Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Type of Material
Consortium
Language
  • 1
    UID:
    (DE-605)HT013942415
    Format: 425 S.
    ISBN: 0896038149
    Series Statement: Infectious disease
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    (DE-627)1836890389
    Format: 1 Online-Ressource (27 p)
    Series Statement: U Illinois Law & Economics Research Paper No. LE07-039
    Content: This study employs empirical data to provide insights into the impact of open standards. This work moves beyond the existing literature's reliance on hand-picked case studies by analyzing a very large number of open standards. The results of this research are timely as governments are advocating, and sometimes mandating, the use of open standards. Our study reveals inequalities in the impact of open standards that suggest a power-law relationship. We have also found that the duration of the development process in creating an open standard does not affect the ultimate impact of the standard, but that the length of the document describing the standard affects its impact. There are two datasets used in our analysis. The analysis focuses on standards developed by the Internet Engineering Task Force (IETF) because it is held as the exemplar for developing open standards. The first set encompasses 3221 IETF publications from August 1987 to January 2006. The second set consists of 32 standards, selected randomly from 2000 to 2003. The variables of interest include information about the standard document, the authors, the development process, and the impact of the open standard. The first part of the analysis found a power-law relationship in the impact of open standards. A few open standards have a very high disproportionally large impact, while there are many other standards that have a slight impact. This relationship should not be surprising. Standards are analogous to other decisions that fit the power-law relationship, because people can freely choose between many standards. This result has implications for improving the development process within standards organizations. The second part of the analysis considers significant variables that affect the impact of open standards. Our results show that the length of the standard document (as measured by the number of words) is a crucial factor affecting the impact of a standard. The length of a standard often reflects the fact that there are multiple participants, divisiveness in opinions, and overall technical complexity, all of which suggest greater interest during the development process of the standard, likely resulting in a higher impact once the standard is promulgated. We also find that the duration of the development process does not affect the impact of an open standard. This finding carries significant policy implications as reforms are underway to shorten the IETF development process
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    (DE-605)HT015419984
    ISSN: 0883-8151
    In: Journal of broadcasting & electronic media, Washington, DC, 51 (2007), Nr. 1, S. 93 - 109, 0883-8151
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    [S.l.] : SSRN
    UID:
    (DE-627)183439449X
    Format: 1 Online-Ressource (114 p)
    Content: This Article deconstructs code using case studies and shows that code is not neutral and apolitical but instead embodies the values and motivations of the institutions and actors building it. The term "code," as we use it, consists of the hardware and software components of information technologies. Code is increasingly being sought as a regulatory mechanism in conjunction with or as an alternative to law for addressing societal concerns such as crime, privacy, intellectual property protection, and the revitalization of democratic discourse. Our analysis examines how societal institutions, such as universities, firms, consortia, and the open source movement, differentially influence the production of code. Relying on four case studies, we analyze how institutions differ in structure and motivation, and how they are affected by different social, political, economic, and legal influences. We then analyze how these societal institutions, which all approach code creation differently, influence the technical and social characteristics of the code that is developed by them. For example, code developed by a university is likely to contain different values and biases, regarding societal concerns such as privacy, than code developed by a firm. This analysis provides a crucial first step in understanding how society shapes these new technologies. Ultimately, this work may assist policymakers in proactively shaping the development of code to address societal concerns
    Note: In: Yale Journal of Law & Technology, Vol. 6, pp. 277-389, 2003-2004
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    (DE-627)1836270968
    Format: 1 Online-Ressource (20 p)
    Content: Software is increasingly seen as a policy tool to influence societal concerns such as privacy, freedom of speech and intellectual property protection. A necessary step in this process is deciding what the ‘settings’ should be for the relevant software. One powerful setting in software is defaults. This article puts forth a framework for how default settings should be determined. This normative approach towards software settings stands apart from most previous scholarship, which focuses on the effect of software. The framework is illustrated with an example of an incorrectly set default in Apple’s Airport Extreme wireless access point. Policymakers can influence competition, security, and privacy by relying on this framework. We believe that the manipulation of software to enhance social welfare is a powerful tool and a useful complement to traditional legal methods
    Note: In: Information, Communication, and Society, Vol. 11, No. 3, October 2008 , Nach Informationen von SSRN wurde die ursprüngliche Fassung des Dokuments October 11, 2008 erstellt
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    (DE-627)1836893787
    Format: 1 Online-Ressource (49 p)
    Series Statement: Illinois Public Law Research Paper No. 07-12
    Content: Information technologies affect a variety of fundamental societal concerns, such as privacy and free speech. Policymakers currently analyze each societal concern as sui generis, ignoring commonalities among IT issues. This paper develops a comprehensive descriptive framework to address a variety of IT policy problems. The Information Technology and Societal Interactions (ITSI) framework theorizes how information technology develops, evolves, and influences society. This framework ties together several existing theoretical concepts, while translating them into a practical framework that policymakers can apply to real problems. The framework is illustrated by analyzing wireless security issues. The article seeks to move beyond Lessig's work by providing a clearer and more comprehensive view of how IT interacts with society. An urgent need has arisen for this type of theoretical framework. Unlike other fields, a compelling theoretical approach within IT law and policy does not exist. As a result, each policy issue is treated as unique and policymakers overlook commonalities. This occurs because the existing theoretical approaches, such as structuration and actor-network theory (ANT), fail to provide applicable models for addressing concrete problems. ITSI is inspired by structuration and ANT, but is tailored to the theoretical and practical needs for analyzing the interactions between IT and society. ITSI focuses on four main relationships within ITSI. These relations are: (1) how technology affects individuals, (2) how individuals reconfigure technology, (3) how developers shape technology, and (4) how society, in mass, can intervene and alter how technology operates. ITSI builds upon a large corpus of descriptive and normative scholarship by computer scientists, sociologists, communications scholars, and legal scholars. The contribution here does not define a new set of relationships between society and information technology, but explicates existing relationships and develops a descriptive framework that provides analytical insights. This article illustrates ITSI through an analysis of security issues involved in wireless technology. The analysis found that consumers are not provided with simple and effective security because of the increased reliance on user configuration. ITSI led to this finding; it would not have emerged using conventional policy analysis. ITSI also provides solutions to this problem. Instead of looking toward users to improve security, policymakers should look to manufacturers to develop APs that are secure by design. The analysis ends by pointing out a number of strategies to influence manufacturers to improve the design of wireless APs
    Note: Nach Informationen von SSRN wurde die ursprüngliche Fassung des Dokuments November 6, 2007 erstellt
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    (DE-627)1781167788
    Format: 1 Online-Ressource (133 p)
    Content: Scholars have neglected t ...
    Note: In: As published in Washington University Law Quarterly, Vol. 79, P. 89, 2001
    Language: Undetermined
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    (DE-627)1766681220
    ISSN: 1461-4448
    In: New media & society, London [u.a.] : Sage Publ., 1999, 11(2009), 3, Seite 315-336, 1461-4448
    In: volume:11
    In: year:2009
    In: number:3
    In: pages:315-336
    Language: Undetermined
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    UID:
    (DE-605)HT016115362
    ISSN: 1461-4448
    In: New media & society, London [u.a.], 11(2009), Nr. 3, S. 315 - 336, 1461-4448
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    UID:
    (DE-627)1791638856
    Format: 1 Online-Ressource (12 p)
    Content: This article chronicles the historic process of Massachusetts becoming the first government to mandate an open standard for document formats. In 2005, Massachusetts mandated the use of the OpenDocument Format (ODF) as part of a transition to open standards. The article also analyzes the Massachusetts experience and develops a set of lessons learned. The first set of lessons includes a focus on the difficulties of being an early adopter and factors that influenced the adoption mandate. Governments seeking to mandate specific document formats need to be aware of these factors. A second set of lessons focuses on decisions in establishing a standards policy. These lessons emphasize a clear definition of open standards, whether to mandate an open standard and for the government to carefully consider the expected benefits and costs of a standards policy. Overlooking costs, such as legacy equipment and training costs, can lead to disappointing results. These lessons are applicable, not only for decisions regarding document formats, but also for open standards policies for other technologies
    Note: In: Journal of Information Technology & Politics, Vol. 5(4), 2008 , Nach Informationen von SSRN wurde die ursprüngliche Fassung des Dokuments December 22, 2008 erstellt
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages