TITLE PAGE Author: Laurence Press Title: Press, L., Systems for Finding People Journal of Organizational Computing, 2(3&4), 303-314 (1992). Affiliation: Professor, Computer Information Systems, California State University at Dominguez Hills Email: lpress@venera.isi.edu Running head: Finding People Keywords: organizational culture, participation, collaboration, computer-supported cooperative work ABSTRACT Finding a previously unknown person with the skills and knowledge to answer a question or perhaps to collaborate with is an effective use of a computer-mediated communication (CMC) system. This article discusses two aspects of systems for finding people, system architectures and organizational implications. The architectures considered are special interest groups, centralized servers, and decentralized systems. The organizational implications are the value to organizations of people-finding systems, management incentives for individuals to participate in them, and participation in the absence of apparent incentives. The deployment and improvement of people-finding and other CMC systems will bestow a marginal advantage upon cooperative individuals and organizations with cooperative cultures. As a result, CMC may marginally alter organizational and human nature, nudging us in the direction of a time when nice guys finish first. .pa Systems For Finding People How do we use computer networks? Early proposals for networks envisioned remote login as the key application (Marill & Roberts, 1966). As early networks became reality, electronic mail, file transfer, and access to remote databases were added to the list of applications (Roberts & Wessler, 1970). Information retrieval has turned out to be of great value, and today many use computers to retrieve structured and unstructured information from local and public databases. Cuadra (1989) lists over 2,000 on- line databases, and MIS departments often open data files to members of their organizations. While such structured information is of obvious value, it is used primarily for operational tasks like order processing and billing or for relatively specialized tasks like literature or legal-precedent search. Unstructured data may contain valuable information, but locating relevant items is difficult. Visions of the future such as the "personalized newspaper" at the MIT Media Lab, Brand (1988) promise that artificially-intelligent agents will one day find relevant unstructured information for us, and Malone, Grant, Turbak, Brobst, and Cohen (1987) have experimented with a system in which simple, rule-based agents search for relevant semistructured messages (containing fixed fields and text), but such systems are not yet in general use. While information retrieval and access to remote computation are of value, electronic mail, or more generally computer-mediated communication (CMC) has turned out to be the most common application to date. CMC is now accomplished over a worldwide matrix of connected computer networks and conferencing systems (Quarterman, 1990). We can consider two types of CMC transaction: mail messages for a specific person and queries in which you are trying to meet a previously unknown person with skills or knowledge you need. In the former case, you may or may not know the email address of the person you wish to communicate with. If you do not, the Internet has several systems for finding addresses. If the person's name and host are known, the Finger protocol (Harrenstien, 1977) or a message to the system postmaster may be used. If not, "white pages" services such as Whois (Harrenstien, 1985), Knowbot (Droms, 1990), and NetFind (Schwartz & Tsirigotis, 1991) may help. The focus of this article is the second case, where you do not know in advance who you are looking for. In my own experience, CMC enables me to "meet" someone new who helps me with my work at least once a week. (I know of a married couple who met on a bulletin board system and understand that Compuserve has a regular listing of "cupcakes" -- couples that met on Compuserve). Therefore, I am more interested in an agent or system which can help me find relevant people than one which retrieves addresses or information. This article discusses two aspects of systems for finding people, system architectures and organizational implications. The next section presents three alternative architectures: special interest groups and centralized and decentralized systems. That is followed by a discussion of organizational implications. SYSTEM ARCHITECTURES We can think of the problem of finding a person who can provide information or collaboration as follows: the information seeker (or an agent) formulates and submits a query, hoping there are system members capable of providing a useful reply. Ideally, the system would locate each member who could provide unique information regarding the query, and no others. Three possible approaches to this problem are: posting a query to a subset of the system members who voluntarily participate in a special interest group (SIG) such as a teleconference, mail list or USENET News group, a centralized person server which matches a query against profiles of system members, and a decentralized system in which system member's agents screen queries to determine their relevance. Special Interest Groups The first of these, posting a query to a SIG, is common today. System members identify themselves as being likely to have information on a topic by joining the SIG. When a user posts a query, it is broadcast to all members of the SIG, each of whom decides how to respond to it. While widely used, SIG systems pose some problems. When a query is submitted, system resources are used in making each member of the SIG aware of it. Next, each SIG member spends time screening the query. The screening time might be as little as reading a header line and deciding not to read further, or it might mean reading the entire query. Some subset of the SIG members then respond to the query, which again takes their time and system resources. In the ideal case, there would be only one response, and it would be a complete, exact answer to the query; however, that is seldom achieved. There may be no response, which is appropriate if no system member is able to answer the query, but inappropriate if there is a member who could answer, but does not see the query or does not read it. There may also be multiple, redundant responses. I recently posted a query to a news group asking for source code for a data compression algorithm, and received essentially the same answer from 8 people. For seven of these, the time they took to formulate replies, the system resources needed to deliver them, and the time I spent reading them were wasted. The situation is analogous to type I and II errors in statistical hypothesis testing -- the system can err by not finding a person who could answer the query or by finding several people who provide redundant information, wasting time and resources. Of course, queries with a single correct answer like "what is size of the national debt" or "who is the purchasing manager at the XYZ Company" are not typical. In general, queries will have more complex, open-ended answers, so replies fall on a continuum from completely relevant and unique to partially redundant to fully redundant. In the case of a single- answer query, there can only be one useful reply; in the case of more complex queries, the relevance of a reply depends upon both it's content and the time at which it is received. Centralized Person Servers The second approach to the problem of finding a person to answer a query is a centralized person server (see Figure 1). A query is sent ----- insert figure 1 about here ---- to the server, which identifies system members likely to have information or skills relevant to the query. Let us consider several architectural alternatives. The server could either be designed to automatically pass the query on to the member(s) exceeding a system or query-specific relevance threshold, or it could pass their descriptions back to the requester, along with an explanation of why they were selected. In the latter case, the user could consider the selections, optionally request more information on the suggested correspondents or perform further queries, and finally contact people at his or her discretion, cutting the time spent on irrelevant queries and replies, but requiring more of the requester's time. Given the current state of the art of procedures for determining relevance, and the requester's knowledge of the request, I would expect this approach to be superior to one which fully automated the matching of queries and people. In nearly all cases, a centralized server would be more efficient than a SIG; however, it could be more prone to "type I" errors, in which relevant system members do not see the query, depending on the design of both systems and the behavior of system members. The server must have access to profiles of the interests, skills and experience of the system members as well as a procedure for determining the likely relevance of a member to a given query. Note that the profiles need not necessarily be stored on the same machine as processes the queries. A network enables resource discovery (Schwartz, 1991), in which one machine automatically searches or queries others. Examples of systems using this architecture are the Knowbot and NetFind, mentioned above, and Archie (Deutsch, Emtage, & Heelan, 1992) which compiles a list of files available for anonymous access using the Internet File Transfer Protocol. A profile could be as simple as a set of keywords, or it could include semistructured documents similar to resumes or bibliographies, or it could include the full text of documents written by the members. The design of profiles would be a function of the application context. In a large public network, only keyword identifiers with a short biography might be feasible. The keywords would be searched for matches with the query, and the user would scrutinize the biographies in deciding who to contact. (At one time IBM had a system for the selective dissemination of information (SDI), in which members automatically received copies of magazine and journal articles as a function of self-defined keyword lists). If the system were serving a single organization, it might be feasible to utilize structured and semistructured information in evaluating query relevance, for example, locating "any person with contacts in the XYZ company." A wide range of options exists for search procedures and query formats. A simple system could be built using current document retrieval software with boolean keyword queries matched against keyword profiles or fields in a structured or semi-structured profile. A more ambitious system might search an inverted file of terms used in free-format profiles or of documents prepared by members. .pa Simple search software would merely decide that there is or is not a match between each query and system member, while other software might rank the relevance of each member relative to a query. In the former case, the search could continue until a specified number of matches were found, in the latter case, it would find all members exceeding a threshold of relevance or it would rank them all. Free-format queries, for example finding people who have written documents similar to others or people with skill similar to others, can be processed by large computers. For example, Stein (1991) describes wide-area information servers (WAIS) which handle such queries on Connection Machines and Dumais, Furnas, Landauer, Deerwester, and Harshman (1988) describe latent semantic analysis, a computationally intensive metric for distance between documents. Clients and servers may be decoupled by adhering to query protocols which are emerging as standards. Three candidates are the WAIS protocol, SFQL, and CD-RDx. The WAIS protocol extends the NISO Z39.50 protocol developed for library catalog queries, and it is being used and developed by an active group of Internet-based researchers (Lynch, 1991; anonymous, 1990). SFQL (structured Full-Text Query Language) extends SQL, and it grew out of the need to query heterogeneous aircraft documentation distributed on CD-ROM (Shapiro, Diamantopoulos & Cotton, 1991). It is being developed at the request of the Air Transport Association. CD-RDx is being developed at the request of the Information Handling Committee of the CIA (anonymous, 1991). Their goal is to enable government agencies to share data. Existing information retrieval and database management software can be adapted to the task of finding people, and there have been a few trials. The WAIS approach was tested for finding consultants with specified expertise at the KPMG Peat Marwick consulting firm (Kahle & Medlar, 1991). Streeter and Lochbaum (1988) describe the application of latent semantic analysis in a similar system at Bellcore. The California State University System is experimenting with a system for locating consultants from among faculty members, and Cartermill's BEST North America and BEST Great Britain are commercial databases including information on faculty and graduate students at 106 North American and all British universities (S. B. Hesson, personal communication, January, 1992). A more flexible, object-oriented approach would also be possible. In this case, each profile would be encapsulated with methods for assessing its own relevance relative to a query. An object-oriented approach would allow flexibility in the definition of profiles since heterogeneous descriptions could be accommodated. An object-oriented approach would also lend itself to parallel processing, with multiple profiles evaluating their relevance to a query simultaneously. New software and techniques would have to be developed for an object- oriented system, and it would probably not be possible (or necessarily desirable) to devise a single metric of likely relevance for all classes of profile. A Decentralized Approach The object-oriented approach to a central server brings us close to the third alternative, a decentralized system in which member's filters or agents examine queries to determine whether or not to make them known to their owner. This can be thought of as an extension of the centralized, object-oriented architecture with the methods for determining relevance executing in a process (probably running on a personal workstation) associated with each member. It is different; however, in that the decision to present or not present a query to a given member is made locally, without knowledge of the relative relevance of the query to other members. It also requires that communication resources be used in presenting a query to each agent and there is the likelihood of "type II" errors, with several redundant replies to a query. On the other hand, the agent screening queries will run in the background, using otherwise idle resources. A version of a system such as this could probably be implemented using an experimental system like the Information Lens (Malone et al. 1987). With Information Lens, semistructured messages may be addressed to "anyone." Each system member defines rule-based agents which screen these messages. This mechanism can be used to screen messages and to classify those which are accepted for reading. The rules are written by the user, and they operate on information in the fixed-field portion of a semi-structured message. Since the message formats are extensible and users write their own rules, it should be possible for users to define rules which incorporated self descriptions. Queries sent to "anyone," would be checked by the potential recipient's agent using the self-description rules. The agent would screen out queries which its user would probably not be able to answer. It might also be possible to implement rules which categorized queries as to the likelihood with which they could be answered. Whether with Information Lens or another system, it should be possible to implement query screening agents. As in a centralized system, an object- oriented approach could facilitate heterogeneous self-descriptions and screening methods. Of the three approaches to finding people who can answer a query, only SIG systems are in wide use today, and in spite of their costs and tendency to make errors, they are valuable. There have also been a few experiments with centralized systems, and the technology is available to deploy others. Assuming such systems could be built brings us to organizational issues. The following section discusses the value to organizations of people-finding systems, incentives for individuals to participate in them, and participation in the absence of apparent incentives. ORGANIZATIONAL IMPLICATIONS An organization often benefits from cooperative, internal CMC as outlined above. In every transaction someone "gives away" information and someone else "gets" it. The organization is enriched because both members have the information, and they know of each other. If person A posts a query, and person B is able to answer it completely and does so, the organization will be better off if the value of the answer to A is greater than the cost of supplying it. If the query/response system were perfect, and only B saw and replied to the query, then the "profit" to the organization would be the value of the information to A less the communication cost and the cost of B preparing the reply. Of course the system will not be perfect. As we saw above, there are communication costs and, more important, the system may cause several people to read the query, and several people may prepare and submit redundant answers, which will have to be read. To the extent that this happens, the system is inefficient. Such occurrences are analogous to friction in a mechanical system. In spite of of their relatively high "friction," SIG systems are proliferating and many people find them worthwhile. As SIG systems improve and person servers are implemented, efficiency will increase, making CMC still more valuable for the organization. Other new communication technology and infrastructure will have the same effect. As the cost of cooperation decreases, organizations with a high propensity to cooperate will enjoy an increasing competitive advantage, thus economic selection will tend to favor the survival of organizations which develop an ethic or value system favoring cooperation. While organizations will benefit from increased cooperation, what about the individuals in them? Why should person B reply to person A's query? Does person B even have an incentive to make his or her qualifications known to the system -- won't doing so mean being bothered to read queries and taking time to answer them? Person A might even be a competitor of person B. Perhaps misinformation would be in B's best interest. The situation is analogous to the "tragedy of the commons" in which it "pays" for an individual to abuse or over use common resources like grazing land, lakes, or the atmosphere (Hardin, 1968). Incentives to Participate In the face of possible disincentives for individuals to participate, management has several options. Profit sharing and other mechanisms which reward group rather than individual performance increase the value of participation to individuals. Rewarding group performance has a secondary effect of increasing the emphasis on cooperation in the general organizational culture, further increasing the propensity to participate. This indirect effect can be amplified by using hiring practice, training, executive communication, and other techniques to increase the general value placed upon cooperation in the culture of the organization (Schein, 1984). Management also has the prerogative to exercise its authority to mandate participation, making it part of an employee's job and monitoring compliance. The effectiveness of group rewards and attempts to produce a cooperative culture will be strongest in difficult economic times, when the organization is threatened and individuals have relatively few alternatives. Changing organization structure, for example, by flattening it, may also have some influence on participation. The effect of organization structure (the topology of communication channels) on propensity to communicate has been investigated in small group experiments by Bonacich and Schneider (personal communication, January, 1990). It is also possible to create economic markets within and among organizations, by paying royalties or consulting fees. Perhaps the first suggestion along these lines was Nelson (1973), which proposed the Xanadu Network, a hypertext publishing and conferencing system supported by a system of copyright and royalty payments. Potential consulting fees are the incentive to participate in the Cartermill systems mentioned above. Participation without Incentives While management actions such as these may be needed to overcome a reluctance to participate, there are also many examples of seemingly irrational cooperation or altruism. This section examines possible causes of this behavior. One framework for explaining it is offered by Maslow (1954) who postulates an hierarchy of needs: physiological, safety, social, esteem, and self-actualization. A person may be preoccupied by a lower level need, but as it becomes satisfied, its importance diminishes as the next level moves into focus. People with unsatisfied physiological or safety (security) needs, would be less likely to take the time to respond to a query than those who were focused on higher needs. If you are insecure in your job, you might not be willing to spend time helping a coworker without explicit credit or compensation. Higher level needs, for example for esteem, explain some apparently uneconomic contributions. As any aspiring poet can tell you, unpublished information does not yield esteem. Voluntarily submitting a description of your skills and experiences to a person server would afford an opportunity to achieve esteem as would answering queries. Frequent contributors to public SIG discussions, such as those on USENET, gain esteem by becoming known among to SIG members. From the point of view of someone posting a query, anonymity might be desired in order to prevent erosion of social status. For example, Karabenick (1987) has found evidence that in an academic setting, people are more likely to request help if they may do so anonymously, presumably in order to hide their ignorance, and Stodolsky (1989) suggests that mechanisms to protect expression, for example anonymity or psuedonymity, where each member has one, and only one pseudonym, might encourage information sharing. However, information contributions which bestow neither economic advantage nor social status are common on today's SIG systems. These might be explained as a recognition of long-run economic calculations. For example, Kenner (1989) recounts an anecdote in which someone on the BIX network helps him with a problem and he passes the favor along by helping someone else. He explains this altruism as follows: [Members of the BIX Network] routinely exchange services for free. It's the regnant assumption that, whether I can ever be of service to [the person who is assisting me], I can surely be of service some other time to somebody, and these pooled favors level out. But why doesn't the tragedy of the commons stop one from contributing? When Kenner sees a query which he can answer, it is still locally irrational for him to do so. While some may use Kenner's rationalization, others may find themselves contributing without being able to explain why -- it just feels right. The evolution of apparently irrational altruism has been studied in depth by biologists, who may offer some clues. We often have difficulty giving rational, symbolic explanations for skills and concepts which are critical to survival. Perhaps this is because surviving members of our species learned these concepts in a pre- verbal era. For example, everyone can differentiate between living from non-living entities, yet "life" is difficult or impossible to define. Similarly, to some people, at some times, cooperation, taking the time to answer a query on BIX, might just "feel right." Lovelock (1979) states that what feels right may be genetically determined: It may be that we are also programmed to recognize instinctively our optimal role in relation to other forms of life around us. When we act according to this instinct in our dealings with our partners in Gaia, we are rewarded by finding that what seems right also looks good and arouses those pleasurable feelings which comprise our sense of beauty. Biology offers theories which might explain the evolution of altruistic feelings and hence behavior. One is the theory of kin selection, in which "a gene which causes its carrier to perform an act which puts it at risk may nevertheless increase in frequency if the result of that act is to help relatives of the actor, who may carry identical copies of the gene" (Maynard-Smith, 1982). For example, animals are known to give warning calls when a predator is near, at their own peril. Sherman (1977) has studied this phenomenon in ground squirrels, and after testing six alternative hypotheses to explain it, concludes that of the six, the warning of kin is the most important and perhaps only function of these calls. Could it be that the feeling which leads to cooperative behavior among individuals within an organization is a case of misguided kin selection, evoked by contact in the workplace and common organizational symbols and culture? There are also evolutionary theories explaining reciprocal altruism among unrelated individuals. Risky, cooperative behavior has been observed in unrelated animals, for example, by Packer (1977), and modeled using game theory in Axelrod and Hamilton (1981) and Axelrod (1984). Axelrod and Hamilton analyzed the Prisoner's Dilemma game and showed that a strategy which involves some cooperation (instead of always defecting) is evolutionarily stable if the game is repeated many times, the players recognize each other, and the probability that they will play each other in a subsequent game is sufficiently high, given the payoff matrix. One such strategy is tit-for-tat (TFT), in which the player always cooperates on his or her first encounter with an opponent, and thereafter does whatever the opponent did on the previous encounter, i. e., begin cooperatively, but immediately retaliate for a defection and reward a return to the cooperative fold. Axelrod invited game-theory experts and amateurs from around the world to participate in a computer-simulation contest for such strategies, and TFT won, even though the other strategies were computationally more complex. (The TFT algorithm required only 5 lines of code while the 62 other entries ranged from 6 to 152 lines). Axelrod and Hamilton speculate that uncertainty as to whether others were relatives (kin selection) could get the cooperative ball rolling. Furthermore, they show that once TFT is established, it will resist intrusion by an all-defection strategy. Gregory (1982) notes a TFT- like pattern in the behavior of people in clan-based societies with gift-exchange economies. Gift exchange establishes a relationship between the participants, with a gift establishing a debt that has to be repaid. TFT did not defeat any competing strategy, but its total score was highest. Axelrod states that "TFT won the tournament, not by beating the other player, but by eliciting behavior from the other player which allowed both to do well," and goes on to give examples from every day life (business, arms control, etc.) where such behavior works to everyone's benefit. Simon (1991) also offers an evolutionary theory of motivation to join organizations and work without shirking. As partial explanation for such cooperative, often altruistic behavior, he speculates on the evolution of a tendency to balance self-assertiveness with docility, where being docile is "to be tractable, manageable, and above all teachable." Simon reasons that a degree of docility would on the average increase fitness, and hence be selected for. If there is some instinctively felt propensity to cooperate, we would expect that propensity to be stronger in some individuals than others. We would also expect it to be felt more strongly at some times of life than others, due both to circumstance and maturation. Achieving material success could pave the way for altruism, and it may also come more easily at certain stages in life, just as sexual maturation or the ability to acquire language have a well defined place in the life cycle. (Also, as pointed out by Axelrod and Hamilton, older individuals would have lower probability of encountering others in the future, shifting their game-theoretic assessment). Lovelock suggested that we may be genetically programmed to recognize beauty, and we may also be genetically programmed, to varying degrees, to cooperate. Helping someone who posts a query on a computer network might feel good because that feeling tends to propagate your genes. .pa CONCLUSION CMC infrastructure is proliferating rapidly, lowering the cost of communication and cooperation. One way CMC systems are used is to find previously unknown people who can provide information or expertise. We discussed three general architectural alternatives for building such systems. Of these, SIGs are already in wide use, and the technology is available to deploy systems using centralized servers. While this form of cooperation benefits the organization, it may not benefit the individuals in the organization. We outlined several management options for increasing individual's incentive to participate. We also discussed reasons people may participate without incentives -- to gain status or because it was part of their instinctive nature. Individuals, organization, and tools co-evolve. We shape our tools and they shape us. Imagine organizations without the clock, electric light, telephone, or automobile. Tools also change our individual nature. At the point where a tool is pervasive and no longer noticed, our sub-conscious self has changed. We perceive our environment differently, therefore we are different. If the propensity to cooperate has a genetic component, and CMC bestows a marginal advantage upon individuals and organizations that cooperate, we might expect some evolutionary pressure in favor of cooperation. Perhaps CMC will marginally alter organizational and human nature, nudging us in the direction of a time when nice guys finish first. .pa Person Server ZDDDDDDDDDDDDD? query ZDDDDDDDDDDDDD? 3 3DDDDDDDDDDDDDD>3 3 3 User with 3 3 Matching 3 3 Query 3 matches 3 Procedure 3 3 3<DDDDDDDDDDDDDD3 3 @DDDDDDDDDDDDDY @DDDDDDBDDDDDDY ^ 3 3 ZDDDDDDADDDDDD? 3 3 3 Member 3 3 Profiles 3 3 3 @DDDDDDDDDDDDDY Figure 1. A Person Server. A query is matched against member profiles, and the user is informed of the identity and characteristics of members likely to posses relevant information. Alternatively, the system could automatically forward the query to matching members. In an object-oriented system, the matching procedure would be encapsulated with the profile. .pa REFERENCES .pa 1. Axelrod, Robert, "The Evolution of Cooperation". Basic Books, New York, 1984. 2. Axelrod, Robert and Hamilton,William D., "The Evolution of Cooperation". Science, Vol 211, pp 1390-1396, March 27, 1981. 3. Bonacich, Phillip and Schneider, Sherry, "Communication Networks and Collective Action". personal communication, 1990. 4. Brand, Stewart, "The Media Lab". Penguin, New York, 1988. 5. Cuadra, Carlos, "Directory of On-Line databases". Elsevier, 1989. 6. Dawkins, Richard, "The Selfish Gene". Oxford University Press, Oxford, 1976. 7. Deutsch, Peter, Emtage, Alan, and Heelan, Bill, "archie - An Electronic Directory Service for the Internet". FTP: archie/doc/whatis.archie@archie.mcgill.ca 8. Droms, Ralph., "Access to Heterogeneous Directory Services". Proceedings of the InfoCom Conference, June, 1990. 9. Dumais, Susan T., Furnas, George W., Landauer, Thomas K., Deerwester, Scott, and Harshman, Richard". Using Latent Semantic Analysis to Improve Access to Textual Information". Proceedings of the ACM National Conference on Computer-Human Interaction, 1988. 10. Gregory, C. A., "Gifts and Commodities". Academic Press, London, 1982. 11. Hardin, Garrett, "The Tragedy of the Commons". Science, December 13, 1968, pp 1243-1248. 12. Harrenstien, K., "Name/Finger". RFC 742, December, 1977. 13. Harrenstien, K., Stahl, M. and Feinler, E., "NICName/Whois". RFC 954, October, 1985. 14. Hesson, Sylvia B., Cartermill, Inc., Baltimore, MD, (410) 563-2378, personal communication, January, 1992. 15. Kahle, Brewster and Medlar, Art, "An Information System for Corporate Users: Wide Area Information Servers". FTP: pub/wais/doc/ wais-corp.txt@think.com, April, 8, 1991. 16. Karabenick, S. A., Computer Conferencing: Its impact on Academic Help-Seeking, The Second Guelph Symposium on Computer Conferencing, pp 69-76, Ontario, Canada: Guelph University, Department of Rural Extension Studies, 1987. 17. Kenner, Hugh, "Out my Computer Window". Harpers Magazine, November, 1989. 18. Lovelock, J. E., "Gaia". Oxford University Press, Oxford, 1979. 19. Lynch, Clifford A., "The Z39.50 Information Retrieval Protocol: An Overview and Status Report". ACM SIGCOMM Computer Communication Review, pp 58-70, Vol 21, No 1, January, 1991. 20. Malone, T. W., Grant, K. R., Turbak, F. A., Brobst, S. A., and Cohen, M. D., "Intelligent Information Sharing Systems". Communications of the ACM, 1987, 30, 390-402. 21. Marill. T. and Roberts, L. G., "Toward a Cooperative Network of Time-Shared Computers". Proceedings of the Fall Joint Computer Conference, 1966. 22. Maslow, Abraham, "Motivation and Personality". Harper and Row, 1954. 23. Maynard-Smith, John, "Evolution Now". W. H. Freeman and Company, San Francisco, 1982. 24. Nelson, Theodore, "A Conceptual Framework for Man-Machine Everything". Proceedings of the 1973 NCC, AFIPS Press, Montvale, NJ, 1973. 25. Packer, C., "Reciprocal Altruism in Papio Anubis". Nature, 265, 441-3, 1977. 25. Press, Larry, "Collective Dynabases". Communicatios of the ACM, in press. 26. Quarterman, John S., "The Matrix: Computer Networks and Conferencing Systems Worldwide". Digital Press, Bedford, MA, 1990. 27. Roberts, L. G. and Wessler, B. D., "Computer Network Developments to Achieve Resource Sharing". Proceedings of the Spring Joint Computer Conference, 1970. 28. Schein, E. H., "Coming to a new Awareness of Organizational Culture". Sloan Management Review, Winter, 1984, pp 3-15. 29. Schwartz, Michael F., "Resource Discovery and Related Research at the University of Colorado". ConneXions, pp 12- 29, Vol 5, No 5, May, 1991. 30. Schwartz, Michael F. and Tsirigotis, Panagiotis G., "Experience with a Semantically Cognizant Internet White Pages Directory Tool". Journal of Internetworking Research and Experience, Vol 2, No 1, March, 1991. 31. Shapiro, Neil R., Diamantopoulos, Elias, and Cotton, Paul, "CD-ROM Disc Interchangeability Standards: Beyond ISO 9660 with Structured Full-Text Query Language (SFQL)". ATA/AIA 89- 9C Monograph, April, 1991. 32. Sherman, Paul W., "Nepotism and the Evolution of Alarm Calls". Science, Vol, 197, pp 1246-1253, September 23, 1977. 33. Simon, Herbert A., "Organizations and Markets". Journal of Economic Perspectives, 5:25-44 (Spring 1991). 34. Stein, Richard Marlon, "Browsing Through Terabytes", Byte Magazine, May 1991, pp157-164. 36. Streeter, Lynn A., Lochbaum, Karen E., "An Expert/Expert- Locating System Based on Automatic Representation of Semantic Structure". Proceedings of the IEEE Conference on AI Applications, pp 345-349, San Diego, CA, March, 1988. 37. Stodolsky, David, Computer-Supported Cooperative Work: The Question of Personal Integrity, International Conference on Information Systems, Work, and Organization Design, Berlin, July, 1989. 38. --, "WAIS Interface Protocol, Prototype Functional Specification". April, 1990. Anonymous FTP: /pub/wais/doc/protspec.txt@think.com. 39. --, "Standard for the Exchange of Digital Information on CD- ROM". DCI Information Handling Committee, Intelligence Community Staff, Washington, D. C., 20505, Version 3.1, May, 1991.
Disclaimer: The views and opinions expressed on unofficial pages of California State University, Dominguez Hills faculty, staff or students are strictly those of the page authors. The content of these pages has not been reviewed or approved by California State University, Dominguez Hills.