Threat 3. Overuse of
resources. Also referred to as
“overgrazing” in the literature [ 2] Giving/ receiving
or free riding, it involves overuse asymmetry
without concern for the harm it
causes others [ 10].
Contexts. OSS. The overuse of
resources is not a significant
threat to OSS; software, like
many other information goods, is
nonrival, and the cost of producing an additional unit of existing
software is negligible.
Computing grids. In the case of
two-way grids, the potential
threat of overuse depends on Overuse of resources
agreements among the partici-
pants. In many cases, this threat is
resolved by allowing a contribu- Preventing
others from
tion only when the contributor using
computers are idle at the time of resources
the contribution (so the resource
becomes a nonrival good). In the Damaging a
particular
case of one-way grids, the threat resource
of overuse is mitigated against in
a similar way, as resources are usually contributed only when the
computer is idle.
Wireless networks. Here, the
threat is significant, as wireless
access is rival and nonexcludable;
overuse of resources could result in their insufficient
availability. Potential countermeasures include limiting the number of benefiting devices based on
resource availability and limiting access to the
resource for a certain period [ 2].
Content. In the case of knowledge contribution via
Wikipedia and Wikipedia-like initiatives, the threat
of overuse is low, as content, like software, is also a
nonrival good.
Threat 4. Preventing others from using resources
in order to increase one’s own availability of
resources.
Contexts. OSS. The threat of preventing others
from using resources is not significant, as code is a
nonrival good; preventing others’ use of the resource
provides little value.
Computing grids. The threat of being blocked from
access is not significant in grids. However, a countermeasure would be like the one suggested in the case
of wireless networks: having the oversight body monitor and periodically analyze user complaints.
Wireless networks. This threat manifests itself in the
prevention of others’ device operations so the remain-
OSS
Increase motivation -
benefits for contributors:
learning, become lead users,
tailor software to needs, fun,
signal status, signal ability,
support self identification,
help others
Computing
grids (users) WLAN
Increase motivation: Increase
public display of motivation: self
abilities, the identification,
prospect of self status signaling
identification, and
status signaling
Content
Make people publicly
commit to contribution,
increase social validity,
create contribution
rating by other
participants; increase
motivation: display
abilities, signal status,
help others.
Use of others’ Adopt software that restricts Monitor traffic, Use security Prohibit proprietary
resources such proprietary appropriation, firewall, establish products, monitor appropriation,
without encourage compliance with legal agreements the network for incorporate as a way
knowledge or licensing terms through between parties bandwidth usage, to protect individual
consent normative and legal sanctions, involved in the grid and remove contributors, transfer
incorporate as a way to devices that property rights to
protect individual contributors, overuse bandwidth nonprofit corporations
transfer property rights to trademark brands and
nonprofit corporations; logos, trademark a
trademark brands and logos, foundation; protect
trademark a foundation;, brand
protect brand
Not relevant
Contribute only
when resources
are idle
Limit the number
of receivers, limit
access to the
resource for a
certain period
Not relevant
Not relevant
Oversight
body to monitor
and periodically
analyze user
complaints
Oversight body
to monitor and
analyze user
complaints and
removes offenders
from the commons
Not relevant
Review before release
Not relevant
Vaccinate own Use “change history”
devices, avoid use function to restore
of hotspots with content. use alerts
nonstandard to monitor content
equipment, changes, block user
quarantine infected accounts, anonymous
devices, examine IP addresses, and
new access points IP ranges
Table 3. Threats and
countermeasures.
ing devices have more available bandwidth. It can be
countered by assigning an oversight body to monitor
and analyze user complaints, identify offenders, and
remove the offender from the commons [ 2]. However, this method is possible only in closed commons
where excludability is possible.
Content. As in OSS, this is not a major threat for
content assets, as a content asset is a nonrival good.
Threat 5: Damaging resources.
Contexts OSS. Damage to resources is not a significant threat in the case of OSS, as software is reviewed
and quality-controlled before it is released. Thus, the
threat associated with nonexcludability is averted.
Computing grids. This is not a significant threat,
due mainly to agreements among parties involved in
computing grids and the ability to monitor members’
behavior.
Wireless networks. As open commons are nonexcludable, this threat manifests itself in terms of someone adding a device with viruses to wireless commons
or adding a device or access point that does not comply with 802.11X standards, possibly disrupting signals [ 2]. Ways to counter this threat in open
commons include regularly vaccinating one’s devices
and avoiding the use of hotspots with nonstandard
equipment. In closed commons, one should quaran-