5 | -- | 0 | Diane Crawford. Editorial pointers |
9 | -- | 10 | Robert Fox. News track |
11 | -- | 14 | Diane Crawford. Forum |
15 | -- | 20 | Hal Berghel, Kim Womack. Anonymizing the net |
21 | -- | 22 | Jeff Grove. Legal and technological efforts to lock up content threaten innovation |
23 | -- | 26 | Meg McGinity. Getting real |
27 | -- | 29 | Ramesh Jain. Folk computing |
30 | -- | 33 | Deirdre K. Mulligan. Introduction |
34 | -- | 39 | John S. Erickson. Fair use, DRM, and trusted computing |
41 | -- | 45 | Pamela Samuelson. DRM {and, or, vs.} the law |
46 | -- | 49 | Julie E. Cohen. DRM and privacy |
51 | -- | 55 | Séverine Dusollier. Fair use by design in the European copyright directive of 2001 |
56 | -- | 59 | Edward W. Felten. A skeptical view of DRM and fair use |
61 | -- | 63 | Barbara Fox, Brian A. LaMacchia. Encouraging recognition of fair uses in DRM systems |
64 | -- | 70 | Brian Fitzgerald, Nancy L. Russo, Tom O Kane. Software development method tailoring at Motorola |
71 | -- | 75 | François Pachet. Content management for electronic music distribution |
76 | -- | 80 | Susan A. Brown, Viswanath Venkatesh. Bringing non-adopters along: the challenge facing the PC industry |
81 | -- | 83 | Julia Brande Earp, David L. Baumer. Innovative web use to learn about consumer behavior and online privacy |
84 | -- | 89 | Ali F. Farhoomand, Pauline S. P. Ng, William Conley. Building a successful e-business: the FedEx story |
91 | -- | 94 | Keng Siau, Zixing Shen. Building customer trust in mobile commerce |
95 | -- | 99 | Shan Ling Pan, Jae-Nam Lee. Using e-CRM for a unified view of the customer |
100 | -- | 102 | Peter Wegner, Dina Q. Goldin. Computation beyond turing machines |
120 | -- | 0 | Andrew K. Wright. On Sapphire and type-safe languages |