Computer underground Digest    Wed  Jan 18, 1995   Volume 7 : Issue 04
                           ISSN  1004-042X

       Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
       Archivist: Brendan Kehoe
       Retiring Shadow Archivist: Stanton McCandlish
       Shadow-Archivists: Dan Carosone / Paul Southworth
                          Ralph Sims / Jyrki Kuoppala
                          Ian Dickinson
       Copy Reader:       Laslo Toth

CONTENTS, #7.04 (Wed, Jan 18, 1995)

File 1--GIF Tax Rumors- Threat or Menace? (Resp #1)
File 2--Re CuD 7.02 - Compuserv/Unisys GIF tax
File 3--The InterNewt
File 4--cu in the news
File 5--INFORMATION ACCESS: Not Just Wires (fwd)
File 6--     Re: COOCS'95 Deadline extended until January 30C
File 7--**How do I protect my program??**
File 8--Comment on D. Batterson's article (CuD 6.106)
File 9--Cu Digest Header Information (unchanged since 25 Nov 1994)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

----------------------------------------------------------------------

Date: Thu, 12 Jan 1995 14:12:31 -0600
From: /G=Brad/S=Hicks/OU1=0205465@MHS-MC.ATTMAIL.COM
Subject: File 1--GIF Tax Rumors- Threat or Menace? (Resp #2)

Date: 1/12/95    1:06 PM
Subj: GIF Tax Rumors: Threat or Menace?

For those of you who haven't been reading your email lately, or who have
managed to escape the net's Crisis of the Month Club, on December 28th
CompuServe issued an unnecessarily tangled, poorly worded press release
that contained the words "patent," "GIF," "royalty," and "CompuServe."
Pat Clawson, the President and CEO of TeleGraphix Communications Inc.,
spread the word to the world, along with his own interpretation.

For the next two weeks, all "the usual places" on the net (CompuServe's
GRAPHSUPPORT forum, Telecom Digest, Computer underground Digest, and
various UseNet newsgroups) exploded with scads of non-lawyers'
interpretations of a document that was clearly written (or at least
approved) by lawyers.

Serveral days ago, CompuServe issued another statement, clarifying the
whole mess.  If I may abstract it:

  1) The GIF image format, which CompuServe invented and promoted, uses
     LZW compression to bring down the image size.
  2) At the time, CompuServe was under the impression that LZW was public
     domain.  In fact, it was (being?) patented by Unisys.
  3) Unisys wants its dough.  Any package which uses LZW compression or
     decompression, including anything that can make or display a GIF
image,
     infringes on their patent.
  4) CompuServe negotiated a pass-through agreement: for a nominal sum per
     copy sold, you can sublicense the LZW/GIF code from CompuServe.
  5) However, the terms of CompuServe's agreement with Unisys require that
     they only sub-license software that was written specifically to
     communicate with CompuServe.
  6) If that =isn't= what your software is for, then you need to negotiate
     your =own= agreement with Unisys for the offending LZW routines, or
     stop selling software that uses them.

In his January 2nd screed, Pat Clawson of TeleGraphix misinterprets points
four through six above.  His interpretation, which is now ricocheting
around the net, argues that GIF is now legally restricted to CompuServe
only.  Nothing could be farther from the truth.

Of course, Pat Clawson is not without fiscal interest in this controversy,
either.  Within a day or so of his first call to arms, his company had
offered a competing spec, called GEF.  Of course, at first his would be
the only software that could read it, which is always good for the ol'
market share, eh Pat?  Oh, except now he's promoting yet another graphics
standard, RIPScript ... as evidenced by the fact that his Internet email
address has changed from PATCLAWSON@telegraphix.com to
rip.support@telegraphix.com.

On top of that, four days later Unisys' Public Relations department made
an announcement in CompuServe's GRAPHSUPPORT forum that is even better
news.

  7) Unisys only wants to charge royalties from communications software
     vendors who are charging a fee for software intended to connect to a
     commercial online service.
  8) Unisys explicitly says that they will not charge a royalty for "non-
     commercial, non-profit GIF-based applications, including those for
     use on the on-line services" or for "non-commercial, non-profit
     offerings on the Internet, including +Freeware+."
  9) They also made it pretty clear that they won't charge for selling
     images, whether via World Wide Web pages, CompuServe fora, or local
     bulletin boards.  It's the software vendors whose software =makes=
     the images who'll have to pay.

In other words, unless you =sell= =communications software= specifically
for connecting to =commercial online services= such as CompuServe or
America Online, and your software displays GIFs, you'll have to pay a
royalty.  CompuServe estimates that the royalty will work out to around 11
cents per copy of the software sold.  If you want to explore alternatives
to sub-licensing from CompuServe, or you want to make sure that you are
covered, email lzw_info@unisys.com and =ask them=.

Everybody else can relax, sit back down, and let this month's Panic of the
Month ebb away.  There is no FCC modem tax, there is no FCC proposed rule
to outlaw religious broadcasting, Craig Shergold doesn't want more
postcards, and there is no conspiracy to tax, license, restrict, or outlaw
GIF files.

P.S. Thank all holy Gods that everyone involved is including a date and an
email address in their messages on the subject. Hopefully, we won't be
hearing about this "new threat" in five years.

P.P.S. Come to think of it, the FCC Modem Tax memetic infection started
with a CompuServe public announcement, too. "CompuServe Public Relations:
Threat or Menace?"  Nah, it's probably just a coincidence.

------------------------------

Date: Thu, 12 Jan 1995 09:09:43 +0500
From: rich@PARIS.INTERTV.COM(Richard Forno)
Subject: File 2--Re CuD 7.02 - Compuserv/Unisys GIF tax

That just shows a few things. Firstly, it shows Compuserv's desire to
get noticed in the GII. They have probably lost marketshare to smaller
places such as AOL or due to people getting full-service accounts at
work and/or school. CServe figures that by adding this tax, they will
get a return on the existing .GIF Technology already in cyberspace.
Wrong!  That's like the already-trampled-and-beaten PGP horse. That's
like having the federal government attempt to liscence and control
EVERY copy of PGP in existence and the subsequent use of the program
thereof. IT WON'T WORK!! Finally, since the public liscence conditions
weren't made available from Compuserv, I agree that it is their sneak
attack on the online community. If Compuserv feels this strongly about
the widespread use of GIF technology in the advancement of the Global
Information Infrastructure (which I would think as flattering, at
least) they would rethink this half-crazed concept of theirs. There
are other, more flexible image types that can easily fill the gap in
W3 sites and other GIF areas. IMHO, this is a major blunder for
Compuserv.  It shows their motive for existence as only for profit
--forget helping advance on the GII, they just want bucks.

Not to mention, if .GIF was designed for use by the shareware
community, doesn't this kind of go against the shareware concept and
further show CServ's attempt to grandfather in this tax?

------------------------------

Date: Fri, 13 Jan 1995 14:00:41 -0800
From: dbatterson@ATTMAIL.COM(David  Batterson)
Subject: File 3--The InterNewt

                   Newt and the Art of the Internet
                          By David Batterson

     As the Religious Reich continues to march to the tune of "Onward
Christian Soldiers," we can expect the clueless Newtbies,
chainsmoking Helmsmen and Rush dittohead dorks to increase their
invasion of the Net.

     Of course, they will not be satisfied with the Internet status
quo, but will immediately want to change things around to suit their
rightwing agenda (and placate their corporate contributors).  Let's
prognosticate what we might expect if they have their way.

     Senator Jesse Helms will be setting up a WWW home page for the
tobacco industry, where we can view video clips on the joys of
smoking, read informative text on how curbing smoking is an
infringement of our Constitutional liberties, see .GIF photos of
celebrities smoking away, and listen to .WAV files of cigarette
manufacturer CEOs testifying before Congress that there's no evidence
linking tobacco to lung cancer.   Address: http://www.rightwing.puk

     Speaker Newt Gingrich will set up a gopher site, where you can
 to read and post in delightful new Newsgroups
like jobs.many.entrylevel, alt.gay.hangem, people.orphanages.buildem,
legal.aid.nofunds, TV.public.disband, defense.budget.skyhigh,
environment.pollute.whocares, and tobacco.ifyagotem.smokem.

     You'll have to learn some new terminology when the "Sieg Heil"
crowd takes over.  Don't worry, though; there will not be prison time
for first time offenders who still use the old meanings.  You will be
required to subscribe to National Review, however, to catch up.

     The definition of WWW (World Wide Web) will be changed to We
Want Wealth.

     Archie and Veronica will be banned, and be replaced by earlier
comic strip characters Mutt and Jeff (to reflect the same age and
brainpower of our new leaders).

     URL (Uniform Resource Locator) will probably become Unscrupulous
Republican Liars.

     IRC (Internet Relay Chat) becomes Irresponsible, Reprehensible
Congress.

     WAIS (Wide Area Information Server) switches over to Women Are
Insignificant Servants.

     SLIP/PPP (Serial Line Internet Protocol/Point-to-Point Protocol)
will see its definition fall by the wayside.  The terms will soon
stand for Slippery, Lame Internal Policies/Petty Political
Pugnaciousness.

     TCP/IP (Transmission Control Protocol/Internet Protocol) will
stand for Take Control and Plunder/Ignore Populace.

     And FTP (File Transfer Protocol)?  That's easy.  It will soon
mean: Fuck The People.

     See ya on the Net, and don't forget to give the third-finger
salute to the new Congressional leadership.  8^/
###

     David Batterson contributes to WIRED, CONNECT, WAVE, Portland
Computer Bits, ComputorEdge and other publications.  Cyberaddress:
dbatterson@attmail.com.  Copyright 1995; all rights reserved.

------------------------------

Date: Fri, 13 Jan 1995 12:21:41 -0800
From: Gordon Meyer <72307.1502@COMPUSERVE.COM>
Subject: File 4--cu in the news

Check Fraud
==========
According to the American Banksers Association (ABA), check fraud has
risen 136% over 1991 levels. Some of the culprits are desktop
publishing and laser printers, which allow for easier forging of
payroll checks. The ABA countermeasures for these developments include
direct deposit, software that watches for suspicious-looking check
numbers, and discouraging legitimate customers from printing their own
checks on plain-paper.
(ComputerWorld. 12/5/94 pg 8)

Cyberspace and the Law
====================
Edward Cavazos, attorney and author of _Cyberspace and The Law_ (MIT
Press), is briefly interviewed in the Dec. 5, 1994 issue of
ComputerWorld. Cavazos warns that there are several pitfalls for
businesses that allows employees access to the Internet. These include
copyright violations, privacy issues, and possible libel problems.
(pgs 114-116)

------------------------------

Date: Mon, 19 Dec 1994 14:47:34 -0600 (CST)
From: David Smith <bladex@BGA.COM>
Subject: File 5--INFORMATION ACCESS: Not Just Wires (fwd)

               ---------- Forwarded message ----------

**************************************
*   Copyright Karen Coyle, 1994      *
*                                    *
*  This document may be              *
* circulated freely on the Net       *
* with this statement included.      *
* For any commercial use, or         *
* publication (including electronic  *
* journals), you must obtain the     *
* permission of the author           *
*   kec@stubbs.ucop.edu              *
**************************************

ACCESS: Not Just Wires
By Karen Coyle
(University of California, Library Automation)
(Computer Professionals for Social Responsibility, Berkeley Chapter)

** This is the written version of a talk given at the 1994 CPSR Annual
meeting in San Diego, CA, on Oct. 8. **

I have to admit that I'm really sick and tired of the Information
highway.  I feel like I've already heard so much about it that it must
be come and gone already, yet there is no sign of it.  This is truly a
piece of federal vaporware.

I am a librarian, and I and it's especially strange to have dedicated
much of your life to the careful tending of our current information
infrastructure, our libraries, only to wake up one morning to find that
the entire economy of the nation depends on making information
commercially viable.  There's an element of Twilight Zone about this
because libraries are probably our most underfunded and underappreciated
of institutions, with the possible exception of day care centers.

It's clear to me that the information highway isn't much about
information.  It's about trying to find a new basis for our economy.
I'm pretty sure I'm not going to like the way information is treated in
that economy.  We know what kind of information sells, and what doesn't.
So I see our future as being a mix of highly expensive economic reports
and cheap online versions of the National Inquirer.  Not a pretty
picture.

This is a panel on "access."  But I am not going to talk about access
from the usual point of view of physical or electronic access to the
FutureNet.  Instead I am going to talk about intellectual access to
materials and the quality of our information infrastructure, with the
emphasis on "information.". Information is a social good and part of our
"social responsibility" is that we must take this resource seriously.

>From the early days of our being a species with consciousness of its own
history, some part of society has had the role of preserving this
history:  priests, learned scholars, archivists.  Information was
valued; valued enough to be denied to some members of society; to be
part of the ritual of belonging to an elite.

So I find it particularly puzzling that as move into this new
"information age" that our efforts are focused on the machinery of the
information system, while the electronic information itself is being
treated like just so much more flotsam and jetsam; this is not a
democratization of information, but a devaluation of information.

 On the Internet, many electronic information sources that we are
declaring worthy of "universal access" are administered by part-time
volunteers; graduate students who do eventually graduate, or network
hobbyists.  Resources come and go without notice, or languish after an
initial effort and rapidly become out of date.  Few network information
resources have specific and reliable funding for the future.  As a
telecommunications system the Internet is both modern and mature; as an
information system the Internet is an amateur operation.

Commercial information resources, of course, are only interested in
information that provides revenue.  This immediately eliminates the
entire cultural heritage of poetry, playwriting, and theological
thought, among others.

If we value our intellectual heritage, and if we truly believe that
access to information (and that broader concept, knowledge) is a valid
social goal, we have to take our information resources seriously.  Now I
know that libraries aren't perfect institutions.  They tend to be
somewhat slow-moving and conservative in their embrace of new
technologies; and some seem more bent on hoarding than disseminating
information.  But what we call "modern librarianship" has over a century
of experience in being the tender of this society's information
resources.  And in the process of developing and managing that resource,
the library profession has understood its responsibilities in both a
social and historical context.  Drawing on that experience, I am going
to give you a short lesson on social responsibilities in an information
society.

Here are some of our social responsibilities in relation to information:
1. Collection
2. Selection
3. Preservation
4. Organization
5. Dissemination

1. Collection:
It is not enough to passively gather in whatever information comes your
way, like a spider waiting on its web.  Information collection is an
activity, and an intelligent activity.  It is important to collect and
collocate information units that support, complement and even contradict
each other.  A collection has a purpose and a context; it says something
about the information and it says something about the gatherer of that
information.  It is not random, because information itself is not
random, and humans do not produce information in a random fashion.

Too many Internet sites today are a terrible hodge-podge, with little
intellectual purpose behind their holdings.  It isn't surprising that
visitors to these sites have a hard time seeing the value of the
information contained therein.  Commercial systems, on the other hand,
have no incentive to provide an intellectual balance that might
"confuse" its user.

In all of the many papers that have come out of discussion of the
National Information Infrastructure, it is interesting that there is no
mention of collecting information: there is no Library of Congress or
National Archive of the electronic inforamtion world.  So in the whole
elaborate scheme, no one is responsbile for the collection of
information.

2. Selection:
Not all information is equal.  This doesn't mean that some of it should
be thrown away, though inevitably there is some waste in the information
world.  And this is not in support of censorship.  But there's a
difference between a piece on nuclear physics by a Nobel laureate and a
physics diorama entered into a science fair by an 8-year-old.  And
there's a difference between alpha release .03 and beta 1.2 of a
software package.  If we can't differentiate between these, our
intellectual future looks grim indeed.

Certain sources become known for their general reliability, their
timeliness, etc.  We have to make these judgments because the sheer
quantity of information is too large for us to spend our time with
lesser works when we haven't yet encountered the greats.

This kind of selection needs to be done with an understanding of a
discipline and understanding of the users of a body of knowledge.  The
process of selection overlaps with our concept of education, where
members of our society are directed to a particular body of knowledge
that we hold to be key to our understanding of the world.

3. Preservation:
How much of what is on the Net today will exist in any form ten years
from now?  And can we put any measure to what we lose if we do not
preserve things systematically?  If we can't preserve it all, at least
in one safely archived copy, are we going to make decisions about
preservation, or will we leave it up to a kind of information
Darwinianism?  As we know, the true value of some information may not be
immediately known, and some ideas gain in value over time.

The commercial world, of course, will preserve only that which sells
best.

4. Organization:
This is an area where the current Net has some of its most visible
problems, as we have all struggled through myriad gopher menus, ftp
sites, and web pages looking for something that we know is there but
cannot find.

There is no ideal organization of information, but no organization is no
ideal either.  The organization that exists today in terms of finding
tools is an attempt to impose order over an unorganized body.  The human
mind in its information seeking behavior is a much more complex question
than can be answered with a keyword search in an unorganized information
universe.  When we were limited to card catalogs and the placement of
physical items on shelves, we essentially had to choose only one way to
organize our information.  Computer systems should allow us to create a
multiplicity of organization schemes for the same information, from
traditional classification, that relies on hierarchies and categories,
to faceted schemes, relevance ranking and feedback, etc.

Unfortunately, documents do not define themselves.  The idea of doing
WAIS-type keyword searching on the vast store of textual documents on
the Internet is a folly.  Years of study of term frequency, co-
occurrence and other statistical techniques have proven that keyword
searching is a passable solution for some disciplines with highly
specific vocabularies and nearly useless in all others.  And, of course,
the real trick  is to match the vocaubulary of the seeker of information
with that of the information resource.  Keyword searching not only
doesn't take into account different terms for the same concepts, it
doesn't take into account materials in other languages or different user
levels (i.e. searching for children will probably need to be different
than searching done by adults, and libraries actually use different
subject access schemes for childrens' materials).  And non-textual items
(software, graphics, sound) do not respond at all to keyword searching.

There is no magical, effortless way to create an organization for
information; at least today the best tools are a clearly defined
classification scheme and a human indexer.  At least a classification
scheme or indexing scheme gives the searcher a chance to develop a
rational strategy for searching.

The importance of organizational tools cannot be overstated.  What it
all comes down to is that if we can't find the information we need, it
doesn't matter if it exists or not.  If we don't find it, we don't
encounter it, then it isn't information. There are undoubtedly millions
of bytes of files on the Net that for all practical purposes are non-
existant .

My biggest fear in relation to the information highway is that
intellectual organization and access will be provided by the commercial
world as a value-added service.  So the materials will exist, even at an
affordable price, but it will cost real money to make use of the tools
that will make it possible for you to find the information you need.
If we don't provide these finding tools as part of the public resource,
then we aren't providing the information to the public.
5. Dissemination:
There's a lot of talk about the "electronic library".  Actually, there's
a lot written about the electronic library, and probably much of it ends
up on paper.  Most of us agree that for anything longer than a one-
screen email message, we'd much rather read documents off a paper page
than off a screen.  While we can hope that screen technologies will
eventually produce something that truly substitutes for paper, this
isn't true today.  So what happens with all of those electronic works
that we're so eager to store and make available?   Do we reverse the
industrial revolution and return printing of documents to a cottage
industry taking place in homes, offices and libraries?

Many people talk about their concerns for the "last mile" - for the
delivery of information into every home.  I'm concerned about the last
yard .  We can easily move information from one computer to another, but
how do we get it from the computer to the human being in the proper
format?  Not all information is suited to electronic use.  Think of the
auto repair manuals that you  drag under the car and drip oil on.  Think
of children's books, with their drool-proof pages.

Even the Library of Congress has announced that they are undertaking a
huge project to digitize 5 million items from their collection.  Then
what ?  How do they think we are going to make use of those materials?

There are times when I can only conclude that we have been gripped by
some strange madness.  I have fantasies of kidnapping the entire
membership of the administration's IITF committees and tying them down
in front of 14" screens with really bad flicker and forcing them to read
the whole of Project Gutenberg's electronic copy of Moby Dick.  Maybe
then we'd get some concern about the last yard.

In conclusion:
1. No amount of wiring will give us universal access
2. Just adding more files and computers to gopherspace, webspace and
   FTPspace will not give us better access
3. And commercial information systems can be expected to be....
   commercial

------------------------------

Date:         Wed, 11 Jan 1995 21:21:03 -0800
From:         Rob Kling <kling@ICS.UCI.EDU>
Subject: File 6--     Re: COOCS'95 Deadline extended until January 30C

Deadline extended until January 30 ........


                   Call for Papers:

          Behavioral & Social Impacts Track

       Conference on Organizational Computing Systems
                       COOCS `95
              Sponsored by ACM SIGOIS


This conference has three tracks, and I'm posting here because I
believe that the Behavioral & Social Impacts Track will
interest some readers. While conferece focusses on "org computing systems,"
interorganizational communications, telecommuting, commerce on
the nets, electronically connected voluntary groups as organizations,
computer-mediated communication in diverse forms,
and many other such broad topics can fit ... as
computing/telecomm crosses org boundaries in so many ways these days.

Rob Kling
Chair, Behavioral and Social Impacts Track

----------

Topics for Track II: Behavioral and Social Impacts

o Social processes in the development and use of electronic journals
o Social processes in the development and use of digital libraries
o Social impacts of organizational re-engineering
o Organizational impacts of computerization of large applications
o Integrating information systems and small groups
o Social-technical systems analysis (theory and case studies)
o Organization and ramifications of mobile offices
o Open systems policies, standards, and impacts
o Social aspects of globally distributed organizational computing
o Theoretical approaches for understanding the development, use and/or
  social impacts of information technologies
o The influence of technology and work organization on work life
o The cultural dimensions of computerization within and between
  organizations


IMPORTANT DATES
Submission due: January 30, 1995
Author notification: March 8, 1995
Manuscripts due: May 10, 1995
Conference dates: August 13-16, 1995

-------------------------------------------
            CONFERENCE SPECIFICS:

-------------------

Conference Location: Sheraton Silicon Valley ----Milpitas (near
San Jose), California August 13-16, 1995 (Immediately after the
Workflow `95 conference)

As we endeavor to move toward more effective and efficient organizations,
we must take into account technical, social, and organizational aspects of
computerization. This conference is organized as three tracks in order to
address these aspects.
I.  Business processes track
II. Behavioral and social impacts track
III. Technical aspects track

Advances in tools, processes, technologies, and methodologies that
facilitate the use of information systems in organizations can improve
the way information is made available and used. This conference is
intended to bring together researchers and practitioners interested
in the introduction, management, deployment, and analysis of information
and processes within organizations. The scope of the conference is
intended to cover areas related to this goal, including but not
limited to:


Track II: Behavioral and Social Impacts

o Social processes in the development and use of electronic journals
o Social processes in the development and use of digital libraries
o Social impacts of organizational re-engineering
o Organizational impacts of computerization of large applications
o Integrating information systems and small groups
o Social-technical systems analysis (theory and case studies)
o Organization and ramifications of mobile offices
o Open systems policies, standards, and impacts
o Social aspects of globally distributed organizational computing
o Theoretical approaches for understanding the development, use and/or
  social impacts of information technologies
o The influence of technology and work organization on work life
o The cultural dimensions of computerization within and between
  organizations

------------------------------

Track I: Business Processes
o Workflow systems, models, and theories
o Process meta-models and meta-modeling
o Models and strategies for business process design, and re-engineering
o Measurement-based approaches to organizational analysis
o Process acquisition, monitoring and management tools
o Business systems formalisms
o Experiences with process models and process management tools

Track III: Technical Aspects
o Organizational computing systems and infrastructure
o Groupware
o Object and database models and systems
o Computer supported collaboration and negotiation
o Distributed AI, expert systems, multi-agent models
o Coordination technology and workflow technology
o Multimedia information storage, retrieval, and communications

Each track of the conference will have a program chair and a program
committee. Thus, each paper should be submitted to the program chair
of the most appropriate track.   (See below for all 3 track
chairs)

Rob Kling (behavioral track chair)
Dept. Information/Computer Sci
University of California
Irvine, CA 92715 USA
Phone: +1 714 856 5955
Fax: +1 714 856 4056
email: kling@ics.uci.edu

If a submission falls within several tracks, please submit it to
one program chair, and note the overlap in a cover letter, so
that the submission can be properly considered. Each submission
will be critically reviewed and judged by the appropriate
program committee(s). Submissions to the conference can be in
the form of papers, or demonstration, panel, workshop or
tutorial pro- posals. Papers can take either of two forms:

(1) Research investigations present original work in any of the
    areas of interest to the conference.

(2) Case studies discuss projects which introduce innovative tools,
    technologies or methodologies into particular organizational
    settings, and critically analyze the results and impact of the
    project.


RESEARCH PAPERS --

Papers should present original reports of substantive new work
or integrative reviews.  Theory, methodology, and concept papers
should present new theories, empirical results, methodologies or
concepts that stimulate new ways of thinking about, supporting,
or studying organizational information systems (broadly
conceived).

All papers should provide a concise message to the audience
about how the work relates to previous research or experience
and what aspects of the work are new.  Papers will be evaluated
on the basis of originality, significance of the contribution to
the field, quality of research, and quality of writing.

Papers should not exceed 12 ACM camera-ready pages. It is
possible that some papers will be presented at the conference in
poster sessions. Papers must include an abstract of no more than
100 words.  Papers must be twelve pages or less, including
abstract, figures, and references, printed in double columns, in
12 point Times font, on 8.5"X11" paper (See proceedings of
COOCS'93 or CSCW'94 for examples.)


------------------------------

Demonstration proposals should be 3-5 pages long, and include
enough information to allow the committee to judge the relevance
and significance of the work. Please include machine requirements.

Panel proposals should motivate the subject of the panel and give
brief biographical sketches of proposed panel members.

Workshop and Tutorial proposals should motivate the workshop/tutorial
and its relevance to this conference. For tutorials, provide an outline
and a brief biographical sketch of the proposers. For workshops,
motivate the workshop, indicate how you would select participants,
and outline the format of the workshop. Proposals for both half-day
and full-day workshops and tutorials are welcome.

Authors should submit five copies of the manuscript or proposal,
in English, together with a cover sheet, to the appropriate
Program Chair by January 4, 1995. The cover sheet should contain
(i) submission type; (ii) title; (iii) names, addresses, phone
numbers, fax numbers and email addresses (if available) of all
authors; (iv) contact author; (v) keywords and abstract.
Information on paper format can be obtained from any of the
Program Co-chairs.

IMPORTANT DATES
Submission due: January 4, 1995
Author notification: March 8, 1995
Manuscripts due: May 10, 1995
Conference dates: August 13-16, 1995

Conference Co-Chairs
Nora Comstock                            Clarence A. Ellis
Comstock Connections                     Dept. of Computer Science
3103 Loyola Ln.                          University of Colorado
Austin, TX 78723 U.S.A.                  Boulder, CO 80309 U.S.A
+1 512 928 8780 voice and fax            +1 303 492 5984
loyola!nora@cs.utexas.edu (UUCP)         skip@cs.colorado.edu

PROGRAM CHAIRS

John Mylopoulos (business track)   Rob Kling (behavioral track)
Dept. of Computer Science          Dept. Information/Computer Sci
University of Toronto              University of California
Toronto, Ontario, CANADA           Irvine, CA 92715 USA
Phone: +1 416 978 5180             Phone: +1 714 856 5955
Fax: +1 416 978 1455               Fax: +1 714 856 4056
email: jm@ai.toronto.edu           email: kling@ics.uci.edu

Simon Kaplan (technical track)
Dept. of Computer Science
University of Illinois
1304 W. Springfield Ave.
Urbana, IL 61801 USA
Phone:+1 217 244 0392
Fax: +1 217 333 3501
email: kaplan@cs.uiuc.edu


REGISTRATION/LOCAL ARRANGEMENTS
WORKSHOP ARRANGEMENTS              TREASURER
Keith Swenson                      Jeanie Treichel
Fujitsu OSSI                       Sun Microsystems Lab, Inc.
3055 Orchard Dr.                   2550 Garcia Avenue, UMTV 29-01
San Jose, CA 95134                 Mountain View CA 94043
Phone: +1408 456 7667              Phone: +1 415 336 5260
Fax: +1 408 456 7050               Fax: +1 415 691 0756
kswenson@ossi.com                  email: jeanie.treichel@Sun.COM

------------------------------

From: Warren Smith <warren205@DELPHI.COM>
Subject: File 7--**How do I protect my program??**
Date: Sun, 8 Jan 95 16:32:30 -0500

I have spent two years of part-time work writing a program which I
hope to sell sometime.  I would like users to try the program for
a time, say a month, before they can decide to buy it - I hate spending
my money on a program that I later find is no good.

The question is - how do I protect all my work against all the pirates
out there.

Do I force users to use a 'Dongle'?  Is there a better way?
Even the 'Dongle' is not foolproof. And I have to absorb the cost
of the Dongles given to potential customers who don't later buy the
program.  This also would prevent distribution by wire.

I notice some programs are being distributed on CDROM with a password
needed to access parts of the program.

Can anyone tell me where I can find help. Any Associations which might
help me?

By the way, which 'Dongle' is the best?

Sorry to offend all you liberated freedom loving pirates out there.

Thanks,
Warren.

------------------------------

Date: Mon, 2 Jan 1995 15:55:02 -0500
From: Petrocelli@AOL.COM
Subject: File 8--Comment on D. Batterson's article (CuD 6.106)

Item 2 talks about "old fashioned" market surveys and his opinion that
they are somehow ridiculous when compared to the on-line, electronic
version. He writes:

     But an e-mailed (or online) survey would be the best way to go.
PRODIGY already has online opinion polls, with instant results
available for viewing, so it could be done easily enough.   Online
market research is unintrusive, is digital in nature [no inputing by
data collectors is required], and surveys can be done according to the
respondent's time schedule, NOT the market research firm's.  This
major market research firm has its head stuck in the sand, as do many
other ones.

This is a wonderful sentiment but, alas, an unscientific one. To
properly conduct a survey of any type requires a random sample.
Surveys conducted on an on-line service are only valid if you are
studying people who call on-line services or as a supplement to a
phone survey. Otherwise, characteristics of people who are on-line
will skew your results.

When the day comes that everyone is on-line, when we have a truely
global, electronic community then on-line surveys will make sense.
Until that time the time-honered way of using a phone and imposing on
their goodwill will be the best way to gather market intelligence
aside from showing up at someone's office and doing it in person. We
should never confuse asking someone for a moment of their time with an
abrigment of freedom.

------------------------------

Date: Thu, 23 Oct 1994 22:51:01 CDT
From: CuD Moderators <tk0jut2@mvs.cso.niu.edu>
Subject: File 9--Cu Digest Header Information (unchanged since 25 Nov 1994)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send a one-line message:  SUB CUDIGEST  your name
Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at:  Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on  internet);
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

EUROPE:  In BELGIUM: Virtual Access BBS:  +32-69-844-019 (ringdown)
         In ITALY: Bits against the Empire BBS:  +39-461-980493
         In LUXEMBOURG: ComNet BBS:  +352-466893

  UNITED STATES:  etext.archive.umich.edu (192.131.22.8)  in /pub/CuD/
                  ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
                  aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
                  world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
                  uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
                  wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
  EUROPE:         nic.funet.fi in pub/doc/cud/ (Finland)
                  ftp.warwick.ac.uk in pub/cud/ (United Kingdom)

  JAPAN:          ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD
                  ftp://www.rcac.tdi.co.jp/pub/mirror/CuD

The most recent issues of CuD can be obtained from the NIU
Sociology gopher at:
  URL: gopher://corn.cso.niu.edu:70/00/acad_dept/col_of_las/dept_soci

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.  CuD material may  be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission.  It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified.  Readers are encouraged to submit reasoned articles
relating to computer culture and communication.  Articles are
preferred to short responses.  Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
            the views of the moderators. Digest contributors assume all
            responsibility for ensuring that articles submitted do not
            violate copyright protections.

------------------------------

End of Computer Underground Digest #7.04
************************************