{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:31:42Z","timestamp":1750307502535,"version":"3.41.0"},"reference-count":22,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2009,6,30]],"date-time":"2009-06-30T00:00:00Z","timestamp":1246320000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGCOMM Comput. Commun. Rev."],"published-print":{"date-parts":[[2009,6,30]]},"abstract":"<jats:p>The Internet is a primary engine of innovation, communication, and entertainment in our society. It is used by diverse and potentially conflicting interests. When these interests collide in the form of technology, should the Internet stay true to its roots and let things take their course naturally, or should regulation and legislation be enacted to control what may or may not be done. This author believes public opinion is best served by light regulation and a strong focus on allowing technological innovation to take its natural course.<\/jats:p>","DOI":"10.1145\/1568613.1568618","type":"journal-article","created":{"date-parts":[[2009,7,15]],"date-time":"2009-07-15T13:51:27Z","timestamp":1247665887000},"page":"19-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Neo-luddism and the demonisation of technology"],"prefix":"10.1145","volume":"39","author":[{"given":"Don","family":"Bowman","sequence":"first","affiliation":[{"name":"Sandvine Incorporated, Waterloo, ON, Canada"}]}],"member":"320","published-online":{"date-parts":[[2009,6,30]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"http:\/\/en.wikipedia.org\/wiki\/Eternal_September  http:\/\/en.wikipedia.org\/wiki\/Eternal_September"},{"key":"e_1_2_1_2_1","unstructured":"http:\/\/tools.ietf.org\/html\/rfc4271  http:\/\/tools.ietf.org\/html\/rfc4271"},{"key":"e_1_2_1_3_1","unstructured":"http:\/\/tools.ietf.org\/html\/rfc1436  http:\/\/tools.ietf.org\/html\/rfc1436"},{"key":"e_1_2_1_4_1","unstructured":"http:\/\/www.apple.com\/itunes\/whatsnew\/  http:\/\/www.apple.com\/itunes\/whatsnew\/"},{"key":"e_1_2_1_5_1","unstructured":"http:\/\/en.wikipedia.org\/wiki\/Napster  http:\/\/en.wikipedia.org\/wiki\/Napster"},{"key":"e_1_2_1_6_1","unstructured":"http:\/\/en.wikipedia.org\/wiki\/Network_neutrality  http:\/\/en.wikipedia.org\/wiki\/Network_neutrality"},{"key":"e_1_2_1_7_1","unstructured":"http:\/\/en.wikipedia.org\/wiki\/Internet_censorship_in_Australia  http:\/\/en.wikipedia.org\/wiki\/Internet_censorship_in_Australia"},{"key":"e_1_2_1_8_1","unstructured":"http:\/\/en.wikipedia.org\/wiki\/Virgin_Killer  http:\/\/en.wikipedia.org\/wiki\/Virgin_Killer"},{"key":"e_1_2_1_9_1","unstructured":"http:\/\/www.iwf.org.uk\/  http:\/\/www.iwf.org.uk\/"},{"key":"e_1_2_1_10_1","unstructured":"http:\/\/www.cybertip.ca\/  http:\/\/www.cybertip.ca\/"},{"key":"e_1_2_1_11_1","unstructured":"http:\/\/www.ncmec.org\/  http:\/\/www.ncmec.org\/"},{"key":"e_1_2_1_12_1","unstructured":"http:\/\/thomas.loc.gov\/cgi-bin\/query\/z?c108:S.800:  http:\/\/thomas.loc.gov\/cgi-bin\/query\/z?c108:S.800:"},{"key":"e_1_2_1_13_1","unstructured":"http:\/\/en.wikipedia.org\/wiki\/Network_address_translation  http:\/\/en.wikipedia.org\/wiki\/Network_address_translation"},{"key":"e_1_2_1_14_1","unstructured":"http:\/\/en.wikipedia.org\/wiki\/Session_Border_Controller  http:\/\/en.wikipedia.org\/wiki\/Session_Border_Controller"},{"key":"e_1_2_1_15_1","unstructured":"http:\/\/www.ietf.org\/rfc\/rfc4038.txt  http:\/\/www.ietf.org\/rfc\/rfc4038.txt"},{"key":"e_1_2_1_16_1","unstructured":"http:\/\/en.wikiquote.org\/wiki\/John_Gilmore  http:\/\/en.wikiquote.org\/wiki\/John_Gilmore"},{"key":"e_1_2_1_17_1","unstructured":"http:\/\/energycommerce.house.gov\/index.php?option=com_content&view=article&id=1590  http:\/\/energycommerce.house.gov\/index.php?option=com_content&view=article&id=1590"},{"key":"e_1_2_1_18_1","unstructured":"http:\/\/en.wikipedia.org\/wiki\/DMCA  http:\/\/en.wikipedia.org\/wiki\/DMCA"},{"key":"e_1_2_1_19_1","unstructured":"http:\/\/en.wikipedia.org\/wiki\/Telecoms_Package  http:\/\/en.wikipedia.org\/wiki\/Telecoms_Package"},{"key":"e_1_2_1_20_1","unstructured":"http:\/\/www.hulu.com\/  http:\/\/www.hulu.com\/"},{"key":"e_1_2_1_21_1","unstructured":"http:\/\/www.sandvine.com\/general\/documents\/2008%20Global%20Broadband%20Phenomena%20-%20Executive%20Summary.pdf  http:\/\/www.sandvine.com\/general\/documents\/2008%20Global%20Broadband%20Phenomena%20-%20Executive%20Summary.pdf"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2005.850224"}],"container-title":["ACM SIGCOMM Computer Communication Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1568613.1568618","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1568613.1568618","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:17:48Z","timestamp":1750249068000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1568613.1568618"}},"subtitle":["cultural collision on the information superhighway"],"short-title":[],"issued":{"date-parts":[[2009,6,30]]},"references-count":22,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2009,6,30]]}},"alternative-id":["10.1145\/1568613.1568618"],"URL":"https:\/\/doi.org\/10.1145\/1568613.1568618","relation":{},"ISSN":["0146-4833"],"issn-type":[{"type":"print","value":"0146-4833"}],"subject":[],"published":{"date-parts":[[2009,6,30]]},"assertion":[{"value":"2009-06-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}