Abstract
Considering the social impact of a proposed future Internet architecture.
- Afanasyev, A., Mahadevan, P., Moiseenko, I., Uzun, E. and Zhang, L. Interest flooding attack and countermeasures in Named Data Networking. IFIP Networking Conference, 2013, 1--9.Google Scholar
- Agyapong, P.K. and Sirbu, M. Economic incentives in information-centric networking: Implications for protocol design and public policy. IEEE Commun. Mag. 50, 12 (2012), 18--26.Google ScholarCross Ref
- Bannis, A. and Burke, J.A. Creating a secure, integrated home network of things with Named Data Networking. UCLA, 2015, Los Angeles, CA.Google Scholar
- Baxter, G. and Sommerville, I. 2011. Socio-technical systems: From design methods to systems engineering. Interacting with Computers 23, 1 (2011), 4--17. Google ScholarDigital Library
- Bendrath, R. and Mueller, M. The end of the net as we know it? Deep packet inspection and Internet governance. New Media & Society 13, 7 (2011), 1142--1160.Google ScholarCross Ref
- Best, M.L. and Wade, K.W. Democratic and anti-Democratic regulators of the Internet: A framework. The Information Society 23, 5 (2007), 405--411, Google ScholarDigital Library
- Blanchette, J.-F. and Johnson, D.G. Data retention and the panoptic society: the social benefits of forgetfulness. The Information Society 18 (2002), 33--45.Google ScholarCross Ref
- Burke, J.A., Gasti, P., Nathan, N. and Tsudik, G. Securing instrumented environments over content-centric networking: the case of lighting control. In Proceedings of IEEE INFOCOMM 2013 NOMEN Workshop. Retrieved Aug.7, 2015; http://named-data.net/publications/nomen13/Google Scholar
- Chaabane, A., De Cristofaro, E., Kaafar, M.A. and Uzun, E. 2013. Privacy in content-oriented networking: Threats and countermeasures. SIGCOMM Comput. Commun. Rev. 43, 3 (2013), 25--33 Google ScholarDigital Library
- Citron, D.K. Civil rights in our information age. In The offensive internet: privacy, speech, and reputation. Harvard University Press, Cambridge, MA and London, 2010, 31--49.Google Scholar
- Clark, D.D., Bauer, S., Lehr, W. et al. Measurement and analysis of Internet interconnection and congestion. In Proceedings of the 42nd Research Conference on Communication, Information, and Internet Policy. Social Science Research Network, 2014. Retrieved Aug. 17, 2015; http://papers.ssrn.com.proxy-um.researchport.umd.edu/abstract=2417573Google Scholar
- Clark, D.D., Wroclawski, J., Sollins, K.R. and Braden, R. Tussle in cyberspace: Defining tomorrow's Internet. In Proceedings of the 2002 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, ACM, 347--356. Google ScholarDigital Library
- Cohen, J.E. A right to read anonymously: A closer look at "copyright management" in cyberspace. Connecticut Law Review 28 (1996), 981--1039.Google Scholar
- Compagno, A. Conti, M., Gasti, P. and Tsudik, G. Poseidon: Mitigating interest flooding DDoS attacks in Named Data Networking. In Proceedings of the 2013 IEEE 38th Conference on Local Computer Networks, 630--638.Google Scholar
- Cooke, L. 2007. Controlling the net: European approaches to content and access regulation. Journal of Information Science 33, 3 (2007), 360--376. Google ScholarDigital Library
- DeNardis. L. Hidden levers of internet control. Information, Communication & Society 15, 5 (2012), 720--738Google Scholar
- DiBenedetto, S., Gasti, P., Tsudik, G. and Uzun, E. ANDaNA: Anonymous Named Data Networking application. In Proceedings of the 19th Annual Network & Distributed System Security Symposium, Internet Society. Retrieved June 26, 2012; http://arxiv.org/abs/1112.2205Google Scholar
- Fu, W., Abraham, H.B. and Crowley, P. Synchronizing namespaces with invertible bloom filters. In Proceedings of the 11th ACM/IEEE Symposium on Architectures for Networking and Communications Systems. IEEE Computer Society, 123--134. Retrieved Aug. 17, 2015; http://dl.acm.org/citation.cfm?id=2772722.2772740 Google ScholarDigital Library
- Gillespie, T. Wired Shut: Copyright and the Shape of Digital Culture. The MIT Press, 2009. Google ScholarDigital Library
- Google transparency report. 2005. Retrieved Aug. 17, 2015; http://www.google.com/transparencyreport/removals/copyright/Google Scholar
- Jacobson, V., Smetters, D.K., Thornton, J.D., Plass, M., Briggs, N. and Braynard, R. Networking named content. Commun. ACM 55, 1 (Jan. 2012), 117--124. Google ScholarDigital Library
- Lessig, L. Code: Version 2.0. Basic Books, New York, NY, 2006. Google ScholarDigital Library
- Mayer-Schoenberger, V. Useful Void: The Art of Forgetting in the Age of Ubiquitous Computing. Harvard University, Cambridge, MA, 2007.Google Scholar
- Pfaffenberger, B. Technological dramas. Science, Technology & Human Values 17, 3 (1992), 282--312.Google ScholarCross Ref
- Phillips, D.J. From privacy to visibility: Context, identity, and power in ubiquitous computing environments. Social Text 23, 2 (2005), 95--108.Google ScholarCross Ref
- Richards, N.M. The perils of social reading. Georgetown Law Journal 101, 3 (2013). Retrieved Apr. 15, 2012; http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2031307Google Scholar
- Rosen, J. The right to be forgotten. Stanford Law Review Online 64 (2012), 88.Google Scholar
- Shang, W., Ding, Q., Marianantoni, A., Burke, J. and Zhang, L. Securing building management systems using named data networking. IEEE Network 28, 3 (2014), 50--56.Google Scholar
- Yu, Y., Afanasyev, A., Clark, D., claffy, kc, Jacobson, V. and Zhang, L. Schematizing and automating trust in Named Data Networking. In Proceedings of the 2nd ACM Conference on Information-Centric Networking. ACM, 2015. Google ScholarDigital Library
- Yu, Y., Afanasyev, A. and Zhang, L. Name-based access control. University of California Los Angeles, CA, 2015.Google Scholar
- Zhang, L. Estrin, D., Burke, J.A. et al. Named Data Networking Tech Report 001. University of California Los Angeles, CA, 2010. Retrieved Sept. 8, 2014; http://named-data.net/publications/techreports/tr001ndn-proj/Google Scholar
Index Terms
Anticipating policy and social implications of named data networking
Recommendations
Uses and gratifications of social networking sites for bridging and bonding social capital
Applying uses and gratifications theory (UGT) and social capital theory, our study examined users of four social networking sites (SNSs) (Facebook, Twitter, Instagram, and Snapchat), and their influence on online bridging and bonding social capital. ...
Social Networking Sites: Their Users and Social Implications — A Longitudinal Study
The rapid adoption of social networking sites (SNSs) raises important questions about the social implications of such usage. Drawing on unique longitudinal data, surveying a representative sample of Norwegian online users (N = 2,000, age 15–75 years) in ...
Online Bonding and Bridging Social Capital via Social Networking Sites
This research aimed to explore types of online social capital bridging and bonding that the Emiratis perceive in the context of social networking site SNS usage. A snow-ball sample of 230 Emiratis from two Emirates, Abu Dhabi and Dubai was used. The ...
Comments