Free/online books we'll use in the course. Other
readings will be linked here as well.
Record paper responses for each paper you
read before 8am Monday of the accompanying discusson week.
Rate peer responses before 3pm Tuesday of the accompanying discusson week.
January 23-27
Internet Governance and Protocols
Background
-
Backgrounder on 'net neutrality', Jon Healey, LA
Times editorial board member, November 9, 2011
-
Google Public Policy Blog on Net Neutrality
-
The Future of the Internet is ... regulation?, by Nate Anderson, ars
technica, February 10, 2009
Articles
-
Who Should Govern the Internet?
by Nanda Kumar and Abbe Mowshowitz, CACM, 2006.
-
'Rough Consensus and Running Code'
and the Internet-OSI Standards War, Andrew Russell, IEEE
Annals of the History of Computing, 2006.
- Tussle in Cyberspace
by Clark, Wroclawski, Sollins, and Braden, 2005. technical
January 30-February 3
Copyright, Patents, DMCA, Open Source
Background
-
Intellectual Property for CS Students
Articles
-
Unintended Consequences: Twelve Years under the DMCA, 2010, EFF
- (optional)
Circumventing
Authority: Loopholes in the DMCA's Access Controls, Rucker, Duke
Law, 2009.
- (optional)
What Intellectual Property Law
Should Learn from Software, James Boyle, CACM, 2009.
-
Software
Patents--Obstacles to software development, Richard Stallman, March 2002.
-
The Coming War on General Computation
, Cory Doctorow, 28th Chaos Communication Congress (28C3),
December 2011.
- Open Source Baselines:
Compared to What? by Lawrence Lessig, 2002, (from
book, Government Policy Toward Open Source Software, Editor. Robert
Hahn).
February 6-10
Cyberwar, Cybercrime, Malware
Background
-
In Digital Combat, U.S. Finds no Easy Deterrent, NY Times, January
25, 2010. Markoff, Sanger, Shanker.
- U.S. military
cyberwar: What's off-limits?, Declan McCullagh, cnet news, July 29, 2010.
-
Who Controls the Internet?,
Misha Glenny, Financial Times, October 8, 2010.
-
The War Against Botnets,
Samuel Greengard, CACM, February 2012.
Articles
- Cybercrime 2.0: When
the Cloud Turns Dark, CACM, April 2009, Provos, Rajab, Mavrommatis.
-
Your Botnet is My Botnet:
Analysis of a Botnet Takeover, Stone-Gross, Cova, Cavallaro,
Gilbert, Szydlowski, Kemmerer, Kruegel, and Vigna, Conference and
Commmunications Security (CCS), 2009. technical
-
Stuxnet Worm -- A Declaration of Cyber-War,
Michael Joseph Gross, Vanity Fair, 2011. Local copy
-
(optional)
Stuxnet and the Future of Cyber War, Farwell and Rohozinski, Survival, V. 53, Issue 1, 2011. pp. 23-40.
-
(optional)
An Analysis of Underground Forums
, Motoyama, McCoy, Levchenko, Savage, and Voelker, ACM Internet Measurement Conference' 11, November 2-4, 2011.
-
(optional)
The Underground Economy of Spam: A Botmaster's Perspective
of Coordinating Large-Scale Spam Campaigns
, Brett Stone-Gross, Thorsten Holzz, Gianluca Stringhinix, and Giovanni Vigna, USENIX Symposium on Large-Scale Exploits and Emerging Threats, 2011.
March 12-16
Anonymity, Privacy, Cryptography
Background
-
Overview of Tor Project
Articles
-
Teenage
Insults, Scrawled on Web, Not on Walls, Tamar Lewin, NY Times, May
5, 2010.
-
Lesson
From Tor Hack: Anonymity and Privacy Aren't the Same, Bruce
Schneier, Wired, September, 2007.
-
Radical
Opacity,
Julian Dibbell, MIT Technology Review, Sept/Oct 2010. The article
likely requires a password, instead read this
mirrored
article/website at Duke or
paper in PDF at Duke
-
Anonymity Loves Company: Usability and the Network Effect,
Dingledine, Mathewson, WEIS 2006. technical
March 19-23
Google and Facebook
-
What Search Can Predict?, Sharad Goel, Jake M. Hofman, Sebastien Lahaie, David M. Pennock, and Duncan J. Watts,
PNAS Early Edition, 2010. technical
(
Blog article and user comments)
-
The Externalities of Search 2.0: The Emerging Privacy Threats when the
Drive for the Perfect Search Engine meets Web 2.0
, Michael Zimmer, First Monday, Volume 13, Number 3, March 2008.
-
Have I Been Googled?: Character and Fitness in
the Age of Google, Facebook, and YouTube
Dina Epstein, 21 Geo. J. Legal Ethics 715 2008
-
Google and the Limits of Antitrust: The Case against the
Case against Google
, Geoffrey A. Manne and Joshua D. Wright,
Harvard Journal of Law and Public Policy, 2011.
March 26-30
Final Project Proposal Presentations
Internet Censorship
Articles (No review required)
-
A Taxonomy of Internet Censorship and AntiCensorship, Christopher S. Leberknight, Mung Chiang, Harold
Vincent Poor, Felix Wong, International Journal of E-Politics (IJEP), 2012.
-
Measuring Global Internet Filtering, Robert Faris and Nart Villeneuve, The Access Series, OpenNet Initiative and MIT press, 2011.
April 2-6
Crowdsourcing
Background
-
The Rise
of Crowdsourcing, Jeff Howe, Wired, June 2006.
Articles
-
Crowdsourcing Systems on the World-Wide Web, Anhai Doan, Raghu Ramakrishnan, Alon Y. Halevy, CACM, April 2011.
-
The DARPA Network Challenge, John C. Rang, Manuel Cebbian, Nicklaus a. Giacobe, Hyun-Woo Kim, Taemie Kim, and Douglas Wickert, CACM, April 2011
-
Should we trust the wisdom of crowds? Tom de Catella, BBC News
Magazine, July 5, 2010.
-
Shirky and Sanger, or the costs of
crowdsourcing, Mathiew O'Neil, Journal of Science Communication,
9(1), March 2010.
April 16-20
Emerging Internet Concerns
- The Emergy and Energy of the Internet, Barath Raghavan and Justin Ma,
HotNets 2011.
- BufferBloat: What's Wrong With the
Internet?, A discussion with Vint Cerf, Van Jacobson, Nick Weaver, and
Jim Gettys, CACM, Feb 2012.
- The Freedom of Internet Act,
Reddit, Feb 2012. Open
Source Politics, Reuters, Feb 2012. (No review required)
- War 2.0: Cyberweapons and Ethics, Patrick Lin, Fritz Allhoff, Neil C. Rowe, CACM, March 2012. (No review required)