


default search action
Communications of the ACM (CACM), Volume 44, 2001
Volume 44, Number 1, January 2001
- Diane Crawford:
Editorial Pointers. 5 - Robert Fox:
News Track. 9
- Robert L. Glass:
An embarrassing, yet rewarding, ending to a previous column. 11-13
- Phillip G. Armour:
The laws of software process. 1517
- Leonard N. Foner:
Fixing a flawed domain name system. 19-21
- Åke Grönlund:
Democracy in an IT-framed society: introduction. 22-26 - Richard T. Watson, Bryan Mundy:
A strategic perspective of electronic democracy. 27-30 - Ari-Veikko Anttiroiko
:
Toward the European information society. 3135 - Per-Olof Ågren:
Is online democracy in the EU for professionals only? 36-38 - Ted Becker:
Rating the impact of new technologies on democracy. 39-43 - Ignace Snellen:
ICTs, bureaucracies, and the future of democracy. 45-48 - Joachim Åström:
Should democracy online be quick, strong, or thin? 49-51 - Doug Schuler:
Computer professionals and the next culture of democracy. 52-57 - John A. Taylor, Eleanor Burt:
Not-for-profits in the democratic polity. 58-62 - Todd M. La Porte, Chris C. Demchak, Christian Friis:
Webbing governance: global trends across national-level public agencies. 63-67
- Lance J. Hoffman, Lorrie Faith Cranor
:
Internet voting for public officials: introduction. 69-71 - Joe Mohen, Julia Glidden:
The case for internet voting. 72-85 - Deborah M. Phillips, Hans A. von Spakovsky:
Gauging the risks of internet elections. 73-85
- Gordon Bell:
A personal digital store. 86-91 - Thomas M. Chen
:
Increasing the observability of Internet behavior. 93-98 - Abhijit Chaudhury, Debasish Mallick, H. Raghav Rao:
Web channels in e-commerce. 99-104
- Simon N. Foley
, Robert Dumigan:
Are handheld viruses a significant threat? 105-107
- Rebecca Mercuri, Peter G. Neumann:
System integrity revisited. 160
Volume 44, Number 2, February 2001
- Diane Crawford:
Editorial Pointers. 5 - Robert Fox:
News Track. 9-10 - Diane Crawford:
Forum. 11-13
- Peter J. Denning:
Who Are We? 15-19
- Meg McGinity:
Name is the Game. 21-23
- Steven Bellman
, Eric J. Johnson
, Gerald L. Lohse:
To Opt-In or Opt-Out? It Depends on the Question. 25-27
- Imran Bashir, Enrico Serafini, Kevin Wall:
Securing network software applications: introduction. 28-20 - John Viega, Tadayoshi Kohno, Bruce Potter:
Trust (and mistrust) in secure applications. 31-36 - James Joshi, Walid G. Aref, Arif Ghafoor, Eugene H. Spafford
:
Security models for web-based applications. 38-44 - David M. Martin Jr., Richard M. Smith, Michael Brittain, Ivan Fetch, Hailin Wu:
The privacy practices of web browser extensions. 45-50 - Anup K. Ghosh, Tara M. Swaminatha:
Software security and privacy risks in mobile e-commerce. 51-57 - Chris I. Dalton, Tse Huong Choo:
An operating system approach to securing e-services. 58-64
- Pamela Samuelson:
Intellectual property for an information age: introduction. 66-68 - Dan L. Burk
:
Copyrightable functions and patentable speech. 69-75 - Randall Davis:
The digital dilemma. 77-83 - Yochai Benkler:
The battle over the institutional ecosystem in the digital environment. 84-90 - A. Michael Froomkin:
The collision of trademarks, domain names, and due process in cyberspace. 91-97 - Maureen A. O'Rourke
:
Is virtual trespass an apt analogy? 98-103
- Peter G. Neumann:
What to know about risks. 136
Volume 44, Number 3, March 2001
- Diane Crawford:
Editorial Pointers. 5 - Robert Fox:
News track. 9-10
- Phillip G. Armour:
Software as Currency. 13-14
- Hal Berghel:
A cyberpublishing manifesto. 17-20
- Gordon Bell, Jim Gray:
Digital immortality. 28-31 - Rita R. Colwell:
Closing the circle of information technology. 31-32 - Norman I. Badler:
Virtual beings. 33-35 - Donald A. Norman:
Cyborgs. 36-37 - Ramesh C. Jain:
Digital experience. 38-40 - Joseph Jacobson
:
The desktop fab. 41-43 - Dan Bricklin:
Look to the past to envision the future. 44 - Ted Selker:
Affecting humanity. 45 - Leon A. Kappelman:
The future is ours. 46-47 - V. Michael Bove Jr.:
Astronauts and mosquitoes. 48-49 - Andries van Dam:
User interfaces: disappearing, dissolving, and evolving. 50-52 - Eric A. Brewer
:
When everything is searchable. 53-55 - Martin Cooper:
Bandwidth and the creation of awareness. 55-57 - Thomas A. Horan:
The paradox of place. 58-59 - Ronald J. Vetter:
The wireless web. 60-61 - Usama M. Fayyad:
The digital physics of data mining. 62-65 - Jennifer C. Lai:
When computers speak, hear, and understand. 66-67 - Jim Waldo:
When the network is everything. 68-69 - Steven J. Schwartz:
Wearables in 2048. 70-71 - Cameron Miner:
Pushing functionality into even smaller devices. 72-73 - Christopher R. Johnson:
Computational bioimaging for medical diagnosis and treatment. 74-76 - Jacques Cohen:
Computers and biology. 76-77 - Thomas L. Sterling:
Continuum computer architecture for exaflops computation. 78-80 - Jon Crowcroft:
Never lost, never forgotten. 81 - Michael J. Muller, Ellen Christiansen, Bonnie A. Nardi, Susan M. Dray:
Spiritual life and information technology. 82-83 - Whitfield Diffie:
Ultimate cryptography. 84-86
- Raymond Kurzweil:
Promise and peril-the deeply intertwined poles of 21st century technology. 88-91 - Edsger W. Dijkstra:
The end of computing science? 92 - Hal R. Varian:
The computer-mediated economy. 93 - Robert X. Cringely:
Be absolute for death: life after Moore's law. 94 - Brock N. Meeks:
Accountability through transparency;: life in 2050. 96-97 - Pamela Samuelson:
Toward a new politics of intellectual property. 98-99 - Dennis Tsichritzis:
Forget the past to win the future. 100-101 - Andrew Grosso:
The demise of sovereignty. 102-103 - Anthony M. Townsend, James T. Bennett:
Electronic empire. 104-106 - Ari Schwartz:
A larger role in the public policy process for user control. 106-107 - Karen Holtzblatt:
Inventing the future. 108-110 - Richard M. Stallman:
Can freedom withstand e-books? 111 - Peter J. Denning:
Many zeros ahead. 112-113 - Bruce Schneier:
Insurance and the computer industry. 114-115
- Kilnam Chon:
The future of the internet digital divide. 116-117 - Grady Booch:
Developing the future. 118-121 - Henry Lieberman, Christopher Fry:
Will software ever work? 122-124 - Ann Winblad, Mark Gorenberg:
A just-in-time software-based world. 125 - Larry L. Constantine:
Back to the future. 126-129 - Cherri M. Pancake:
The ubiquitous beauty of user-aware software. 130 - Steven M. Bellovin:
Computer security - an end state? 131-132 - Doug Riecken:
A commonsense opportunity for computing. 132-133 - Ravi Ganesan:
Keep (over)reaching for the stars. 134-135
- John Glenn:
Education is the key to future dreams. 136-138 - Anita Borg:
Universal literacy - a challenge for computing in the 21st Century. 139-141 - Roger C. Schank:
The computer isn't the medium, it's the message. 142-143 - Mitchel Resnick:
Closing the fluency gap. 144-145
- Peter G. Neumann, David Lorge Parnas:
Computers: boon or bane? 168
Volume 44, Number 4, April 2001
- Diane Crawford:
Editorial Pointers. 5 - Robert Fox:
News Track. 9-10 - Diane Crawford:
Forum: Participatory Vs. Representative Democracy. 13-15
- Robert L. Glass:
Practical programmer: academics, and the scarlet letter "A". 17-18
- Peter J. Denning:
Crossing the Chasm. 21-25
- David L. Lanning:
On bias, science, equal protection, and liability. 27-29
- Sahin Albayrak:
Agent-oriented technology for telecommunications: introduction. 30-33 - Nicholas R. Jennings
:
An agent-based approach for building complex software systems. 35-41 - Stefan Fricke, Karsten Bsufka, Jan Keiser, Torge Schmidt, Ralf Sesseler, Sahin Albayrak:
Agent-based telematic services and telecom applications. 43-48 - Munindar P. Singh
, Bin Yu, Mahadevan Venkatraman:
Community-based service location. 49-54 - Marcus Brunner, Bernhard Plattner, Rolf Stadler:
Service creation and management in active telecom networks. 55-61 - Francisco Valera
, Jorge E. López de Vergara
, José Ignacio Moreno
, Víctor A. Villagrá
, Julio Berrocal:
Communication management experiences in e-commerce. 63-69 - Mike P. Papazoglou
:
Agent-oriented technology in support of e-business. 71-77
- Varun Grover
, James T. C. Teng:
E-commerce and the information market. 79-86 - Mark Keil, Daniel Robey:
Blowing the whistle on troubled software projects. 87-93 - Tanya L. Cheyne, Frank E. Ritter:
Targeting audiences on the internet. 94-98 - Gerti Kappel, Stefan Rausch-Schott, Werner Retschitzegger, Markku Sakkinen:
Bottom-up design of active object-oriented databases. 99-104
- Robert P. Ward, Mohamed Fayad, Mauri Laitinen:
Software process improvement in the small. 105-107
- Bruce Schneier:
Cyber underwriters lab. 128
Volume 44, Number 5, May 2001
- Diane Crawford:
Editorial Pointers. 5 - Robert Fox:
News Track. 9-10 - Diane Crawford:
Forum: Evolving commitment to the profession of computer science. 11-12
- Neil Munro:
The unhappy but beneficial coexistence of the FBI and the tech elite. 15-18
- Hal Berghel:
Caustic Cookies. 19-22
- Alan Howard:
Software engineering project management. 23-24
- Krzysztof R. Apt:
Viewpoint: One more revolution to make: free scientific publishing. 25-28
- Edward A. Fox
, Gary Marchionini:
Digital libraries: Introduction. 30-32 - Gregory R. Crane, Robert F. Chavez, Anne Mahoney, Thomas L. Milbank, Jeffrey A. Rydberg-Cox, David A. Smith, Clifford E. Wulfman
:
Drudgery and deep thought. 34-40 - Craig G. Nevill-Manning:
The biological digital library. 41-42 - Alan S. Inouye:
A digital strategy for the library of congress. 43 - Paul Jones:
Open (source)ing the doors for contributor-run digital libraries. 45-46 - Ian H. Witten, David Bainbridge, Stefan J. Boddie:
Greenstone: Open-source DL software. 47 - Alexa T. McCray, Marie E. Gallagher:
Principles for digital library development. 48-54 - Catherine C. Marshall, Gene Golovchinsky
, Morgan N. Price:
Digital libraries and mobility. 55-56 - Michael S. Brown, W. Brent Seales, Stephen B. Webb, Christopher O. Jaynes:
Building large-format displays for digital libraries. 57-59 - Michael L. Nelson
, Kurt Maly:
Buckets: smart objects for digital libraries. 60-62 - Henry M. Gladney, Arthur Cantu:
Authorization management for digital libraries. 63-65 - Christine L. Borgman
:
Where is the librarian in the digital library? 66-68 - William Y. Arms:
Uniform resource names: handles, PURLs, and digital object identifiers. 68 - Helen R. Tibbo:
Archival perspectives on the emerging digital library. 69-70 - Erik Duval, Eddy Forte, Kris Cardinaels, Bart Verhoeven, Rafaël Van Durm, Koen Hendrikx, Maria Wentland Forte, Norbert Ebel, Maciej Macowicz, Ken Warkentyne, Florence Haenni:
The Ariadne knowledge pool system. 72-78 - David McArthur, Sarah Giersch, Bill Graves, Charles R. Ward, Richard Dillaman, Russell L. Herman
, Gabriel G. Lugo, James H. Reeves, Ronald J. Vetter, Deborah Knox, G. Scott Owen:
Toward a sharable digital library of reusable teaching resources. 79 - Mary Marlino, Tamara Sumner, David Fulker, Cathryn Manduca, David Mogk:
The digital library for earth system education: building community, building the library. 80-81 - Ian H. Witten
, Michel Loots, Maria F. Trujillo, David Bainbridge
:
The promise of digital libraries in developing countries. 82-85 - Lee L. Zia:
The NSF national science, mathematics, engineering, and technology education digital library program. 83 - Mark D. Apperley, Sally Jo Cunningham, Te Taka Keegan, Ian H. Witten
:
NIUPEPA: a historical newspaper collection. 86-87 - Shalini R. Urs
, K. S. Raghavan:
Vidyanidhi: Indian digital library of electronic theses. 88-89 - Bernard Rous
:
The ACM digital library. 90-91
- Greg Baster, Prabhudev Konana, Judy E. Scott:
Business components: a case study of bankers trust Australia limited. 92-98 - Mark Astley, Daniel C. Sturman, Gul Agha:
Customizable middleware for modular distributed software. 99-107 - Joanne McGrath Cohoon:
Toward improving female retention in the computer science major. 108-114
- Lauren Weinstein:
Be seeing you! 128
Volume 44, Number 6, June 2001
- Diane Crawford:
Editorial Pointers. 5 - Robert Fox:
News track. 9-10 - Diane Crawford:
Forum. 11-14
- Elliot Soloway, Cathleen A. Norris, Phyllis Blumenfeld, Barry Fishman, Joseph Krajcik, Ronald Marx:
Log on education: Handheld devices are ready-at-hand. 15-20
- Seymour E. Goodman, James B. Gottstein, Diane S. Goodman:
Wiring the wilderness in Alaska and the Yukon. 21-26
- Paul De Palma:
Why women avoid computer science. 27-30
- Rajiv M. Dewan, Abraham Seidmann:
Current issues in e-banking: introduction. 31-32 - Kemal Saatcioglu, Jan Stallaert, Andrew B. Whinston:
Design of a financial portal. 33-38 - Yoram (Jerry) Wind:
The challenge of "customerization" in financial services. 39-44 - Kemal Altinkemer:
Bundling e-banking services. 45-47 - Niv Ahituv:
The open information society. 48-52 - Christopher P. Holland, John B. Westwood:
Product-market and technology strategies in banking. 53-57
- Kuldeep Kumar:
Technology for supporting supply chain management: introduction. 58-61 - Steve John Simon:
The art of military logistics. 62-66 - Bill Welty, Irma Becerra-Fernandez:
Managing trust and commitment in collaborative supply chain relationships. 67-73 - Rob A. Zuidwijk, Jo van Nunen, Diana van Eijk, Jos van Hillegersberg:
Supporting return flows in the supply chain. 74-79 - Girish Ramachandran, Sanjay Tiwari:
Challenges in the air cargo supply chain. 80-82 - R. Krishnan:
Technology in the Indian retail supply chain. 83-87
- David Schuff, Robert D. St. Louis:
Centralization vs. decentralization of application software. 88-94 - Gary Klein, James J. Jiang, Marion G. Sobol:
A new view of IS personnel performance evaluation. 95-102 - Terry Shepard, Margaret Anne Lamb, Diane Kelly:
More testing should be taught. 103-108
- Michael McCormick:
Programming extremism. 109-119
- Richard Forno, William Feinbloom:
PKI: a question of trust and value. 120
Volume 44, Number 7, July 2001
- Diane Crawford:
Editorial pointers. 5 - Robert Fox:
News track. 9-10 - Diane Crawford:
Forum. 11-13 - John White:
ACM Opens portal. 14-16, 28 - Diane Crawford:
ACM general elections. 54
- Andrew Grosso:
The individual in the new age. 17-20
- Phillip G. Armour:
Matching process to types of teams. 21-23
- Quentin Stafford-Fraser:
The life and times of the first Web Cam. 25-26
- Scott Hazelhurst
:
Viewpoint: Developing IT skills internationally: who's developing whom?. 27-28
- David Arnold, Fred Niederman:
The global IT work force: Introduction. 30-33 - Lawrence A. West, Walter A. Bogumil:
Immigration and the global IT work force. 34-38 - Phalguni Gupta:
Growth scenario of IT industries in India. 40-41 - Keith Mander:
The decline and fall of the American programmer. 43-44 - Liisa von Hellens, Sue H. Nielsen:
Australian women in IT0. 46-52 - Philip J. Sallis:
Some thoughts on IT employment in New Zealand. 53-54 - Linda Marshall
:
A perspective on the IT industry in South Africa. 55 - Ritu Agarwal, Thomas W. Ferratt:
Crafting an HR strategy to meet the need for IT workers. 58-64 - Kam-Fai Wong
:
Labor shortfall in Hong Kong's IT industry. 65-66 - Maria M. Klawe:
Refreshing the nerds. 67-68 - Jo Ellen Moore, Susan E. Yager, Mary Sumner, Galen B. Crow:
Facilitating career changes into IT. 70-73 - Eileen M. Trauth:
Mapping information-sector work to the work force. 74-75 - Wang Shan:
The IT work force in China. 76 - Vladimir V. Anishchenko:
The IT staffing situation in Belarus. 77-78
- Steve Benford
, Chris Greenhalgh
, Tom Rodden, James Pycock:
Collaborative virtual environments. 79-85 - Karim K. Hirji:
Exploring data mining implementation. 87-93 - Vincent S. Lai:
Intraorganizational communication with intranets. 95-100
- James J. Horning:
Learning from experience. 112
Volume 44, Number 8, August 2001
- Diane Crawford:
Editorial pointers. 5 - Robert Fox:
News track. 9-10 - Diane Crawford:
Forum. 11-13
- Hal Berghel:
The Y2K e-commerce tumble. 15-17
- Peter J. Denning:
The IT schools movement. 19-22
- David S. Touretzky
:
Free speech rights for programmers. 23-25 - Eric M. Freedman:
Viewpoint: Pondering pixelized pixies. 27-29
- Nahum D. Gershon, Ward Page:
What storytelling can do for information visualization. 31-37 - Daniel A. Keim:
Visual exploration of large data sets. 38-44 - Stephen G. Eick:
Visualizing online activity. 45-50 - Fred Mintzer, Gordon W. Braudaway, Francis P. Giordano, Jack C. Lee, Karen A. Magerlein, Silvana D'Auria, Amnon Ribak, Gil Shapir, Fabio Schiattarella, John Tolva, Andrey Zelenkov:
Populating the Hermitage Museum's new web site. 52-60 - Calvin K. M. Lam, Bernard C. Y. Tan:
The Internet is changing the music industry. 62-68 - Henry Lieberman, Christopher Fry, Louis Weitzman:
Exploring the Web with reconnaissance agents. 69-75 - Nong Ye, Joseph Giordano, John Feldman:
A process control approach to cyber attack detection. 76-82 - John Benamati, Albert L. Lederer:
Coping with rapid changes in IT. 83-88
- Albert Levi
, Çetin Kaya Koç
:
Risks in email security. 112
Volume 44, Number 9, September 2001
- Diane Crawford:
Editorial pointers. 5 - Robert Fox:
News track. 9-10 - Diane Crawford:
Forum. 11
- Robert L. Glass:
Of Model Changeovers, Style, and Fatware. 17-18
- Meg McGinity:
Siut Yourselt. Commun. ACM 44(9): 21-23 (2001)
- Jane C. Ginsburg:
What to Know Before Reissuing Old Titles as E-Books. 25-27
- Nikolaos A. Mylonopoulos
, Vasilis Theoharakis:
Global Perception of IS Journals. 29-33
- Vinton G. Cerf:
Beyond the Post-PC Internet. 34-37 - Adrian Hooke:
The interplanetary Internet. 38-40 - Leonard Kleinrock:
Breaking loose. 41-45 - José A. Corrales:
An Asturian view of networking 2015. 47-54 - Lada A. Adamic, Bernardo A. Huberman:
The Web's hidden order. 55-59 - Mark Weiser:
Whatever happened to the next-generation Internet? 61-68
- Lawrence A. Gordon, Martin P. Loeb:
Using information security as a response to competitor analysis systems. 70-75 - Alvin T. S. Chan, Jiannong Cao, Henry C. B. Chan
, Gilbert H. Young:
A web-enabled framework for smart card applications in health services. 76-82 - Glenn B. Bell, Anil Sethi:
Matching records in a national medical patient index. 83-88 - Terry L. Huston:
Security issues for implementation of e-medical records. 89-94
- Mohamed E. Fayad, Adam Altman:
An Introduction to Software Stability. 95-98
Volume 44, Number 10, October 2001
- Diane Crawford:
Editorial Pointers. 5 - Robert Fox:
News Track. 9-10 - Diane Crawford:
Forum. 11-12
- Phillip G. Armour:
Zeppelins and jet planes: a metaphor for modern software projects. 13-15
- Neil Munro:
Considering the broadband debate. 17-19
- Keith Devlin:
The real reason why software engineers need math. 21-22 - Barbara Simons:
The ACM declaration in Felten v. RIAA. 23-26
- Tzilla Elrad, Robert E. Filman, Atef Bader:
Aspect-oriented programming - introduction. 29-32 - Tzilla Elrad, Mehmet Aksit, Gregor Kiczales, Karl J. Lieberherr, Harold Ossher:
Discussing aspects of AOP. 33-38 - Karl J. Lieberherr, Doug Orleans, Johan Ovlinger:
Aspect-oriented programming with adaptive methods. 39-41 - Harold Ossher, Peri L. Tarr:
Using multidimensional separation of concerns to (re)shape evolving software. 43-50 - Lodewijk Bergmans, Mehmet Aksit:
Composing crosscutting concerns using composition filters. 51-57 - Gregor Kiczales, Erik Hilsdale, Jim Hugunin, Mik Kersten, Jeffrey Palm, William G. Griswold
:
Getting started with ASPECTJ. 59-65 - J. Andrés Díaz Pace, Marcelo R. Campo
:
Analyzing the role of aspects in software design. 66-73 - Gail C. Murphy, Robert J. Walker
, Elisa L. A. Baniassad, Martin P. Robillard, Albert Lai, Mik Kersten:
Does aspect-oriented programming work? 75-77 - Yvonne Coady, Gregor Kiczales, Michael J. Feeley, Norman C. Hutchinson, Joon Suan Ong:
Structuring operating system aspects. 79-82 - Paniti Netinant
, Tzilla Elrad, Mohamed Fayad:
A layered approach to building open aspect-oriented systems. 83-85 - Jeff Gray
, Ted Bapty, Sandeep Neema
, James Tuck
:
Handling crosscutting constraints in domain-specific modeling. 87-93 - Gregory T. Sullivan:
Aspect-oriented programming using reflection and metaobject protocols. 95-97
- Cherri M. Pancake, Christian Lengauer:
High-performance Java - introduction. 98-101 - José E. Moreira, Samuel P. Midkiff
, Manish Gupta, Pedro V. Artigas, Peng Wu, George Almási:
The NINJA project. 102-109 - Thilo Kielmann, Philip J. Hatcher, Luc Bougé, Henri E. Bal:
Enabling Java for high-performance computing. 110-117 - Vladimir Getov, Gregor von Laszewski
, Michael Philippsen
, Ian T. Foster
:
Multiparadigm communications in Java for grid computing. 118-125
- Henry F. Ledgard:
The emperor with no clothes. 126-128 - Ralph Westfall:
Hello, World considered harmful. 129-130
- Stephan Somogyi, Bruce Schneier:
The perils of port 80. 168
Volume 44, Number 11, November 2001
- Diane Crawford:
Editorial Pointers. 5 - Robert Fox:
News Track. 9-10 - Diane Crawford:
Forum. 11-15
- Brock N. Meeks:
Blanking on Rebellion: Where the Future is "Nabster". 17-20
- Peter J. Denning, Robert Dunham:
The Core of the Third-Wave Professional. 21-25
- Francine Berman:
From TeraGrid to Knowledge Grid. 27-28
- Albert Huang:
Innovative Use of Email for Teaching. 29-32
- Brad A. Myers:
Using handhelds and PCs together. 34-41 - Ravi Bapna, Paulo B. Góes, Alok Gupta
:
Insights and Analyses of Online Auctions. 42-50 - Michael Ettredge, Vernon J. Richardson, Susan Scholz:
A Web Site Design Model for Financial Information. 51-56 - Alina M. Chircu, Robert J. Kauffman, Doug Keskey:
Maximizing the Value of Internet-based Corporate Travel Reservation Systems. 57-63 - John Gray:
The End of Career. 65-69 - John Backus:
Funding the Computing Revolution's Third Wave. 70-76 - Nicholas Carriero, David Gelernter:
A Computational Model of Everything. 77-81 - Mark Burgin:
How We Know What Technology Can Do. 82-88 - Henry C. Lucas Jr.:
Information Technology and Physical Space. 89-96 - Steve Sawyer:
A market-based perspective on information systems development. 97-102 - Lauren Weinstein, Peter G. Neumann:
Inside Risks: Risks of Panic. 152
Volume 44, Number 12, December 2001
- Diane Crawford:
Editorial Pointers. 5 - Robert Fox:
News Track. 9-10 - Diane Crawford:
Forum. 11-13
- Hal Berghel:
The Code Red Worm. 15-19
- Roger C. Schank:
Revolutionizing the Traditional Classroom Course. 21-24
- Ka-Ping Yee:
Operating an Emergency Information Service. 25-28 - Jon M. Peha:
The Growing Debate Over Science and Technology Advice for Congress. 29-31
- Vir V. Phoha
:
The DMCA Needs Fixing. 33-34
- Zakaria Maamar, Eric Dorion, Catherine Daigle:
Toward Virtual Marketplaces for E-Commerce Support. 35-38
- James M. Ragusa, Grace M. Bochenek:
Collaborative Virtual Design Environments: Introduction. 40-43 - Randall C. Smith:
Shared Vision. 45-48 - R. Bowen Loftin:
Design Engineering in Virtual Environments. 49-50 - Mark T. Maybury:
Collaborative Virtual Environments for Analysis and Decision Support. 51-54 - Mark T. Maybury, Raymond J. D'Amore, David House:
Expert Finding for Collaborative Virtual Environments. 55-56 - Simon Su, R. Bowen Loftin:
A Shared Virtual Environment for Exploring and Designing Molecules. 57-58 - Imre Horváth, Zoltán Rusák
:
Collaborative Shape Conceptualization in Virtual Design Environments. 59-63 - Cristian Luciano, Pat P. Banerjee, Sanjay Mehrotra:
3D Animation of Telecollaborative Anthropomorphic Avatars. 64-67
- Robert M. Davison
, Gert-Jan de Vreede:
Global Applications of Collaborative Technology: Introduction. 68-70 - Line Dubé, Guy Paré:
Global Virtual Teams. 71-73 - Sue Newell, Shan Ling Pan
, Robert D. Galliers, Jimmy C. Huang:
The Myth of the Boundaryless Organization. 74-76 - Séamas Kelly, Matthew Jones:
Groupware and the Social Infrastructure of Communication. 77-79 - Gerardine DeSanctis, Matthew Wright, Lu Jiang:
Building A Global Learning Community. 80-82 - Anne P. Massey, Mitzi M. Montoya-Weiss, Yu-Ting Caisy Hung, Venkataraman Ramesh:
Cultural Perceptions of Task-Technology Fit. 83-84 - Sajda Qureshi
, Ilze Zigurs:
Paradoxes and Prerogatives in Global Virtual Collaboration. 85-88 - J. Roberto Evaristo:
Nonconsensual Negotiation in Distributed Collaboration. 89
- Ram D. Gopal
, Zhiping D. Walter, Arvind K. Tripathi:
Admediation: New Horizons in Effective Email Advertising. 91-96 - Eric J. Glover, Steve Lawrence, Michael D. Gordon, William P. Birmingham, C. Lee Giles
:
Web Search - Your Way. 97-102 - J. Leon Zhao, Vincent H. Resh:
Internet Publishing and Transformation of Knowledge Processes. 103-109
- Peter G. Neumann, Lauren Weinstein:
Risks of National Identity Cards. 176

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.