{"id":43,"date":"2008-08-09T16:18:49","date_gmt":"2008-08-09T23:18:49","guid":{"rendered":"http:\/\/blog.caida.org\/best_available_data\/2008\/08\/09\/recommended-reading-in-internet-technology-policy\/"},"modified":"2012-04-10T16:45:52","modified_gmt":"2012-04-10T23:45:52","slug":"recommended-reading-in-internet-technology-policy","status":"publish","type":"post","link":"https:\/\/blog.caida.org\/best_available_data\/2008\/08\/09\/recommended-reading-in-internet-technology-policy\/","title":{"rendered":"recommended reading in internet technology policy"},"content":{"rendered":"<p><em>(gathered earlier this year upon a student&#8217;s request)<\/em><\/p>\n<ol>\n<li>Abatte, Janet. <a href=\"http:\/\/www.amazon.com\/Inventing-Internet-Inside-Technology-Abbate\/dp\/0262511150\/ref=pd_bbs_sr_1?ie=UTF8&amp;s=books&amp;qid=1207338628&amp;sr=1-1\">Inventing the Internet<\/a>. 2000.<\/li>\n<li>Benkler, Yochai. <a href=\"http:\/\/www.amazon.com\/Wealth-Networks-Production-Transforms-Markets\/dp\/0300125771\/ref=pd_bbs_sr_1?ie=UTF8&amp;s=books&amp;qid=1207337940&amp;sr=8-1\">The Wealth of Networks.<\/a> 2006.<\/li>\n<li>Benkler, Yochai. <a href=\"http:\/\/www.law.duke.edu\/shell\/cite.pl?52+Duke+L.+J.+1245\">Freedom in the COMMONS: Towards a Political Economy of Information.<\/a>, Duke Law Journal. 2003.<\/li>\n<li>Brin, David. <a href=\"http:\/\/www.amazon.com\/Transparent-Society-Technology-Between-Privacy\/dp\/0738201448\/ref=pd_bbs_sr_1?ie=UTF8&amp;s=books&amp;qid=1207338676&amp;sr=1-1\">Transparent Society<\/a>. 1999.<\/li>\n<p><!--more--><\/p>\n<li>Cooper, Mark. <a href=\"http:\/\/www.amazon.com\/Open-Architecture-as-Communications-Policy\/dp\/0972746080\/ref=sr_1_1?ie=UTF8&amp;s=books&amp;qid=1207338223&amp;sr=1-1\">Open Architecture as Communications Policy.<\/a> 2004<\/li>\n<li>Dodd, Annabelle.  <a href=\"http:\/\/www.amazon.com\/Essential-Guide-Telecommunications-4th\/dp\/0131487256\/ref=pd_bbs_sr_1?ie=UTF8&amp;s=books&amp;qid=1208885303&amp;sr=1-1\">The Essential Guide to Telecommunications<\/a>. 2005.<\/li>\n<li>Dyer-Witheford, Nick. <a href=\"http:\/\/www.amazon.com\/Cyber-Marx-Circuits-Struggle-Technology-Capitalism\/dp\/0252024796\/ref=pd_bbs_sr_1?ie=UTF8&amp;s=books&amp;qid=1207338454&amp;sr=1-1\">Cyber-Marx<\/a>. 1999.<\/li>\n<li>Ferguson, Charles H.  <a href=\"http:\/\/www.amazon.com\/Broadband-Problem-Anatomy-Failure-Dilemma\/dp\/0815706448\/ref=sr_1_1?ie=UTF8&amp;s=books&amp;qid=1208885081&amp;sr=1-1\">The Broadband Problem: Anatomy of a Market Failure and a Policy Dilemma<\/a>. 2004.<\/li>\n<li>Horwitz, Robert B. <a href=\"http:\/\/www.amazon.com\/Irony-Regulatory-Reform-Deregulation-Telecommunications\/dp\/0195069994\/ref=sr_1_1?ie=UTF8&amp;s=books&amp;qid=1207338744&amp;sr=1-1\">The Irony of Regulatory Reform: The Deregulation of American Telecommunications<\/a>. 1991.<\/li>\n<li>John, Richard. <a href=\"http:\/\/www.amazon.com\/Spreading-News-American-Postal-Franklin\/dp\/0674833384\/ref=pd_bbs_1?ie=UTF8&amp;s=books&amp;qid=1207338414&amp;sr=1-1\">Spreading the News<\/a>. 1998.<\/li>\n<li>Klinenberg, Eric. <a href=\"http:\/\/www.amazon.com\/Fighting-Air-Battle-Control-Americas\/dp\/080508729X\/ref=pd_bbs_sr_1?ie=UTF8&amp;s=books&amp;qid=1207338599&amp;sr=1-1\">Fighting for Air<\/a>. 2007.<\/li>\n<li>Kushnick, Bruce. <a href=\"http:\/\/www.newnetworks.com\/broadbandscandals.htm\">$200 Billion Broadband Scandal<\/a>. 2006.<\/li>\n<li>Mueller, Milton. <a href=\"http:\/\/www.amazon.com\/Ruling-Root-Internet-Governance-Cyberspace\/dp\/0262632985\/ref=pd_bbs_2?ie=UTF8&amp;s=books&amp;qid=1208884979&amp;sr=8-2\">Ruling the Root<\/a>. 2002.  (and <a href=\"http:\/\/www.cisco.com\/web\/about\/ac123\/ac147\/archived_issues\/ipj_5-4\/book_reviews.html\">Dave Crocker&#8217;s review<\/a>)<\/li>\n<li>National Academies Press. <a href=\"http:\/\/www.nap.edu\/catalog.php?record_id=6323\">Funding a Revolution: Government Support for Computing Research<\/a>. 1999.<\/li>\n<li>Noam, Eli. <a href=\"http:\/\/www.columbia.edu\/dlc\/wp\/citi\/citinoam11.html\">Beyond Liberalization II: &#8220;The Impending Doom of Common Carriage&#8221;<\/a>. 1994.<\/li>\n<li>Nuechterlein and Weiser. <a href=\"http:\/\/www.amazon.com\/Digital-Crossroads-American-Telecommunications-Internet\/dp\/026264066X\/ref=pd_bbs_sr_1?ie=UTF8&amp;s=books&amp;qid=1207338258&amp;sr=1-1\">Digital Crossroads: American Telecommunications Policy in the Internet Age<\/a>. 2005.<\/li>\n<li>Poole, Hilary, <em>et al.<\/em>. <a href=\"http:\/\/www.amazon.com\/History-Internet-Chronology-1843-Present\/dp\/1576071189\/ref=pd_bbs_1?ie=UTF8&amp;s=books&amp;qid=1208885195&amp;sr=1-1\">History of the Internet<\/a>. 1999.<\/li>\n<li>Roughgarden, Tim. <a href=\"http:\/\/theory.stanford.edu\/~tim\/papers\/optima.pdf\">&#8220;Selfish Routing and the Price of Anarchy&#8221;<\/a>. 2006.<\/li>\n<li>Slotten, Hugh. <a href=\"http:\/\/www.amazon.com\/Radio-Television-Regulation-Broadcast-Technology\/dp\/080186450X\/ref=sr_1_1?ie=UTF8&amp;s=books&amp;qid=1208885263&amp;sr=1-1\">Radio and Television Regulation<\/a>. 2000.<\/li>\n<li>Wilson, James Q. <a href=\"http:\/\/www.amazon.com\/Bureaucracy-Government-Agencies-Basic-Classics\/dp\/0465007856\/ref=pd_bbs_sr_1?ie=UTF8&amp;s=books&amp;qid=1208885158&amp;sr=1-1\">Bureaucracy: What Government Agencies Do and Why They Do It<\/a>. 1991.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>(gathered earlier this year upon a student&#8217;s request) Abatte, Janet. Inventing the Internet. 2000. Benkler, Yochai. The Wealth of Networks. 2006. Benkler, Yochai. Freedom in the COMMONS: Towards a Political Economy of Information., Duke Law Journal. 2003. Brin, David. Transparent Society. 1999.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[1,12,11,8,19],"tags":[],"coauthors":[],"_links":{"self":[{"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/posts\/43"}],"collection":[{"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/comments?post=43"}],"version-history":[{"count":6,"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/posts\/43\/revisions"}],"predecessor-version":[{"id":1842,"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/posts\/43\/revisions\/1842"}],"wp:attachment":[{"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/media?parent=43"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/categories?post=43"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/tags?post=43"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blog.caida.org\/best_available_data\/wp-json\/wp\/v2\/coauthors?post=43"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}