Kenneth C. Laudon

Last updated
Kenneth C. Laudon
Born(1944-11-04)November 4, 1944
DiedDecember 26, 2019(2019-12-26) (aged 75)
Nationality Flag of the United States.svg U.S.
Alma mater Stanford University
Columbia University
Known for Privacy
Information Systems
E-commerce
Spouse(s)Jane Price Laudon
Scientific career
Fields Information Systems
E-commerce
Privacy
Institutions New York University

Kenneth C. Laudon was a professor of Information Systems at the Stern School of Business at New York University.

Contents

Life and work

Kenneth Laudon graduated from Stanford University and has a Ph.D from Columbia University. [1]

Laudon's first book, Computers and Bureaucratic Reform: The Political Functions of Urban Information Systems (John Wiley and Sons, 1974) was an early study of the use of computers in government. [2]

Laudon's second book, Communications Technology and Democratic Participation (Praeger Publishing, 1978) has been cited as a "pioneering work" on the impact of information technology on the development of different types of democracies. [3]

Laudon's third book was Dossier Society: Value Choices in the Design of National Information Systems (Columbia University Press, 1986). [4] In Dossier Society, Laudon argued that the design and uses of new computing and telecommunications systems, such as the Federal Bureau of Investigation National Computerized Criminal History System, were creating what he called a “dossier society” that would be increasingly based on a person’s data image. [5] [6]

Laudon subsequently authored an influential article, "Markets and Privacy" (Communications of the ACM, 1996). This article proposed that people should have a property right in their personal information, enabling them to sell that information, perhaps through a national information market. [7] [8] This article has been recognized as one of the first to suggest a propertization of information privacy [9] as well as the institutional infrastructure that might be used to make such an information property rights system a reality. [10] [11] A follow-on paper published by the U.S. Department of Commerce National Telecommunications and Information Administration discusses how personal information might be priced. [12] Laudon's work has recently been cited as a source for a proposal that Facebook create an information market and pay its users in exchange for their information or attitudes. [13] Laudon is also the author a number of academic articles with respect to the impacts of information systems.

Professor Laudon is also well known as the co-author of a number of textbooks, including Management Information Systems: Managing the Digital Firm and E-commerce. Business. Technology. Society.

He died at his home in Croton-on-Hudson on December 26, 2019. [14]

See also

Related Research Articles

Computing Branch of knowledge

Computing is any goal-oriented activity requiring, benefiting from, or creating computing machinery. It includes the study and experimentation of algorithmic processes, and development of both hardware and software. Computing has scientific, engineering, mathematical, technological and social aspects. Major computing disciplines include computer engineering, computer science, cybersecurity, data science, information systems, information technology and software engineering.

E-commerce is the activity of electronically buying or selling of products on online services or over the Internet. E-commerce draws on technologies such as mobile commerce, electronic funds transfer, supply chain management, Internet marketing, online transaction processing, electronic data interchange (EDI), inventory management systems, and automated data collection systems. E-commerce is in turn driven by the technological advances of the semiconductor industry, and is the largest sector of the electronics industry.

National Telecommunications and Information Administration American government agency

The National Telecommunications and Information Administration (NTIA) is an agency of the United States Department of Commerce that serves as the President's principal adviser on telecommunications policies pertaining to the United States' economic and technological advancement and to regulation of the telecommunications industry.

A management information system (MIS) is an information system used for decision-making, and for the coordination, control, analysis, and visualization of information in an organization. The study of the management information systems involves people, processes and technology in an organizational context.

Information privacy is the relationship between the collection and dissemination of data, technology, the public expectation of privacy, and the legal and political issues surrounding them. It is also known as data privacy or data protection.

John L. Hennessy American computer scientist

John Leroy Hennessy is an American computer scientist, academician and businessman who serves as Chairman of Alphabet Inc. Hennessy is one of the founders of MIPS Computer Systems Inc. as well as Atheros and served as the tenth President of Stanford University. Hennessy announced that he would step down in the summer of 2016. He was succeeded as President by Marc Tessier-Lavigne. Marc Andreessen called him "the godfather of Silicon Valley."

A recommender system, or a recommendation system, is a subclass of information filtering system that provide suggestions for items that are most pertinent to a particular user. Typically, the suggestions refer to various decision-making processes, such as what product to purchase, what music to listen to, or what online news to read. Recommender systems are particularly useful when an individual needs to choose an item from a potentially overwhelming number of items that a service may offer.

Shafi Goldwasser American computer scientist

Shafrira Goldwasser is an Israeli-American computer scientist and winner of the Turing Award in 2012. She is the RSA Professor of Electrical Engineering and Computer Science at MIT, a professor of mathematical sciences at the Weizmann Institute of Science, Israel, co-founder and chief scientist of Duality Technologies and the director of the Simons Institute for the Theory of Computing in Berkeley, CA.

Computer ethics is a part of practical philosophy concerned with how computing professionals should make decisions regarding professional and social conduct.

Internet governance System of laws, norms, rules, policies and practices

Internet governance consists of a system of laws, norms, rules, policies and practices that dictate how the board members should manage and oversee the affairs of any internet related-regulatory body This article describes how the Internet was and is currently governed, some of the controversies that occurred along the way, and the ongoing debates about how the Internet should or should not be governed in the future.

Paul Dourish British-American computer scientist

Paul Dourish is a computer scientist best known for his work and research at the intersection of computer science and social science. Born in Scotland, he holds the Steckler Endowed Chair of Information and Computer Science at the University of California, Irvine, where he joined the faculty in 2000, and where he directs the Steckler Center for Responsible, Ethical, and Accessible Technology. He is a Fellow of the AAAS, the ACM, and the British Computer Society, and is a two-time winner of the ACM CSCW "Lasting Impact" award, in 2016 and 2021.

L. Jean Camp is a professor at the Indiana University School of Informatics and Computing. She was previously an associate professor at the John F. Kennedy School of Government, before which she was at Sandia National Laboratories. She is best known for her work which combines computer security and the social sciences. In particular her work on Economics of security dates from 2001. She was an original participant in the Workshops on Economics of Information Security.

Privacy-invasive software is a computer software that ignores users’ privacy and is distributed with a specific intent, often of a commercial nature. Three typical examples of privacy-invasive software are adware, spyware and browser hijacking programs.

Value sensitive design (VSD) is a theoretically grounded approach to the design of technology that accounts for human values in a principled and comprehensive manner. VSD originated within the field of information systems design and human-computer interaction to address design issues within the fields by emphasizing the ethical values of direct and indirect stakeholders. It was developed by Batya Friedman and Peter Kahn at the University of Washington starting in the late 1980s and early 1990s. Later, in 2019, Batya Friedman and David G. Hendry wrote a book on this topic called "Value Sensitive Design: Shaping Technology with Moral Imagination". Value Sensitive Design takes human values into account in a well-defined matter throughout the whole process. Designs are developed using an investigation consisting of three phases: conceptual, empirical and technological. These investigations are intended to be iterative, allowing the designer to modify the design continuously.

Eric Horvitz American computer scientist, and Technical Fellow at Microsoft

Eric Joel Horvitz is an American computer scientist, and Technical Fellow at Microsoft, where he serves as the company's first Chief Scientific Officer. He was previously the director of Microsoft Research Labs, including research centers in Redmond, WA, Cambridge, MA, New York, NY, Montreal, Canada, Cambridge, UK, and Bangalore, India.

Robert M. Pepper Ph. D is a specialist in communications policy.

Howard George Willis Ware, popularly known as Willis Howard Ware was an American computer pioneer who co-developed the IAS machine that laid down the blueprint of the modern day computer in the late 20th century. He was also a pioneer of privacy rights, social critic of technology policy, and a founder in the field of computer security.

Patrick Drew McDaniel is an American computer scientist. He is a William L. Weiss Professor of Information and Communications Technology in the School of Electrical Engineering and Computer Science and the Director of the Institute for Networking and Security Research at the Pennsylvania State University. He has made several contributions in the areas of computer security, operating systems, and computer networks. McDaniel is best known for his work in mobile security as well as in electronic voting security, digital piracy prevention, and cellular networks. In recognition of his contributions and service to the scientific community, he was named IEEE Fellow and ACM Fellow. Prior to joining Penn State in 2004, he was a senior research staff member at AT&T Labs. He obtained his Ph.D. in Electrical Engineering and Computer Science from the University of Michigan, under the supervision of Atul Prakash.

Contextual integrity is a theory of privacy developed by Helen Nissenbaum and presented in her book Privacy In Context: Technology, Policy, and the Integrity of Social Life.

Batya Friedman is an American professor in the Information School, adjunct professor in the Department of Computer Science, and adjunct professor in the Department of Human-Centered Design and Engineering at the University of Washington where she directs the Value Sensitive Design Research Lab.

References

  1. "Prof. Ken Laudon". People.stern.nyu.edu. Retrieved 2013-11-21.
  2. James W. Cortada, The Digital Hand, Vol. 3: How Computers Changed the Work of American Public Sector Industries, Oxford University Press, 2008, p. 445
  3. Chadwick Andrew and Christopher May, "Interaction between States and Citizens in the Age of the Internet: 'e-Government' in the United States, Britain, and the European Union," Governance, Volume 16, Issue 2, pp. 271-300, April 2003
  4. "Dossier society: value choices in the design of national information systems". Dl.acm.org. Retrieved 2013-11-21.
  5. Dutton, William H. (Jan 1988). "Dossier Society: Value Choices in the Design of National Information Systems by Kenneth C. Laudon". The Library Quarterly: Information, Community, Policy. 58 (1): 102–105. doi:10.1086/601967. JSTOR   4308212.
  6. "Technologization of Security: Management of Uncertainty and Risk in the Age of Biometrics" (PDF). Surveillance & Society : The Journal. ISSN   1477-7487. Archived from the original (PDF) on 2015-09-24. Retrieved 2013-11-19.
  7. "Markets & Privacy" (PDF). Archived from the original (PDF) on 2012-06-16. Retrieved 2013-11-19.{{cite journal}}: Cite journal requires |journal= (help)
  8. Published: July 15, 2001 (2001-07-15). "The Nation: Your Data, Yourself; A Protective Path Paved in Granola - Page 2 - New York Times". The New York Times . Retrieved 2013-11-21.
  9. "Beyond Privacy, Beyond Rights–Toward a "Systems" Theory of Information Governance" (PDF). Archived from the original (PDF) on 2011-06-29. Retrieved 2013-11-19.
  10. "Samuelson Full". Cyber.law.harvard.edu. Retrieved 2013-11-21.
  11. "Economic Aspects of Personal Privacy". People.ischool.berkeley.edu. Retrieved 2013-11-21.
  12. "Chapter 1: Theory of Markets and Privacy | NTIA". Ntia.doc.gov. Retrieved 2013-11-21.
  13. Dhar, Vasant (2013-03-28). "Get Paid for Your Data on Facebook | Wired Business". Wired.com. Retrieved 2013-11-21.
  14. Kenneth Laudon Obituary