The Future of the Internet - And How to Stop It

This extraordinary book explains the engine that has catapulted the Internet from backwater to ubiquityand reveals that it is sputtering precisely because of its runaway success. With the unwitting help of its users, the generative Internet is on a path to a lockdown, ending its cycle of innovationand facilitating unsettling new kinds of control.IPods, iPhones, Xboxes, and TiVos represent the first wave of Internet-centered products that cant be easily modified by anyone except their vendors or selected partners. These tethered appliances have already been used in remarkable but little-known ways: car GPS systems have been reconfigured at the demand of law enforcement to eavesdrop on the occupants at all times, and digital video recorders have been ordered to self-destruct thanks to a lawsuit against the manufacturer thousands of miles away. New Web 2.0 platforms like Google mash-ups and Facebook are rightly toutedbut their applications can be similarly monitored and eliminated from a central source. As tethered appliances and applications eclipse the PC, the very nature of the Internetits generativity, or innovative characteris at risk.The Internets current trajectory is one of lost opportunity. Its salvation, Zittrain argues, lies in the hands of its millions of users. Drawing on generative technologies like Wikipedia that have so far survived their own successes, this book shows how to develop new technologies and social structures that allow users to work creatively and collaboratively, participate in solutions, and become true netizens.

[1]  L. Hayes,et al.  Living with Internet , 1996 .

[2]  Thomas H. Jackson,et al.  The Fresh-Start Policy in Bankruptcy Law , 1985 .

[3]  Julie E. Cohen,et al.  Fair Use Infrastructure for Rights Management Systems , 2004 .

[4]  Y. Benkler 'Sharing Nicely': On Shareable Goods and the Emergence of Sharing as a Modality of Economic Production , 2004 .

[5]  L. Treviño,et al.  Academic Dishonesty: Honor Codes and Other Contextual Influences , 1993 .

[6]  Lawrence B. Solum,et al.  The Layers Principle: Internet Architecture and the Law , 2003 .

[7]  Brett M. Frischmann,et al.  Network Neutrality and the Economics of an Information Superhighway: A Reply to Professor Yoo , 2007 .

[8]  Chrysanthos Dellarocas,et al.  Strategic Manipulation of Internet Opinion Forums: Implications for Consumers and Firms , 2004, Manag. Sci..

[9]  Vinton G. Cerf,et al.  The past and future history of the Internet , 1997, CACM.

[10]  Jacqueline D. Lipton,et al.  Beyond Cybersquatting: Taking Domain Name Disputes Past Trademark Policy , 2005 .

[11]  Samir Chatterjee,et al.  Network convergence and the NAT/Firewall problems , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.

[12]  Daniel J. Solove,et al.  Privacy and Power: Computer Databases and Metaphors for Information Privacy , 2001 .

[13]  Orin S. Kerr A User's Guide to the Stored Communications Act, and a Legislator's Guide to Amending it , 2003 .

[14]  J. Reidenberg Rules of the Road for Global Electronic Highways: Merging the Trade and Technical Paradigms , 1992 .

[15]  Rebecca Henderson The Innovator's Dilemma as a Problem of Organizational Competence , 2006 .

[16]  Philip Selznick,et al.  American Society And The Rule Of Law , 2005 .

[17]  Juris Hartmanis,et al.  The Cornell commission: on Morris and the worm , 1989, Commun. ACM.

[18]  J. Zittrain,et al.  Spam Works: Evidence from Stock Touts and Corresponding Market Activity , 2007 .

[19]  Alan K. Chen The Ultimate Standard: Qualified Immunity in the Age of Constitutional Balancing Tests , 2005 .

[20]  Allan Friedman,et al.  Good neighbors can make good fences: a peer-to-peer user security system , 2007, IEEE Technology and Society Magazine.

[21]  Tim Wu Net Neutrality , 2010, Net Neutrality.

[22]  Kevin Werbach,et al.  A Layered Model for Internet Policy , 2005, J. Telecommun. High Technol. Law.

[23]  Jeff Johnson,et al.  HOW'S MY DRIVING? , 1998 .

[24]  William W. Fisher THEORIES OF INTELLECTUAL PROPERTY , 2000 .

[25]  Gautham Rao,et al.  The Federal Posse Comitatus Doctrine: Slavery, Compulsion, and Statecraft in Mid-Nineteenth-Century America , 2008, Law and History Review.

[26]  J. Reidenberg Governing Networks and Rule-Making in Cyberspace , 1996 .

[27]  W. Norton The Evolution of the U.S. Internet Peering Ecosystem , 2003 .

[28]  Paul Resnick,et al.  Trust among strangers in internet transactions: Empirical analysis of eBay' s reputation system , 2002, The Economics of the Internet and E-commerce.

[29]  Lawrence Lessig,et al.  Open Code and Open Societies: Values of Internet Governance , 1999 .

[30]  R. Lynn Campbell,et al.  Judicial involvement in Domain Name Disputes in Canada , 2004 .

[31]  Vinton G. Cerf,et al.  A brief history of the internet , 1999, CCRV.

[32]  Leonardo Lazarte,et al.  TO BLOG OR NOT TO BLOG , 2007 .

[33]  S. Brenner Private-Public Sector Cooperation in Combating Cybercrime: In Search of a Model , 2009 .

[34]  Jonathan L. Zittrain,et al.  Normative Principles for Evaluating Free and Proprietary Software , 2004 .

[35]  Druin Burch Two concepts of liberty , 2004, The Lancet.

[36]  Daniel J. Solove Identity Theft, Privacy, and the Architecture of Vulnerability , 2003 .

[37]  J B Whitlow,et al.  NASA (NATIONAL AERONAUTICS AND SPACE ADMINISTRATION) ADVANCED TURBOPROP RESEARCH AND CONCEPT VALIDATION PROGRAM , 1988 .

[38]  Burton Grad,et al.  A Personal Recollection: IBM's Unbundling of Software and Services , 2002, IEEE Ann. Hist. Comput..

[39]  L. Kohlberg The Claim to Moral Adequacy of a Highest Stage of Moral Judgment , 1973 .

[40]  Robert E. Kahn,et al.  The role of government in the evolution of the Internet , 1994, CACM.

[41]  Jerry Kang Information Privacy in Cyberspace Transactions , 1998 .

[42]  David Clark,et al.  Do appliances threaten Internet innovation? , 2001, IEEE Commun. Mag..

[43]  Mark A. Lemley Intellectual Property Rights and Standard-Setting Organizations , 2002 .

[44]  J. Stiglitz,et al.  The Architecture of Economic Systems: Hierarchies and Polyarchies , 1984 .

[45]  Gavin A. Schmidt,et al.  To blog or not to blog , 2008 .

[46]  Paul Resnick,et al.  The value of reputation on eBay: A controlled experiment , 2002 .

[47]  Philip S. Yu,et al.  Intellectual Property and the Information Ecosystem , 2005 .

[48]  Cybersecurity and the Generative Dilemma , 2022 .

[49]  Christopher S. Yoo,et al.  Would Mandating Broadband Network Neutrality Help or Hurt Competition? A Comment on the End-to-End Debate , 2004, J. Telecommun. High Technol. Law.

[50]  Joseph William Singer,et al.  The Reliance Interest in Property , 1988 .

[51]  Harold Borko,et al.  The first west coast computer faire: Conference proceedings: J.C. Warren Jr. (editor). 15–17 April 1977, San Francisco, California, $12.00 (paperback) , 1979 .

[52]  Dana Cuff,et al.  Pervasive Computing: Embedding the Public Sphere , 2004 .

[53]  Brett M. Frischmann An Economic Theory of Infrastructure and Commons Management , 2004 .

[54]  James Q. Whitman Enforcing Civility and Respect: Three Societies , 2000 .

[55]  Antonin Scalia,et al.  The Rule of Law as a Law of Rules , 1989 .

[56]  Joseph E. Stiglitz,et al.  The Quality of Managers in Centralized versus Decentralized Organizations , 1990 .

[57]  John Markoff,et al.  Attack of the Zombie Computers Is Growing Threat , 2007 .

[58]  Carlisle M. Adams,et al.  Rights Management , 2005, Encyclopedia of Cryptography and Security.

[59]  Lawrence Lessig,et al.  Reading The Constitution in Cyberspace , 1997 .

[60]  William V. Vetter Preying on the Web: Tax Collection in the Virtual World , 2001 .

[61]  L. Kaplow Rules versus Standards: An Economic Analysis , 1992 .

[62]  A. Froomkin,et al.  Habermas@discourse.net: Toward a Critical Theory of Cyberspace , 2003 .

[63]  J. Barlow A Declaration of the Independence of Cyberspace , 2021, Commonplace.

[64]  James Bessen,et al.  medium provided this notice is preserved. AN EMPIRICAL LOOK AT SOFTWARE PATENTS , 2004 .

[65]  J. Reidenberg Lex Informatica: The Formulation of Information Policy Rules through Technology , 1997 .

[66]  Judit Bar-Ilan,et al.  Web links and search engine ranking: The case of Google and the query "jew" , 2006, J. Assoc. Inf. Sci. Technol..

[67]  Byron D. Hittle An Uphill Battle: The Difficulty of Deterring and Detecting Perpetrators of Internet Stock Fraud , 2001 .

[68]  Eric Goldman,et al.  A Road to No Warez: The No Electronic Theft Act and Criminal Copyright Infringement , 2004 .

[69]  Rebecca MacKinnon,et al.  China's Internet: Let a Thousand Filters Bloom , 2005 .

[70]  Paul Resnick,et al.  Reputation systems , 2000, CACM.

[71]  Colby B. Springer Master of the Domain (Name): A History of Domain Name Litigation and the Emergence of the Anticybersquatting Consumer Protection Act and Uniform Dispute Resolution Policy , 2001 .

[72]  Diane M. Griffiths,et al.  THE REGENTS OF THE UNIVERSITY OF CALIFORNIA , 2007 .

[73]  Neil Weinstock Netanel,et al.  Locating Copyright within the First Amendment Skein , 2001 .

[74]  G.E. Moore,et al.  Cramming More Components Onto Integrated Circuits , 1998, Proceedings of the IEEE.

[75]  Barbara van Schewick Towards an Economic Framework for Network Neutrality Regulation , 2005, J. Telecommun. High Technol. Law.

[76]  J. Giles Internet encyclopaedias go head to head , 2005, Nature.

[77]  John Logan Piburn A constitution and a code , 1932 .

[78]  Jerome H. Saltzer,et al.  End-to-end arguments in system design , 1984, TOCS.

[79]  K. A. Taipale Internet and Computer Crime: System Architecture as Crime Control , 2003 .

[80]  John Langford,et al.  CAPTCHA: Using Hard AI Problems for Security , 2003, EUROCRYPT.

[81]  Yochai Benkler,et al.  Free As the Air to Common Use: First Amendment Constraints on Enclosure of the Public Domain , 1999 .

[82]  W. Bradley Wendel,et al.  Regulation of Lawyers Without the Code, the Rules, or the Restatement: Or, What Do Honor and Shame Have to do with Civil Discovery Practice? , 2003 .

[83]  Mark A. Lemley,et al.  The End of End-to-End: Preserving the Architecture of the Internet in the Broadband Era , 2000 .

[84]  Christian Sandvig,et al.  Software Defaults as De Facto Regulation: The Case of Wireless APs , 2005 .