{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:26:05Z","timestamp":1750307165255,"version":"3.41.0"},"reference-count":21,"publisher":"Association for Computing Machinery (ACM)","issue":"5","license":[{"start":{"date-parts":[[2011,10,22]],"date-time":"2011-10-22T00:00:00Z","timestamp":1319241600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGCOMM Comput. Commun. Rev."],"published-print":{"date-parts":[[2011,10,22]]},"abstract":"<jats:p>In June 2011 I participated on a panel on network neutrality hosted at the June cybersecurity meeting of the DHS\/SRI Infosec Technology Transition Council (ITTC), where \"experts and leaders from the government, private, financial, IT, venture capitalist,and academia and science sectors came together to address the problem of identity theft and related criminal activity on the Internet.\" I recently wrote up some of my thoughts on that panel, including what network neutrality has to do with cybersecurity.<\/jats:p>","DOI":"10.1145\/2043165.2043172","type":"journal-article","created":{"date-parts":[[2011,10,11]],"date-time":"2011-10-11T14:29:02Z","timestamp":1318343342000},"page":"44-45","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["\"Network Neutrality\""],"prefix":"10.1145","volume":"41","author":[{"given":"kc","family":"claffy","sequence":"first","affiliation":[{"name":"University of California at San Diego, La Jolla, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2011,10,22]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Infosec Technology Transition Council (ITTC). http:\/\/www.cyber.st.dhs.gov\/ittc\/.  Infosec Technology Transition Council (ITTC). http:\/\/www.cyber.st.dhs.gov\/ittc\/."},{"key":"e_1_2_1_2_1","unstructured":"Telecommunications Act of 1996. http:\/\/transition.fcc.gov\/telecom.html.  Telecommunications Act of 1996. http:\/\/transition.fcc.gov\/telecom.html."},{"key":"e_1_2_1_3_1","unstructured":"Internet over Cable (Open Access) \/ Brand-X 2005. http:\/\/www.cybertelecom.org\/ci\/openaccess.htm.  Internet over Cable (Open Access) \/ Brand-X 2005. http:\/\/www.cybertelecom.org\/ci\/openaccess.htm."},{"key":"e_1_2_1_4_1","unstructured":"NATIONAL CABLE & TELECOMMUNICATIONS ASSOCIATION et al. v. BRAND X INTERNET SERVICES et al. Jun 2005. http:\/\/www.law.cornell.edu\/supct\/html\/04-277.ZS.html.  NATIONAL CABLE & TELECOMMUNICATIONS ASSOCIATION et al. v. BRAND X INTERNET SERVICES et al. Jun 2005. http:\/\/www.law.cornell.edu\/supct\/html\/04-277.ZS.html."},{"key":"e_1_2_1_5_1","unstructured":"Competitor access to telco fiber would fix net neutrality Mar 2011. http:\/\/freedomofthought.org\/blog\/?p=12.  Competitor access to telco fiber would fix net neutrality Mar 2011. http:\/\/freedomofthought.org\/blog\/?p=12."},{"key":"e_1_2_1_6_1","unstructured":"Nate Anderson. Telco missteps overreach leading to Dutch net neutrality law May 2011. http:\/\/arstechnica.com\/tech-policy\/news\/2011\/05\/.  Nate Anderson. Telco missteps overreach leading to Dutch net neutrality law May 2011. http:\/\/arstechnica.com\/tech-policy\/news\/2011\/05\/."},{"key":"e_1_2_1_7_1","unstructured":"Yochai Benkler. Next Generation Connectivity: A review of broadband Internet transitions and policy from around the world Oct 2009. http:\/\/www.fcc.gov\/stage\/pdf\/Berkman_Center_Broadband_Study_13Oct09.pdf.  Yochai Benkler. Next Generation Connectivity: A review of broadband Internet transitions and policy from around the world Oct 2009. http:\/\/www.fcc.gov\/stage\/pdf\/Berkman_Center_Broadband_Study_13Oct09.pdf."},{"key":"e_1_2_1_8_1","unstructured":"Susan Crawford. Transporting Communications. Boston University Law Review 89:871--937 2009. http:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=1254983.  Susan Crawford. Transporting Communications. Boston University Law Review 89:871--937 2009. http:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=1254983."},{"volume-title":"Pennsylvania State University","year":"2007","author":"Frieden Rob","key":"e_1_2_1_9_1"},{"key":"e_1_2_1_10_1","unstructured":"Rob Frieden. Improving the FCC's Data Collection and Disclosure Practices Aug 2010. http:\/\/telefrieden.blogspot.com\/2010\/08\/improving-fccs-data-collection-and.html.  Rob Frieden. Improving the FCC's Data Collection and Disclosure Practices Aug 2010. http:\/\/telefrieden.blogspot.com\/2010\/08\/improving-fccs-data-collection-and.html."},{"key":"e_1_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Rob Frieden. Legislative and Regulatory Strategies for Providing Consumer Safeguards in a Convergent Information and Communications Marketplace Mar 2011. http:\/\/telefrieden.blogspot.com\/2011\/03\/new-publication-legislative-and.html.  Rob Frieden. Legislative and Regulatory Strategies for Providing Consumer Safeguards in a Convergent Information and Communications Marketplace Mar 2011. http:\/\/telefrieden.blogspot.com\/2011\/03\/new-publication-legislative-and.html.","DOI":"10.2139\/ssrn.1669472"},{"key":"e_1_2_1_12_1","unstructured":"Rob Frieden. Summary of FCC's Net Neutrality Report and Order Jan 2011. http:\/\/telefrieden.blogspot.com\/2011\/01\/summary-of-fccs-net-neutrality-report.html.  Rob Frieden. Summary of FCC's Net Neutrality Report and Order Jan 2011. http:\/\/telefrieden.blogspot.com\/2011\/01\/summary-of-fccs-net-neutrality-report.html."},{"key":"e_1_2_1_13_1","unstructured":"David Isenberg. Making Network Neutrality Sustainable: SMART Letter #100 May 2007. http:\/\/www.isen.com\/blog\/2007\/05\/making-network-neutrality-sustainable.html.  David Isenberg. Making Network Neutrality Sustainable: SMART Letter #100 May 2007. http:\/\/www.isen.com\/blog\/2007\/05\/making-network-neutrality-sustainable.html."},{"key":"e_1_2_1_14_1","unstructured":"Dane Jasper. Why U.S. Broadband is So Slow Mar 2011. http:\/\/corp.sonic.net\/ceo\/2011\/03\/05\/why-us-broadband-is-so-slow\/.  Dane Jasper. Why U.S. Broadband is So Slow Mar 2011. http:\/\/corp.sonic.net\/ceo\/2011\/03\/05\/why-us-broadband-is-so-slow\/."},{"key":"e_1_2_1_15_1","doi-asserted-by":"crossref","unstructured":"kc claffy. Ten Things Lawyers Should Know About the Internet Aug 2008. http:\/\/www.caida.org\/publications\/papers\/2008\/lawyers_top_ten\/.  kc claffy. Ten Things Lawyers Should Know About the Internet Aug 2008. http:\/\/www.caida.org\/publications\/papers\/2008\/lawyers_top_ten\/.","DOI":"10.2139\/ssrn.1266324"},{"key":"e_1_2_1_16_1","unstructured":"kc claffy. Top ten ($7.2B) broadband stimulus: ideal conditions April 2009. http:\/\/blog.caida.org\/best_available_data\/2009\/04\/13\/top-ten-72b-broadband-stimulus-ideal-conditions\/.  kc claffy. Top ten ($7.2B) broadband stimulus: ideal conditions April 2009. http:\/\/blog.caida.org\/best_available_data\/2009\/04\/13\/top-ten-72b-broadband-stimulus-ideal-conditions\/."},{"key":"e_1_2_1_17_1","doi-asserted-by":"crossref","unstructured":"J. Scott Marcus and Juan Rendon Schneir. Drivers and Effects of the Size and Composition of Telecoms Regulatory Agencies September 2010. http:\/\/juanrendon.com\/Papers\/Marcus_Rendon_size_composition_NRA.pdf.  J. Scott Marcus and Juan Rendon Schneir. Drivers and Effects of the Size and Composition of Telecoms Regulatory Agencies September 2010. http:\/\/juanrendon.com\/Papers\/Marcus_Rendon_size_composition_NRA.pdf.","DOI":"10.2139\/ssrn.1675705"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/0308-5961(94)90013-2"},{"issue":"1","key":"e_1_2_1_19_1","volume":"8","author":"Odlyzko Andrew","year":"2009","journal-title":"Efficiency and Fairness in Markets. Review of Network Economics"},{"volume-title":"Morgan Kaufman","year":"2001","author":"Black Susan","key":"e_1_2_1_20_1"},{"key":"e_1_2_1_21_1","first-page":"141","volume":"2","author":"Network Neutrality Wu.","year":"2003","journal-title":"Journal of Telecommunications and High Technology Law"}],"container-title":["ACM SIGCOMM Computer Communication Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2043165.2043172","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2043165.2043172","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:54:38Z","timestamp":1750240478000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2043165.2043172"}},"subtitle":["the meme, its cost, its future"],"short-title":[],"issued":{"date-parts":[[2011,10,22]]},"references-count":21,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2011,10,22]]}},"alternative-id":["10.1145\/2043165.2043172"],"URL":"https:\/\/doi.org\/10.1145\/2043165.2043172","relation":{},"ISSN":["0146-4833"],"issn-type":[{"type":"print","value":"0146-4833"}],"subject":[],"published":{"date-parts":[[2011,10,22]]},"assertion":[{"value":"2011-10-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}