default search action
Communications of the ACM (CACM), Volume 43, 2000
Volume 43, Number 1, January 2000
- Diane Crawford:
Editorial Pointers. 5 - Robert Fox:
News Track. 9-10 - Diane Crawford:
Forum. 11-13
- Brock N. Meeks:
Bugging Out: Y2K Fallout or Business As Usual? 15-17
- Elliot Soloway, Cathleen A. Norris, Phyllis Blumenfeld, Barry Fishman, Joseph Krajcik, Ronald Marx:
K-12 and the Internet. 19-23
- Tom Porter, Galyn Susman:
Creating Lifelike Characters in Pixar Movies. 25-29
- Barbara Simons:
Building Big Brother. 31-32
- Prabhudev Konana, Nirup M. Menon, Sridhar Balasubramanian:
The Implications of Online Investing. 34-41 - Cecilia M. Gorriz, Claudia Medina:
Engaging Girls with Computers Through Software Games. 42-49 - Eszter Hargittai:
Radio's Lessons for the Internet. 50-57 - Mark S. Ackerman, Christine A. Halverson:
Reexamining Organizational Memory. 58-64 - Mike Robinson, Mikko Kovalainen, Esa Auramäki:
Diary as Dialogue in Papermill Process Control. 65-70 - Jagdish Chandra, Salvatore T. March, Satyen Mukherjee, Will Pape, Ram Ramesh, H. Raghav Rao, Ray O. Waddoups:
Information Systems Frontiers. 71-79 - Srinarayan Sharma, Arun Rai:
CASE Deployment in IS Organizations. 80-88 - Ruben Gonzalez, Greg Cranitch, Jun Jo:
Academic Directions of Multimedia Education. 89-95
- Carl M. Ellison, Bruce Schneier:
Risks of PKI: Secure Email. 160
Volume 43, Number 2, February 2000
- Diane Crawford:
Editorial Pointers. 5 - Robert Fox:
News Track. 9-10 - Diane Crawford:
Forum. 11-15
- Hal Berghel:
Identity Theft, Social Security Numbers, and the Web. 17-21
- Andrew Grosso:
The Promise and Problems of the No Electronic Theft Act. 23-26
- Felipe Castel:
Exploring Virtuality. 27-28 - Fran Allen, Paula B. Hawthorn, Barbara Simons:
Not Now, Not Like This. 29-30
- Mark T. Maybury:
News on Demand: Introduction. 32-34 - Stanley Boykin, Andrew Merlino:
Machine Learning of Event Segmentation for News on Demand. 35-41 - Howard D. Wactlar, Alexander G. Hauptmann, Michael G. Christel, Ricky Houghton, Andreas M. Olligschlaeger:
Complementary Video and Audio Analysis for Broadcast News Archives. 42-47 - Francis Kubala, Sean Colbath, Daben Liu, Amit Srivastava, John Makhoul:
Integrated Technologies for Indexing Spoken Language. 48-56 - MAESTRO: Conductor of Multimedia Analysis Technologies. 57-63
- Jean-Luc Gauvain, Lori Lamel, Gilles Adda:
Transcribing Broadcast News for Audio and Video Indexing. 64-70 - Sadaoki Furui, Katsutoshi Ohtsuki, Zhipeng Zhang:
Japanese Broadcast News Transcription and Information Extraction. 71-73 - David S. Pallett, John S. Garofolo, Jonathan G. Fiscus:
Measurements in Support of Research Accomplishments. 75-79
- Varun Grover, Pradeep Vaswani:
Partnerships in the U.S. Telecommunications Industry. 80-89 - Anil K. Jain, Lin Hong, Sharath Pankanti:
Biometric Identification. 90-98 - Rudy Hirschheim, Mary C. Lacity:
The Myths and Realities of Information Technology Insourcing. 99-107 - Kai R. T. Larsen, Peter A. Bloniarz:
A Cost and Performance Model for Web Service Investment. 109-116
- David Gillibrand:
Essential Business Object Design. 117-119
- Carl M. Ellison, Bruce Schneier:
Risks of PKI: E-Commerce. 152
Volume 43, Number 3, March 2000
- Diane Crawford:
Editorial Pointers. 5 - Robert Fox:
News Track. 9-10 - Diane Crawford:
Forum. 11-15
- Robert L. Glass:
Y2K and Believing in Software Practice. 17-18
- James A. Rodger, Parag C. Pendharkar:
Using Telemedicine in the Department of Defense. 19-20
- Roy Rada, John Ketchell:
Standardizing the European Information Society. 21-25
- Barbara Simons:
Trademarking the Net. 27-28
- Mohamed Khalifa, Robert M. Davison:
Exploring the Telecommuting Paradox. 29-31
- Matthew A. Turk, George G. Robertson:
Perceptual User Interfaces: Introduction. 32-34 - Alex Pentland:
Perceptual Intelligence. 35-44 - Hong Z. Tan:
Haptic Interfaces. 40-41 - Sharon L. Oviatt, Philip R. Cohen:
Multimodal Interfaces That Process What Comes Naturally. 45-53 - Rosalind W. Picard:
Affective Perception. 50-51 - James L. Crowley, Joëlle Coutaz, François Bérard:
Things That See. 54-64 - Aaron F. Bobick, Stephen S. Intille, James W. Davis, Freedom Baird, Claudio S. Pinhanez, Lee W. Campbell, Yuri A. Ivanov, Arjan Schütte, Andrew D. Wilson:
The KidsRoom. 60-61 - Byron Reeves, Clifford Nass:
Perceptual Bandwidth. 65-70
- Henry Lieberman:
Programming by Example: Introduction. 72-74 - David Canfield Smith, Allen Cypher, Lawrence G. Tesler:
Novice Programming Comes of Age. 75-81 - Brad A. Myers, Richard G. McDaniel, David Wolber:
Intelligence in Demonstrational Interfaces. 82-89 - Alexander Repenning, Corrina Perrone:
Programming by Analogous Examples. 90-97 - Mathias Bauer, Dietmar Dengler, Gabriele Paul, Markus Meyer:
Programming by Demonstration for Information Agents. 98-103 - Kenneth M. Kahn:
Generalizing by Removing Detail. 104-106 - Robert St. Amant, Henry Lieberman, Richard Potter, Luke Zettlemoyer:
Visual Generalization in Programming by Example. 107-114
- Mohamed E. Fayad, Mauri Laitinen, Robert P. Ward:
Software Engineering in the Small. 115-118
- Peter G. Neumann:
A Tale of Two Thousands. 144
Volume 43, Number 4, April 2000
- Diane Crawford:
Editorial Pointers. 5 - Robert Fox:
News Track. 9-10 - Diane Crawford:
Forum: Securing User Passwords. 11-12 - Rosemary McGuinness:
ACM Fellows. 13-14
- Neil Munro:
A Patchwork of Legislation and Regulation. 15-17
- Meg McGinity:
Surfing the Turf. 19-21
- Kuldeep Kumar, Jos van Hillegersberg:
Enterprise Resource Planning: Introduction. 22-26 - Yvonne van Everdingen, Jos van Hillegersberg, Eric Waarts:
ERP Adoption by European Midsize Companies. 27-31 - Leslie P. Willcocks, Richard Sykes:
The Role of the CIO and It Function in ERP. 32-38 - Irma Becerra-Fernandez, Kenneth E. Murphy, Steven John Simon:
Integrating ERP in the Business School Curriculum. 39-41 - M. Lynne Markus, Cornelis Tanis, Paul C. van Fenema:
Multisite ERP Implementations. 42-46 - Christina Soh, Sia Siew Kien, Joanne Tay-Yap:
Cultural Fits and Misfits: Is ERP a Universal Solution? 47-51 - Mark Kremers, Han van Dissel:
ERP System Migrations. 53-56 - August-Wilhelm Scheer, Frank Habermann:
Making ERP a Success. 57-61 - David Sprott:
Componentizing the Enterprise Application Packages. 63-69
- Justine Cassell:
Embodied Conversational Interface Agents+. 70-78 - Albert Semtner:
Ocean and Climate Modeling. 80-89 - Jonathan P. Bowen:
The Ethics of Safety-Critical Systems. 91-97 - Tim Bass:
Intrusion Detection Systems and Multisensor Data Fusion. 99-105
- Munindar P. Singh, Mona Singh:
Deconstructing the "any" Key. 107-108 - Jerzy W. Grzymala-Busse, Wojciech Ziarko:
Data Mining and Rough Set Theory. 108-109 - Friedrich Steimann:
Abstract Class Hierarchies, Factories, and Stable Designs. 109-111
- Peter G. Neumann:
Denial-of-Service Attacks. 136
Volume 43, Number 5, May 2000
- Diane Crawford:
Editorial Pointers. 5 - Robert Fox:
News Track. 9-10 - Diane Crawford:
Forum. 11-15
- Larry Press:
From P-books to E-books. 17-21
- Hal Berghel:
Predatory Disintermediation. 23-29
- Barbara Simons:
To DVD or Not to DVD. 31-32
- Steve Mann:
Existential Education in the Era of Personal Cybernetics. 33-36
- Deborah Estrin, Ramesh Govindan, John S. Heidemann:
Embedding the Internet: Introduction. 38-41 - David L. Tennenhouse:
Proactive Computing. 43-50 - Gregory J. Pottie, William J. Kaiser:
Wireless Integrated Network Sensors. 51-58 - Gaetano Borriello, Roy Want:
Embedded Vomputation Meets the World Wide Web. 59-66 - Gaurav S. Sukhatme, Maja J. Mataric:
Embedding Robots into the Internet. 67-73 - Harold Abelson, Don Allen, Daniel Coore, Chris Hanson, George Homsy, Thomas F. Knight Jr., Radhika Nagpal, Erik Rauch, Gerald J. Sussman, Ron Weiss:
Amorphous Computing. 74-82
- Ben Shneiderman:
Universal Usability. 84-91 - John P. Baron, Michael J. Shaw, Andrew D. Bailey:
Web-based E-catalog systems in B2B Procurement. 93-100 - Marshall Cline, Mike Girou:
Enduring Business Themes. 101-106 - Laurie A. Williams, Robert R. Kessler:
All I Really Need to Know About Pair Programming I Learned in Kindergarten. 108-114
- Susan Landau:
Designing Cryptography for the New Century. 115-120
- Lauren Weinstein, Peter G. Neumann:
Internet Risks. 144
Volume 43, Number 6, June 2000
- Diane Crawford:
Editorial Pointers. 5 - Robert Fox:
News Track. 9-10 - Diane Crawford:
Forum. 11-14
- Anthony M. Townsend, Robert J. Aalberts, Steven A. Gibson:
Libel and Slander on the Internet. 15-17
- Brock N. Meeks:
Bad Moon Rising. 19-21
- Elliot Soloway, Henry Jay Becker, Cathleen A. Norris, Neal Topp:
Teachers and Technology: Easing the Way. 23-26
- Richard M. Stallman:
Why We Must Fight UCITA. 27-28 - Tim O'Reilly:
The Internet Patent Land Grab. 29-31
- Wilhelm Hasselbring:
Information System Integration: Introduction. 32-38 - Jian Yang, Mike P. Papazoglou:
Interoperation Support for Electronic Business. 39-47 - Jane Grimson, William Grimson, Wilhelm Hasselbring:
The SI Challenge in Health Care. 48-55 - Elke A. Rundensteiner, Andreas Koeller, Xin Zhang:
Maintaining Data Warehouses over Changing Information Sources. 57-62 - Nabil R. Adam, Vijayalakshmi Atluri, Igg Adiwijaya:
SI in Digital Libraries. 64-72
- Upkar Varshney, Ronald J. Vetter:
Emerging Mobile and Wireless Networks. 73-81 - Thomas A. Phelps, Robert Wilensky:
Multivalent Documents. 82-90 - Terry L. Huston, Janis L. Huston:
Is Telemedicine a Practical Reality? 91-95 - Richard T. Watson, George M. Zinkhan, Leyland F. Pitt:
Integrated Internet Marketing. 97-102 - Gerard Parr, Kevin Curran:
A Paradigm Shift in the Distribution of Multimedia. 103-109
- Detlef Schoder, Torsten Eymann:
The Real Challenges of Mobile Agents. 111-112
- Lauren Weinstein:
Risks of Internet Voting. 128
Volume 43, Number 7, July 2000
- Diane Crawford:
Editorial Pointers. 5 - Robert Fox:
News Track. 9-10 - Diane Crawford:
Forum. 11-14
- Robert L. Glass:
On personal technical obsolescence. 15-17
- Phillip Ein-Dor, Seymour E. Goodman, Peter Wolcott:
International perspectives: From Via Maris to electronic highway: the Internet in Canaan. 19-23
- Dori Kornfeld:
Deliberating on ICANN. 25-26
- Les Earnest:
E2A is worse than Y2K. 27-28
- Andrew Rosenbloom:
Physically based computer animation: introduction. 30-32 - Chris Hecker:
Physics in computer games. 34-39 - John Funge:
Cognitive modeling for games and animation. 40-48 - Zoran Popovic:
Controlling physics in realistic character animation. 50-58 - Nick Foster, Dimitris N. Metaxas:
Modeling water for computer animation. 60-67 - James F. O'Brien, Jessica K. Hodgins:
Animating fracture. 68-75 - Jos Stam:
Interacting with smoke and fire in real time. 76-83 - Przemyslaw Prusinkiewicz:
Simulation modeling of plants and plant ecosystems. 84-93
- Torsten Fröhlich:
The virtual oceanarium. 94-101 - Jakub Segen, Senthil Kumar:
Look ma, no mouse! Simplifying human-computer interaction by using hand gesture. 102-109 - Deborah K. Smith, David B. Paradice, Steven M. Smith:
Prepare your mind for creativity. 110-116 - Veda C. Storey, Detmar W. Straub, Kathy A. Stewart, Richard J. Welke:
A conceptual investigation of the e-commerce industry. 117-123
- Gurpreet Dhillon, James Backhouse:
Information system security management in the new millennium. 125-128
- Peter G. Neumann:
Risks in retrospect. 144
Volume 43, Number 8, August 2000
- Diane Crawford:
Editorial Pointers. 5 - Robert Fox:
News Track. 9-10 - Diane Crawford:
Forum. 11-14
- Andrew Grosso:
The economic espionage act: touring the minefields. 15-18
- Phillip G. Armour:
The case for a new business model. 19-22
- Daniel Berleant:
Does typography affect proposal assessment? 24-25
- Doug Riecken:
Introduction: personalized views of personalization. 26-28 - Nigel Wells, Jeff Wolfers:
The business of personalization: finance with a personalized touch. 30-34 - Udi Manber, Ash Patel, John Robison:
The business of personalization: experience with personalization of Yahoo! 35-39 - Doug Riecken:
The business of personalization: personalized communication networks. 41-42 - Joseph Kramer, Sunil Noronha, John Vergo:
The human element: a user-centered design approach to personalization. 44-48 - John Karat, Clare-Marie Karat, Jacob P. Ukelson:
The human element: affordances, motivation, and the design of user interfaces. 49-51 - Edith Schonberg, Thomas Cofino, Robert Hoch, Mark Podlaseck, Susan L. Spraragen:
The human element: measuring success. 53-57 - Nicholas J. Belkin:
The human element: helping people find what they don't know. 58-61 - Linda Candy, Ernest A. Edmonds:
The human element: creativity enhancement with emerging technologies. 62-65 - Marvin Minsky:
Deep issues: commonsense-based interfaces. 66-73 - John McCarthy:
Deep issues: phenomenal data mining. 75-79 - Edwin P. D. Pednault:
Deep issues: representation is everything. 80-83 - Eugene Volokh:
Deep issues: personalization and privacy. 84-88 - Doug Riecken:
Deep issues: personal end-user tools. 89-91 - David Canfield Smith:
Deep issues: building personal tools by programming. 92-95 - Paul P. Maglio, Rob Barrett:
Enabling technologies: intermediaries personalize information streams. 96-101 - Haym Hirsh, Chumki Basu, Brian D. Davison:
Enabling technologies: learning to personalize. 102-106 - Barry Smyth, Paul Cotter:
Enabling technologies: a personalized television listings service. 107-111 - Paul B. Kantor, Endre Boros, Benjamin Melamed, Vladimir Menkov, Bracha Shapira, David J. Neu:
Enabling technologies: capturing human intelligence in the Net. 112-115 - Wlodek Zadrozny, Malgorzata Budzikowska, Joyce Yue Chai, Nanda Kambhatla, Sylvie Levesque, Nicolas Nicolov:
Enabling technologies: natural language dialogue for personalized interaction. 116-120 - Maurice D. Mulvenna, Sarabjot S. Anand, Alex G. Büchner:
Personalization on the Net using Web mining: introduction. 122-125 - Myra Spiliopoulou:
Web usage mining for Web site evaluation. 127-134 - Ibrahim Cingil, Asuman Dogac, Ayca Azgin:
A broader approach to personalization. 136-141 - Bamshad Mobasher, Robert Cooley, Jaideep Srivastava:
Automatic personalization based on Web usage mining. 142-151 - Mike Perkowitz, Oren Etzioni:
Adaptive Web sites. 152-158
- Barbara Simons:
Shrink-wrapping our rights. 168
Volume 43, Number 9, September 2000
- Diane Crawford:
Editorial Pointers. 5 - Robert Fox:
News Track. 9-10 - Diane Crawford:
Forum. 11-12
- Neil Munro:
Ethics, schmethics. 13-15
- Meg McGinity:
Body of technology. 17-19
- Andrew W. Appel, Edward W. Felten:
Technological access control interferes with noninfringing scholarship. 21-23
- Jennifer C. Lai:
Conversational Interfaces - Guest Editor's Introduction. 24-27 - Susan J. Boyce:
Natural spoken dialogue systems for telephony applications. 29-34 - Clifford Nass, Li Gong:
Speech interfaces from an evolutionary perspective. 36-43 - Sharon L. Oviatt:
Taming recognition errors with a multimodal interface. 45-51 - Bruce Lucas:
VoiceXML for Web-based distributed conversational applications. 53-57 - Mark Lucente:
Conversational interfaces for e-commerce applications. 59-61 - Ben Shneiderman:
The limits of speech recognition. 63-65 - Judith A. Markowitz:
Voice biometrics. 66-73
- Kenneth P. Fishkin, Anuj Gujar, Beverly L. Harrison, Thomas P. Moran, Roy Want:
Embodied user interfaces for really direct manipulation. 74-80 - Ram D. Gopal, G. Lawrence Sanders:
Global software piracy: you can't get blood out of a turnip. 82-89 - Robert M. Davison, Robert O. Briggs:
GSS for presentation support. 91-97 - Antonis C. Stylianou, Ram L. Kumar:
An integrative framework for IS quality management. 99-104
- Mauri Laitinen, Mohamed Fayad, Robert P. Ward:
The problem with scalability. 105-107
- Peter G. Neumann:
Missile defense. 128
Volume 43, Number 10, October 2000
- Diane Crawford:
Editorial Pointers. 5 - Robert Fox:
News Track. 9-10 - Diane Crawford:
Forum: what defines a programming relic? 11-12
- Brock N. Meeks:
Being blank in bright waters. 13-16
- Phillip G. Armour:
The five orders of ignorance. 17-20
- Edmund M. A. Ronald, Moshe Sipper:
What use is a turing chatterbox? 21-23
- Grant Larsen:
Component-based enterprise frameworks - Guest Editor's Introduction. 24-26 - Jon Hopkins:
Component primer. 27-30 - Cris Kobryn:
Modeling components and frameworks with UML. 31-38 - Mohamed E. Fayad, David S. Hamu, Davide Brugali:
Enterprise frameworks characteristics, criteria, and challanges. 39-46 - Michael Sparling:
Lessons learned: through six years of component-based development. 47-53 - Jian Lu, Yingjun Li, Xiaoxing Ma, Cai Min, XianPing Tao, Guanqun Zhang, Jianzhong Liu:
A hierarchical framework: for parallel seismic applications. 55-59 - Peter Fingar:
Component-based frameworks for e-commerce. 61-67
- Richard A. Johnson:
The ups and downs of object-oriented systems development. 68-73 - Sudip Bhattacharjee, Ram Ramesh:
Enterprise computing environments and cost assessment. 74-82 - Ritu Agarwal, Prabuddha De, Atish P. Sinha, Mohan Tanniru:
On the usability of OO representations. 83-89 - Garland Brown, Marshall L. Fisher, Ned Stoll, Dave Beeksma, Mark Black, Ron Taylor, Choe Seok Yon, Aaron J. Williams, William Bryant, Bernard J. Jansen:
Using the lessons of Y2K to improve information systems architecture. 90-97
- Zakaria Maamar, Jeff Sutherland:
Toward intelligent business objects. 99-101
- Matt Blaze, Steven M. Bellovin:
Tapping on my network door. 136
Volume 43, Number 11, November 2000
- Diane Crawford:
Editorial. 5 - Robert Fox:
News Track. 9-10 - Diane Crawford:
Forum. 11-15
- Hal Berghel:
Digital Politics 2000. 17-22
- Seymour E. Goodman, Timothy Kelly, Michael Minges, Larry Press:
Computing at the top of the world. 23-27
- Jason W. Fouts:
An "Out-of-Box" Experience. 28-29
- Steven Clift:
An Internet of democracy. 31-32
- Lambertus Hesselink:
Ultra-high-density data storage - Guest Editor's Introduction. 33-36 - Garth A. Gibson, Rodney Van Meter:
Network attached storage architecture. 37-45 - Sergei Orlov:
Volume holographic data storage. 46-54 - Terry W. McDaniel:
Magneto-optical data storage. 56-63 - Henk van Houten, Wouter Leibbrandt:
Phase change recording. 64-71 - L. Richard Carley, Gregory R. Ganger, David Nagle:
MEMS-based integrated-circuit mass-storage systems. 72-80
- Ming Fan, Jan Stallaert, Andrew B. Whinston:
The Internet and the future of financial markets. 82-88 - Philip Ginzboorg:
Seven comments on charging and billing. 89-92 - Ziming Liu, David G. Stork:
Is paperless really more? 94-97 - Amit Bhatnagar, Sanjog Misra, H. Raghav Rao:
On risk, convenience, and Internet shopping behavior. 98-105 - Ned Kock:
Benefits for virtual organizations from distributed groups. 107-112
- Robert P. Ward, Mauri Laitinen, Mohamed Fayad:
Management in the small. 113-116
- Rebecca Mercuri:
Voting automation (early and often?). 176
Volume 43, Number 11es, November 2000
- Ritu Agarwal, Jayesh Prasad, Mohan Tanniru, John Lynch:
Risks of rapid application development. 1 - Zafar Ali, Arif Ghafoor:
Synchronized delivery of multimedia information over ATM networks. 2 - Elisa Bertino, Elena Pagani, Gian Paolo Rossi, Pierangela Samarati:
Protecting information on the Web. 3 - Joseph D. Blackburn, Gary D. Scudder, Luk N. Van Wassenhove:
Concurrent software development. 4 - Susanne Bødker:
Coordinating technical support platforms. 5 - Manhoi Choy, Hong Va Leong, Man Hon Wong:
Disaster recovery techniques for database systems. 6 - Deborah A. Dahl, Lewis M. Norton, K. W. Scholz:
Commercialization of natural language processing technology. 7 - David E. Douglas, Bill C. Hardgrave:
Object-oriented curricula in academic programs. 8 - Ajit Kambil, Arnold Kamis, Marios Koufaris, Henry C. Lucas Jr.:
Influences on the corporate adoption of Web technology. 9 - Donald W. Loveland:
Automated deduction: achievements and future directions. 10 - Daniel E. O'Leary, Peter G. Selfridge:
Knowledge management for best practices. 11 - Derek Partridge:
Non-programmed computation. 12 - Arik Ragowsky, Niv Ahituv, Seev Neumann:
The benefits of using information systems. 13 - Louise Scott, Levente Horvath, Donald L. Day:
Characterizing case constraints. 14 - Vijayan Sugumaran, Mohan Tanniru, Veda C. Storey:
Supporting reuse in systems analysis. 15
Volume 43, Number 12, December 2000
- Diane Crawford:
Editorial Pointers. 5 - Robert Fox:
News track. 9-10 - Diane Crawford:
Forum: Software piracy is not just economics anymore. 11-13
- Elliot Soloway, Cathleen A. Norris, Phyllis Blumenfeld, Ronald Marx, Joseph Krajcik, Barry Fishman:
The three Ts of elementary education. 15-19
- Roy Rada, John Craparo:
Sharing standards: standardizing software projects. 21-25
- Boaz Gelbord:
Signing your 011001010 - The problems of digital signatures. 27-28
- Andrew Rosenbloom:
Trusting technology: Introduction. 31-32 - Batya Friedman, Peter H. Kahn Jr., Daniel C. Howe:
Trust online. 34-40 - Judith S. Olson, Gary M. Olson:
i2i trust in e-commerce. 41-44 - Paul Resnick, Ko Kuwabara, Richard Zeckhauser, Eric Friedman:
Reputation systems. 45-48 - Justine Cassell, Timothy W. Bickmore:
External manifestations of trustworthiness in the interface. 50-56 - Ben Shneiderman:
Designing trust into online experiences. 57-59 - Eric M. Uslaner:
Social capital and the net. 60-64
- Jennifer Kreie, Timothy Paul Cronan:
Making ethical decisions. 66-71 - Detlef Schoder, Pai-Ling Yin:
Building firm trust online. 73-79 - Sara Jones, Marc Wilikens, Philip Morris, Marcelo Masera:
Trust requirements in e-business. 81-87 - Trevor T. Moores, Gurpreet Dhillon:
Software piracy: a view from Hong Kong. 88-93
- Masud Ahmad Malik:
On the perils of programming. 95-97
- Bruce Schneier:
Semantic network attacks. 168
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.