Deciphering Cyberspace: Making the Most of Digital Communication Technology
Publication Year: 2003
Deciphering Cyberspace: Making the Most of Digital Communication Technology, a collection of new chapters by media experts, social-psychologists, and legal scholars, lucidly explores the modern digital information revolution with one goal: to demystify digital communication technology. By examining its subject matter from the three perspectives of technology, markets, and policy, Deciphering Cyberspace provides an impressively comprehensive view of the technical nature of cyberspace, its social impact, and legal significance for individuals, institutions, and society. Marrying the broad social and psychological impact of technology to the personal, this text goes beyond mere operation of technology and illuminates how systems work. Deciphering Cyberspace is a must-have volume for anyone interested in keeping connected and learning about the ever-changing world of technology in our increasingly mediated world. ...
- Front Matter
- Back Matter
- Subject Index
Part II: Markets
- Chapter 4: Children in Cyberspace
- The Child/Internet Interface
- Intellectual Development
- Internet and the Social World
- Identity Formation and the Internet
- Chapter 5: Social and Psychological Uses of the Internet
- Who Uses the Internet?
- When the Web Resembles the Real World
- Re-Creating Identity
- What is the True Self? Online and Offline
- Emergence and Complexity
- Cyberinterview: Marvin Kane
- Chapter 6: Connected Learning in the Information Age
- The Infrastructure of Education
- The Unique Qualities of Digital Media
- Administrative Challenges
- Cyberinterview: Rick Marx
- Chapter 7: Adopting Instructional Technologies
- Brief Overview
- Assessing the Impact of Instructional Technologies
- The Promise of Instructional Technologies
- Challenges Facing Administrators
Part III: Policy
For Janice, my kindred spirit and companion who makes it all possible
Copyright © 2003 by Sage Publications, Inc.
All rights reserved. No part of this book may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without permission in writing from the publisher.
Sage Publications, Inc.
2455 Teller Road
Thousand Oaks, California 91320
Sage Publications Ltd.
6 Bonhill Street
London EC2A 4PU
Sage Publications India Pvt. Ltd.
Greater Kailash I
New Delhi 110 048 India
Printed in the United States of America
Library of Congress Cataloging-in-Publication Data
Deciphering cyberspace: making the most of digital communication technology/Leonard Shyles, editor.
Includes bibliographical references and index.
ISBN 0-7619-2219-9 (cloth) – ISBN 0-7619-2220-2 (pbk)
1. Telecommunication–History. 2. Cyberspace. 3. Information society. I. Shyles, Leonard, 1948-
TK5102.2 .D43 2002
02 03 04 05 10 9 8 7 6 5 4 3 2 1
Acquiring Editor: Margaret H. Seawell
Editorial Assistant: Alicia Carter
Production Editor: Claudia A. Hoffman
Copy Editor: Kate Peterson
Indexer: Molly Hall
Cover Designer: Ravi Balasuriya
I thank Villanova University for providing the atmosphere necessary for scholarly research to proceed. In particular, I wish to thank Father Kail Ellis, Dean of the College of Arts and Sciences, for supporting this project with his advice and guidance. I also thank the Department of Communication and especially my Chair, Terry Nance, for her support.
I thank my sponsoring editor at Sage Publications, Margaret Seawell, for her unyielding faith and advocacy for this project. Margaret is a writer's dream who inspires her authors to strive for the best. Thanks also go to Alicia Carter, editorial assistant at Sage, for shepherding the project to speedy completion with a sure hand.
I thank all the contributors, both authors and interviewees, who have made this book a great single volume on a complex topic: Mark Banschick, Josepha Silman Banschick, Dan Birenbaum, Charles Ehlin, Marvin Kane, Keith Lee, Janessa Light, JoAnn Magdoff, Rick Marx, Leigh Maxwell, Thomas McCain, Katherine Neikirk, Judy Pearson, Jeffrey Rubin, and Michael Young. All clearly and concisely contributed important insights on a breathtaking constellation of issues. I am truly blessed to have been able to work with such a great group.
I am fortunate to have done this project with such fine people, ethical actors whose word is their bond, who are great at what they do, and who are willing and able to share their expertise with the world. I consider them to be not just colleagues, but friends.— Leonard Shyles[Page x]
This collection of new chapters by media experts, social psychologists, and legal scholars explores the current digital telecommunication revolution, of which the Internet is but a current manifestation. It is especially intended for upper-level undergraduates and graduate students studying mass communication, telecommunications, and digital media. The book presents a brief, clear, conceptual view of digital communication technology, assessing its nature and impact on individuals, institutions, and society on the threshold of the new millennium. To bring greater depth and perspective to a broad and diverse field, Deciphering Cyberspace also features interviews with industry engineers and leading practitioners.
This book is written with one main goal: to demystify digital communication technology. We present in simple language a three-element model that makes the subject of digital communication accessible. By examining digital media from the perspectives of technology, markets, and policy, we present a clear yet comprehensive view of the nature and impact of cyberspace.
Deciphering Cyberspace explains the physical nature of digital communication systems; the book also describes social, psychological, and legal aspects of digital media and telecommunication networks. Knowing how such systems work and what their impact is from multiple perspectives has the practical benefit of enabling you to make informed choices about which systems can best serve your individual and organizational needs. A guiding principle of the book, therefore, is that a sound conceptual grasp of the nature of digital media can help you keep connected in our increasingly mediated world.
In addition to mass media students, other audiences for this book include administrators and corporate executives wanting to know how digital systems can improve their business, novices considering adopting systems for work and play who want to learn more about how to assess a system before buying one, and those concerned about forfeiting their privacy to a new device who want to know how at risk they are for various abuses and what legal remedies are available to counter them. Still other audiences include parents wishing to protect their children from exposure to objectionable content.[Page xii]Technology
Deciphering Cyberspace begins from the premise that all communication systems are composed of physical elements that enable them to function; therefore, to assess their capabilities, it is essential to understand the technical properties of such systems. Understanding the physical nature of digital media is critical in deciding which systems are best suited to your needs. Knowing how systems work rather than merely being able to operate a particular device that may become outdated in a year or two enables you to function more effectively in the new media environment. For this reason, the book explains the physical principles that govern the functioning of all digital communication systems, not merely those currently in use.
For example, music audiences can now download music from the Internet instead of using CDs, a prospect that did not even exist when digital CDs began replacing analog tape as the standard storage medium for music. However, to understand which systems are best for a given function, it is necessary to understand how their technical characteristics (storage capacity, signal quality, transmission, retrieval, dissemination capabilities, etc.) compare with one another. Knowing how systems work and their technical characteristics, and not just the procedures for operating a particular piece of equipment, is a central focus of the book.
The first three chapters, by Shyles, provide a comprehensive explanation of the physical nature of digital media. Chapter 1, “Radio and Television Broadcasting,” explains how sounds, images, and other forms of electronic communication are converted into radio energy to be transmitted through space at the speed of light. The technologies used to accomplish this have undergone continuous development and refinement since 1900, but the principles on which they are based have remained a constant since the inception of broadcasting, and remain as critical to today's digital information technologies as they were to the transmission of Morse code via wireless telegraphy more than a century ago. It is therefore essential to understand broadcasting in order to know how current digital media work, for without radio energy, much of today's commerce in messages (i.e., cell phone conversations, digital video, and satellite communication) would be impossible.
Chapter 2, “Computers in Communication: Concepts and Application,” explains from both conceptual and physical perspectives how computers enable users to create (encode), store, manipulate, and display (decode) electronically any kind of information, including data, text, images, and sound. First, on a conceptual level, the chapter explains the nature of binary code, and how any kind of information may be transformed into binary code, the only information format the modern digital computer can understand. Then, on a physical level, the chapter explains how integrated circuits, [Page xiii]composed of millions of transistors acting as electronic switches, capture and store the code used to represent voice, text, and video information.
Chapter 3, “Sending Messages Across the Network,” explains how digital information is transmitted, making message sharing among distant users possible. A central topic is bandwidth, or the capacity of a channel to move information from one place to another in a given period of time. Currently, the main conduit for such traffic is the public switched telephone network (PSTN), largely accessed through modems, including wire and cable technologies, and those using radio energy for wireless transmissions. Without the PSTN and similar (private) networks, e-mail and the Internet as we know them could not exist, leaving computer users isolated from one another.
The chapter covers technologies that transfer messages through wire and cable (copper, coaxial, and fiber optic), and through wireless facilities (terrestrial microwave and satellite transmitters). All are currently used in telephony and in broadcasting for voice, image, and data transmission. Rounding out the chapter are short descriptions of how telecommunication networks provide access to users through switching and signaling architectures, and how digitalization, packet switching, multiplexing, and signal compression all increase network capacity, enabling more efficient use of available bandwidth.Markets
To succeed, new technologies that offer superior features to those already in use must appeal to potential users. They must come to be perceived as offering significant advantages over what they replace, and at an acceptable level of risk. As has been noted elsewhere:
An engineer's opinion of a new device is secondary, perhaps even irrelevant, to whether the item will succeed in the marketplace. Doubters of this view need only recall past media inventions that offered improved programming but failed as consumer products: eight-track tape, quadraphonic stereo, and video laser disks, for example. Therefore, the most powerful computer, or any other program package or communication device, is not the one with the greatest fidelity, storage capacity, or speed of delivery, but the one that people will use. (Shyles, 1997, p. 6)
As stated, technical superiority alone cannot guarantee the success of new systems. In addition to possessing superior technical features over what they are intended to replace, new devices must also come to be perceived by [Page xiv]various publics as able to meet their needs or fulfill their desires, and at a reasonable cost. Therefore, ergonomic, cognitive, affective, and emotional factors; social and economic factors; cultural and ethical norms; issues of taste; and compatibility with established values all affect the adoption of new innovations and the appeal of new products.
It is difficult to predict what impact perceptions will have on the adoption of a particular innovation by a social group, even after a device becomes available. To reduce risk, a new product may be developed in accordance with a research program designed to tap the wishes of the public for hints about the most promising directions to pursue. However, even in successful cases, devices may come to be used in ways never considered by the inventor or the marketing campaign; users often surprise designers by employing products in novel ways. For example, rap artists scratch vinyl records with phonograph needles to produce percussion effects for their music; new age architects use old tires filled with sand to build homes in the great Southwest that are remarkably efficient at withstanding heat. In these cases, products are clearly used in innovative ways unintended by their inventors.
It should be stated clearly at the outset that Deciphering Cyberspace does not use the term markets the way marketing professionals do. Whereas marketing refers more narrowly to research on a proposed product designed to build brand name awareness, or to test new products in order to develop promotions and advertising campaigns for them, this book uses the term markets more expansively. In this book, markets refer to the functions, uses, and gratifications of telecommunication systems for users on social, psychological, and practical levels. Digital media systems may be viewed in terms of the purposes to which they are put, as well as their social, psychological, and practical effects. Marketing professionals may therefore be interested in these chapters for the insight they provide about why users adopt some products and how they use them.
For example, in Chapter 4, “Children in Cyberspace,” authors Mark R. Banschick and Josepha Silman Banschick offer an insightful and sweeping panorama of the impact of digital media on one of its largest and most devoted market segments: young people. Firmly grounded in the psychological theories of Piaget, Freud, Dewey, and Erikson, and working from the perspective of decades of clinical practice in child psychiatry, the authors advance a theory of amplification to account for unprecedented extremes made possible by the Internet, extremes that offer both benefits and risks to children and that increase the potential for good and productive work as well as for inappropriate and immoral endeavors. Say the authors: “The freedom and anonymity [of the Internet] offer a vast world of experimentation that can be liberating but can also promote unhealthiness.” They explain how, on the one hand, the Internet helps shy users connect to others online, leading [Page xv]to a widening of the repertoire of social intercourse, while empowering pedophiles to exploit victims via chat rooms without even leaving home.
The chapter addresses three crucial aspects of child development affected by the Internet: intellectual growth and education, social influence, and identity and value formation, in the contexts of commercialism, intimacy, peer pressure, blurring generational boundaries, violence, independence and rebellion, work and play, social roles, and sexual and moral development. The chapter makes a much-needed contribution to theory on the effects of digital media on children by assessing the impact of the Internet on the social, psychological, cognitive, and emotional life of young people. It offers readers a perspective useful for understanding the impact of the Internet on one of its largest, most important, and involved audiences.
Chapter 5, “Social and Psychological Uses of the Internet,” further explores the social and psychological functions of cyberspace. Authors JoAnn Magdoff and Jeffrey B. Rubin use their experience as psychotherapists (and several case studies) to explore ways the Internet affects our sense of mind, body, and self. They describe how different age groups use digital systems differently, and how users' worldviews condition such use. They describe how insinuating computers into the social world alters the cadence of human interaction, increasing social commerce and the achievement of desired goals among actors, sometimes in unforeseen ways. They use several case studies as a backdrop to articulate the concept of emergence, when “disparate units, people, ideas, and bits of code connect and link in unexpected ways that suddenly trigger many more … connections” that may have been wholly unanticipated. According to the authors, emergence affords users “the means to leap to novel levels of interaction” offering “unprecedented possibilities for the transformation of the self.”
Two additional chapters on markets deal with the adoption and use of instructional technologies (IT), the first from the standpoint of teachers and students, and the second from an administrative perspective. For people operating in networked environments, including corporate, government, and nonprofit organizations, these chapters offer a wealth of insight and information about how organizations and individuals will likely be affected by the introduction of digital media.
In Chapter 6, “Connected Learning in the Information Age,” authors Thomas A. McCain and Leigh Maxwell argue that new and emerging digital media are transforming education as no prior media innovation has done before. With pointed awareness, they warn of the importance of avoiding the hyperbole so often associated with past communication technologies that were once heralded with hope and promise, only to fail to win wide acceptance in the classroom. As an object lesson, they quote Thomas Edison's 1922 vision for the movies: “The motion picture is destined to revolutionize our [Page xvi]educational system and in a few years it will supplant … the use of textbooks.” They argue that the digital network is a true innovation, unlike previous candidates; their reasoning is the substance of their chapter.
They describe how digital media are already changing the very definition of such terms as teacher, student, education, and learning. In addition, the infrastructures being transformed by tools that make connected learning possible comprise all the elements of our educational institutions, including the physical trappings traditionally associated with schools (classrooms, books and journals, etc.) and the roles of individuals who work and study there.
The authors argue that the new arrangements created by digital telecommunication are increasing possibilities for education and a myriad of other human enterprises while reducing the space, time, and effort required for such pursuits. Among the features of the new media not available in past innovations, and that account for their success, are their two-way nature and their flexibility in providing both synchronous and asynchronous rapid access for multiple users in distant locations, qualities that afford users unprecedented interactive capacity, feedback, convenience, and efficiency. In addition, users can now access a wide range of applications covering a broad scope of subject matter, capabilities that all bode well for the future of digital media in distance learning, inside and outside of the traditional classroom. The impact of such media on organizational culture and their effect on traditional educational practices (lecturing vs. dialogue, conducting research, assessing knowledge claims) are also addressed, with fascinating implications for the future.
In Chapter 7, “Adopting Instructional Technologies,” author Judy C. Pearson draws from her administrative experience to offer guidance to future supervisors faced with the challenge of adopting IT. Her advice and expertise are invaluable to corporate executives, nonprofit organization officers, and government agency managers.
Pearson presents a brief history of IT, including a description of the capabilities of digital systems currently available. She presents a rationale for the attraction of IT organizations to systems, outlining the potential for IT to control costs and improve efficiency in providing instruction to the work force. Pearson also considers the advantages of IT adoption in promoting democratization, leveling the playing field for users of diverse backgrounds. She also presents major criticisms.
Pearson is sensitive to both intended and unintended effects of IT adoption in the workplace. She advises maximizing workplace morale when IT systems are adopted, and she warns of the danger of failing to deal effectively with morale issues in securing successful integration of systems after capital investments have been made. Pearson is knowledgeable about and sensitive to IT's differential fit into different work environments, and the [Page xvii]danger of yielding to political pressure in adopting systems that may not be suitable for a given setting. To achieve IT's promise, Pearson offers a clear set of principles based on her experience as an administrator useful to all charged with the job of adopting IT systems.Policy
The law can significantly affect the development and application of new technologies. Even in the most progressive, laissez-faire business environment, legislators must often regulate the way technology operates. Policy goals may include ensuring fair and equitable distribution of the benefits of new products to promote the general welfare and stimulate robust commerce in the marketplace. Of course, special interests may try to shape regulation solely for their benefit or profit. However, ideally, laws are enacted to maximize advantages for all interested parties.
For example, in the early days of radio, broadcasters who generally opposed government intervention requested federal controls when unregulated use of the airwaves led to chaos. Station owners had been increasing transmitter power to reach listeners at the expense of other broadcasters in the same area, a practice that resulted in jamming neighbor stations using the same frequencies. The bedlam that followed destroyed the system for all users. As a result, broadcasters requested federal regulation to restore the system.
In 1927, Congress created the Federal Radio Commission (FRC) to solve the problem. The FRC regulated the hours of operation for all radio stations and placed a ceiling on transmitter power. Thus, stations could once again reach their audiences, and broadcasting blossomed into a prodigiously profitable operation. In this case, regulation was viewed as clearly good for business.
Since that time, policy has not been restricted only to laws governing the physical nature of radio energy. The government has also enacted rules concerning military, economic, social, and cultural issues. For example, federal regulations created the Emergency Broadcast Service, placed limits on the number of stations that a single party could own (limits that have been relaxed over the years), made rules regarding advertising, and passed laws dealing with obscenity and indecency.
From the above, it is clear that the federal government has had a long history of regulating telecommunication interests. The Communications Act of 1934, creating the Federal Communications Commission (FCC), and the Telecommunications Act of 1996, opening competition among media and telecommunication interests, are two more recent examples of efforts by the [Page xviii]federal government to shape the way media may serve the convenience, interest, and necessity of U.S. citizens. Thus, to decipher cyberspace, it is of critical importance to understand the relationship of law, regulation, and policy to technology development.
In Chapter 8, “Law and Regulation, Part I: Individual Interests,” authors Keith Lee and Janessa Light grapple with the interpretation and application of existing mass media law regarding individual rights in light of digital technology development. The struggle to mold the existing regulatory structure to the Internet shows clearly that traditional legal principles do not always fit the new realities, sometimes requiring the creation of new laws.
In Chapter 9, “Law and Regulation, Part II: Business Interests,” authors Janessa Light and Katherine Neikirk tackle the topic of how the courts extend existing business regulation to fit the new digital technology manifested by the Internet. What are the legal issues companies and consumers should be aware of in transacting business over the Internet? How do the courts apply legal principles developed over centuries to digital systems that have only begun to emerge over the past decade?
As the authors make clear, this is not the first time that traditional legal principles have been applied to a new technology—the law has managed to deal with radio and television, technologies that the Founding Fathers never imagined. Light and Neikirk discuss the rights and remedies concerning a person's business interests in cyberspace, including trademarks in domain names, registration of domain names (including discussion of an area of the law called cybersquatting), and using trade names for navigation via metatags and ad keying. They discuss the Internet's impact on the field of personal jurisdiction and examine defamation law on the Internet with respect to liability, collection of damages for defamation, and defenses.
An objective of both of these chapters was to link explicitly, wherever possible, the legal principles used for judgments about cyberspace to the rationales used in prior cases concerning earlier media systems. By so doing, [Page xix]it is hoped that readers, lawyers and nonlawyers alike, will get a clearer picture of how some legal judgments are made and how regulatory frameworks develop.The Interviews
Five people contributed interviews for this book. They were chosen to offer their insights and perceptions from the perspectives of e-commerce and technology. Two are electronics engineers. Another, a computer programmer, is a mainframe expert. The remaining two are both working in e-commerce; one is a Web designer for other businesses; the other is a contributing editor to a http://dot.com company.
Each interview provides a unique view of how technology, markets, and policy interact to shape the business side of the digital telecommunication revolution. For readers interested in knowing more about the work-world across the digital landscape, these interviews will deepen your understanding of what it's like to be on the front lines.
To decipher cyberspace, it is necessary to understand the nexus of activity between technology, markets, and policy and how these forces interact to shape digital telecommunication. By presenting its subject matter from this perspective, Deciphering Cyberspace provides understanding of how digital media operate and what their effects are on individuals, organizations, and society. It makes the world of digital communication accessible, enabling you to make more rational, optimal, practical judgments about what it can do for you.[Page xx]
Appendix: U.S. Radio Spectrum Allocations and Uses (30 MHz-300 GHz)[Page 349]
30–30.56 MHz Defense and other federal mobile and fixed radio 30.56–32 MHz Private Mobile Radio Servicesa 32–33 MHz Defense and other federal mobile and fixed radio 33–35.19 MHz Private Mobile Radio Services 35.19–35.69 MHz Paging and Radiotelephone Service 35.69–36 MHz Private Mobile Radio Services 36–37 MHz Defense and other federal mobile and fixed radio 37–38 MHz Private Mobile Radio Services; radio astronomy 38–38.25 MHz Radio astronomy 38.25–39 MHz Defense and other federal mobile and fixed radio 39–40 MHz Private Mobile Radio Services 40–42 MHz Defense and other federal mobile and fixed radio; meteor burst communications; Industrial, Scientific and Medical; scientific telemetry 42–43.19 MHz Private Mobile Radio Services 43.19–43.69 MHz Private Mobile Radio Services; Paging and Radiotelephone Service 43.69–46.6 MHz Private Mobile Radio Services; cordless phones 46.6–47 MHz Defense and other federal mobile and fixed radio; cordless phones 47–49.6 MHz Private Mobile Radio Services; cordless phones 49.6–50 MHz Defense and other federal mobile and fixed radio; cordless phones; baby monitors, toys 50–54 MHz Amateur Radio Service 54–72 MHz TV channels 2, 3, and 4 72–73 MHz Private Mobile Radio Services; paging control; auditory assistance; radio-controlled model aircraft 73–74.6 MHz Radio astronomy 74.6–74.8 MHz Private Mobile Radio Services; paging control; auditory assistance 74.8–75.2 MHz Aviation runway marker beacons 75.2–76 MHz Private Mobile Radio Services; paging control; auditory assistance, radio-controlled model boats and cars [Page 350] 76–88 MHz TV channels 5 and 6 88–108 MHz FM radio broadcasting; future digital audio radio services; wireless microphones 108–117.975 MHz Air navigation aids 117.975–121.9375 MHz Air traffic control; search and rescue beacons 121.9375–123.0875 MHz Aviation services communications 123.0875–123.5875 MHz Aviation services communications 123.5875–128.8125 MHz Air traffic control 128.8125–132.0125 MHz Aviation services communications 132.0125–136 MHz Air traffic control 136–137 MHz Aviation services communications 137–138 MHz Non-Voice Non-Geostationary Mobile Satellite Service (Little LEO) for data communications; weather satellites 138–144 MHz Defense and other federal mobile and fixed radio, 139–140.5 and 141.5–143 MHz to be reallocated to private sector 144–146 MHz Amateur Radio Service, including satellites and space station operations 146–148 MHz Amateur Radio Service mobile operations 148–150.05 MHz Non-Voice Non-Geostationary Mobile Satellite Service (Little LEO), federal fixed, mobile and satellite uses, science telemetry 150.05–150.8 MHz Defense and other federal mobile and fixed radio 150.8–152 MHz Private Mobile Radio Services 152–152.255 MHz Paging and Radiotelephone Service 152.255–152.495 MHz Private Mobile Radio Services 152.495–152.855 MHz Paging and Radiotelephone Service 152.855–154 MHz Private Mobile Radio Services, Broadcast Auxiliary Services 154–156.2475 MHz Private Mobile Radio Services, maritime radio 156.2475–157.0375 MHz Maritime radio 157.0375–157.1875 MHz Federal maritime radio 157.1875–157.45 MHz Maritime radio 157.45–157.755 MHz Private Mobile Radio Services 157.755–158.115 MHz Paging and Radiotelephone Service 158.115–161.575 MHz Private Mobile Radio Services, maritime radio 161.575–161.625 MHz Maritime radio 161.625–161.775 MHz Broadcast Auxiliary Services 161.775–162.0125 MHz Maritime radio, Private Mobile Radio Services 162.0125–173.2 MHz Federal mobile and fixed radio; weather broadcasts; Stolen Vehicle Recovery Service; Private Mobile Radio Services; Broadcast Auxiliary Services; wireless microphones 173.2–173.4 MHz Private Mobile Radio Services 173.4–174 MHz Federal mobile and fixed radio 174–216 MHz TV channels 7–13; biomedical telemetry; wireless microphones 216–220 MHz Defense radar; maritime radio; geophysical telemetry; Interactive Video and Data Service; Amateur Radio; Low-Power Radio Service for [Page 351]theft tracking, auditory assistance and health care. To be reallocated to private sector 220–222 MHz Private Mobile Radio Services 222–225 MHz Amateur Radio Service 225–328.6 MHz Defense air, ground and maritime uses (fixed and mobile); search-and-rescue beacons; car alarms; radio astronomy 328.6–335.4 MHz Defense air, ground and maritime uses (fixed and mobile); search-and-rescue beacons; car alarms; radio astronomy 335.4–399.9 MHz Defense air, ground and maritime uses (fixed and mobile); search-and-rescue beacons; car alarms; radio astronomy 399.9–400.05 MHz Non-Voice Non-Geostationary Mobile Satellite Service (Little LEO) for data communications 400.05–400.15 MHz Standard frequency and time signal satellites (not used) 400.15–401 MHz Non-Voice Non-Geostationary Mobile Satellite Service (Little LEO) for data communications; meteorological aids and defense weather satellites 401–402 MHz Meteorological aids; weather balloons; science telemetry 402–406 MHz Meteorological aids; animal tracking; proposed for medical implants 406‐406.1 MHz Satellite-based search-and-rescue beacons 406.1–410 MHz Defense and other federal mobile and fixed radio 410–420 MHz Defense and other federal mobile and fixed radio; Space Research Service; airborne radar 420–450 MHz Defense and scientific radar and balloons; Amateur Radio Service 450–451 MHz Broadcast Auxiliary Services 451–454 MHz Private Mobile Radio Services 454–455 MHz General Aviation Air-Ground Radiotelephone Service; Paging and Radiotelephone Service 455–456 MHz Broadcast Auxiliary Services, proposed for Non-Voice Non-Geostationary Mobile Satellite Service (Little LEO) 456–459 MHz Private Mobile Radio Services 459–460 MHz General Aviation Air-Ground Radiotelephone Service; Paging and Radiotelephone Service, proposed for Non-Voice Non-Geostationary Mobile Satellite Service (Little LEO) 460–462.5375 MHz Private Mobile Radio Services 462.5375–462.7375 MHz General Mobile Radio Service (GMRS) and Family Radio Service (FRS) for personal communications [Page 352] 462.7375–467.5375 MHz Private Mobile Radio Services, including emergency medical telemetry 467.5375–467.7375 MHz General Mobile Radio Service (GMRS) and Family Radio Service (FRS) for personal communications 467.7375–470 MHz Private Mobile Radio Services, including emergency medical telemetry; weather satellites 470–512 MHz TV channels 14–20; biomedical telemetry 512–608 MHz TV channels 21–36; biomedical telemetry 608–614 MHz Radio astronomy; biomedical telemetry; formerly TV channel 37 614–746 MHz TV channels 38-59 746–764 MHz TV channels 60–62. Reallocated to special broadcasting, fixed and mobile services 764–776 MHz TV channels 63, 64. Reallocated to Private Mobile Radio Services for public safety use 776–794 MHz TV channels 65–67. Reallocated to special broadcasting, fixed and mobile services 794–806 MHz TV channels 68, 69. Reallocated to Private Mobile Radio Services for public safety use 806–821 MHz Specialized Mobile Radio Services; Private Mobile Radio Services 821–824 MHz Private Mobile Radio Services for public safety use 824–849 MHz Cellular Radiotelephone Service 849–851 MHz Commercial Aviation Air-Ground Systems 851–866 MHz Specialized Mobile Radio Services; Private Mobile Radio Services 866–869 MHz Private Mobile Radio Services for public safety use 869–894 MHz Cellular Radiotelephone Service 894–896 MHz Commercial Aviation Air-Ground Systems 896–901 MHz Specialized Mobile Radio 901–902 MHz Personal Communications Service (PCS)—Narrowband for advanced paging 902–928 MHz Defense radar; Location and Monitoring Service; amateur radio; Industrial, Scientific and Medical; unlicensed devices 9287ndash;929 MHz Multiple Address Systems 929–930 MHz Private Mobile Radio Services, especially paging 930–931 MHz Personal Communications Service (PCS)—Narrowband for advanced paging 931–932 MHz Paging and Radiotelephone Service, especially nationwide paging 932–935 MHz Multiple Address Systems; federal and nonfederal fixed microwave 935–940 MHz Specialized Mobile Radio 940–941 MHz Personal Communications Service (PCS)—Narrowband for advanced paging 941–942 MHz Fixed microwave 942–944 MHz Fixed microwave 944–960 MHz Broadcast Auxiliary Services; Multiple Address Systems; fixed microwave [Page 353] 960–1215 MHz Aerospace radar; defense communications 1215–1240 MHz Aerospace radar; synthetic aperture radar for earth sensing; global positioning system (GPS) navigation satellites 1240–1300 MHz Aerospace radar; Amateur Radio Service; thermotherapy 1300–1350 MHz Aerospace radar 1350–1400 MHz Aerospace radar; defense communications, remote control and nuclear alerting; earth sensing. 1385-1400 MHz to be reallocated to private sector 1400–1427 MHz Radio astronomy; satellite earth sensing. No transmissions permitted 1427–1435 MHz Defense air telemetry and fixed uses. To be reallocated to private sector 1435–1525 MHz Aerospace test telemetry; satellite audio broadcasting to foreign countries 1525–1544 MHz Satellite “L-band”: Geostationary Mobile Satellite Service 1544–1545 MHz Safety-related mobile satellite communications 1545–1559 MHz Geostationary Mobile Satellite Service 1559–1610 MHz Global positioning system (GPS) satellites, radio altimetry 1610–1610.6 MHz Non-Geostationary Mobile Satellite Service (Big LEO); radio altimetry 1610.6–1613.8 MHz Non-Geostationary Mobile Satellite Service (Big LEO); radio astronomy 1613.8–1626.5 MHz Non-Geostationary Mobile Satellite Service (Big LEO) 1626.5–1645.5 MHz Geostationary Mobile Satellite Service 1645.5–1646.5 MHz Safety-related mobile satellite communications 1646.5–1660.5 MHz Geostationary Mobile Satellite Service; radio astronomy 1660.5–1668.4 MHz Radio astronomy; no transmissions permitted 1668.4–1670 MHz Radio astronomy 1670–1690 MHz Weather satellites and balloons. 1670-1675 to be reallocated to private sector 1690–1700 MHz Weather satellites 1700–1710 MHz Weather satellites; fixed microwave 1710–1850 MHz Defense and other federal satellite, fixed, mobile, and aerospace uses; radio astronomy. 1710-1755 MHz to be reallocated to private sector 1850–1990 MHz Personal Communications Services (PCS)—Broadband; unlicensed PCS devices; fixed microwave 1990–2025 MHz Mobile Satellite Services; Broadcast Auxiliary Services; cable TV and local broadcast TV relay 2025–2110 MHz Broadcast Auxiliary Services; Space Research Service [Page 354] 2110–2150 MHz Broadcast Auxiliary Services; Space Research Service; fixed microwave; Emerging Technologies 2150–2160 MHz Multipoint Distribution Service 2160–2165 MHz Fixed microwave; Emerging Technologies 2165–2200 MHz Mobile Satellite Services; fixed microwave; Emerging Technologies 2200–2290 MHz Defense and science satellites and telemetry 2290–2300 MHz Space Research Service for deep space use 2300–2305 MHz No primary use. Amateur Radio secondary use 2305–2320 MHz Wireless Communications Service 2320–2345 MHz Satellite “S-band”: Satellite Digital Audio Radio Service 2345–2360 MHz Wireless Communications Service 2360–2390 MHz Aerospace testing; planetary radar. 2385–2390 MHz to be reallocated to private sector 2390–2400 MHz Amateur Radio Service; unlicensed Data-PCS 2400–2483.5 MHz Amateur Radio Service; unlicensed devices and Industrial, Medical equipment; fixed microwave. Portions available for other private sector and educational use 2483.5–2500 MHz Non-Geostationary Mobile Satellite Service (Big LEO) 2500–2690 MHz Multipoint Distribution Service; Instructional Television Fixed Service; satellite earth sensing 2690–2700 MHz Radio astronomy; satellite earth sensing. No transmissions permitted 2700–2900 MHz Defense and civil aerospace and weather radar 2900–3100 MHz Defense and maritime navigation radar 3.1–3.3 GHz Defense radar; satellite earth sensing 3.3–3.5 GHz Defense aerospace; Amateur Radio Service 3.5–3.6 GHz Defense radar 3.6–3.7 GHz Defense radar; data communications; Geostationary Fixed Satellite Service. 3.65–3.7 GHz to be reallocated to private sector 3.7–4.2 GHz Satellite “C-band”: Geostationary Fixed Satellite Service; fixed microwave 4.2–4.4 GHz Radio altimetry 4.4–4.5 GHz Defense aerospace; mobile and fixed uses; nuclear antiterrorism 4.5–4.66 GHz Defense, scientific aerospace, naval uses. 4.635-4.66 GHz reallocated to private sector 4.66–4.685 GHz General Wireless Communications Service 4.6857ndash;4.99 GHz Defense aerospace; mobile and fixed uses 4.99–5 GHz Radio astronomy. No transmissions permitted 5–5.25 GHz Aviation landing systems; missiles; weather and ocean radar. Unlicensed National Information Infrastructure 5.25–5.35 GHz Defense and weather radar; satellite earth sensing. Unlicensed National Information Infrastructure 5.35–5.65 GHz Defense and weather radar 5.65–5.85 GHz Defense radar; automatic door openers. Unlicensed National Information Infrastructure [Page 355]and other unlicensed devices; Amateur Radio Service 5.85–5.925 GHz Defense radar; Geostationary Fixed Satellite Service; Amateur Radio Service; unlicensed devices; Dedicated Short Range Communications 5.925–6.425 GHz Geostationary Fixed Satellite Service; fixed microwave 6.425–6.525 GHz Broadcast Auxiliary Services; TV relay; satellite feeder links 6.525–6.875 GHz Fixed microwave; radio astronomy 6.875–7.075 GHz Broadcast Auxiliary Services; audio satellite feeder links 7.0757–7.125 GHz Broadcast Auxiliary Services 7.1257–7.19 GHz Fixed microwave for aviation facilities 7.19–7.235 GHz Space Research Service for deep space use 7.235–7.9 GHz Fixed microwave for aviation facilities; weather satellites 7.9–8.025 GHz Satellite “X-band”: Defense satellites and fixed microwave; control of electrical power distribution 8.025–8.4 GHz Earth remote sensing satellites 8.4–8.45 GHz Space Research Service for deep space use 8.45–8.5 GHz Space Research Service 8.57ndash;9 GHz Defense and civil radar for navigation, weather and ocean study; weapon location; planetary radar 9–9.2 GHz Defense aerospace radar 9.2–9.3 GHz Maritime navigation and safety radar; control of unmanned air vehicles 9.3–9.5 GHz Maritime navigation and safety radar; weather radar 9.5–10 GHz Weather radar; control of unmanned air vehicles; satellite earth sensing 10–10.5 GHz Defense missile radar; weather and ocean radar; Amateur Radio. Proposed educational use 10.5–10.55 GHz Police speed radar; automatic door openers; alarms 10.55–10.6 GHz Fixed microwave 10.6–10.68 GHz Fixed microwave; satellite earth sensing 10.68–10.7 GHz Radio astronomy; weather study. No transmissions permitted 10.7–11.7 GHz Fixed microwave; Geostationary Fixed Satellite Service 11.7–12.2 GHz Satellite “Ku-band”: Direct-to-Home Fixed Satellite Service; Broadcast Auxiliary Service 12.2–12.7 GHz Direct Broadcast Satellite Service 12.7–13.25 GHz Broadcast Auxiliary Service; Cable Television Antenna Relay Service; fixed microwave [Page 356] 13.25–13.4 GHz Airborne navigation radar; Space Research Service 13.4–13.75 GHz Maritime radar; satellite altimetry for ocean study 13.75–14 GHz Geostationary Fixed Satellite Service; maritime radar, weather, ocean scientific radar; Space Shuttle radar; Space Research Service 14–14.5 GHz Geostationary Fixed Satellite Service; maritime, air navigation radar; Space Station 14.5–15.35 GHz Defense radar and microwave links; Space Research Service; aviation facility links 15.35–15.4 GHz Radio astronomy 15.47–15.7 GHz Mobile satellite links; aviation landing systems 15.7–17.2 GHz Aerospace and scientific radar 17.2–17.3 GHz Radar and satellite earth sensing 17.3–17.7 GHz Direct Broadcast Satellite Service 17.7–20.2 GHz Satellite “K-band”: Geostationary Fixed Satellite Service; Non-Geostationary Fixed Satellite Service; Mobile Satellite Service; weather satellites; defense signals intelligence satellites; fixed microwave 20.2–21.2 GHz Defense satellites 21.2–23.6 GHz Fixed microwave; satellite earth sensing; radio astronomy; intersatellite links 23.67–24 GHz Radio astronomy; satellite earth sensing. No transmissions permitted 24–24.05 GHz Amateur Radio Service; unlicensed fixed links; satellite earth sensing; Industrial, Scientific, Medical 24.05–24.25 GHz Police speed radar; security sensors; unlicensed fixed links 24.25–24.45 GHz Digital Electronic Message Service 24.45–24.65 GHz Airport surface detection radar 24.65–24.75 GHz Intersatellite and radar satellite links 24.75–25.05 GHz Aerospace radar. Proposed for future Direct Broadcast Satellites 25.05–25.25 GHz Digital Electronic Message Service. Proposed for future Direct Broadcast Satellites 25.25–27.5 GHz Space-to-space links for scientific missions; defense broadband on-site networks 27.5–29.5 GHz Local Multipoint Distribution Service; satellite “Ka-band”; Geostationary and Non-Geostationary Fixed and Mobile Satellite Services 29.5–30 GHz Geostationary and Non-Geostationary Fixed Satellite Services 30–31 GHz Defense signals intelligence satellites; radio astronomy 31–31.3 GHz Local Multipoint Distribution Service; fixed links for traffic control 31.3–31.8 GHz Satellite earth sensing. No transmissions permitted [Page 357] 31.8–32 GHz Aerospace navigation; deep space communications 32–33.4 GHz Intersatellite links; deep space communications 33.4–36 GHz Weather radar; satellite earth sensing; deep space communications; police radar 36–37 GHz Satellite earth sensing 37–37.5 GHz Proposed general commercial wireless services; manned space exploration; satellite earth sensing 37.5–38.6 GHz Proposed broadband satellite services and general commercial wireless services 38.67–40 GHz Broadband local exchange services 40–40.5 GHz Scientific and commercial satellite services; manned space exploration 40.5–41.5 GHz Proposed broadband satellite services and general commercial wireless services 41.5–42.5 GHz Proposed Licensed Millimeter Wave Service 42.5–43.5 GHz Radio astronomy 43.5–45.5 GHz Defense satellites 45.5–46.9 GHz Vehicle anticollision radar 46.9–47 GHz Proposed general commercial wireless services 477–47.2 GHz Amateur Radio Service 47.2–50.2 GHz Point-to-multipoint broadband services; stratospheric platforms; Non-Geostationary and Geostationary Fixed Satellite Services; radio astronomy 50.2–50.4 GHz Satellite earth sensing; no transmissions permitted 50.4–51.4 GHz Defense satellites 51.4–59 GHz Satellite earth sensing; proposed for intersatellite links 59–64 GHz Unlicensed communications; industrial safety and control; satellite earth sensing; proposed for intersatellite links; Industrial, Scientific, Medical 64–66 GHz Satellite earth sensing 66–71 GHz Mobile Satellite Services; aerospace radar 71–74 GHz Proposed Licensed Millimeter Wave Service; unlicensed communications devices 74–75.5 GHz Fixed, Fixed Satellite and Mobile Services 75.5–76 GHz Amateur Radio Service 76–77 GHz Vehicle anticollision radar; Amateur Radio 77–81 GHz Amateur Radio Service; weather radar; microscopy 81–84 GHz Fixed and Mobile Satellite Services 84–86 GHz Proposed Licensed Millimeter Wave Service; satellite earth sensing 86–92 GHz Radio astronomy; satellite earth sensing; videography 92–95 GHz Proposed vehicle anticollision radar; synthetic vision systems; radio astronomy 95–100 GHz Proposed vehicle anticollision radar; weather radar 100–102 GHz Satellite earth sensing; radio astronomy [Page 358] 102–105 GHz Proposed Licensed Millimeter Wave Service; unlicensed communications devices 105–116 GHz Satellite earth sensing; radio astronomy 116–134 GHz Proposed Licensed Millimeter Wave Service; unlicensed devices; satellite earth sensing 134–142 GHz Proposed vehicle anticollision radar 142–149 GHz Amateur Radio Service; satellite earth sensing 149–150 GHz Fixed, Fixed Satellite and Mobile Satellite Services 150–151 GHz Satellite earth sensing 151–164 GHz Proposed Licensed Millimeter Wave Service; unlicensed devices; Big Bang cosmic radiation 164–168 GHz Satellite earth sensing; radio astronomy. No transmissions permitted 168–170 GHz Fixed and Mobile Services 170–174.5 GHz Fixed and Mobile Services; intersatellite links 174.5–176.5 GHz Satellite earth sensing 176.5–182 GHz Fixed and Mobile Services; intersatellite links 182–185 GHz Satellite earth sensing; radio astronomy. No transmissions permitted 185–190 GHz Fixed and Mobile Services; intersatellite links 190–200 GHz Mobile, Mobile Satellite, Radionavigation and Radionavigation; Satellite Services 200–202 GHz Satellite earth sensing 202–217 GHz Fixed, Fixed Satellite and Mobile Services 217–231 GHz Satellite earth sensing; radio astronomy. No transmissions permitted 231–235 GHz Fixed, Fixed Satellite and Mobile Services 235–238 GHz Satellite earth sensing 238–241 GHz Fixed, Fixed Satellite and Mobile Services 241–250 GHz Amateur Radio Service; Industrial, Scientific, Medical; radar 250–252 GHz Satellite earth sensing 252–265 GHz Mobile, Mobile Satellite, Radionavigation and Radionavigation; Satellite Services 265–275 GHz Fixed, Fixed Satellite and Mobile Services; radio astronomy 275–300 GHz Fixed and Mobile ServicesSOURCE: Manual of Regulations and Procedures for Federal Radio Frequency Management, September 1995 edition, Washington, DC: U.S. Department of Commerce, National Telecommunications and Information Administration (NTIA); “U.S. Radio Spectrum Allocations and Uses (30 MHz-300 GHz)” [Poster], 1998, America's Airwaves, Bennett Z. Kobb.
a. For information on this servisce and others in the appendix, see the Federal Communications Commission's (FCC) Web site (http://www.fcc.gov). The FCC's Wireless Telecommunications Bureau (http://wireless.fcc.gov) handles nearly all FCC domestic wireless telecommunications programs and policies. Wireless communications services include Amateur, Cellular, Paging, Broadband PCS, and Public Safety.
Ad keying The practice of linking Web page banner advertisements to particular search keywords, including trademarked terms.
AM (amplitude modulation) A process by which an audio signal modulates the amplitude of a carrier. In AM radio, the carrier consists of a sine wave whose amplitude is made to copy the variations of an audio source.
Analog bandwidth The frequency range between the lowest and highest frequencies used to transmit analog radio signals. For example, a standard commercial AM radio channel in the United States uses a bandwidth of 9 kHz, while a standard analog television signal uses 6 MHz. Bandwidth is measured in cycles per second (cps; otherwise known as hertz, Hz).
B2B Business-to-business transactions on the Web.
B2C Business-to-consumer transactions on the Web.
Binary code A communication system using two symbols (e.g., 1s and 0s) to carry information. Binary code can carry any type of information including text, images, and sound.
Bits per second (bps) The fundamental measure of digital bandwidth. Bit is short for binary digit, the smallest quantity of information that can be carried in digital code. In numerical form, a bit consists of a single digit, either a 1 or a 0; in an electrical circuit, a bit is the state of being either on or off—in other words, the circuit is either closed, allowing electricity to flow, or open, stopping the flow of electricity.
Boolean algebra A method of logical deduction invented by English mathematician George Boole. Boole's system uses three basic constructs to make logical inferences and perform mathematical calculation with symbols and numbers, respectively, called AND, OR, and NOT gates. Boole's gates are binary in nature because they categorize statements as either true or false.
Broadband Information channels that can handle data streams requiring large bandwidth. A single AM radio channel, for example, uses 9 kHz of radio spectrum, whereas a single analog television channel uses 6 MHz. The television channel requires more space because it has to pass more information. Channels are therefore either narrow or broad, depending [Page 360]on how much information they can pass. In general, voice channels require less bandwidth than those carrying sound, pictures, and color information. Internet traffic featuring television-quality streaming video would therefore be considered a broadband service.
Carrier That part of any communication system used for moving intelligence from one point to another (e.g., in a radio signal, the carrier is the high-frequency sine wave on which audio signals are imposed; in a written letter, the carrier is the paper on which a message is written and the ink used to do the writing).
Clipper Chip An integrated circuit designed to allow federal agencies to access computer systems to decrypt what is stored for the sake of security. One justification for the Clipper Chip is to fight terrorism.
Code Prior agreements between senders and receivers about what various signals will mean. All methods of communicating rely on codes. Successful communication relies on both unimpeded reception of a message's physical component and accurate decoding of the pattern of information (or intelligence) it contains.
Cookie A tiny file placed on a user's computer whenever a particular Web page is accessed. Cookies typically enable Web sites and Web site advertisers to keep track of the pages that viewers access. To be “cookied” means to be tracked online as a consumer, and perhaps targeted for future marketing campaigns.
Cyberspace An umbrella term referring to the digital telecommunication and broadcast communication infrastructures enabling users to create, store, manipulate, transmit, retrieve, and share information in the form of text, data, images, and sound, including motion visuals.
Cybersquatting The act of registering domain names without the intent to use them, but rather to sell them.
Data mining The act of digging into old databases and extracting the rules of operation as well as data for that business.
Dialogic technologies Technologies that allow for information sharing and interaction between people via the telephone, teleconferences, voice mail, cable and satellite television, point-to-point microwave radio communication, electronic blackboards, computer instruction, and more recently, computer-mediated communication such as e-mail, bulletin boards, and computer instant messaging and conferencing. Dialogic systems may be either synchronous (interaction takes place in real time) or asynchronous (interaction takes place at different times and at users' convenience).
[Page 361]Digital bandwidth A measure of a digital medium's ability to transmit information from one point to another in a given amount of time, usually expressed in terms of bps (bits per second) transmitted.
Dilution of trademark The act of diminishing the value of a trademark held by another. Trademark dilution claims in court reflect a clash between the rights of a trademark holder and a domain name registrant. Two types of trademark dilution are blurring, use of a trademark on a dissimilar product, and tarnishment, association of a trademark with an inferior or unwholesome product or service.
Distance learning Conducting education and providing instruction in settings beyond the normal face-to-face classroom through the use of telecommunication technologies and audiovisual media.
Domain names An Internet address that locates a particular server hosting a Web site on the Internet, much like a street address that is used to locate a person's residence. The six “top level” domain suffixes are .com = commercial; .net = network; .org = organization; .edu = education; .mil = military; and .gov = government (there are also designations for countries, e.g., .ca for Canada, .th for Thailand).
http://Dot.com 1. A suffix used with a URL (universal resource locator) to direct Internet traffic to the intended destination. 2. Any company conducting its business either exclusively or largely through the use of a Web site. Examples in e-commerce include http://Amazon.com and http://Travelocity.com.
E-commerce (electronic commerce) The use of electronic communication technologies to conduct business, including business-to-business (B2B) and business-to-consumer (B2C) interactions. The purposes of the interactions may vary from advertising to purchasing to account and inventory management functions.
Encode The act of expressing or inputting information, externalizing it in some form that can be shared by consumers or users. Writing a letter, making a speech, and using a computer keyboard for data entry are all forms of encoding.
Fiber-optic cable A communication transmission technology that uses flexible glass fiber in place of copper or aluminum wire or cable, and light pulses in place of electrical signals, to move digital information from one point to another. Signals through fiber-optic cable may be encoded using either a laser light or light-emitting diode (LED) and are decoded by a photodiode at the receiving end.
Flaming A practice in which persons use aggressive and inflammatory language on the Internet.
[Page 362]FM (frequency modulation) A process by which an audio signal modulates the frequency of a carrier. FM radio is called such because it is the frequency, not the amplitude, of the carrier wave that is changed by an audio source. FM is less subject to noise, static, and interference than AM, making it a desirable alternative for functions requiring greater fidelity and sound quality (i.e., radio broadcasts of symphonic music).
Frames Multiple, independently scrollable regions on a Web page.
Hertz (Hz) A synonym for cycles per second (cps), named for the German scientist Heinrich Hertz, who in 1887 demonstrated that electromagnetic waves could be propagated and detected amid other waves using oscillating circuits.
Hypertext Markup Language (HTML) A nonproprietary publishing language for the World Wide Web. Special tags, denoted in brackets, are used to mark text to be displayed in a particular way on a Web page.
Instructional technologies (IT) All the available means used to create, store, transmit, retrieve, and manipulate information for training and/or educational purposes (these can include computer and telephone networks, video teleconferencing, e-mail, even correspondence courses via the traditional postal service).
Intellectual property Nonphysical material and content created by thought and protected by copyright laws as recognized by the United States and other governments. Providing intellectual property rights acts as an incentive to individuals to create new products, processes, or works of art.
Legacy programs Computer databases and operating systems that have been outmoded by newer versions but that are still in use on mainframe and older computer systems and are in need of upgrading or replacement. Legacy work is the upgrading of computer databases or facilities for private corporations that need to make a transition, often from mainframe storage to PC platforms, without losing any data.
Link A highlighted entry (usually a word or phrase) on a Web page that, when clicked, permits seamless and rapid navigation from that Web page to another.
Local area network (LAN) An interconnection of computer and telephone systems linking a number of users in an area, usually within a company, to provide faster exchange of information than would otherwise be possible using the public switched telephone network.
Meta-tag A hidden HTML code that provides information about a Web page, such as which keywords represent the Web page's content and who created the page. Many search engines use this information.
[Page 363]Microwave relay A wireless communication facility that uses radio energy in the GHz range to send messages from point to point. Radio transmission in the form of microwaves is used to carry broadcast signals, telephone traffic, and a myriad of satellite and mobile and fixed radio services in the United States. Microwave radio energy must follow a line-of-sight path; it is blocked by physical obstructions.
Modem The first device built for sending computer data over analog phone lines by converting digital signals into analog sound and vice versa. The term modem stands for modulator-demodulator. When placed between a computer terminal and a telephone line, it produces tones from carrier signals modulated by binary code, performing translation functions between them.
Modulate To vary some aspect of a communication medium or carrier in order for it to contain a message. Some modulation (variation or change) is required to impose a pattern of intelligence on any medium.
Multimedia communication Content featuring voice, text, data, images, and/or motion visuals.
Multiplexing The use of a single transmission channel to carry multiple signals.
Multiuser domain (MUD) An interactive, multiplayer game played on the Internet.
Multiuser domain, object-oriented (MOO) An object-oriented MUD.
Multiuser shared hallucination (MUSH) A type of MUD in which the players themselves create new objects, construct new rooms, and so on.
Netiquette The rules of etiquette on the Internet, such as guidelines for posting messages to online services.
Packet switching A method of transmitting digital information by sending it out in small bundles or units independent from one another and then reassembling them into their proper order after they are received at their destination.
Personal communication service (PCS) A wireless digital technology service using beepers, cellular phones, and data and paging devices to deliver messages intended for individual users. Most recently, wireless Internet is becoming another PCS The PCS band is that portion of the radio spectrum where cellular telephones and other PCS devices operate.
Personal digital assistant (PDA) A device, such as the Palm Pilot, used for information storage and retrieval. As greater convergence of digital [Page 364]devices continues, devices like cell phones and PDAs will become more and more indistinguishable from one another.
Public switched telephone network (PSTN) All the network infrastructure used to provide seamless telephone service to the public, including telephone instruments, wire and cable connections, cellular technology, fiber-optic lines, satellites designated for carrying telephone traffic, exchange offices, and so on.
Radio frequency (RF) carrier Any high-frequency radio transmission suitable for radio transmission. Before sound waves can be transmitted to distant points without wires, they must first be transformed into an electrical signal and then superimposed onto an RF carrier. The RF carrier is created with an oscillator, an electronic circuit that produces a sine wave at a specific frequency. The RF carrier, after being modulated by the audio signal, is then propagated into space at the speed of light. This is the essence of radio and television broadcasting.
Radio technologies Technologies that harness natural qualities of electricity and electromagnetic radiation to transmit sound, voice-modulated audio signals.
Radio waves Electromagnetic radiation that carries radio frequencies—the physical phenomena that make broadcasting possible. At the simplest level, radio waves can be generated by rotating a loop of copper wire in a magnetic field. Such rotation induces an electric current in the wire. As the wire passes through each full rotation, the intensity and direction of the flow of electrons vary in an orderly pattern called a sine wave. Sine waves produced by continuous rotation feature several characteristics, including a frequency, the number of cycles per second; a period, the time it takes for one cycle to occur; an amplitude, the magnitude of the voltage in the wire; a wavelength, the length of one cycle in meters; and a phase, the difference between the same points on different waves. Radio waves travel at the speed of light, about 186,000 miles per second, or 300,000,000 meters per second.
Satellite Wireless communication facilities in geosynchronous earth orbit that use radio energy to transfer messages from point to point. Satellite technology enables microwave signals to cross the ocean. By placing satellites 22,300 miles above the equator, they enter a geosynchronous orbit, meaning that they take 24 hours to make one revolution of the earth, thereby staying above the same spot on earth at all times. Radio transmission between a satellite and a ground station is therefore constant and reliable when the satellite maintains the same position relative to the earth.
[Page 365]Search engine A program that searches documents on the Web for specified keywords. Search engine is a general class of programs, but the term is often used to describe systems such as Alta Vista and Excite that allow users to search for information and files.
Spammers Entities, colloquially known as “spammers,” that e-mail unsolicited advertisements in mass sendings. The manner in which the Internet transmits data precludes easy identification of those spammers, ensuring that the geographic source of those entities may remain hidden or disguised.
Throughput A measure of the amount of bandwidth carrying meaningful data compared to the overall information capacity of a device or transmission line.
Transduction The process of transforming sound waves into electrical audio signals. (The telephone is therefore a transducer. At the receiving end of a telephone, the electrical pattern is transformed back into sound.)
Transmissional technologies Technologies that engage users in noninter-active modalities such as watching television or listening to the radio.
Universal resource locator (URL) The name for Internet Web locations. URLs contain several parts. The first section, the http://, designates which Internet protocol is to be used. The next section, the www, designates what Internet resource is being requested. The last section, the .org or .net and so on, designates the Web server to be reached and locates a specific home page or document on the Internet. URLs can be thought of as addresses.
Virtual reality (VR) Mediated simulation of reality such as role-playing games (RPGs) and 3-D simulation technology. VR technologies create a feeling of immersion: Viewers or players feel as if they are inside the virtual space, as if they are surrounded by it, similar to the way the natural world surrounds us in real life.
Vocoder The device, in a digital cell phone, that takes the audio signal produced by the voice and converts it into a digital bit stream through a process of sampling. It is the synthetic speech signal that is then transmitted over the telephone network.[Page 366]
References[Page 367]1993). The contribution of interactivity and two-way video to successful distance learning applications: A literature review and strategic positioning. Columbus: Ohio State University, Center for Advanced Study in Telecommunications., & (1978). Organizational learning: A theory of action perspective. Reading, MA: Addison-Wesley., & (1984). Bit by bit: An illustrated history of computers. New York: Ticknor and Fields.(2001, January 11). Quantum computers: Using light instead of moving atoms. New York Times.(1996, May). The school design at Brewster Academy: Technology serving teaching and learning. T.H.E. Journal, 23(10), 72–79. Retrieved from http://www.thejournal.com/past/may/65bain.html(1988). Monologue, dialogue, and telelogue: Comparing an emergent form of communication with traditional forms. In R. P.Hawkins, J. M.Wiemann, & S.Pingree (Eds.), Advancing communication science: Merging mass and interpersonal processes (pp. 135–161). Newbury Park, CA: Sage., & (1994, March). The economy of ideas: Patents and copyrights in the digital age. Wired, pp. 84–90.(1979). Ideology and everyday life. Ann Arbor: University of Michigan Press., & (2000). Engines of inquiry: A practical guide for using technology to teach American culture. Washington, DC: Georgetown University, Center for Electronic Projects in American Cultural Studies.(1979). Communication technology–For better or for worse? Harvard Business Review, 57, 20.(1992). Redesigning classroom activities for the future. Educational Technology, pp. 7–13.(1979). Ego psychology II–Psychoanalytic developmental psychology. New York: Columbia University Press., & (1985). Role development–A systematic approach to building basic skills. San Marcos, TX: Adam Blatner, M.D.(1999, July/August). The future of learning: An interview with Alfred Bork. Educom Review, 34(4), 24–30.(Boyer Commission on Educating Undergraduates. (1998). Reinventing undergraduate education: A blueprint for America's research universities. Retrieved from http://notes.cc.sunysb.edu/Pres/boyer.nsf/images/$File/boyer.txt1993). Schools of thought: How the politics of literacy shape thinking in the classroom. San Francisco: Jossey-Bass.(2000). Strategy application disorder: The role of the frontal lobes in human multitasking. Psychological Research, 63((3–4)), 279–288.([Page 368]2001, January 5). How to handle cyber-sloth in academe. Chronicle Review. Retrieved from http://chronicle.com(1999, October). Distance-learning group blends offerings of 2- and 4-year colleges. Chronicle of Higher Education, 46(7), A37.(2000, a, January). Distance-education company woos bastions of the liberal arts. Chronicle of Higher Education, 46(21), A43.(2000, b, February). Logging in with Ray Steele: A distance-education advocate calls for better financing for such programs. Chronicle of Higher Education, 46(22), A50.(1999, November). Towards shared control of shared education. Chronicle of Higher Education, 46(13), B8.(1996, November). An Rx for 20/20 vision: Vision planning and education. T.H.E. Journal, 24(4), 106–110. Retrieved from http://www.thejournal.com/past/nov/1196feat3.html, & (1995, April). Intellectual honesty in the era of computing. T.H.E. Journal, 22(10), 86–88. Retrieved from http://www.thejournal.com/past/april.54con.html(1995). The mind object. Northvale, NJ: Aronson., & (1997, November). The leadership role in making the technology connection. T.H.E. Journal, 25(4), 58–62. Retrieved from http://www.thejournal.com/past/Nov/1197/feat4.html(1996). Copyright in the digital age [Talk given at the San Francisco Public Library]. Retrieved from http://www.kcoyle.net/(1986). Teachers and machines: The classroom use of technology since 1920. New York: Teachers College Press.(1994). Today's students, yesterday's schooling. The Executive Educator, pp. 18–21.(1997, December). Enriching the teaching/learning process with computers: Spreading the word on a college campus. T.H.E. Journal, 25(5), 52–54. Retrieved from http://www.thejournal.com/past/DEC/1297feat2.html(1983). Inside the chip. London: Usborne., & (1999). Blur: The speed of change in the connected economy. New York: Time Warner., & (1989). Theories of mass communication (, & (5th ed.). New York: Longman.1938). Experience and education. New York: Collier.(2000). Democracy and education. Philadelphia: Pennsylvania State University, Electronic Classics Series. Retrieved from http://www.hn.psu.edu/faculty/jmanis/johndewey/demded.pdf(Distance-learning forecast calls for megaclasses. (1999, December 10). Chronicle of Higher Education, 46, A47.1996). Broadcasting/cable and beyond: An introduction to modern electronic media (, , & (3rd ed.). New York: McGraw-Hill.2000). Broadcasting, cable, the Internet, and beyond: An introduction to modern electronic media (, , & (4th ed.). New York: McGraw-Hill.1992). Information law. In WAltes, E.Dommering, PHugenholtz, & J.Kabel (Eds.), Information law towards the 21st century (pp. 3–11). Boston: Kluwer Law and Taxation Publishers.(1993). Post-capitalist society. New York: HarperCollins.([Page 369]2000, February). A choice of transformations for the 21st-century university. Chronicle of Higher Education, 46(22), B6.(2000, March-April). The virtualizing of education. The Futurist, 34(2), 34–38.(1998). Release 2.1 A Design for Living in the Digital AgeNew York: Broadway Books.(1999, September). South Africa's GAELIC; The Gauteng and Environs Library Consortium. Information Technology and Libraries, 18(3), 123–128.(1991, Fall/Winter). Gauging the educational value of a college's investment technology. Educom Review, 24(4), 24–28.(1995, July). New technology, old trap. Educom Review, 30(5), 41–43.(1997). Asking the right question: What does research tell us about technology and higher education? Change Magazine, 27(2), 20–27.(2000, November 6). Unlike viruses, bacteria find a welcome in the world of computing. New York Times.(1979). The printing press as an agent of change. Cambridge, UK: Cambridge University Press.(1950). Childhood and society. New York: Norton.(1992). America calling: A social history of the telephone to 1940. Berkeley: University of California Press.(2000, August 14). Internet is more than just fun for womenNew York Times, Section C, p. 4.(2000, January). VAR serves society with education, libraries solutions. Computer Reseller News, 87(9), 61–62.(1959). The magic years. New York: Scribner.(1961). Civilization and its discontents. New York: Norton.(1993). Pedagogy of the oppressed. New York: Continuum.(2001). Cyberpassion: E-rotic transference on the Internet. Psychoanalytic Quarterly, 70(40), 719–737.(Gallup national survey in conjunction with CNN, USA Today, and the National Science Foundation. (1997). Teens and technology. Retrieved from http://www.nsf.gov/od/lpa/nstw/teenov.htm2000, February). Maximizing the on-line education experience. Health Management Technology, 21(2), 67–68.(1991). The unschooled mind: How children think and how schools should teach. New York: Basic Books.(2000, June 12). Is AOL worse than TV? New York Magazine.(1999). Business @ the speed of thought: Using a digital nervous system. New York: Warner Books., with (1996, March/April). Making the most of a slow revolution. Change, p. 1023.(1989). Microcosm: The quantum revolution in economics and technology. New York: Simon & Schuster.(1992). Reproduction of protected works for university research or teaching. Journal of the Copyright Society of the USA, 39, 181–223.(1998). Intellectual property: The rights of faculty as creators and users. Academe, 84(3), 14–18.(1999). The elegant universe: Super strings, hidden dimensions, and the quest for the ultimate theory. New York: Norton.(1997). The growth of the mind. Reading, MA: Addison-Wesley.(2000, February). A governor's tech crusade. Upside, 12(2), 124–132.([Page 370]Grunwald Associates. (2000, June 7). Children, families and the Internet. Burlingame, CA: Author. Retrieved from http://www.grunwald.com/survey/survey_content.html2000, May 25). What do you mean, “It's just like a real dog?”New York Times.(1999). How we become post human: Virtual bodes in cybernetics (Literature and Informatics). Chicago: University of Chicago Press.(1994). Broadcasting in America (, , & (7th ed.). Boston: Houghton Mifflin.1998). Failure to connect. New York: Simon & Schuster.(1996). Books in time. In G.Nunberg & E.Eco (Eds.), The future of the book (pp. 21–36). Berkeley: University of California Press.(2000, March 21). Plugged in: Web companies give educator a lesson. Retrieved from http://news.lycos.com/headlines/Technology/Internet/article.asp(1995). Theory and practice of distance education. London: Routledge.(1950). Homo ludens. Boston: Beacon.(1996). The state of disunion: 1996 survey of American political culture (postmodernity project). Charlottesville: University of Virginia., & (1951). The bias of communication. Toronto: University of Toronto Press.(IT spending boom forecast for colleges. (1999, September). Business Communications Review, 29(9), 8.1995). Plugging in. Oakbrook, IL: North Central Regional Educational Laboratory., , , & (2000). Increasing identification of psychosocial problems: 1979–1996. Pediatrics, pp. 105–106, 1313–1321. Retrieved from http://www.Pediatrics.org, , , , & (1995). Open learning courses for adults. Englewood Cliffs, NJ: Educational Technology Publications.(2000, September 25). Logging on young, and paying later. U.S. News & World Report. Retrieved from http://www.usnews.com/usnews/issue/000925/nycu/computers.b1.htm(1999). Exploring the role of the anterior prefrontal cortex in human cognition. Nature, 399(6732)., , , , & (1998). Internet paradox: A social technology that reduces social involvement and psychological well-being?American Psychologist, pp. 53–59, 1017–1031. Retrieved from http://www.apa.org/journals/amp/amp5391017.html, , , , , & (1999). The age of spiritual machines: When computers exceed human intelligence. New York: Viking.(1995). What's ahead in patents and trademarks? Bulletin of the American Society for Information Science, 21, 26–29.(1982). Clinical aspects of child development. Philadelphia: Lea & Febiger.(1993). The protean self–Human resilience in an age of fragmentation. New York: Basic Books.(1998). The race for bandwidth: understanding data transmissionMicrosoft Press: Redmond, WA.(1997, February). Testing multimedia in the community college classroom. THE. Journal, 24(8), 78–81. Retrieved from http://www.thejournal.com/past/FEB/0297feat1.html, & (1986). Beyond narcissism in American culture of the 1980's. Cultural Anthropology., & (Fall, [Page 371]1971). Separation–Individuation; essays in honor of Margaret S. Mahler (J. B.McDevitt & C. F.Settlage, Eds.). New York: International Universities Press.(1998, May). Not-so-distant competitors: How new providers are remaking the postsecondary marketplace. AAHE Bulletin. Retrieved from http://www.aah.org/Bulletn/Not-So-Distant%20Competitors.htm(1999). The art and symbols of ice age man. In D.Crowley & P.Heyer (Eds.), Communication in history: Technology, culture, society ((3rd ed.). New York: Longman.1992). Seeing, redefining, and supporting student learning. In H.Marshall (Ed.), Redefining student learning (pp. 1–32). Norwood, NJ: Ablex.(1996). Community leader perspectives on education, assessment, and communication technology (Doctoral dissertation, Ohio State University, 1996). Dissertation Abstracts International, 57(07A), AAG96–39302.(1997). Gateway or gatekeeper: Implications of copyright and digitalization on education. Communication Education, 46, 141–157., & (1999, November). To do is to empower: Relationships between experience with networked computing, efficacy, and attitudes toward life online. Paper presented at the National Communication Association Convention, Chicago., , , & (1995, -1996). Engaging the faculty in information technologies training. Journal of Staff, Program & Organizational Development, 13(2), 61–62, 65., & (1964). Understanding media: The extensions of man. New York: McGraw-Hill.(1967). The medium is the massage. New York: Bantam., & (1991). Mass communication theory ((2nd ed.). London: Sage.1994). Using technology to advance educational goals. In B.Means (Ed.), Technology and education reform (pp. 1–22). San Francisco: Jossey-Bass.(1985). No sense of place: The impact of electronic media on social behavior. New York: Oxford University Press.(1990). Introduction: Background and overview of contemporary American distance education. In M.Moore (Ed.), Contemporary issues in American distance education (pp. xii–xxvi). Oxford, UK: Pergamon.(2000, January 3). Learn at a distance. Information Week, pp. 75–78. Retrieved from http://www.informationweek.com/767/learn.htm(National Center for Education Statistics. (1997). Distance education in higher education institutions. (Document No. NCES 98–062). Washington, DC: U.S. Department of Education.National Center for Education Statistics. (1998). Distance education in higher education institutions. Retrieved from http://nces.ed.gov/pubs98/distance/National Center for Education Statistics. (1999). Distance education at postsecondary education institutions: 1997–1998. (Document No. NCES 2000–013). Washington, DC: U.S. Department of Education.2000, February). The Internet Study. Stanford, CA: Stanford Institute for the Quantitative Study of Society. Available: http://www.stanford.edu/group/siqss/press_Release/Preliminary_Report.pdf, & (NII Task Force Issues Preliminary Report. (1994). Bulletin of the American Society for Information Science, 20, 2–4.1998). Introduction to telephones and telephone systems. Boston: Artech House.([Page 372]1995). The knowledge-creating company. New York: Oxford University Press., & (Nunberg, G., & Eco, U. (Eds.). (1996). The future of the book. Berkeley: University of California Press.1974). Introduction. In D.Olsen (Ed.), Media and symbols: The forms of expression, communication, and education. Chicago: University of Chicago Press.(1997). The computer delusion [Online version]. Atlantic Monthly, pp. 45–62. Retrieved from http://www.theatlantic.com/issues/97jul/computer.htm(1994). An integration/inservice model that works. T.H.E. Journal, 21(9), 60–62.(2000, February). A distance learning reality check. Information Today, 17(2), 30.(1992). School's out. New York: Avon.(1999). Code: the hidden language of computer hardware and software. Redmond, WA: Microsoft.(1971). The construction of reality in the child. New York: Ballantine.(1969). The psychology of the child. New York: Basic Books., & (1994). The end of bureaucracy and rise of the intelligent organization. San Francisco: Berrett-Koehler., & (1986). Amusing ourselves to death: Public discourse in the age of show business. New York: Penguin.(1992). Technopoly. New York: Knopf.(1988). Interactivity: From new media to communication. In R. P.Hawkins, J. M.Wiemann, & S.Pingree (Eds.), Advancing communication science: Merging mass and interpersonal processes (pp. 110–134). Newbury Park, CA: Sage.(1995, May). Distance education as communication process: Transmission vs. dialogue in higher education. Paper presented at the 45th annual conference of the International Communication Association, Albuquerque, NM., , & (1999, November). Kids and media at the new millennium (Henry J. Kaiser Family Foundation Publications No. kff 1536, No. kff 1537, pp. 1–89). Menlo Park, CA: Henry J. Kaiser Family Foundation. Retrieved from http://www.kff.org, , , & (2000, February 17). Study shows Internet use stunts social growth. Stanford study.(1997). Spirit of the Web: The age of information from telegraph to Internet. Toronto: Somerville House.(1998). A psychoanalysis for our time: Exploring the blindness of the seeing I. New York: New York University Press.(1999). The no significant difference phenomenon ((5th ed.). Montgomery, AL: International Distance Education Certification Center.1997, January). Of mind and media: How culture's symbolic forms affect learning and thinking. Phi Delta Kappan, 79, 375–380.(1996). The copyright grab. Wired, pp. 134–138, 188–191.(1994). From culture to information and back again: Commoditization as a route to knowledge. Critical Studies in Mass Communication, 11, 93–115.(1996). Information warfare: Cyberterrorism–Protecting your personal security in the electronic age ((2nd ed.). New York: Thunder's Mouth Press.1997). Plugged in, spaced out, and turned on: Electronic entertainment and moral mindfields. Journal of Education, 179(3), 17–32.([Page 373]1990). Education and communication. In D.Garrison & D.Shale (Eds.), Education at a distance (pp. 41–52). Malabar, FL: Krieger., & (1938). A symbolic analysis of relay and switching circuits. In The transactions of the American Institute of Electrical Engineers (Vol. 57, Paper No. 38–80). American Institute of Electrical Engineers (AIEE).(1997, September). The Boulder Valley Internet Project: Lessons learned. T.H.E. Journal, 25(2), 68, 70.(1990). Improving pilot efficiency in the age of the glass cockpit: Designing intelligent software interfaces for the military aviation setting. Dayton, OH: U.S. Air Force Office of Scientific Research, Wright Patterson Air Force Base.(1997). Video production handbook. Boston: Houghton Mifflin.(1997). Designing organizations for an information-rich world. In D.Lamberton (Ed.), The economics of communication and information. Cheltenham, UK: Edward Elgar.(1998). The condition of education (Indicator 37: Homework and television viewing. Publication No. 98013). Washington, DC: National Center for Education Statistics. Retrieved from http://nces.ed.gov, & (1994). The Internet as catalyst for a paradigm shift. The Internet Business Journal, 2(4–5), 30–34.(1959). Mirrors and masks: The search for identity. Glencoe, IL: Free Press.(2000). The impact of home computer use on children's activities and development. The Future of Children–Children and Computer Technology, 10(2), 123–144., , , & (1996). The digital economy: Promise and peril in the age of networked intelligence. New York: McGraw-Hill.(1998). Growing up digital: The rise of the Net generation. New York: McGraw-Hill.(T.H.E. Journal. (1998). Volume 25.1992). Computer acquisition: A longitudinal study of the influence of high computer access on students thinking, learning, and interactions. Apple Classrooms of Tomorrow. (ERIC Document Reproduction Service No. ED354856).(1993). Teaching thinking dispositions: From transmission to enculturation. Theory Into Practice, 32, 147–153., , & (1995). Life on the screen: Identity in the age of the Internet. New York: Simon & Schuster.(U.S. Web-Based Education Commission. (2000). The power of the Internet for learning: Moving from promise to practice. Retrieved from http://interact.hpcnet.org/webcommission/index.htm1996). The matrix (script). Retrieved from http://www.screentalk.org/moviescripts/The%20Matrix.pdf, & (1999). The psychology of the Internet. New York: Cambridge University Press.(1993). Computer telephone integration. Boston: Artech House.(1992). Interpersonal effects in computer-mediated interaction: A relational perspective. Communication Research, 19(1), 52–90.(2000). Children and computers: New technology–Old concerns. The Future of Children–Children and Computer Technology, 10(2), 31–43., & (1998). Understanding cellular radio. Boston: Artech House.([Page 374]1993). Distance education: A practical guide. Englewood Cliffs, NJ: Educational Technology Publications.(1991). Educational technology: Initiative for change. Educational Media and Technology Yearbook, 17, 5–17., & (2000, January). Latest tool book disappoints. InfoWorld, 22(2), 43.(1996, November). Teacher-centered staff development for integrating technology into classrooms. T.H.E. Journal, 24(4), 88–91.(1997, October 3). Rethinking the role of the professor in an age of high-tech tools. Chronicle of Higher Education, 44, A26–A28.(1984). In the age of the smart machine: The future of work and power. New York: Basic Books.(
Further Readings[Page 375]Artificial IntelligenceCan robots rule the world? Not yet. (2000, September 12). New York Times.An electronic circuit that draws its inspiration from life. (2000, June 29). New York Times.1999, August 3). A man, a plan, and a robot that makes eye contact. New York Times. Retrieved August 3, 1999, from http://www.nytimes.com/library/national/science/080399sci-artficial-intelligence.htm(Broadcasting and Cybermedia1998, August 24). FCC wants HDTV glitch solved soon. New York Times. Retrieved August 24, 1998, from http://www.nytimes.com/library/tech/98/08/biztech/articles/24fcc.html(1999, October 11). Stations challenge digital-TV standard. New York Times. Retrieved October 11, 1999, from http://www.nytimes.com/library/tech/99/10/biztech/articles/11dtv.htm(1999, May 17). TV networks scramble to deal with era of new media. New York Times. Retrieved May 17, 1999, from http://www.nytimes.com/library/tech/99/05/biztech/articles/17tube.html(1998, November 18). DVD developers wait for Windows. New York Times. Retrieved November 18, 1998, from http://www.nytimes.com/techweb/TW_DVD_Developers_Wait_For_Windows.html(1998, June 10). NBC buying a portal to the Internet. New York Times. Retrieved June 10, 1998, from http://www.nytimes.com/library/tech/98/06/biztech/articles/10cnet.html(2000, May 12). Napster may have weak defense in fight with music industry. New York Times. Retrieved May 12, 2000, from http://www.nytimes.com...ech/00/05/cyber/cyberlaw/12law.html([Page 376]2000, January 6). Radio squeezes empty air space for profit. New York Times. Retrieved January 6, 2000, from http://www.nytimes.com/library/financial/columns/010600radio-ads.htm(2000, May 31). U.S. seeks to ease some restrictions on broadcasters. New York Times. Retrieved May 31, 2000, from http://www.nytimes.com/library/financial/053100fcc-ownership.html(1998, November 20). Some digital TV services to be taxed. New York Times. Retrieved November 20, 1998, from http://www.nytimes.com/library/tech/98/11/biztech/articles/20digi.html. (1998, November 5). Web radio expands listening horizons. New York Times. Retrieved November 5, 1998, from http://www.nytimes.com/library/tech/98/11/circuits/library/05libe.html(1999, January 28). Life after the VCR: Choosing DVD or Divx. New York Times. Retrieved January 28, 1999, from http://www.nytimes/com/library/tech/99/01/circuits/articles/28pete.html(1998, September 28). Ready for prime time?Newsweek, pp. 83–85.. (1998, October 12). 24-Hour news channels force change at big three. New York Times. Retrieved October 12, 1998, from http://www.nytimes.com/yr/mo/day/news/financial/tv-news-media.html(1999, February 1). Watch the tube or watch the computer?New York Times. Retrieved February 1, 1999, from http://www.nytimes.com/library/tech/99/02/biztech/articles/01tube.html(1999, January 21). Making movies, the do-it-yourself way, on the Web. New York Times. Retrieved January 21, 1999, from http://www.nytimes.com/library/tech/99/01/cyber/artsatlarge.html(Reuters (2000). Soft rock or software–“Tech” radio is coming. New York Times. Retrieved January 4, 2000, from http://www.nytimes.com/reuters/technology/tech-media-techradio.htm1998, October 19). TV turns vertical. Newsweek, pp. 52–56.(1998, December 7). PC makers and bells in joint petition to U.S. on networks. New York Times. Retrieved December 7, 1998, from http://www.nytimes.com/library/tech/98/12/biztech/articles/07phone-data.html(1998, March 9). Another setback in quest to marry TV and phones. New York Times. Retrieved March 9, 1998, from http://www.nytimes.com/library/tech/98/03/biztech/articles/09phone.html(1999, March 23). Cable TV and the Internet, too: Battling the bells, but with some high-speed whistles. New York Times. Retrieved March 23, 1999, from http://www.nytimes.com/library/tech/99/03/biztech/articles/23comcast.html(1999, December 20). Technology could soon hand TV control to the viewer. New York Times. Retrieved December 20, 1999, from http://www.nytimes.com/library/tech/yr/mo/biztech/articles/122099outlook-tele.htm(2000, January 3). The millennavision. Broadcasting & Cable, pp. 38–62.. ([Page 377]Copyright1998, October 28). Clinton signs digital copyright act. New York Times. Retrieved October 29, 1998, from http://www.nytimes.com/library/tech/98/10/cyber/articles/29wipo.html(1998, October 9). House and Senate agree on complex copyright bill. New York Times. Retrieved October 9, 1998, from http://www.nytimes.com/library/tech/98/10/cyber/articles/09wipo.html(2000, January 17). Wrestling group wins back use of its name on Internet. New York Times. Retrieved January 17, 2000, from http://www.nytimes.com/library/tech/00/01/biztech/articles/17name.htm(Digital copyright agreement for video. (1999, February 17). New York Times. Retrieved February 17, 1999, from http://www.nytimes/com/library/tech/99/02/biztech/articles/17blue.html1998, September 25). Can a Web link break copyright laws?New York Times. Retrieved September 25, 1998, from http://www.nytimes.com/library/tech/98/09/cyber/cyberlaw/25law.html(1998, October 30). Free book sites hurt by copyright law. New York Times. Retrieved October 30, 1998, from http://www.nytimes.com/library/tech/98/10/cyber/cyberlaw/30law.html(1997). Questions and answers on copyright for the campus community. Oberlin: National Association of College Stores., , & (1998, December 7). Microsoft's Cleartype sets off debate on originality. New York Times. Retrieved December 7, 1998, from http://www.nytimes.com/library/tech/98/12/biztech/articles/07microsoft-flat.html(1999, February 25). Sony to propose a method for protecting digital music. New York Times. Retrieved February 25, 1999, from http://www.nytimes.com/library/tech/99/02/biztech/articles/25sony.html(2000, May 10). The concept of copyright fights for Internet survival. New York Times. Retrieved May 10, 2000, from http://www.nytimes.com.../05/biztech/articles/10digital.html(1998, December 17). Composers of game soundtracks seek Grammy recognition. New York Times. Retrieved December 17, 1998, from http://www.nytimes.com/library/tech/98/12/cyber/artsatlarge/17artsatlarge.html(1999, February 1). Trying to get in tune with the digital age. New York Times. Retrieved February 1, 1999, from http://www.nytimes.com/library/tech/99/02/biztech/articles/01tune.html(1999, July 14). Standards are set for thwarting music pirates. New York Times. Retrieved July 14, 1999, from http://www.nytimes.com/library/tech/99/07/biztech/articles/14standard.htm(1999, December 20). Parents considered vital to thrive on the Internet. New York Times. Retrieved December 20, 1999, from http://www.nytimes.com/library/tech/yr/mo/biztech/articles/122099outlook-pate.htm(2000, January 24). 3 copyright lawsuits test limits of new digital media. New York Times. Retrieved January 24, 2000, from http://www.nytimes.com/library/tech/00/01/biztech/articles/24onli.htm. ([Page 378]1999, April 15). Technology you can dance to. New York Times. Retrieved April 15, 1999, from http://www.nytimes.com/library/tech/99/04/biztech/articles/15popx.html(CyberlawACLU in the Courts. (1997, June 20). ALA v. Pataki Decision. ACLU. Retrieved February 2, 1999, from http://www.aclu.org/court/nycdadec.htmlACLU in the Courts. (1999). Kathleen R. v. City of Livermore. ACLU. Retrieved February 11, 1999, from http://www.aclu.org/court/kathleenrvlivermorepubliclibrary.htmlACLU in the Courts. (1998, October 21). Kathleen R. vs. City of Livermore. ACLU. Retrieved February 18, 1999, from http://www.aclu.org/court/kathleenrvslivermore.htmlACLU vs. Reno Decision–Dalzell Decision. (1999). Retrieved September 8, 1999, from http://www.pas.rochester.edu/~mbanks/CDA/decision/dalzell.htmACLU vs. Reno Decision–Introduction. (1999). Retrieved September 8, 1999, from http://www.pas.rochester.edu/~mbanks/CDA/decision/intro.htmACLU vs. Reno Decision–Sloviter Decision. (1999). Retrieved September 8, 1999, from http://www.pas.rochester.edu/~mbanks/CDA/decision/sloviter.htmACM, Inc. (1999). PICS: Internet access controls without censorship. Retrieved February 9, 1999, from http://www.w3.org/PICS/iacwcv2.htmAmerican Civil Liberties Union (ACLU). (1999, January 14). Court upholds Livermore Library's uncensored Internet access policy. ACLU. Retrieved February 11, 1999, from http://www.aclu.org/news/n011499a.htmlAmerican Civil Liberties Union (ACLU). (1999). Supreme Court of the United States: Reno v. American Civil Liberties Union. ACLU. Retrieved February 2, 1999, from http://www.aclu.org/court/renovacludec.htmlAmerican Civil Liberties Union (ACLU). (1999). White Paper: Censorship in a box. ACLU. Retrieved February 18, 1999, from http://www.aclu.org/issues/cyber.box.htmlAssociated Press. (1999, March 12). FCC: No Internet regulation plans. New York Times. Retrieved March 12, 1999, from http://www.nytimes.com/library/tech/99/03/biztech/articles/12fcc-net.htmlAssociated Press. (1999, March 18). FCC wants phone rates on Internet. New York Times. Retrieved March 18, 1999, from http://www.nytimes.com/aponline/w/AP-FCC-Phone-Matters.htmlAssociated Press. (1999, February 25). Virginia passes law against unsolicited e-mail. New York Times. Retrieved February 25, 1999, from http://wysiwyg://24/http://www.nytimes.com/library/tech/99/02/biztech/articles/25spam.html1999, August 16). Annals of communications: Hard core: Why does Bill Gates think that the Microsoft antitrust trial has been such a disaster for him and for the company?The New Yorker, pp. 42–69.. (Availability of bombmaking information. (1997, June 20). Retrieved March 18, 1999, from http://jya.com/abi.htm[Page 379]1999). ACLU White Paper: Fahrenheit 451.2: Is cyberspace burning? ACLU. Retrieved September 8, 1999, from http://www.aclu.org/issues/cyber/burning.htm, , & . (1997, July 3). Supreme Court strikes down law on Internet indecency. Chronicle of Higher Education., & . (1998, February 26). ACLU in the Courts: Urofsky v. Allen, E.D. Virginia Decision. ACLU. Retrieved February 16, 1999, from http://www.aclu.org/court/urofskyvallendec.html(1998, November 23). Mainstream Loudoun v. Board of Trustees of the Loudoun County Library. Retrieved February 11, 1999, from http://censorware.org/legal/loudoun/981123_memopin_jb.htm(1998, June 23). Appeals court overturns ruling on Windows 95. New York Times. Retrieved June 23, 1998 from http://www.nytimes.com/library/tech/98/06/biztech/articles/24microsoft.html(1998, October 20). As Microsoft trial gets started, Gates's credibility is questioned. New York Times. Retrieved October 20, 1998, from http://www.nytimes.com/library/tech/98/10/biztech/articles/20microsoft.html(2000, April 4). U.S. judge says Microsoft violated antitrust laws with predatory behavior. New York Times. Retrieved April 4, 2000, from http://www.nytimes.com/library/tech/yr/mo/biztech/articles/04soft.html(2000, June 1). Microsoft files its final arguments against breakup. New York Times. Retrieved June 1, 2000, from http://www.nytimes.com/library/tech/00/06/biztech/articles/01soft.html(The Brown Daily Herald, Inc. (1999). Retrieved February 22, 1999, from http://www.netspace.org/herald/issues/111795/cornell.f.html1996). Garbage in: Emerging media and regulation of unsolicited commercial solicitations. Berkeley Technology Law Journal, 11(2). Retrieved April 5, 1999, from http://www.law.berkeley.edu/journals/btlj/articles/11-2/carroll.html(1998, September 28). House backs away from regulating spam. New York Times. Retrieved September 28 1998, from http://www.nytimes.com/library/tech/98/09/cyber/articles/28spam.html(1998). Marketers and Net activists reach agreement on spam. New York Times. Retrieved December 8, 1998, from http://www.nytimes.com/library/tech/98/12/cyber/articles/08spam.html(1998, October 12). Technology bills languish as Congress races for exit. New York Times. Retrieved October 12, 1998, from http://www.nytimes.com/library/tech/98/10/biztech/articles/12technology-legislation.html(1999, February 11). More states consider laws restricting junk e-mail. New York Times. Retrieved February 11, 1999, from http://www.nytimes.com/library/tech/99/02/cyber/articles/11spam.html(1999, January 24). State lawmakers ready scores of Internet bills. New York Times. Retrieved January 25, 1999, from http://www.nytimes.com/library/tech/99/01/,cyber/articles/24states.html(1999, January 27). U.S. argues case on online smut law. New York Times. Retrieved January 27,1999, from http://www.nytimes.com/library/tech/99/01/cyber/articles/27copa.html([Page 380]Compuserve, Inc. v. Cyber Promotions, Inc. (1997, February 3). Retrieved April 5, 1999, from http://www.leepfrog.com/ELaw/Cases/CompuServe_v_Cyber_Promo.htmlCyber Promotions, Inc. v. America Online, Inc. (1996, November 4). Retrieved April 5, 1999, from: http://www.leepfrog.com/E-Law/Cases/Cyber_Promo_v_AOL.htmlElectronic Commerce & Law Report. (1999). ACLU v. Janet Reno: June 11, 1996. Retrieved February 2, 1999, from http://www.bna.com/e-law/cases/aclureno.htmlElectronic Commerce & Law Report. (1999). The Washington Post v. Total News Inc. (Settlement). Retrieved September 23, 1999, from: http://zeus.bna.com/e-law/cases/totalset.htmElectronic Privacy Information Center. (1999). Child Online Protection Act. EPIC. Retrieved February 2, 1999, from http://www.epic.org/free_speech/censorship/copa.htmlExcerpts from government's suit against Microsoft. (1998). New York Times. Retrieved May 19, 1998, from http://www.nytimes.com/library/tech/yr/mo/biztech/articles/19microsoft-text.html1999, January 29). Charges filed in U.S. hate e-mail case. New York Times. Retrieved March 25, 1999, from http://www.nytimes.com/library/tech/99/01/cyber/articles/29mail.html(1999, April 29). Internet stalking case ends in plea. New York Times. Retrieved April 29, 1999, from http://www.nytimes.com/library/tech/99/04/cyber/articles/29stalk.html(1999, February 3). Plea entered in Internet stalking case. New York Times. Retrieved March 25, 1999, from http://www.nytimes.com/library/tech/99/02/cyber/articles/03stalk.html([Page 381]FindLaw. (1969, June 9). United States Case Law: Supreme Court: Brandenburg v. Ohio. Retrieved March 16, 1999, from http://caselaw.findlaw/com/cgi-bin/getcase.pl?navby=case&court=US&vol=395&page=447FindLaw. (1986, February 25). United States Case Law: U.S. Supreme Court: Renton v. Playtime Theatres, Inc. Retrieved February 17, 1999, from http://caselaw.findlaw.com/scripts/getcas...%GRAPHURL%>&court=US&case=/us/475/41.htmlFindLaw. (1997, December 4). United States Case Law: 4th Circuit Court of Appeals: Rice v. Paladin Enterprises. FindLaw. Retrieved March 16, 1999, from http://caselaw.findlaw.com/cgi-bin/getcas...court=4th&navby=case&no=962412Pv2&exact=1FindLaw. (1999). United States Case Law: 2nd Circuit Court. Bensusan Restaurant Corporation v. Richard B. King. Retrieved October 7, 1999, from http://wysiwyg://177/http://caselaw.findlaw.com/...avby=search&case=/uscircs/2nd/969344.htmFindLaw. (1999). United States Case Law: 6th Circuit Court: United States of America v. Abraham Jacob Alkhabaz. Retrieved March 23, 1999, from http://caselaw.findlaw.com/cgi-bin/getcase.pl?court=6th&navby=docket&no=970036pFindLaw. (1999, February 10). United States Case Law: 4th Circuit Court of Appeals: Urofsky v. Gilmore. Retrieved February 16, 1999, from http://caselaw.findlaw.com/cgi-bin/getcase.pl?court=4th&navby=docket&no=981481P.FindLaw. (1999). U.S. 2nd Circuit Court of Appeals: Hickerson v. City of New York. Retrieved March 10, 1999, from http://caselaw.findlaw.com/scripts/getcas...avby=search&case=/uscircs/2nd/987269.htmlFindLaw. (1999). U.S. Supreme Court: Perry Education Association v. Perry Local Educators' Association. Retrieved March 10, 1999, from http://caselaw.findlaw.com/cgi-bin/getcase.pl?court=US&vol=460&invol=37FindLaw. (1999). U.S. Supreme Court: Renton v. Playtime Theatres, Inc. Retrieved March 10, 1999, from http://caselaw.findlaw.com/scripts/getcas...%GRAPHURL%>&court=US&case=/us/475/41.html1998, October 15). Library grapples with protecting Internet freedom. New York Times. Retrieved October 15, 1998, from http://www.nytimes.com/library/tech/98/10/circuits/articles/15filt.html(1999, February 3). Creators of anti-abortion Web site told to pay millions. New York Times. Retrieved February 3, 1999, from http://www.nytimes.com/library/tech/99/02/biztech/articles/03abortion.html(Interest of the Amici. Retrieved February 9, 1999, from http://www.cilp.org/firstam/copaamici.htmlInternet Society (ISOC). (1998, February 20). All about the Internet: A brief history of the Internet (last revision). Retrieved February 2, 1999, from http://www.isoc.org/internet-history/brief.html1999, March 9). Journalist sentenced in Internet pornography case. New York Times. Retrieved March 9, 1999, from http://www.nytimes.com/library/tech/99/03/biztech/articles/09porn.html(1998, November 20). Anti-porn law enters Court; delay soon follows. New York Times. Retrieved November 20, 1998, from http://www.nytimes.com/library/tech/98/11/cyber/cyberlaw/20law.html([Page 382]1998, October 2). In library filtering case, an unusual allyNew York Times. Retrieved October 2, 1998, from http://www.nytimes.com/library/tech/98/10/cyber/cyberlaw/02law.html(1998, October 9). Strict European privacy law puts pressure on U.S. New York Times. Retrieved October 9, 1998, from http://www.nytimes.com/library/tech/98/10/cyber/cyberlaw/09law.html(1998, January 1). The year saw many milestones in cyberlaw. New York Times. Retrieved June 11, 1998, from http://www.nytimes.com/library/cyber/law/01019law.html(1999, March 12). Companies fight anonymous critics with lawsuits. New York Times. Retrieved March 12, 1999, from http://www.nytimes.com/library/tech/99/03/cyber/cyberlaw/12law.html(1999, April 30). Court lays down the law on labels for Web sites. New York Times. Retrieved April 30, 1999, from http://wysiwyg://10/http://www.nytimes.com/library/tech/99/04/cyber/cyberlaw/30law.html(1999). Junk e-mail filters spawn a suit against Microsoft. New York Times. Retrieved February 19, 1999, from http://www.nytimes.com/library/tech/99/02/cyber/cyberlaw/19law.html(1999, April 9). Ruling against domain name speculator could set precedent. New York Times. Retrieved April 9, 1999, from http://www.nytimes.com/library/tech/99/04/cyber/cyberlaw/09law.html(2000, February 4). Another legal defeat for victim of online hoax. New York Times. Retrieved February 4, 2000, from http://www.nytimes.com/library/tech/00/02/cyber/cyberlaw/04law.htm(2000). DVD lawsuit questions legality of linking. New York Times. Retrieved January 7, 2000, from http://wysiwyg://9/http://www.nytimes.com/library/tech/yr/mo/cyber/cyberlaw/07law.htm(2000). When the Internet moves faster than the courts. New York Times. Retrieved February 25, 2000, from http://www.nytimes.com/library/tech/00/02/cyber/cyberlaw/25law.htm(1998, October 22). Site shutdown after PA AG files suit. Law Journal Extra. Retrieved March 25, 1999, from http://www.ljx.com/LJXfiles/paag.html(2000, April 4). Judge builds legal argument aimed at surviving an appeal. New York Times. Retrieved April 4, 2000, from http://www.nytimes.com/library/tech/00/04/biztech/articles/04legal.html(Law Journal Extra. (1999). Commonwealth of Pennsylvania v. Alpha HQ. LJX. Retrieved March 25, 1999, from http://www.ljx.com/LJXfiles/harassment/paaghate.html1998, Summer). What things regulate speech: CDA 2.0 vs. filtering. Jurimetrics, pp. 629–670.. (Like the live view? Here's how we did it. (1999). Cornell University Home Page. Retrieved October 13, 1999, from http://www.info.cornell.edu/CUHomePage/liveview.htm1998, December 14). If Microsoft loses case, remedies are thorny. New York Times. Retrieved December 14, 1998, from http://www.nytimes.com/library/tech/98/12/biztech/articles/14soft.html(1998). An Intel executive testifies of a “credible and fairly terrifying” threat by Microsoft. New York Times. Retrieved November 10, 1998, from http://www.nytimes.com/library/tech/98/11/biztech/articles/10soft.html(1998, November 18). Microsoft told to stop shipments that violate contract with rival. New York Times. Retrieved November 18, 1998, from http://www.nytimes.com/library/tech/98/11/biztech/articles/18sun.html(1998, October 19). Sherman's 1890 nod to populism has been broadly interpreted. New York Times. Retrieved October 19, 1998, from http://www.nytimes.com/library/tech/98/10/biztech/articles/19law.html(1998). U.S. vs. Microsoft: Government sets the stage. New York Times. Retrieved May 19, 1998, from http://www.nytimes.com/library/tech/yr/mo/biztech/articles/19microsoft-justice.html(Loving v. Boren. (1997, January 28). Retrieved February 16, 1999, from http://www.gse.ucla/edu/iclp/loving.html1998, February 11). Conviction in online threat case. CNET News. Retrieved March 25, 1999, from http://www.news.com/News/Item/0,4,19046,00.html(1998, May 4). Prison time for email threats. CNET News. Retrieved March 25, 1999, from http://www.news.com/News/Item/0,4,21766,0.html(Mainstream Loudoun v. Loudoun County Libraries. (1999). Tech Law Journal. Retrieved February 9, 1999, from http://www.techlawjournal.com/courts/loudon/80407mem.htm1997). Internet red light district: A domain name proposal for regulatory zoning of obscene content. John Marshall Journal of Computer and Information Law, 16, 21–33.(1998). Copyright law tackles yet another challenge: The electronic frontier of the World Wide Web. Rutgers Computer & Technology Law Journal, 8. Retrieved March 15, 1999. LexisNexis.([Page 383]1998, May 18). Defiant Gates defends his business practices. New York Times. Retrieved May 19, 1998, from http://www.nytimes.com/library/tech/yr/mo/biztech/articles/19microsoft-gates.html(1998). Court tackles new angle on library Internet filtering. New York Times. Retrieved December 4, 1998, from http://www.nytimes.com/library/tech/98/12/cyber/cyberlaw/04law.html(1999, February 1). Decision expected Monday on Web anti-pornography law. New York Times. Retrieved February 1, 1999, from http://www.nytimes.com/library/tech/99/02/biztech/articles/01kids.html(1999, January 28). Hearings end in online pornography case. New York Times. Retrieved January 28, 1999, from http://www.nytimes.com/library/tech/99/01/cyber/articles/28copa.html(1999, April 28). Intel e-mail ruling raises free speech questions. New York Times. Retrieved April 29, 1999, from http://www.nytimes.com/library/tech/99/04/cyber/articles/29intel.html(1999, January 21). Internet smut law enters Court, with a snag. New York Times. Retrieved January 21, 1999, from http://www.nytimes.com/library/tech/99/01/cyber/articles/21copa.html(1999, February 1). Judge delays online pornography law. New York Times. Retrieved February 2, 1999, from http://www.nytimes.com/library/tech/99/02/cyber/articles/02copa.html(1999, June 24). Michigan faces challenge on online porn law. New York Times. Retrieved June 24, 1999, http://fromwysiwyg://13/http://www.nytimes.com/library/tech/99/06/cyber/articles/24michigan.html(1996). Relevance. In Evidence under the rules: Text, cases, and problems (, & (3rd ed., pp. 59–114). Boston: Little, Brown.1997, November 24). Nations struggle with how to control hate on the Web. New York Times. Retrieved March 25, 1999, from http://www.nytimes.com/library/cyber/week/112497racism.html(1999, February 16). Pentium III chips could hit 1 GHz this year. New York Times. Retrieved February 17, 1999, from http://www.nytimes.com/techweb/TW_Pentium_III_Chips_Could_Hit_1_GHz_This_Year.html(1995, September 11). Villanova Center for Information Law and Policy: What is the Internet? Retrieved February 2, 1999, from http://www.law.vill.edu/vcilp/technotes/whatis5.htm(1998, Fall). Law of Cyberspace Seminar syllabus. Philadelphia: Temple University Law School.(1997, November 17). EPLR: Lockheed Martin Corp. v. Network Solutions Inc. Retrieved September 18, 1999, from http://zeus.bna.com/e-law/cases/locknsi.htm(1998, October 1). More trouble for man in hate mail case. New York Times. Retrieved March 25, 1999, from http://www.nytimes.com/library/tech/98/10/cyber/articles/01email.html(Reuters. (1999, September 28). Analysts fear heavy Microsoft regulation most. New York Times. Retrieved September 28, 1999, from http://www.nytimes.com/reuters/technology/tech-microsoft-remedi.htm1999, June 30). Vexing party, Clinton backs Year 2000 law. New York Times. Retrieved June 30, 1999, from http://www.nytimes.com/library/tech/99/06/biztech/articles/30year.html([Page 384]Supreme Court–State of New York. Stratton Oakmont, Inc. and Daniel Porush vs. Prodigy Services Company. (1999). Retrieved April 5, 1999, from http://www.epic.org/free_speech/stratton_v_prodigy_1995.txtTech Law Journal. (1998, April 7). Brinkema Opinion: Mainstream Loudoun v. Loudoun County Libraries. Retrieved February 19, 1999, from http://www.techlawjournal.com/courts/loudon/80407mem.htmText of the latest CDA (21/21/95). (1999). Retrieved February 2, 1999, from http://www.cdt.org/policy/freespeech/12_21.cda.html1999). BitLaw Source Cases: Cubby, Inc. v. Compuserve, Inc. BitLaw. Retrieved April 5, 1999, from http://www.bitlaw.com/source/cases/copyright/cubby.html(United States Court of Appeals for the Fourth Circuit. Zeran v. America Online, Inc. (1999). Retrieved April 5, 1999, from http://www.law.emory.edu/4circuit/nov97/971523.p.html1999, March 11). Internet crimes attracting attention of states. New York Times. Retrieved March 11, 1999, from http://www.nytimes.com/library/tech/99/03/cyber/articles/11crime.html(1998, June 9). Intel case gives antitrust law a new twist. New York Times. Retrieved June 8, 1998, from http://www.nytimes.com/library/tech/98/06/biztech/articles/09intel-analysis.html(1998, October 19). Previous antitrust cases leave room for both sides to cite them now. New York Times. Retrieved October 19, 1998, from http://www.nytimes.com/library/tech/98/10/biztech/articles/19case.html(1999, May 4). Judge puts lock on look-alike Web names. New York Times. Retrieved May 5, 1999, from http://www.nytimes.com/techweb/TW_Judge_Puts_Lock_On_Look_Alike_Web_Names.html(Distance Education/Distance LearningThe Annenberg/CPB Project; The PBS Adult Learning Service. (1994). Going the distance: A handbook for developing distance degree programs using television courses and telecommunications technologies. Bethesda, MD: Toby Levine Communications.1998, November 2). More colleges plunging into uncharted waters of online courses. New York Times. Retrieved November 2, 1998, from http://www.nytimes.com/library/tech/98/11/biztech/articles/02online-education.html(1998, October 16). Reliance on technology threatens the essence of teaching. Chronicle of Higher Education, pp. B5–B6.. (1998, October 9). U. of Utah president issues a pointed warning about virtual universities. Chronicle of Higher Education, p. A32.. (1998, December 1). Textbooks shifting from printed page to screen. New York Times. Retrieved December 1, 1998, from http://www.nytimes.com/library/tech/98/12/biztech/articles/01school-etex.html(1994). Realizing the promise of technology: A policy perspective. In B.Means (Ed.), Technology and education reform (pp. 169–190). San Francisco: Jossey-Bass.([Page 385]1995, July). Moving beyond campus-bound education. Retrieved from http://www.learner.org/edtech/distlearn/chronicle.html(1999, October 13). Online presentations boom as colleges compete for the brightest students. New York Times. Retrieved October 13, 1999, from http://www.nytimes.com/library/national/101399web-tours-edu.htm(1998, March 27). Distance education for the not-so-distant. Chronicle of Higher Education, pp. A29–A30.. (1998, October 9). Some colleges try attracting students with their own on-line innovations. Chronicle of Higher Education, pp. A31–A32.. (1999, January 25). College freshmen's Internet use a way of life, but disparities emerge. New York Times. Retrieved January 25, 1999, from http://www.nytimes.com/library/tech/99/01/biztech/articles/25frosh.html(1999, January 27). High tech comes to the classroom: Machines that grade essays. New York Times. Retrieved January 27, 1999, from http://www.nytimes.com/library/tech/99/01/biztech/articles/27grade.html(1997, October 7). Desktop video-conferencing. PC Magazine, pp. 219–231.. (1999, September 27). Teachers see major obstacles to wiring schools. New York Times. Retrieved September 27, 1999, from http://www.nytimes.com/cnet/CNET_0_4_201238_00.htm(1994). A perspective on communication technology policy for higher education instruction in the state of Ohio. Columbus, OH: Center for the Advanced Study in Telecommunications (CAST).(1998, April). Partners in learning: Twelve ways technology changes the teacher-student relationship. T.H.E. Journal, 25(9), 58–61. Retrieved from //email@example.com(1994). Tomorrow's schools: Technology and reform in partnership. In B.Means (Ed.), Technology and education reform (pp. 191–222). San Francisco: Jossey-Bass., & ([Page 386]1998, November 18). Lawsuit challenges Internet subsidy for parochial schools. New York Times. Retrieved November 18, 1998, from http://www.nytimes.com/library/tech/98/11/cyber/education/18education.html(1998, November 25). School laptop program raises concerns about equal access. New York Times. Retrieved November 25, 1998, from http://www.nytimes.com/library/tech/98/11/cyber/education/25education.html(1998, October 14). Schools get Internet access, but how do teachers use it?New York TimesOnline. Retrieved October 15, 1998, from http://www.nytimes.com/library/tech/98/10/cyber/education/14education.html(1998, November 4). Survey shows a sharp rise in Net-savvy academics. New York TimesOnline. Retrieved November 4, 1998, from http://www.nytimes.com/library/tech/98/11/cyber/education/04education.html(1998, September 23). Test preparation company offers virtual law degree. New York TimesOnline. Retrieved September 23, 1998, from http://www.nytimes.com/library/tech/98/09/cyber/education/23education.html(1999, July 14). Focus shifts to effectiveness of education technology. New York TimesOnline. Retrieved July 14, 1999, from http://www.nytimes.com/library/tech/99/07/cyber/education/14education.htm(1999, October 13). Kentucky reaches for high school students with Internet courses. New York Times. Retrieved October 13, 1999, from http://www.nytimes.com/library/tech/99/10/cyber/education/13education.htm(1999, February 24). Report calls for teacher training in technology. New York TimesOnline. Retrieved February 24, 1999, from http://www.nytimes.com/library/tech/99/02/cyber/education/24education.html(1999, September 22). Study finds problems with Web class. New York Times. Retrieved September 22, 1999, from http://www.nytimes.com/libra...ch/99/09/cyber/education/22education.htm(1999, March 31). Universities grapple with computer use policies. New York Times. Retrieved March 31, 1999, from http://www.nytimes.com/library/tech/99/03/cyber/education/03education.html(1999, October 20). University with long history in correspondence ventures onto Net. New York Times. Retrieved October 20, 1999, from http://www.nytimes.com/library/tech/99/10/cyber/education/20education.htm(1999, February 17). Virginia law could hamper educators at state schools. New York TimesOnline. Retrieved February 17, 1999, from http://www.nytimes.com/library/tech/99/02/cyber/education/17education.html(National Education Commission on Time and Learning. (1994). Prisoners of time. Washington, DC: Government Printing Office. (ERIC Document Reproduction Service No. ED366115).1995). Being digital. New York: Knopf.(1998, September 1). Beyond the campus. CIO WebBusiness Magazine, 11(22), 30–40.. (1991, September 4). The electronic classroom: Vanderbilt courses mix film, video, graphics, sound, and text; use of the facility spreads. Chronicle of Higher Education, pp. A26–A30.(1998, April 24). Microsoft's reach in higher education. Chronicle of Higher Education, pp. A25–A34., , , & . (E-CommerceAssociated Press. (1998, June 24). AT&T agrees to buy TCI in $48 billion deal. New York Times. Retrieved June 23, 1998, from http://www.nytimes.com/yr/mo/day/late/#businessAssociated Press. (1999, December 28). Web shoppers report satisfaction. New York Times. Retrieved December 28, 1999, from http://www.nytimes.com/library/tech/99/12/biztech/articles/28web-shopping.htm[Page 387]1999, February 8). Cisco and Motorola to develop wireless Internet system. New York Times. Retrieved February 8, 1999, from http://www.nytimes.com/library/tech/99/02/biztech/articles/08wire.html(Bloomberg News. (2000, January 5). Chip sales climb 25%. New York Times. Retrieved January 5, 2000, from http://www.nytimes.com/library/tech/00/01/biztech/articles/05chip.htm1999, February 8). Taking a Web meeting. New York Times. Retrieved February 8, 1999, from http://www.nytimes.com/library/tech/99/02/biztech/articles/08data.html, & (1998, November 18). Microsoft hampered OS/2, IBM official tells court. New York Times. Retrieved November 18, 1998, from http://www.nytimes.com/library/tech/98/11/biztech/articles/18soft.html(1999, July 19). A new model for the Internet: Fees for services. New York Times. Retrieved July 19, 1999, from http://www.nytimes.com/library/tech/99/07/biztech/articles/19digi.htm(1998, October 5). Patents: Software that tracks Web usage. New York Times. Retrieved October 5, 1998, from http://www.nytimes.com/library/tech/98/10/biztech/articles/05patents.html(1998, November 30). White House unveils e-commerce plans. New York Times. Retrieved December 1, 1998, from http://www.nytimes.com/library/tech/98/12/cyber/articles/01magaziner.html(1999, June 8). FTC holds meeting on international e-commerce. New York Times. Retrieved June 8, 1999, from http://www.nytimes.com/library/tech/99/06/cyber/capital/08capital.html(2000, February 15). Government fights spread of online auction fraud. New York Times. Retrieved February 15, 2000, from http://www.nytimes.com/library/tech/00/02/cyber/capital/15capital.htm(1999, August 23). Corporations try to bar use of e-mail by unions. New York Times. Retrieved August 23, 1999, from http://www.nytimes.com/library/tech/99/08/biztech/articles/23unio.htm(2000, June 2). In online auctions, rings of bidders. New York Times. Retrieved June 2, 2000, from http://www.nytimes.com/library/tech/00/06/biztech/articles/02ebay.html(2000, February 1). Shocking defeats and other Super Bowl XXXIV marketing memories. New York Times. Retrieved February 1, 2000, from http://www.nytimes.com/libr...ancial/columns/020100superbowl-adcol.htm(1998, December 2). Microsoft bets on barter advertising network. New York Times. Retrieved December 2, 1998, from http://www.nytimes.com/library/tech/98/12/biztech/articles/02microsoft-link.html([Page 388]1998, November 17). Amazon stretching beyond its roots in books. New York Times. Retrieved November 17, 1998, from http://www.nytimes.com/library/tech/98/12/biztech/articles/02microsoft-link.html(1998, November 25). America Online sets its sights on e-commerce. New York Times. Retrieved November 25, 1998, from http://www.nytimes.com/library/tech/98/11/biztech/articles/25commerce.html(1998, August 24). Marketers ponder how to sell soap without the operas. New York Times. Retrieved August 24, 1998, from http://www.nytimes.com/library/tech/98/08/biztech/articles/24advertising.html(1998, November 11). E-mail takes the stand and companies take a stand on e-mail. New York Times. Retrieved November 11, 1998, from http://www.nytimes.com/library/tech/98/11/biztech/articles/11email.html(1998, December 14). Witness in Microsoft case keeps the list of all lists. New York Times. Retrieved December 14, 1998, from http://www.nytimes.com/library/tech/98/12/biztech/articles/14farb.html(2000, February 17). U.S. officials lay out plan to fight computer attacks. New York Times. Retrieved February 17, 2000, from http://www.nytimes.com/library/tech/yr/mo/biztech/articles/17net.htm(1998, October 20). New spec breaks the e-commerce ICE. New York Times. Retrieved October 20, 1998, from http://www.nytimes.com/techweb/TW_New_Spec_Breaks_The_E_Commerce_ICE.html(1998, November 24). Nader's group to contest AOL-Netscape merger. New York Times. Retrieved November 25, 1998, from http://www.nytimes.com/techweb/TW_Nader_s_Group_to_Contest_AOL_Netscape_Merger.html(1998, December 15). Three proposed telecommunications mergers draw challenges at an F.C.C. hearing. New York Times. Retrieved December 15, 1998, from http://www.nytimes.com/library/tech/98/12/biztech/articles/15bell.html(2000, February 21). Hunting the hackers. Newsweek, pp. 38–44., & . (1998, October 1). White House to increase efforts to help fight software piracy. New York Times. Retrieved October 1, 1998, from http://www.nytimes.com/library/tech/98/10/biztech/articles/01software-piracy.html(2000, January 11). A mass medium for Main Street. New York Times. Retrieved January 11, 2000, from http://www.nytimes.com/library/financial/011100time-online.htm(2000, January 12). Merger may produce rival Microsoft has dreaded. New York Times. Retrieved January 12, 2000, from http://www.nytimes.com/library/financial/011200time-soft.htm(2000, April 25). U.S. hoping 2 Microsoft monopolies are gentler than one. New York Times. Retrieved April 25, 2000, from http://www.nytimes.co...00/04/biztech/articles/25split.html(1998, July 1). In AT&T-TCI deal, cost and logistical problems. New York Times. Retrieved July 2, 1998, from http://www.nytimes.com/library/tech/98/07/biztech/articles/02phone.html(1998, October 12). Microsoft memo offers a glimpse of Gates 2.0. New York Times. Retrieved October 12, 1998, from http://www.nytimes.com/library/tech/98/10/biztech/articles/12microsoft-gates.html(2000, February 15). Chat systems yield clues in Web attacks by hackers. New York Times. Retrieved February 15, 2000, from http://www.nytimes.com/library/tech/00/02/biztech/articles/15net.htm, & (1998, December 17). Luck, be a microchip tonight. New York Times. Retrieved December 17, 1998, from http://www.nytimes.com/library/tech/98/12/circuits/articles/17gamb.html([Page 389]1999, December 8). Major players going online with SAT prep courses. New York Times. Retrieved December 8, 1999, from http://www.nytimes.com/library/tech/99/12/cyber/education/08education.htm(1998, August 26). You say “page view,” I say “visit”: How to count Web traffic. New York Times. Retrieved August 27, 1998, from http://www.nytimes.com/library/tech/98/08/cyber/articles/26traffic.html(1999, March 2). EBay says it is under investigation by U.S. New York Times. Retrieved March 2, 1999, from http://www.nytimes.com/library/tech/99/03/cyber/articles/02ebay.html(1998, December 7). “Literate smut” site tries electronic commerce. New York Times. Retrieved December 7, 1998, from http://www.nytimes.com/library/tech/98/12/biztech/articles/07comp.html, & (1998, November 18). Microsoft will dump RealNetworks. New York Times. Retrieved November 19, 1998, from http://www.nytimes.com/techweb/TW_Microsoft_Will_Dump_RealNetworks.html(1999, February 9). Leading recording companies to test online digital sales. New York Times. Retrieved February 9, 1999, from http://www.nytimes.com/library/tech/99/02/biztech/articles/09blue.html(1998, November 4). In search of a free ISP. New York Times. Retrieved November 4, 1998, from http://www.nytimes.com/library/tech/98/11/cyber/articles/04isp.html(1999, June 21). As e-commerce surges, so do technical problems. New York Times. Retrieved June 21, 1999, from http://www.nytimes.com/library/tech/yr/mo/biztech/articles/21tuff.html(1999, December 19). The next waves of electronic commerce. New York Times. Retrieved December 20, 1999, from http://www.nytimes.com/librar.../biztech/articles/122099outlook-nett.htm(1999, February 8). Plan for free PCs has a few attachments. New York Times. Retrieved February 8, 1999, from http://www.nytimes.com/library/tech/99/02/biztech/articles/08free.html(2000, February 8). Yahoo attributes a lengthy service failure to an attack. New York Times. Retrieved February 8, 2000, from http://www.nytimes.com/library/tech/00/02/biztech/articles/08yahoo.htm(2000, January 27). China issues rules to limit e-mail and Web content. New York Times. Retrieved January 27, 2000, from http://www.nytimes.com/library/tech/00/01/biztech/articles/27china.htm(1998, November 24). Holiday shopping season puts e-commerce to the test. New York Times. Retrieved November 24, 1998, from http://www.nytimes.com/library/tech/98/11/cyber/commerce/24commerce.html(1999, August 23). Online sales can be messy, especially those pesky returns. New York Times. Retrieved August 23, 1999, from http://www.nytimes.com/library/tech/99/08/cyber/commerce/23commerce.htm(1998, December 1). Catalogue companies slow to set up shop online. New York Times. Retrieved December 1, 1998, from http://www.nytimes.com/library/tech/98/12/cyber/commerce/01commerce.html(1998, October 9). Senate spares Internet from taxes. New York Times. Retrieved October 9, 1998, from http://www.nytimes.com/library/tech/98/10/biztech/articles/09net.html([Page 390]Encryption/SecurityAssociated Press. (2000, February 3). Experts warn of Web surfing risk. New York Times. Retrieved February 3, 2000, from http://www.nytimes.com/library/tech/00/02/biztech/articles/03internet-warning.htmBloomberg News. (1998, October 13). Congress passes anti-piracy bill. New York Times. Retrieved October 13, 1998, from http://www.nytimes.com/library/tech/98/10/biztech/articles/13software-piracy.htmlBloomberg News. (2000, May 1). Polaroid fingerprint reader for computer security gains use. New York Times. Retrieved May 2, 2000, from http://wysiwyg://69/http://www.nytimes.com/library/tech/articles/02polaroid-prints.html1998, July 7). Administration to allow limited data-scrambling exports. New York Times. Retrieved July 8, 1998, from http://www.nytimes.com/library/tech/98/07/biztech/articles/08encrypt.html(1998, March 4). Gore letter seems to soften stance on encryption. New York Times. Retrieved March 5, 1998, from http://www.nytimes.com/library/tech/yr/mo/cyber/articles/05encrypt.html#1(1998, June 9). U.S. and industry discuss data encryption. New York Times. Retrieved June 10, 1998, from http://www.nytimes.com/library/tech/98/06/biztech/articles/10encrypt.html(1999, March 12). Panel passes bill to halt limits on encryption. New York Times. Retrieved March 12, 1999, from http://www.nytimes.com/library/tech/99/03/cyber/articles/12encrypt.html(2000, January 18). New encryption rules leave civil libertarians unhappy. New York Times. Retrieved January 18, 2000, from http://wysiwyg://5/http://www.nytimes.com/library/tech/00/01/cyber/capital/18capital.htm(Common questions about encryption and computer privacy. (1998). Americans for Computer Privacy (ACP). Retrieved March 4, 1998, from http://www.computerprivacy.org/questions/1998, August 31). Acceptable risks. Information Week, pp. 36–48.. (Encryption glossary. (1998). Americans for Computer Privacy (ACP). Retrieved March 4, 1998, from http://www.computerprivacy.org/glossary/2000, February 4). PC's vulnerable to security breaches, experts say. New York Times. Retrieved February 4, 2000, from http://www.nytimes.com/library/tech/00/02/biztech/articles/04compute.htm(1999, February 24). How Nokia guards against crackers. New York Times. Retrieved February 24, 1999, from http://www.nytimes.com/techweb/TW_How_Nokia_Guards_Against_Crackers.html(1998, February 27). Encryption issue threatens Silicon Valley rapport with Clinton. New York Times. Retrieved February 27, 1998, from http://www.nytimes.com/library/tech/yr/mo/biztech/articles/27industry.html([Page 391]1998, December 4). International group reaches agreement on data-scrambling software. New York Times. Retrieved December 4, 1998, from http://www.nytimes.com/library/tech/98/12/biztech/articles/04encrypt.html(1998, September 28). Potentially big security flaw found in Netscape software. New York Times. Retrieved September 28, 1998, from http://www.nytimes.com/library/tech/98/09/biztech/articles/28java.html(2000, January 11). Internet extortionist and thief challenges computer experts. New York Times. Retrieved January 11, 2000, from http://www.nytimes.com/library/tech/00/01/biztech/articles/11cyber.htm(1999, January 22). Clinton seeks more funds for cyberterrorism. New York Times. Retrieved January 25, 1999, http://www.nytimes.com/techweb/TW_Clinton_Seeks_More_Funds_For_Cyberterrorism.html(1999, July 13). Encryption bill gaining momentum in House. New York Times. Retrieved July 14, 1999, from http://www.nytimes.com/techweb/TW_Encryption_Bill_Gaining_Momentum_In_House.htm(Mondex Security Strategy. (1998). Mondex International. Retrieved June 14, 1998, from http://www.mondex.com/mxi/cgibin/printpa...l?english+global&technology_security.html2000, June 25). Reno: Government alone can't stop online crimes. Panorama Daily Local News.. (2000, February 10). FBI launches cyberhunt. USA Today, 18(105)., & (2000, June 1). Managing online security risks. New York Times. Retrieved June 1, 2000, from http://www.nytimes.com/library/financial/columns/060100econ-scene.html(1998, June 10). Cryptographers discuss finding of security flaw in “smart cards.”New York Times. Retrieved June 14, 1998, from http://www.nytimes.com/library/tech/98/06/cyber/articles/10smartcard.html(1998, August 25). IBM says encryption system prevents hacker attack. New York Times. Retrieved August 25, 1998, from http://www.nytimes.com/library/tech/98/08/cyber/articles/25encrypt.html(2000, January 5). Attacks on encryption code raise questions about computer vulnerability. New York Times. Retrieved January 5, 2000, from http://www.nytimes.com/library/tech/00/01/biztech/articles/05secu.htm(Filtering Technology1999, January 27). Filtering bill comes to life again in Senate. New York Times. Retrieved January 27, 1999, from http://www.nytimes.com/library/tech/99/01/cyber/education/27education.html(1998, November 23). Judge rules against filters at library. New York Times. Retrieved November 24, 1998, from http://www.nytimes.com/library/tech/98/11/cyber/articles/24library.html(1999, March 10). Schools split on using Internet filters. New York Times. Retrieved March 10, 1999, from http://www.nytimes.com/library/tech/99/03/cyber/education/10education.html(Longevity of Digital Information1999, July 12). History: We're losing it. Newsweek.. (1999, April 8). Books to bytes: the electronic archive. New York Times. Retrieved April 8, 1999, from http://www.nytimes.com/library/tech/99/04/circuits/articles/08arch.html([Page 392]1999, September 30). The post-Y2K bug: Technical obsolescence. Philadelphia Inquirer.(1998, March 16). Digital film restoration raises questions. New York Times. Retrieved March 15, 1998, from http://www.nytimes.com/library/tech/98/03/biztech/articles/16restore.html(1995, January). Ensuring the longevity of digital documents. Scientific American, pp. 42–47.. (New Frontiers of TechnologyAssociated Press. (1998, October 22). Implant transmits brain signals directly to computer. New York Times. Retrieved October 22, 1998, from http://www.nytimes.com/library/tech/98/10/circuits/articles/22brai.htmlAssociated Press. (1999, September 1). Intel introduces new Internet chip. New York Times. Retrieved September 1, 1999, from http://www.nytimes.com/aponline/f/AP-Intel-Internet-Chip.htm2000). How a cell phone works (How Stuff Works). Retrieved January 24, 2000, from http://www.howstuffworks.com/cell-phone.htm. (1992, December 6). The network of all networks. New York Times.(Communications, computers, and networks. (1991, September). Scientific American [Special issue].How a Web page works (How Stuff Works). (2000). Retrieved January 25, 2000, from http://www.howstuffworks.com/web-page.htmHow Web servers and the Internet work (How Stuff Works). (2000). Retrieved January 25, 2000, from http://www.howstuffworks.com/web-server1.htm2000, January 25). Why is everyone jumping on the bandwidth?Jewish Exponent.. (1992). Technology and modern life. In America calling (pp. 1–32). Berkeley: University of California Press.. (2000, May). Music software on the PC. Blueprints [Villanova University publication].(1931). Is television coming around that corner at last? Radio Design, 4(1), 28–34.. (Coming to your desktop: The digital darkroom. (1998, June 10). New York Times. Retrieved June 11, 1998, from http://www.nytimes.com/library/tech/98/06/circuits/articles/11foto-side.htmlOn this day (1915): Phone to Pacific from the Atlantic. (1999, January 25). New York Times. Retrieved January 25, 1999, from http://www.nytimes.com/learning/general/onthisday/990125onthisday_big.html1998, October 1). Behind the lowly mouse: Clever technology close at hand. New York Times. Retrieved October 1, 1998, from http://www.nytimes.com/library/tech/98/10/circuits/howitworks/01how.html(2000, February 3). The case of the flickering pixels. New York Times. Retrieved February 3, 2000, from http://www.nytimes.com/library/tech/00/02/circuits/articles/03read.htm([Page 393]2000, May 15). Newspapers bring threat of Web into perspective. New York Times. Retrieved May 15, 2000, from http://www.nytimes.com/library/tech/00/05/biztech/articles/15medi.html(1999, October 7). Trapped in the Web without an exit. New York Times. Retrieved October 7, 1999, from http://www.nytimes.com/library/tech/99/10/circuits/articles/07tric.htm(Bloomberg News. (1998, November 17). Cable and wireless to build new network. New York Times. Retrieved November 17, 1998, from http://www.nytimes.com/library/tech/98/11/biztech/articles/17cable.html1999, July 12). Broadcaster seeks change in digital TV format. New York Times. Retrieved July 12, 1999, from http://www.nytimes.com/library/tech/99/07/biztech/articles/12hdtv.htm(1998, September 28). Satellites guiding industries on the move. New York Times. Retrieved September 28, 1998, from http://www.nytimes.com/library/tech/98/09/biztech/articles/28find.html(Editorial. (1998, March 4). Mr. Gates takes the stand. New York Times. Retrieved March 3, 1998, from http://www.nytimes.com/yr/mo/day/editorial/04wed1.html1999, December 19). Software evolving into a service rented off the Net. New York Times. Retrieved December 20, 1999, from http://wysiwyg://11/http://www.nytimes.com/libra.../biztech/articles/122099outlook-soft.htm(2000, February 7). New era approaches: Gigahertz chips. New York Times. Retrieved February 7, 2000, from http://www.nytimes.com/library/tch/00/02/biztech/articles/07chip.htm(2000, February 28). AOL, Microsoft, BellSouth announce wireless deals. New York Times. Retrieved February 29, 2000, from http://wysiwyg://70/http://www.nytimes.com/libra...0/02/biztech/articles/29tsc-wireless.htm(1998, March 11). Where do computers go when they die?New York Times. Retrieved March 12, 1998, from http://www.nytimes.com/library/tech/yr/mo/circuits/articles/12die.html(1998, August 20). There's more than one way to scan a bar code. New York Times. Retrieved August 20, 1998, from http://www.nytimes.com/library/tech/98/08/circuits/howitworks/20how.html(2000, April 13). A chip in every pot. New York Times. Retrieved April 13, 2000, from http://wysiwyg://121/http://www.nytimes.co...00/04/circuits/articles/13need.html(1999, February 4). Talk is cheap, if you're careful. New York Times. Retrieved February 4, 1999, from http://www.nytimes.com/library/tech/99/02/circuits/articles/04cell.html(1999, April 15). Web phones: the next big thing?New York Times. Retrieved April 15, 1999, from http://www.nytimes.com/library/tech/99/04/circuits/articles/15mobi.html(1998, November 4). Got a dime? Citibank and Chase end test of electronic cash. New York Times. Retrieved November 4, 1998, from http://www.nytimes.com/library/tech/98/11/biztech/articles/04card.html(1998, November 16). U.S., Japan to set common digital interface. New York Times. Retrieved November 17, 1998, from http://www.nytimes.com/techweb/TW_U_S_Japan_To_Set_Common_Digital_Interface.html([Page 394]Hewlett Packard Labs. (1999, July 15). HP labs scientists are building computer chips in a whole new way. Hewlett Packard. Retrieved July 19, 1999, from http://www.hpl.hp.com/news/molecules_that_compute.htm1999, March 23). Mindless creatures acting “mindfully.”New York Times. Retrieved March 23, 1999, from http://www.nytimes.com/library/national/science/032399sci-cellular-automata.html(1998, December 2). Themescape creates information map. New York Times. Retrieved December 2, 1998, from http://www.nytimes.com/techweb/TW_Themescape_Creates_Information_Map.html(1999, February 24). Nuance expands speech-recognition technology. New York Times. Retrieved February 25, 1999, from http://www.nytimes.com/techweb/TW_Nuance_Expands_Speech_Recognition_Tecnology.html(2000, May 5). Governments learn how to censor the Internet, report says. New York Times. Retrieved May 5, 2000, from http://wysiwyg://87/http://www.nytimes.com...ech/00/05/cyber/cyberlaw/05law.html(1998, November 16). Wireless portable e-mail devices grow up. New York Times. Retrieved November 16, 1998, from http://www.nytimes.com/library/tech/98/11/cyber/articles/16portable.html(2000, January 24). Subways trade No. 2 pencils for 21st-century technology. New York Times. Retrieved January 24, 2000, from http://www.nytimes.com/yr/mo/day/news/national/regional/ny-subway-trains.htm(1999, January 25). High definition comes into focus. New York Times. Retrieved January 25, 1999, from http://www.nytimes.com/techweb/TW_High_Definition_Comes_Into_Focus.html(1999, April 14). Samsung to develop line of wireless chips. New York Times. Retrieved April 14, 1999, from http://www.nytimes.com/techweb/TW_Samsung_To_Develop_Line_Of_Wireless_Chips_html(1990). Silicon Valley: A scenario for the information society of tomorrow. In Mediation, information, and communication (Vol. 3, pp. 193–200). New Brunswick, NJ: Transaction.(1998, June 17). Bigger, faster, more 3-D: The anatomy of the coming PC's. New York Times. Retrieved June 18, 1998, from http://www.nytimes.com/library/tech/yr/mo/circuits/articles/18anat.html(1998, September 10). How fast is your system? Whose test are you using?New York Times. Retrieved September 10, 1998, from http://www.nytimes.com/library/tech/98/09/circuits/articles/10benc.html(1998, December 3). How to kick the tires when buying a computer. New York Times. Retrieved December 3, 1998, from http://www.nytimes.com/library/tech/98/12/circuits/articles/03pete.html(1998, June 10). Shoot first, e-mail photos to Grandma later. New York Times. Retrieved June 11, 1998, from http://www.nytimes.com/library/tech/yr/mo/circuits/articles/11foto.html(1999, September 30). Beyond geography: Mapping unknowns of cyberspace. New York Times.(2000, January). Nonobvious things about new media: “Dead media” and the loss of electronic cultural heritage. International Communication Association Newsletter, 28(1).(2000, March). Nonobvious things about new media: How fast is fast?International Communication Association Newsletter.([Page 395]2000, April 18). Microsoft will challenge Palm's hand-held computer dominance. New York Times. Retrieved April 18, 2000, from http://wysiwyg://36/http://www.nytimes.com.../00/04/biztech/articles/18soft.html(1998, November 17). Microsoft develops software to improve appearance of screen text. New York Times. Retrieved November 17, 1998, from http://www.nytimes.com/library/tech/98/11/biztech/articles/17font.html(1998, September 23). New venture to map Internet 3D. New York Times. Retrieved September 23, 1998, from http://www.nytimes.com/library/tech/98/09/biztech/articles/23internet-map.html(1998, April 13). Researchers crack code in cell phones. New York Times. Retrieved April 14, 1998, from http://www.nytimes.com/library/tech/yr/mo/biztech/articles/14phone.html(1999, July 19). Chip designers search for life after Silicon. New York Times. Retrieved July 19, 1999, from http://www.nytimes.com/library/tech/99/07/biztech/articles/19chip.htm(1999, February 8). One man's dream to spin a faster Web. New York Times. Retrieved February 8, 1999, from http://www.nytimes.com/library/tech/99/02/biztech/articles/08band.html(2000, January 24). Chip innovator bets on brainpower, not battery power. New York Times. Retrieved January 24, 2000, from http://wysiwyg://36/http://www.nytimes.com/library/tech/00/01/biztech/articles/24meta.htm(2000, January 3). Internet pioneer to be named top F.C.C. technologist. New York Times. Retrieved January 3, 2000, from http://www.nytimes.com/library/tech/00/01/biztech/articles/03farb.htm(1998, November 19). As the battery goes, so goes the …New York Times. Retrieved November 19, 1998, from http://www.nytimes.com/library/tech/98/11/circuits/articles/19batt.html(1988). When old technologies were new: Thinking electric communication in the late 19th century. New York: Oxford University Press.. (1998, July 5). It's not the size that counts, but how you measure it. New York Times. Retrieved July 7, 1998, from http://www.nytimes.com/library/tech/98/07/cyber/articles/05big.html(1997, October 7). The complete video desktop. PC Magazine.. (2000, January 3). Albums as mile-posts in a musical century. New York Times. Retrieved January 3, 2000, from http://www.nytimes.com/yr/mo/day/news/arts/albums-century.htm, , , & (1973). Implications of new information technology. Public Opinion Quarterly, pp. 590–600.(1992, October). Your computer revealed: Inside the processor. Macworld.. (1998, October 27). Judge clears way for digital player. New York Times. Retrieved October 27, 1998, from http://www.nytimes.com/library/tech/98/10/cyber/articles/27rio.html(1999, February 22). Microsoft move sparks controversy over standards. New York Times. Retrieved February 22, 1999, from http://www.nytimes.com/library/tech/99/02/biztech/articles/22pate.html(1999, August 23). Multimedia transmissions drive Net toward gridlock. New York Times. Retrieved August 23, 1999, from http://www.nytimes.com/library/tech/99/08/biztech/articles/23tcp.htm([Page 396]1971). Elements of diffusion: An overview. In Communication of innovations (, & (2nd ed., pp. 1–40). New York: Free Press.1990). Introduction: The emergence of information societies. In Mediation, information, and communication (Vol. 3, pp. 185–192). New Brunswick, NJ: Transaction.(1990). Marketplace vs. public utility models for developing telecommunications and information industries. In Mediation, information, and communication (Vol. 3, pp. 253–266). New Brunswick, NJ: Transaction., & (1992, September/October). The public telephone network: Stages in infrastructure development. Telecommunications Policy, pp. 538–552.. (1990). A time-line of information technology. In Mediation, information, and communication (Vol. 3, pp. 395–424). New Brunswick, NJ: Transaction., & (1998, November 16). Meteor storm poses threat to satellites. New York Times. Retrieved November 16, 1998, from http://www.nytimes.com/library/tech/98/11/biztech/articles/16mete.html(2000, January 17). Broadband Internet: How broadly? How soon?New York Times. Retrieved January 17, 2000, from http://www.nytimes.com/library/tech/00/01/biztech/articles/17band.htm(Semiconductor Business News. (1998, November 4). Growth of new wafer technology boosts Ibis. New York Times. Retrieved November 5, 1998, from http://www.nytimes.com/techweb/TW_Growth_Of_New_Wafer_Technology_Boosts_Ibis.html1993). Competing frameworks for research on information-communication technologies and society: Toward a synthesis. In Communication yearbook 16 (pp. 349–380). Newbury Park, CA: Sage., & . (1999, February 22). Coming attractions: Digital projectors could change film industryNew York Times. Retrieved February 22, 1999, from http://wysiwyg://12/http://www.nytimes.com/library/tech/99/02/biztech/articls/22film.html(1999, February 8). A computer program that thinks like a human (almost). New York Times. Retrieved February 8, 1999, from http://www.nytimes.com/library/tech/99/02/biztech/articles/08pros.html(1987). The cable fable revisited: Discourse, policy, and the making of cable television. Critical Studies in Mass Communication, 4, 174–200.. (1998, December 3). Elevator technology: Inspiring many everyday leaps of faith. New York Times. Retrieved December 3, 1998, from http://www.nytimes.com/library/tech/98/12/circuits/articles/03howw.html(TechWeb. (1998, November 15). Intel to put big money into research. New York Times. Retrieved November 16, 1998, from http://www.nytimes.com/techweb/TW_Intel_To_Put_Big_Money_Into_Research.html1999, June 14). Seeking ways to cut the Web-page wait. New York Times. Retrieved June 14, 1999, from http://wysiwyg://20/http://www.nytimes.com/library/tech/99/06/cyber/commerce/14commerce.(Totally typed out. (2000, June 5). Newsweek, p. 8.1998, October 22). Trailing strings of battery packs, a marriage of cyborgs is made. New York Times. Retrieved October 22, 1998, from http://www.nytimes.com/library/tech/98/10/circuits/articles/22mann.html([Page 397]Privacy1998, October 26). European law aims to protect privacy of personal data. New York Times. Retrieved October 26, 1998, from http://www.nytimes.com/library/tech/98/10/biztech/articles/26privacy.html(Associated Press. (2000, January 18). Internet privacy safeguards sought. New York Times. Retrieved January 18, 2000, from http://www.nytimes.com/library/tech/00/01/biztech/articles/18internet-safeguards.htm2000, May 12). Parents remain unclear on online privacy law. New York Times. Retrieved May 12, 2000, from http://www.nytimes.com/library/tech/00/05/cyber/articles/12coppa.html(1997, September 15). High-tech sleuths find private facts online. New York Times. Retrieved March 18, 1998, from http://www.nytimes.com/library/cyber/week/091597privacy.html(1998, April 27). firstname.lastname@example.org. Newsweek.. (2000, June 5). Guarding online privacy. Newsweek.. (1998, June 23). On eve of privacy conference, trade groups jockey for position. New York Times. Retrieved June 22, 1998, from http://www/nytimes.com/library/tech/98/06/cyber/articles/23privacy.html(1998, August 22). Want more online privacy? Join the crowd. New York Times. Retrieved August 24, 1998, from http://www.nytimes.com/library/tech/98/08/cyber/articles/22privacy.html(1999, April 8). Lawmaker plans bill to protect consumer privacy online. New York Times. Retrieved April 8, 1999, from http://www.nytimes.com/library/tech/99/04/cyber/articles/08privacy.html(2000, February 17). Love, honor, cherish. But reveal my password?New York Times.(1998, September). Privacy matters. Brill's Content.. (1999, April 21). U.S. urges new rules to guard privacy of children on Internet. New York Times. Retrieved April 21, 1999, from http://www.nytimes.com/library/tech/99/04/biztech/articles/21privacy.html(1999, April 15). Peekaboo! Anonymity is not always secure. New York Times. Retrieved April 15, 1999, from http://www.nytimes.com/library/tech/99/04/circuits/articles/15pete.html(1999, March 3). A growing compatibility issue in the digital age: Computers and their users' privacy. New York Times. Retrieved March 3, 1999, from http://www.nytimes.com/library/tech/99/03/biztech/articles/03privacy.html(1999, April 29). Intel goes to battle as its embedded serial number is unmasked. New York Times. Retrieved April 29, 1999, from http://www.nytimes.com/library/tech/99/04/biztech/articles/29chip.html(2000, January 27). It's not Big Brother, it's customer service. New York Times. Retrieved January 27, 2000, from http://www.nytimes.com/library/tech/00/01/circuits/articles/27serv.htm(1999, July 21). The two faces of online anonymity. New York Times. Retrieved July 21, 1999, from http://www.nytimes.com/library/tech/99/07/cyber/articles/21anonymity.htm(1998, September 29). Judge throws out request to view cookie files. New York Times. Retrieved September 29, 1998, from http://www.nytimes.com/library/tech/98/09/cyber/articles/29putnam.html([Page 398]Privacy online: A report to Congress. (1998). Federal Trade Commission (FTC). Retrieved August 31, 1998, from http://www.ftc.gov/reports/privacy3/toc.htm2000, June 30-July 2). An intimate invasion. USA Weekend.. (1997, August 25). Invasion of privacyTime.. (1998, December 14). Crusader thwarts invaders of the e-mailbox. New York Times. Retrieved December 14, 1998, from http://www.nytimes.com/library/tech/98/12/biztech/articles/14spam.html(1999, September 23). Nosy Parker lives. New York Times. Retrieved September 23, 1999, from http://www.nytimes.com/library/opinion/safire/092399safi.htm. (1995, January 23). Policing cyberspace. U.S. News & World Report.. (2000, February 7). Critics press legal assault on tracking of Web users. New York Times. Retrieved February 7, 2000, from http://www.nytimes.com/library/tech/00/02/cyber/commerce/07commerce.htm(1998, June 22). Code breaker cracks smart cards' digital safe. New York Times. Retrieved June 21, 1998, from http://www.nytimes.com/library/tech/98/06/biztech/articles/22card.html(2000, March 6). Mind your business. Informationweek.. (Social ImpactAnnenberg Public Policy Center of the University of Pennsylvania. (1999, May 4). National survey shows parents deeply fearful about the Internet's influence on their children [Press release]Washington, DC: Author.1997). Globalization of communication. In Communication research trends (Vol. 17). Saint Louis University, Centre for the Study of Communication and Culture.(2000, February 4). Ford offers workers PC's and Internet service for $5 a month. New York Times. Retrieved February 4, 2000, from http://www.nytimes.com/library/tech/00/02/biztech/articles/04ford.htm(2000, May 16). Cybersex gives birth to a psychological disorder. New York Times.(1998, October 5). Planning the Internet's final privatization. New York Times. Retrieved October 5, 1998, from http://www.nytimes.com/library/tech/98/10/biztech/articles/05domain.html(1999, September 27). Internet governing body needs limits, consumer advocate says. New York Times. Retrieved September 27, 1999, from http://wysiwyg://124/http://www.nytimes.com/library/tech/99/09/cyber/articles.27icann.htm(1999, September 2). The digital brain drain: So many computers, so little interest in hard science. New York Times. Retrieved September 2, 1999, from http://wysiwyg://30/http://www.nytimes.com/library/tech/99/09/biztech/articles/02chem.htm(2000, December 10). Lonely gay teen seeking same. New York Times Magazine.(1999, July). A parent's guide to the TV ratings and V-chip. Washington, DC: Center for Media Education.. ([Page 399]2000, May 11). Study finds Internet of social benefit to users. New York Times.(1999, September 8). Regulators ready to set some rules on Internet campaigning. New York Times. Retrieved September 8, 1999, from http://www.nytimes.com/library/tech/99/09/cyber/articles/08campaign.htm(1998, November 5). From yakety-yak to clackety-clack: What do teen-agers do online? What do they do everywhere else: Talk, talk, talk. New York Times. Retrieved November 5, 1998, from http://www.nytimes.com/library/tech/98/11/circuits.articles/05teen.html. (1998, December 10). Tracking the evolution of e-mail etiquette. New York Times. Retrieved December 10, 1998, from http://www.nytimes.com/library/tech/98/12/circuits/articles/10mail.html(1999, March 18). The Internet's “open sesame” is answered warily. New York Times. Retrieved March 18, 1999, from http://www.nytimes.com/library/tech/99/03/biztech/articles/18riyadh.html(2001, January 22). Seeing a virtual shrink. Newsweek.(1998, September). Deciphering the new V-chip policy. International Communication Association Newsletter, 26(5).. (2000, September). The doctor is on. Elle.(2000, May). Babel and beyond: Languages on the Internet. ICA News.(2000, January 9). Welcome to the Internet, the first global colony. New York Times, Week in Review.. (1999, May 12). Survey indicates increased use of filters. New York Times. Retrieved May 12, 1999, from http://www.nytimes.com/library/tech/99/05/cyber/education/12education.html(More blacks are using Internet, survey finds. (2000, October 23). New York Times.Reuters. (1999, September 18). Another report on “digital divide.”New York Times. Retrieved September 18, 1999, from http://wysiwyg://137/http://www.nytimes.com/library/tech/99/09/biztech/articles/18digital-divide.htm1999, July 9). Report shows increase in “digital divide.”New York Times. Retrieved July 9, 1999, from http://www.nytimes.com/library/tech/99/07/biztech/articles/09internet.htm(2000, February 18). Online but not antisocial. New York Times.(1999, February 22). Black entrepreneurs spread the word about “digital freedom.”New York Times. Retrieved February 22, 1999, from http://www.nytimes.com/library/tech/99/02/biztech/articles/22pros.html(1999, May). The Internet and the family: The view from parents, the view from the press (Report Series No. 27). Philadelphia: Annenberg Public Policy Center of the University of Pennsylvania.. (1998, October 15). It may be snail mail, but technology gets it where it's going. New York Times. Retrieved October 22, 1998, from http://www.nytimes.com/library/tech/98/10/circuits/howitworks/22howw.html(1999, September 1). To professors' dismay, ratings by students go online. New York Times. Retrieved September 1, 1999, from http://wysiwyg://5/http://www.nytimes.com/library/tech/99/09/biztech/articles/01eval.htm([Page 400]Telecommunication1998, September 17). Cutting the phone cord to stick with cellular. New York Times. Retrieved September 17, 1998, from http://www.nytimes.com/library/tech/98/09/circuits/articles/17cell.html(1999, January 28). Everything but a dial: Phone choices. New York Times. Retrieved January 28, 1999, from http://www.nytimes.com/library/tech/99/01/circuits/articles/28phon.html(2000, January 17). AOL deal puts pressure on competition. New York Times. Retrieved January 17, 2000, from http://www.nytimes.com/library/tech/00/01/biztech/articles/17onli.htm(1999, December 7). Researchers crack code in cell phones. New York Times. Retrieved December 7, 1999, from http://www.nytimes.com/library/tech/99/12/biztech/articles/07code.htm(1999, December 20). Wireless industry looks beyond phone. New York Times. Retrieved December 20, 1999, from http://www.nytimes.com/library/biztech/articles/122099outlook-wire.htm(
About the Contributors[Page 413]
Josepha Silman Banschick is a journalist who writes on family issues and child psychology. She has collaborated with Mark R. Banschick on a number of projects, including several textbook chapters, child development spirituality, and the Divorce Course, a course on parenting for divorcing parents.
Mark R. Banschick, M.D., is a child and adolescent psychiatrist in full-time private practice. He is a lecturer and contributing author in the areas of child development and the psychology of moral/spiritual behavior. He is Adjunct Professor at Hebrew Union College, New York, where he teaches in the Doctor of Ministry program, and the cofounder of the Integrated Medicine Study Group in Katonah, New York.
Keith Lee is a second-year law student at Villanova University School of Law in Villanova, Pennsylvania. He is a member of the Villanova Sports and Entertainment Law Journal, the Intellectual Property Society, and the Digital Law Forum. His casenote, “Resolving the Dissonant Constitutional Chords Inherent in the Federal Anti-Bootlegging Statute in United States v. Moghadam,” will appear in an upcoming issue of the Villanova Sports and Entertainment Law Journal. In 1997, he graduated from the University of Maryland with a B.A. degree in government and politics and a B.A. degree in criminology and criminal justice.
Janessa Light graduated from Villanova University School of Law in Villanova, Pennsylvania, in 2000. At Villanova, she served as President of the Villanova Intellectual Property Society for two years and contributed as a student representative on both the Villanova E-mail Policy Task Force and the Villanova Web Publishing Task Force. She received her dual undergraduate degree in rhetoric and communication and sociology from the University of California at Davis, where she graduated magna cum laude.
[Page 414]JoAnn Magdoff received her master's degree in social work from Fordham University and a Ph.D. in anthropology from Princeton University. She pursued postdoctoral training at the Psychoanalytic Center for Training and Research at Columbia University and served as a supervisor in the Doctoral Program in Clinical Psychology at the City University of New York. She was founder and first president of the New York chapter of the American Association of Marriage and Family Therapists. She has also been a private consultant; her clients include international advertising agencies, financial institutions, and utility companies, among others. She is a frequent lecturer and writer on psychology and American culture and is a psychotherapist in private practice in New York City.
Leigh Maxwell (Ph.D., telecommunications, Ohio State University, 1996) publishes research examining the impact of digital technologies on teaching, learning, and intellectual property. She resides in Madison, Wisconsin, where she works as a writer and consultant in private practice.
Thomas A. McCain received his Ph.D. in communication from the University of Wisconsin. He has been on the faculty of the Ohio State University since 1973 and was Director of the Center for Advanced Study of Telecommunications (CAST) from 1990 to 1997. His research examines the relationship between communication technology and society. He is a former editor of the Journal of Broadcasting and Electronic Media and has authored more than 175 scholarly papers, book chapters, and articles, including The 1000 Hour War: Communication in the Gulf (1994). McCain has served as consultant to numerous communication companies, government agencies, and universities in the United States and abroad, including the Ohio Board of Regents and Department of Education.
Katherine Neikirk is a second-year law student at Villanova University School of Law in Villanova, Pennsylvania. She is a member of the Villanova Law Review, the Intellectual Property Society, and the Digital Law Forum. Her casenote, “Squeezing Cyberspace Into International Shoes: When Should Courts Exercise Personal Jurisdiction Over Non-Commercial Online Speech?” will appear in an upcoming issue of the Villanova Law Review. In 1996, she graduated from Oberlin College in Oberlin, Ohio, with a B.A. degree in English.
Judy C. Pearson received her B.A. degree from St. Cloud University and her M.A. and Ph.D. degrees from Indiana University. She has taught in K-12 and at the college level. Her university positions were at Indiana, Bradley, Purdue, Iowa State, Michigan State, and Ohio. She has been both a faculty member and administrator. She is currently a full professor of human development and communication at Virginia Tech. In addition to several books, Pearson has published articles in numerous journals including the Journal of [Page 415]Communication, Communication Monographs, Communication Education, and Adolescence. She has served on the National Communication Association task force on technology and communication with Vinton Cerf, father of the Internet, and U.S. Representative Rick Baucher, originator of the Telecommunications Act of 1996. Pearson is currently Director of the Northern Virginia Center and Associate Dean of the Graduate School of Virginia Polytechnic Institute (VPI) and State University, where she administers the adoption of instructional technology.
Jeffrey B. Rubin practices psychoanalysis and psychoanalytical psychotherapy in New York City and Bedford Hills, New York. He has taught at various psychoanalytic institutes including the Postgraduate Center for Mental Health, the Object Relations Institute, and the C. G. Jung Foundation of New York. He currently teaches at the Harlem Family Institute and the Union Theological Seminary. Rubin is author of Psychotherapy and Buddhism: Toward an Integration and A Psychoanalysis for Our Time: Exploring the Blindness of the Seeing I. He is also author of two forthcoming books, The Art of Living and a new book integrating psychology and spirituality.
Leonard Shyles (Ph.D., communication, Ohio State University) is Associate Professor of Communication at Villanova University in Villanova, Pennsylvania. His publications include journal articles and book chapters analyzing the content and impact of political media in presidential elections and other settings. He is coeditor and coauthor of The 1000 Hour War: Communication in the Gulf (1994), dealing with the use of telecommunication technologies to conduct the war in the Persian Gulf and to provide journalistic coverage of the conflict. Most recently, Shyles has published a comprehensive television production textbook, Video Production Handbook (1997). His current research focuses on understanding digital technology in the contexts of markets and policy.