Journal: Communications of the ACM

Volume 42, Issue 2

5 -- 0. Editorial Pointers
9 -- 11Robert Fox. News Track
13 -- 16Larry Press. The Next Generation of Business Data Processing
17 -- 19Brock N. Meeks. The Privacy Hoax
21 -- 24Diane Crawford. Forum: More Ugly Truths about Consulting Assignments
21 -- 24Diane Crawford. Forum: More Ugly Truths about Consulting Assignments
25 -- 26Ghinwa Jalloul. Computing in Lebanon
28 -- 31Lorrie Faith Cranor. Internet Privacy - Introduction
32 -- 38Michael K. Reiter, Aviel D. Rubin. Anonymous Web Transactions with Crowds
39 -- 41David M. Goldschlag, Michael G. Reed, Paul F. Syverson. Onion Routing
42 -- 47Eran Gabber, Phillip B. Gibbons, David M. Kristol, Yossi Matias, Alain J. Mayer. Consistent, Yet Anonymous, Web Access with LPWA
48 -- 55Joseph Reagle, Lorrie Faith Cranor. The Platform for Privacy Preferences
56 -- 59Paola Benassi. TRUSTe: An Online Privacy Seal Program
60 -- 67Roger Clarke. Internet Privacy Concerns Confirm the Case for Intervention
68 -- 73J. Arthur Gowan, Chris Jesse, Richard G. Mathieu. Y2K Compliance and the Distributed Enterprise
74 -- 79Robert L. Glass. The Realities of Software Payoffs
80 -- 86Rajiv Sabherwal. The Role of Trust in Outsourced IS Development Projects
88 -- 91Wilhelm Hasselbring. On Defining Computer Science Terminology
128 -- 0Peter G. Neumann. Robust Open-Source Software