Compsci 182s, Spring 2011, Readings
we'll use in the course. Other
readings will be linked here as well.
Record paper responses for each paper you
Discussion Leaders for each week.
Tussles and Overview
- The Internet as System
and Spirit, Appendix from Blown to
Bits, by Abelson, Ledeen, and Lewis, excerpted by Creative Commons
Code is Law by Lawrence Lessig, Code 2.0, 2006
The Future of the Internet is ... regulation?, by Nate Anderson, ars
technica, February 10, 2009
- skim, optional but good Introduction
to Internet Architecture and Institutions, by Ethan Zuckerman and
Andrew McLaughlin, Berkman Center, 2003.
Internet Governance and Protocols
- Save the Internet,
website advocating for Net Neutrality
Google Public Policy Blog on Net Neutrality
Who Should Govern the Internet?
by Nanda Kumar and Abbe Mowshowitz, CACM, 2006.
'Rough Consensus and Running Code'
and the Internet-OSI Standards War, Andrew Russell, IEEE
Annals of the History of Computing, 2006.
- Tussle in Cyberspace
by Clark, Wroclawski, Sollins, and Braden, 2005. technical
January 31-February 4
Copyright, Patents, DMCA, Open Source
Intellectual Property for CS Students
Unintended Consequences: Ten Years under the DMCA, 2008, EFF
Authority: Loopholes in the DMCA's Access Controls, Rucker, Duke
What Intellectual Property Law
Should Learn from Software, James Boyle, CACM, 2009.
Patents--Obstacles to software development, Richard Stallman, March 2002.
Why "Open Source" Misses the
of Free Software, Richard Stallman, CACM, June 2009.
- Open Source Baselines:
Compared to What? by Lawrence Lessig, 2002, (from
book, Government Policy Toward Open Source Software, ed. Robert
Cyberwar, Cybercrime, Malware
In Digital Combat, U.S. Finds no Easy Deterrent, NY Times, January
25, 2010. Markoff, Sanger, Shanker.
- U.S. military
cyberwar: What's off-limits?, Declan McCullagh, cnet news, July 29, 2010.
- Cybercrime 2.0: When
the Cloud Turns Dark, CACM, April 2009, Provos, Rajab, Mavrommatis.
Your Botnet is My Botnet:
Analysis of a Botnet Takeover, Stone-Gross, Cova, Cavallaro,
Gilbert, Szydlowski, Kemmerer, Kruegel, and Vigna, Conference and
Commmunications Security (CCS), 2009. technical
Is the Internet for Porn? An Insight into the Online Adult Industry,
Wondracek, Holz, Platzer, Kirda, Kruegel, WEIS 2010. technical
Anonymity, Privacy, Cryptography
Insults, Scrawled on Web, Not on Walls, Tamar Lewin, NY Times, May
From Tor Hack: Anonymity and Privacy Aren't the Same, Bruce
Schneier, Wired, September, 2007.
Julian Dibbell, MIT Technology Review, Sept/Oct 2010. The article
likely requires a password, instead read this
article/website at Duke or
paper in PDF at Duke
Anonymity Loves Company: Usability and the Network Effect,
Dingledine, Mathewson, WEIS 2006. technical
March 28-April 1
Google and Facebook
The Externalities of Search 2.0: The Emerging Privacy Threats when the
Drive for the Perfect Search Engine meets Web 2.0
, Michael Zimmer, First Monday, Volume 13, Number 3, March 2008.
Have I Been Googled?: Character and Fitness in
the Age of Google, Facebook, and YouTube
Dina Epstein, 21 Geo. J. Legal Ethics 715 2008
Google and the Limits of Antitrust: The Case against the
Case against Google
, Geoffrey A. Manne and Joshua D. Wright,
Harvard Journal of Law and Public Policy, 2011.
Should we trust the wisdom of crowds? Tom de Catella, BBC News
Magazine, July 5, 2010.
Protests Becoming Crowd-Sourced Cyber War, Kit Eaton, Fastcompany,
Jun 17, 2009.
Crowdsourcing, Jeff Howe, Wired, June 2006.
Shirky and Sanger, or the costs of
crowdsourcing, Mathiew O'Neil, Journal of Science Communication,
9(1), March 2010.
Measuring Online Service Availability
Using Twitter, Motoyama, Meeder, Levchenko, Voelker, Savage, WOSN,
June 2010. technical