{"id":88,"date":"2008-01-02T15:18:03","date_gmt":"2008-01-02T19:18:03","guid":{"rendered":"http:\/\/blogs.law.harvard.edu\/zeroday\/2008\/01\/02\/generative-internet\/"},"modified":"2008-01-02T15:18:03","modified_gmt":"2008-01-02T19:18:03","slug":"generative-internet","status":"publish","type":"post","link":"https:\/\/archive.blogs.harvard.edu\/zeroday\/2008\/01\/02\/generative-internet\/","title":{"rendered":"Generative Internet"},"content":{"rendered":"<p><a href=\"http:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=847124\"> Applying this framework, the Article explores ways \u2014 some of them bound to be unpopular among advocates of an open Internet represented by uncompromising end-to-end neutrality \u2014 in which the Internet can be made to satisfy genuine and pressing security concerns while retaining the most important generative aspects of today\u2019s networked technology. <\/a><br \/>\n<a href=\"http:\/\/cyber.law.harvard.edu\/home\/bio_jzittrain\"><br \/>\nZittrain, Jonathan, &#8220;The Generative Internet&#8221; . Harvard Law Review, Vol. 119, 2006 Available at SSRN: http:\/\/ssrn.com\/abstract=847124<\/p>\n<p> Professor of Internet Governance and Regulation<br \/>\n Oxford University<br \/>\n Oxford Internet Institute<br \/>\n 1 St Giles<br \/>\n Oxford OX1 3JS,<br \/>\n United Kingdom<br \/>\n +4401865287210 (Phone)<br \/>\n +16175880201 (Fax)<br \/>\n HOME PAGE: http:\/\/www.jz.org<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Applying this framework, the Article explores ways \u2014 some of them bound to be unpopular among advocates of an open Internet represented by uncompromising end-to-end neutrality \u2014 in which the Internet can be made to satisfy genuine and pressing security concerns while retaining the most important generative aspects of today\u2019s networked technology. Zittrain, Jonathan, &#8220;The [&hellip;]<\/p>\n","protected":false},"author":214,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[273,271,394],"tags":[],"class_list":["post-88","post","type-post","status-publish","format-standard","hentry","category-non-sequiter","category-rights-online","category-spyware"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/posts\/88","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/users\/214"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/comments?post=88"}],"version-history":[{"count":0,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/posts\/88\/revisions"}],"wp:attachment":[{"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/media?parent=88"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/categories?post=88"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/tags?post=88"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}