000042025 000__ 02026cam\a22002535i\4500 000042025 001__ 42025 000042025 003__ SzGeWIPO 000042025 005__ 20240708145856.0 000042025 008__ 200624s2005\\\\sz\\\\\\r\\\\\000\0\eng\d 000042025 040__ $$aSzGeWIPO$$beng$$erda 000042025 041__ $$aeng 000042025 1001_ $$aZittrain, Jonathan L. 000042025 24503 $$aThe Generative Internet 000042025 264_1 $$a[Cambridge, Massachusetts] :$$bThe Harvard Law Review Association,$$c2005. 000042025 300__ $$a63 pages 000042025 336__ $$atext$$btxt$$2rdacontent 000042025 337__ $$aunmediated$$bn$$2rdamedia 000042025 338__ $$avolume$$bnc$$2rdacarrier 000042025 520__ $$aThe generative capacity for unrelated and unaccredited audiences to build and distribute code and content through the Internet to its tens of millions of attached personal computers has ignited growth and innovation in information technology and has facilitated new creative endeavors. It has also given rise to regulatory and entrepreneurial backlashes. A further backlash among consumers is developing in response to security threats that exploit the openness of the Internet and of PCs to third-party contribution. A shift in consumer priorities from generativity to stability will compel a response from regulators and markets and, if unaddressed, could prove decisive in closing today's open computing environments. This Article explains why PC openness is as important as network openness, as well as why today's open network might give rise to unduly closed endpoints. It argues that the Internet is better conceptualized as a generative grid that includes both PCs and networks rather than as an open network indifferent to the configuration of its endpoints. Applying this framework, the Article explores ways - some of them bound to be unpopular among advocates of an open Internet represented by uncompromising end-to-end neutrality - in which the Internet can be made to satisfy genuine and pressing security concerns while retaining the most important generative aspects of today's networked technology. 000042025 525__ $$aPublished in : Harvard Law Review, Vol. 119, p. 1974 000042025 650_0 $$aCyberlaw 000042025 650_0 $$aInternet 000042025 650_0 $$aGenerativity 000042025 650_0 $$aDRM 000042025 650_0 $$aSecurity 000042025 85641 $$uhttps://papers.ssrn.com/sol3/papers.cfm?abstract_id=847124$$yView this resource 000042025 904__ $$aJournal article 000042025 980__ $$aBIB