Information to Users

Total Page:16

File Type:pdf, Size:1020Kb

Information to Users INFORMATION TO USERS This manuscript has been reproduced from the microfilm master. UMI films the text directly from the original or copy submitted. Thus, some thesis and dissertation copies are in typewriter face, while others may be from any type of computer printer. The quality of this reproduction is dependent upon the quality of the copy submitted. Broken or indistinct print, colored or poor quality illustrations and photographs, print bleedthrough, substandard margins, and improper alignment can adversely affect reproduction. In the unlikely event that the author did not send UMI a complete manuscript and there are missing pages, these will be noted. Also, if unauthorized copyright material had to be removed, a note will indicate the deletion. Oversize materials (e.g., maps, drawings, charts) are reproduced by sectioning the original, beginning at the upper left-hand comer and continuing from left to right in equal sections with small overlaps. Each original is also photographed in one exposure and is included in reduced form at the back of the book. Photographs included in the original manuscript have been reproduced xerographically in this copy. Higher quality 6” x 9” black and white photographic prints are available for any photographs or illustrations appearing in this copy for an additional charge. Contact UMI directly to order. UMI A Bell & Howell Information Company 300 North Zeeb Road, Ann Arbor MI 48106-1346 USA 313/761-4700 800/521-0600 PRIVACY-IMPLICATED SYSTEM DESIGN IN THE VIRTUAL MARKETPLACE DISSERTATION Presented in Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy in the Graduate School of the Ohio State University By Huichuan Liu, B.A., M.A. ***** The Ohio State University 1996 Dissertation Committee: Approved by P Professor Rohan Samarajiva, Adviser Professor Susan Kline Adviser Department of Communication Professor Joseph Pilotta UMI Number: 9639290 Copyright 1996 by Lxu, Huichuan All rights reserved. UMÏ Microform 9639290 Copyright 1996, by UMI Company. All rights reserved. This microform edition is protected against unauthorized copying under Title 17, United States Code. 300 North Zeeb Road Ann Arbor, MI 48103 Copyright by Huichuan Liu 1996 ABSTRACT This dissertation assesses design elements with privacy implications in consumer-market oriented electronic trading networks (ETNs) on the World Wide Web (WWW). The increasing popularity of interactive technologies is in part a response to growing demand by firms for the means to sustain lasting, constructive relationships with customers in the context of the trend toward mass customization. Yet the same technologies are potentially invasive of consumer privacy. Rising concerns of privacy associated with interactive networks such as the internet, including information security and consumer surveillance, are likely to affect the levels of consumers’ trust in ETNs and vendors, and thereby the quality of ETN-mediated commercial relationships. As the WWW evolves into an interactive virtual marketplace, ETN designs that effectively reconcile possible conflicts between vendors’ interests in consumer surveillance and consumers’ interests in privacy are important to the success of electronic commerce in interactive systems. This dissertation investigates how structural integration between ETN providers (ETNPs), vendors and payment system operators shapes privacy- friendly ETN system design. Necessary conceptual tools are developed. Types of customer information with privacy implications are defined. Design ii parameters of ETNs pertaining to three main phases of the trading cycle are elaborated. Privacy-implicated ETN design features are identified and a typology of ETNs is developed. Baselines of information essential for the completion of transactions using different payment systems are established. Six case studies fi'om three structurally variant types of ETNs on the WWW are conducted to illuminate the possible effects of different degrees of structural integration on privacy-fiiendly system design. Research results do not show a definite relationship between structural integration and privacy-friendly ETN design. Structural integration alone cannot determine the privacy-fiiendliness of ETNs by type, but must be examined in conjunction with other factors, such as knowledgeability of ETNPs, vendors and consumers. Factors such as the type of payment systems, and ETNPs’ sensitivity to customer privacy, appear to be at work in shaping privacy-friendly ETN environments. Merely providing privacy- fiiendly ETN systems may not be enough; ETNPs may have to convince current and potential customers that their privacy concerns are being addressed. m For the Memory of My Father & To My Mother IV ACKNOWLEDGMENTS I am deeply grateful to Dr. Rohan Samarajiva, my adviser, for his guidance and insight throughout this research, and for his persistence and patience in nurturing me intellectually. I thank Dr. Susan Kline for her critical comments and enthusiasm for this project. I also thank Dr. Joseph Pilotta and Dr. Neelam Soimdarajan for their suggestions and comments, and Dr. Stephen Acker and Dr. Dirk Scheerhom for their comments in early drafts of this dissertation. Thanks also go to Rick SoUer for his detailed readings of draft chapters. I want to thank my mother whose endless love and support have sustained me through the journey of pursuing my dreams. Although it has been six years since my father passed away, I want to tell him that his love is something for which I will remember forever. I also thank my husband, Ben, for his enduring patience throughout the years of this process. Finally, I am indebted to Dr. Yaly Chao, my dear fiiend, for trusting me and supporting me emotionally and intellectually. Without her, I would not finish this project by now. VITA April 28; 1965 ........................................ Bom - Kaohsiiing, Taiwan, E.O.C. 1987 ........................................................ B. A. Political Science, National ChengChi University, Taipei, Taiwan, R.O.C. 1990 ........................................................ M. A. Communication, The Ohio State University FIELDS OF STUDY Major Field: Communication VI TABLE OF CONTENTS Pagê Dedication............................................................... iv Acknowledgments ......................................................................................... v V ita................. vi List of Tables...................................................................... x List of Figures .................................................................................................... xii Chapters 1. Introduction ................. 1 1.1 Problem statement .................................................................. 1 1.2 Research questions............................................................................ 11 1.3 Explication of key term s ................................................................... 11 1.4 Rationale.............................................................................................. 14 1.5 Literature Review.................................................................................16 1.5.1 On trading networks ............................. 16 1.5.2 On electronic commerce in networked trade environments .................................................................. 23 1.6 Organization of the dissertation ........................ 25 2. Conceptual considerations ...................................... 27 2.1 Introduction .................................................................................. 27 2.2 Telecommunication network design ..................................................28 2.3 Information security, surveillance and privacy............................. 31 2.3.1 Information security .............................................................. 31 2.3.2 Surveillance................................................................ 34 2.3.3 Privacy ..................... 39 2.4 Trust....................................................................................................... 43 2.5 Sununary ...................................................... 54 vn 3. A typology of consumer market-oriented electronic trading networks on the internet.......................................................................................56 3.1 Introduction ...................................................................... 56 3.2 Overview..................................................................................... 56 3.3 Major agents in the ETN.................... 57 3.4 Types of information ............................. 58 3.5 Design parameters...................................................................... 61 3.6 Privacy-implicated design features ................................ 66 3.7 Ideal types of ETNs ..................................................... 70 3.8 Baselines for privacy-implicated ETN system design ................. 74 4. Methods............................................................................................... 81 4.1 Introduction......................... 81 4.2 Data collection procedures......................................... 81 4.2.1 Case selection procedures ..................................... 81 4.2.2 Sources of data................................... 85 5. Type 2 electronic trading networks ....................................................... 87 5.1 Introduction..................................................................... 87 5.2 The
Recommended publications
  • Why We Should Consider the Plurality of Hacker and Maker Cultures 2017
    Repositorium für die Medienwissenschaft Sebastian Kubitschko; Annika Richterich; Karin Wenz „There Simply Is No Unified Hacker Movement.“ Why We Should Consider the Plurality of Hacker and Maker Cultures 2017 https://doi.org/10.25969/mediarep/1115 Veröffentlichungsversion / published version Zeitschriftenartikel / journal article Empfohlene Zitierung / Suggested Citation: Kubitschko, Sebastian; Richterich, Annika; Wenz, Karin: „There Simply Is No Unified Hacker Movement.“ Why We Should Consider the Plurality of Hacker and Maker Cultures. In: Digital Culture & Society, Jg. 3 (2017), Nr. 1, S. 185– 195. DOI: https://doi.org/10.25969/mediarep/1115. Erstmalig hier erschienen / Initial publication here: https://doi.org/10.14361/dcs-2017-0112 Nutzungsbedingungen: Terms of use: Dieser Text wird unter einer Creative Commons - This document is made available under a creative commons - Namensnennung - Nicht kommerziell - Keine Bearbeitungen 4.0 Attribution - Non Commercial - No Derivatives 4.0 License. For Lizenz zur Verfügung gestellt. Nähere Auskünfte zu dieser Lizenz more information see: finden Sie hier: https://creativecommons.org/licenses/by-nc-nd/4.0 https://creativecommons.org/licenses/by-nc-nd/4.0 “There Simply Is No Unified Hacker Movement.” Why We Should Consider the Plurality of Hacker and Maker Cultures Sebastian Kubitschko in Conversation with Annika Richterich and Karin Wenz Sebastian Kubitschko is a postdoctoral researcher at the Centre for Media, Communication and Information Research (ZeMKI) at the University of Bremen in Germany. His main research fields are political communication, social movements and civil society organisations. In order to address the relevance of new forms of techno-political civic engagement, he has conducted qualitative, empirical research on one of the world’s oldest and largest hacker organisations, the Chaos Computer Club (CCC).
    [Show full text]
  • Home Computer on the Line - the West German BBS Scene and the Change of ­Telecommunications in the 1980S
    Home Computer on the Line - The West German BBS Scene and the Change of Telecommunications in the 1980s Matthias Röhr 1. Introduction On the evening of 16th June 1987, the system operators of five German bulletin board systems (BBS) received unexpected visitors. Accompanied by the police, officials of the “Deutsche Bundespost” (Federal Post Office) searched the homes of the juvenile computer enthusiasts for evidence of violations of the “Fernmeldeanlagengesetz” (Telecommunications Device Act), in particular the connection of modems or acoustic couplers to the telephone line without official postal approval. The postal officials seized the devices and the home computers (Chaos Computer Club 1987). The young people visited by the Bundespost had experimented with their home computers. They had connected them to the telephone net- work to enable other home computer owners to call them and exchange data and texts via the telephone line. Thus, the home computer was no longer just an isolated device, but a communication tool from which the callers could connect to each other. On such a bulletin board system, home computer users could exchange files, have discussions and gain ac- cess to information otherwise difficult to get. For some politically-minded computer enthusiasts of the 1980s like the members of the Chaos Computer Club in Hamburg, BBS seemed the ideal medium for a “digital counterpublic”. BBS were a freely accessible and non-censorable medium, ideal for publishing politically relevant in- formation which otherwise would have remained unpublished. BBS and Media in Action | Issue 1/2017 | http://mediainaction.uni-siegen.de 116 Thematic Focus : Fundaments of Digitisation electronic telecommunication therefore had a huge democratic potential for them.
    [Show full text]
  • IIS Security and Programming Countermeasures
    IIS Security and Programming Countermeasures By Jason Coombs ([email protected]) Introduction This is a book about how to secure Microsoft Internet Information Services for administrators and programmers whose work includes a requirement for information security, a computer industry specialty field commonly referred to as infosec. In this book the terms information security and infosec are used interchangeably with the more friendly term data security. This is not a book about hacking, cracking, and the tools and techniques of the bad guys, the so-called black hat hackers. This book teaches computer professionals and infosec specialists how to build secure solutions using IIS. It is your duty to secure and defend networked information systems for the benefit of the good guys who are your end users, clients, or less technical coworkers. There is nothing you can do that will transform a programmable computer running Microsoft Windows from its vulnerable condition to an invulnerable one. Every general purpose programmable computer is inherently vulnerable because it is controlled by software and is designed to allow new software to be installed or executed arbitrarily. Network computing based on programmable general purpose computers will never be safe from an information security perspective. Eliminating the feature of general purpose programmability from a networked computer and replacing its software with firmware reduces but does not eliminate vulnerabilities. These are immutable realities of present day computing and, as always, reality represents your biggest challenge. Microsoft is in business to get as much of your money as possible using whatever means will work at a given moment and in this respect they know virtually no equal in the software business.
    [Show full text]
  • Computer Malpractice and Other Legal Problems Posed by Computer Vaporware
    Volume 33 Issue 5 Article 4 1988 Computer Malpractice and Other Legal Problems Posed by Computer Vaporware Ronald N. Weikers Follow this and additional works at: https://digitalcommons.law.villanova.edu/vlr Part of the Computer Law Commons, Contracts Commons, and the Torts Commons Recommended Citation Ronald N. Weikers, Computer Malpractice and Other Legal Problems Posed by Computer Vaporware, 33 Vill. L. Rev. 835 (1988). Available at: https://digitalcommons.law.villanova.edu/vlr/vol33/iss5/4 This Comment is brought to you for free and open access by Villanova University Charles Widger School of Law Digital Repository. It has been accepted for inclusion in Villanova Law Review by an authorized editor of Villanova University Charles Widger School of Law Digital Repository. Weikers: Computer Malpractice and Other Legal Problems Posed by Computer V 1988] "COMPUTER MALPRACTICE" AND OTHER LEGAL PROBLEMS POSED BY COMPUTER "VAPORWARE" I. INTRODUCTION The computer hardware' and software 2 trade is extremely compli- cated in that manufacturers, distributors and retailers must contend with thousands of available computer systems and parts, various financing and pricing concerns, training and retaining salespeople and much more.3 Nonetheless, the picture has recently become further clouded by 1. The term "computer hardware" describes the physical computer equip- ment. Typically, the hardware comprising a "personal computer system" con- sists of a "central processing unit"-the main body of the computer housing the processing circuitry and disk drives-, a video display monitor, and a printer. See Note, Copyright Infringement of Computer Programs: A Modification of the Substantial Similarity Test, 68 MINN. L. REV. 1264, 1264 n.1 (1984); Management Sys.
    [Show full text]
  • Mighty Number 9 and the Ethics of Kickstarter on July 18Th, 2011
    Spring 2016 | ADES 5515 Logan McLaughlin The Legend Never Dies, or Gets a Full Release: Mighty Number 9 and the Ethics of Kickstarter On July 18th, 2011 Capcom disappointed many fans of their iconic Mega Man series by announcing the cancellation of the most recent installment in the series: Mega Man Legends 3. Legends 3 had been in development for less than a year and was apparently close to having a finished Alpha build, an early playable version of the game. More importantly, lead producer Keiji Inafune had approved an interesting design process by opening a multi-national development forum to solicit ideas from carefully selected fans. I was among those on the developer forums who took part in surveys and design sessions for various mechanics and design implementations. When the game was cancelled I, like many others, had to accept that the Mega Man series was officially dead. Hope came in 2013 in the form of a Kickstarter for a new game developed independently from Capcom by Inafune himself under the banner of his new company Comcept LLC. What was promised to fans was a re-imagining of the classic 2D side scrolling Mega Man games so many had known and loved over the years. The title of this game was Mighty Number 9. The game reached its $900,000 USD target in two days, and by the end of the month-long Kickstarter campaign had raised a total of $3,845,170 USD. After the campaign, the game had a period of extended PayPal donations ultimately ending with a grand total of $4,046,579 USD raised.
    [Show full text]
  • 1. in Practice, There Are Two ...Of Detergents A. Predictions B
    In the name of God English for the students of IT Summer Term 14/6/1389 Choose the letter of correct answer and mark it on your answer sheet accordingly ﺗﻌﺪاد ﺳﻮال: 50 وﻗﺖ: هﻔﺘﺎد دﻗﻴﻘﻪ . ﻧﻤﺮﻩ ﻣﻨﻔﯽ دارد 1. In practice, there are two .......... of detergents d. described a. predictions 9. Since they both spoke simultaneously, I could not b. manipulations figure out what they were saying. The word c. evolutions SIMULTANEOUSLY is synonymous with the word d. categories* .......... a. real-time* 2. I want you to tell me the .......... truth, and nothing b. interrelated but the truth. c. instead a. tolerable d. distant b. illustrative c. approximate 10. The instructions faxed to us were garbled. We d. absolute* could not follow them. The word GARBLED is synonymous with the word .......... 3. The government .......... a new program for the a. removed improvement of the economy. b. rebuilt a. intervened c. corrupted* b. interacted d. changed c. initiated* d. extended 11. Many people regard ARPANET as the precursor of the internet. The word PRECURSOR is 4. Ram is also known as .......... memory. synonymous with the word .......... a. volatile* a. limitation b. removable b. forerunner* c. permanent c. complement d. critical d. amusement 5. .......... me those CDs over there, please. 12. Teachers disseminate knowledge to their students. a. quantify The word DISSEMINATE is synonymous with the b. manipulate word .......... c. locate a. record d. fetch* b. receive c. distribute* 6. She was .......... for the loss of her arm in the d. add accident. a. increased 13. Which of the following is a proper noun? b.
    [Show full text]
  • Proceedings of the 1981 Clinic on Library Applications of Data
    RICHARD H. VEITH Manager Video Information Systems Logica, Inc. New York, New York Videotex The New Information Systems Introduction Videotex and teletext are terms that are becoming harder and harder to define, and it is usually necessary to begin by explaining what the terms originally meant. Videotex has been used to refer to computerized informa- tion/entertainment systems using telephone lines to tie home television sets to computers. Teletext has been used to refer to computerized informa- tion/entertainment systems that send data to home television sets by encoding the data into unused portions of a television signal. At the receiving end the television set both videotex and teletext can look identical. And both, from the beginning, employed color and graphics as distinguishing characteristics. However, both systems are still evolving technically and conceptually. Newer systems have been developed (for example, on cable television installations) which incorporate a little bit of both, as well as features of traditional timesharing computer systems. In many cases, the termf ideo- tex is used to refer to all of these systems that are designed to bring digital data to television sets or television monitors, usually using color and graphics. Background Since the 1960s, it has been recognized that the computer and telecom- munications industries were overlapping more and more. Computer power has become widely accessible via telecommunications, and telecom- munications techniques and methods have become computerized. Infor- mation services in the form of large online databases, both public and 74 VIDEOTEX 75 private, grew during the 1970s into worldwide systems offering access to millions, perhaps billions, of items of digitally stored data.
    [Show full text]
  • Vaporware: Imaginary High-Tech Products and Real Antitrust Liability
    Vaporware: Imaginary H-igh-Tech Products and Real Antitrust Liability in a Post-Chicago World ROBERT PRBNTICE* I. INTRODUCTION In rejecting a consent decree in the antitrust case United States v. Microsoft Corp.,1 Judge Stanley Sporkin noted that "vaporware," the high- technology industry's marketing ploy of preannouncing products that do not exist at the time of the announcement and may never come into existence in anything like their described form,2 "is a practice that is deceitful on its face and everybody in the business community knows it." 3 In part because of his misgivings about Microsoft Corporation's alleged * University Distinguished Teaching Professor and Ed and Molly Smith Centennial Professor of Business Law, Graduate School of Business, University of Texas, Austin, Texas. 1 159 F.R.D. 318 (D.D.C. 1995), rev'dper curiam, 56 F.3d 1448 (D.C. Cir. 1995). The original complaint charged Microsoft with violating sections 1 and 2 of the Sherman Act in the market for personal computer operating systems for the x86 class of microprocessors. The complaint attacked three of Microsoft's marketing practices: (a) "per processor" licenses by which Microsoft required original equipment manufacturers (OEMs) to pay a royalty for each computer the OEM sold regardless of whether it contained a Microsoft operating system; (b) "minimum commitments" distribution practices whereby Microsoft induced OEMs to commit to buy a minimum number of units of Microsoft operating systems under circumstances making it economically unattractive to install any non-Microsoft system; and (c) use of non-disclosure agreements (NDAs) to discourage independent software developers (ISVs) from developing applications for competing operating systems.
    [Show full text]
  • Videotex in Europe Conference Proce!Edings
    ORGANISED BY THE COMMISSION OF THE EUROPEAN COMMUNITIES Videotex in Europe Conference ProcE!edings Edited by Carlo Vernimb and William Skyvington With a preface by Georges Anderla Learned Information Oxford and New York Videotex in Europe I ' ; v· : -;:· Proceedings of th~ • ~ideotex 1n Europe ~ Conference Luxembourg 19-20 July 1979 Organ1sed by the COMMISSION OF THE EUROPEAN COMMUNITIES Edited by Carlo Vernimb and William Skyvington ' ~ ~ ~ With a preface by Georges Anderla (Learned Information 1980 Oxford and New York ', \\ ·J Videotex in Europe © ECSC, EEC, EAEC, Brussels and Luxembourg, 1980 All rights reserved ISBN 0 904933 22 9 Published by Learned Information (Europe) Ltd. Learned Information Besselsleigh Road The Anderson House Abingdon Stokes Road Oxford OX1 3 6 EF Medford, N.J. 08055 England U.S.A. (~co:Y) - tYI · (. :;r.,{ IV Contents Page PREFACE Mr. G. Anderla, Director - Information Management (CEC Directorate General XIII) v1i EDITORS' NOTE 1x OPENING OF THE CONFERENCE Mr. R.K. Appleyard, D1rector General- Sc1ent1f1c and Techn1callnformat1on and Information Management (CEC Directorate General XIII) INTRODUCTION TO THE STUDIES Mr. C. Vern1mb, Co-ordmator - New Information Technologies (CEC Directorate General XIII) 3 TERMINOLOGY 5 LECTURE: "Videotex Development in the Community" Mr. M. Kohn, (Telesystemes, Pans) 7 TEXT: "Videotex/Euronet Compatibility" [summanzed extracts from the study report] (Telesystemes, Pans) 22 LECTURE: "Videotex Development outside the Community" Mr. R. Woolfe (Butler, Cox & Partners, London) 44 DISCUSSION - Session No. 1 51 LECTURE: "Videotex Market in the Community" Mr. H.D. Scholz (Pactel, Frankfurt) 63 TEXT: "Videotex Market and Display Study" [summaned extracts from the study report] (PA Management Consultants, Frankfurt) 75 LECTURE: "Market for Videotex Business Terminals" Mr.
    [Show full text]
  • Afterword: Omissions,Additions, and Corrections
    Afterword: Omissions,Additions, and Corrections The astute reader will notice that I’ve omitted a few online services. Some were so short-lived or of so little consequence that they would be meaningless to most readers. Others are beyond the theme or time frame of this book. Some of the omissions: ᭿ ABI/INFORM (Abstracted Business Information), a database of abstracted information from selected business publications, hosted by ORBIT, Dialog, and eventually UMI/ProQuest ᭿ Data Courier, a small online service hosted by the Louisville Courier- Journal (the owners of which bought ABI/INFORM under the company name “Data Courier”) ᭿ EasyLink, Western Union’s now-defunct email/FAX/mail system ᭿ Easynet, a front end for more than 700 database services ᭿ EasyPlex, a specialized CompuServe email service ᭿ E-COM, the United States Postal Service’s electronic messaging service (EMS) ᭿ Freenet, free BBSs in cities such as Cleveland and Rochester that used the same software and were designed to serve as community centers ᭿ Info-Look, a gateway to online services hosted by Nynex ᭿ Internet Relay Chat (IRC), the first implementation of real-time chatting via the Internet (Jarkko Oikarinen, 1988) ᭿ Knowledge Index (KI), a subset of Dialog databases ᭿ The Microsoft Network (MSN), more an ISP than online service that started after Bill Gates decided that the Internet was going to be important, after all 177 178 Afterword ᭿ MIX, the McGraw-Hill Information Exchange, a CoSy-based service for educators ᭿ NABU Network, a Canadian online service that operated
    [Show full text]
  • Self-Colonizing Eeurope
    Self‐Colonizing eEurope: The Information Society Merges onto the Information Superhighway STEPHANIE R. SCHULTE The 2002 German film Halbe Miete (Half the Rent) follows a computer hacker in his thirties named Peter as he “unplugs,” that is, as he makes the conscious decision to live his life off‐line.1 The gaunt hacker emerges from his darkened computer room to discover that his girlfriend has died in their apartment under ambiguous circumstances. Distraught, he puffs a cigarette in a daze until his cellular telephone rings and frightens him; instead of answering, Peter flips the phone over, removes the data chip from the back, and burns the chip with his cigarette. In this moment, Peter literally and symbolically destroys his means of digital communication and deliberately disconnects from telecommunications networks; in Peter’s words, “I am no longer reachable.” In few American films about the internet in the 1990s or early 2000s does a main character decide to unplug, or completely disengage.2 Instead, the main characters in films like The Matrix and The Net almost always battle with evil forces over control of the internet, ultimately using the technology as a weapon with which to defeat their foe. In short, in American film, “winning” means mastery of the internet, not avoidance or rejection. Although American films far outsell German films in Germany, even domestic German‐language films like Halbe Miete, this alternative representation suggests that the internet was “thinkable” in different terms in Germany and that a certain anti‐internet sentiment made sense. As German cultural studies has shown, this skepticism toward technology stemmed in part from Germany’s legacy of anticapitalism, meaning that technology became equated with the capitalist domination critiqued by German thinkers.3 This comparative article is about the varying national imaginings of the internet in Europe and the United States, how they intersected with and were promoted by different policies regulating the technology.
    [Show full text]
  • The Thick of the Fray: Open Source Software in Libraries in the First Decade of This Century 2 R E B by K.G
    Special Section The Thick of the Fray: Open Source Software in Libraries in the First Decade of this Century 2 r e b by K.G. Schneider m u N , Open Source Software in Libraries 5 3 e he library community has been a-buzz of late about open source rooms – has gotten into the game. OCLC’s Developer’s Network now m u l o software (OSS). The air is thick with wildly divergent opinions of its collaborates in an “open source, code-sharing infrastructure” in which library V – value and utility for libraries even as wikis, blogs, conferences and developers, among other things, “share software code with other network 9 0 T 0 journal articles about OSS flood the library attention-economy. members and the community-at-large in an open source environment” [1] . 2 y r a u n a J / The Body Count r To no one’s surprise, a raw “body count” of libraries using open source What Is Free? e The chattering classes have been busy with OSS. At one extreme, skeptics b m integrated library systems indicates that the vast majority of libraries e condemn OSS as a low-grade, poor-man’s substitute for licensed software c e continue to rely on legacy proprietary systems. However, awareness of OSS D and argue that libraries are better served with off-the-shelf proprietary – y as a potentially viable approach for library technology is much more products. At the other extreme, OSS evangelists intimate it can cure cancer, g o l o widespread and growing, particularly as libraries use and become dissolve cellulite and always out-perform any other software.
    [Show full text]