Journal: Communications of the ACM

Volume 48, Issue 9

5 -- 0Diane Crawford. Editorial pointers
11 -- 13Diane Crawford. Forum
15 -- 19Phillip G. Armour. To plan, two plans
21 -- 23Meg McGinity Shannon. Nanotechnology s shadow
25 -- 28David A. Patterson. Restoring the popularity of computer science
29 -- 30Diane Crawford. Top 10 downloads from ACM s digital library
31 -- 33Frank Stajano. RFID is x-ray vision
34 -- 37Gaetano Borriello. Introduction
39 -- 44Joshua R. Smith, Kenneth P. Fishkin, Bing Jiang, Alexander Mamishev, Matthai Philipose, Adam D. Rea, Sumit Roy, Kishore Sundara-Rajan. RFID-based techniques for human-activity detection
46 -- 51Ramesh Raskar, Paul A. Beardsley, Paul H. Dietz, Jeroen van Baar. Photosensing wireless tags for geometric procedures
53 -- 59Trevor Pering, Rafael Ballagas, Roy Want. Spontaneous marriages of mobile devices and interactive spaces
60 -- 65Sherry Hsi, Holly Fait. RFID enhances visitors museum experience at the Exploratorium
66 -- 71Miyako Ohkubo, Koutarou Suzuki, Shingo Kinoshita. RFID privacy issues and technical challenges
73 -- 76Oliver Günther, Sarah Spiekermann. RFID and the perception of control: the consumer s view
77 -- 79Bruce Eckfeldt. What does RFID do for the consumer?
80 -- 85Rajiv C. Shah, Jay P. Kesan. Nurturing software
87 -- 91James Backhouse, Carol Hsu, Jimmy C. Tseng, John Baptista. A question of trust
92 -- 98Zhenhui Jiang, Weiquan Wang, Izak Benbasat. Multimedia-based interactive advising technology for online consumer decision support
99 -- 104Charles A. Wood, Terence T. Ow. WEBVIEW: an SQL extension for joining corporate data to data derived from the web
105 -- 108Ping Zhang, Na Li. The importance of affective quality
109 -- 114Hai Zhuge. Exploring an epidemic in an e-science environment
115 -- 118Deborah K. Smith, Trevor T. Moores, Jerry Chang. Prepare your mind for learning
119 -- 122G. Anthony Gorry. As simple as possible, but not simpler
136 -- 0Barbara B. Simons, Jim Horning. Risks of technology-oblivious policy

Volume 48, Issue 8

5 -- 0Diane Crawford. Editorial pointers
9 -- 10. News track
11 -- 13Diane Crawford. Forum
15 -- 18Robert L. Glass. Silver bullet milestones in software history
19 -- 20Diane Crawford. Top 10 downloads from ACM s digital library
21 -- 28Hal Berghel, Jacob Uecker. WiFi attack vectors
29 -- 30David A. Patterson. Does ACM support matter to conferences or journals?
31 -- 33Sanjeev Arora, Bernard Chazelle. Is the thrill gone?
34 -- 36Thomas F. Stafford. Introduction
37 -- 39Steve Gibson. Spyware was inevitable
41 -- 43Roger Thompson. Why spyware poses multiple threats to security
44 -- 48Xiaoni Zhang. What do consumers really know about spyware?
50 -- 53Lee A. Freeman, Andrew Urbaczewski. Why do people hate spyware?
55 -- 60Neveen Farag Awad, Kristina Fitzgerald. The deceptive behaviors that offend us most about spyware
61 -- 66Qing Hu, Tamara Dinev. Is spyware an Internet nuisance or public menace?
67 -- 70Mark B. Schmidt, Kirk P. Arnett. Spyware: a little knowledge is a wonderful thing
72 -- 77Younghwa Lee, Kenneth A. Kozar. Investigating factors affecting the adoption of anti-spyware systems
79 -- 84Merrill Warkentin, Xin Luo, Gary F. Templeton. A framework for spyware assessment
85 -- 90Sudhindra Shukla, Fiona Fui-Hoon Nah. Web browsing and spyware intrusion
92 -- 95Kirk P. Arnett, Mark B. Schmidt. Busting the ghost in the machine
96 -- 99Robin Poston, Thomas F. Stafford, Amy Hennington. Spyware: a view from the (online) street
100 -- 106Indranil Bose, Raktim Pal. Auto-ID: managing anything, anywhere, anytime in the supply chain
107 -- 112Yihua Philip Sheng, Peter P. Mykytyn Jr., Charles R. Litecky. Competitor analysis and its defenses in the e-marketplace
113 -- 117Casey G. Cegielski, Brian J. Reithel, Carl M. Rebman. Emerging information technologies: developing a timely IT strategy
118 -- 124Gregory W. Bond. Software as art
125 -- 128Don Hardaway. Sharing research in the 21st century: borrowing a page from open source software
129 -- 133Jeanette Nasem Morgan. Why the software industry needs a good ghostbuster
134 -- 136Harry L. Reif, Michel Mitri. How university professors teach project management for information systems
144 -- 0Peter G. Neumann, Michael D. Byrne. Disability-related risks

Volume 48, Issue 7

5 -- 0Diane Crawford. Editorial pointers
11 -- 13Diane Crawford. Forum
15 -- 16David A. Patterson. Reflections on a programming Olympiad
17 -- 18Diane Crawford. Top 10 downloads from ACM s digital library
19 -- 24Peter J. Denning. The locality principle
25 -- 27Michael A. Cusumano. The puzzle of Japanese software
29 -- 31Naomi S. Baron. Instant messaging and the future of language
32 -- 35Karen Holtzblatt. Introduction
37 -- 41Jan Blom, Jan Chipchase, Jaakko Lehikoinen. Contextual and cultural challenges for user mobility research
42 -- 48Colleen Page. Mobile research strategies for a global market
49 -- 53T. S. Balaji, Brian Landers, Jesse Kates, Bob Moritz. A carrier s perspective on creating a mobile multimedia service
55 -- 59Eeva Kangas, Timo Kinnunen. Applying user-centered design to mobile application development
61 -- 66David B. Rondeau. For mobile applications, branding is experience
68 -- 74Barbara P. Heath, David J. McArthur, Marilyn McClelland, Ronald J. Vetter. Metadata lessons from the iLumina digital library
76 -- 81Gun A. Lee, Gerard Jounghyun Kim, Mark Billinghurst. Immersive authoring: What You eXperience Is What You Get (WYXIWYG)
82 -- 86Dennis F. Galletta, Alexandra Durcikova, Andrea Everard, Brian M. Jones. Does spell-checking software need a warning label?
87 -- 92James J. Cappel, Victor R. Prybutok, Benny Varghese. A closer look at attention to detail
93 -- 96Mike Thelwall. Scientific web intelligence: finding relationships in university webs
97 -- 101Rudy Hirschheim. The internet-based education bandwagon: look before you leap
103 -- 105Robert Davis, David Yung. Understanding the interactivity between television and mobile commerce
112 -- 0Edward W. Felten. DRM and public policy

Volume 48, Issue 6

5 -- 0Diane Crawford. Editorial pointers
11 -- 13Diane Crawford. Forum
15 -- 17Phillip G. Armour. Sarbanes-Oxley and software projects
19 -- 20Diane Crawford. Top 10 downloads from ACM s digital library
21 -- 25Pamela Samuelson. The Supreme Court revisits the ::::Sony:::: safe harbor
27 -- 28David A. Patterson. Do you ::::Queue::::?
29 -- 31Jacques Cohen. Updating computer science education
32 -- 35Andrew Rosenbloom. Introduction
36 -- 41Paul K. Wright. Rapid prototyping in consumer product design
42 -- 48Mike Bailey. Layered manufacturing for scientific visualization
50 -- 56Sara McMains. Layered manufacturing technologies
58 -- 64Thomas A. Funkhouser, Michael M. Kazhdan, Patrick Min, Philip Shilane. Shape-based retrieval and analysis of 3d models
66 -- 73Carlo H. Séquin. Rapid prototyping: a 3d visualization tool takes on sculpture and mathematical forms
74 -- 80David Koller, Marc Levoy. Protecting 3d graphics content
82 -- 87U. N. Umesh, Minh Q. Huynh, Leonard M. Jessup. Creating successful entrepreneurial ventures in IT
88 -- 93Jo Ellen Moore, Mary Sue Love. IT professionals as organizational citizens
94 -- 99James A. M. McHugh, Fadi P. Deek. An incentive system for reducing malware attacks
100 -- 107Jennifer Jie Xu, Hsinchun Chen. Criminal network analysis and visualization
108 -- 115Rahul Singh, Al Farooq Salam, Lakshmi S. Iyer. Agents in e-supply chains
117 -- 123Fiona Fui-Hoon Nah, Keng Siau, Yuhong Tian. Knowledge management mechanisms of financial service sites
124 -- 130Tapas Kanungo, Philip Resnik, Song Mao, Doe-Wan Kim, Qigong Zheng. The Bible and multilingual optical character recognition
131 -- 132Younghwa Lee. The CAN-SPAM Act: a silver bullet solution?
144 -- 0Susan Landau. What lessons are we teaching?

Volume 48, Issue 5

5 -- 0Diane Crawford. Editorial pointers
9 -- 10. News track
11 -- 13Diane Crawford. Forum
15 -- 19Rebecca T. Mercuri. Trusting in transparency
21 -- 22Diane Crawford. Top 10 downloads from ACM s digital library
23 -- 26Meg McGinity Shannon. It s the FCC on the line
27 -- 28David A. Patterson. Recognizing individual excellence helps us all
29 -- 31Satish Nambisan. How to prepare tomorrow s technologists for global networks of innovation
32 -- 35Anand Desai. Introduction
36 -- 44Joseph Tan, H. Joseph Wen, Neveen Awad. Health care and services delivery systems as complex adaptive systems
45 -- 50Albert Jones, Abhijit Deshmukh. Test beds for complex systems
51 -- 57Jay Ramanathan. Fractal architecture for the adaptive complex enterprise
58 -- 64Rajiv Ramnath, David Landsbergen. IT-enabled sense-and-respond strategies in complex public organizations
66 -- 71Ashley A. Bush, Amrit Tiwana. Designing sticky knowledge networks
72 -- 78Sridhar P. Nerur, RadhaKanta Mahapatra, George Mangalaraj. Challenges of migrating to agile methodologies
80 -- 85Vincent S. Lai, Bo K. Wong. Business types, e-strategies, and performance
87 -- 91Suzanne D. Pawlowski, Pratim Datta, Andrea L. Houston. The (gradually) changing face of state IT jobs
93 -- 97Kenneth R. Fleischmann, William A. Wallace. A covenant with transparency: opening the black box of models
99 -- 103Alex Potanin, James Noble, Marcus R. Frean, Robert Biddle. Scale-free geometry in OO programs
105 -- 110Baihua Zheng, Dik Lun Lee. Information dissemination via wireless broadcast
111 -- 118Serge Abiteboul, Rakesh Agrawal, Philip A. Bernstein, Michael J. Carey, Stefano Ceri, W. Bruce Croft, David J. DeWitt, Michael J. Franklin, Hector Garcia-Molina, Dieter Gawlick, Jim Gray, Laura M. Haas, Alon Y. Halevy, Joseph M. Hellerstein, Yannis E. Ioannidis, Martin L. Kersten, Michael J. Pazzani, Michael Lesk, David Maier, Jeffrey F. Naughton, Hans-Jörg Schek, Timos K. Sellis, Avi Silberschatz, Michael Stonebraker, Richard T. Snodgrass, Jeffrey D. Ullman, Gerhard Weikum, Jennifer Widom, Stanley B. Zdonik. The Lowell database research self-assessment
119 -- 121Ben Light. Potential pitfalls in packaged software adoption
136 -- 0Bruce Schneier. Risks of third-party data

Volume 48, Issue 4

5 -- 0Diane Crawford. Editorial pointers
9 -- 10. News track
11 -- 13Diane Crawford. Forum
15 -- 20Hal Berghel. The two sides of ROI: return on investment vs. risk of incarceration
21 -- 25David A. Patterson. The state of funding for new initiatives in computer science and engineering
27 -- 31Peter J. Denning. Is computer science science?
33 -- 34Diane Crawford. Top 10 downloads from ACM s digital library
35 -- 37Richard P. Suttmeier. A new technonationalism?: China and the development of technical standards
39 -- 43Vinton G. Cerf. Spam, spim, and spit
44 -- 48Maris G. Martinsons. Introduction
49 -- 53Jonathan J. H. Zhu, Enhai Wang. Diffusion, use, and effect of the internet in China
54 -- 58Xunhua Guo, Guoqing Chen. Internet diffusion in Chinese companies
59 -- 60Maris G. Martinsons. The internet enlightens and empowers Chinese society
62 -- 67Robert M. Davison, Douglas R. Vogel, Roger W. Harris. The e-transformation of western China
69 -- 72Jing Quan, Qing Hu, Xinan Wang. IT is not for everyone in China
73 -- 76Glen R. Burrows, Damon L. Drummond, Maris G. Martinsons. Knowledge management in China
77 -- 81Qiang Tu, Kanliang Wang, Qin Shu. Computer-related technostress in China
83 -- 86Charalambos L. Iacovou, Albert S. Dexter. Surviving IT project cancellations
88 -- 94Christian S. Collberg, Stephen G. Kobourov. Self-plagiarism in computer science
95 -- 100Ellen Christiaanse. Performance benefits through integration hubs
101 -- 106Bettina Berendt, Oliver Günther, Sarah Spiekermann. Privacy in e-commerce: stated preferences vs. actual behavior
107 -- 112Dursun Delen, Nikunj P. Dalal, Perakath C. Benjamin. Integrated modeling: the key to holistic understanding of the enterprise
113 -- 116Kay Chen Tan, M. L. Wang, W. Peng. A P2P genetic algorithm environment for the internet
117 -- 119Hai Zhuge. Semantic grid: scientific issues, infrastructure, and methodology
136 -- 0Bruce Schneier. Two-factor authentication: too little, too late

Volume 48, Issue 3

5 -- 0Diane Crawford. Editorial pointers
9 -- 10. News track
11 -- 13Diane Crawford. Forum
15 -- 16David A. Patterson. 20:::th::: century vs. 21:::st::: century C&C: the SPUR manifesto
17 -- 20Phillip G. Armour. Project portfolios: organizational management of risk
21 -- 22Diane Crawford. Top 10 downloads from ACM s digital library
23 -- 24Gregory J. Conti. Why computer scientists should attend hacker conferences
25 -- 26Robert L. Glass. The first business application: a significant milestone in software history
27 -- 31Pamela Samuelson. Legislative challenges to the ::::Sony:::: safe harbor rule
32 -- 35Norbert A. Streitz, Paddy Nixon. Introduction
36 -- 41Gaetano Borriello, Matthew Chalmers, Anthony LaMarca, Paddy Nixon. Delivering real-world ubiquitous location systems
42 -- 48Daniel M. Russell, Norbert A. Streitz, Terry Winograd. Building disappearing computers
49 -- 53Joëlle Coutaz, James L. Crowley, Simon Dobson, David Garlan. Context is key
54 -- 57Steve Benford, Carsten Magerkurth, Peter Ljungstrand. Bridging the physical and digital in pervasive gaming
59 -- 60Saadi Lahlou, Marc Langheinrich, Carsten Röcker. Privacy and trust issues with invisible computers
62 -- 65Liam J. Bannon, Steve Benford, John Bowers, Christian Heath. Hybrid design creates innovative museum experiences
66 -- 0Hans Gellersen. Smart-Its: computers for artifacts in the physical world
67 -- 68Spyros Lalis, Alexandros Karypidis, Anthony Savidis. Ad-hoc composition in wearable and mobile computing
69 -- 0Achilles Kameas, Irene Mavrommati. Extrovert gadgets
70 -- 0Joseph A. Paradiso. Sensate media
71 -- 0Anatole Gershman, Andrew E. Fano. Examples of commercial applications of ubiquitous computing
72 -- 78Jacques Cohen. Computer science and bioinformatics
79 -- 84Arun Sen, Atish P. Sinha. A comparison of data warehousing methodologies
85 -- 0. SIGs announce candidates for election
86 -- 91Trevor T. Moores. Do consumers understand the role of privacy seals in e-commerce?
93 -- 97Bonnie Rubenstein-Montano, Victoria Y. Yoon, Stuart Lowry, Teresa Merlau. A multiagent system for U.S. defense research contracting
98 -- 104William L. Hibbard, Curtis Rueden, Steve Emmerson, Tom Rink, David Glowacki, Tom Whittaker, Don Murray, David Fulker, John Anderson. Java distributed components for numerical visualization in VisAD
105 -- 109Ji-Ye Mao, Karel Vredenburg, Paul W. Smith, Tom Carey. The state of user-centered design practice
111 -- 114Xiaoni Zhang, Victor R. Prybutok. How the mobile communication markets differ in China, the U.S., and Europe
115 -- 117Marco Gori, Ian H. Witten. The bubble of web visibility
128 -- 0Peter G. Neumann. Anticipating disasters

Volume 48, Issue 2

5 -- 0Diane Crawford. Editorial pointers
9 -- 10. News track
11 -- 13Diane Crawford. Forum
14 -- 0David A. Patterson. Why join ACM?
15 -- 17Michael A. Cusumano. Google: what it is and what it is not
19 -- 20Jon Crowcroft. On the nature of computing
21 -- 22. SIGs announce candidates for election
23 -- 24Diane Crawford. Top 10 downloads from ACM s digital library
26 -- 29Dimitris N. Metaxas. Introduction
31 -- 36Hervé Delingette, Nicholas Ayache. Hepatic surgery simulation
37 -- 41Arie E. Kaufman, Sarang Lakare, Kevin Kreeger, Ingmar Bitter. Virtual colonoscopy
43 -- 48Kyoungju Park, Albert Montillo, Dimitris N. Metaxas, Leon Axel. Volumetric heart modeling and analysis
49 -- 54Celina Imielinska, Pat Molholt. Incorporating 3D virtual anatomy into the medical curriculum
55 -- 59Terry S. Yoo, Michael J. Ackerman. Open source software for medical image processing and visualization
66 -- 71J. Roberto Evaristo, Kevin C. Desouza, Kevin Hollister. Centralization momentum: the pendulum swings back again
72 -- 77Al Farooq Salam, Lakshmi S. Iyer, Prashant Palvia, Rahul Singh. Trust in e-commerce
78 -- 83Lawrence Bodin, Lawrence A. Gordon, Martin P. Loeb. Evaluating information security investments using the analytic hierarchy process
85 -- 90Fiona Fui-Hoon Nah, Keng Siau, Hong Sheng. The value of mobile applications: a utility company study
91 -- 94R. Kelly Rainer Jr., Mark D. Miller. Examining differences across journal rankings
95 -- 98Yufei Yuan, Brian Detlor. Intelligent mobile crisis response systems
99 -- 101Chenglie Hu. Dataless objects considered harmful
102 -- 104Shirley Ann Becker. E-government usability for older adults
128 -- 0Peter G. Neumann. Responsibilities of technologists

Volume 48, Issue 12

5 -- 6Diane Crawford. Editorial pointers
9 -- 10. News track
11 -- 13Diane Crawford. Forum
15 -- 16Diane Crawford. Top 10 downloads from ACM s digital library
17 -- 21Rebecca Mercuri. Challenges in forensic computing
23 -- 30Hal Berghel, David Hoelzer. Pernicious ports
31 -- 33David A. Patterson. Robots in the desert: a research parable for our times
35 -- 37Amy Bruckman. Student research and the internet
38 -- 41Rahul Singh, Lakshmi S. Iyer, Al Farooq Salam. Introduction
43 -- 47Jos de Bruijn, Dieter Fensel, Uwe Keller, Rubén Lara. Using the web service modeling ontology to enable semantic e-business
48 -- 54JinKyu Lee, Shambhu J. Upadhyaya, H. Raghav Rao, Raj Sharman. Secure knowledge management and the semantic web
55 -- 59Manoj Thomas, Richard T. Redmond, Victoria Y. Yoon, Rahul Singh. A semantic approach to monitor business process
60 -- 66Ejub Kajan, Leonid Stoimenov. Toward an ontology-driven architectural framework for B2B
67 -- 70Thomas P. Moran, Alex Cozzi, Stephen P. Farrell. Unified activity management: supporting people in e-business
71 -- 73Bhavani M. Thuraisingham. Directions for security and privacy for semantic e-business applications
75 -- 77Juhnyoung Lee. Model-driven business transformation and the semantic web
78 -- 83Michael J. O Donnell. Separate handles from names on the internet
85 -- 89Sanjiv Augustine, Bob Payne, Fred Sencindiver, Susan Woodcock. Agile project management: steering from the edges
91 -- 95Younghwa Lee, Kenneth A. Kozar, Kai R. T. Larsen. Does avatar email improve communication?
96 -- 100Torgeir Dingsøyr, Hans Karim Djarraya, Emil Røyrvik. Practical knowledge management tool use in a software consulting company
101 -- 106Akhilesh Chandra, Thomas Calderon. Challenges and constraints to the diffusion of biometrics in information systems
107 -- 110Stephan Kudyba, G. Brent Hamar, William M. Gandy. Enhancing efficiency in the health care industry
111 -- 116Philip F. Musa, Victor Wacham A. Mbarika, Peter Meso. Calling for programmed technology transfer and adoption strategies for sustainable LDC growth
152 -- 0Peter J. Denning, Jim Horning, David Lorge Parnas, Lauren Weinstein. Wikipedia risks

Volume 48, Issue 11

5 -- 0Diane Crawford. Editorial pointers
9 -- 10. News track
11 -- 13Diane Crawford. Forum
15 -- 19Peter J. Denning, Andrew D. McGettrick. Recentering computer science
21 -- 24Robert L. Glass. The plot to deskill software engineering
25 -- 26Diane Crawford. Top 10 downloads from ACM s digital library
27 -- 28Maria M. Klawe, Ben Shneiderman. Crisis and opportunity in computer science
29 -- 31David A. Patterson. Rescuing our families, our neighbors, and ourselves
32 -- 37Peter Kugel. It s time to think outside the computational box
38 -- 43Alvin T. S. Chan. Mobile cookies management on a smart card
45 -- 49Richard A. Frost. Call for a public-domain SpeechWeb
50 -- 56Benjamin A. Kuperman, Carla E. Brodley, Hilmi Ozdoganoglu, T. N. Vijaykumar, Ankit Jalote. Detection and prevention of stack buffer overflow attacks
57 -- 62Chuan-Fong Shih, Jason L. Dedrick, Kenneth L. Kraemer. Rule of law and the international diffusion of e-commerce
64 -- 70Rana Tassabehji, Maria Vakola. Business email: the killer impact
71 -- 74Sridhar P. Nerur, Riyaz Sikora, George Mangalaraj, Venugopal Balijepally. Assessing the relative influence of journals in a citation network
75 -- 79Radha V. Mookerjee. Maintaining enterprise software applications
80 -- 86Rosemary H. Wild, Kenneth A. Griggs, Eldon Y. Li. An architecture for distributed scenario building and evaluation
87 -- 92Michael Ettredge, John Gerdes Jr., Gilbert G. Karuga. Using web-based search data to predict macroeconomic statistics
93 -- 96Bill C. Hardgrave, Deborah J. Armstrong. Software process improvement: it s a journey, not a destination
120 -- 0Steven M. Bellovin, Matt Blaze, Susan Landau. The real national-security needs for VoIP

Volume 48, Issue 10

5 -- 0Diane Crawford. Editorial pointers
9 -- 10. News track
11 -- 13Diane Crawford. Forum
15 -- 16David A. Patterson. The ::::new:::: Professional Development Centre boasts 1, 000 courses, O Reilly Books, and CS classics
17 -- 18Diane Crawford. Top 10 downloads from ACM s digital library
19 -- 24Pamela Samuelson. Did MGM really win the ::::Grokster:::: case?
25 -- 27Michael A. Cusumano. Software in Ireland: a balance of entrepreneurship and ... lifestyle management?
29 -- 31Kenneth A. Ross. Academic dishonesty and the Internet
32 -- 35Abbe Mowshowitz, Murray Turoff. Introduction
37 -- 42Edward N. Wolff. The growth of information workers in the U.S. economy
43 -- 44Sara J. Czaja, Starr Roxanne Hiltz. Digital aids for an aging society
46 -- 51Elia Zureik, Abbe Mowshowitz. Consumer power in the digital society
53 -- 55Barry Wellman. Community: from neighborhood to network
57 -- 58Eli M. Noam. Why the Internet is bad for democracy
59 -- 64Starr Roxanne Hiltz, Murray Turoff. Education goes digital: the evolution of online learning and the revolution in higher education
65 -- 66Hal R. Varian. Universal access to information
68 -- 74Peter G. Goldschmidt. HIT and MIS: implications of health information technology and medical information systems
75 -- 81Yong Jin Kim, Rajiv Kishore, G. Lawrence Sanders. From DQ to EQ: understanding data quality in the context of e-business systems
83 -- 90Gediminas Adomavicius, Alexander Tuzhilin. Personalization technologies: a process-oriented perspective
91 -- 94Bipin Prabhakar, Charles R. Litecky, Kirk P. Arnett. IT skills in a tough job market
95 -- 98Dragomir R. Radev, Jahna Otterbacher, Adam Winkel, Sasha Blair-Goldensohn. NewsInEssence: summarizing online news topics
99 -- 104Sang M. Lee, Xin Tan, Silvana Trimi. Current practices of leading e-government countries
105 -- 110Arvind Malhotra, Albert H. Segars. Investigating wireless web adoption patterns in the U.S
111 -- 114Alan R. Peslak. The educational productivity paradox
128 -- 0Lauren Weinstein. The best-laid plans: a cautionary tale for developers

Volume 48, Issue 1

5 -- 0Diane Crawford. Editorial pointers
9 -- 10. News track
11 -- 13Diane Crawford. Forum
15 -- 18Phillip G. Armour. The unconscious art of software testing
19 -- 20Diane Crawford. Top 10 downloads from ACM s digital library
21 -- 23Meg McGinity. Let your fingers do the talking
25 -- 26David A. Patterson. Minority-minority and minority-majority technology transfer
27 -- 28Deborah Anderson. Global linguistic diversity for the internet
29 -- 31Chris Stephenson. Creating a national K-12 computer science community
32 -- 34Allison Druin, Juan Pablo Hourcade. Introduction
39 -- 42Mona Leigh Guha, Allison Druin, Gene Chipman, Jerry Alan Fails, Sante Simms, Allison Farber. Working with young children as technology design partners
44 -- 50Johanna Höysniemi, Perttu Hämäläinen, Laura Turkki, Teppo Rouvi. Children s intuitive gestures in vision-based action games
51 -- 54Michael Eisenberg. The material side of educational technology
55 -- 59Yvonne Rogers, Sara Price, Cliff Randell, Danae Stanton Fraser, Mark J. Weal, Geraldine Fitzpatrick. Ubi-learning integrates indoor and outdoor experiences
61 -- 65Judy Robertson, Judith Good. Story creation in virtual game worlds
66 -- 70RadhaKanta Mahapatra, Vincent S. Lai. Evaluating end-user training programs
71 -- 74Andreas Holzinger. Usability engineering methods for software developers
75 -- 80John Tillquist, Waymond Rodgers. Using asset specificity and asset scope to measure the value of IT
82 -- 88Rodrigo C. Fonseca, Virgílio A. F. Almeida, Mark Crovella. Locality in a web of streams
89 -- 94Ganesh Vaidyanathan. A framework for evaluating third-party logistics
95 -- 100Michael Ettredge, John Gerdes Jr.. Timeliness of investor relations data at corporate web sites
101 -- 105Ines Herrero, Jose L. Salmeron. Using the DEA methodology to rank software technical efficiency
110 -- 112Stuart J. Barnes. Assessing the value of IS journals
144 -- 0George Ledin Jr.. Not teaching viruses and worms is harmful