5 | -- | 0 | Diane Crawford. Editorial pointers |
7 | -- | 8 | . News track |
13 | -- | 14 | . Forum |
15 | -- | 18 | Michael A. Cusumano. Extreme programming compared with Microsoft-style iterative development |
19 | -- | 23 | Pamela Samuelson. Does copyright law need to be reformed? |
25 | -- | 28 | Katia Passerini, Karen Patten, Michael R. Bartolacci, Jerry Fjermestad. Reflections and trends in the expansion of cellular wireless services in the U.S. and China |
29 | -- | 31 | Sebastian Thrun. Why we compete in DARPA s Urban Challenge autonomous robot race |
33 | -- | 39 | Michael L. Best, Kipp Jones, Illenin Kondo, Dhanaraj Thakur, Edem Wornyo, Calvin Yu. Post-conflict communications: the case of Liberia |
40 | -- | 46 | Erran Carmel, Pamela Abbott. Why nearshore means that distance matters |
45 | -- | 0 | Erran Carmel, Pamela Abbott. Nearshore locations in three principal global clusters and their respective attributes |
47 | -- | 52 | Matt E. Thatcher, David E. Pingry. [Software patents] The good, the bad, and the messy |
53 | -- | 58 | Gregoris Mentzas, Kostas Kafentzis, Panos Georgolios. Knowledge services on the semantic web |
60 | -- | 66 | U. N. Umesh, Leonard M. Jessup, Minh Q. Huynh. [Getting ideas to market] Current issues faced by technology entrepreneurs |
67 | -- | 71 | Asli Yagmur Akbulut, Clayton A. Looney. Inspiring students to pursue computing degrees |
72 | -- | 78 | Prabhudev Konana, Gautam Ray. Physical product reengineering with embedded information technology |
79 | -- | 85 | Mike P. Papazoglou, Willem-Jan van den Heuvel. Business process development life cycle methodology |
86 | -- | 93 | William L. Kuechler Jr.. Business applications of unstructured text |
94 | -- | 100 | Tom N. Jagatic, Nathaniel A. Johnson, Markus Jakobsson, Filippo Menczer. Social phishing |
101 | -- | 106 | Wade H. Baker, Loren Paul Rees, Peter S. Tippett. Necessary measures: metric-driven information security risk assessment and decision making |
107 | -- | 111 | Richard J. Goeke, Robert H. Faley. Leveraging the flexibility of your data warehouse |
113 | -- | 117 | John D Arcy, Anat Hovav. Deterring internal information systems misuse |
118 | -- | 0 | . Top 10 downloads from ACM s digital library |
128 | -- | 0 | Herbert S. Lin, Alfred Z. Spector, Peter G. Neumann, Seymour E. Goodman. Toward a safer and more secure cyberspace |