perfect Enforcement 115 ernment, th
- Page 129 and 130:
Perfect Enforcement 117 cle cannot
- Page 131 and 132:
Perfect Enforcement 119 text, but b
- Page 133 and 134:
Perfect Enforcement 121 party innov
- Page 135 and 136:
Perfect Enforcement 123 very least,
- Page 137 and 138:
Perfect Enforcement 125 Continuous
- Page 139 and 140:
6 The Lessons of Wikipedia The Dutc
- Page 141 and 142:
The Lessons of Wikipedia 129 alized
- Page 143 and 144:
The Lessons of Wikipedia 131 THE RI
- Page 145 and 146:
The Lessons of Wikipedia 133 “not
- Page 147 and 148:
The Lessons of Wikipedia 135 decidi
- Page 149 and 150:
The Lessons of Wikipedia 137 Qualit
- Page 151 and 152:
The Lessons of Wikipedia 139 does l
- Page 153 and 154:
The Lessons of Wikipedia 141 der th
- Page 155 and 156:
The Lessons of Wikipedia 143 text,
- Page 157 and 158:
The Lessons of Wikipedia 145 trator
- Page 159 and 160:
The Lessons of Wikipedia 147 “sem
- Page 161 and 162:
III Solutions This book has explain
- Page 163 and 164:
Solutions 151 make it more difficul
- Page 165 and 166:
7 Stopping the Future of the Intern
- Page 167 and 168:
Stability on a Generative Net 155 o
- Page 169 and 170:
Stability on a Generative Net 157 c
- Page 171 and 172:
Stability on a Generative Net 159 g
- Page 173 and 174:
Stability on a Generative Net 161 n
- Page 175 and 176:
Stability on a Generative Net 163 d
- Page 177 and 178:
Stability on a Generative Net 165 e
- Page 179 and 180:
Stability on a Generative Net 167 e
- Page 181 and 182:
Stability on a Generative Net 169 a
- Page 183 and 184:
Stability on a Generative Net 171 G
- Page 185 and 186:
Stability on a Generative Net 173 m
- Page 187 and 188:
8 Strategies for a Generative Futur
- Page 189 and 190:
Strategies for a Generative Future
- Page 191 and 192:
Strategies for a Generative Future
- Page 193 and 194:
Strategies for a Generative Future
- Page 195 and 196:
Strategies for a Generative Future
- Page 197 and 198:
Strategies for a Generative Future
- Page 199 and 200:
Strategies for a Generative Future
- Page 201 and 202:
Strategies for a Generative Future
- Page 203 and 204:
Strategies for a Generative Future
- Page 205 and 206:
Strategies for a Generative Future
- Page 207 and 208:
Strategies for a Generative Future
- Page 209 and 210:
Strategies for a Generative Future
- Page 211 and 212:
Strategies for a Generative Future
- Page 213 and 214:
Meeting the Risks of Generativity:
- Page 215 and 216:
Meeting the Risks of Generativity:
- Page 217 and 218:
Meeting the Risks of Generativity:
- Page 219 and 220:
Meeting the Risks of Generativity:
- Page 221 and 222:
Meeting the Risks of Generativity:
- Page 223 and 224:
Meeting the Risks of Generativity:
- Page 225 and 226:
Meeting the Risks of Generativity:
- Page 227 and 228:
Meeting the Risks of Generativity:
- Page 229 and 230:
Meeting the Risks of Generativity:
- Page 231 and 232:
Meeting the Risks of Generativity:
- Page 233 and 234:
Meeting the Risks of Generativity:
- Page 235 and 236:
Meeting the Risks of Generativity:
- Page 237 and 238:
Meeting the Risks of Generativity:
- Page 239 and 240:
Meeting the Risks of Generativity:
- Page 241 and 242:
Meeting the Risks of Generativity:
- Page 243 and 244:
Meeting the Risks of Generativity:
- Page 245 and 246:
Meeting the Risks of Generativity:
- Page 247 and 248:
Conclusion Nicholas Negroponte, for
- Page 249 and 250:
Conclusion 237 dren in the developi
- Page 251 and 252:
Conclusion 239 ture, and they are a
- Page 253 and 254:
Conclusion 241 can convincingly put
- Page 255 and 256:
Conclusion 243 niqués that emerge
- Page 257 and 258:
Conclusion 245 education project, a
- Page 259 and 260:
Acknowledgments Many people helped
- Page 261 and 262:
Notes INTRODUCTION 1. Steve Jobs, C
- Page 263 and 264:
Notes to Pages 11-13 251 CHAPTER 1.
- Page 265 and 266:
Notes to Pages 17-21 253 States v.
- Page 267 and 268:
Notes to Pages 23-26 255 General El
- Page 269 and 270:
Notes to Pages 28-29 257 approach,
- Page 271 and 272:
Notes to Pages 32-36 259 47. See, e
- Page 273 and 274:
Notes to Pages 38-42 261 of cyber a
- Page 275 and 276:
Notes to Pages 45-47 263 .org/pdfs/
- Page 277 and 278:
Notes to Pages 51-54 265 84. See Pa
- Page 279 and 280:
Notes to Pages 61-72 267 111. U.S.
- Page 281 and 282:
Notes to Pages 82-88 269 havioral A
- Page 283 and 284:
Notes to Page 89 271 tor, http://so
- Page 285 and 286:
Notes to Pages 91-95 273 62. Id. 63
- Page 287 and 288:
Notes to Pages 96-102 275 (last vis
- Page 289 and 290:
Notes to Pages 104-5 277 ality in y
- Page 291 and 292:
Notes to Pages 108-10 279 sion, Sec
- Page 293 and 294:
Notes to Pages 111-13 281 and simpl
- Page 295 and 296:
Notes to Pages 115-17 283 on Our Na
- Page 297 and 298:
Notes to Pages 119-22 285 88. See,
- Page 299 and 300: Notes to Pages 124-28 287 available
- Page 301 and 302: Notes to Pages 130-33 289 11. Norma
- Page 303 and 304: Notes to Pages 137-40 291 See Nate
- Page 305 and 306: Notes to Page 143 293 cal Foundatio
- Page 307 and 308: Notes to Pages 146-52 295 81. But s
- Page 309 and 310: Notes to Pages 157-62 297 6. See Wi
- Page 311 and 312: Notes to Pages 169-71 299 31. Paul
- Page 313 and 314: Notes to Page 178 301 6. Wikipedia
- Page 315 and 316: Notes to Pages 179-81 303 13. One s
- Page 317 and 318: Notes to Pages 182-84 305 delays wi
- Page 319 and 320: Notes to Pages 187-90 307 Secret Co
- Page 321 and 322: Notes to Pages 192-96 309 laches de
- Page 323 and 324: Notes to Pages 197-202 311 96. See
- Page 325 and 326: Notes to Pages 204-7 313 uncommon.
- Page 327 and 328: Notes to Pages 209-12 315 a Real Bu
- Page 329 and 330: Notes to Pages 214-15 317 idence in
- Page 331 and 332: Notes to Pages 217-18 319 sored lin
- Page 333 and 334: Notes to Pages 224-25 321 1, 2007);
- Page 335 and 336: Notes to Pages 227-30 323 avoided w
- Page 337 and 338: Notes to Pages 232-34 325 something
- Page 339 and 340: Notes to Pages 237-44 327 7. See, e
- Page 341 and 342: Index accessibility, 29, 72-73, 77,
- Page 343 and 344: Index 331 15; and endpoint control,
- Page 345 and 346: Index 333 EMI (music company), 121
- Page 347 and 348: Index 335 compared to, 73-76; limit
- Page 349: Index 337 Microsoft Windows, 3, 4;
- Page 353 and 354: Index 341 Timex/Sinclair Z-1000, 13