Skip to main content Accessibility help
×
Hostname: page-component-78c5997874-mlc7c Total loading time: 0 Render date: 2024-11-09T09:28:55.625Z Has data issue: false hasContentIssue false

3 - Peer Production of Survivable Critical Infrastructures

Published online by Cambridge University Press:  18 August 2009

Yochai Benkler
Affiliation:
Professor of Law, Yale Law School
Mark F. Grady
Affiliation:
University of California, Los Angeles
Francesco Parisi
Affiliation:
George Mason University, Virginia
Get access

Summary

INTRODUCTION

Imagine a data storage and retrieval system that stores millions of discrete files in such a way that they can be accessed, searched, and retrieved by millions of users who can access the system wherever they are connected to the Internet. Imagine that this system is under a multipronged attack. Its enemies have used a variety of techniques, ranging from shutting down the main search server under the threat of armed seizure, to inserting malicious files to corrupt the system, to capturing and threatening the operators of storage devices. Imagine that even through all these assaults, the system continues to operate and to provide high-quality storage, search, and retrieval functionality to millions of users worldwide. That would be a system worth studying as a model for cybersecurity, would it not?

That system has in fact been in existence for five years. It has indeed been under the kinds of attacks described over this entire period. It is the peer-to-peer music file–sharing system. It is the epitome of a survivable system. Its primary design characteristic is radically distributed redundant capacity. The primary economic puzzles in understanding whether it is a model that can be harnessed to design survivable systems more generally are these: Why there is so much excess capacity for its core components – storage, processing, and communications capacity, in the hands of many widely distributed users? And how one might replicate it for uses that are somewhat less controversial than sharing music files.

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2005

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Adar, Eytan, and Huberman, Bernard. 2000. Free Riding on Gnutella. First Monday, October. http://ww.firstmonday.org/issues/issue5_10/adar/index.htmlCrossRefGoogle Scholar
Arrow, Kenneth. 1971. Gifts and Exchanges. Philosophy and Public Affairs 1:343Google Scholar
Baran, Paul. 1964. On Distributed Communications. RAND RM-3420. http://www.rand.org/publications/RM/RM3420
Ben-Porath, Yoram. 1980. The F-Connection: Families, Friends and Firms and the Organization of Exchange. Population and Development Review 6:1CrossRefGoogle Scholar
Benabou, Roland, and Jean Tirole. 2000. Self-Confidence and Social Interactions. NBER Working Paper W7585
Benkler, Yochai. 2002a. Coase's Penguin, or Linux and the Nature of the Firm. Yale Law Journal 112:369CrossRefGoogle Scholar
Benkler, Yochai. 2002b. Some Economics of Wireless Communications. Harvard Journal of Law and Technology 16:25Google Scholar
Benkler, Yochai. 2004. On Shareable Goods and the Emergence of Sharing as a Modality of Economic Production. Yale Law Journal 114:273CrossRefGoogle Scholar
Bewley, T. F. 1995. A Depressed Labor Market as Explained by Participants. American Economic Review 85:250Google Scholar
Carrier, James G. 1998. Property and Social Relations in Melanesian Anthropology. In Property Relations, Reviewing the Anthropological Tradition, ed. Hahn, Christoper, 85. Cambridge: Cambridge University PressGoogle Scholar
Clark, Ian, et al. 2000. Freenet: A Distributed, Anonymous Information Storage and Retrieval System. http://citeseer.ist.psu.edu/clarke00freenet.html
Coleman, James S. 1988. Social Capital in the Creation of Human Capital. American Journal of Sociology (Suppl) 94:S95CrossRefGoogle Scholar
Deci, Edward L. 1971. Effects of Externally Mediated Rewards on Intrinsic Motivation. Journal of Personality and Social Psychology 18:105CrossRefGoogle Scholar
Ellison, R. J., et al. 1997. Survivable Network Systems: An Emerging Approach. CMU-SEI Technical Report CMU/SEI-97-TR-013. www.cert.org/research/97tr013.pdf
Federal Communications Commission. 2002. Spectrum Policy Taskforce Report. (Federal Communications Commission Washington, DC)
Fehr, Ernst, and Simon Gechter. 2002. Do Incentive Contracts Undermine Voluntary Cooperation? IERE Zurich Working Paper No. 34
Frey, Bruno S. 1997. Not Just for Money. Boston: Beacon PressGoogle Scholar
Frey, Bruno S.. 2001. Inspiring Economics. Cheltenham, England: Edward Elgar PublishingCrossRefGoogle Scholar
Frey, Bruno S., and Jege, Reto. 2001. Motivation Crowding Theory: A Survey of Empirical Evidence. Journal of Economic Surveys 15:589CrossRefGoogle Scholar
Frey, Bruno S., and Oberholzer-Gee, Felix. 1997. The Cost of Price Incentives: An Empirical Analysis of Motivation Crowding-Out. American Economic Review 87:746Google Scholar
Gneezy, Uri, and Rustichini, Aldo. 2000. A Fine Is a Price. Journal of Legal Studies 29:1CrossRefGoogle Scholar
Godelier, Maurice. 1997. The Enigma of the Gift. Chicago: University of Chicago PressGoogle Scholar
Granovetter, Mark. 1973. The Strength of Weak Ties. American Journal of Sociology 78:1360CrossRefGoogle Scholar
Granovetter, Mark. 1974. Getting a Job. Cambridge, MA: Harvard University PressGoogle Scholar
Hann, C. M. 1998. Introduction. In Property Relations: Renewing the Anthropological Tradition, ed. Hann, Christoper, 23. Cambridge: Cambridge University PressGoogle Scholar
Kunreuther, H., and Easterling, D.. 1990. Are Risk-Benefit Tradeoffs Possible in Sitting Hazardous Facilities?American Economic Review 80:252Google Scholar
Lander, Mark. 2004. Fight against Illegal File-Sharing Is Moving Overseas. New York Times, March 31. Section W, p. 1Google Scholar
Lessig, Lawrence. 2004. Free Culture. East Rutherford, NJ: PenguinGoogle Scholar
Lin, Nan. 2001. Social Capital: A Theory of Social Structure and Action. Cambridge: Cambridge University PressCrossRefGoogle Scholar
Malinowski, Bronislaw. 1922. Argonauts of the Western Pacific. Long Grove, IL: Waveland PressGoogle Scholar
Mauss, Marcel. 1925. The Gift: Forms and Functions of Exchange in Archaic Societies. Trans. I. Cunnison. London: Cohen and WestGoogle Scholar
Myers, Peter. 2001. In Crisis Zone, a Wireless Patch. New York Times, October 4. Section G, Circuits, p. 8Google Scholar
Osterloh, Margit, and Frey, Bruno S.. 2000. Motivation, Knowledge Transfer, and Organizational Form. Organization Science 11:538CrossRefGoogle Scholar
Pucher, John, and Renne, John L.. 2003. Socioeconomics of Urban Travel: Evidence from the 2001 NHTS. Transportation Quarterly 57:49Google Scholar
Rhea, Sean. 2001. Maintenance Free Global Data Storage. IEEE Internet Computing 5:40CrossRefGoogle Scholar
Shirky, Clay. 2000. In Praise of Free-Loading, OReilly Open P2P, December 1. http://www.openp2p.com/pub/a/p2p/2000/12/01/shirky_freeloading.htmlGoogle Scholar
Shirts, Michael, and Pande, Vijay. 2000. Screen Savers of the World Unite!Science 290:1903CrossRefGoogle ScholarPubMed
Titmuss, Richard M.. 1971. The Gift Relationship: From Human Blood to Social Policy. New York: New PressGoogle Scholar
Woodburn, James. 1998. Sharing Is Not a Form of Exchange. In Property Relations: Reviewing the Anthropological Tradition, ed. Hahn, Christoper, 48. Cambridge: Cambridge University PressGoogle Scholar

Save book to Kindle

To save this book to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×