5 | -- | 0 | Diane Crawford. Editorial pointers |
9 | -- | 10 | . News track |
11 | -- | 13 | Diane Crawford. Forum |
15 | -- | 18 | David A. Patterson. Farewell address: the growing and graying of ACM |
19 | -- | 22 | Phillip G. Armour. The learning edge |
23 | -- | 24 | Ronald F. Boisvert, Mary Jane Irwin. Plagiarism on the rise |
25 | -- | 26 | Diane Crawford. Top 10 downloads from ACM s digital library |
27 | -- | 31 | Pamela Samuelson. Copyrighting standards |
32 | -- | 36 | Gregory J. Conti. Introduction |
37 | -- | 40 | Tom Cross. Academic freedom and the hacker ethic |
41 | -- | 43 | Stephen Bono, Aviel D. Rubin, Adam Stubblefield, Matthew Green. Security through legality |
44 | -- | 49 | Joe Grand. Research lessons from hardware hacking |
50 | -- | 56 | Bruce Potter. Wireless hotspots: petri dish of wireless security |
57 | -- | 61 | Felix F. X. Lindner. Software security is software reliability |
62 | -- | 69 | Dan Kaminsky. Explorations in namespace: white-hat hacking across the domain name system |
70 | -- | 76 | Kallol Kumar Bagchi, Peeter Kirs, Robert Cerveny. Global software piracy: can economic factors alone explain the trend? |
77 | -- | 83 | Christopher L. Carr. Reciprocity: the golden rule of IS-user service relationship quality and cooperation |
84 | -- | 90 | Timothy Paul Cronan, C. Bryan Foltz, Thomas W. Jones. Piracy, computer crime, and IS misuse at the university |
91 | -- | 96 | David Kang, Roger Chiang. A systematic approach in managing post-deployment system changes |
97 | -- | 101 | Bonnie Brinton Anderson, James V. Hansen, Paul Benjamin Lowry, Scott L. Summers. The application of model checking for securing e-commerce transactions |
102 | -- | 106 | Barry Shore. Enterprise integration across the globally disbursed service organization |
107 | -- | 109 | Thomas W. Jackson, Anthony Burgess, Janet Edwards. A simple approach to improving email communication |
120 | -- | 0 | Robert N. Charette. EHRs: Electronic Health Records or Exceptional Hidden Risks? |