5 | -- | 0 | . Editorial Pointers |
9 | -- | 11 | Robert Fox. News Track |
13 | -- | 16 | Larry Press. The Next Generation of Business Data Processing |
17 | -- | 19 | Brock N. Meeks. The Privacy Hoax |
21 | -- | 24 | Diane Crawford. Forum: More Ugly Truths about Consulting Assignments |
21 | -- | 24 | Diane Crawford. Forum: More Ugly Truths about Consulting Assignments |
25 | -- | 26 | Ghinwa Jalloul. Computing in Lebanon |
28 | -- | 31 | Lorrie Faith Cranor. Internet Privacy - Introduction |
32 | -- | 38 | Michael K. Reiter, Aviel D. Rubin. Anonymous Web Transactions with Crowds |
39 | -- | 41 | David M. Goldschlag, Michael G. Reed, Paul F. Syverson. Onion Routing |
42 | -- | 47 | Eran Gabber, Phillip B. Gibbons, David M. Kristol, Yossi Matias, Alain J. Mayer. Consistent, Yet Anonymous, Web Access with LPWA |
48 | -- | 55 | Joseph Reagle, Lorrie Faith Cranor. The Platform for Privacy Preferences |
56 | -- | 59 | Paola Benassi. TRUSTe: An Online Privacy Seal Program |
60 | -- | 67 | Roger Clarke. Internet Privacy Concerns Confirm the Case for Intervention |
68 | -- | 73 | J. Arthur Gowan, Chris Jesse, Richard G. Mathieu. Y2K Compliance and the Distributed Enterprise |
74 | -- | 79 | Robert L. Glass. The Realities of Software Payoffs |
80 | -- | 86 | Rajiv Sabherwal. The Role of Trust in Outsourced IS Development Projects |
88 | -- | 91 | Wilhelm Hasselbring. On Defining Computer Science Terminology |
128 | -- | 0 | Peter G. Neumann. Robust Open-Source Software |