Journal: Communications of the ACM

Volume 44, Issue 2

5 -- 0Diane Crawford. Editorial Pointers
9 -- 10Robert Fox. News Track
11 -- 13Diane Crawford. Forum
15 -- 19Peter J. Denning. Who Are We?
21 -- 23Meg McGinity. Name is the Game
25 -- 27Steven Bellman, Eric J. Johnson, Gerald L. Lohse. To Opt-In or Opt-Out? It Depends on the Question
28 -- 20Imran Bashir, Enrico Serafini, Kevin Wall. Securing network software applications: introduction
31 -- 36John Viega, Tadayoshi Kohno, Bruce Potter. Trust (and mistrust) in secure applications
38 -- 44James Joshi, Walid G. Aref, Arif Ghafoor, Eugene H. Spafford. Security models for web-based applications
45 -- 50David M. Martin Jr., Richard M. Smith, Michael Brittain, Ivan Fetch, Hailin Wu. The privacy practices of web browser extensions
51 -- 57Anup K. Ghosh, Tara M. Swaminatha. Software security and privacy risks in mobile e-commerce
58 -- 64Chris I. Dalton, Tse Huong Choo. An operating system approach to securing e-services
66 -- 68Pamela Samuelson. Intellectual property for an information age: introduction
69 -- 75Dan L. Burk. Copyrightable functions and patentable speech
77 -- 83Randall Davis. The digital dilemma
84 -- 90Yochai Benkler. The battle over the institutional ecosystem in the digital environment
91 -- 97A. Michael Froomkin. The collision of trademarks, domain names, and due process in cyberspace
98 -- 103Maureen A. O Rourke. Is virtual trespass an apt analogy?
136 -- 0Peter G. Neumann. What to know about risks