TITLE PAGE


Author:  Laurence Press

Title:   Press, L., Systems for Finding People
	 Journal of Organizational Computing, 2(3&4), 303-314 (1992).

Affiliation:

         Professor, Computer Information Systems, California State
         University at Dominguez Hills

Email:   lpress@venera.isi.edu

Running head:  Finding People

Keywords:

         organizational culture, participation, collaboration,
         computer-supported cooperative work


                               ABSTRACT

Finding a previously unknown person with the skills and knowledge to

answer a question or perhaps to collaborate with is an effective use

of a computer-mediated communication (CMC) system.  This article

discusses two aspects of systems for finding people, system

architectures and organizational implications.


The architectures considered are special interest groups, centralized

servers, and decentralized systems.  The organizational implications

are the value to organizations of people-finding systems, management

incentives for individuals to participate in them, and participation

in the absence of apparent incentives.


The deployment and improvement of people-finding and other CMC systems

will bestow a marginal advantage upon cooperative individuals and

organizations with cooperative cultures.  As a result, CMC may

marginally alter organizational and human nature, nudging us in the

direction of a time when nice guys finish first.


.pa
Systems For Finding People


How do we use computer networks?  Early proposals for networks

envisioned remote login as the key application (Marill & Roberts,

1966).  As early networks became reality, electronic mail, file

transfer, and access to remote databases were added to the list of

applications (Roberts & Wessler, 1970).


Information retrieval has turned out to be of great value, and today

many use computers to retrieve structured and unstructured information

from local and public databases.  Cuadra (1989) lists over 2,000 on-

line databases, and MIS departments often open data files to members

of their organizations.  While such structured information is of

obvious value, it is used primarily for operational tasks like order

processing and billing or for relatively specialized tasks like

literature or legal-precedent search.


Unstructured data may contain valuable information, but locating

relevant items is difficult.  Visions of the future such as the

"personalized newspaper" at the MIT Media Lab, Brand (1988) promise

that artificially-intelligent agents will one day find relevant

unstructured information for us, and Malone, Grant, Turbak, Brobst,

and Cohen (1987) have experimented with a system in which simple,

rule-based agents search for relevant semistructured messages

(containing fixed fields and text), but such systems are not yet in

general use.


While information retrieval and access to remote computation are of

value, electronic mail, or more generally computer-mediated

communication (CMC) has turned out to be the most common application

to date.  CMC is now accomplished over a worldwide matrix of connected

computer networks and conferencing systems (Quarterman, 1990).


We can consider two types of CMC transaction: mail messages for a

specific person and queries in which you are trying to meet a

previously unknown person with skills or knowledge you need.  In the

former case, you may or may not know the email address of the person

you wish to communicate with.  If you do not, the Internet has several

systems for finding addresses.  If the person's name and host are

known, the Finger protocol (Harrenstien, 1977) or a message to the

system postmaster may be used.  If not, "white pages" services such as

Whois (Harrenstien, 1985), Knowbot (Droms, 1990), and NetFind

(Schwartz & Tsirigotis, 1991) may help.


The focus of this article is the second case, where you do not know in

advance who you are looking for.  In my own experience, CMC enables me

to "meet" someone new who helps me with my work at least once a week.

(I know of a married couple who met on a bulletin board system and

understand that Compuserve has a regular listing of "cupcakes" --

couples that met on Compuserve).  Therefore, I am more interested in

an agent or system which can help me find relevant people than one

which retrieves addresses or information.


This article discusses two aspects of systems for finding people,

system architectures and organizational implications.  The next

section presents three alternative architectures:  special interest

groups and centralized and decentralized systems.  That is followed by

a discussion of organizational implications.


SYSTEM ARCHITECTURES


We can think of the problem of finding a person who can provide

information or collaboration as follows:  the information seeker (or

an agent) formulates and submits a query, hoping there are system

members capable of providing a useful reply.  Ideally, the system

would locate each member who could provide unique information

regarding the query, and no others.


Three possible approaches to this problem are:  posting a query to a

subset of the system members who voluntarily participate in a special

interest group (SIG) such as a teleconference, mail list or USENET

News group, a centralized person server which matches a query against

profiles of system members, and a decentralized system in which system

member's agents screen queries to determine their relevance.


Special Interest Groups


The first of these, posting a query to a SIG, is common today.  System

members identify themselves as being likely to have information on a

topic by joining the SIG.  When a user posts a query, it is broadcast

to all members of the SIG, each of whom decides how to respond to it.

While widely used, SIG systems pose some problems.


When a query is submitted, system resources are used in making each

member of the SIG aware of it.  Next, each SIG member spends time

screening the query.  The screening time might be as little as reading

a header line and deciding not to read further, or it might mean

reading the entire query.  Some subset of the SIG members then respond

to the query, which again takes their time and system resources.


In the ideal case, there would be only one response, and it would be a

complete, exact answer to the query; however, that is seldom achieved.

There may be no response, which is appropriate if no system member is

able to answer the query, but inappropriate if there is a member who

could answer, but does not see the query or does not read it.  There

may also be multiple, redundant responses.  I recently posted a query

to a news group asking for source code for a data compression

algorithm, and received essentially the same answer from 8 people.

For seven of these, the time they took to formulate replies, the

system resources needed to deliver them, and the time I spent reading

them were wasted.


The situation is analogous to type I and II errors in statistical

hypothesis testing -- the system can err by not finding a person who

could answer the query or by finding several people who provide

redundant information, wasting time and resources.  Of course, queries

with a single correct answer like "what is size of the national debt"

or "who is the purchasing manager at the XYZ Company" are not typical.

In general, queries will have more complex, open-ended answers, so

replies fall on a continuum from completely relevant and unique to

partially redundant to fully redundant.  In the case of a single-

answer query, there can only be one useful reply; in the case of more

complex queries, the relevance of a reply depends upon both it's

content and the time at which it is received.


Centralized Person Servers


The second approach to the problem of finding a person to answer a

query is a centralized person server (see Figure 1).  A query is sent


              ----- insert figure 1 about here ----


to the server, which identifies system members likely to have

information or skills relevant to the query.  Let us consider several

architectural alternatives.


The server could either be designed to automatically pass the query on

to the member(s) exceeding a system or query-specific relevance

threshold, or it could pass their descriptions back to the requester,

along with an explanation of why they were selected.


In the latter case, the user could consider the selections, optionally

request more information on the suggested correspondents or perform

further queries, and finally contact people at his or her discretion,

cutting the time spent on irrelevant queries and replies, but

requiring more of the requester's time.  Given the current state of

the art of procedures for determining relevance, and the requester's

knowledge of the request, I would expect this approach to be superior

to one which fully automated the matching of queries and people.  In

nearly all cases, a centralized server would be more efficient than a

SIG; however, it could be more prone to "type I" errors, in which

relevant system members do not see the query, depending on the design

of both systems and the behavior of system members.


The server must have access to profiles of the interests, skills and

experience of the system members as well as a procedure for

determining the likely relevance of a member to a given query.  Note

that the profiles need not necessarily be stored on the same machine

as processes the queries.  A network enables resource discovery

(Schwartz, 1991), in which one machine automatically searches or

queries others.  Examples of systems using this architecture are the

Knowbot and NetFind, mentioned above, and Archie (Deutsch, Emtage, &

Heelan, 1992) which compiles a list of files available for anonymous

access using the Internet File Transfer Protocol.


A profile could be as simple as a set of keywords, or it could include

semistructured documents similar to resumes or bibliographies, or it

could include the full text of documents written by the members.  The

design of profiles would be a function of the application context.  In

a large public network, only keyword identifiers with a short

biography might be feasible.  The keywords would be searched for

matches with the query, and the user would scrutinize the biographies

in deciding who to contact.  (At one time IBM had a system for the

selective dissemination of information (SDI), in which members

automatically received copies of magazine and journal articles as a

function of self-defined keyword lists).  If the system were serving a

single organization, it might be feasible to utilize structured and

semistructured information in evaluating query relevance, for example,

locating "any person with contacts in the XYZ company."


A wide range of options exists for search procedures and query

formats.  A simple system could be built using current document

retrieval software with boolean keyword queries matched against

keyword profiles or fields in a structured or semi-structured profile.

A more ambitious system might search an inverted file of terms used in

free-format profiles or of documents prepared by members.

.pa
Simple search software would merely decide that there is or is not a

match between each query and system member, while other software might

rank the relevance of each member relative to a query.  In the former

case, the search could continue until a specified number of matches

were found, in the latter case, it would find all members exceeding a

threshold of relevance or it would rank them all.  Free-format

queries, for example finding people who have written documents similar

to others or people with skill similar to others, can be processed by

large computers.  For example, Stein (1991) describes wide-area

information servers (WAIS) which handle such queries on Connection

Machines and Dumais, Furnas, Landauer, Deerwester, and Harshman (1988)

describe latent semantic analysis, a computationally intensive metric

for distance between documents.


Clients and servers may be decoupled by adhering to query protocols

which are emerging as standards.  Three candidates are the WAIS

protocol, SFQL, and CD-RDx.  The WAIS protocol extends the NISO Z39.50

protocol developed for library catalog queries, and it is being used

and developed by an active group of Internet-based researchers (Lynch,

1991; anonymous, 1990).  SFQL (structured Full-Text Query Language)

extends SQL, and it grew out of the need to query heterogeneous

aircraft documentation distributed on CD-ROM (Shapiro, Diamantopoulos

& Cotton, 1991).  It is being developed at the request of the Air

Transport Association.  CD-RDx is being developed at the request of

the Information Handling Committee of the CIA (anonymous, 1991).

Their goal is to enable government agencies to share data.


Existing information retrieval and database management software can be

adapted to the task of finding people, and there have been a few

trials.  The WAIS approach was tested for finding consultants with

specified expertise at the KPMG Peat Marwick consulting firm (Kahle &

Medlar, 1991).  Streeter and Lochbaum (1988) describe the application

of latent semantic analysis in a similar system at Bellcore.  The

California State University System is experimenting with a system for

locating consultants from among faculty members, and Cartermill's BEST

North America and BEST Great Britain are commercial databases

including information on faculty and graduate students at 106 North

American and all British universities (S. B. Hesson, personal

communication, January, 1992).


A more flexible, object-oriented approach would also be possible.  In

this case, each profile would be encapsulated with methods for

assessing its own relevance relative to a query.  An object-oriented

approach would allow flexibility in the definition of profiles since

heterogeneous descriptions could be accommodated.  An object-oriented

approach would also lend itself to parallel processing, with multiple

profiles evaluating their relevance to a query simultaneously.  New

software and techniques would have to be developed for an object-

oriented system, and it would probably not be possible (or necessarily

desirable) to devise a single metric of likely relevance for all

classes of profile.


A Decentralized Approach


The object-oriented approach to a central server brings us close to

the third alternative, a decentralized system in which member's

filters or agents examine queries to determine whether or not to make

them known to their owner.  This can be thought of as an extension of

the centralized, object-oriented architecture with the methods for

determining relevance executing in a process (probably running on a

personal workstation) associated with each member.  It is different;

however, in that the decision to present or not present a query to a

given member is made locally, without knowledge of the relative

relevance of the query to other members.  It also requires that

communication resources be used in presenting a query to each agent

and there is the likelihood of "type II" errors, with several

redundant replies to a query.  On the other hand, the agent screening

queries will run in the background, using otherwise idle resources.


A version of a system such as this could probably be implemented using

an experimental system like the Information Lens (Malone et al. 1987).

With Information Lens, semistructured messages may be addressed to

"anyone."  Each system member defines rule-based agents which screen

these messages.  This mechanism can be used to screen messages and to

classify those which are accepted for reading.  The rules are written

by the user, and they operate on information in the fixed-field

portion of a semi-structured message.  Since the message formats are

extensible and users write their own rules, it should be possible for

users to define rules which incorporated self descriptions.  Queries

sent to "anyone," would be checked by the potential recipient's agent

using the self-description rules.  The agent would screen out queries

which its user would probably not be able to answer.  It might also be

possible to implement rules which categorized queries as to the

likelihood with which they could be answered.  Whether with

Information Lens or another system, it should be possible to implement

query screening agents.  As in a centralized system, an object-

oriented approach could facilitate heterogeneous self-descriptions and

screening methods.


Of the three approaches to finding people who can answer a query, only

SIG systems are in wide use today, and in spite of their costs and

tendency to make errors, they are valuable.  There have also been a

few experiments with centralized systems, and the technology is

available to deploy others.  Assuming such systems could be built

brings us to organizational issues.  The following section discusses

the value to organizations of people-finding systems, incentives for

individuals to participate in them, and participation in the absence

of apparent incentives.


ORGANIZATIONAL IMPLICATIONS


An organization often benefits from cooperative, internal CMC as

outlined above.  In every transaction someone "gives away" information

and someone else "gets" it.  The organization is enriched because both

members have the information, and they know of each other.  If person

A posts a query, and person B is able to answer it completely and does

so, the organization will be better off if the value of the answer to

A is greater than the cost of supplying it.  If the query/response

system were perfect, and only B saw and replied to the query, then the

"profit" to the organization would be the value of the information to

A less the communication cost and the cost of B preparing the reply.


Of course the system will not be perfect.  As we saw above, there are

communication costs and, more important, the system may cause several

people to read the query, and several people may prepare and submit

redundant answers, which will have to be read.  To the extent that

this happens, the system is inefficient.  Such occurrences are

analogous to friction in a mechanical system.


In spite of of their relatively high "friction," SIG systems are

proliferating and many people find them worthwhile.  As SIG systems

improve and person servers are implemented, efficiency will increase,

making CMC still more valuable for the organization.  Other new

communication technology and infrastructure will have the same effect.

As the cost of cooperation decreases, organizations with a high

propensity to cooperate will enjoy an increasing competitive

advantage, thus economic selection will tend to favor the survival of

organizations which develop an ethic or value system favoring

cooperation.


While organizations will benefit from increased cooperation, what

about the individuals in them?  Why should person B reply to person

A's query?  Does person B even have an incentive to make his or her

qualifications known to the system -- won't doing so mean being

bothered to read queries and taking time to answer them?  Person A

might even be a competitor of person B.  Perhaps misinformation would

be in B's best interest.  The situation is analogous to the "tragedy

of the commons" in which it "pays" for an individual to abuse or over

use common resources like grazing land, lakes, or the atmosphere

(Hardin, 1968).


Incentives to Participate


In the face of possible disincentives for individuals to participate,

management has several options.  Profit sharing and other mechanisms

which reward group rather than individual performance increase the

value of participation to individuals.  Rewarding group performance

has a secondary effect of increasing the emphasis on cooperation in

the general organizational culture, further increasing the propensity

to participate.  This indirect effect can be amplified by using hiring

practice, training, executive communication, and other techniques to

increase the general value placed upon cooperation in the culture of

the organization (Schein, 1984).


Management also has the prerogative to exercise its authority to

mandate participation, making it part of an employee's job and

monitoring compliance.  The effectiveness of group rewards and

attempts to produce a cooperative culture will be strongest in

difficult economic times, when the organization is threatened and

individuals have relatively few alternatives.


Changing organization structure, for example, by flattening it, may

also have some influence on participation.  The effect of organization

structure (the topology of communication channels) on propensity to

communicate has been investigated in small group experiments by

Bonacich and Schneider (personal communication, January, 1990).  It is

also possible to create economic markets within and among

organizations, by paying royalties or consulting fees.  Perhaps the

first suggestion along these lines was Nelson (1973), which proposed

the Xanadu Network, a hypertext publishing and conferencing system

supported by a system of copyright and royalty payments.  Potential

consulting fees are the incentive to participate in the Cartermill

systems mentioned above.


Participation without Incentives


While management actions such as these may be needed to overcome a

reluctance to participate, there are also many examples of seemingly

irrational cooperation or altruism.  This section examines possible

causes of this behavior.


One framework for explaining it is offered by Maslow (1954) who

postulates an hierarchy of needs: physiological, safety, social,

esteem, and self-actualization.  A person may be preoccupied by a

lower level need, but as it becomes satisfied, its importance

diminishes as the next level moves into focus.  People with

unsatisfied physiological or safety (security) needs, would be less

likely to take the time to respond to a query than those who were

focused on higher needs.  If you are insecure in your job, you might

not be willing to spend time helping a coworker without explicit

credit or compensation.


Higher level needs, for example for esteem, explain some apparently

uneconomic contributions.  As any aspiring poet can tell you,

unpublished information does not yield esteem.  Voluntarily submitting

a description of your skills and experiences to a person server would

afford an opportunity to achieve esteem as would answering queries.

Frequent contributors to public SIG discussions, such as those on

USENET, gain esteem by becoming known among to SIG members.


From the point of view of someone posting a query, anonymity might be

desired in order to prevent erosion of social status.  For example,

Karabenick (1987) has found evidence that in an academic setting,

people are more likely to request help if they may do so anonymously,

presumably in order to hide their ignorance, and Stodolsky (1989)

suggests that mechanisms to protect expression, for example anonymity

or psuedonymity, where each member has one, and only one pseudonym,

might encourage information sharing.


However, information contributions which bestow neither economic

advantage nor social status are common on today's SIG systems.  These

might be explained as a recognition of long-run economic calculations.

For example, Kenner (1989) recounts an anecdote in which someone on

the BIX network helps him with a problem and he passes the favor along

by helping someone else.  He explains this altruism as follows:


   [Members of the BIX Network] routinely exchange services for
   free.  It's the regnant assumption that, whether I can ever be
   of service to [the person who is assisting me], I can surely
   be of service some other time to somebody, and these pooled
   favors level out.

But why doesn't the tragedy of the commons stop one from contributing?

When Kenner sees a query which he can answer, it is still locally

irrational for him to do so.  While some may use Kenner's

rationalization, others may find themselves contributing without being

able to explain why -- it just feels right.


The evolution of apparently irrational altruism has been studied in

depth by biologists, who may offer some clues.  We often have

difficulty giving rational, symbolic explanations for skills and

concepts which are critical to survival.  Perhaps this is because

surviving members of our species learned these concepts in a pre-

verbal era.  For example, everyone can differentiate between living

from non-living entities, yet "life" is difficult or impossible to

define.  Similarly, to some people, at some times, cooperation, taking

the time to answer a query on BIX, might just "feel right."  Lovelock

(1979) states that what feels right may be genetically determined:


     It may be that we are also programmed to recognize
     instinctively our optimal role in relation to other forms of
     life around us.  When we act according to this instinct in
     our dealings with our partners in Gaia, we are rewarded by
     finding that what seems right also looks good and arouses
     those pleasurable feelings which comprise our sense of
     beauty.

Biology offers theories which might explain the evolution of

altruistic feelings and hence behavior.  One is the theory of kin

selection, in which "a gene which causes its carrier to perform an act

which puts it at risk may nevertheless increase in frequency if the

result of that act is to help relatives of the actor, who may carry

identical copies of the gene" (Maynard-Smith, 1982).  For example,

animals are known to give warning calls when a predator is near, at

their own peril.  Sherman (1977) has studied this phenomenon in ground

squirrels, and after testing six alternative hypotheses to explain it,

concludes that of the six, the warning of kin is the most important

and perhaps only function of these calls.  Could it be that the

feeling which leads to cooperative behavior among individuals within

an organization is a case of misguided kin selection, evoked by

contact in the workplace and common organizational symbols and

culture?


There are also evolutionary theories explaining reciprocal altruism

among unrelated individuals.  Risky, cooperative behavior has been

observed in unrelated animals, for example, by Packer (1977), and

modeled using game theory in Axelrod and Hamilton (1981) and Axelrod

(1984).


Axelrod and Hamilton analyzed the Prisoner's Dilemma game and showed

that a strategy which involves some cooperation (instead of always

defecting) is evolutionarily stable if the game is repeated many

times, the players recognize each other, and the probability that they

will play each other in a subsequent game is sufficiently high, given

the payoff matrix.  One such strategy is tit-for-tat (TFT), in which

the player always cooperates on his or her first encounter with an

opponent, and thereafter does whatever the opponent did on the

previous encounter, i. e., begin cooperatively, but immediately

retaliate for a defection and reward a return to the cooperative fold.

Axelrod invited game-theory experts and amateurs from around the world

to participate in a computer-simulation contest for such strategies,

and TFT won, even though the other strategies were computationally

more complex. (The TFT algorithm required only 5 lines of code while

the 62 other entries ranged from 6 to 152 lines).


Axelrod and Hamilton speculate that uncertainty as to whether others

were relatives (kin selection) could get the cooperative ball rolling.

Furthermore, they show that once TFT is established, it will resist

intrusion by an all-defection strategy.  Gregory (1982) notes a TFT-

like pattern in the behavior of people in clan-based societies with

gift-exchange economies.  Gift exchange establishes a relationship

between the participants, with a gift establishing a debt that has to

be repaid.


TFT did not defeat any competing strategy, but its total score was

highest.  Axelrod states that "TFT won the tournament, not by beating

the other player, but by eliciting behavior from the other player

which allowed both to do well," and goes on to give examples from

every day life (business, arms control, etc.) where such behavior

works to everyone's benefit.


Simon (1991) also offers an evolutionary theory of motivation to join

organizations and work without shirking.  As partial explanation for

such cooperative, often altruistic behavior, he speculates on the

evolution of a tendency to balance self-assertiveness with docility,

where being docile is "to be tractable, manageable, and above all

teachable."  Simon reasons that a degree of docility would on the

average increase fitness, and hence be selected for.


If there is some instinctively felt propensity to cooperate, we would

expect that propensity to be stronger in some individuals than others.

We would also expect it to be felt more strongly at some times of life

than others, due both to circumstance and maturation.  Achieving

material success could pave the way for altruism, and it may also come

more easily at certain stages in life, just as sexual maturation or

the ability to acquire language have a well defined place in the life

cycle.  (Also, as pointed out by Axelrod and Hamilton, older

individuals would have lower probability of encountering others in the

future, shifting their game-theoretic assessment).


Lovelock suggested that we may be genetically programmed to recognize

beauty, and we may also be genetically programmed, to varying degrees,

to cooperate.  Helping someone who posts a query on a computer network

might feel good because that feeling tends to propagate your genes.
.pa
CONCLUSION

CMC infrastructure is proliferating rapidly, lowering the cost of

communication and cooperation.  One way CMC systems are used is to

find previously unknown people who can provide information or

expertise.  We discussed three general architectural alternatives for

building such systems.  Of these, SIGs are already in wide use, and

the technology is available to deploy systems using centralized

servers.


While this form of cooperation benefits the organization, it may not

benefit the individuals in the organization.  We outlined several

management options for increasing individual's incentive to

participate.  We also discussed reasons people may participate without

incentives -- to gain status or because it was part of their

instinctive nature.


Individuals, organization, and tools co-evolve.  We shape our tools

and they shape us.  Imagine organizations without the clock, electric

light, telephone, or automobile.  Tools also change our individual

nature.  At the point where a tool is pervasive and no longer noticed,

our sub-conscious self has changed.  We perceive our environment

differently, therefore we are different.  If the propensity to

cooperate has a genetic component, and CMC bestows a marginal

advantage upon individuals and organizations that cooperate, we might

expect some evolutionary pressure in favor of cooperation.  Perhaps

CMC will marginally alter organizational and human nature, nudging us

in the direction of a time when nice guys finish first.

.pa


                                       Person
                                       Server
     ZDDDDDDDDDDDDD?     query     ZDDDDDDDDDDDDD?
     3             3DDDDDDDDDDDDDD>3             3
     3 User with   3               3  Matching   3
     3 Query       3    matches    3  Procedure  3
     3             3<DDDDDDDDDDDDDD3             3
     @DDDDDDDDDDDDDY               @DDDDDDBDDDDDDY
                                          ^
                                          3
                                          3
                                   ZDDDDDDADDDDDD?
                                   3             3
                                   3  Member     3
                                   3  Profiles   3
                                   3             3
                                   @DDDDDDDDDDDDDY


Figure 1.  A Person Server.  A query is matched against member
profiles, and the user is informed of the identity and characteristics
of members likely to posses relevant information.  Alternatively, the
system could automatically forward the query to matching members.  In
an object-oriented system, the matching procedure would be
encapsulated with the profile.

.pa

REFERENCES

.pa
1.  Axelrod, Robert, "The Evolution of Cooperation". Basic Books,
    New York, 1984.

2.  Axelrod, Robert and Hamilton,William D., "The Evolution of
    Cooperation". Science, Vol 211, pp 1390-1396, March 27, 1981.

3.  Bonacich, Phillip and Schneider, Sherry, "Communication
    Networks and Collective Action". personal communication,
    1990.

4.  Brand, Stewart, "The Media Lab". Penguin, New York, 1988.

5.  Cuadra, Carlos, "Directory of On-Line databases". Elsevier,
    1989.

6.  Dawkins, Richard, "The Selfish Gene". Oxford University
    Press, Oxford, 1976.

7.  Deutsch, Peter, Emtage, Alan, and Heelan, Bill, "archie - An
    Electronic Directory Service for the Internet". FTP:
    archie/doc/whatis.archie@archie.mcgill.ca

8.  Droms, Ralph., "Access to Heterogeneous Directory Services".
    Proceedings of the InfoCom Conference, June, 1990.

9.  Dumais, Susan T., Furnas, George W., Landauer, Thomas K.,
    Deerwester, Scott, and Harshman, Richard". Using Latent
    Semantic Analysis to Improve Access to Textual Information".
    Proceedings of the ACM National Conference on Computer-Human
    Interaction, 1988.

10. Gregory, C. A., "Gifts and Commodities". Academic Press,
    London, 1982.

11. Hardin, Garrett, "The Tragedy of the Commons". Science,
    December 13, 1968, pp 1243-1248.

12. Harrenstien, K., "Name/Finger". RFC 742, December, 1977.

13. Harrenstien, K., Stahl, M. and Feinler, E., "NICName/Whois".
    RFC 954, October, 1985.

14. Hesson, Sylvia B., Cartermill, Inc., Baltimore, MD, (410)
    563-2378, personal communication, January, 1992.

15. Kahle, Brewster and Medlar, Art, "An Information System for
    Corporate Users: Wide Area Information Servers". FTP:
    pub/wais/doc/ wais-corp.txt@think.com, April, 8, 1991.

16. Karabenick, S. A., Computer Conferencing: Its impact on
    Academic Help-Seeking, The Second Guelph Symposium on
    Computer Conferencing, pp 69-76, Ontario, Canada: Guelph
    University, Department of Rural Extension Studies, 1987.

17. Kenner, Hugh, "Out my Computer Window". Harpers Magazine,
    November, 1989.

18. Lovelock, J. E., "Gaia". Oxford University Press, Oxford,
    1979.

19. Lynch, Clifford A., "The Z39.50 Information Retrieval
    Protocol: An Overview and Status Report". ACM SIGCOMM
    Computer Communication Review, pp 58-70, Vol 21, No 1,
    January, 1991.

20. Malone, T. W., Grant, K. R., Turbak, F. A., Brobst, S. A.,
    and Cohen, M. D., "Intelligent Information Sharing Systems".
    Communications of the ACM, 1987, 30, 390-402.

21. Marill. T. and Roberts, L. G., "Toward a Cooperative Network
    of Time-Shared Computers". Proceedings of the Fall Joint
    Computer Conference, 1966.

22. Maslow, Abraham, "Motivation and Personality". Harper and
    Row, 1954.

23. Maynard-Smith, John, "Evolution Now". W. H. Freeman and
    Company, San Francisco, 1982.

24. Nelson, Theodore, "A Conceptual Framework for Man-Machine
    Everything". Proceedings of the 1973 NCC, AFIPS Press,
    Montvale, NJ, 1973.

25. Packer, C., "Reciprocal Altruism in Papio Anubis". Nature,
    265, 441-3, 1977.

25. Press, Larry, "Collective Dynabases". Communicatios of the
    ACM, in press.

26. Quarterman, John S., "The Matrix: Computer Networks and
    Conferencing Systems Worldwide". Digital Press, Bedford, MA,
    1990.

27. Roberts, L. G. and Wessler, B. D., "Computer Network
    Developments to Achieve Resource Sharing". Proceedings of the
    Spring Joint Computer Conference, 1970.

28. Schein, E. H., "Coming to a new Awareness of Organizational
    Culture". Sloan Management Review, Winter, 1984, pp 3-15.

29. Schwartz, Michael F., "Resource Discovery and Related
    Research at the University of Colorado". ConneXions, pp 12-
    29, Vol 5, No 5, May, 1991.

30. Schwartz, Michael F. and Tsirigotis, Panagiotis G.,
    "Experience with a Semantically Cognizant Internet White
    Pages Directory Tool". Journal of Internetworking Research
    and Experience, Vol 2, No 1, March, 1991.

31. Shapiro, Neil R., Diamantopoulos, Elias, and Cotton, Paul,
    "CD-ROM Disc Interchangeability Standards: Beyond ISO 9660
    with Structured Full-Text Query Language (SFQL)". ATA/AIA 89-
    9C Monograph, April, 1991.

32. Sherman, Paul W., "Nepotism and the Evolution of Alarm
    Calls". Science, Vol, 197, pp 1246-1253, September 23, 1977.

33. Simon, Herbert A., "Organizations and Markets". Journal of
    Economic Perspectives, 5:25-44 (Spring 1991).

34. Stein, Richard Marlon, "Browsing Through Terabytes", Byte
    Magazine, May 1991, pp157-164.

36. Streeter, Lynn A., Lochbaum, Karen E., "An Expert/Expert-
    Locating System Based on Automatic Representation of Semantic
    Structure". Proceedings of the IEEE Conference on AI
    Applications, pp 345-349, San Diego, CA, March, 1988.

37. Stodolsky, David, Computer-Supported Cooperative Work: The
    Question of Personal Integrity, International Conference on
    Information Systems, Work, and Organization Design, Berlin,
    July, 1989.

38. --, "WAIS Interface Protocol, Prototype Functional
    Specification". April, 1990.  Anonymous FTP:
    /pub/wais/doc/protspec.txt@think.com.

39. --, "Standard for the Exchange of Digital Information on CD-
    ROM". DCI Information Handling Committee, Intelligence
    Community Staff, Washington, D. C., 20505, Version 3.1, May,
    1991.

Disclaimer: The views and opinions expressed on unofficial pages of California State University, Dominguez Hills faculty, staff or students are strictly those of the page authors. The content of these pages has not been reviewed or approved by California State University, Dominguez Hills.