skip to main content
Skip header Section
The Future of the Internet--And How to Stop ItApril 2008
Publisher:
  • Yale University Press
  • 302 Temple Street New Haven, CT
  • United States
ISBN:978-0-300-12487-3
Published:14 April 2008
Pages:
352
Skip Bibliometrics Section
Bibliometrics
Skip Abstract Section
Abstract

This extraordinary book explains the engine that has catapulted the Internet from backwater to ubiquityand reveals that it is sputtering precisely because of its runaway success. With the unwitting help of its users, the generative Internet is on a path to a lockdown, ending its cycle of innovationand facilitating unsettling new kinds of control.IPods, iPhones, Xboxes, and TiVos represent the first wave of Internet-centered products that cant be easily modified by anyone except their vendors or selected partners. These tethered appliances have already been used in remarkable but little-known ways: car GPS systems have been reconfigured at the demand of law enforcement to eavesdrop on the occupants at all times, and digital video recorders have been ordered to self-destruct thanks to a lawsuit against the manufacturer thousands of miles away. New Web 2.0 platforms like Google mash-ups and Facebook are rightly toutedbut their applications can be similarly monitored and eliminated from a central source. As tethered appliances and applications eclipse the PC, the very nature of the Internetits generativity, or innovative characteris at risk.The Internets current trajectory is one of lost opportunity. Its salvation, Zittrain argues, lies in the hands of its millions of users. Drawing on generative technologies like Wikipedia that have so far survived their own successes, this book shows how to develop new technologies and social structures that allow users to work creatively and collaboratively, participate in solutions, and become true netizens.

Cited By

  1. ACM
    Lee K, Cooper A and Grimmelmann J Talkin' 'Bout AI Generation Proceedings of the Symposium on Computer Science and Law, (48-63)
  2. Fürstenau D, Baiyere A, Schewina K, Schulte-Althoff M and Rothe H (2023). Extended Generativity Theory on Digital Platforms, Information Systems Research, 34:4, (1686-1710), Online publication date: 1-Dec-2023.
  3. ACM
    Ghoshal S and Dasgupta S Design Values in Action: Toward a Theory of Value Dilution Proceedings of the 2023 ACM Designing Interactive Systems Conference, (2347-2361)
  4. ACM
    Susser D Decision Time: Normative Dimensions of Algorithmic Speed Proceedings of the 2022 ACM Conference on Fairness, Accountability, and Transparency, (1410-1420)
  5. Rehm S, Goel L and Junglas I (2022). Researching digitalized work arrangements, Information and Organization, 32:2, Online publication date: 1-Jun-2022.
  6. Hevner A and Gregor S (2022). Envisioning entrepreneurship and digital innovation through a design science research lens, Information and Management, 59:3, Online publication date: 1-Apr-2022.
  7. ACM
    Calefato F, Iaffaldano G, Trisolini L and Lanubile F (2021). An In-Depth Analysis of Occasional and Recurring Collaborations in Online Music Co-creation, ACM Transactions on Social Computing, 4:4, (1-40), Online publication date: 31-Dec-2022.
  8. Zorina A, Bélanger F, Kumar N and Clegg S (2021). Watchers, Watched, and Watching in the Digital Age, Organization Science, 32:6, (1571-1596), Online publication date: 1-Nov-2021.
  9. Carter D, Acker A and Sholler D (2021). Investigative approaches to researching information technology companies, Journal of the Association for Information Science and Technology, 72:6, (655-666), Online publication date: 14-May-2021.
  10. Zorina A and Dutton W (2021). Theorizing Actor Interactions Shaping Innovation in Digital Infrastructures, Organization Science, 32:1, (156-180), Online publication date: 1-Jan-2021.
  11. ACM
    Morreale F and Eriksson M "My Library Has Just Been Obliterated": Producing New Norms of Use Via Software Update Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, (1-13)
  12. Østerlie T and Monteiro E (2020). Digital sand, Information and Organization, 30:1, Online publication date: 1-Mar-2020.
  13. Cennamo C and Santaló J (2019). Generativity Tension and Value Creation in Platform Ecosystems, Organization Science, 30:3, (617-641), Online publication date: 1-May-2019.
  14. Pitt J, Milanovic K, Coupland A, Allan T, Davies A, Lane T, Malagoni A, Thapar A and Shalhoub J A Collective Adaptive Socio-Technical System for Remote- and Self-supervised Exercise in the Treatment of Intermittent Claudication Leveraging Applications of Formal Methods, Verification and Validation. Distributed Systems, (63-78)
  15. Bauer J and Knieps G (2018). Complementary innovation and network neutrality, Telecommunications Policy, 42:2, (172-183), Online publication date: 1-Mar-2018.
  16. ACM
    Sutherland W and Jarrahi M (2017). The Gig Economy and Information Infrastructure, Proceedings of the ACM on Human-Computer Interaction, 1:CSCW, (1-24), Online publication date: 6-Dec-2017.
  17. (2017). Till data do us part, Information and Organization, 27:4, (191-210), Online publication date: 1-Dec-2017.
  18. ACM
    Malone T, Nickerson J, Laubacher R, Fisher L, de Boer P, Han Y and Towne W Putting the Pieces Back Together Again Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, (1661-1674)
  19. Kim J, Hlee S and Joun Y (2016). Green practices of the hotel industry, International Journal of Information Management: The Journal for Information Professionals, 36:6, (1340-1349), Online publication date: 1-Dec-2016.
  20. Centivany A Values, ethics and participatory policymaking in online communities Proceedings of the 79th ASIS&T Annual Meeting: Creating Knowledge, Enhancing Lives through Information & Technology, (1-10)
  21. ACM
    Haskel L and Graham P Whats GNU got to do with it? Proceedings of the 14th Participatory Design Conference: Short Papers, Interactive Exhibitions, Workshops - Volume 2, (17-20)
  22. ACM
    McInnis B, Cosley D, Nam C and Leshed G Taking a HIT Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, (2271-2282)
  23. ACM
    Jones S (2016). Teaching smart phone ethics, ACM SIGCAS Computers and Society, 45:3, (445-452), Online publication date: 5-Jan-2016.
  24. DeNardis L and Hackl A (2015). Internet governance by social media platforms, Telecommunications Policy, 39:9, (761-770), Online publication date: 1-Oct-2015.
  25. Staykova K and Damsgaard J (2015). The race to dominate the mobile payments platform, Electronic Commerce Research and Applications, 14:5, (319-330), Online publication date: 1-Sep-2015.
  26. Kretzer M, Kleinedler M, Theilemann C and Mädche A Designing a Report Recommendation Assistant Proceedings of the 10th International Conference on New Horizons in Design Science: Broadening the Research Agenda - Volume 9073, (87-103)
  27. (2015). Imaginaries of ownership, Telematics and Informatics, 32:2, (400-408), Online publication date: 1-May-2015.
  28. Bauer J (2014). Platforms, systems competition, and innovation, Telecommunications Policy, 38:8, (662-673), Online publication date: 1-Sep-2014.
  29. ACM
    Osman K The role of conflict in determining consensus on quality in Wikipedia articles Proceedings of the 9th International Symposium on Open Collaboration, (1-6)
  30. ACM
    Dasgupta S From surveys to collaborative art Proceedings of the 12th International Conference on Interaction Design and Children, (28-35)
  31. Shen W (2012). Deconstructing the myth of Alipay Drama-Repoliticizing foreign investment in the telecommunications sector in China, Telecommunications Policy, 36:10-11, (929-942), Online publication date: 1-Nov-2012.
  32. de Boer V, De Leenheer P, Bon A, Gyan N, van Aart C, Guéret C, Tuyp W, Boyera S, Allen M and Akkermans H RadioMarché Proceedings of the 24th international conference on Advanced Information Systems Engineering, (518-532)
  33. Hull G (2012). Robert Merges, Ethics and Information Technology, 14:2, (169-177), Online publication date: 1-Jun-2012.
  34. ACM
    Hintz A and Milan S Struggling for open information environments Proceedings of the 2012 iConference, (325-331)
  35. ACM
    Paterson N Walled gardens Proceedings of the 2012 iConference, (97-104)
  36. ACM
    Jafarinaimi N Exploring the character of participation in social media Proceedings of the 2012 iConference, (72-79)
  37. Faraj S, Jarvenpaa S and Majchrzak A (2011). Knowledge Collaboration in Online Communities, Organization Science, 22:5, (1224-1239), Online publication date: 1-Sep-2011.
  38. Weng Y and Zhao S The legal challenges of networked robotics Proceedings of the 25th IVR Congress conference on AI Approaches to the Complexity of Legal Systems: models and ethical challenges for legal systems, legal language and legal ontologies, argumentation and software agents, (61-72)
  39. ACM
    Richards R and Bruce T Examples of specialized legal metadata adapted to the digital environment, from the U.S. code of federal regulations Proceedings of the 12th Annual International Digital Government Research Conference: Digital Government Innovation in Challenging Times, (229-234)
  40. ACM
    Bederson B and Quinn A Web workers unite! addressing challenges of online laborers CHI '11 Extended Abstracts on Human Factors in Computing Systems, (97-106)
  41. ACM
    Pascalau E Towards TomTom like systems for the web Proceedings of the 2nd International Workshop on Business intelligencE and the WEB, (44-47)
  42. ACM
    Pollock K iControl Proceedings of the 2011 iConference, (252-259)
  43. ACM
    Brown I, Clark D and Trossen D Should specific values be embedded in the internet architecture? Proceedings of the Re-Architecting the Internet Workshop, (1-6)
  44. ACM
    Misuraca G, Broster D and Centeno C Envisioning digital Europe 2030 Proceedings of the 4th International Conference on Theory and Practice of Electronic Governance, (347-356)
  45. ACM
    Javanmardi S and Lopes C Statistical measure of quality in Wikipedia Proceedings of the First Workshop on Social Media Analytics, (132-138)
  46. Irestig M and Timpka T (2010). Towards responsible system development in health services, Journal of Biomedical Informatics, 43:1, (137-143), Online publication date: 1-Feb-2010.
  47. ACM
    Shilton K (2009). Four billion little brothers?, Communications of the ACM, 52:11, (48-53), Online publication date: 1-Nov-2009.
  48. ACM
    Church L and Whitten A Generative usability Proceedings of the 2009 workshop on New security paradigms workshop, (51-58)
  49. ACM
    Shilton K (2009). Four Billion Little Brothers? Privacy, mobile phones, and ubiquitous data collection, Queue, 7:7, (40-47), Online publication date: 1-Aug-2009.
  50. Stodden V and Meier P A global empirical evaluation of new communication technology use and democratic tendency Proceedings of the 3rd international conference on Information and communication technologies and development, (3-16)
  51. ACM
    Astrachan O (2009). Pander to ponder, ACM SIGCSE Bulletin, 41:1, (192-196), Online publication date: 4-Mar-2009.
  52. ACM
    Astrachan O Pander to ponder Proceedings of the 40th ACM technical symposium on Computer science education, (192-196)
  53. ACM
    Zittrain J (2009). Law and technologyThe end of the generative internet, Communications of the ACM, 52:1, (18-20), Online publication date: 1-Jan-2009.
Contributors
  • Harvard University

Recommendations

Reviews

Harry Skianis

Wandering the timeline of the Internet's life, Zittrain projects its future generations using sociological, genealogical, and technological arguments. The way the book is structured and enriched makes it an ideal reference book for those in the communications field, such as managers, academics, researchers, and system designers. The book is made up of nine main chapters, broken into three parts, all of which are supported by a long list of references. Moreover, a short introduction outlines the issues discussed in the text. The book is further complemented by a concluding part, acknowledging the people that helped Zittrain, as well as an index. The first part, "The Rise and Stall of the Generative Net," looks into the history of the Internet's evolution as compared to monolithic networks and appliances. Chapter 1, "Battle of the Boxes," presents the everlasting fight between generative platforms and single/limited purpose appliances, and variants on their business exploitation. This includes paradigms such as the Hollerith era and its evolution toward IBM-like approaches, single-purpose appliances, and the killer of all-known as the personal computer (PC). Chapter 2, "Battle of the Networks," is an extensive reference on the creation of networked devices, another means of communicating, including their many alternative approaches. A clear line of progress moved the center of gravity from the early proprietary networks, in control of all aspects of communication, to the first communication among PCs, between UCLA and Stanford, to facilitators such as Winsock that enabled Internet-enabled applications such as the World Wide Web (WWW). With innovation comes a new environment that requires a new ethos, with design considerations related to the scalability aspects of newcomers, for example. Chapter 3, "Cybersecurity and the Generative Dilemma," presents all the issues that could hamper generative environments (for example, the Internet), in relation to the security of the average user. Having started as an exploration of uncharted waters, security bridging attacks developed in a way that could impact monolithic appliances if bulletproof solutions were required, leaving generative PCs and Internet tools for experts' eyes only. The second part, "After the Stall," magnifies and analyzes all aspects of the current Internet and its generative nature. Chapter 4, "The Generative Platform," discusses the generative concept, taking on the current "hourglass architecture" of the Internet. Guidelines for generative systems, and comparisons of such systems to nongenerative ones, are the core of this chapter. Close relatives are brought to the discussion, as well as a roadmap of the evolution of a generative idea to a well-accepted product. Chapter 5, "Tethered Appliances, Software as Service, and Perfect Enforcement," discusses a possible direction toward a controlled environment, as a result of "bad" code. In this direction, one can find appliances that support limited diversity from a certain service, regulations and efforts for law enforcement, or even Web 2.0 services that can change their offerings. This chapter offers many paradigms that provide a large and diversified list of possible real-life scenarios and ways around them. Maintaining generativity and resolving its unwelcomed by-products is like walking on thin ice. Chapter 6, "The Lessons of Wikipedia," discusses the paradigm of Wikipedia, its evolution and dominance among alternatives, and, most importantly, the self-regulation paradigm that it implies. This example provides a valuable lesson on how a generative technology can get successful, and remain favorable even when large numbers (possibly uncontrolled and unpredictable) kick in. The third and final part, "Solutions," looks into ways out of the fall of the generative Internet. Chapter 7, "Stopping the Future of the Internet: Stability on a Generative Net," argues for delicate maneuvering, necessary for the preservation of the generative Net in a fully developed and operational environment. Virtualization could be one answer, creating variation in access and capabilities, while tools can enable users to participate in the shaping of evolutionary spaces instead of allowing them to simply choose among a limited set of options. Moreover, field players such as software creators, operators, and Internet service providers (ISPs), among others, could be further involved, alongside legal and regulatory enhancements. Chapter 8, "Strategies for a Generative Future," builds on the previous chapter that discusses Internet preservation, depicting ways to change yet still maintain generativity in future generations of communication. Designers and developers of those coming generations need to have space for tethered appliances, software (always desirable to the general public), and nongenerative platforms, and at the same time enhance their performance against threats, including current and future drawbacks. Some design principles include data portability, network and application programming interface (API) neutrality, code and content thickets, liability regulation, and law aspects. Chapter 9, "Meeting the Risks of Generativity: Privacy 2.0," examines privacy issues at length, as they evolve alongside generative nets. Early privacy concerns are associated with government and corporate databases, while current concerns come along with the generative Internet. A thorough depiction of those second-generation privacy concerns is provided, including ways around those issues, accompanied by relevant social implications and evolution at the social plane. The conclusion takes on the fresh ideas that shape the Internet, the generations that form the future Internet, and guidelines for a "healthy" progression of services and networks. This book clearly stands out in its presentation of the battlefield of the many Internet technologies, with its explanation of their successes and failures. It will be a welcome resource for many, including students and instructors of relevant courses, professionals, and researchers looking for a well-rounded reference book. I read this book it on a holiday spree; having a dry Martini at my side made it a joy to read. Online Computing Reviews Service

Srijith KrishnanNair

Zittrain, a professor of Internet governance and regulation at Oxford University, has written a timely book: it looks at the state of the Internet as it is right now, as well as its potential to become, surprisingly enough, a closed system devoid of its characteristic rapid innovation. Zittrain's point is this: innovation in the technology area, especially the Internet, can be attributed to the availability of generative technologies that are open enough for people to tinker with them. However, several factors are leading to the rise of closed systems that stifle this creativity. This is bad for development and should be avoided. The author starts by comparing two iconic products from Apple: Apple 2 and iPhone. While Apple 2 was open and allowed users to write programs that could be run on the platform (hence generative), the iPhone provided a "sterile" and "locked" environment. He goes on to predict a future of "sterile appliances tethered to a network of control." This is explained further in the next three chapters. In chapter 1, Zittrain discusses the rise of personal computers that have displaced the mainframes, and, in chapter 2, the rise of the openly connected Internet that replaced the silo model of CompuServe and Prodigy. However, as discussed in chapter 3, the price paid for these generative technologies has been a decrease in the security of the system and the networks-viruses, worms, and spam. In the next three chapters, Zittrain looks deeper into various aspects of a generative system, including its definition, features, strengths, participation, and innovation. In chapter 5, he puts forward the argument that closed appliances, like TiVo or a firewalled Internet, lead to regulability and "perfect enforcement." The "software as a service" business model seems to be transforming even the open personal computers (PCs) into endpoints that host a browser, taking the power away from the end user, and making them more susceptible to control: "lock down the device, and network censorship and control can be extraordinarily reinforced." In chapter 6, he goes on to look at the rise of Wikipedia, and discusses its success factors and shortcomings. In the last section of the book, Zittrain proposes solutions to the problem faced by generative technologies. He explores the fine balance needed to pull this off: he shows that the traditional call for network neutrality and making operating system (OS) providers accountable for security threats could lead to an even more closed system. This book provides a fresh perspective on some of the technology developments in the recent past. In doing so, it provides a glimpse of the closed, controlled society that the future is about to offer us. This is a thoughtful, alarming book that needs to be read and discussed as widely as possible. Online Computing Reviews Service

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.