aboutsummaryrefslogtreecommitdiffhomepage
diff options
context:
space:
mode:
-rw-r--r--data/samples/current/en/free_as_in_freedom_2.richard_stallman_and_the_free_software_revolution.sam_williams.richard_stallman.sst14
-rw-r--r--data/samples/current/en/gpl3.fsf.sst40
-rw-r--r--data/samples/current/en/gullivers_travels.jonathan_swift.sst4
-rw-r--r--data/samples/current/en/the_wealth_of_networks.yochai_benkler.sst24
4 files changed, 41 insertions, 41 deletions
diff --git a/data/samples/current/en/free_as_in_freedom_2.richard_stallman_and_the_free_software_revolution.sam_williams.richard_stallman.sst b/data/samples/current/en/free_as_in_freedom_2.richard_stallman_and_the_free_software_revolution.sam_williams.richard_stallman.sst
index fc26116..942d59d 100644
--- a/data/samples/current/en/free_as_in_freedom_2.richard_stallman_and_the_free_software_revolution.sam_williams.richard_stallman.sst
+++ b/data/samples/current/en/free_as_in_freedom_2.richard_stallman_and_the_free_software_revolution.sam_williams.richard_stallman.sst
@@ -32,7 +32,7 @@
:A~ @title, Sam Williams, Second Edition Revisions by Richard M. Stallman
-1~pre2 [Publisher Information] -#
+1~pub [Publisher Information] -#
This is /{Free as in Freedom 2.0: Richard Stallman and the Free Soft-ware Revolution}/ , a revision of /{Free as in Freedom: Richard Stallman’s Crusade for Free Software}/. -#
@@ -49,7 +49,7 @@ ISBN: 9780983159216 -#
The cover photograph of Richard Stallman is by Peter Hinely. The PDP-10 photograph in Chapter 7 is by Rodney Brooks. The photo-graph of St. IGNUcius in Chapter 8 is by Stian Eikeland -#
-1~ Foreword by Richard M. Stallman
+1~forword Foreword by Richard M. Stallman
I have aimed to make this edition combine the advantages of my knowledge and Williams' interviews and outside viewpoint. The reader can judge to what extent I have achieved this.
@@ -69,7 +69,7 @@ In this edition, the complete system that combines GNU and Linux is always "GNU/
I would like to thank John Sullivan for his many useful criticisms and suggestions.
-1~ Preface by Sam Williams
+1~preface Preface by Sam Williams
This summer marks the 10th anniversary of the email exchange that set in motion the writing of /{Free as in Freedom: Richard Stallman's Crusade for Free Software}/ and, by extension, the work prefaced here, /{Richard Stallman and the Free Software Revolution}/.
@@ -2723,7 +2723,7 @@ Moglen says that moment, more than any other, drove home the elemental simplicit
"It was funny," recalls Moglen. "I said to him, 'Richard, you know, you and I are the two guys who didn't make any money out of this revolution.' And then I paid for the lunch, because I knew he didn't have the money to pay for it."~{ RMS: I never refuse to let people treat me to a meal, since my pride is not based on picking up the check. But I surely did have the money to pay for lunch. My income, which comes from around half the speeches I give, is much less than a law professor's salary, but I'm not poor. }~
-1~ Epilogue from Sam Williams: Crushing Loneliness
+1~epilogue Epilogue from Sam Williams: Crushing Loneliness
[RMS: Because this chapter is so personally from Sam Williams, I have indicated all changes to the text with square brackets or ellipses, and I have made such changes only to clear up technical or legal points,and to remove passages that I found to be hostile and devoid of information. I have also added notes labeled 'RMS:' to respond to certain points. Williams has also changed the text of this chapter; changes made by Williams are not explicitly indicated.]
@@ -2966,7 +2966,7 @@ While I'm sure not every reader feels the same level of affinity for Stallman...
Endnotes
-1~ Appendix A - Hack, Hackers and Hacking
+1~appendix_A Appendix A - Hack, Hackers and Hacking
={ hackers +18 }
To understand the full meaning of the word "hacker," it helps to examine the word's etymology over the years.
@@ -3028,7 +3028,7 @@ The urge to confine the culture of computer hacking within the same ethical boun
Once a vague item of obscure student jargon, the word "hacker" has become a linguistic billiard ball, subject to political spin and ethical nuances. Perhaps this is why so many hackers and journalists enjoy using it. We cannot predict how people will use the word in the future.We can, however, decide how we will use it ourselves. Using the term "cracking" rather than "hacking," when you mean "security breaking,"shows respect for Stallman and all the hackers mentioned in this book,and helps preserve something which all computer users have benefited from: the hacker spirit.
={ crackers }
-1~ Appendix B - GNU Free Documentation License
+1~appendix_B Appendix B - GNU Free Documentation License
={ GFDL (GNU Free Documentation License) +64 ;
GNU Free Documentation License (GFDL) +64
}
@@ -3201,7 +3201,7 @@ If you have Invariant Sections without Cover Texts, or some other combination of
If your document contains nontrivial examples of program code,we recommend releasing these examples in parallel under your choice of free software license, such as the GNU General Public License, to permit their use in free software.
-1~ Colophon
+1~colophon Colophon
The front and back covers of this book were designed and produced by Rob Myers using Inkscape, the free software vector graphics program. Jeanne Rasata also contributed to the cover design.
diff --git a/data/samples/current/en/gpl3.fsf.sst b/data/samples/current/en/gpl3.fsf.sst
index df68a03..3c055e7 100644
--- a/data/samples/current/en/gpl3.fsf.sst
+++ b/data/samples/current/en/gpl3.fsf.sst
@@ -33,7 +33,7 @@
:C~ Copyright (C) 2007 Free Software Foundation, Inc. http://fsf.org/ Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.
-1~ Preamble
+1~preamble Preamble
The GNU General Public License is a free, copyleft license for software and other kinds of works.
@@ -57,7 +57,7 @@ The precise terms and conditions for copying, distribution and modification foll
:C~ TERMS AND CONDITIONS
-1~0 0. Definitions.
+1~ 0. Definitions.
"This License" refers to version 3 of the GNU General Public License.
@@ -75,7 +75,7 @@ To "convey" a work means any kind of propagation that enables other parties to m
An interactive user interface displays "Appropriate Legal Notices" to the extent that it includes a convenient and prominently visible feature that (1) displays an appropriate copyright notice, and (2) tells the user that there is no warranty for the work (except to the extent that warranties are provided), that licensees may convey the work under this License, and how to view a copy of this License. If the interface presents a list of user commands or options, such as a menu, a prominent item in the list meets this criterion.
-1~1 1. Source Code.
+1~ 1. Source Code.
The "source code" for a work means the preferred form of the work for making modifications to it. "Object code" means any non-source form of a work.
@@ -89,7 +89,7 @@ The Corresponding Source need not include anything that users can regenerate aut
The Corresponding Source for a work in source code form is that same work.
-1~2 2. Basic Permissions.
+1~ 2. Basic Permissions.
All rights granted under this License are granted for the term of copyright on the Program, and are irrevocable provided the stated conditions are met. This License explicitly affirms your unlimited permission to run the unmodified Program. The output from running a covered work is covered by this License only if the output, given its content, constitutes a covered work. This License acknowledges your rights of fair use or other equivalent, as provided by copyright law.
@@ -97,19 +97,19 @@ You may make, run and propagate covered works that you do not convey, without co
Conveying under any other circumstances is permitted solely under the conditions stated below. Sublicensing is not allowed; section 10 makes it unnecessary.
-1~3 3. Protecting Users' Legal Rights From Anti-Circumvention Law.
+1~ 3. Protecting Users' Legal Rights From Anti-Circumvention Law.
No covered work shall be deemed part of an effective technological measure under any applicable law fulfilling obligations under article 11 of the WIPO copyright treaty adopted on 20 December 1996, or similar laws prohibiting or restricting circumvention of such measures.
When you convey a covered work, you waive any legal power to forbid circumvention of technological measures to the extent such circumvention is effected by exercising rights under this License with respect to the covered work, and you disclaim any intention to limit operation or modification of the work as a means of enforcing, against the work's users, your or third parties' legal rights to forbid circumvention of technological measures.
-1~4 4. Conveying Verbatim Copies.
+1~ 4. Conveying Verbatim Copies.
You may convey verbatim copies of the Program's source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice; keep intact all notices stating that this License and any non-permissive terms added in accord with section 7 apply to the code; keep intact all notices of the absence of any warranty; and give all recipients a copy of this License along with the Program.
You may charge any price or no price for each copy that you convey, and you may offer support or warranty protection for a fee.
-1~5 5. Conveying Modified Source Versions.
+1~ 5. Conveying Modified Source Versions.
You may convey a work based on the Program, or the modifications to produce it from the Program, in the form of source code under the terms of section 4, provided that you also meet all of these conditions:
@@ -123,7 +123,7 @@ _1 d) If the work has interactive user interfaces, each must display Appropriate
A compilation of a covered work with other separate and independent works, which are not by their nature extensions of the covered work, and which are not combined with it such as to form a larger program, in or on a volume of a storage or distribution medium, is called an "aggregate" if the compilation and its resulting copyright are not used to limit the access or legal rights of the compilation's users beyond what the individual works permit. Inclusion of a covered work in an aggregate does not cause this License to apply to the other parts of the aggregate.
-1~6 6. Conveying Non-Source Forms.
+1~ 6. Conveying Non-Source Forms.
You may convey a covered work in object code form under the terms of sections 4 and 5, provided that you also convey the machine-readable Corresponding Source under the terms of this License, in one of these ways:
@@ -149,7 +149,7 @@ The requirement to provide Installation Information does not include a requireme
Corresponding Source conveyed, and Installation Information provided, in accord with this section must be in a format that is publicly documented (and with an implementation available to the public in source code form), and must require no special password or key for unpacking, reading or copying.
-1~7 7. Additional Terms.
+1~ 7. Additional Terms.
"Additional permissions" are terms that supplement the terms of this License by making exceptions from one or more of its conditions. Additional permissions that are applicable to the entire Program shall be treated as though they were included in this License, to the extent that they are valid under applicable law. If additional permissions apply only to part of the Program, that part may be used separately under those permissions, but the entire Program remains governed by this License without regard to the additional permissions.
@@ -175,7 +175,7 @@ If you add terms to a covered work in accord with this section, you must place,
Additional terms, permissive or non-permissive, may be stated in the form of a separately written license, or stated as exceptions; the above requirements apply either way.
-1~8 8. Termination.
+1~ 8. Termination.
You may not propagate or modify a covered work except as expressly provided under this License. Any attempt otherwise to propagate or modify it is void, and will automatically terminate your rights under this License (including any patent licenses granted under the third paragraph of section 11).
@@ -185,11 +185,11 @@ Moreover, your license from a particular copyright holder is reinstated permanen
Termination of your rights under this section does not terminate the licenses of parties who have received copies or rights from you under this License. If your rights have been terminated and not permanently reinstated, you do not qualify to receive new licenses for the same material under section 10.
-1~9 9. Acceptance Not Required for Having Copies.
+1~ 9. Acceptance Not Required for Having Copies.
You are not required to accept this License in order to receive or run a copy of the Program. Ancillary propagation of a covered work occurring solely as a consequence of using peer-to-peer transmission to receive a copy likewise does not require acceptance. However, nothing other than this License grants you permission to propagate or modify any covered work. These actions infringe copyright if you do not accept this License. Therefore, by modifying or propagating a covered work, you indicate your acceptance of this License to do so.
-1~10 10. Automatic Licensing of Downstream Recipients.
+1~ 10. Automatic Licensing of Downstream Recipients.
Each time you convey a covered work, the recipient automatically receives a license from the original licensors, to run, modify and propagate that work, subject to this License. You are not responsible for enforcing compliance by third parties with this License.
@@ -197,7 +197,7 @@ An "entity transaction" is a transaction transferring control of an organization
You may not impose any further restrictions on the exercise of the rights granted or affirmed under this License. For example, you may not impose a license fee, royalty, or other charge for exercise of rights granted under this License, and you may not initiate litigation (including a cross-claim or counterclaim in a lawsuit) alleging that any patent claim is infringed by making, using, selling, offering for sale, or importing the Program or any portion of it.
-1~11 11. Patents.
+1~ 11. Patents.
A "contributor" is a copyright holder who authorizes use under this License of the Program or a work on which the Program is based. The work thus licensed is called the contributor's "contributor version".
@@ -215,15 +215,15 @@ A patent license is "discriminatory" if it does not include within the scope of
Nothing in this License shall be construed as excluding or limiting any implied license or other defenses to infringement that may otherwise be available to you under applicable patent law.
-1~12 12. No Surrender of Others' Freedom.
+1~ 12. No Surrender of Others' Freedom.
If conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot convey a covered work so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not convey it at all. For example, if you agree to terms that obligate you to collect a royalty for further conveying from those to whom you convey the Program, the only way you could satisfy both those terms and this License would be to refrain entirely from conveying the Program.
-1~13 13. Use with the GNU Affero General Public License.
+1~ 13. Use with the GNU Affero General Public License.
Notwithstanding any other provision of this License, you have permission to link or combine any covered work with a work licensed under version 3 of the GNU Affero General Public License into a single combined work, and to convey the resulting work. The terms of this License will continue to apply to the part which is the covered work, but the special requirements of the GNU Affero General Public License, section 13, concerning interaction through a network will apply to the combination as such.
-1~14 14. Revised Versions of this License.
+1~ 14. Revised Versions of this License.
The Free Software Foundation may publish revised and/or new versions of the GNU General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns.
@@ -233,21 +233,21 @@ If the Program specifies that a proxy can decide which future versions of the GN
Later license versions may give you additional or different permissions. However, no additional obligations are imposed on any author or copyright holder as a result of your choosing to follow a later version.
-1~15 15. Disclaimer of Warranty.
+1~ 15. Disclaimer of Warranty.
THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
-1~16 16. Limitation of Liability.
+1~ 16. Limitation of Liability.
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
-1~17 17. Interpretation of Sections 15 and 16.
+1~ 17. Interpretation of Sections 15 and 16.
If the disclaimer of warranty and limitation of liability provided above cannot be given local legal effect according to their terms, reviewing courts shall apply local law that most closely approximates an absolute waiver of all civil liability in connection with the Program, unless a warranty or assumption of liability accompanies a copy of the Program in return for a fee.
!_ END OF TERMS AND CONDITIONS
-1~ How to Apply These Terms to Your New Programs
+1~how-to-make-gpl3-apply How to Apply These Terms to Your New Programs
If you develop a new program, and you want it to be of the greatest possible use to the public, the best way to achieve this is to make it free software which everyone can redistribute and change under these terms.
diff --git a/data/samples/current/en/gullivers_travels.jonathan_swift.sst b/data/samples/current/en/gullivers_travels.jonathan_swift.sst
index ba24213..217741a 100644
--- a/data/samples/current/en/gullivers_travels.jonathan_swift.sst
+++ b/data/samples/current/en/gullivers_travels.jonathan_swift.sst
@@ -33,7 +33,7 @@ A~ @title @creator
:B~ Gulliver's Travels into Several Remote Nations of the World
-1~ THE PUBLISHER TO THE READER.
+1~publisher_to_reader THE PUBLISHER TO THE READER.
[As given in the original edition.]
@@ -51,7 +51,7 @@ As for any further particulars relating to the author, the reader will receive s
RICHARD SYMPSON.
-1~ A LETTER FROM CAPTAIN GULLIVER TO HIS COUSIN SYMPSON.
+1~gulliver-to-cousin A LETTER FROM CAPTAIN GULLIVER TO HIS COUSIN SYMPSON.
WRITTEN IN THE YEAR 1727.
diff --git a/data/samples/current/en/the_wealth_of_networks.yochai_benkler.sst b/data/samples/current/en/the_wealth_of_networks.yochai_benkler.sst
index 6628c26..828dbdd 100644
--- a/data/samples/current/en/the_wealth_of_networks.yochai_benkler.sst
+++ b/data/samples/current/en/the_wealth_of_networks.yochai_benkler.sst
@@ -71,7 +71,7 @@ Oddly enough, I have *{never had the proper context}* in which to give two more
Finally, to my best friend and tag-team partner in this tussle we call life, Deborah Schrag, with whom I have shared nicely more or less everything since we were barely adults. ,{[pg 1]},
-1~1 Chapter 1 - Introduction: A Moment of Opportunity and Challenge
+1~ Chapter 1 - Introduction: A Moment of Opportunity and Challenge
Information, knowledge, and culture are central to human freedom and human development. How they are produced and exchanged in our society critically affects the way we see the state of the world as it is and might be; who decides these questions; and how we, as societies and polities, come to understand what can and ought to be done. For more than 150 years, modern complex democracies have depended in large measure on an industrial information economy for these basic functions. In the past decade and a half, we have begun to see a radical change in the organization of information production. Enabled by technological change, we are beginning to see a series of economic, social, and cultural adaptations that make possible a radical transformation of how we make the information environment we occupy as autonomous individuals, citizens, and members of cultural and social groups. It seems passe today to speak of "the Internet revolution." In some academic circles, it is positively naïve. But it should not be. The change brought about by the networked information environment is deep. It is structural. It goes to the very foundations of how liberal markets and liberal democracies have coevolved for almost two centuries. ,{[pg 2]},
={ access :
@@ -488,7 +488,7 @@ The technical conditions of communication and information processing are enablin
This part of the book is dedicated to explaining the technological-economic transformation that is making these practices possible. Not because economics drives all; not because technology determines the way society or communication go; but because it is the technological shock, combined with the economic sustainability of the emerging social practices, that creates the new set of social and political opportunities that are the subject of this book. By working out the economics of these practices, we can understand the economic parameters within which practical political imagination and fulfillment can operate in the digitally networked environment. I describe sustained productive enterprises that take the form of decentralized and nonmarket-based production, and explain why productivity and growth are consistent with a shift toward such modes of production. What I describe is not an exercise in pastoral utopianism. It is not a vision of a return to production in a preindustrial world. It is a practical possibility that directly results from our economic understanding of information and culture as objects of production. It flows from fairly standard economic analysis applied to a very nonstandard economic reality: one in which all the means of producing and exchanging information and culture are placed in the hands of hundreds of millions, and eventually billions, of people around the world, available for them to work with not only when they are functioning in the market to keep body and soul together, but also, and with equal efficacy, when they are functioning in society and alone, trying to give meaning to their lives as individuals and as social beings. ,{[pg 35]},
-1~2 Chapter 2 - Some Basic Economics of Information Production and Innovation
+1~ Chapter 2 - Some Basic Economics of Information Production and Innovation
={ economics of information production and innovation +40 ;
information production economics +40 ;
innovation economics +40
@@ -786,7 +786,7 @@ The networked information economy has upset the apple cart on the technical, mat
There are diverse motivations and strategies for organizing information production. Their relative attractiveness is to some extent dependent on technology, to some extent on institutional arrangements. The rise that we see today in the efficacy and scope of nonmarket production, and of the peer production that I describe and analyze in the following two chapters, are well within the predictable, given our understanding of the economics of information production. The social practices of information production ,{[pg 58]}, that form the basis of much of the normative analysis I offer in part II are internally sustainable given the material conditions of information production and exchange in the digitally networked environment. These patterns are unfamiliar to us. They grate on our intuitions about how production happens. They grate on the institutional arrangements we developed over the course of the twentieth century to regulate information and cultural production. But that is because they arise from a quite basically different set of material conditions. We must understand these new modes of production. We must learn to evaluate them and compare their advantages and disadvantages to those of the industrial information producers. And then we must adjust our institutional environment to make way for the new social practices made possible by the networked environment. ,{[pg 59]},
-1~3 Chapter 3 - Peer Production and Sharing
+1~ Chapter 3 - Peer Production and Sharing
={ peer production +63 ;
sharing +63
}
@@ -1210,7 +1210,7 @@ This technological shift gave rise to the fastest-growing sector in the wireless
I hope these detailed examples provide a common set of mental pictures of what peer production looks like. In the next chapter I explain the economics of peer production of information and the sharing of material resources for computation, communications, and storage in particular, and of nonmarket, social production more generally: why it is efficient, how we can explain the motivations that lead people to participate in these great enterprises of nonmarket cooperation, and why we see so much more of it online than we do off-line. The moral and political discussion throughout the remainder of the book does not, however, depend on your accepting the particular analysis I offer in chapter 4 to "domesticate" these phenomena within more or less standard economics. At this point, it is important that the stories have provided a texture for, and established the plausibility of, ,{[pg 90]}, the claim that nonmarket production in general and peer production in particular are phenomena of much wider application than free software, and exist in important ways throughout the networked information economy. For purposes of understanding the political implications that occupy most of this book, that is all that is necessary. ,{[pg 91]},
-1~4 Chapter 4 - The Economics of Social Production
+1~ Chapter 4 - The Economics of Social Production
={ economics of nonmarket production +68 ;
nonmarket production, economics of +68
}
@@ -1827,7 +1827,7 @@ The basic intuition and popular belief that the Internet will bring greater free
The chapters in this part focus on major liberal commitments or concerns. Chapter 5 addresses the question of individual autonomy. Chapters 6, 7, and 8 address democratic participation: first in the political public sphere and then, more broadly, in the construction of culture. Chapter 9 deals with justice and human development. Chapter 10 considers the effects of the networked information economy on community. ,{[pg 133]},
-1~5 Chapter 5 - Individual Freedom: Autonomy, Information, and Law
+1~ Chapter 5 - Individual Freedom: Autonomy, Information, and Law
={ autonomy +64 ;
individual autonomy +64
}
@@ -2304,7 +2304,7 @@ The core response to the Babel objection is, then, to accept that filtration is
The increasing feasibility of nonmarket, nonproprietary production of information, ,{[pg 175]}, knowledge, and culture, and of communications and computation capacity holds the promise of increasing the degree of autonomy for individuals in the networked information economy. By removing basic capital and organizational constraints on individual action and effective cooperation, the networked information economy allows individuals to do more for and by themselves, and to form associations with others whose help they require in pursuing their plans. We are beginning to see a shift from the highly constrained roles of employee and consumer in the industrial economy, to more flexible, self-authored roles of user and peer participant in cooperative ventures, at least for some part of life. By providing as commons a set of core resources necessary for perceiving the state of the world, constructing one's own perceptions of it and one's own contributions to the information environment we all occupy, the networked information economy diversifies the set of constraints under which individuals can view the world and attenuates the extent to which users are subject to manipulation and control by the owners of core communications and information systems they rely on. By making it possible for many more diversely motivated and organized individuals and groups to communicate with each other, the emerging model of information production provides individuals with radically different sources and types of stories, out of which we can work to author our own lives. Information, knowledge, and culture can now be produced not only by many more people than could do so in the industrial information economy, but also by individuals and in subjects and styles that could not pass the filter of marketability in the mass-media environment. The result is a proliferation of strands of stories and of means of scanning the universe of potential stories about how the world is and how it might become, leaving individuals with much greater leeway to choose, and therefore a much greater role in weaving their own life tapestry. ,{[pg 176]},
-1~6 Chapter 6 - Political Freedom Part 1: The Trouble with Mass Media
+1~ Chapter 6 - Political Freedom Part 1: The Trouble with Mass Media
={ commercial mass media :
See also traditional model of communication commercial mass media, political freedom and +53 ;
mass media, political freedom and +53 ;
@@ -2831,7 +2831,7 @@ The two basic critiques of commercial mass media coalesce on the conflict betwee
As we turn now to consider the advantages of the introduction of Internet communications, we shall see how this new model can complement the mass media and alleviate its worst weaknesses. In particular, the discussion focuses on the emergence of the networked information economy and the relatively larger role it makes feasible for nonmarket actors and for radically distributed production of information and culture. One need not adopt the position ,{[pg 211]}, that the commercial mass media are somehow abusive, evil, corporate-controlled giants, and that the Internet is the ideal Jeffersonian republic in order to track a series of genuine improvements represented by what the new emerging modalities of public communication can do as platforms for the public sphere. Greater access to means of direct individual communications, to collaborative speech platforms, and to nonmarket producers more generally can complement the commercial mass media and contribute to a significantly improved public sphere. ,{[pg 212]},
-1~7 Chapter 7 - Political Freedom Part 2: Emergence of the Networked Public Sphere
+1~ Chapter 7 - Political Freedom Part 2: Emergence of the Networked Public Sphere
={ networked public sphere +108 ;
political freedom, public sphere and +108 ;
public sphere +108
@@ -3589,7 +3589,7 @@ Part of what has changed with the Internet is technical infrastructure. Network
In the networked information environment, everyone is free to observe, report, question, and debate, not only in principle, but in actual capability. They can do this, if not through their own widely read blog, then through a cycle of mailing lists, collective Web-based media like Slashdot, comments on blogs, or even merely through e-mails to friends who, in turn, have meaningful visibility in a smallish-scale cluster of sites or lists. We are witnessing a fundamental change in how individuals can interact with their democracy and experience their role as citizens. Ideal citizens need not be seen purely as trying to inform themselves about what others have found, so that they can vote intelligently. They need not be limited to reading the opinions of opinion makers and judging them in private conversations. They are no longer constrained to occupy the role of mere readers, viewers, and listeners. They can be, instead, participants in a conversation. Practices that begin to take advantage of these new capabilities shift the locus of content creation from the few professional journalists trolling society for issues and observations, to the people who make up that society. They begin to free the public agenda setting from dependence on the judgments of managers, whose job it is to assure that the maximum number of readers, viewers, and listeners are sold in the market for eyeballs. The agenda thus can be rooted in the life and experience of individual participants in society--in their observations, experiences, and obsessions. The network allows all citizens to change their relationship to the public sphere. They no longer need be consumers and passive spectators. They can become creators and primary subjects. It is in this sense that the Internet democratizes. ,{[pg 273]},
-1~8 Chapter 8 - Cultural Freedom: A Culture Both Plastic and Critical
+1~ Chapter 8 - Cultural Freedom: A Culture Both Plastic and Critical
={ culture +51 }
poem{
@@ -3905,7 +3905,7 @@ A systematic commitment to avoid direct intervention in cultural exchange does n
By comparison to the highly choreographed cultural production system of the industrial information economy, the emergence of a new folk culture ,{[pg 300]}, and of a wider practice of active personal engagement in the telling and retelling of basic cultural themes and emerging concerns and attachments offers new avenues for freedom. It makes culture more participatory, and renders it more legible to all its inhabitants. The basic structuring force of culture is not eliminated, of course. The notion of floating monads disconnected from a culture is illusory. Indeed, it is undesirable. However, the framework that culture offers us, the language that makes it possible for us to make statements and incorporate the statements of others in the daily social conversation that pervades life, is one that is more amenable to our own remaking. We become more sophisticated users of this framework, more self-conscious about it, and have a greater capacity to recognize, challenge, and change that which we find oppressive, and to articulate, exchange, and adopt that which we find enabling. As chapter 11 makes clear, however, the tension between the industrial model of cultural production and the networked information economy is nowhere more pronounced than in the question of the degree to which the new folk culture of the twenty-first century will be permitted to build upon the outputs of the twentieth-century industrial model. In this battle, the stakes are high. One cannot make new culture ex nihilo. We are as we are today, as cultural beings, occupying a set of common symbols and stories that are heavily based on the outputs of that industrial period. If we are to make this culture our own, render it legible, and make it into a new platform for our needs and conversations today, we must find a way to cut, paste, and remix present culture. And it is precisely this freedom that most directly challenges the laws written for the twentieth-century technology, economy, and cultural practice. ,{[pg 301]},
-1~9 Chapter 9 - Justice and Development
+1~ Chapter 9 - Justice and Development
={ human development and justice +91 ;
justice and human development +91
}
@@ -4569,7 +4569,7 @@ Ideally, perhaps, the most direct way to arrive at a better system for harnessin
The practical freedom of individuals to act and associate freely--free from the constraints of proprietary endowment, free from the constraints of formal relations of contract or stable organizations--allows individual action in ad hoc, informal association to emerge as a new global mover. It frees the ability of people to act in response to all their motivations. In doing so, it offers a new path, alongside those of the market and formal governmental investment in public welfare, for achieving definable and significant improvements in human development throughout the world. ,{[pg 356]},
-1~10 Chapter 10 - Social Ties: Networking Together
+1~ Chapter 10 - Social Ties: Networking Together
={ norms (social) +38 ;
regulation by social norms +38 ;
social relations and norms +38
@@ -4858,7 +4858,7 @@ This new enclosure movement has been the subject of sustained and diverse academ
Chapter 11 is devoted to an overview of the range of discrete policy areas that are shaping the institutional ecology of digital networks, in which proprietary, market-based models of information production compete with those that are individual, social, and peer produced. In almost all contexts, when presented with a policy choice, advanced economies have chosen to regulate information production and exchange in ways that make it easier to pursue a proprietary, exclusion-based model of production of entertainment goods at the expense of commons- and service-based models of information production and exchange. This has been true irrespective of the political party in power in the United States, or the cultural differences in the salience of market orientation between Europe and the United States. However, the technological trajectory, the social practices, and the cultural understanding are often working at cross-purposes with the regulatory impulse. The equilibrium on which these conflicting forces settle will shape, to a large extent, the way in which information, knowledge, and culture are produced and used over the coming few decades. Chapter 12 concludes the book with an overview of what we have seen about the political economy of information and what we might therefore understand to be at stake in the policy choices that liberal democracies and advanced economies will be making in the coming years. ,{[pg 383]},
-1~11 Chapter 11 - The Battle Over the Institutional Ecology of the Digital Environment
+1~ Chapter 11 - The Battle Over the Institutional Ecology of the Digital Environment
={ commercial model of communication +133 ;
industrial model of communication +133 ;
institutional ecology of digital environment +133 ;
@@ -5672,7 +5672,7 @@ However, security concerns need not support proprietary architectures and practi
More fundamentally, the security concerns represent a lack of ease with the great freedom enabled by the networked information environment. Some of the individuals who can now do more alone and in association with others want to do harm to the United States in particular, and to advanced liberal ,{[pg 459]}, market-based democracies more generally. Others want to trade Nazi memorabilia or child pornography. Just as the Internet makes it harder for authoritarian regimes to control their populations, so too the tremendous openness and freedom of the networked environment requires new ways of protecting open societies from destructive individuals and groups. And yet, particularly in light of the systematic and significant benefits of the networked information economy and its sharing-based open production practices to the core political commitments of liberal democracies, preserving security in these societies by eliminating the technologies that can support improvements in the very freedom being protected is perverse. Given Abu Ghraib and Guantanamo Bay, however, squelching the emergence of an open networked environment and economy hardly seems to be the most glaring of self-defeating moves in the war to protect freedom and human dignity in liberal societies. It is too early to tell whether the security urge will ultimately weigh in on the side of the industrial information economy incumbents, or will instead follow the path of the crypto-wars, and lead security concerns to support the networked information economy's ability to provide survivable, redundant, and effective critical infrastructures and information production and exchange capabilities. If the former, this impulse may well present a formidable obstacle to the emergence of an open networked information environment. ,{[pg 460]},
-1~12 Chapter 12 - Conclusion: The Stakes of Information Law and Policy
+1~ Chapter 12 - Conclusion: The Stakes of Information Law and Policy
={ commercial model of communication :
stakes of information policy +21 ;
industrial model of communication :