Abstract is missing.
- Termediator: early studies in terminological mediation between disciplinesJessica M. Richards, Owen Riley, Joseph J. Ekstrom, Kevin Tew. 1-10 [doi]
- Advancing the IT research agendaWilliam W. Agresti. 11-16 [doi]
- Using agent technologies to correlate and compare anti-malware softwareKellie E. Kercher, Dale C. Rowe, Haley Dennis. 17-22 [doi]
- MP3 files as a steganography mediumMikhail Zaturenskiy. 23-28 [doi]
- The emergence of an it 'profession'Joseph J. Ekstrom, William W. Agresti, Gregory W. Hislop, Han Reichgelt, Charlene (Chuck) Walrad. 29-30 [doi]
- ChronoZoom: travel through time for education, exploration, and information technology researchRobert L. Walter, Sergey Berezin, Ankur Teredesai. 31-36 [doi]
- Design patterns as first-class connectorsSargon Hasso, Carl Carlson. 37-42 [doi]
- Improving service continuity: IT disaster prevention and mitigation for data centersLouis Turnbull, Henry Ochieng, Chris Kadlec, Jordan Shropshire. 43-46 [doi]
- Administrative evaluation of intrusion detection systemXinli Wang, Alex Kordas, Lihui Hu, Matt Gaedke, Derrick Smith. 47-52 [doi]
- DNS: (do not suspect)Fernando Seror Garcia. 53-54 [doi]
- Securing insurance reimbursements with RFID technologiesCharles Hopkins. 55-56 [doi]
- Resource utilization prediction: long term network web service trafficDaniel W. Yoas, Greg Simco. 57-58 [doi]
- Security mechanisms for multi-user collaborative CAxFrancis N. Mensah, Chia-Chi Teng. 59-60 [doi]
- A grounded theory analysis of modern web applications: knowledge, skills, and abilities for DevOpsSoon K. Bang, Sam Chung, Young Choh, Marc J. Dupuis. 61-62 [doi]
- Sitemap explorer: browser integrated web navigationJack Zheng. 63-64 [doi]
- Design and evaluation of face tracking user interfaces for accessibilityNorman H. Villaroman, Dale C. Rowe, C. Richard G. Helps. 65-70 [doi]
- Formalizing the design of embedded software using sequence diagrams and abstract state machinesAbdel Ejnioui, Carlos E. Otero, Abrar A. Qureshi. 71-76 [doi]
- Automated webpage evaluationRyan Tate, Gregory J. Conti, Edward Sobiesk. 77-82 [doi]
- Implementation of SHA-1 and ECDSA for vehicular ad-hoc network using NS-3Sinan Nacy, Tae Oh, Jim Leone. 83-88 [doi]