000042025 000__ 02026cam\a22002535i\4500
000042025 001__ 42025
000042025 003__ SzGeWIPO
000042025 005__ 20240708145856.0
000042025 008__ 200624s2005\\\\sz\\\\\\r\\\\\000\0\eng\d
000042025 040__ $$aSzGeWIPO$$beng$$erda
000042025 041__ $$aeng
000042025 1001_ $$aZittrain, Jonathan L.
000042025 24503 $$aThe Generative Internet
000042025 264_1 $$a[Cambridge, Massachusetts] :$$bThe Harvard Law Review Association,$$c2005.
000042025 300__ $$a63 pages
000042025 336__ $$atext$$btxt$$2rdacontent
000042025 337__ $$aunmediated$$bn$$2rdamedia
000042025 338__ $$avolume$$bnc$$2rdacarrier
000042025 520__ $$aThe generative capacity for unrelated and unaccredited audiences to build and distribute code and content through the Internet to its tens of millions of attached personal computers has ignited growth and innovation in information technology and has facilitated new creative endeavors. It has also given rise to regulatory and entrepreneurial backlashes. A further backlash among consumers is developing in response to security threats that exploit the openness of the Internet and of PCs to third-party contribution. A shift in consumer priorities from generativity to stability will compel a response from regulators and markets and, if unaddressed, could prove decisive in closing today's open computing environments. This Article explains why PC openness is as important as network openness, as well as why today's open network might give rise to unduly closed endpoints. It argues that the Internet is better conceptualized as a generative grid that includes both PCs and networks rather than as an open network indifferent to the configuration of its endpoints. Applying this framework, the Article explores ways - some of them bound to be unpopular among advocates of an open Internet represented by uncompromising end-to-end neutrality - in which the Internet can be made to satisfy genuine and pressing security concerns while retaining the most important generative aspects of today's networked technology.
000042025 525__ $$aPublished in : Harvard Law Review, Vol. 119, p. 1974
000042025 650_0 $$aCyberlaw
000042025 650_0 $$aInternet
000042025 650_0 $$aGenerativity
000042025 650_0 $$aDRM
000042025 650_0 $$aSecurity
000042025 85641 $$uhttps://papers.ssrn.com/sol3/papers.cfm?abstract_id=847124$$yView this resource
000042025 904__ $$aJournal article
000042025 980__ $$aBIB