Now showing items 31-40 of 76
Using a Minimum Threshold to Motivate Contributions to Social Computing
(Submitted to CSCW 2009, 2009-06-08)
Social computing systems collect, aggregate, and share usercontributed content, and therefore depend on contributions from users to function properly. However, humans are intelligent beings and cannot be programmed to ...
Some FAQs about Usage-Based Pricing
(1995)
Written for WWW '94 (Chicago). We answer some frequently asked questions about usage-sensitive pricing for Internet resources.
Endogenous Differentiation of Information Goods Under Uncertainty
(2001)
Information goods can be reconfigured at low cost. Therefore, firms can choose how to differentiate their products at a frequency comparable to price changes. However, doing so effectively is complicated by uncertainty ...
Why Share in Peer-to-Peer Networks
(2006-05-26)
Prior theory and empirical work emphasize the enormous free-riding problem facing peer-to-peer (P2P) sharing networks. Nonetheless, many P2P networks thrive. We explore two possible explanations: private provision of public ...
A Social Mechanism for Supporting Home Computer Security
(Workshop on Information System Economics (WISE), 2008-12-13)
Hackers have learned to leverage the enormous number of poorly protected home computers by turning them into a large distributed system (known as a botnet),making
home computers an important frontier for ecurity research. ...
Antitrust Immunity for Refusals to Deal in (Intellectual) Property Is a Slippery Slope
(2002-07)
The Federal Circuit's decision in CSU v. Xerox1 has generated enormous controversy. However, there seems to be emerging agreement among both critics and supporters of the decision on a correct, narrow reading of the decision. ...
Links Between Vertically Related Markets: ITS v. Kodak
(2002)
In 1987 seventeen small companies filed an antitrust lawsuit against the Eastman Kodak Corporation, alleging that Kodak used its monopoly power over repair parts for its high-volume copiers and micrographics equipment in ...
Security When People Matter: Structuring Incentives For User Behavior
(2007)
Humans are “smart components” in a system, but cannot be directly programmed to perform; rather, their autonomy must be respected as a design constraint and incentives provided to induce desired behavior. Sometimes these ...
Automated Markets and Trading Agents
(2005-04)
Computer automation has the potential, just starting to be realized, of transforming the
design and operation of markets, and the behaviors of agents trading in them. We discuss
the possibilities for automating markets, ...