5 | -- | 0 | Diane Crawford. Editorial pointers |
11 | -- | 13 | Diane Crawford. Forum |
15 | -- | 18 | Rebecca Mercuri. Analyzing security costs |
19 | -- | 23 | Pamela Samuelson. Trade secrets vs. free speech |
24 | -- | 25 | Tom DeMarco. The McCarthy protocols |
26 | -- | 28 | Thomas F. Stafford. Introduction |
29 | -- | 34 | Heather Kreger. Fulfilling the Web services promise |
31 | -- | 0 | Christopher Ferris, Joel A. Farrell. What are Web services? |
36 | -- | 42 | Roland T. Rust, P. K. Kannan. E-service: a new paradigm for business in the electronic environment |
43 | -- | 44 | Ruth N. Bolton. Marketing challenges of e-services |
45 | -- | 46 | Hongjun Song. E-services at FedEx |
47 | -- | 51 | M. Kathryn Brohman, Richard T. Watson, Gabriele Piccoli, A. Parasuraman. Data completeness: a key to effective net-based customer service systems |
56 | -- | 57 | Neal G. Shaw, Christopher W. Craighead. Technology enablers to recover from failures in e-services |
58 | -- | 63 | Joseph Williams. The Web services debate: J2EE vs. .NET |
64 | -- | 67 | Gerry Miller. The Web services debate: .NET vs. J2EE |
69 | -- | 73 | Walid Ben-Ameur, Hervé Kerivin. Networks new economical virtual private |
75 | -- | 78 | Huaiqing Wang, Chen Wang. Taxonomy of security considerations and software quality |
79 | -- | 84 | E. Vance Wilson. Asynchronous health care communication |
85 | -- | 88 | Kevin C. Desouza. Facilitating tacit knowledge exchange |
89 | -- | 91 | Fay Cobb Payton. Rethinking the digital divide |
93 | -- | 97 | Peter E. Hart, Ziming Liu. Trust in the preservation of digital information |
98 | -- | 100 | James Backhouse, Carol Hsu, Aidan McDonnell. Toward public-key infrastructure interoperability |
112 | -- | 0 | Diomidis Spinellis. Reflections on trusting trust revisited |