Terrence A Maxwell | SUNY: University at Albany (original) (raw)

Papers by Terrence A Maxwell

Research paper thumbnail of Is copyright necessary

First Monday, Sep 9, 2004

Copyright is a legal mechanism for promotion of useful knowledge. However, it is not the only mea... more Copyright is a legal mechanism for promotion of useful knowledge. However, it is not the only means society could use to encourage information dissemination, and several alternative models have been suggested over the last 200 years. This article provides the results of a dynamic simulation of the publishing industry in the United States from 1800 to 2100, and tests the impact of different protection schemes on the development of authorship, the publishing industry, and reader access. It closes with a discussion of intellectual property information policy decisions that can be currently made, and their likely impacts on domestic and international copyright protection.

Research paper thumbnail of Toward a model of information policy analysis

First Monday, ISSN 1396-0466, Jun 2, 2003

... Privacy, R, D, R, R, Fourth Amendment. ... Censorship, R, R, R, R, First Amendment. ... He ha... more ... Privacy, R, D, R, R, Fourth Amendment. ... Censorship, R, R, R, R, First Amendment. ... He has a BA in English from Bard College; a Masters in Public Administration from the University at Albany; and, a Ph.D. from the Rockefeller College, University at Albany, specializing in Policy Analysis ...

Research paper thumbnail of Toward a model of information policy analysis: Speech as an illustrative example

First Monday, 2003

Information policy questions have traditionally been framed in the context of discrete legal, leg... more Information policy questions have traditionally been framed in the context of discrete legal, legislative, organizational, and disciplinary traditions. This paper attempts to provide a more comprehensive model for information policy analysis. Using speech policy as an illustrative example, it explores issues of stakeholder standing and obligations within the context of policy purpose and realms of influence, and relates these variables to information production, dissemination and use.

Research paper thumbnail of Information Policy, Data Mining, and National Security: False Positives and Unidentified Negatives

Since 9/11, intelligence agencies in the United States have expanded experimentation and use of d... more Since 9/11, intelligence agencies in the United States have expanded experimentation and use of data mining and analysis techniques to combat terrorism. These efforts have generated significant privacy concerns and discussions about the appropriate balance between civil liberties and technology-aided information integration. This paper argues that while privacy discussions are important, they should be framed within a discussion of the likely ability of data mining systems to meet their stated policy goals. If goal success is not assured, the decision calculus for balancing the use of data integration technology against concerns of privacy abuse will be significantly altered.

Research paper thumbnail of The Executive Branch

Oxford University Press eBooks, Dec 28, 2012

The Executive Branch "The executive power shall be vested in a President of the United States of ... more The Executive Branch "The executive power shall be vested in a President of the United States of America. He shall hold his Office during the term of four years, and, together with the Vice President, chosen for the same term, be elected" Article II, Section 1 Demonstrate knowledge of the executive branch of government. a. Cite the formal qualifications listed in the Constitution for President of the United States. b. Describe informal qualifications common to past presidents.

Research paper thumbnail of Mapping information policy frames: The politics of the digital millennium copyright act

Journal of the Association for Information Science and Technology, 2003

Passage of the Digital Millennium Copyright Act (DMCA) was a significant milestone in congression... more Passage of the Digital Millennium Copyright Act (DMCA) was a significant milestone in congressional information policy legislation. However, the results were widely criticized in some circles as providing too much power to certain stakeholder groups. This paper uses computerbased content analysis and a theoretical taxonomy of information policy values to analyze congressional hearing testimony. The results of document coding were then analyzed using a variety of statistical tools to map how different stakeholders framed issues in the debate and determine if congressional value statements about the legislation conformed more closely to certain stakeholders. Results of the analysis indicate that significant differences in the use of information policy terms occurred across stakeholders, and showed varying degrees of convergence between congressional or other stakeholders when framing information policy issues.

Research paper thumbnail of Minitrack Introduction

Research paper thumbnail of Information Policy, Data Mining, and National Security: False Positives and Unidentified Negatives

Proceedings of the 38th Annual Hawaii International Conference on System Sciences

Since 9/11, intelligence agencies in the United States have expanded experimentation and use of d... more Since 9/11, intelligence agencies in the United States have expanded experimentation and use of data mining and analysis techniques to combat terrorism. These efforts have generated significant privacy concerns and discussions about the appropriate balance between civil liberties and technology-aided information integration. This paper argues that while privacy discussions are important, they should be framed within a discussion of the likely ability of data mining systems to meet their stated policy goals. If goal success is not assured, the decision calculus for balancing the use of data integration technology against concerns of privacy abuse will be significantly altered.

Research paper thumbnail of A synergistic alternative to readers' advisory services: managing customer knowledge

Information Research, 2007

... time and effort in restructuring readers' advisory services, libraries should consider h... more ... time and effort in restructuring readers' advisory services, libraries should consider harnessing collective intelligence to assist them in recommending books through interactive channels to ...Reconfiguring the value network, Journal of Business Strategy, 21(4), 36-39. ...

Research paper thumbnail of Scholars, Digital Intellectual Property, and the New Economics of Publication and Preservation

Research paper thumbnail of The dynamics of bilateral intellectual property negotiations: Taiwan and the United States

Government Information Quarterly, Jul 1, 2007

This study analyzes the progress of copyright enforcement in Taiwan in the period from 1985 to 20... more This study analyzes the progress of copyright enforcement in Taiwan in the period from 1985 to 2000. As a rapidly industrializing region, Taiwan has faced significant pressure from its international trade partners to improve intellectual property protection. This pressure has been strongest from the United States, Taiwan's largest partner. Analysis of the progress of intellectual property protection in Taiwan provides an opportunity to learn more about the dynamics of intellectual property policy development in developing countries, and the impact of U.S. actions on internal IP politics and cultural development. The paper will survey the significant milestones in Taiwanese copyright policy development over the last two decades and conclude with a conceptual model that can be tested by analysis of other case studies of cross-jurisdiction intellectual property relationships.

Research paper thumbnail of Foundations of Mental Model Research1

Ongoing research at the Rockefeller College is exploring the ability of subjects in a computerbas... more Ongoing research at the Rockefeller College is exploring the ability of subjects in a computerbased management laboratory to manage the implementation of welfareseform. Reflections on the design of such research have pushed us to develop a firmer theoretical foundation to guide our research on mental models in dynamic decision making. We posit that mental models are multifaceted, including distinguishable submodels focused on ends (goals), means (strategies, tactics, policy levers) and connections between them (the means/ends model). These distinctions, coupled with a view of human judgment from Brunswikean psychology, lead to a rich integrated theory of perception, planning. action, and learning in complex dynamic feedback systems. From that theory we derive classes of testable research hypotheses about decision making in dynamic environments- in particular, ”design logic ” and “operator logic ” hypotheses- that have serious implications for system dynamics research and practice. T...

Research paper thumbnail of Toward a model of information policy analysis: Speech as an illustrative example

First Monday, 2003

Information policy questions have traditionally been framed in the context of discrete legal, leg... more Information policy questions have traditionally been framed in the context of discrete legal, legislative, organizational, and disciplinary traditions. This paper attempts to provide a more comprehensive model for information policy analysis. Using speech policy as an illustrative example, it explores issues of stakeholder standing and obligations within the context of policy purpose and realms of influence, and relates these variables to information production, dissemination and use.

Research paper thumbnail of Foundations of Mental Model Research

Ongoing research at the Rockefeller College is exploring the ability of subjects in a computerbas... more Ongoing research at the Rockefeller College is exploring the ability of subjects in a computerbased management laboratory to manage the implementation of welfareseform. Reflections on the design of such research have pushed us to develop a firmer theoretical foundation to guide our research on mental models in dynamic decision making. We posit that mental models are multifaceted, including distinguishable submodels focused on ends (goals), means (strategies, tactics, policy levers) and connections between them (the means/ends model). These distinctions, coupled with a view of human judgment from Brunswikean psychology, lead to a rich integrated theory of perception, planning. action, and learning in complex dynamic feedback systems. From that theory we derive classes of testable research hypotheses about decision making in dynamic environments in particular, ”design logic” and “operator logic” hypotheses that have serious implications for system dynamics research and practice. The o...

Research paper thumbnail of Is copyright necessary?

Research paper thumbnail of Homeland security and information control: A model of asymmetric information flows

Proceedings of the American Society for Information Science and Technology, 2005

In response to international terrorism, the United States government has actively sought to reorg... more In response to international terrorism, the United States government has actively sought to reorganize information flows to and from individuals, the media, and other nations. These government actions lead to information asymmetry, with certain realms becoming relatively 'information poor.' While the short-term effects of asymmetrical information flows appear to be positive for the government, are relatively neutral for individuals and the media, they increase global distrust of US governmental actions, which may adversely affect global stability. Finally, any complete analysis of the impacts of controlling information flows must include an understanding of what constitutes security, and the appropriate balance between information disclosure and secrecy in a democratic society.

Research paper thumbnail of Toward a model of information policy analysis

First Monday Issn 1396 0466, Jun 2, 2003

... Privacy, R, D, R, R, Fourth Amendment. ... Censorship, R, R, R, R, First Amendment. ... He ha... more ... Privacy, R, D, R, R, Fourth Amendment. ... Censorship, R, R, R, R, First Amendment. ... He has a BA in English from Bard College; a Masters in Public Administration from the University at Albany; and, a Ph.D. from the Rockefeller College, University at Albany, specializing in Policy Analysis ...

Research paper thumbnail of Toward a model of information policy analysis: Speech as an illustrative example

First Monday, Apr 16, 2003

Research paper thumbnail of Electronic Commerce: Government Services in the New Millennium

Research paper thumbnail of Information Policy, Data Mining, and National Security: False Positives and Unidentified Negatives

Proceedings of the Proceedings of the 38th Annual Hawaii International Conference on System Sciences Track 5 Volume 05, 2005

Since 9/11, intelligence agencies in the United States have expanded experimentation and use of d... more Since 9/11, intelligence agencies in the United States have expanded experimentation and use of data mining and analysis techniques to combat terrorism. These efforts have generated significant privacy concerns and discussions about the appropriate balance between civil liberties and technology-aided information integration. This paper argues that while privacy discussions are important, they should be framed within a discussion of the

Research paper thumbnail of Is copyright necessary

First Monday, Sep 9, 2004

Copyright is a legal mechanism for promotion of useful knowledge. However, it is not the only mea... more Copyright is a legal mechanism for promotion of useful knowledge. However, it is not the only means society could use to encourage information dissemination, and several alternative models have been suggested over the last 200 years. This article provides the results of a dynamic simulation of the publishing industry in the United States from 1800 to 2100, and tests the impact of different protection schemes on the development of authorship, the publishing industry, and reader access. It closes with a discussion of intellectual property information policy decisions that can be currently made, and their likely impacts on domestic and international copyright protection.

Research paper thumbnail of Toward a model of information policy analysis

First Monday, ISSN 1396-0466, Jun 2, 2003

... Privacy, R, D, R, R, Fourth Amendment. ... Censorship, R, R, R, R, First Amendment. ... He ha... more ... Privacy, R, D, R, R, Fourth Amendment. ... Censorship, R, R, R, R, First Amendment. ... He has a BA in English from Bard College; a Masters in Public Administration from the University at Albany; and, a Ph.D. from the Rockefeller College, University at Albany, specializing in Policy Analysis ...

Research paper thumbnail of Toward a model of information policy analysis: Speech as an illustrative example

First Monday, 2003

Information policy questions have traditionally been framed in the context of discrete legal, leg... more Information policy questions have traditionally been framed in the context of discrete legal, legislative, organizational, and disciplinary traditions. This paper attempts to provide a more comprehensive model for information policy analysis. Using speech policy as an illustrative example, it explores issues of stakeholder standing and obligations within the context of policy purpose and realms of influence, and relates these variables to information production, dissemination and use.

Research paper thumbnail of Information Policy, Data Mining, and National Security: False Positives and Unidentified Negatives

Since 9/11, intelligence agencies in the United States have expanded experimentation and use of d... more Since 9/11, intelligence agencies in the United States have expanded experimentation and use of data mining and analysis techniques to combat terrorism. These efforts have generated significant privacy concerns and discussions about the appropriate balance between civil liberties and technology-aided information integration. This paper argues that while privacy discussions are important, they should be framed within a discussion of the likely ability of data mining systems to meet their stated policy goals. If goal success is not assured, the decision calculus for balancing the use of data integration technology against concerns of privacy abuse will be significantly altered.

Research paper thumbnail of The Executive Branch

Oxford University Press eBooks, Dec 28, 2012

The Executive Branch "The executive power shall be vested in a President of the United States of ... more The Executive Branch "The executive power shall be vested in a President of the United States of America. He shall hold his Office during the term of four years, and, together with the Vice President, chosen for the same term, be elected" Article II, Section 1 Demonstrate knowledge of the executive branch of government. a. Cite the formal qualifications listed in the Constitution for President of the United States. b. Describe informal qualifications common to past presidents.

Research paper thumbnail of Mapping information policy frames: The politics of the digital millennium copyright act

Journal of the Association for Information Science and Technology, 2003

Passage of the Digital Millennium Copyright Act (DMCA) was a significant milestone in congression... more Passage of the Digital Millennium Copyright Act (DMCA) was a significant milestone in congressional information policy legislation. However, the results were widely criticized in some circles as providing too much power to certain stakeholder groups. This paper uses computerbased content analysis and a theoretical taxonomy of information policy values to analyze congressional hearing testimony. The results of document coding were then analyzed using a variety of statistical tools to map how different stakeholders framed issues in the debate and determine if congressional value statements about the legislation conformed more closely to certain stakeholders. Results of the analysis indicate that significant differences in the use of information policy terms occurred across stakeholders, and showed varying degrees of convergence between congressional or other stakeholders when framing information policy issues.

Research paper thumbnail of Minitrack Introduction

Research paper thumbnail of Information Policy, Data Mining, and National Security: False Positives and Unidentified Negatives

Proceedings of the 38th Annual Hawaii International Conference on System Sciences

Since 9/11, intelligence agencies in the United States have expanded experimentation and use of d... more Since 9/11, intelligence agencies in the United States have expanded experimentation and use of data mining and analysis techniques to combat terrorism. These efforts have generated significant privacy concerns and discussions about the appropriate balance between civil liberties and technology-aided information integration. This paper argues that while privacy discussions are important, they should be framed within a discussion of the likely ability of data mining systems to meet their stated policy goals. If goal success is not assured, the decision calculus for balancing the use of data integration technology against concerns of privacy abuse will be significantly altered.

Research paper thumbnail of A synergistic alternative to readers' advisory services: managing customer knowledge

Information Research, 2007

... time and effort in restructuring readers' advisory services, libraries should consider h... more ... time and effort in restructuring readers' advisory services, libraries should consider harnessing collective intelligence to assist them in recommending books through interactive channels to ...Reconfiguring the value network, Journal of Business Strategy, 21(4), 36-39. ...

Research paper thumbnail of Scholars, Digital Intellectual Property, and the New Economics of Publication and Preservation

Research paper thumbnail of The dynamics of bilateral intellectual property negotiations: Taiwan and the United States

Government Information Quarterly, Jul 1, 2007

This study analyzes the progress of copyright enforcement in Taiwan in the period from 1985 to 20... more This study analyzes the progress of copyright enforcement in Taiwan in the period from 1985 to 2000. As a rapidly industrializing region, Taiwan has faced significant pressure from its international trade partners to improve intellectual property protection. This pressure has been strongest from the United States, Taiwan's largest partner. Analysis of the progress of intellectual property protection in Taiwan provides an opportunity to learn more about the dynamics of intellectual property policy development in developing countries, and the impact of U.S. actions on internal IP politics and cultural development. The paper will survey the significant milestones in Taiwanese copyright policy development over the last two decades and conclude with a conceptual model that can be tested by analysis of other case studies of cross-jurisdiction intellectual property relationships.

Research paper thumbnail of Foundations of Mental Model Research1

Ongoing research at the Rockefeller College is exploring the ability of subjects in a computerbas... more Ongoing research at the Rockefeller College is exploring the ability of subjects in a computerbased management laboratory to manage the implementation of welfareseform. Reflections on the design of such research have pushed us to develop a firmer theoretical foundation to guide our research on mental models in dynamic decision making. We posit that mental models are multifaceted, including distinguishable submodels focused on ends (goals), means (strategies, tactics, policy levers) and connections between them (the means/ends model). These distinctions, coupled with a view of human judgment from Brunswikean psychology, lead to a rich integrated theory of perception, planning. action, and learning in complex dynamic feedback systems. From that theory we derive classes of testable research hypotheses about decision making in dynamic environments- in particular, ”design logic ” and “operator logic ” hypotheses- that have serious implications for system dynamics research and practice. T...

Research paper thumbnail of Toward a model of information policy analysis: Speech as an illustrative example

First Monday, 2003

Information policy questions have traditionally been framed in the context of discrete legal, leg... more Information policy questions have traditionally been framed in the context of discrete legal, legislative, organizational, and disciplinary traditions. This paper attempts to provide a more comprehensive model for information policy analysis. Using speech policy as an illustrative example, it explores issues of stakeholder standing and obligations within the context of policy purpose and realms of influence, and relates these variables to information production, dissemination and use.

Research paper thumbnail of Foundations of Mental Model Research

Ongoing research at the Rockefeller College is exploring the ability of subjects in a computerbas... more Ongoing research at the Rockefeller College is exploring the ability of subjects in a computerbased management laboratory to manage the implementation of welfareseform. Reflections on the design of such research have pushed us to develop a firmer theoretical foundation to guide our research on mental models in dynamic decision making. We posit that mental models are multifaceted, including distinguishable submodels focused on ends (goals), means (strategies, tactics, policy levers) and connections between them (the means/ends model). These distinctions, coupled with a view of human judgment from Brunswikean psychology, lead to a rich integrated theory of perception, planning. action, and learning in complex dynamic feedback systems. From that theory we derive classes of testable research hypotheses about decision making in dynamic environments in particular, ”design logic” and “operator logic” hypotheses that have serious implications for system dynamics research and practice. The o...

Research paper thumbnail of Is copyright necessary?

Research paper thumbnail of Homeland security and information control: A model of asymmetric information flows

Proceedings of the American Society for Information Science and Technology, 2005

In response to international terrorism, the United States government has actively sought to reorg... more In response to international terrorism, the United States government has actively sought to reorganize information flows to and from individuals, the media, and other nations. These government actions lead to information asymmetry, with certain realms becoming relatively 'information poor.' While the short-term effects of asymmetrical information flows appear to be positive for the government, are relatively neutral for individuals and the media, they increase global distrust of US governmental actions, which may adversely affect global stability. Finally, any complete analysis of the impacts of controlling information flows must include an understanding of what constitutes security, and the appropriate balance between information disclosure and secrecy in a democratic society.

Research paper thumbnail of Toward a model of information policy analysis

First Monday Issn 1396 0466, Jun 2, 2003

... Privacy, R, D, R, R, Fourth Amendment. ... Censorship, R, R, R, R, First Amendment. ... He ha... more ... Privacy, R, D, R, R, Fourth Amendment. ... Censorship, R, R, R, R, First Amendment. ... He has a BA in English from Bard College; a Masters in Public Administration from the University at Albany; and, a Ph.D. from the Rockefeller College, University at Albany, specializing in Policy Analysis ...

Research paper thumbnail of Toward a model of information policy analysis: Speech as an illustrative example

First Monday, Apr 16, 2003

Research paper thumbnail of Electronic Commerce: Government Services in the New Millennium

Research paper thumbnail of Information Policy, Data Mining, and National Security: False Positives and Unidentified Negatives

Proceedings of the Proceedings of the 38th Annual Hawaii International Conference on System Sciences Track 5 Volume 05, 2005

Since 9/11, intelligence agencies in the United States have expanded experimentation and use of d... more Since 9/11, intelligence agencies in the United States have expanded experimentation and use of data mining and analysis techniques to combat terrorism. These efforts have generated significant privacy concerns and discussions about the appropriate balance between civil liberties and technology-aided information integration. This paper argues that while privacy discussions are important, they should be framed within a discussion of the