Journal: Communications of the ACM

Volume 50, Issue 8

5 -- 0Diane Crawford. Editorial pointers
7 -- 8. News track
13 -- 14. Forum
14 -- 0. Call for nominations for ACM general election
15 -- 18Hal Berghel. Better-than-nothing security practices
19 -- 20Amy Bruckman. Software copyright and role models
21 -- 23Robert L. Glass. A deja-vu look at software engineering researchers who care about practice
24 -- 33Alfred Kobsa. Privacy-enhanced personalization
35 -- 39Ahmed Elfatatry. Dealing with change: components versus services
41 -- 45Matt E. Thatcher, David E. Pingry. Modeling the IT value paradox
46 -- 51John Erickson, Keng Siau. Theoretical and practical complexity of modeling methods
52 -- 58Jesper Simonsen. Involving top management in IT projects
59 -- 64Larry J. Leblanc, Michael R. Galbreth. Designing large-scale supply chain linear programs in spreadsheets
65 -- 71Yun Wan, Satya Menon, Arkalgud Ramaprasad. A classification of product comparison agents
72 -- 77Janice C. Sipior, Burke T. Ward. Unintended invitation: organizational wi-fi use by external roaming users
78 -- 85T. H. Tse, Francis C. M. Lau, W. K. Chan, Peter C. K. Liu, Colin K. F. Luk. Testing object-oriented industrial software without precise oracles or results
87 -- 93Sagnika Sen, Haluk Demirkan, Michael Goul. Dynamic decision support through instantiation of UEML representations
94 -- 99W. Raghupathi. Corporate governance of IT: a framework for development
100 -- 0. Top 10 downloads from ACM s digital library
101 -- 103Sakgasit Ramingwong, A. S. M. Sajeev. Offshore outsourcing: the risk of keeping mum
112 -- 0David Lorge Parnas. Which is riskier: OS diversity or OS monopoly?