Terrence A Maxwell | SUNY: University at Albany (original) (raw)
Papers by Terrence A Maxwell
First Monday, Sep 9, 2004
Copyright is a legal mechanism for promotion of useful knowledge. However, it is not the only mea... more Copyright is a legal mechanism for promotion of useful knowledge. However, it is not the only means society could use to encourage information dissemination, and several alternative models have been suggested over the last 200 years. This article provides the results of a dynamic simulation of the publishing industry in the United States from 1800 to 2100, and tests the impact of different protection schemes on the development of authorship, the publishing industry, and reader access. It closes with a discussion of intellectual property information policy decisions that can be currently made, and their likely impacts on domestic and international copyright protection.
First Monday, ISSN 1396-0466, Jun 2, 2003
... Privacy, R, D, R, R, Fourth Amendment. ... Censorship, R, R, R, R, First Amendment. ... He ha... more ... Privacy, R, D, R, R, Fourth Amendment. ... Censorship, R, R, R, R, First Amendment. ... He has a BA in English from Bard College; a Masters in Public Administration from the University at Albany; and, a Ph.D. from the Rockefeller College, University at Albany, specializing in Policy Analysis ...
First Monday, 2003
Information policy questions have traditionally been framed in the context of discrete legal, leg... more Information policy questions have traditionally been framed in the context of discrete legal, legislative, organizational, and disciplinary traditions. This paper attempts to provide a more comprehensive model for information policy analysis. Using speech policy as an illustrative example, it explores issues of stakeholder standing and obligations within the context of policy purpose and realms of influence, and relates these variables to information production, dissemination and use.
Since 9/11, intelligence agencies in the United States have expanded experimentation and use of d... more Since 9/11, intelligence agencies in the United States have expanded experimentation and use of data mining and analysis techniques to combat terrorism. These efforts have generated significant privacy concerns and discussions about the appropriate balance between civil liberties and technology-aided information integration. This paper argues that while privacy discussions are important, they should be framed within a discussion of the likely ability of data mining systems to meet their stated policy goals. If goal success is not assured, the decision calculus for balancing the use of data integration technology against concerns of privacy abuse will be significantly altered.
Oxford University Press eBooks, Dec 28, 2012
The Executive Branch "The executive power shall be vested in a President of the United States of ... more The Executive Branch "The executive power shall be vested in a President of the United States of America. He shall hold his Office during the term of four years, and, together with the Vice President, chosen for the same term, be elected" Article II, Section 1 Demonstrate knowledge of the executive branch of government. a. Cite the formal qualifications listed in the Constitution for President of the United States. b. Describe informal qualifications common to past presidents.
Journal of the Association for Information Science and Technology, 2003
Passage of the Digital Millennium Copyright Act (DMCA) was a significant milestone in congression... more Passage of the Digital Millennium Copyright Act (DMCA) was a significant milestone in congressional information policy legislation. However, the results were widely criticized in some circles as providing too much power to certain stakeholder groups. This paper uses computerbased content analysis and a theoretical taxonomy of information policy values to analyze congressional hearing testimony. The results of document coding were then analyzed using a variety of statistical tools to map how different stakeholders framed issues in the debate and determine if congressional value statements about the legislation conformed more closely to certain stakeholders. Results of the analysis indicate that significant differences in the use of information policy terms occurred across stakeholders, and showed varying degrees of convergence between congressional or other stakeholders when framing information policy issues.
Proceedings of the 38th Annual Hawaii International Conference on System Sciences
Since 9/11, intelligence agencies in the United States have expanded experimentation and use of d... more Since 9/11, intelligence agencies in the United States have expanded experimentation and use of data mining and analysis techniques to combat terrorism. These efforts have generated significant privacy concerns and discussions about the appropriate balance between civil liberties and technology-aided information integration. This paper argues that while privacy discussions are important, they should be framed within a discussion of the likely ability of data mining systems to meet their stated policy goals. If goal success is not assured, the decision calculus for balancing the use of data integration technology against concerns of privacy abuse will be significantly altered.
Information Research, 2007
... time and effort in restructuring readers' advisory services, libraries should consider h... more ... time and effort in restructuring readers' advisory services, libraries should consider harnessing collective intelligence to assist them in recommending books through interactive channels to ...Reconfiguring the value network, Journal of Business Strategy, 21(4), 36-39. ...
Government Information Quarterly, Jul 1, 2007
This study analyzes the progress of copyright enforcement in Taiwan in the period from 1985 to 20... more This study analyzes the progress of copyright enforcement in Taiwan in the period from 1985 to 2000. As a rapidly industrializing region, Taiwan has faced significant pressure from its international trade partners to improve intellectual property protection. This pressure has been strongest from the United States, Taiwan's largest partner. Analysis of the progress of intellectual property protection in Taiwan provides an opportunity to learn more about the dynamics of intellectual property policy development in developing countries, and the impact of U.S. actions on internal IP politics and cultural development. The paper will survey the significant milestones in Taiwanese copyright policy development over the last two decades and conclude with a conceptual model that can be tested by analysis of other case studies of cross-jurisdiction intellectual property relationships.
Ongoing research at the Rockefeller College is exploring the ability of subjects in a computerbas... more Ongoing research at the Rockefeller College is exploring the ability of subjects in a computerbased management laboratory to manage the implementation of welfareseform. Reflections on the design of such research have pushed us to develop a firmer theoretical foundation to guide our research on mental models in dynamic decision making. We posit that mental models are multifaceted, including distinguishable submodels focused on ends (goals), means (strategies, tactics, policy levers) and connections between them (the means/ends model). These distinctions, coupled with a view of human judgment from Brunswikean psychology, lead to a rich integrated theory of perception, planning. action, and learning in complex dynamic feedback systems. From that theory we derive classes of testable research hypotheses about decision making in dynamic environments- in particular, ”design logic ” and “operator logic ” hypotheses- that have serious implications for system dynamics research and practice. T...
First Monday, 2003
Information policy questions have traditionally been framed in the context of discrete legal, leg... more Information policy questions have traditionally been framed in the context of discrete legal, legislative, organizational, and disciplinary traditions. This paper attempts to provide a more comprehensive model for information policy analysis. Using speech policy as an illustrative example, it explores issues of stakeholder standing and obligations within the context of policy purpose and realms of influence, and relates these variables to information production, dissemination and use.
Ongoing research at the Rockefeller College is exploring the ability of subjects in a computerbas... more Ongoing research at the Rockefeller College is exploring the ability of subjects in a computerbased management laboratory to manage the implementation of welfareseform. Reflections on the design of such research have pushed us to develop a firmer theoretical foundation to guide our research on mental models in dynamic decision making. We posit that mental models are multifaceted, including distinguishable submodels focused on ends (goals), means (strategies, tactics, policy levers) and connections between them (the means/ends model). These distinctions, coupled with a view of human judgment from Brunswikean psychology, lead to a rich integrated theory of perception, planning. action, and learning in complex dynamic feedback systems. From that theory we derive classes of testable research hypotheses about decision making in dynamic environments in particular, ”design logic” and “operator logic” hypotheses that have serious implications for system dynamics research and practice. The o...
Proceedings of the American Society for Information Science and Technology, 2005
In response to international terrorism, the United States government has actively sought to reorg... more In response to international terrorism, the United States government has actively sought to reorganize information flows to and from individuals, the media, and other nations. These government actions lead to information asymmetry, with certain realms becoming relatively 'information poor.' While the short-term effects of asymmetrical information flows appear to be positive for the government, are relatively neutral for individuals and the media, they increase global distrust of US governmental actions, which may adversely affect global stability. Finally, any complete analysis of the impacts of controlling information flows must include an understanding of what constitutes security, and the appropriate balance between information disclosure and secrecy in a democratic society.
First Monday Issn 1396 0466, Jun 2, 2003
... Privacy, R, D, R, R, Fourth Amendment. ... Censorship, R, R, R, R, First Amendment. ... He ha... more ... Privacy, R, D, R, R, Fourth Amendment. ... Censorship, R, R, R, R, First Amendment. ... He has a BA in English from Bard College; a Masters in Public Administration from the University at Albany; and, a Ph.D. from the Rockefeller College, University at Albany, specializing in Policy Analysis ...
First Monday, Apr 16, 2003
Proceedings of the Proceedings of the 38th Annual Hawaii International Conference on System Sciences Track 5 Volume 05, 2005
Since 9/11, intelligence agencies in the United States have expanded experimentation and use of d... more Since 9/11, intelligence agencies in the United States have expanded experimentation and use of data mining and analysis techniques to combat terrorism. These efforts have generated significant privacy concerns and discussions about the appropriate balance between civil liberties and technology-aided information integration. This paper argues that while privacy discussions are important, they should be framed within a discussion of the
First Monday, Sep 9, 2004
Copyright is a legal mechanism for promotion of useful knowledge. However, it is not the only mea... more Copyright is a legal mechanism for promotion of useful knowledge. However, it is not the only means society could use to encourage information dissemination, and several alternative models have been suggested over the last 200 years. This article provides the results of a dynamic simulation of the publishing industry in the United States from 1800 to 2100, and tests the impact of different protection schemes on the development of authorship, the publishing industry, and reader access. It closes with a discussion of intellectual property information policy decisions that can be currently made, and their likely impacts on domestic and international copyright protection.
First Monday, ISSN 1396-0466, Jun 2, 2003
... Privacy, R, D, R, R, Fourth Amendment. ... Censorship, R, R, R, R, First Amendment. ... He ha... more ... Privacy, R, D, R, R, Fourth Amendment. ... Censorship, R, R, R, R, First Amendment. ... He has a BA in English from Bard College; a Masters in Public Administration from the University at Albany; and, a Ph.D. from the Rockefeller College, University at Albany, specializing in Policy Analysis ...
First Monday, 2003
Information policy questions have traditionally been framed in the context of discrete legal, leg... more Information policy questions have traditionally been framed in the context of discrete legal, legislative, organizational, and disciplinary traditions. This paper attempts to provide a more comprehensive model for information policy analysis. Using speech policy as an illustrative example, it explores issues of stakeholder standing and obligations within the context of policy purpose and realms of influence, and relates these variables to information production, dissemination and use.
Since 9/11, intelligence agencies in the United States have expanded experimentation and use of d... more Since 9/11, intelligence agencies in the United States have expanded experimentation and use of data mining and analysis techniques to combat terrorism. These efforts have generated significant privacy concerns and discussions about the appropriate balance between civil liberties and technology-aided information integration. This paper argues that while privacy discussions are important, they should be framed within a discussion of the likely ability of data mining systems to meet their stated policy goals. If goal success is not assured, the decision calculus for balancing the use of data integration technology against concerns of privacy abuse will be significantly altered.
Oxford University Press eBooks, Dec 28, 2012
The Executive Branch "The executive power shall be vested in a President of the United States of ... more The Executive Branch "The executive power shall be vested in a President of the United States of America. He shall hold his Office during the term of four years, and, together with the Vice President, chosen for the same term, be elected" Article II, Section 1 Demonstrate knowledge of the executive branch of government. a. Cite the formal qualifications listed in the Constitution for President of the United States. b. Describe informal qualifications common to past presidents.
Journal of the Association for Information Science and Technology, 2003
Passage of the Digital Millennium Copyright Act (DMCA) was a significant milestone in congression... more Passage of the Digital Millennium Copyright Act (DMCA) was a significant milestone in congressional information policy legislation. However, the results were widely criticized in some circles as providing too much power to certain stakeholder groups. This paper uses computerbased content analysis and a theoretical taxonomy of information policy values to analyze congressional hearing testimony. The results of document coding were then analyzed using a variety of statistical tools to map how different stakeholders framed issues in the debate and determine if congressional value statements about the legislation conformed more closely to certain stakeholders. Results of the analysis indicate that significant differences in the use of information policy terms occurred across stakeholders, and showed varying degrees of convergence between congressional or other stakeholders when framing information policy issues.
Proceedings of the 38th Annual Hawaii International Conference on System Sciences
Since 9/11, intelligence agencies in the United States have expanded experimentation and use of d... more Since 9/11, intelligence agencies in the United States have expanded experimentation and use of data mining and analysis techniques to combat terrorism. These efforts have generated significant privacy concerns and discussions about the appropriate balance between civil liberties and technology-aided information integration. This paper argues that while privacy discussions are important, they should be framed within a discussion of the likely ability of data mining systems to meet their stated policy goals. If goal success is not assured, the decision calculus for balancing the use of data integration technology against concerns of privacy abuse will be significantly altered.
Information Research, 2007
... time and effort in restructuring readers' advisory services, libraries should consider h... more ... time and effort in restructuring readers' advisory services, libraries should consider harnessing collective intelligence to assist them in recommending books through interactive channels to ...Reconfiguring the value network, Journal of Business Strategy, 21(4), 36-39. ...
Government Information Quarterly, Jul 1, 2007
This study analyzes the progress of copyright enforcement in Taiwan in the period from 1985 to 20... more This study analyzes the progress of copyright enforcement in Taiwan in the period from 1985 to 2000. As a rapidly industrializing region, Taiwan has faced significant pressure from its international trade partners to improve intellectual property protection. This pressure has been strongest from the United States, Taiwan's largest partner. Analysis of the progress of intellectual property protection in Taiwan provides an opportunity to learn more about the dynamics of intellectual property policy development in developing countries, and the impact of U.S. actions on internal IP politics and cultural development. The paper will survey the significant milestones in Taiwanese copyright policy development over the last two decades and conclude with a conceptual model that can be tested by analysis of other case studies of cross-jurisdiction intellectual property relationships.
Ongoing research at the Rockefeller College is exploring the ability of subjects in a computerbas... more Ongoing research at the Rockefeller College is exploring the ability of subjects in a computerbased management laboratory to manage the implementation of welfareseform. Reflections on the design of such research have pushed us to develop a firmer theoretical foundation to guide our research on mental models in dynamic decision making. We posit that mental models are multifaceted, including distinguishable submodels focused on ends (goals), means (strategies, tactics, policy levers) and connections between them (the means/ends model). These distinctions, coupled with a view of human judgment from Brunswikean psychology, lead to a rich integrated theory of perception, planning. action, and learning in complex dynamic feedback systems. From that theory we derive classes of testable research hypotheses about decision making in dynamic environments- in particular, ”design logic ” and “operator logic ” hypotheses- that have serious implications for system dynamics research and practice. T...
First Monday, 2003
Information policy questions have traditionally been framed in the context of discrete legal, leg... more Information policy questions have traditionally been framed in the context of discrete legal, legislative, organizational, and disciplinary traditions. This paper attempts to provide a more comprehensive model for information policy analysis. Using speech policy as an illustrative example, it explores issues of stakeholder standing and obligations within the context of policy purpose and realms of influence, and relates these variables to information production, dissemination and use.
Ongoing research at the Rockefeller College is exploring the ability of subjects in a computerbas... more Ongoing research at the Rockefeller College is exploring the ability of subjects in a computerbased management laboratory to manage the implementation of welfareseform. Reflections on the design of such research have pushed us to develop a firmer theoretical foundation to guide our research on mental models in dynamic decision making. We posit that mental models are multifaceted, including distinguishable submodels focused on ends (goals), means (strategies, tactics, policy levers) and connections between them (the means/ends model). These distinctions, coupled with a view of human judgment from Brunswikean psychology, lead to a rich integrated theory of perception, planning. action, and learning in complex dynamic feedback systems. From that theory we derive classes of testable research hypotheses about decision making in dynamic environments in particular, ”design logic” and “operator logic” hypotheses that have serious implications for system dynamics research and practice. The o...
Proceedings of the American Society for Information Science and Technology, 2005
In response to international terrorism, the United States government has actively sought to reorg... more In response to international terrorism, the United States government has actively sought to reorganize information flows to and from individuals, the media, and other nations. These government actions lead to information asymmetry, with certain realms becoming relatively 'information poor.' While the short-term effects of asymmetrical information flows appear to be positive for the government, are relatively neutral for individuals and the media, they increase global distrust of US governmental actions, which may adversely affect global stability. Finally, any complete analysis of the impacts of controlling information flows must include an understanding of what constitutes security, and the appropriate balance between information disclosure and secrecy in a democratic society.
First Monday Issn 1396 0466, Jun 2, 2003
... Privacy, R, D, R, R, Fourth Amendment. ... Censorship, R, R, R, R, First Amendment. ... He ha... more ... Privacy, R, D, R, R, Fourth Amendment. ... Censorship, R, R, R, R, First Amendment. ... He has a BA in English from Bard College; a Masters in Public Administration from the University at Albany; and, a Ph.D. from the Rockefeller College, University at Albany, specializing in Policy Analysis ...
First Monday, Apr 16, 2003
Proceedings of the Proceedings of the 38th Annual Hawaii International Conference on System Sciences Track 5 Volume 05, 2005
Since 9/11, intelligence agencies in the United States have expanded experimentation and use of d... more Since 9/11, intelligence agencies in the United States have expanded experimentation and use of data mining and analysis techniques to combat terrorism. These efforts have generated significant privacy concerns and discussions about the appropriate balance between civil liberties and technology-aided information integration. This paper argues that while privacy discussions are important, they should be framed within a discussion of the