Go to the previous, next section.

Journal Articles and Papers

Alexander, Michael (1991) Hacker probe bogged down; Operation Sundevil case going nowhere Computerworld, February 11, 1.

Anderson, Christopher (1993) The Rocky Road to a Data Highway Science, 260(21), 1064--1065.

Anonymous (1992) Merit Network Signs Agreement to Pass Commercial Data Traffic Information Technology Digest, 1(10), 3.

Anonymous (1991) National research network driven by differing goals and visions Common Carrier Week, 8(23), 4.

Anonymous (1992) Portal Communications UNIX Review, 8(11), 141.

Anonymous (1990) SOVIET UNIX USERS GROUP TO JOIN Usenet NETWORK Computergram International.

Anonymous (1992) Usenet AND LISTSERVS: ELECTRONIC NEWS AND CONFERENCING Online Libraries & Microcomputers, 10(5), 1.

Anonymous (1988) Usenet/Eunet machen Btx zum Info-Center Computerwoche, 14.

Anonymous (1992) Using uucp and Usenet UNIX Review, 10(8), 54.

Anonymous (1989) Farewell to the free Minitel? Data Communications, March, 73.

Barlow, J. (1990) Beeing in Nothingness NONDO 2000, Number 2, Summer 1990.

Barlow, J. (1991) Coming Into The Country Communications of the ACM 34:3, March 1991, 2. (Addresses "Cyberspace" --John Barlow was a co-founder of the EFF.)

Barlow, John Perry (1993) Bill 'O Rights Communications of the ACM 36(3), 21--23.

Basch, Reva (1991) Books online: visions, plans and perspectives for electronic text Online v. 15, July, 13.

Beishon, M (1984) Usenet's Pranks and Pragmatism Hardcopy, 13(8), 20--28.

Bjerklie, David Email, the boss is watching Technology Review, v.96, 29.

Bricken, W. Cyberspace 1999 NONDO 2000, Number 2, Summer 1990.

Buerger, David J. (1988) AT&T's shutdown of Usenet backbone nodes need not spell doom to users InfoWorld. 10(28), 14.

Buerger, David J. (1988) Long-term stability and prosperity of Usenet rests on fee-based trunk feeds InfoWorld. 10(30), 16.

Bush, R. FidoNet: technology, Tools, and History Communications of the ACM 36:8, August 1993, 31--35.

Campbell, A. E-mail Beyond Unix UnixWorld, November 1991, 77--80.

Carl-Mitchell, S. and Quarterman, J.S. Building Internet Firewalls UnixWorld, February 1992, 93--103.

Cathcart, Robert & Gumpert, Gary (1983) Mediated Interpersonal Communication: Toward a New Typology Quarterly Journal of Speech, v. 69, 267--277.

Cerf, Vincent G. (1991) Networks Scientific American, v. 265, 72.

Clark, Paul C. and Hoffman, Lance J. Imminent policy considerations in the design and management of national and international computer networks IEEE Communications Magazine, 68--74.

Collyer, G., and Spencer, H. News Need Not Be Slow Proceedings of the 1987 Winter USENIX Conference, USENIX Association, Berkeley, CA, January 1988, 181--90.

Comer, Douglas (1983) The Computer Science Research Network CSNET: A history and status report Communicaitons of the ACM (26)10, 747--753.

DeLoughry, Thomas J. (1993) Regional Networks Prepare for Change in the Internet: New company seeks to provide continuity for college customers Chronicle of Higher Education, June 9, 1993, A16.

Denning, Dorothy E. (1993) To tap or not to tap Communications of the ACM, 36(3), 25-33. (Pages 34--44 feature pesonal statements concerning the contents of this article from the creme de la creme in computer privacy discussion.)

Denning, P. (1989) The ARPANET after twenty years American Scientist 77:530.

Denning, P. The Internet Worm American Scientist, March--April 1989, 126--128.

Denning, P. The Science of Computing: Computer Networks American Scientist, March--April 1985, 127--129.

Dern, D.P. Plugging Into the Internet BYTE, October 1992, 140--156.

Duncanson, J. and Chew, J. The Ultimate Link? ISDN -- a new communications technology that could change the way we use our computers and telephones BYTE, July 1988, 278--286.

Emerson, Sandra L. (1983) Usenet: A Bulletin Board for Unix Users BYTE, 8(10), 219-220.

Erickson, C. USENET as a Teaching Tool Proceedings of the 24th ACM Conference on Science and Education, ACM-24thCSE-2/93-IN, USA, February 1993, 43--47.

Farrow, Rik (1991a) Commercial Links to the Internet UNIX World, 82.

Farrow, Rik (1991b) How the Internet Grew UNIX World, 80.

Farrow, Rik (1991c) Who Pays for All This Great Stuff? UNIX World, 84.

Farrow, Rik (1991d) Will Success Spoil the Internet? UNIX World, 79--86.

Fair, E. Usenet: Spanning the Globe UNIX World, 1(7), 46--49.

Fiedler, David PROWLING THE NETWORKS: Getting on the Usenet network, and what to do when you've gotten there BYTE, 15(5), 83.

Frey, D., and Adams, R. USENET: Death by Success? UNIX Review, August 1987, 55--60.

Gifford, W.S. ISDN User-Network Interfaces IEEE Journal on Selected Areas in Communications, May 1986, 343--348.

Ginsberg, K. Getting from Here to There UNIX Review, January 1986, 45.

Godwin, Mike (1991) The Electronic Frontier Foundation and virtual communities Whole Earth Review, Summer, 1991, 40.

Godwin, Mike (1993) New Frontiers: a visitor's guide -- Computers are creating new-style communities that could be commonplace by 2001 Index on Censorship 22(2), 11--13.

Hardy, Henry E. (1992b) The Usenet System International Teleconferencing Association (ITCA) Yearbook 1993, 140--151.

Heim, Judy (1991) The information edge PC World, 9(4), 213.

Hiltz, S.R The Human Element in Computerized Conferencing Systems Computer Networks, December 1978, 421--428

Hiramatsu, T. Protecting Telecommunications Privacy in Japan Communications of the ACM 36:8, August 1993, 74-77.

Hold, David F., Sloan, Michael B., et. al. (1991) First Amendment rights for electronic media Viewtext, 12(6), 3.

Horton, M. What is a Domain? Proceedings of the Summer 1984 USENIX Conference, USENIX Association, Berkeley, CA, June 1984, 368--372.

Horvitz, Robert (1989) The Usenet underground Whole Earth Review, n. 4, 112.

Ishida, H. & Landweber, L.H. Internetworking Introduction Communications of the ACM 36:8, August 1993, 28--30.

Jacobsen, Ole J. Information on TCP/IP ConneXions--The Interoperability Report, July 1988, 14--15.

Jennings, D., et al. Computer Networking for Scientists Science, 28 February 1986, 943--950.

Karracker, Roger (1991) Highways of the Mind Whole Earth Review, Spring, 1991, 8.

Kent, S.T. Internet Privacy Enhanced Mail Communications of the ACM 36:8, August 1993, 48--60.

Laulicht, Murray J. & Lindsay, Eileen L. (1991) First Amendment Protections don't extend to genocide New Jersey Law Journal, 129(5), 15.

Law Reform Commission of Australia (1991) Censorship Procedure Sydney: Law Reform Commission of Australia

Leslie, Jaques (1993) Technology: MUDroom Atlantic 272(3), 28--34.

Levy, Steven Crypto Rebels: the battle is engaged. Its the FBI's, NSA's and Equifaxes of the world versus a swelling movement of cypherpunks, civil libertarians and millionaire hackers. At stake: whether privacy will exist in the 21st century Wired 1.2, 54--61.

Licklider, J. C. R. & Vezza, Albert (1978) Applications of Information Technology Proceedings of the IEEE 66(11), 1330--1346.

Livingston, James W. (1988a) Y'know I heard it through the Usenet Digital Review, 5(14), 79.

Livingston, James W. (1988b) No shortage of topics on the Usenet Digital Review, 5(16), 73.

Livingston, James W. (1988c) Take Your Pick with Netnews Readers Digital Review. 5(15), 97.

Lunin, Louis F. (1991) Wanted, civil liberties for the network: forum at ASIS explores roles and responsibilities of nets in public interest Information Today, 8(1), 12.

Madsen, Wayne (1992) THE CHANGING THREAT -- Information security and intelligence Computer Fraud & Security Bulletin, February.

Markoff, J. Author of computer `virus' is son of U.S. electronic security expert. New York Times, Nov. 5, 1988, A1.

Markoff, J. Computer snarl: A `back door' ajar. New York Times, Nov. 7, 1988, B10.

Markoff, John and Shapiro, Ezra (1984) Fidonet, Sidekick, Apple, Get Organized!, and Handle: Homebrew electronic mail, some integrated software, and other tidbits BYTE, 9(11), 357.

McQuillan, J.M., and Walden, D.C. (1977) The ARPA Network Design Decisions Computer Networks, 243--289.

Metcalfe, Bob (1993) On the wild side of computer networking InfoWorld 15(13), 54.

Miller, Philip H. (1993) New technology, old problem: determining the First Amendment status of electronic information services Fordham Law Review 61(5), 1147--1201.

Monge, Peter R. (1977) The Systems Perspective as a Theoretical Basis for the Study of Human Communication Communication Quarterly, Winter, 19--29.

Mueller, Milton (1993) Universal service in telephone history: A reconstruction Telecommunications Policy, July, 352--369.

Murray, J. K12 Network: Global Education through Telecommunications Communications of the ACM 36:8, August 1993, 36--41.

Nance, Barry (1992) On-the-fly disk compression: managing your Apple menu: navigating through Usenet News BYTE, 17(6), 357.

Nickerson, Gord (1992a) Effective use of Usenet Computers in Libraries, 12(5), 38.

Nickerson, Gord (1992b) Free Software on Usenet Computers in Libraries, 12(6), 51.

Nickerson, Gord (1992c) Networked Resources: Usenet Computers in Libraries. 12(4), 31--34.

Ornstein, S.M. (1989) A letter concerning the Internet worm Communications of the ACM 32:6, June.

Pacanowsky, Michael E. & O'Donnell-Trujillo, Nick (1982) Communication and Organizational Cultures The Western Journal of Speech Communication, v. 46, 115--130.

Padovano, Michael (1990) Need help with your Unix system? Here's a whole network of it Systems Integration. 23(12), 17.

Partridge, C. (1986) Mail Routing Using Domain Names: An Informal Tour Proceedings of the 1986 Summer USENIX Conference USENIX Association, Berkeley, CA, June. 366--76.

Perlman, G. (1985) Usenet: Doing Research on the Network UNIX World, 2(11), 75--78.

Quarterman, J. Etiquette and Ethics ConneXions--The Interoperability Report, March 1989, 12--16.

Quarterman, J. Notable Computer Networks Communications of the ACM 29:10, October 1986. (This was the predecessor to The Matrix.)

Raeder, A.W., and Andrews, K.L. Searching Library Catalogs on the Internet: A Survey Database Searcher 6, September 1990, 16--31.

Reid, B. K. (1989) The Usenet cookbook--an experiment in electronic [publishing] Electronic Publishing Review, 1(1), 55--76.

Reisler, Kurt (1990) Usenet: a loosely organized, but binding network Digital Review, 7(6), 28.

Richard, Jack (1993) Home-grown BBS Wired 1.4, 120.

Rotenberg, M. Communications Privacy: Implications for Network Design Communications of the ACM 36:8, August 1993, 61--68.

Sadowsky, W. Network Connectivity for Developing Countries Communications of the ACM 36:8, August 1993, 42--47.

Schatz, Willie (1993) DARPA's Industrial Policy Overkill Upside 5(5), 35--48.

Schultz, B. The Evolution of ARPANET DATAMATION, August 1, 1988, 71--74.

Seeley, D. A tour of the worm Proceedings of the 1989 Winter USENIX Conference, USENIX Association, Berkeley, CA, February 1989, 287--304.

Shelly, Dale (1986) Globally speaking Digital Review. 3(9), 150.

Shulman, G. Legal Research on USENET Liability Issues ;login: The USENIX Association Newsletter, December 1984, 11--17.

Smith, Norris Parker (1993) Jockeying for Position on the Data Highway Upside 5(5), 50--60.

Smith, K. E-Mail to Anywhere PC World, March 1988, 220--223.

Sproull, Lee & Kiesler, Sara (1991) Computers, networks and work Scientific American, 265(3), 116.

Smith, Ben (1992) UNIX: Navigating Through Usenet News BYTE, 17(6), 357.

Smith, Ben (1989) The Unix Connection: Usenet, UUCP, and NetNews give Unix worldwide communications power BYTE 14(5), 245.

Stoll, C. Stalking the Wily Hacker Communications of the ACM 31:5, May 1988, 14. (This article grew into the book The Cuckoo's Egg.)

Taylor, D. The Postman Always Rings Twice: Electronic Mail in a Highly Distributed Environment Proceedings of the 1988 Winter USENIX Conference, USENIX Association, Berkeley, CA, December 1988, 145--153. Tillman, Hope N. & Ladner, Sharyn J. (1992) Special librarians and the INTERNET Special Libraries, 83(2), 127.

Tribe, Lawrence H. (1991) The Constitution in Cyberspace Keynote address at the first conference on Computers, Freedom, and Privacy. Woodside, CA: Computer Professionals for Social Responsibility.

Tuerkheimer, F.M. The Underpinnings of Privacy Protection Communications of the ACM 36:8, August 1993, 69--73.

Ubois, Jeff (1992) TECH ANALYSIS: What is acceptable Internet use? MacWeek, 30.

U.S. Gen'l Accounting Ofc. Computer Security: Virus Highlights Need for Improved Internet Management GAO/IMTEC-89-57, 1989. (Addresses the Internet worm.)

Wagner, Mitch (1991) PSI's Policy Change Irks Usenet Readers UNIX Today, 5.

Wagner, Mitch (1991) Update For Usenet UNIX Today, 22.

Wagner, Mitch (1991) Usenet: Information At Users' Fingertips UNIX Today, 12.

Weinstein, Sydney S. (1991) comp.sources.reviewed C Users Journal 9(6), 127.

Weinstein, Sydney S. (1992) Where to get the sources C Users Journal. 10(2), 115.

Go to the previous, next section.