Go to the previous, next section.

Journal Articles and Papers

Alexander, Michael (1991) Hacker probe bogged down; Operation Sundevil case going nowhere Computerworld, February 11, 1.

Anderson, Christopher (1993) The Rocky Road to a Data Highway Science, 260(21), 1064--1065.

Anonymous (1992) Merit Network Signs Agreement to Pass Commercial Data Traffic Information Technology Digest, 1(10), 3.

Anonymous (1991) National research network driven by differing goals and visions Common Carrier Week, 8(23), 4.

Anonymous (1992) Portal Communications UNIX Review, 8(11), 141.

Anonymous (1990) SOVIET UNIX USERS GROUP TO JOIN Usenet NETWORK Computergram International.

Anonymous (1992) Usenet AND LISTSERVS: ELECTRONIC NEWS AND CONFERENCING Online Libraries & Microcomputers, 10(5), 1.

Anonymous (1988) Usenet/Eunet machen Btx zum Info-Center Computerwoche, 14.

Anonymous (1992) Using uucp and Usenet UNIX Review, 10(8), 54.

Anonymous (1989) Farewell to the free Minitel? Data Communications, March, 73.

Barlow, J. (1990) Beeing in Nothingness NONDO 2000, Number 2, Summer 1990.

Barlow, J. (1991) Coming Into The Country Communications of the ACM 34:3, March 1991, 2. (Addresses "Cyberspace" --John Barlow was a co-founder of the EFF.)

Barlow, John Perry (1993) Bill 'O Rights Communications of the ACM 36(3), 21--23.

Basch, Reva (1991) Books online: visions, plans and perspectives for electronic text Online v. 15, July, 13.

Beishon, M (1984) Usenet's Pranks and Pragmatism Hardcopy, 13(8), 20--28.

Bjerklie, David Email, the boss is watching Technology Review, v.96, 29.

Bricken, W. Cyberspace 1999 NONDO 2000, Number 2, Summer 1990.

Buerger, David J. (1988) AT&T's shutdown of Usenet backbone nodes need not spell doom to users InfoWorld. 10(28), 14.

Buerger, David J. (1988) Long-term stability and prosperity of Usenet rests on fee-based trunk feeds InfoWorld. 10(30), 16.

Bush, R. FidoNet: technology, Tools, and History Communications of the ACM 36:8, August 1993, 31--35.

Campbell, A. E-mail Beyond Unix UnixWorld, November 1991, 77--80.

Carl-Mitchell, S. and Quarterman, J.S. Building Internet Firewalls UnixWorld, February 1992, 93--103.

Cathcart, Robert & Gumpert, Gary (1983) Mediated Interpersonal Communication: Toward a New Typology Quarterly Journal of Speech, v. 69, 267--277.

Cerf, Vincent G. (1991) Networks Scientific American, v. 265, 72.

Clark, Paul C. and Hoffman, Lance J. Imminent policy considerations in the design and management of national and international computer networks IEEE Communications Magazine, 68--74.

Collyer, G., and Spencer, H. News Need Not Be Slow Proceedings of the 1987 Winter USENIX Conference, USENIX Association, Berkeley, CA, January 1988, 181--90.

Comer, Douglas (1983) The Computer Science Research Network CSNET: A history and status report Communicaitons of the ACM (26)10, 747--753.

DeLoughry, Thomas J. (1993) Regional Networks Prepare for Change in the Internet: New company seeks to provide continuity for college customers Chronicle of Higher Education, June 9, 1993, A16.

Denning, Dorothy E. (1993) To tap or not to tap Communications of the ACM, 36(3), 25-33. (Pages 34--44 feature pesonal statements concerning the contents of this article from the creme de la creme in computer privacy discussion.)

Denning, P. (1989) The ARPANET after twenty years American Scientist 77:530.

Denning, P. The Internet Worm American Scientist, March--April 1989, 126--128.

Denning, P. The Science of Computing: Computer Networks American Scientist, March--April 1985, 127--129.

Dern, D.P. Plugging Into the Internet BYTE, October 1992, 140--156.

Duncanson, J. and Chew, J. The Ultimate Link? ISDN -- a new communications technology that could change the way we use our computers and telephones BYTE, July 1988, 278--286.

Emerson, Sandra L. (1983) Usenet: A Bulletin Board for Unix Users BYTE, 8(10), 219-220.

Erickson, C. USENET as a Teaching Tool Proceedings of the 24th ACM Conference on Science and Education, ACM-24thCSE-2/93-IN, USA, February 1993, 43--47.

Farrow, Rik (1991a) Commercial Links to the Internet UNIX World, 82.

Farrow, Rik (1991b) How the Internet Grew UNIX World, 80.

Farrow, Rik (1991c) Who Pays for All This Great Stuff? UNIX World, 84.

Farrow, Rik (1991d) Will Success Spoil the Internet? UNIX World, 79--86.

Fair, E. Usenet: Spanning the Globe UNIX World, 1(7), 46--49.

Fiedler, David PROWLING THE NETWORKS: Getting on the Usenet network, and what to do when you've gotten there BYTE, 15(5), 83.

Frey, D., and Adams, R. USENET: Death by Success? UNIX Review, August 1987, 55--60.

Gifford, W.S. ISDN User-Network Interfaces IEEE Journal on Selected Areas in Communications, May 1986, 343--348.

Ginsberg, K. Getting from Here to There UNIX Review, January 1986, 45.

Godwin, Mike (1991) The Electronic Frontier Foundation and virtual communities Whole Earth Review, Summer, 1991, 40.

Godwin, Mike (1993) New Frontiers: a visitor's guide -- Computers are creating new-style communities that could be commonplace by 2001 Index on Censorship 22(2), 11--13.

Hardy, Henry E. (1992b) The Usenet System International Teleconferencing Association (ITCA) Yearbook 1993, 140--151.

Heim, Judy (1991) The information edge PC World, 9(4), 213.

Hiltz, S.R The Human Element in Computerized Conferencing Systems Computer Networks, December 1978, 421--428

Hiramatsu, T. Protecting Telecommunications Privacy in Japan Communications of the ACM 36:8, August 1993, 74-77.

Hold, David F., Sloan, Michael B., et. al. (1991) First Amendment rights for electronic media Viewtext, 12(6), 3.

Horton, M. What is a Domain? Proceedings of the Summer 1984 USENIX Conference, USENIX Association, Berkeley, CA, June 1984, 368--372.

Horvitz, Robert (1989) The Usenet underground Whole Earth Review, n. 4, 112.

Ishida, H. & Landweber, L.H. Internetworking Introduction Communications of the ACM 36:8, August 1993, 28--30.

Jacobsen, Ole J. Information on TCP/IP ConneXions--The Interoperability Report, July 1988, 14--15.

Jennings, D., et al. Computer Networking for Scientists Science, 28 February 1986, 943--950.

Karracker, Roger (1991) Highways of the Mind Whole Earth Review, Spring, 1991, 8.

Kent, S.T. Internet Privacy Enhanced Mail Communications of the ACM 36:8, August 1993, 48--60.

Laulicht, Murray J. & Lindsay, Eileen L. (1991) First Amendment Protections don't extend to genocide New Jersey Law Journal, 129(5), 15.

Law Reform Commission of Australia (1991) Censorship Procedure Sydney: Law Reform Commission of Australia

Leslie, Jaques (1993) Technology: MUDroom Atlantic 272(3), 28--34.

Levy, Steven Crypto Rebels: the battle is engaged. Its the FBI's, NSA's and Equifaxes of the world versus a swelling movement of cypherpunks, civil libertarians and millionaire hackers. At stake: whether privacy will exist in the 21st century Wired 1.2, 54--61.

Licklider, J. C. R. & Vezza, Albert (1978) Applications of Information Technology Proceedings of the IEEE 66(11), 1330--1346.

Livingston, James W. (1988a) Y'know I heard it through the Usenet Digital Review, 5(14), 79.

Livingston, James W. (1988b) No shortage of topics on the Usenet Digital Review, 5(16), 73.

Livingston, James W. (1988c) Take Your Pick with Netnews Readers Digital Review. 5(15), 97.

Lunin, Louis F. (1991) Wanted, civil liberties for the network: forum at ASIS explores roles and responsibilities of nets in public interest Information Today, 8(1), 12.

Madsen, Wayne (1992) THE CHANGING THREAT -- Information security and intelligence Computer Fraud & Security Bulletin, February.

Markoff, J. Author of computer `virus' is son of U.S. electronic security expert. New York Times, Nov. 5, 1988, A1.

<