Journal article Open Access

The Open vs Closed Debate

Adams, A.A.


MARC21 XML Export

<?xml version='1.0' encoding='UTF-8'?>
<record xmlns="http://www.loc.gov/MARC21/slim">
  <leader>00000nam##2200000uu#4500</leader>
  <datafield tag="999" ind1="C" ind2="5">
    <subfield code="x">[Bastiat, 1850] Bastiat, F. (1850). What is Seen and What is Not Seen. In [Bastiat, 1964]. Original essay published in 1850; available online. [Bastiat, 1964] Bastiat, F. (1964). Selected Essays on Political Economy. Van Nostrand, Princeton, NJ. [Brynjolfsson and Kemerer, 1996] Brynjolfsson, E. and Kemerer, C. F. (1996). network externalities in microcomputer software: An econometric analysis of the spreadsheet market. Management Science, 42(12):1627–1647. www.katzis.org/wiki/images/9/9f/Brynjolfsson 1996.pdf. [Castells, 1996] Castells, M. (1996). The Rise of the Network Society. Number 1 in The Information Age. Blackwell, Chichester. [Castells, 1997] Castells, M. (1997). The Power of Identity. Number 2 in The Information Age. Blackwell, Chichester. [Castells, 2000] Castells, M. (2000). End of Millennium. Number 3 in The Information Age. Blackwell, Chichester. [Chandler, 2008] Chandler, J. A. (2008). Contracting insecurity: Software license terms that undermine cybersecurity. In [Matwyshyn, 2008], pages 159–201. [Constitution Committee of the House of Lords, 2008] Constitution Committee of the House of Lords (2008). Second Report; Surveillance; Citizens and the State. www.publications.parliament.uk/pa/ld200809/ldselect/ldconst/18/1802.htm. [Digital Preservation Coalition, ] Digital Preservation Coalition. Handbook of preservation management of digital materials. www.dpconline.org/graphics/handbook/. [Drahos and Braithwaite, 2002] Drahos, P. and Braithwaite, J. (2002). Information Feudalism. Earthscan. [Feller et al., 2003] Feller, J., Fitzgerald, B., Hissam, S., and Lakhani, K., editors (2003). Taking Stock of the Bazaar: Proceedings of the 3rd Workshop on Open Source Software Engineering. opensource.ucc.ie/icse2003/. [Gates III, 1976] Gates III, W. H. (1976). An open letter to hobbyists. www.blinkenlights.com/classiccmp/gateswhine.html. [Himanen, 2001] Himanen, P. (2001). The Hacker Ethic and the Spirit of the Information Age. Vintage, New York, NY. Prologue by Linus Torvalds, epilogue by Manuel Castells. [Hu and Junnarkar, 1999] Hu, J. and Junnarkar, S. (1999). AOL blocks Microsoft Net messaging. CNet News. news.cnet.com/2100-1023-228960.html. [Hunt, 2000] Hunt, S. (2000). A general theory of competition: Resources, competences, productivity, economic growth. Sage, Thousan Oaks, CA. [Jefferson, 1907] Jefferson, T. (1907). Writings of Thomas Jefferson. The Thomas Jefferson Memorial Association. [Klein, 2000] Klein, N. (2000). No Logo. Picador, New York, NY. [Levy, 2001] Levy, S. (2001). Hackers: Heroes of the Computer Revolution. Penguin, London. [Loren, 2004] Loren, L. P. (2004). Slaying the Leather-Winged Demons in the Night: Reforming Copyright Owner Contracting with Clickwrap Misuse. Ohio Northern University law Review, 30(3):495–536. [Matwyshyn, 2008] Matwyshyn, A., editor (2008). Harboring Data: Information Security, Law, and the Corporation. Stanford Law Books, Stanford, CA. [May, 2003] May, C. (2003). Digital rights management and the breakdown of social norms. First Monday, 8(11). [Raymond, 2001] Raymond, E. S. (2001). The Cathedral and the Bazaar. O'Reilly. www.catb.org/ esr/writings/cathedral-bazaar. [Shaikh and Cornford, 2003] Shaikh, M. and Cornford, T. (2003). Version Management Tools: CVS to BK in the Linux Kernel. In [Feller et al., 2003], pages 127–132. opensource.ucc.ie/icse2003/. [Shirky, 2008] Shirky, C. (2008). Here Comes Everybody. Allen Lane, London. [Solove, 2007] Solove, D. J. (2007). The Future of Reputation. Yale University Press, New Haven, CT. [Stefik, 1997] Stefik, M. (1997). Shifting the possible: How trusted systems and digital property rights challenge us to rethink digital publishing. Berkeley Technology Law Journal, 12(1):137–160. [Sunstein, 2002] Sunstein, C. R. (2002). Republic.com. Princeton University Press, Princeton, NJ. Second edition also available: Republic.com 2.0, 2007. [Surowiecki, 2004] Surowiecki, J. (2004). The Wisdom of Crowds. Doubleday, New York, NY. [Tapscott and Williams, 2006] Tapscott, D. and Williams, A. D. (2006). Wikinomics. Portfolio, New York, NY. [Williams, 2002] Williams, S. (2002). Free as in Freedom; Richard Stallman's Crusade for Free Software. O'Reilly, Sebastapol, CA.</subfield>
  </datafield>
  <datafield tag="653" ind1=" " ind2=" ">
    <subfield code="a">Open source</subfield>
  </datafield>
  <datafield tag="653" ind1=" " ind2=" ">
    <subfield code="a">Software license</subfield>
  </datafield>
  <datafield tag="653" ind1=" " ind2=" ">
    <subfield code="a">Communication protocol</subfield>
  </datafield>
  <datafield tag="653" ind1=" " ind2=" ">
    <subfield code="a">Data format</subfield>
  </datafield>
  <datafield tag="653" ind1=" " ind2=" ">
    <subfield code="a">User community</subfield>
  </datafield>
  <datafield tag="653" ind1=" " ind2=" ">
    <subfield code="a">Information Ethics</subfield>
  </datafield>
  <controlfield tag="005">20191104071218.0</controlfield>
  <controlfield tag="001">810985</controlfield>
  <datafield tag="856" ind1="4" ind2=" ">
    <subfield code="s">141091</subfield>
    <subfield code="z">md5:99bd1e4810301708250dcec5f30e9dc0</subfield>
    <subfield code="u">https://zenodo.org/record/810985/files/Open_vs_Closed_OA_Final.pdf</subfield>
  </datafield>
  <datafield tag="542" ind1=" " ind2=" ">
    <subfield code="l">open</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
    <subfield code="c">2010-03-01</subfield>
  </datafield>
  <datafield tag="909" ind1="C" ind2="O">
    <subfield code="p">user-opendepot</subfield>
    <subfield code="o">oai:zenodo.org:810985</subfield>
  </datafield>
  <datafield tag="909" ind1="C" ind2="4">
    <subfield code="p">Japan Society for Information and Management (日本情報経営学会)</subfield>
  </datafield>
  <datafield tag="100" ind1=" " ind2=" ">
    <subfield code="u">Meiji University (明治大学)</subfield>
    <subfield code="a">Adams, A.A.</subfield>
  </datafield>
  <datafield tag="245" ind1=" " ind2=" ">
    <subfield code="a">The Open vs Closed Debate</subfield>
  </datafield>
  <datafield tag="980" ind1=" " ind2=" ">
    <subfield code="a">user-opendepot</subfield>
  </datafield>
  <datafield tag="540" ind1=" " ind2=" ">
    <subfield code="u">http://creativecommons.org/licenses/by-nc/2.0/</subfield>
    <subfield code="a">Creative Commons Non-Commercial (Any)</subfield>
  </datafield>
  <datafield tag="650" ind1="1" ind2="7">
    <subfield code="a">cc-by</subfield>
    <subfield code="2">opendefinition.org</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
    <subfield code="a">In business information systems, many of the questions of both ethics and business benefit can be usefully considered in terms of levels and type of open-ness to be applied. In this paper, I examine both the ethical implications of such choices, but also the business benefits to be gained, from choosing a more open path. software licensing issues, communication protocols, data formats and customer relations are all considered through this lens. This record was migrated from the OpenDepot repository service in June, 2017 before shutting down.</subfield>
  </datafield>
  <datafield tag="773" ind1=" " ind2=" ">
    <subfield code="n">doi</subfield>
    <subfield code="i">isVersionOf</subfield>
    <subfield code="a">10.5281/zenodo.810984</subfield>
  </datafield>
  <datafield tag="024" ind1=" " ind2=" ">
    <subfield code="a">10.5281/zenodo.810985</subfield>
    <subfield code="2">doi</subfield>
  </datafield>
  <datafield tag="980" ind1=" " ind2=" ">
    <subfield code="a">publication</subfield>
    <subfield code="b">article</subfield>
  </datafield>
</record>
37
6
views
downloads
All versions This version
Views 3737
Downloads 66
Data volume 846.5 kB846.5 kB
Unique views 3737
Unique downloads 55

Share

Cite as