4 | -- | 6 | George F. Hurlburt, Jeffrey M. Voas. Timing Matters: Tackling Intractable Problems |
7 | -- | 9 | A. Sharma. IT in Governance in the 21st Century |
14 | -- | 17 | Bruce Potter. Coming to Grips with Security |
18 | -- | 23 | J. Quan, Kara L. Nance, Brian Hay. A Mutualistic Security Service Model: Supporting Large-Scale Virtualized Environments |
24 | -- | 30 | S. Fenz, Simon Edward Parkin, Aad P. A. van Moorsel. A Community Knowledge Base for IT Security |
31 | -- | 37 | Murat Gunestas, Murad Mehmet, Duminda Wijesekera, Anoop Singhal. Forensic Web Services Framework |
38 | -- | 47 | P. Brown, J. Kelly, D. Querusio. Toward a Healthcare Business-Process Reference Model |
52 | -- | 56 | Adam Marks, Yacine Rezgui. IT Leadership in Higher Education: The CIO Candidate |
57 | -- | 59 | Keith W. Miller. Moral Responsibility for Computing Artifacts: The Rules |
60 | -- | 61 | Linda Wilbanks. You Need a Vacation |
64 | -- | 63 | Tom Costello. Lean: More than a Shop-Floor Fad |