Free/online books we'll use in the course. Other
readings will be linked here as well.
Record paper responses for each paper you
read
Discussion Leaders for each week.
January 17-21
Tussles and Overview
Reading Quiz
- The Internet as System
and Spirit, Appendix from Blown to
Bits, by Abelson, Ledeen, and Lewis, excerpted by Creative Commons
license.
-
Code is Law by Lawrence Lessig, Code 2.0, 2006
-
The Future of the Internet is ... regulation?, by Nate Anderson, ars
technica, February 10, 2009
- skim, optional but good Introduction
to Internet Architecture and Institutions, by Ethan Zuckerman and
Andrew McLaughlin, Berkman Center, 2003.
January 24-28
Internet Governance and Protocols
Background
- Save the Internet,
website advocating for Net Neutrality
-
Google Public Policy Blog on Net Neutrality
Articles
-
Who Should Govern the Internet?
by Nanda Kumar and Abbe Mowshowitz, CACM, 2006.
-
'Rough Consensus and Running Code'
and the Internet-OSI Standards War, Andrew Russell, IEEE
Annals of the History of Computing, 2006.
- Tussle in Cyberspace
by Clark, Wroclawski, Sollins, and Braden, 2005. technical
January 31-February 4
Copyright, Patents, DMCA, Open Source
Background
-
Intellectual Property for CS Students
Articles
-
Unintended Consequences: Ten Years under the DMCA, 2008, EFF
- (optional)
Circumventing
Authority: Loopholes in the DMCA's Access Controls, Rucker, Duke
Law, 2009.
-
What Intellectual Property Law
Should Learn from Software, James Boyle, CACM, 2009.
-
Software
Patents--Obstacles to software development, Richard Stallman, March 2002.
-
Why "Open Source" Misses the
Point
of Free Software, Richard Stallman, CACM, June 2009.
- Open Source Baselines:
Compared to What? by Lawrence Lessig, 2002, (from
book, Government Policy Toward Open Source Software, ed. Robert
Hahn.
February 7-11
Cyberwar, Cybercrime, Malware
Background
-
In Digital Combat, U.S. Finds no Easy Deterrent, NY Times, January
25, 2010. Markoff, Sanger, Shanker.
- U.S. military
cyberwar: What's off-limits?, Declan McCullagh, cnet news, July 29, 2010.
Articles
- Cybercrime 2.0: When
the Cloud Turns Dark, CACM, April 2009, Provos, Rajab, Mavrommatis.
-
Your Botnet is My Botnet:
Analysis of a Botnet Takeover, Stone-Gross, Cova, Cavallaro,
Gilbert, Szydlowski, Kemmerer, Kruegel, and Vigna, Conference and
Commmunications Security (CCS), 2009. technical
-
Is the Internet for Porn? An Insight into the Online Adult Industry,
Wondracek, Holz, Platzer, Kirda, Kruegel, WEIS 2010. technical
March 21-25
Anonymity, Privacy, Cryptography
-
Teenage
Insults, Scrawled on Web, Not on Walls, Tamar Lewin, NY Times, May
5, 2010.
-
Lesson
From Tor Hack: Anonymity and Privacy Aren't the Same, Bruce
Schneier, Wired, September, 2007.
-
Radical
Opacity,
Julian Dibbell, MIT Technology Review, Sept/Oct 2010. The article
likely requires a password, instead read this
mirrored
article/website at Duke or
paper in PDF at Duke
-
Anonymity Loves Company: Usability and the Network Effect,
Dingledine, Mathewson, WEIS 2006. technical
March 28-April 1
Google and Facebook
-
The Externalities of Search 2.0: The Emerging Privacy Threats when the
Drive for the Perfect Search Engine meets Web 2.0
, Michael Zimmer, First Monday, Volume 13, Number 3, March 2008.
-
Have I Been Googled?: Character and Fitness in
the Age of Google, Facebook, and YouTube
Dina Epstein, 21 Geo. J. Legal Ethics 715 2008
-
Google and the Limits of Antitrust: The Case against the
Case against Google
, Geoffrey A. Manne and Joshua D. Wright,
Harvard Journal of Law and Public Policy, 2011.
April 4-8
Crowdsourcing
-
Should we trust the wisdom of crowds? Tom de Catella, BBC News
Magazine, July 5, 2010.
- Iranian
Protests Becoming Crowd-Sourced Cyber War, Kit Eaton, Fastcompany,
Jun 17, 2009.
- (skim)
The Rise
of
Crowdsourcing, Jeff Howe, Wired, June 2006.
-
Shirky and Sanger, or the costs of
crowdsourcing, Mathiew O'Neil, Journal of Science Communication,
9(1), March 2010.
-
Measuring Online Service Availability
Using Twitter, Motoyama, Meeder, Levchenko, Voelker, Savage, WOSN,
June 2010. technical