5 | -- | 0 | Diane Crawford. Editorial pointers |
7 | -- | 8 | . News track |
13 | -- | 14 | . Forum |
14 | -- | 0 | . Call for nominations for ACM general election |
15 | -- | 18 | Hal Berghel. Better-than-nothing security practices |
19 | -- | 20 | Amy Bruckman. Software copyright and role models |
21 | -- | 23 | Robert L. Glass. A deja-vu look at software engineering researchers who care about practice |
24 | -- | 33 | Alfred Kobsa. Privacy-enhanced personalization |
35 | -- | 39 | Ahmed Elfatatry. Dealing with change: components versus services |
41 | -- | 45 | Matt E. Thatcher, David E. Pingry. Modeling the IT value paradox |
46 | -- | 51 | John Erickson, Keng Siau. Theoretical and practical complexity of modeling methods |
52 | -- | 58 | Jesper Simonsen. Involving top management in IT projects |
59 | -- | 64 | Larry J. Leblanc, Michael R. Galbreth. Designing large-scale supply chain linear programs in spreadsheets |
65 | -- | 71 | Yun Wan, Satya Menon, Arkalgud Ramaprasad. A classification of product comparison agents |
72 | -- | 77 | Janice C. Sipior, Burke T. Ward. Unintended invitation: organizational wi-fi use by external roaming users |
78 | -- | 85 | T. H. Tse, Francis C. M. Lau, W. K. Chan, Peter C. K. Liu, Colin K. F. Luk. Testing object-oriented industrial software without precise oracles or results |
87 | -- | 93 | Sagnika Sen, Haluk Demirkan, Michael Goul. Dynamic decision support through instantiation of UEML representations |
94 | -- | 99 | W. Raghupathi. Corporate governance of IT: a framework for development |
100 | -- | 0 | . Top 10 downloads from ACM s digital library |
101 | -- | 103 | Sakgasit Ramingwong, A. S. M. Sajeev. Offshore outsourcing: the risk of keeping mum |
112 | -- | 0 | David Lorge Parnas. Which is riskier: OS diversity or OS monopoly? |