Published March 1, 2010 | Version v1
Journal article Open

The Open vs Closed Debate

Creators

  • 1. Meiji University (明治大学)

Description

In business information systems, many of the questions of both ethics and business benefit can be usefully considered in terms of levels and type of open-ness to be applied. In this paper, I examine both the ethical implications of such choices, but also the business benefits to be gained, from choosing a more open path. software licensing issues, communication protocols, data formats and customer relations are all considered through this lens. This record was migrated from the OpenDepot repository service in June, 2017 before shutting down.

Files

Open_vs_Closed_OA_Final.pdf

Files (141.1 kB)

Name Size Download all
md5:99bd1e4810301708250dcec5f30e9dc0
141.1 kB Preview Download

Additional details

References

  • [Bastiat, 1850] Bastiat, F. (1850). What is Seen and What is Not Seen. In [Bastiat, 1964]. Original essay published in 1850; available online. [Bastiat, 1964] Bastiat, F. (1964). Selected Essays on Political Economy. Van Nostrand, Princeton, NJ. [Brynjolfsson and Kemerer, 1996] Brynjolfsson, E. and Kemerer, C. F. (1996). network externalities in microcomputer software: An econometric analysis of the spreadsheet market. Management Science, 42(12):1627–1647. www.katzis.org/wiki/images/9/9f/Brynjolfsson 1996.pdf. [Castells, 1996] Castells, M. (1996). The Rise of the Network Society. Number 1 in The Information Age. Blackwell, Chichester. [Castells, 1997] Castells, M. (1997). The Power of Identity. Number 2 in The Information Age. Blackwell, Chichester. [Castells, 2000] Castells, M. (2000). End of Millennium. Number 3 in The Information Age. Blackwell, Chichester. [Chandler, 2008] Chandler, J. A. (2008). Contracting insecurity: Software license terms that undermine cybersecurity. In [Matwyshyn, 2008], pages 159–201. [Constitution Committee of the House of Lords, 2008] Constitution Committee of the House of Lords (2008). Second Report; Surveillance; Citizens and the State. www.publications.parliament.uk/pa/ld200809/ldselect/ldconst/18/1802.htm. [Digital Preservation Coalition, ] Digital Preservation Coalition. Handbook of preservation management of digital materials. www.dpconline.org/graphics/handbook/. [Drahos and Braithwaite, 2002] Drahos, P. and Braithwaite, J. (2002). Information Feudalism. Earthscan. [Feller et al., 2003] Feller, J., Fitzgerald, B., Hissam, S., and Lakhani, K., editors (2003). Taking Stock of the Bazaar: Proceedings of the 3rd Workshop on Open Source Software Engineering. opensource.ucc.ie/icse2003/. [Gates III, 1976] Gates III, W. H. (1976). An open letter to hobbyists. www.blinkenlights.com/classiccmp/gateswhine.html. [Himanen, 2001] Himanen, P. (2001). The Hacker Ethic and the Spirit of the Information Age. Vintage, New York, NY. Prologue by Linus Torvalds, epilogue by Manuel Castells. [Hu and Junnarkar, 1999] Hu, J. and Junnarkar, S. (1999). AOL blocks Microsoft Net messaging. CNet News. news.cnet.com/2100-1023-228960.html. [Hunt, 2000] Hunt, S. (2000). A general theory of competition: Resources, competences, productivity, economic growth. Sage, Thousan Oaks, CA. [Jefferson, 1907] Jefferson, T. (1907). Writings of Thomas Jefferson. The Thomas Jefferson Memorial Association. [Klein, 2000] Klein, N. (2000). No Logo. Picador, New York, NY. [Levy, 2001] Levy, S. (2001). Hackers: Heroes of the Computer Revolution. Penguin, London. [Loren, 2004] Loren, L. P. (2004). Slaying the Leather-Winged Demons in the Night: Reforming Copyright Owner Contracting with Clickwrap Misuse. Ohio Northern University law Review, 30(3):495–536. [Matwyshyn, 2008] Matwyshyn, A., editor (2008). Harboring Data: Information Security, Law, and the Corporation. Stanford Law Books, Stanford, CA. [May, 2003] May, C. (2003). Digital rights management and the breakdown of social norms. First Monday, 8(11). [Raymond, 2001] Raymond, E. S. (2001). The Cathedral and the Bazaar. O'Reilly. www.catb.org/ esr/writings/cathedral-bazaar. [Shaikh and Cornford, 2003] Shaikh, M. and Cornford, T. (2003). Version Management Tools: CVS to BK in the Linux Kernel. In [Feller et al., 2003], pages 127–132. opensource.ucc.ie/icse2003/. [Shirky, 2008] Shirky, C. (2008). Here Comes Everybody. Allen Lane, London. [Solove, 2007] Solove, D. J. (2007). The Future of Reputation. Yale University Press, New Haven, CT. [Stefik, 1997] Stefik, M. (1997). Shifting the possible: How trusted systems and digital property rights challenge us to rethink digital publishing. Berkeley Technology Law Journal, 12(1):137–160. [Sunstein, 2002] Sunstein, C. R. (2002). Republic.com. Princeton University Press, Princeton, NJ. Second edition also available: Republic.com 2.0, 2007. [Surowiecki, 2004] Surowiecki, J. (2004). The Wisdom of Crowds. Doubleday, New York, NY. [Tapscott and Williams, 2006] Tapscott, D. and Williams, A. D. (2006). Wikinomics. Portfolio, New York, NY. [Williams, 2002] Williams, S. (2002). Free as in Freedom; Richard Stallman's Crusade for Free Software. O'Reilly, Sebastapol, CA.