Journal article Open Access

The Open vs Closed Debate

Adams, A.A.

DataCite XML Export

<?xml version='1.0' encoding='utf-8'?>
<resource xmlns:xsi="" xmlns="" xsi:schemaLocation="">
  <identifier identifierType="DOI">10.5281/zenodo.810985</identifier>
      <creatorName>Adams, A.A.</creatorName>
      <affiliation>Meiji University (明治大学)</affiliation>
    <title>The Open vs Closed Debate</title>
    <subject>Open source</subject>
    <subject>Software license</subject>
    <subject>Communication protocol</subject>
    <subject>Data format</subject>
    <subject>User community</subject>
    <subject>Information Ethics</subject>
    <date dateType="Issued">2010-03-01</date>
  <resourceType resourceTypeGeneral="Text">Journal article</resourceType>
    <alternateIdentifier alternateIdentifierType="url"></alternateIdentifier>
    <relatedIdentifier relatedIdentifierType="DOI" relationType="IsVersionOf">10.5281/zenodo.810984</relatedIdentifier>
    <relatedIdentifier relatedIdentifierType="URL" relationType="IsPartOf"></relatedIdentifier>
    <rights rightsURI="">Creative Commons Non-Commercial (Any)</rights>
    <rights rightsURI="info:eu-repo/semantics/openAccess">Open Access</rights>
    <description descriptionType="Abstract">In business information systems, many of the questions of both ethics and business benefit can be usefully considered in terms of levels and type of open-ness to be applied. In this paper, I examine both the ethical implications of such choices, but also the business benefits to be gained, from choosing a more open path. software licensing issues, communication protocols, data formats and customer relations are all considered through this lens. This record was migrated from the OpenDepot repository service in June, 2017 before shutting down.</description>
    <description descriptionType="Other">{"references": ["[Bastiat, 1850] Bastiat, F. (1850). What is Seen and What is Not Seen. In [Bastiat, 1964]. Original essay published in 1850; available online. [Bastiat, 1964] Bastiat, F. (1964). Selected Essays on Political Economy. Van Nostrand, Princeton, NJ. [Brynjolfsson and Kemerer, 1996] Brynjolfsson, E. and Kemerer, C. F. (1996). network externalities in microcomputer software: An econometric analysis of the spreadsheet market. Management Science, 42(12):1627\u20131647. 1996.pdf. [Castells, 1996] Castells, M. (1996). The Rise of the Network Society. Number 1 in The Information Age. Blackwell, Chichester. [Castells, 1997] Castells, M. (1997). The Power of Identity. Number 2 in The Information Age. Blackwell, Chichester. [Castells, 2000] Castells, M. (2000). End of Millennium. Number 3 in The Information Age. Blackwell, Chichester. [Chandler, 2008] Chandler, J. A. (2008). Contracting insecurity: Software license terms that undermine cybersecurity. In [Matwyshyn, 2008], pages 159\u2013201. [Constitution Committee of the House of Lords, 2008] Constitution Committee of the House of Lords (2008). Second Report; Surveillance; Citizens and the State. [Digital Preservation Coalition, ] Digital Preservation Coalition. Handbook of preservation management of digital materials. [Drahos and Braithwaite, 2002] Drahos, P. and Braithwaite, J. (2002). Information Feudalism. Earthscan. [Feller et al., 2003] Feller, J., Fitzgerald, B., Hissam, S., and Lakhani, K., editors (2003). Taking Stock of the Bazaar: Proceedings of the 3rd Workshop on Open Source Software Engineering. [Gates III, 1976] Gates III, W. H. (1976). An open letter to hobbyists. [Himanen, 2001] Himanen, P. (2001). The Hacker Ethic and the Spirit of the Information Age. Vintage, New York, NY. Prologue by Linus Torvalds, epilogue by Manuel Castells. [Hu and Junnarkar, 1999] Hu, J. and Junnarkar, S. (1999). AOL blocks Microsoft Net messaging. CNet News. [Hunt, 2000] Hunt, S. (2000). A general theory of competition: Resources, competences, productivity, economic growth. Sage, Thousan Oaks, CA. [Jefferson, 1907] Jefferson, T. (1907). Writings of Thomas Jefferson. The Thomas Jefferson Memorial Association. [Klein, 2000] Klein, N. (2000). No Logo. Picador, New York, NY. [Levy, 2001] Levy, S. (2001). Hackers: Heroes of the Computer Revolution. Penguin, London. [Loren, 2004] Loren, L. P. (2004). Slaying the Leather-Winged Demons in the Night: Reforming Copyright Owner Contracting with Clickwrap Misuse. Ohio Northern University law Review, 30(3):495\u2013536. [Matwyshyn, 2008] Matwyshyn, A., editor (2008). Harboring Data: Information Security, Law, and the Corporation. Stanford Law Books, Stanford, CA. [May, 2003] May, C. (2003). Digital rights management and the breakdown of social norms. First Monday, 8(11). [Raymond, 2001] Raymond, E. S. (2001). The Cathedral and the Bazaar. O'Reilly. esr/writings/cathedral-bazaar. [Shaikh and Cornford, 2003] Shaikh, M. and Cornford, T. (2003). Version Management Tools: CVS to BK in the Linux Kernel. In [Feller et al., 2003], pages 127\u2013132. [Shirky, 2008] Shirky, C. (2008). Here Comes Everybody. Allen Lane, London. [Solove, 2007] Solove, D. J. (2007). The Future of Reputation. Yale University Press, New Haven, CT. [Stefik, 1997] Stefik, M. (1997). Shifting the possible: How trusted systems and digital property rights challenge us to rethink digital publishing. Berkeley Technology Law Journal, 12(1):137\u2013160. [Sunstein, 2002] Sunstein, C. R. (2002). Princeton University Press, Princeton, NJ. Second edition also available: 2.0, 2007. [Surowiecki, 2004] Surowiecki, J. (2004). The Wisdom of Crowds. Doubleday, New York, NY. [Tapscott and Williams, 2006] Tapscott, D. and Williams, A. D. (2006). Wikinomics. Portfolio, New York, NY. [Williams, 2002] Williams, S. (2002). Free as in Freedom; Richard Stallman's Crusade for Free Software. O'Reilly, Sebastapol, CA."]}</description>
All versions This version
Views 6363
Downloads 1212
Data volume 1.7 MB1.7 MB
Unique views 6363
Unique downloads 1111


Cite as