Journal: Communications of the ACM

Volume 49, Issue 6

5 -- 0Diane Crawford. Editorial pointers
9 -- 10. News track
11 -- 13Diane Crawford. Forum
15 -- 18David A. Patterson. Farewell address: the growing and graying of ACM
19 -- 22Phillip G. Armour. The learning edge
23 -- 24Ronald F. Boisvert, Mary Jane Irwin. Plagiarism on the rise
25 -- 26Diane Crawford. Top 10 downloads from ACM s digital library
27 -- 31Pamela Samuelson. Copyrighting standards
32 -- 36Gregory J. Conti. Introduction
37 -- 40Tom Cross. Academic freedom and the hacker ethic
41 -- 43Stephen Bono, Aviel D. Rubin, Adam Stubblefield, Matthew Green. Security through legality
44 -- 49Joe Grand. Research lessons from hardware hacking
50 -- 56Bruce Potter. Wireless hotspots: petri dish of wireless security
57 -- 61Felix F. X. Lindner. Software security is software reliability
62 -- 69Dan Kaminsky. Explorations in namespace: white-hat hacking across the domain name system
70 -- 76Kallol Kumar Bagchi, Peeter Kirs, Robert Cerveny. Global software piracy: can economic factors alone explain the trend?
77 -- 83Christopher L. Carr. Reciprocity: the golden rule of IS-user service relationship quality and cooperation
84 -- 90Timothy Paul Cronan, C. Bryan Foltz, Thomas W. Jones. Piracy, computer crime, and IS misuse at the university
91 -- 96David Kang, Roger Chiang. A systematic approach in managing post-deployment system changes
97 -- 101Bonnie Brinton Anderson, James V. Hansen, Paul Benjamin Lowry, Scott L. Summers. The application of model checking for securing e-commerce transactions
102 -- 106Barry Shore. Enterprise integration across the globally disbursed service organization
107 -- 109Thomas W. Jackson, Anthony Burgess, Janet Edwards. A simple approach to improving email communication
120 -- 0Robert N. Charette. EHRs: Electronic Health Records or Exceptional Hidden Risks?