880 lines
39 KiB
Plaintext
880 lines
39 KiB
Plaintext
|
|
Computer underground Digest Wed Jan 18, 1995 Volume 7 : Issue 04
|
|
ISSN 1004-042X
|
|
|
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|
Archivist: Brendan Kehoe
|
|
Retiring Shadow Archivist: Stanton McCandlish
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Copy Reader: Laslo Toth
|
|
|
|
CONTENTS, #7.04 (Wed, Jan 18, 1995)
|
|
|
|
File 1--GIF Tax Rumors- Threat or Menace? (Resp #1)
|
|
File 2--Re CuD 7.02 - Compuserv/Unisys GIF tax
|
|
File 3--The InterNewt
|
|
File 4--cu in the news
|
|
File 5--INFORMATION ACCESS: Not Just Wires (fwd)
|
|
File 6-- Re: COOCS'95 Deadline extended until January 30C
|
|
File 7--**How do I protect my program??**
|
|
File 8--Comment on D. Batterson's article (CuD 6.106)
|
|
File 9--Cu Digest Header Information (unchanged since 25 Nov 1994)
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
----------------------------------------------------------------------
|
|
|
|
Date: Thu, 12 Jan 1995 14:12:31 -0600
|
|
From: /G=Brad/S=Hicks/OU1=0205465@MHS-MC.ATTMAIL.COM
|
|
Subject: File 1--GIF Tax Rumors- Threat or Menace? (Resp #2)
|
|
|
|
Date: 1/12/95 1:06 PM
|
|
Subj: GIF Tax Rumors: Threat or Menace?
|
|
|
|
For those of you who haven't been reading your email lately, or who have
|
|
managed to escape the net's Crisis of the Month Club, on December 28th
|
|
CompuServe issued an unnecessarily tangled, poorly worded press release
|
|
that contained the words "patent," "GIF," "royalty," and "CompuServe."
|
|
Pat Clawson, the President and CEO of TeleGraphix Communications Inc.,
|
|
spread the word to the world, along with his own interpretation.
|
|
|
|
For the next two weeks, all "the usual places" on the net (CompuServe's
|
|
GRAPHSUPPORT forum, Telecom Digest, Computer underground Digest, and
|
|
various UseNet newsgroups) exploded with scads of non-lawyers'
|
|
interpretations of a document that was clearly written (or at least
|
|
approved) by lawyers.
|
|
|
|
Serveral days ago, CompuServe issued another statement, clarifying the
|
|
whole mess. If I may abstract it:
|
|
|
|
1) The GIF image format, which CompuServe invented and promoted, uses
|
|
LZW compression to bring down the image size.
|
|
2) At the time, CompuServe was under the impression that LZW was public
|
|
domain. In fact, it was (being?) patented by Unisys.
|
|
3) Unisys wants its dough. Any package which uses LZW compression or
|
|
decompression, including anything that can make or display a GIF
|
|
image,
|
|
infringes on their patent.
|
|
4) CompuServe negotiated a pass-through agreement: for a nominal sum per
|
|
copy sold, you can sublicense the LZW/GIF code from CompuServe.
|
|
5) However, the terms of CompuServe's agreement with Unisys require that
|
|
they only sub-license software that was written specifically to
|
|
communicate with CompuServe.
|
|
6) If that =isn't= what your software is for, then you need to negotiate
|
|
your =own= agreement with Unisys for the offending LZW routines, or
|
|
stop selling software that uses them.
|
|
|
|
In his January 2nd screed, Pat Clawson of TeleGraphix misinterprets points
|
|
four through six above. His interpretation, which is now ricocheting
|
|
around the net, argues that GIF is now legally restricted to CompuServe
|
|
only. Nothing could be farther from the truth.
|
|
|
|
Of course, Pat Clawson is not without fiscal interest in this controversy,
|
|
either. Within a day or so of his first call to arms, his company had
|
|
offered a competing spec, called GEF. Of course, at first his would be
|
|
the only software that could read it, which is always good for the ol'
|
|
market share, eh Pat? Oh, except now he's promoting yet another graphics
|
|
standard, RIPScript ... as evidenced by the fact that his Internet email
|
|
address has changed from PATCLAWSON@telegraphix.com to
|
|
rip.support@telegraphix.com.
|
|
|
|
On top of that, four days later Unisys' Public Relations department made
|
|
an announcement in CompuServe's GRAPHSUPPORT forum that is even better
|
|
news.
|
|
|
|
7) Unisys only wants to charge royalties from communications software
|
|
vendors who are charging a fee for software intended to connect to a
|
|
commercial online service.
|
|
8) Unisys explicitly says that they will not charge a royalty for "non-
|
|
commercial, non-profit GIF-based applications, including those for
|
|
use on the on-line services" or for "non-commercial, non-profit
|
|
offerings on the Internet, including +Freeware+."
|
|
9) They also made it pretty clear that they won't charge for selling
|
|
images, whether via World Wide Web pages, CompuServe fora, or local
|
|
bulletin boards. It's the software vendors whose software =makes=
|
|
the images who'll have to pay.
|
|
|
|
In other words, unless you =sell= =communications software= specifically
|
|
for connecting to =commercial online services= such as CompuServe or
|
|
America Online, and your software displays GIFs, you'll have to pay a
|
|
royalty. CompuServe estimates that the royalty will work out to around 11
|
|
cents per copy of the software sold. If you want to explore alternatives
|
|
to sub-licensing from CompuServe, or you want to make sure that you are
|
|
covered, email lzw_info@unisys.com and =ask them=.
|
|
|
|
Everybody else can relax, sit back down, and let this month's Panic of the
|
|
Month ebb away. There is no FCC modem tax, there is no FCC proposed rule
|
|
to outlaw religious broadcasting, Craig Shergold doesn't want more
|
|
postcards, and there is no conspiracy to tax, license, restrict, or outlaw
|
|
GIF files.
|
|
|
|
P.S. Thank all holy Gods that everyone involved is including a date and an
|
|
email address in their messages on the subject. Hopefully, we won't be
|
|
hearing about this "new threat" in five years.
|
|
|
|
P.P.S. Come to think of it, the FCC Modem Tax memetic infection started
|
|
with a CompuServe public announcement, too. "CompuServe Public Relations:
|
|
Threat or Menace?" Nah, it's probably just a coincidence.
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 12 Jan 1995 09:09:43 +0500
|
|
From: rich@PARIS.INTERTV.COM(Richard Forno)
|
|
Subject: File 2--Re CuD 7.02 - Compuserv/Unisys GIF tax
|
|
|
|
That just shows a few things. Firstly, it shows Compuserv's desire to
|
|
get noticed in the GII. They have probably lost marketshare to smaller
|
|
places such as AOL or due to people getting full-service accounts at
|
|
work and/or school. CServe figures that by adding this tax, they will
|
|
get a return on the existing .GIF Technology already in cyberspace.
|
|
Wrong! That's like the already-trampled-and-beaten PGP horse. That's
|
|
like having the federal government attempt to liscence and control
|
|
EVERY copy of PGP in existence and the subsequent use of the program
|
|
thereof. IT WON'T WORK!! Finally, since the public liscence conditions
|
|
weren't made available from Compuserv, I agree that it is their sneak
|
|
attack on the online community. If Compuserv feels this strongly about
|
|
the widespread use of GIF technology in the advancement of the Global
|
|
Information Infrastructure (which I would think as flattering, at
|
|
least) they would rethink this half-crazed concept of theirs. There
|
|
are other, more flexible image types that can easily fill the gap in
|
|
W3 sites and other GIF areas. IMHO, this is a major blunder for
|
|
Compuserv. It shows their motive for existence as only for profit
|
|
--forget helping advance on the GII, they just want bucks.
|
|
|
|
Not to mention, if .GIF was designed for use by the shareware
|
|
community, doesn't this kind of go against the shareware concept and
|
|
further show CServ's attempt to grandfather in this tax?
|
|
|
|
------------------------------
|
|
|
|
Date: Fri, 13 Jan 1995 14:00:41 -0800
|
|
From: dbatterson@ATTMAIL.COM(David Batterson)
|
|
Subject: File 3--The InterNewt
|
|
|
|
Newt and the Art of the Internet
|
|
By David Batterson
|
|
|
|
As the Religious Reich continues to march to the tune of "Onward
|
|
Christian Soldiers," we can expect the clueless Newtbies,
|
|
chainsmoking Helmsmen and Rush dittohead dorks to increase their
|
|
invasion of the Net.
|
|
|
|
Of course, they will not be satisfied with the Internet status
|
|
quo, but will immediately want to change things around to suit their
|
|
rightwing agenda (and placate their corporate contributors). Let's
|
|
prognosticate what we might expect if they have their way.
|
|
|
|
Senator Jesse Helms will be setting up a WWW home page for the
|
|
tobacco industry, where we can view video clips on the joys of
|
|
smoking, read informative text on how curbing smoking is an
|
|
infringement of our Constitutional liberties, see .GIF photos of
|
|
celebrities smoking away, and listen to .WAV files of cigarette
|
|
manufacturer CEOs testifying before Congress that there's no evidence
|
|
linking tobacco to lung cancer. Address: http://www.rightwing.puk
|
|
|
|
Speaker Newt Gingrich will set up a gopher site, where you can
|
|
to read and post in delightful new Newsgroups
|
|
like jobs.many.entrylevel, alt.gay.hangem, people.orphanages.buildem,
|
|
legal.aid.nofunds, TV.public.disband, defense.budget.skyhigh,
|
|
environment.pollute.whocares, and tobacco.ifyagotem.smokem.
|
|
|
|
You'll have to learn some new terminology when the "Sieg Heil"
|
|
crowd takes over. Don't worry, though; there will not be prison time
|
|
for first time offenders who still use the old meanings. You will be
|
|
required to subscribe to National Review, however, to catch up.
|
|
|
|
The definition of WWW (World Wide Web) will be changed to We
|
|
Want Wealth.
|
|
|
|
Archie and Veronica will be banned, and be replaced by earlier
|
|
comic strip characters Mutt and Jeff (to reflect the same age and
|
|
brainpower of our new leaders).
|
|
|
|
URL (Uniform Resource Locator) will probably become Unscrupulous
|
|
Republican Liars.
|
|
|
|
IRC (Internet Relay Chat) becomes Irresponsible, Reprehensible
|
|
Congress.
|
|
|
|
WAIS (Wide Area Information Server) switches over to Women Are
|
|
Insignificant Servants.
|
|
|
|
SLIP/PPP (Serial Line Internet Protocol/Point-to-Point Protocol)
|
|
will see its definition fall by the wayside. The terms will soon
|
|
stand for Slippery, Lame Internal Policies/Petty Political
|
|
Pugnaciousness.
|
|
|
|
TCP/IP (Transmission Control Protocol/Internet Protocol) will
|
|
stand for Take Control and Plunder/Ignore Populace.
|
|
|
|
And FTP (File Transfer Protocol)? That's easy. It will soon
|
|
mean: Fuck The People.
|
|
|
|
See ya on the Net, and don't forget to give the third-finger
|
|
salute to the new Congressional leadership. 8^/
|
|
###
|
|
|
|
David Batterson contributes to WIRED, CONNECT, WAVE, Portland
|
|
Computer Bits, ComputorEdge and other publications. Cyberaddress:
|
|
dbatterson@attmail.com. Copyright 1995; all rights reserved.
|
|
|
|
------------------------------
|
|
|
|
Date: Fri, 13 Jan 1995 12:21:41 -0800
|
|
From: Gordon Meyer <72307.1502@COMPUSERVE.COM>
|
|
Subject: File 4--cu in the news
|
|
|
|
Check Fraud
|
|
==========
|
|
According to the American Banksers Association (ABA), check fraud has
|
|
risen 136% over 1991 levels. Some of the culprits are desktop
|
|
publishing and laser printers, which allow for easier forging of
|
|
payroll checks. The ABA countermeasures for these developments include
|
|
direct deposit, software that watches for suspicious-looking check
|
|
numbers, and discouraging legitimate customers from printing their own
|
|
checks on plain-paper.
|
|
(ComputerWorld. 12/5/94 pg 8)
|
|
|
|
Cyberspace and the Law
|
|
====================
|
|
Edward Cavazos, attorney and author of _Cyberspace and The Law_ (MIT
|
|
Press), is briefly interviewed in the Dec. 5, 1994 issue of
|
|
ComputerWorld. Cavazos warns that there are several pitfalls for
|
|
businesses that allows employees access to the Internet. These include
|
|
copyright violations, privacy issues, and possible libel problems.
|
|
(pgs 114-116)
|
|
|
|
------------------------------
|
|
|
|
Date: Mon, 19 Dec 1994 14:47:34 -0600 (CST)
|
|
From: David Smith <bladex@BGA.COM>
|
|
Subject: File 5--INFORMATION ACCESS: Not Just Wires (fwd)
|
|
|
|
---------- Forwarded message ----------
|
|
|
|
**************************************
|
|
* Copyright Karen Coyle, 1994 *
|
|
* *
|
|
* This document may be *
|
|
* circulated freely on the Net *
|
|
* with this statement included. *
|
|
* For any commercial use, or *
|
|
* publication (including electronic *
|
|
* journals), you must obtain the *
|
|
* permission of the author *
|
|
* kec@stubbs.ucop.edu *
|
|
**************************************
|
|
|
|
ACCESS: Not Just Wires
|
|
By Karen Coyle
|
|
(University of California, Library Automation)
|
|
(Computer Professionals for Social Responsibility, Berkeley Chapter)
|
|
|
|
** This is the written version of a talk given at the 1994 CPSR Annual
|
|
meeting in San Diego, CA, on Oct. 8. **
|
|
|
|
I have to admit that I'm really sick and tired of the Information
|
|
highway. I feel like I've already heard so much about it that it must
|
|
be come and gone already, yet there is no sign of it. This is truly a
|
|
piece of federal vaporware.
|
|
|
|
I am a librarian, and I and it's especially strange to have dedicated
|
|
much of your life to the careful tending of our current information
|
|
infrastructure, our libraries, only to wake up one morning to find that
|
|
the entire economy of the nation depends on making information
|
|
commercially viable. There's an element of Twilight Zone about this
|
|
because libraries are probably our most underfunded and underappreciated
|
|
of institutions, with the possible exception of day care centers.
|
|
|
|
It's clear to me that the information highway isn't much about
|
|
information. It's about trying to find a new basis for our economy.
|
|
I'm pretty sure I'm not going to like the way information is treated in
|
|
that economy. We know what kind of information sells, and what doesn't.
|
|
So I see our future as being a mix of highly expensive economic reports
|
|
and cheap online versions of the National Inquirer. Not a pretty
|
|
picture.
|
|
|
|
This is a panel on "access." But I am not going to talk about access
|
|
from the usual point of view of physical or electronic access to the
|
|
FutureNet. Instead I am going to talk about intellectual access to
|
|
materials and the quality of our information infrastructure, with the
|
|
emphasis on "information.". Information is a social good and part of our
|
|
"social responsibility" is that we must take this resource seriously.
|
|
|
|
>From the early days of our being a species with consciousness of its own
|
|
history, some part of society has had the role of preserving this
|
|
history: priests, learned scholars, archivists. Information was
|
|
valued; valued enough to be denied to some members of society; to be
|
|
part of the ritual of belonging to an elite.
|
|
|
|
So I find it particularly puzzling that as move into this new
|
|
"information age" that our efforts are focused on the machinery of the
|
|
information system, while the electronic information itself is being
|
|
treated like just so much more flotsam and jetsam; this is not a
|
|
democratization of information, but a devaluation of information.
|
|
|
|
On the Internet, many electronic information sources that we are
|
|
declaring worthy of "universal access" are administered by part-time
|
|
volunteers; graduate students who do eventually graduate, or network
|
|
hobbyists. Resources come and go without notice, or languish after an
|
|
initial effort and rapidly become out of date. Few network information
|
|
resources have specific and reliable funding for the future. As a
|
|
telecommunications system the Internet is both modern and mature; as an
|
|
information system the Internet is an amateur operation.
|
|
|
|
Commercial information resources, of course, are only interested in
|
|
information that provides revenue. This immediately eliminates the
|
|
entire cultural heritage of poetry, playwriting, and theological
|
|
thought, among others.
|
|
|
|
If we value our intellectual heritage, and if we truly believe that
|
|
access to information (and that broader concept, knowledge) is a valid
|
|
social goal, we have to take our information resources seriously. Now I
|
|
know that libraries aren't perfect institutions. They tend to be
|
|
somewhat slow-moving and conservative in their embrace of new
|
|
technologies; and some seem more bent on hoarding than disseminating
|
|
information. But what we call "modern librarianship" has over a century
|
|
of experience in being the tender of this society's information
|
|
resources. And in the process of developing and managing that resource,
|
|
the library profession has understood its responsibilities in both a
|
|
social and historical context. Drawing on that experience, I am going
|
|
to give you a short lesson on social responsibilities in an information
|
|
society.
|
|
|
|
Here are some of our social responsibilities in relation to information:
|
|
1. Collection
|
|
2. Selection
|
|
3. Preservation
|
|
4. Organization
|
|
5. Dissemination
|
|
|
|
1. Collection:
|
|
It is not enough to passively gather in whatever information comes your
|
|
way, like a spider waiting on its web. Information collection is an
|
|
activity, and an intelligent activity. It is important to collect and
|
|
collocate information units that support, complement and even contradict
|
|
each other. A collection has a purpose and a context; it says something
|
|
about the information and it says something about the gatherer of that
|
|
information. It is not random, because information itself is not
|
|
random, and humans do not produce information in a random fashion.
|
|
|
|
Too many Internet sites today are a terrible hodge-podge, with little
|
|
intellectual purpose behind their holdings. It isn't surprising that
|
|
visitors to these sites have a hard time seeing the value of the
|
|
information contained therein. Commercial systems, on the other hand,
|
|
have no incentive to provide an intellectual balance that might
|
|
"confuse" its user.
|
|
|
|
In all of the many papers that have come out of discussion of the
|
|
National Information Infrastructure, it is interesting that there is no
|
|
mention of collecting information: there is no Library of Congress or
|
|
National Archive of the electronic inforamtion world. So in the whole
|
|
elaborate scheme, no one is responsbile for the collection of
|
|
information.
|
|
|
|
2. Selection:
|
|
Not all information is equal. This doesn't mean that some of it should
|
|
be thrown away, though inevitably there is some waste in the information
|
|
world. And this is not in support of censorship. But there's a
|
|
difference between a piece on nuclear physics by a Nobel laureate and a
|
|
physics diorama entered into a science fair by an 8-year-old. And
|
|
there's a difference between alpha release .03 and beta 1.2 of a
|
|
software package. If we can't differentiate between these, our
|
|
intellectual future looks grim indeed.
|
|
|
|
Certain sources become known for their general reliability, their
|
|
timeliness, etc. We have to make these judgments because the sheer
|
|
quantity of information is too large for us to spend our time with
|
|
lesser works when we haven't yet encountered the greats.
|
|
|
|
This kind of selection needs to be done with an understanding of a
|
|
discipline and understanding of the users of a body of knowledge. The
|
|
process of selection overlaps with our concept of education, where
|
|
members of our society are directed to a particular body of knowledge
|
|
that we hold to be key to our understanding of the world.
|
|
|
|
3. Preservation:
|
|
How much of what is on the Net today will exist in any form ten years
|
|
from now? And can we put any measure to what we lose if we do not
|
|
preserve things systematically? If we can't preserve it all, at least
|
|
in one safely archived copy, are we going to make decisions about
|
|
preservation, or will we leave it up to a kind of information
|
|
Darwinianism? As we know, the true value of some information may not be
|
|
immediately known, and some ideas gain in value over time.
|
|
|
|
The commercial world, of course, will preserve only that which sells
|
|
best.
|
|
|
|
4. Organization:
|
|
This is an area where the current Net has some of its most visible
|
|
problems, as we have all struggled through myriad gopher menus, ftp
|
|
sites, and web pages looking for something that we know is there but
|
|
cannot find.
|
|
|
|
There is no ideal organization of information, but no organization is no
|
|
ideal either. The organization that exists today in terms of finding
|
|
tools is an attempt to impose order over an unorganized body. The human
|
|
mind in its information seeking behavior is a much more complex question
|
|
than can be answered with a keyword search in an unorganized information
|
|
universe. When we were limited to card catalogs and the placement of
|
|
physical items on shelves, we essentially had to choose only one way to
|
|
organize our information. Computer systems should allow us to create a
|
|
multiplicity of organization schemes for the same information, from
|
|
traditional classification, that relies on hierarchies and categories,
|
|
to faceted schemes, relevance ranking and feedback, etc.
|
|
|
|
Unfortunately, documents do not define themselves. The idea of doing
|
|
WAIS-type keyword searching on the vast store of textual documents on
|
|
the Internet is a folly. Years of study of term frequency, co-
|
|
occurrence and other statistical techniques have proven that keyword
|
|
searching is a passable solution for some disciplines with highly
|
|
specific vocabularies and nearly useless in all others. And, of course,
|
|
the real trick is to match the vocaubulary of the seeker of information
|
|
with that of the information resource. Keyword searching not only
|
|
doesn't take into account different terms for the same concepts, it
|
|
doesn't take into account materials in other languages or different user
|
|
levels (i.e. searching for children will probably need to be different
|
|
than searching done by adults, and libraries actually use different
|
|
subject access schemes for childrens' materials). And non-textual items
|
|
(software, graphics, sound) do not respond at all to keyword searching.
|
|
|
|
There is no magical, effortless way to create an organization for
|
|
information; at least today the best tools are a clearly defined
|
|
classification scheme and a human indexer. At least a classification
|
|
scheme or indexing scheme gives the searcher a chance to develop a
|
|
rational strategy for searching.
|
|
|
|
The importance of organizational tools cannot be overstated. What it
|
|
all comes down to is that if we can't find the information we need, it
|
|
doesn't matter if it exists or not. If we don't find it, we don't
|
|
encounter it, then it isn't information. There are undoubtedly millions
|
|
of bytes of files on the Net that for all practical purposes are non-
|
|
existant .
|
|
|
|
My biggest fear in relation to the information highway is that
|
|
intellectual organization and access will be provided by the commercial
|
|
world as a value-added service. So the materials will exist, even at an
|
|
affordable price, but it will cost real money to make use of the tools
|
|
that will make it possible for you to find the information you need.
|
|
If we don't provide these finding tools as part of the public resource,
|
|
then we aren't providing the information to the public.
|
|
5. Dissemination:
|
|
There's a lot of talk about the "electronic library". Actually, there's
|
|
a lot written about the electronic library, and probably much of it ends
|
|
up on paper. Most of us agree that for anything longer than a one-
|
|
screen email message, we'd much rather read documents off a paper page
|
|
than off a screen. While we can hope that screen technologies will
|
|
eventually produce something that truly substitutes for paper, this
|
|
isn't true today. So what happens with all of those electronic works
|
|
that we're so eager to store and make available? Do we reverse the
|
|
industrial revolution and return printing of documents to a cottage
|
|
industry taking place in homes, offices and libraries?
|
|
|
|
Many people talk about their concerns for the "last mile" - for the
|
|
delivery of information into every home. I'm concerned about the last
|
|
yard . We can easily move information from one computer to another, but
|
|
how do we get it from the computer to the human being in the proper
|
|
format? Not all information is suited to electronic use. Think of the
|
|
auto repair manuals that you drag under the car and drip oil on. Think
|
|
of children's books, with their drool-proof pages.
|
|
|
|
Even the Library of Congress has announced that they are undertaking a
|
|
huge project to digitize 5 million items from their collection. Then
|
|
what ? How do they think we are going to make use of those materials?
|
|
|
|
There are times when I can only conclude that we have been gripped by
|
|
some strange madness. I have fantasies of kidnapping the entire
|
|
membership of the administration's IITF committees and tying them down
|
|
in front of 14" screens with really bad flicker and forcing them to read
|
|
the whole of Project Gutenberg's electronic copy of Moby Dick. Maybe
|
|
then we'd get some concern about the last yard.
|
|
|
|
In conclusion:
|
|
1. No amount of wiring will give us universal access
|
|
2. Just adding more files and computers to gopherspace, webspace and
|
|
FTPspace will not give us better access
|
|
3. And commercial information systems can be expected to be....
|
|
commercial
|
|
|
|
------------------------------
|
|
|
|
Date: Wed, 11 Jan 1995 21:21:03 -0800
|
|
From: Rob Kling <kling@ICS.UCI.EDU>
|
|
Subject: File 6-- Re: COOCS'95 Deadline extended until January 30C
|
|
|
|
Deadline extended until January 30 ........
|
|
|
|
|
|
Call for Papers:
|
|
|
|
Behavioral & Social Impacts Track
|
|
|
|
Conference on Organizational Computing Systems
|
|
COOCS `95
|
|
Sponsored by ACM SIGOIS
|
|
|
|
|
|
This conference has three tracks, and I'm posting here because I
|
|
believe that the Behavioral & Social Impacts Track will
|
|
interest some readers. While conferece focusses on "org computing systems,"
|
|
interorganizational communications, telecommuting, commerce on
|
|
the nets, electronically connected voluntary groups as organizations,
|
|
computer-mediated communication in diverse forms,
|
|
and many other such broad topics can fit ... as
|
|
computing/telecomm crosses org boundaries in so many ways these days.
|
|
|
|
Rob Kling
|
|
Chair, Behavioral and Social Impacts Track
|
|
|
|
----------
|
|
|
|
Topics for Track II: Behavioral and Social Impacts
|
|
|
|
o Social processes in the development and use of electronic journals
|
|
o Social processes in the development and use of digital libraries
|
|
o Social impacts of organizational re-engineering
|
|
o Organizational impacts of computerization of large applications
|
|
o Integrating information systems and small groups
|
|
o Social-technical systems analysis (theory and case studies)
|
|
o Organization and ramifications of mobile offices
|
|
o Open systems policies, standards, and impacts
|
|
o Social aspects of globally distributed organizational computing
|
|
o Theoretical approaches for understanding the development, use and/or
|
|
social impacts of information technologies
|
|
o The influence of technology and work organization on work life
|
|
o The cultural dimensions of computerization within and between
|
|
organizations
|
|
|
|
|
|
IMPORTANT DATES
|
|
Submission due: January 30, 1995
|
|
Author notification: March 8, 1995
|
|
Manuscripts due: May 10, 1995
|
|
Conference dates: August 13-16, 1995
|
|
|
|
-------------------------------------------
|
|
CONFERENCE SPECIFICS:
|
|
|
|
-------------------
|
|
|
|
Conference Location: Sheraton Silicon Valley ----Milpitas (near
|
|
San Jose), California August 13-16, 1995 (Immediately after the
|
|
Workflow `95 conference)
|
|
|
|
As we endeavor to move toward more effective and efficient organizations,
|
|
we must take into account technical, social, and organizational aspects of
|
|
computerization. This conference is organized as three tracks in order to
|
|
address these aspects.
|
|
I. Business processes track
|
|
II. Behavioral and social impacts track
|
|
III. Technical aspects track
|
|
|
|
Advances in tools, processes, technologies, and methodologies that
|
|
facilitate the use of information systems in organizations can improve
|
|
the way information is made available and used. This conference is
|
|
intended to bring together researchers and practitioners interested
|
|
in the introduction, management, deployment, and analysis of information
|
|
and processes within organizations. The scope of the conference is
|
|
intended to cover areas related to this goal, including but not
|
|
limited to:
|
|
|
|
|
|
Track II: Behavioral and Social Impacts
|
|
|
|
o Social processes in the development and use of electronic journals
|
|
o Social processes in the development and use of digital libraries
|
|
o Social impacts of organizational re-engineering
|
|
o Organizational impacts of computerization of large applications
|
|
o Integrating information systems and small groups
|
|
o Social-technical systems analysis (theory and case studies)
|
|
o Organization and ramifications of mobile offices
|
|
o Open systems policies, standards, and impacts
|
|
o Social aspects of globally distributed organizational computing
|
|
o Theoretical approaches for understanding the development, use and/or
|
|
social impacts of information technologies
|
|
o The influence of technology and work organization on work life
|
|
o The cultural dimensions of computerization within and between
|
|
organizations
|
|
|
|
------------------------------
|
|
|
|
Track I: Business Processes
|
|
o Workflow systems, models, and theories
|
|
o Process meta-models and meta-modeling
|
|
o Models and strategies for business process design, and re-engineering
|
|
o Measurement-based approaches to organizational analysis
|
|
o Process acquisition, monitoring and management tools
|
|
o Business systems formalisms
|
|
o Experiences with process models and process management tools
|
|
|
|
Track III: Technical Aspects
|
|
o Organizational computing systems and infrastructure
|
|
o Groupware
|
|
o Object and database models and systems
|
|
o Computer supported collaboration and negotiation
|
|
o Distributed AI, expert systems, multi-agent models
|
|
o Coordination technology and workflow technology
|
|
o Multimedia information storage, retrieval, and communications
|
|
|
|
Each track of the conference will have a program chair and a program
|
|
committee. Thus, each paper should be submitted to the program chair
|
|
of the most appropriate track. (See below for all 3 track
|
|
chairs)
|
|
|
|
Rob Kling (behavioral track chair)
|
|
Dept. Information/Computer Sci
|
|
University of California
|
|
Irvine, CA 92715 USA
|
|
Phone: +1 714 856 5955
|
|
Fax: +1 714 856 4056
|
|
email: kling@ics.uci.edu
|
|
|
|
If a submission falls within several tracks, please submit it to
|
|
one program chair, and note the overlap in a cover letter, so
|
|
that the submission can be properly considered. Each submission
|
|
will be critically reviewed and judged by the appropriate
|
|
program committee(s). Submissions to the conference can be in
|
|
the form of papers, or demonstration, panel, workshop or
|
|
tutorial pro- posals. Papers can take either of two forms:
|
|
|
|
(1) Research investigations present original work in any of the
|
|
areas of interest to the conference.
|
|
|
|
(2) Case studies discuss projects which introduce innovative tools,
|
|
technologies or methodologies into particular organizational
|
|
settings, and critically analyze the results and impact of the
|
|
project.
|
|
|
|
|
|
RESEARCH PAPERS --
|
|
|
|
Papers should present original reports of substantive new work
|
|
or integrative reviews. Theory, methodology, and concept papers
|
|
should present new theories, empirical results, methodologies or
|
|
concepts that stimulate new ways of thinking about, supporting,
|
|
or studying organizational information systems (broadly
|
|
conceived).
|
|
|
|
All papers should provide a concise message to the audience
|
|
about how the work relates to previous research or experience
|
|
and what aspects of the work are new. Papers will be evaluated
|
|
on the basis of originality, significance of the contribution to
|
|
the field, quality of research, and quality of writing.
|
|
|
|
Papers should not exceed 12 ACM camera-ready pages. It is
|
|
possible that some papers will be presented at the conference in
|
|
poster sessions. Papers must include an abstract of no more than
|
|
100 words. Papers must be twelve pages or less, including
|
|
abstract, figures, and references, printed in double columns, in
|
|
12 point Times font, on 8.5"X11" paper (See proceedings of
|
|
COOCS'93 or CSCW'94 for examples.)
|
|
|
|
|
|
------------------------------
|
|
|
|
Demonstration proposals should be 3-5 pages long, and include
|
|
enough information to allow the committee to judge the relevance
|
|
and significance of the work. Please include machine requirements.
|
|
|
|
Panel proposals should motivate the subject of the panel and give
|
|
brief biographical sketches of proposed panel members.
|
|
|
|
Workshop and Tutorial proposals should motivate the workshop/tutorial
|
|
and its relevance to this conference. For tutorials, provide an outline
|
|
and a brief biographical sketch of the proposers. For workshops,
|
|
motivate the workshop, indicate how you would select participants,
|
|
and outline the format of the workshop. Proposals for both half-day
|
|
and full-day workshops and tutorials are welcome.
|
|
|
|
Authors should submit five copies of the manuscript or proposal,
|
|
in English, together with a cover sheet, to the appropriate
|
|
Program Chair by January 4, 1995. The cover sheet should contain
|
|
(i) submission type; (ii) title; (iii) names, addresses, phone
|
|
numbers, fax numbers and email addresses (if available) of all
|
|
authors; (iv) contact author; (v) keywords and abstract.
|
|
Information on paper format can be obtained from any of the
|
|
Program Co-chairs.
|
|
|
|
IMPORTANT DATES
|
|
Submission due: January 4, 1995
|
|
Author notification: March 8, 1995
|
|
Manuscripts due: May 10, 1995
|
|
Conference dates: August 13-16, 1995
|
|
|
|
Conference Co-Chairs
|
|
Nora Comstock Clarence A. Ellis
|
|
Comstock Connections Dept. of Computer Science
|
|
3103 Loyola Ln. University of Colorado
|
|
Austin, TX 78723 U.S.A. Boulder, CO 80309 U.S.A
|
|
+1 512 928 8780 voice and fax +1 303 492 5984
|
|
loyola!nora@cs.utexas.edu (UUCP) skip@cs.colorado.edu
|
|
|
|
PROGRAM CHAIRS
|
|
|
|
John Mylopoulos (business track) Rob Kling (behavioral track)
|
|
Dept. of Computer Science Dept. Information/Computer Sci
|
|
University of Toronto University of California
|
|
Toronto, Ontario, CANADA Irvine, CA 92715 USA
|
|
Phone: +1 416 978 5180 Phone: +1 714 856 5955
|
|
Fax: +1 416 978 1455 Fax: +1 714 856 4056
|
|
email: jm@ai.toronto.edu email: kling@ics.uci.edu
|
|
|
|
Simon Kaplan (technical track)
|
|
Dept. of Computer Science
|
|
University of Illinois
|
|
1304 W. Springfield Ave.
|
|
Urbana, IL 61801 USA
|
|
Phone:+1 217 244 0392
|
|
Fax: +1 217 333 3501
|
|
email: kaplan@cs.uiuc.edu
|
|
|
|
|
|
REGISTRATION/LOCAL ARRANGEMENTS
|
|
WORKSHOP ARRANGEMENTS TREASURER
|
|
Keith Swenson Jeanie Treichel
|
|
Fujitsu OSSI Sun Microsystems Lab, Inc.
|
|
3055 Orchard Dr. 2550 Garcia Avenue, UMTV 29-01
|
|
San Jose, CA 95134 Mountain View CA 94043
|
|
Phone: +1408 456 7667 Phone: +1 415 336 5260
|
|
Fax: +1 408 456 7050 Fax: +1 415 691 0756
|
|
kswenson@ossi.com email: jeanie.treichel@Sun.COM
|
|
|
|
------------------------------
|
|
|
|
From: Warren Smith <warren205@DELPHI.COM>
|
|
Subject: File 7--**How do I protect my program??**
|
|
Date: Sun, 8 Jan 95 16:32:30 -0500
|
|
|
|
I have spent two years of part-time work writing a program which I
|
|
hope to sell sometime. I would like users to try the program for
|
|
a time, say a month, before they can decide to buy it - I hate spending
|
|
my money on a program that I later find is no good.
|
|
|
|
The question is - how do I protect all my work against all the pirates
|
|
out there.
|
|
|
|
Do I force users to use a 'Dongle'? Is there a better way?
|
|
Even the 'Dongle' is not foolproof. And I have to absorb the cost
|
|
of the Dongles given to potential customers who don't later buy the
|
|
program. This also would prevent distribution by wire.
|
|
|
|
I notice some programs are being distributed on CDROM with a password
|
|
needed to access parts of the program.
|
|
|
|
Can anyone tell me where I can find help. Any Associations which might
|
|
help me?
|
|
|
|
By the way, which 'Dongle' is the best?
|
|
|
|
Sorry to offend all you liberated freedom loving pirates out there.
|
|
|
|
Thanks,
|
|
Warren.
|
|
|
|
------------------------------
|
|
|
|
Date: Mon, 2 Jan 1995 15:55:02 -0500
|
|
From: Petrocelli@AOL.COM
|
|
Subject: File 8--Comment on D. Batterson's article (CuD 6.106)
|
|
|
|
Item 2 talks about "old fashioned" market surveys and his opinion that
|
|
they are somehow ridiculous when compared to the on-line, electronic
|
|
version. He writes:
|
|
|
|
But an e-mailed (or online) survey would be the best way to go.
|
|
PRODIGY already has online opinion polls, with instant results
|
|
available for viewing, so it could be done easily enough. Online
|
|
market research is unintrusive, is digital in nature [no inputing by
|
|
data collectors is required], and surveys can be done according to the
|
|
respondent's time schedule, NOT the market research firm's. This
|
|
major market research firm has its head stuck in the sand, as do many
|
|
other ones.
|
|
|
|
This is a wonderful sentiment but, alas, an unscientific one. To
|
|
properly conduct a survey of any type requires a random sample.
|
|
Surveys conducted on an on-line service are only valid if you are
|
|
studying people who call on-line services or as a supplement to a
|
|
phone survey. Otherwise, characteristics of people who are on-line
|
|
will skew your results.
|
|
|
|
When the day comes that everyone is on-line, when we have a truely
|
|
global, electronic community then on-line surveys will make sense.
|
|
Until that time the time-honered way of using a phone and imposing on
|
|
their goodwill will be the best way to gather market intelligence
|
|
aside from showing up at someone's office and doing it in person. We
|
|
should never confuse asking someone for a moment of their time with an
|
|
abrigment of freedom.
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 23 Oct 1994 22:51:01 CDT
|
|
From: CuD Moderators <tk0jut2@mvs.cso.niu.edu>
|
|
Subject: File 9--Cu Digest Header Information (unchanged since 25 Nov 1994)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send a one-line message: SUB CUDIGEST your name
|
|
Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
|
|
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
|
|
In ITALY: Bits against the Empire BBS: +39-461-980493
|
|
In LUXEMBOURG: ComNet BBS: +352-466893
|
|
|
|
UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD
|
|
ftp://www.rcac.tdi.co.jp/pub/mirror/CuD
|
|
|
|
The most recent issues of CuD can be obtained from the NIU
|
|
Sociology gopher at:
|
|
URL: gopher://corn.cso.niu.edu:70/00/acad_dept/col_of_las/dept_soci
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #7.04
|
|
************************************
|
|
|