您在這裡

Introduction

8 九月, 2015 - 18:06

Many highly effective managers have proven to be rather ineffective in predicting the diffusion and impacts of new information technologies. For example, IBM founder Tom Watson, Sr. initially foresaw a very small market for mainframe computers, and Digital Equipment Corporation founder Ken Olsen famously remarked that personal computers were not likely to catch on, except with electronics hobbyists. More recently, one category of IS application that caught many managers by surprise in the early years of the twenty-first century is peer-to-peer (or P2P) file sharing. Although the basic elements of P2P were invented back in the 1960’s, a confluence of enabling technologies and applications caused P2P file sharing to appear to burst forth and grow rapidly in the late 1990’s. In some industries P2P has not had much impact, but in others – especially the music industry -- it has had a tremendous impact and continues to generate great turmoil.

This chapter is organized as follows:

In section 2 we place P2P in its historical context by describing how computing, networking, and software technologies affected file sharing (within organizations, across organizations, and among individuals) in the past. By understanding how specific technical capabilities enabled specific file sharing applications in the past, you will be better prepared to capitalize on as yet unforeseen capabilities and applications when they become available during the course of your career. In section 3 we explain how P2P file sharing works today. The aim of this section is to help you understand how P2P differs from other approaches to making data and information products available to individual users.

In section 4 we discuss the early impacts of some specific P2P applications on individuals, business organizations, and institutions such as governmental and educational organizations. In this section we discover that P2P has brought both intended and unintended benefits to individuals and organizations, and it has also ushered in significant technical, legal, and ethical challenges to individuals and organizations.

Lastly, in section 5 we discuss P2P in light of the Law of the Double-Edged Sword – why every IS application (not just P2P) brings both opportunities and challenges. Neither P2P nor any other existing or emerging technology is immune from this law. Effective managers recognize this, plan accordingly, and are ready to change those plans as unforeseen opportunities or challenges arise.