home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Wed Jan 18, 1995 Volume 7 : Issue 04
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Archivist: Brendan Kehoe
- Retiring Shadow Archivist: Stanton McCandlish
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Copy Reader: Laslo Toth
-
- CONTENTS, #7.04 (Wed, Jan 18, 1995)
-
- File 1--GIF Tax Rumors- Threat or Menace? (Resp #1)
- File 2--Re CuD 7.02 - Compuserv/Unisys GIF tax
- File 3--The InterNewt
- File 4--cu in the news
- File 5--INFORMATION ACCESS: Not Just Wires (fwd)
- File 6-- Re: COOCS'95 Deadline extended until January 30C
- File 7--**How do I protect my program??**
- File 8--Comment on D. Batterson's article (CuD 6.106)
- File 9--Cu Digest Header Information (unchanged since 25 Nov 1994)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ----------------------------------------------------------------------
-
- Date: Thu, 12 Jan 1995 14:12:31 -0600
- From: /G=Brad/S=Hicks/OU1=0205465@MHS-MC.ATTMAIL.COM
- Subject: File 1--GIF Tax Rumors- Threat or Menace? (Resp #2)
-
- Date: 1/12/95 1:06 PM
- Subj: GIF Tax Rumors: Threat or Menace?
-
- For those of you who haven't been reading your email lately, or who have
- managed to escape the net's Crisis of the Month Club, on December 28th
- CompuServe issued an unnecessarily tangled, poorly worded press release
- that contained the words "patent," "GIF," "royalty," and "CompuServe."
- Pat Clawson, the President and CEO of TeleGraphix Communications Inc.,
- spread the word to the world, along with his own interpretation.
-
- For the next two weeks, all "the usual places" on the net (CompuServe's
- GRAPHSUPPORT forum, Telecom Digest, Computer underground Digest, and
- various UseNet newsgroups) exploded with scads of non-lawyers'
- interpretations of a document that was clearly written (or at least
- approved) by lawyers.
-
- Serveral days ago, CompuServe issued another statement, clarifying the
- whole mess. If I may abstract it:
-
- 1) The GIF image format, which CompuServe invented and promoted, uses
- LZW compression to bring down the image size.
- 2) At the time, CompuServe was under the impression that LZW was public
- domain. In fact, it was (being?) patented by Unisys.
- 3) Unisys wants its dough. Any package which uses LZW compression or
- decompression, including anything that can make or display a GIF
- image,
- infringes on their patent.
- 4) CompuServe negotiated a pass-through agreement: for a nominal sum per
- copy sold, you can sublicense the LZW/GIF code from CompuServe.
- 5) However, the terms of CompuServe's agreement with Unisys require that
- they only sub-license software that was written specifically to
- communicate with CompuServe.
- 6) If that =isn't= what your software is for, then you need to negotiate
- your =own= agreement with Unisys for the offending LZW routines, or
- stop selling software that uses them.
-
- In his January 2nd screed, Pat Clawson of TeleGraphix misinterprets points
- four through six above. His interpretation, which is now ricocheting
- around the net, argues that GIF is now legally restricted to CompuServe
- only. Nothing could be farther from the truth.
-
- Of course, Pat Clawson is not without fiscal interest in this controversy,
- either. Within a day or so of his first call to arms, his company had
- offered a competing spec, called GEF. Of course, at first his would be
- the only software that could read it, which is always good for the ol'
- market share, eh Pat? Oh, except now he's promoting yet another graphics
- standard, RIPScript ... as evidenced by the fact that his Internet email
- address has changed from PATCLAWSON@telegraphix.com to
- rip.support@telegraphix.com.
-
- On top of that, four days later Unisys' Public Relations department made
- an announcement in CompuServe's GRAPHSUPPORT forum that is even better
- news.
-
- 7) Unisys only wants to charge royalties from communications software
- vendors who are charging a fee for software intended to connect to a
- commercial online service.
- 8) Unisys explicitly says that they will not charge a royalty for "non-
- commercial, non-profit GIF-based applications, including those for
- use on the on-line services" or for "non-commercial, non-profit
- offerings on the Internet, including +Freeware+."
- 9) They also made it pretty clear that they won't charge for selling
- images, whether via World Wide Web pages, CompuServe fora, or local
- bulletin boards. It's the software vendors whose software =makes=
- the images who'll have to pay.
-
- In other words, unless you =sell= =communications software= specifically
- for connecting to =commercial online services= such as CompuServe or
- America Online, and your software displays GIFs, you'll have to pay a
- royalty. CompuServe estimates that the royalty will work out to around 11
- cents per copy of the software sold. If you want to explore alternatives
- to sub-licensing from CompuServe, or you want to make sure that you are
- covered, email lzw_info@unisys.com and =ask them=.
-
- Everybody else can relax, sit back down, and let this month's Panic of the
- Month ebb away. There is no FCC modem tax, there is no FCC proposed rule
- to outlaw religious broadcasting, Craig Shergold doesn't want more
- postcards, and there is no conspiracy to tax, license, restrict, or outlaw
- GIF files.
-
- P.S. Thank all holy Gods that everyone involved is including a date and an
- email address in their messages on the subject. Hopefully, we won't be
- hearing about this "new threat" in five years.
-
- P.P.S. Come to think of it, the FCC Modem Tax memetic infection started
- with a CompuServe public announcement, too. "CompuServe Public Relations:
- Threat or Menace?" Nah, it's probably just a coincidence.
-
- ------------------------------
-
- Date: Thu, 12 Jan 1995 09:09:43 +0500
- From: rich@PARIS.INTERTV.COM(Richard Forno)
- Subject: File 2--Re CuD 7.02 - Compuserv/Unisys GIF tax
-
- That just shows a few things. Firstly, it shows Compuserv's desire to
- get noticed in the GII. They have probably lost marketshare to smaller
- places such as AOL or due to people getting full-service accounts at
- work and/or school. CServe figures that by adding this tax, they will
- get a return on the existing .GIF Technology already in cyberspace.
- Wrong! That's like the already-trampled-and-beaten PGP horse. That's
- like having the federal government attempt to liscence and control
- EVERY copy of PGP in existence and the subsequent use of the program
- thereof. IT WON'T WORK!! Finally, since the public liscence conditions
- weren't made available from Compuserv, I agree that it is their sneak
- attack on the online community. If Compuserv feels this strongly about
- the widespread use of GIF technology in the advancement of the Global
- Information Infrastructure (which I would think as flattering, at
- least) they would rethink this half-crazed concept of theirs. There
- are other, more flexible image types that can easily fill the gap in
- W3 sites and other GIF areas. IMHO, this is a major blunder for
- Compuserv. It shows their motive for existence as only for profit
- --forget helping advance on the GII, they just want bucks.
-
- Not to mention, if .GIF was designed for use by the shareware
- community, doesn't this kind of go against the shareware concept and
- further show CServ's attempt to grandfather in this tax?
-
- ------------------------------
-
- Date: Fri, 13 Jan 1995 14:00:41 -0800
- From: dbatterson@ATTMAIL.COM(David Batterson)
- Subject: File 3--The InterNewt
-
- Newt and the Art of the Internet
- By David Batterson
-
- As the Religious Reich continues to march to the tune of "Onward
- Christian Soldiers," we can expect the clueless Newtbies,
- chainsmoking Helmsmen and Rush dittohead dorks to increase their
- invasion of the Net.
-
- Of course, they will not be satisfied with the Internet status
- quo, but will immediately want to change things around to suit their
- rightwing agenda (and placate their corporate contributors). Let's
- prognosticate what we might expect if they have their way.
-
- Senator Jesse Helms will be setting up a WWW home page for the
- tobacco industry, where we can view video clips on the joys of
- smoking, read informative text on how curbing smoking is an
- infringement of our Constitutional liberties, see .GIF photos of
- celebrities smoking away, and listen to .WAV files of cigarette
- manufacturer CEOs testifying before Congress that there's no evidence
- linking tobacco to lung cancer. Address: http://www.rightwing.puk
-
- Speaker Newt Gingrich will set up a gopher site, where you can
- to read and post in delightful new Newsgroups
- like jobs.many.entrylevel, alt.gay.hangem, people.orphanages.buildem,
- legal.aid.nofunds, TV.public.disband, defense.budget.skyhigh,
- environment.pollute.whocares, and tobacco.ifyagotem.smokem.
-
- You'll have to learn some new terminology when the "Sieg Heil"
- crowd takes over. Don't worry, though; there will not be prison time
- for first time offenders who still use the old meanings. You will be
- required to subscribe to National Review, however, to catch up.
-
- The definition of WWW (World Wide Web) will be changed to We
- Want Wealth.
-
- Archie and Veronica will be banned, and be replaced by earlier
- comic strip characters Mutt and Jeff (to reflect the same age and
- brainpower of our new leaders).
-
- URL (Uniform Resource Locator) will probably become Unscrupulous
- Republican Liars.
-
- IRC (Internet Relay Chat) becomes Irresponsible, Reprehensible
- Congress.
-
- WAIS (Wide Area Information Server) switches over to Women Are
- Insignificant Servants.
-
- SLIP/PPP (Serial Line Internet Protocol/Point-to-Point Protocol)
- will see its definition fall by the wayside. The terms will soon
- stand for Slippery, Lame Internal Policies/Petty Political
- Pugnaciousness.
-
- TCP/IP (Transmission Control Protocol/Internet Protocol) will
- stand for Take Control and Plunder/Ignore Populace.
-
- And FTP (File Transfer Protocol)? That's easy. It will soon
- mean: Fuck The People.
-
- See ya on the Net, and don't forget to give the third-finger
- salute to the new Congressional leadership. 8^/
- ###
-
- David Batterson contributes to WIRED, CONNECT, WAVE, Portland
- Computer Bits, ComputorEdge and other publications. Cyberaddress:
- dbatterson@attmail.com. Copyright 1995; all rights reserved.
-
- ------------------------------
-
- Date: Fri, 13 Jan 1995 12:21:41 -0800
- From: Gordon Meyer <72307.1502@COMPUSERVE.COM>
- Subject: File 4--cu in the news
-
- Check Fraud
- ==========
- According to the American Banksers Association (ABA), check fraud has
- risen 136% over 1991 levels. Some of the culprits are desktop
- publishing and laser printers, which allow for easier forging of
- payroll checks. The ABA countermeasures for these developments include
- direct deposit, software that watches for suspicious-looking check
- numbers, and discouraging legitimate customers from printing their own
- checks on plain-paper.
- (ComputerWorld. 12/5/94 pg 8)
-
- Cyberspace and the Law
- ====================
- Edward Cavazos, attorney and author of _Cyberspace and The Law_ (MIT
- Press), is briefly interviewed in the Dec. 5, 1994 issue of
- ComputerWorld. Cavazos warns that there are several pitfalls for
- businesses that allows employees access to the Internet. These include
- copyright violations, privacy issues, and possible libel problems.
- (pgs 114-116)
-
- ------------------------------
-
- Date: Mon, 19 Dec 1994 14:47:34 -0600 (CST)
- From: David Smith <bladex@BGA.COM>
- Subject: File 5--INFORMATION ACCESS: Not Just Wires (fwd)
-
- ---------- Forwarded message ----------
-
- **************************************
- * Copyright Karen Coyle, 1994 *
- * *
- * This document may be *
- * circulated freely on the Net *
- * with this statement included. *
- * For any commercial use, or *
- * publication (including electronic *
- * journals), you must obtain the *
- * permission of the author *
- * kec@stubbs.ucop.edu *
- **************************************
-
- ACCESS: Not Just Wires
- By Karen Coyle
- (University of California, Library Automation)
- (Computer Professionals for Social Responsibility, Berkeley Chapter)
-
- ** This is the written version of a talk given at the 1994 CPSR Annual
- meeting in San Diego, CA, on Oct. 8. **
-
- I have to admit that I'm really sick and tired of the Information
- highway. I feel like I've already heard so much about it that it must
- be come and gone already, yet there is no sign of it. This is truly a
- piece of federal vaporware.
-
- I am a librarian, and I and it's especially strange to have dedicated
- much of your life to the careful tending of our current information
- infrastructure, our libraries, only to wake up one morning to find that
- the entire economy of the nation depends on making information
- commercially viable. There's an element of Twilight Zone about this
- because libraries are probably our most underfunded and underappreciated
- of institutions, with the possible exception of day care centers.
-
- It's clear to me that the information highway isn't much about
- information. It's about trying to find a new basis for our economy.
- I'm pretty sure I'm not going to like the way information is treated in
- that economy. We know what kind of information sells, and what doesn't.
- So I see our future as being a mix of highly expensive economic reports
- and cheap online versions of the National Inquirer. Not a pretty
- picture.
-
- This is a panel on "access." But I am not going to talk about access
- from the usual point of view of physical or electronic access to the
- FutureNet. Instead I am going to talk about intellectual access to
- materials and the quality of our information infrastructure, with the
- emphasis on "information.". Information is a social good and part of our
- "social responsibility" is that we must take this resource seriously.
-
- >From the early days of our being a species with consciousness of its own
- history, some part of society has had the role of preserving this
- history: priests, learned scholars, archivists. Information was
- valued; valued enough to be denied to some members of society; to be
- part of the ritual of belonging to an elite.
-
- So I find it particularly puzzling that as move into this new
- "information age" that our efforts are focused on the machinery of the
- information system, while the electronic information itself is being
- treated like just so much more flotsam and jetsam; this is not a
- democratization of information, but a devaluation of information.
-
- On the Internet, many electronic information sources that we are
- declaring worthy of "universal access" are administered by part-time
- volunteers; graduate students who do eventually graduate, or network
- hobbyists. Resources come and go without notice, or languish after an
- initial effort and rapidly become out of date. Few network information
- resources have specific and reliable funding for the future. As a
- telecommunications system the Internet is both modern and mature; as an
- information system the Internet is an amateur operation.
-
- Commercial information resources, of course, are only interested in
- information that provides revenue. This immediately eliminates the
- entire cultural heritage of poetry, playwriting, and theological
- thought, among others.
-
- If we value our intellectual heritage, and if we truly believe that
- access to information (and that broader concept, knowledge) is a valid
- social goal, we have to take our information resources seriously. Now I
- know that libraries aren't perfect institutions. They tend to be
- somewhat slow-moving and conservative in their embrace of new
- technologies; and some seem more bent on hoarding than disseminating
- information. But what we call "modern librarianship" has over a century
- of experience in being the tender of this society's information
- resources. And in the process of developing and managing that resource,
- the library profession has understood its responsibilities in both a
- social and historical context. Drawing on that experience, I am going
- to give you a short lesson on social responsibilities in an information
- society.
-
- Here are some of our social responsibilities in relation to information:
- 1. Collection
- 2. Selection
- 3. Preservation
- 4. Organization
- 5. Dissemination
-
- 1. Collection:
- It is not enough to passively gather in whatever information comes your
- way, like a spider waiting on its web. Information collection is an
- activity, and an intelligent activity. It is important to collect and
- collocate information units that support, complement and even contradict
- each other. A collection has a purpose and a context; it says something
- about the information and it says something about the gatherer of that
- information. It is not random, because information itself is not
- random, and humans do not produce information in a random fashion.
-
- Too many Internet sites today are a terrible hodge-podge, with little
- intellectual purpose behind their holdings. It isn't surprising that
- visitors to these sites have a hard time seeing the value of the
- information contained therein. Commercial systems, on the other hand,
- have no incentive to provide an intellectual balance that might
- "confuse" its user.
-
- In all of the many papers that have come out of discussion of the
- National Information Infrastructure, it is interesting that there is no
- mention of collecting information: there is no Library of Congress or
- National Archive of the electronic inforamtion world. So in the whole
- elaborate scheme, no one is responsbile for the collection of
- information.
-
- 2. Selection:
- Not all information is equal. This doesn't mean that some of it should
- be thrown away, though inevitably there is some waste in the information
- world. And this is not in support of censorship. But there's a
- difference between a piece on nuclear physics by a Nobel laureate and a
- physics diorama entered into a science fair by an 8-year-old. And
- there's a difference between alpha release .03 and beta 1.2 of a
- software package. If we can't differentiate between these, our
- intellectual future looks grim indeed.
-
- Certain sources become known for their general reliability, their
- timeliness, etc. We have to make these judgments because the sheer
- quantity of information is too large for us to spend our time with
- lesser works when we haven't yet encountered the greats.
-
- This kind of selection needs to be done with an understanding of a
- discipline and understanding of the users of a body of knowledge. The
- process of selection overlaps with our concept of education, where
- members of our society are directed to a particular body of knowledge
- that we hold to be key to our understanding of the world.
-
- 3. Preservation:
- How much of what is on the Net today will exist in any form ten years
- from now? And can we put any measure to what we lose if we do not
- preserve things systematically? If we can't preserve it all, at least
- in one safely archived copy, are we going to make decisions about
- preservation, or will we leave it up to a kind of information
- Darwinianism? As we know, the true value of some information may not be
- immediately known, and some ideas gain in value over time.
-
- The commercial world, of course, will preserve only that which sells
- best.
-
- 4. Organization:
- This is an area where the current Net has some of its most visible
- problems, as we have all struggled through myriad gopher menus, ftp
- sites, and web pages looking for something that we know is there but
- cannot find.
-
- There is no ideal organization of information, but no organization is no
- ideal either. The organization that exists today in terms of finding
- tools is an attempt to impose order over an unorganized body. The human
- mind in its information seeking behavior is a much more complex question
- than can be answered with a keyword search in an unorganized information
- universe. When we were limited to card catalogs and the placement of
- physical items on shelves, we essentially had to choose only one way to
- organize our information. Computer systems should allow us to create a
- multiplicity of organization schemes for the same information, from
- traditional classification, that relies on hierarchies and categories,
- to faceted schemes, relevance ranking and feedback, etc.
-
- Unfortunately, documents do not define themselves. The idea of doing
- WAIS-type keyword searching on the vast store of textual documents on
- the Internet is a folly. Years of study of term frequency, co-
- occurrence and other statistical techniques have proven that keyword
- searching is a passable solution for some disciplines with highly
- specific vocabularies and nearly useless in all others. And, of course,
- the real trick is to match the vocaubulary of the seeker of information
- with that of the information resource. Keyword searching not only
- doesn't take into account different terms for the same concepts, it
- doesn't take into account materials in other languages or different user
- levels (i.e. searching for children will probably need to be different
- than searching done by adults, and libraries actually use different
- subject access schemes for childrens' materials). And non-textual items
- (software, graphics, sound) do not respond at all to keyword searching.
-
- There is no magical, effortless way to create an organization for
- information; at least today the best tools are a clearly defined
- classification scheme and a human indexer. At least a classification
- scheme or indexing scheme gives the searcher a chance to develop a
- rational strategy for searching.
-
- The importance of organizational tools cannot be overstated. What it
- all comes down to is that if we can't find the information we need, it
- doesn't matter if it exists or not. If we don't find it, we don't
- encounter it, then it isn't information. There are undoubtedly millions
- of bytes of files on the Net that for all practical purposes are non-
- existant .
-
- My biggest fear in relation to the information highway is that
- intellectual organization and access will be provided by the commercial
- world as a value-added service. So the materials will exist, even at an
- affordable price, but it will cost real money to make use of the tools
- that will make it possible for you to find the information you need.
- If we don't provide these finding tools as part of the public resource,
- then we aren't providing the information to the public.
- 5. Dissemination:
- There's a lot of talk about the "electronic library". Actually, there's
- a lot written about the electronic library, and probably much of it ends
- up on paper. Most of us agree that for anything longer than a one-
- screen email message, we'd much rather read documents off a paper page
- than off a screen. While we can hope that screen technologies will
- eventually produce something that truly substitutes for paper, this
- isn't true today. So what happens with all of those electronic works
- that we're so eager to store and make available? Do we reverse the
- industrial revolution and return printing of documents to a cottage
- industry taking place in homes, offices and libraries?
-
- Many people talk about their concerns for the "last mile" - for the
- delivery of information into every home. I'm concerned about the last
- yard . We can easily move information from one computer to another, but
- how do we get it from the computer to the human being in the proper
- format? Not all information is suited to electronic use. Think of the
- auto repair manuals that you drag under the car and drip oil on. Think
- of children's books, with their drool-proof pages.
-
- Even the Library of Congress has announced that they are undertaking a
- huge project to digitize 5 million items from their collection. Then
- what ? How do they think we are going to make use of those materials?
-
- There are times when I can only conclude that we have been gripped by
- some strange madness. I have fantasies of kidnapping the entire
- membership of the administration's IITF committees and tying them down
- in front of 14" screens with really bad flicker and forcing them to read
- the whole of Project Gutenberg's electronic copy of Moby Dick. Maybe
- then we'd get some concern about the last yard.
-
- In conclusion:
- 1. No amount of wiring will give us universal access
- 2. Just adding more files and computers to gopherspace, webspace and
- FTPspace will not give us better access
- 3. And commercial information systems can be expected to be....
- commercial
-
- ------------------------------
-
- Date: Wed, 11 Jan 1995 21:21:03 -0800
- From: Rob Kling <kling@ICS.UCI.EDU>
- Subject: File 6-- Re: COOCS'95 Deadline extended until January 30C
-
- Deadline extended until January 30 ........
-
-
- Call for Papers:
-
- Behavioral & Social Impacts Track
-
- Conference on Organizational Computing Systems
- COOCS `95
- Sponsored by ACM SIGOIS
-
-
- This conference has three tracks, and I'm posting here because I
- believe that the Behavioral & Social Impacts Track will
- interest some readers. While conferece focusses on "org computing systems,"
- interorganizational communications, telecommuting, commerce on
- the nets, electronically connected voluntary groups as organizations,
- computer-mediated communication in diverse forms,
- and many other such broad topics can fit ... as
- computing/telecomm crosses org boundaries in so many ways these days.
-
- Rob Kling
- Chair, Behavioral and Social Impacts Track
-
- ----------
-
- Topics for Track II: Behavioral and Social Impacts
-
- o Social processes in the development and use of electronic journals
- o Social processes in the development and use of digital libraries
- o Social impacts of organizational re-engineering
- o Organizational impacts of computerization of large applications
- o Integrating information systems and small groups
- o Social-technical systems analysis (theory and case studies)
- o Organization and ramifications of mobile offices
- o Open systems policies, standards, and impacts
- o Social aspects of globally distributed organizational computing
- o Theoretical approaches for understanding the development, use and/or
- social impacts of information technologies
- o The influence of technology and work organization on work life
- o The cultural dimensions of computerization within and between
- organizations
-
-
- IMPORTANT DATES
- Submission due: January 30, 1995
- Author notification: March 8, 1995
- Manuscripts due: May 10, 1995
- Conference dates: August 13-16, 1995
-
- -------------------------------------------
- CONFERENCE SPECIFICS:
-
- -------------------
-
- Conference Location: Sheraton Silicon Valley ----Milpitas (near
- San Jose), California August 13-16, 1995 (Immediately after the
- Workflow `95 conference)
-
- As we endeavor to move toward more effective and efficient organizations,
- we must take into account technical, social, and organizational aspects of
- computerization. This conference is organized as three tracks in order to
- address these aspects.
- I. Business processes track
- II. Behavioral and social impacts track
- III. Technical aspects track
-
- Advances in tools, processes, technologies, and methodologies that
- facilitate the use of information systems in organizations can improve
- the way information is made available and used. This conference is
- intended to bring together researchers and practitioners interested
- in the introduction, management, deployment, and analysis of information
- and processes within organizations. The scope of the conference is
- intended to cover areas related to this goal, including but not
- limited to:
-
-
- Track II: Behavioral and Social Impacts
-
- o Social processes in the development and use of electronic journals
- o Social processes in the development and use of digital libraries
- o Social impacts of organizational re-engineering
- o Organizational impacts of computerization of large applications
- o Integrating information systems and small groups
- o Social-technical systems analysis (theory and case studies)
- o Organization and ramifications of mobile offices
- o Open systems policies, standards, and impacts
- o Social aspects of globally distributed organizational computing
- o Theoretical approaches for understanding the development, use and/or
- social impacts of information technologies
- o The influence of technology and work organization on work life
- o The cultural dimensions of computerization within and between
- organizations
-
- ------------------------------
-
- Track I: Business Processes
- o Workflow systems, models, and theories
- o Process meta-models and meta-modeling
- o Models and strategies for business process design, and re-engineering
- o Measurement-based approaches to organizational analysis
- o Process acquisition, monitoring and management tools
- o Business systems formalisms
- o Experiences with process models and process management tools
-
- Track III: Technical Aspects
- o Organizational computing systems and infrastructure
- o Groupware
- o Object and database models and systems
- o Computer supported collaboration and negotiation
- o Distributed AI, expert systems, multi-agent models
- o Coordination technology and workflow technology
- o Multimedia information storage, retrieval, and communications
-
- Each track of the conference will have a program chair and a program
- committee. Thus, each paper should be submitted to the program chair
- of the most appropriate track. (See below for all 3 track
- chairs)
-
- Rob Kling (behavioral track chair)
- Dept. Information/Computer Sci
- University of California
- Irvine, CA 92715 USA
- Phone: +1 714 856 5955
- Fax: +1 714 856 4056
- email: kling@ics.uci.edu
-
- If a submission falls within several tracks, please submit it to
- one program chair, and note the overlap in a cover letter, so
- that the submission can be properly considered. Each submission
- will be critically reviewed and judged by the appropriate
- program committee(s). Submissions to the conference can be in
- the form of papers, or demonstration, panel, workshop or
- tutorial pro- posals. Papers can take either of two forms:
-
- (1) Research investigations present original work in any of the
- areas of interest to the conference.
-
- (2) Case studies discuss projects which introduce innovative tools,
- technologies or methodologies into particular organizational
- settings, and critically analyze the results and impact of the
- project.
-
-
- RESEARCH PAPERS --
-
- Papers should present original reports of substantive new work
- or integrative reviews. Theory, methodology, and concept papers
- should present new theories, empirical results, methodologies or
- concepts that stimulate new ways of thinking about, supporting,
- or studying organizational information systems (broadly
- conceived).
-
- All papers should provide a concise message to the audience
- about how the work relates to previous research or experience
- and what aspects of the work are new. Papers will be evaluated
- on the basis of originality, significance of the contribution to
- the field, quality of research, and quality of writing.
-
- Papers should not exceed 12 ACM camera-ready pages. It is
- possible that some papers will be presented at the conference in
- poster sessions. Papers must include an abstract of no more than
- 100 words. Papers must be twelve pages or less, including
- abstract, figures, and references, printed in double columns, in
- 12 point Times font, on 8.5"X11" paper (See proceedings of
- COOCS'93 or CSCW'94 for examples.)
-
-
- ------------------------------
-
- Demonstration proposals should be 3-5 pages long, and include
- enough information to allow the committee to judge the relevance
- and significance of the work. Please include machine requirements.
-
- Panel proposals should motivate the subject of the panel and give
- brief biographical sketches of proposed panel members.
-
- Workshop and Tutorial proposals should motivate the workshop/tutorial
- and its relevance to this conference. For tutorials, provide an outline
- and a brief biographical sketch of the proposers. For workshops,
- motivate the workshop, indicate how you would select participants,
- and outline the format of the workshop. Proposals for both half-day
- and full-day workshops and tutorials are welcome.
-
- Authors should submit five copies of the manuscript or proposal,
- in English, together with a cover sheet, to the appropriate
- Program Chair by January 4, 1995. The cover sheet should contain
- (i) submission type; (ii) title; (iii) names, addresses, phone
- numbers, fax numbers and email addresses (if available) of all
- authors; (iv) contact author; (v) keywords and abstract.
- Information on paper format can be obtained from any of the
- Program Co-chairs.
-
- IMPORTANT DATES
- Submission due: January 4, 1995
- Author notification: March 8, 1995
- Manuscripts due: May 10, 1995
- Conference dates: August 13-16, 1995
-
- Conference Co-Chairs
- Nora Comstock Clarence A. Ellis
- Comstock Connections Dept. of Computer Science
- 3103 Loyola Ln. University of Colorado
- Austin, TX 78723 U.S.A. Boulder, CO 80309 U.S.A
- +1 512 928 8780 voice and fax +1 303 492 5984
- loyola!nora@cs.utexas.edu (UUCP) skip@cs.colorado.edu
-
- PROGRAM CHAIRS
-
- John Mylopoulos (business track) Rob Kling (behavioral track)
- Dept. of Computer Science Dept. Information/Computer Sci
- University of Toronto University of California
- Toronto, Ontario, CANADA Irvine, CA 92715 USA
- Phone: +1 416 978 5180 Phone: +1 714 856 5955
- Fax: +1 416 978 1455 Fax: +1 714 856 4056
- email: jm@ai.toronto.edu email: kling@ics.uci.edu
-
- Simon Kaplan (technical track)
- Dept. of Computer Science
- University of Illinois
- 1304 W. Springfield Ave.
- Urbana, IL 61801 USA
- Phone:+1 217 244 0392
- Fax: +1 217 333 3501
- email: kaplan@cs.uiuc.edu
-
-
- REGISTRATION/LOCAL ARRANGEMENTS
- WORKSHOP ARRANGEMENTS TREASURER
- Keith Swenson Jeanie Treichel
- Fujitsu OSSI Sun Microsystems Lab, Inc.
- 3055 Orchard Dr. 2550 Garcia Avenue, UMTV 29-01
- San Jose, CA 95134 Mountain View CA 94043
- Phone: +1408 456 7667 Phone: +1 415 336 5260
- Fax: +1 408 456 7050 Fax: +1 415 691 0756
- kswenson@ossi.com email: jeanie.treichel@Sun.COM
-
- ------------------------------
-
- From: Warren Smith <warren205@DELPHI.COM>
- Subject: File 7--**How do I protect my program??**
- Date: Sun, 8 Jan 95 16:32:30 -0500
-
- I have spent two years of part-time work writing a program which I
- hope to sell sometime. I would like users to try the program for
- a time, say a month, before they can decide to buy it - I hate spending
- my money on a program that I later find is no good.
-
- The question is - how do I protect all my work against all the pirates
- out there.
-
- Do I force users to use a 'Dongle'? Is there a better way?
- Even the 'Dongle' is not foolproof. And I have to absorb the cost
- of the Dongles given to potential customers who don't later buy the
- program. This also would prevent distribution by wire.
-
- I notice some programs are being distributed on CDROM with a password
- needed to access parts of the program.
-
- Can anyone tell me where I can find help. Any Associations which might
- help me?
-
- By the way, which 'Dongle' is the best?
-
- Sorry to offend all you liberated freedom loving pirates out there.
-
- Thanks,
- Warren.
-
- ------------------------------
-
- Date: Mon, 2 Jan 1995 15:55:02 -0500
- From: Petrocelli@AOL.COM
- Subject: File 8--Comment on D. Batterson's article (CuD 6.106)
-
- Item 2 talks about "old fashioned" market surveys and his opinion that
- they are somehow ridiculous when compared to the on-line, electronic
- version. He writes:
-
- But an e-mailed (or online) survey would be the best way to go.
- PRODIGY already has online opinion polls, with instant results
- available for viewing, so it could be done easily enough. Online
- market research is unintrusive, is digital in nature [no inputing by
- data collectors is required], and surveys can be done according to the
- respondent's time schedule, NOT the market research firm's. This
- major market research firm has its head stuck in the sand, as do many
- other ones.
-
- This is a wonderful sentiment but, alas, an unscientific one. To
- properly conduct a survey of any type requires a random sample.
- Surveys conducted on an on-line service are only valid if you are
- studying people who call on-line services or as a supplement to a
- phone survey. Otherwise, characteristics of people who are on-line
- will skew your results.
-
- When the day comes that everyone is on-line, when we have a truely
- global, electronic community then on-line surveys will make sense.
- Until that time the time-honered way of using a phone and imposing on
- their goodwill will be the best way to gather market intelligence
- aside from showing up at someone's office and doing it in person. We
- should never confuse asking someone for a moment of their time with an
- abrigment of freedom.
-
- ------------------------------
-
- Date: Thu, 23 Oct 1994 22:51:01 CDT
- From: CuD Moderators <tk0jut2@mvs.cso.niu.edu>
- Subject: File 9--Cu Digest Header Information (unchanged since 25 Nov 1994)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send a one-line message: SUB CUDIGEST your name
- Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: In BELGIUM: Virtual Access BBS: +32-69-844-019 (ringdown)
- In ITALY: Bits against the Empire BBS: +39-461-980493
- In LUXEMBOURG: ComNet BBS: +352-466893
-
- UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
- JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD
- ftp://www.rcac.tdi.co.jp/pub/mirror/CuD
-
- The most recent issues of CuD can be obtained from the NIU
- Sociology gopher at:
- URL: gopher://corn.cso.niu.edu:70/00/acad_dept/col_of_las/dept_soci
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #7.04
- ************************************
-
-
-