Skip to main content

Inclusive by Design: The Curious Case Of the Internet

  • Chapter
Clumsy Solutions for a Complex World

Part of the book series: Global Issues Series ((GLOISS))

Abstract

The Internet originated in a strongly hierarchical setting: the United States military. Way back in the 1960s, the Pentagon became seriously concerned about the vulnerability of its communication systems in the event of an all-out nuclear attack. It therefore commissioned a research programme aimed at ‘strike-proofing’ these systems. The answer the researchers came up with was to distribute the crucial communication functions across a non-hierarchical net, so that, like a spider’s web, it would retain its integrity even if holes were blown in it here, there and almost everywhere. To actually create such a network, a way would have to be found to get the computers to speak to one another without information having to pass through a central hub. This, as the many tellings of the Internet story all recount,1 first happened in October 1969.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Notes

  1. Bill Lessard and Steve Baldwin, Netslaves: True Tales of Working the Web (New York: McGraw-Hill, 2000).

    Google Scholar 

  2. Randell Nichols, Daniel Ryan and Julie Ryan, Defending Your Digital Assets against Hackers, Crackers, Spies and Thieves (New York: McGraw-Hill, 2000).

    Google Scholar 

  3. Stewart Baker and Paul Hurst, The Limits of Trust: Cryptography, Governments and Electronic Commerce (The Hague: Kluwer Law International, 1998).

    Google Scholar 

  4. Pete Loshin, Personal Encryption: Clearly Explained (San Diego, CA: AP Professionals, 1998).

    Google Scholar 

  5. Richard Smith, Internet Cryptography (Reading, MA: Addison-Wesley, 1997).

    Google Scholar 

  6. Peter Wayner, Digital Cash: Commerce On the Net (Boston, MA: AP Professionals, 1997).

    Google Scholar 

  7. James Martin, Networks and Distributed Processing: Software, Techniques and Architecture (Englewood Cliffs, NJ: Prentice-Hill, 1981), p. 535.

    Google Scholar 

  8. Simon Garfinkel, Database Nation: The Death of Privacy in the 21st Century (Beijing: O’Reilly, 2000).

    Google Scholar 

  9. Wiebe E. Bijker, Of Bicycles, Bakelites and Bulbs: Towards a Theory of Sociotechnical Change (Cambridge, MA: The MIT Press, 1995).

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Copyright information

© 2006 Tommy Tranvik and Michael Thompson

About this chapter

Cite this chapter

Tranvik, T., Thompson, M. (2006). Inclusive by Design: The Curious Case Of the Internet. In: Verweij, M., Thompson, M. (eds) Clumsy Solutions for a Complex World. Global Issues Series. Palgrave Macmillan, London. https://doi.org/10.1057/9780230624887_9

Download citation

Publish with us

Policies and ethics