Compsci 182s: Technical and Social Foundations of the Internet (Spring 2012), Readings
we'll use in the course. Other
readings will be linked here as well.
Record paper responses for each paper you
read before 8am Monday of the accompanying discusson week.
Rate peer responses before 3pm Tuesday of the accompanying discusson week.
Internet Governance and Protocols
Backgrounder on 'net neutrality', Jon Healey, LA
Times editorial board member, November 9, 2011
Google Public Policy Blog on Net Neutrality
The Future of the Internet is ... regulation?, by Nate Anderson, ars
technica, February 10, 2009
Who Should Govern the Internet?
by Nanda Kumar and Abbe Mowshowitz, CACM, 2006.
'Rough Consensus and Running Code'
and the Internet-OSI Standards War, Andrew Russell, IEEE
Annals of the History of Computing, 2006.
- Tussle in Cyberspace
by Clark, Wroclawski, Sollins, and Braden, 2005. technical
January 30-February 3
Copyright, Patents, DMCA, Open Source
Intellectual Property for CS Students
Unintended Consequences: Twelve Years under the DMCA, 2010, EFF
Authority: Loopholes in the DMCA's Access Controls, Rucker, Duke
What Intellectual Property Law
Should Learn from Software, James Boyle, CACM, 2009.
Patents--Obstacles to software development, Richard Stallman, March 2002.
The Coming War on General Computation
, Cory Doctorow, 28th Chaos Communication Congress (28C3),
- Open Source Baselines:
Compared to What? by Lawrence Lessig, 2002, (from
book, Government Policy Toward Open Source Software, Editor. Robert
Cyberwar, Cybercrime, Malware
In Digital Combat, U.S. Finds no Easy Deterrent, NY Times, January
25, 2010. Markoff, Sanger, Shanker.
- U.S. military
cyberwar: What's off-limits?, Declan McCullagh, cnet news, July 29, 2010.
Who Controls the Internet?,
Misha Glenny, Financial Times, October 8, 2010.
The War Against Botnets,
Samuel Greengard, CACM, February 2012.
- Cybercrime 2.0: When
the Cloud Turns Dark, CACM, April 2009, Provos, Rajab, Mavrommatis.
Your Botnet is My Botnet:
Analysis of a Botnet Takeover, Stone-Gross, Cova, Cavallaro,
Gilbert, Szydlowski, Kemmerer, Kruegel, and Vigna, Conference and
Commmunications Security (CCS), 2009. technical
Stuxnet Worm -- A Declaration of Cyber-War,
Michael Joseph Gross, Vanity Fair, 2011. Local copy
Stuxnet and the Future of Cyber War, Farwell and Rohozinski, Survival, V. 53, Issue 1, 2011. pp. 23-40.
An Analysis of Underground Forums
, Motoyama, McCoy, Levchenko, Savage, and Voelker, ACM Internet Measurement Conference' 11, November 2-4, 2011.
The Underground Economy of Spam: A Botmaster's Perspective
of Coordinating Large-Scale Spam Campaigns
, Brett Stone-Gross, Thorsten Holzz, Gianluca Stringhinix, and Giovanni Vigna, USENIX Symposium on Large-Scale Exploits and Emerging Threats, 2011.
Anonymity, Privacy, Cryptography
Overview of Tor Project
Insults, Scrawled on Web, Not on Walls, Tamar Lewin, NY Times, May
From Tor Hack: Anonymity and Privacy Aren't the Same, Bruce
Schneier, Wired, September, 2007.
Julian Dibbell, MIT Technology Review, Sept/Oct 2010. The article
likely requires a password, instead read this
article/website at Duke or
paper in PDF at Duke
Anonymity Loves Company: Usability and the Network Effect,
Dingledine, Mathewson, WEIS 2006. technical
Google and Facebook
What Search Can Predict?, Sharad Goel, Jake M. Hofman, Sebastien Lahaie, David M. Pennock, and Duncan J. Watts,
PNAS Early Edition, 2010. technical
Blog article and user comments)
The Externalities of Search 2.0: The Emerging Privacy Threats when the
Drive for the Perfect Search Engine meets Web 2.0
, Michael Zimmer, First Monday, Volume 13, Number 3, March 2008.
Have I Been Googled?: Character and Fitness in
the Age of Google, Facebook, and YouTube
Dina Epstein, 21 Geo. J. Legal Ethics 715 2008
Google and the Limits of Antitrust: The Case against the
Case against Google
, Geoffrey A. Manne and Joshua D. Wright,
Harvard Journal of Law and Public Policy, 2011.
Final Project Proposal Presentations
Articles (No review required)
A Taxonomy of Internet Censorship and AntiCensorship, Christopher S. Leberknight, Mung Chiang, Harold
Vincent Poor, Felix Wong, International Journal of E-Politics (IJEP), 2012.
Measuring Global Internet Filtering, Robert Faris and Nart Villeneuve, The Access Series, OpenNet Initiative and MIT press, 2011.
of Crowdsourcing, Jeff Howe, Wired, June 2006.
Crowdsourcing Systems on the World-Wide Web, Anhai Doan, Raghu Ramakrishnan, Alon Y. Halevy, CACM, April 2011.
The DARPA Network Challenge, John C. Rang, Manuel Cebbian, Nicklaus a. Giacobe, Hyun-Woo Kim, Taemie Kim, and Douglas Wickert, CACM, April 2011
Should we trust the wisdom of crowds? Tom de Catella, BBC News
Magazine, July 5, 2010.
Shirky and Sanger, or the costs of
crowdsourcing, Mathiew O'Neil, Journal of Science Communication,
9(1), March 2010.
Emerging Internet Concerns
- The Emergy and Energy of the Internet, Barath Raghavan and Justin Ma,
- BufferBloat: What's Wrong With the
Internet?, A discussion with Vint Cerf, Van Jacobson, Nick Weaver, and
Jim Gettys, CACM, Feb 2012.
- The Freedom of Internet Act,
Reddit, Feb 2012. Open
Source Politics, Reuters, Feb 2012. (No review required)
- War 2.0: Cyberweapons and Ethics, Patrick Lin, Fritz Allhoff, Neil C. Rowe, CACM, March 2012. (No review required)