Preface to the First Edition
Introduction: An Emerging Technology
Section One: The National Intranet
Digital Sovereignty: Prerequisite of the National Intranet (Pt. I of III)
Digital Sovereignty: Prerequisite of the National Intranet (Pt. II of III)
What is “Internet Governance Theory?”
Digital Sovereignty: Prerequisite of the National Intranet (Pt. III of III)
Automation and Economic Planning (Pt. I of II)
Automation and Economic Planning (Pt. II of II)
Social Forums: A Digitalization of Council Democracy (Pt. I of II)
Social Forums: A Digitalization of Council Democracy (Pt. II of II)
Should the Council State fund Gaming and Animation Industries? (Pt. I of II)
Should the Council State fund Gaming and Animation Industries? (Pt. II of II)
Work-Standard Analysis of Second Life (Pt. I of II)
Work-Standard Analysis of Second Life (Pt. II of II)
The Three Webs of the WWW
Other Justifications for the Dark Web?
Section Two: Philosophy and Theory
Introduction to “The 1999 Scenario”
Basic Premises
Hamiltonianism in Words, Jeffersonianism in Deeds (Pt. I of III)
Hamiltonianism in Words, Jeffersonianism in Deeds (Pt. II of III)
Hamiltonianism in Words, Jeffersonianism in Deeds (Pt. III of III)
“Tournament” and “Market”: National Institutions or Civil Societies?
Digitalizing the Modes of Production
Digitalizing Economic Governance Models
Digitalizing Economic Organization Models
Arbeit begetting Arbeit (Pt. I of II)
Arbeit begetting Arbeit (Pt. II of II)
Roles of Artificial Intelligence in LCFIs and NSFIs
State Development of National Culture
On the Flow of Information
International Relations between SSEs and their Central Governments
“Cyberdefense,” “Cybersecurity,” and Military Conscription
Section Three: RTV and WTM in the Digital Realm
Organizational Structure of the Social Forum
Political Functions of Social Forums
Economic Functions of Social Forums
The “Social” Aspect of Social Forums
The Conduct of MTEP on the National Intranet
Applications of the COAB and WSA on the National Intranet (Pt. I of III)
Applications of the COAB and WSA on the National Intranet (Pt. II of III)
Applications of the COAB and WSA on the National Intranet (Pt. III of III)
Computer Malware as Cyberweaponry
Cyberdefensive Readiness