default search action
Communications of the ACM (CACM), Volume 47, 2004
Volume 47, Number 1, January 2004
- Diane Crawford:
Editorial pointers. 5 - News track. 9-10
- Diane Crawford:
Forum. 11-13
- Meg McGinity:
RFID: is this game of tag fair play? 15-18
- Phillip G. Armour:
When executives code. 19-22 - ACM annual report for FY03. 23-29
- Sharon L. Oviatt, Trevor Darrell, Myron Flickner:
Introduction. 30-33 - Anil K. Jain, Arun Ross:
Multibiometric systems. 34-40 - Philip R. Cohen, David McGee:
Tangible multimodal interfaces for safety-critical applications. 41-46 - Roberto Pieraccini, Krishna Dayanidhi, Jonathan Bloom, Jean-Gui Dahan, Michael Phillips, Bryan R. Goodman, K. Venkatesh Prasad:
Multimodal conversational systems for automobiles. 47-49 - Harriet J. Nock, Giridharan Iyengar, Chalapathy Neti:
Multimodal processing by finding common cause. 51-56 - Leah Reeves, Jennifer C. Lai, James A. Larson, Sharon L. Oviatt, T. S. Balaji, Stéphanie Buisine, Penny Collings, Philip R. Cohen, Ben Kraal, Jean-Claude Martin, Michael F. McTear, T. V. Raman, Kay M. Stanney, Hui Su, Qian Ying Wang:
Guidelines for multimodal user interface design. 57-59 - Matthew A. Turk:
Computer vision in the interface. 60-67 - Li Deng, Xuedong Huang:
Challenges in adopting speech recognition. 69-75
- Cynthia F. Cohen, Stanley J. Birkin, Monica J. Garfield, Harold W. Webb:
Managing conflict in software testing. 76-81 - Albert B. Schwarzkopf, Roberto J. Mejias, Jon Jasperson, Carol S. Saunders, Hermann Gruenwald:
Effective practices for IT skills staffing. 83-88 - B. Craig Cumberland, Joseph S. Valacich, Leonard M. Jessup:
Understanding meteor burst communications technologies. 89-92 - Robert J. Aiken, Javad Boroumand, Stephen S. Wolff:
Network and computing research infrastructure: back to the future. 93-98 - Ronald Dattero, Stuart Diaz Galup:
Programming languages and gender. 99-102 - Seungkyoon Shin, Ram D. Gopal, G. Lawrence Sanders, Andrew B. Whinston:
Global software piracy revisited. 103-107 - Wenhong Luo, Mohammad Najdawi:
Trust-building measures: a review of consumer health portals. 108-113
- Marcus J. Ranum:
Believing in myths. 144
Volume 47, Number 2, February 2004
- Diane Crawford:
Editorial pointers. 5 - News track. 9-10
- Diane Crawford:
Forum. 11-13
- Pamela Samuelson:
What's at stake in MGM v. Grokster? 15-20
- Gregory J. Pottie:
Privacy in the global e-village. 21-23
- Robert L. Glass:
A look at the economics of open source. 25-27
- Jakka Sairamesh, Alison Lee, Loretta Anania:
Introduction. 28-31 - Lee S. Sproull, John F. Patterson:
Making information cities livable. 33-37 - Elizabeth F. Churchill, Andreas Girgensohn, Les Nelson, Alison Lee:
Blending digital and physical spaces for ubiquitous community participation. 38-44 - Donald F. Ferguson, Jakka Sairamesh, Stuart I. Feldman:
Open frameworks for information cities. 45-49 - Petros Kavassalis, Stelios Lelis, Mahmoud Rafea, Seif Haridi:
What makes a Web site popular? 50-55
- Luis von Ahn, Manuel Blum, John Langford:
Telling humans and computers apart automatically. 56-60 - Yossi Lichtenstein:
Puzzles in software development contracting. 61-65 - Conan C. Albrecht:
How clean is the future of SOAP? 66-68 - Rajiv Kishore, Hong Zhang, Ram Ramesh:
A Helix-Spindle model for ontological engineering. 69-75 - Pearl Brereton:
The software customer/supplier relationship. 77-81 - Elizabeth M. Pierce:
Assessing data quality with control matrices. 82-86 - Patrick Y. K. Chau, Paul Jen-Hwa Hu:
Technology implementation for telemedicine programs. 87-92 - Csaba J. Egyhazy, Raj Mukherji:
Interoperability architecture using RM-ODP. 93-97
- Ruth Bolotin Schwartz, Michele C. Russo:
How to quickly find articles in the top IS journals. 98-101
- Lauren Weinstein:
Outsourced and out of control. 120
Volume 47, Number 3, March 2004
- Diane Crawford:
Editorial pointers. 5 - News track. 9-10
- Diane Crawford:
Forum. 11-13
- Rebecca Mercuri:
Superscaled security. 15-18 - ACM fellows. 19-20
- Phillip G. Armour:
Beware of counting LOC. 21-24
- Michael A. Cusumano:
Who is liable for bugs and security flaws in software? 25-27
- John G. Messerly:
How computer games affect CS (and other) students' school performance. 29-31
- John Yen:
Introduction to the special issue on emerging technologies for homeland security. 32-35 - Robert L. Popp, Thomas Armour, Ted E. Senator, Kristen Numrych:
Countering terrorism through information technology. 36-43 - Thayne Coffman, Seth Greenblatt, Sherry Marcus:
Graph-based technologies for intelligence analysis. 45-47 - Paul A. Kogut, John Yen, Yui Leung, Shuang Sun, Rui Wang, Ted Mielczarek, Ben Hellar:
Proactive information gathering for homeland security teams. 48-50 - O. Sami Saydjari:
Cyber defense: art to science. 52-57 - Ruzena Bajcsy, Terry Benzel, Matt Bishop, Robert Braden, Carla E. Brodley, Sonia Fahmy, Sally Floyd, Wes Hardaker, Anthony D. Joseph, George Kesidis, Karl N. Levitt, Robert Lindell, Peng Liu, David J. Miller, Russ Mundy, Clifford Neuman, Ron Ostrenga, Vern Paxson, Phillip A. Porras, Catherine Rosenberg, J. Doug Tygar, Shankar Sastry, Daniel F. Sterne, Shyhtsun Felix Wu:
Cyber defense technology networking and evaluation. 58-61 - Steve Sawyer, Andrea H. Tapia, Leonard Pesheck, John Davenport:
Mobility and the first responder. 62-65 - Robin R. Murphy:
Rescue robotics for homeland security. 66-68
- Gang Wang, Hsinchun Chen, Homa Atabakhsh:
Automatically detecting deceptive criminal identities. 70-76 - Alberto Escudero-Pascual, Ian Hosein:
Questioning lawful access to traffic data. 77-82 - Nikunj P. Dalal, Manjunath Kamath, William J. Kolarik, Eswar Sivaraman:
Toward an integrated framework for modeling enterprise processes. 83-87 - Luigi Suardi:
How to manage your software product life cycle with MAUI. 89-94 - Eyong B. Kim, Marc J. Schniederjans:
The role of personality in Web-based distance education courses. 95-98 - Vikram Sethi, Ruth C. King, James Campbell Quick:
What causes stress in information system professionals? 99-102
- Mark Stamp:
Risks of monoculture. 120
Volume 47, Number 4, April 2004
- Diane Crawford:
Editorial pointers. 5 - News track. 9-10
- Diane Crawford:
Forum. 11-13
- John White:
ACM's Professional Development Centre expands learning opportunities. 14
- Peter J. Denning:
The social life of innovation. 15-19
- Hal Berghel, Natasa Brajkovska:
Wading into alternate data streams. 21-27
- Eric M. Uslaner:
Trust online, trust offline. 28-29
- Christopher A. Miller:
Introduction. 30-34 - Clifford Nass:
Etiquette equality: exhibitions and expectations of computer politeness. 35-37 - Timothy W. Bickmore:
Unspoken rules of spoken interaction. 38-44 - Punya Mishra, Kathryn A. Hershey:
Etiquette and the design of educational technology. 45-49 - Raja Parasuraman, Christopher A. Miller:
Trust and etiquette in high-criticality automated systems. 51-55 - Jennifer Preece:
Etiquette online: from nice to necessary. 56-61
- Srinivas Krishna, Sundeep Sahay, Geoff Walsham:
Managing cross-cultural issues in global software outsourcing. 62-66 - Linda G. Wallace, Mark Keil:
Software project risks and their effect on outcomes. 68-73 - Blake Ives, Kenneth R. Walsh, Helmut Schneider:
The domino effect of password reuse. 75-78 - Anat Hovav, Paul Gray:
Managing academic e-journals. 79-82 - Petros Nicopolitidis, Georgios I. Papadimitriou, Mohammad S. Obaidat, Andreas S. Pomportsis:
The economics of wireless networks. 83-86 - Kevin C. Desouza, J. Roberto Evaristo:
Managing knowledge in distributed projects. 87-91 - Xiaotong Li:
Informational cascades in IT adoption. 93-97
- John Gerdes Jr.:
The viability of supporting anonymous employees. 98-100
- James J. Horning:
Coincidental risks. 112
Volume 47, Number 5, May 2004
- Diane Crawford:
Editorial pointers. 5 - News track. 9-10
- Diane Crawford:
Forum. 11-13
- Meg McGinity:
It's alive. 15-18
- Robert L. Glass:
Matching methodology to problem domain. 19-21
- Jeff Grove:
Wanted: public policies that foster creation of knowledge. 23-25
- Kuldeep Kumar, Jos van Hillegersberg:
Introduction. 26-30 - Krishnan Dandapani:
Success and failure in Web-based financial services. 31-33 - Ulrich Homann, Michael Rill, Andreas Wimmer:
Flexible value structures in banking. 34-36 - Alberto Pan, Ángel Viña:
An alternative architecture for financial data integration. 37-40 - Niina Mallat, Matti Rossi, Virpi Kristiina Tuunainen:
Mobile banking services. 42-46 - N. Chandrasekaran, Geert Ensing:
ODC: a global IT services delivery model. 47-49 - Jeroen Tas, Shyam Sunder:
Financial services business process outsourcing. 50-52 - John S. Zdanowicz:
Detecting money laundering and terrorist financing via data mining. 53-55 - Ton Slewe, Mark Hoogenboom:
Who will rob you on the digital highway? 56-60
- Sarv Devaraj, S. Ramesh Babu:
How to measure the relationship between training and job performance. 62-67 - Weidong Xia, Gwanhoo Lee:
Grasping the complexity of IS development projects. 68-74 - Dongsong Zhang, J. Leon Zhao, Lina Zhou, Jay F. Nunamaker Jr.:
Can e-learning replace classroom learning? 75-79 - I. Robert Chiang, Vijay S. Mookerjee:
Improving software team productivity. 89-93 - Rishi Toshniwal, Dharma P. Agrawal:
Tracing the roots of markup languages. 95-98
- Gerald Segal:
2004 ACM elections. 80-89
- Masanori Arita:
Comma-free design for DNA words. 99-100
- Peter J. Denning, Dorothy E. Denning:
Artificial stupidity. 112
Volume 47, Number 6, June 2004
- Diane Crawford:
Editorial pointers. 5 - News track. 9-10
- Diane Crawford:
Forum. 11-13
- Phillip G. Armour:
Real work, necessary friction, optional chaos. 15-18
- Pamela Samuelson:
Why reform the U.S. patent system? 19-23
- Stephen Lau:
The Spinning Cube of Potential Doom. 25-26
- Allan Glaser, Snow Fu, Mark Tumelty:
Growing a participatory programming environment. 27-29
- David E. Culler, Wei Hong:
Wireless Sensor Networks - Introduction. 30-33 - Robert Szewczyk, Eric Osterweil, Joseph Polastre, Michael Hamilton, Alan M. Mainwaring, Deborah Estrin:
Habitat monitoring with sensor networks. 34-40 - Jason L. Hill, Mike Horton, Ralph Kling, Lakshman Krishnamurthy:
The platforms enabling wireless sensor networks. 41-46 - Alec Woo, Samuel Madden, Ramesh Govindan:
Networking support for query processing in sensor networks. 47-52 - Adrian Perrig, John A. Stankovic, David A. Wagner:
Security in wireless sensor networks. 53-57
- Janice C. Sipior, Burke T. Ward, P. Gregory Bonner:
Should spam be on the menu? 59-63 - Banphot Vatanasombut, Antonis C. Stylianou, Magid Igbaria:
How to retain online customers. 64-70 - Clayton A. Looney, Leonard M. Jessup, Joseph S. Valacich:
Emerging business models for mobile brokerage services. 71-77 - Narasimhaiah Gorla, Yan Wah Lam:
Who should work with whom?: building effective software project teams. 79-82 - Hal Berghel, David L. Sallach:
A paradigm shift in computing and IT education. 83-88 - Robert L. Glass, Venkataraman Ramesh, Iris Vessey:
An analysis of research in computing disciplines. 89-94 - Weiling Ke, Kwok Kee Wei:
Successful e-government in Singapore. 95-99
- Hartmut Wedekind, Erich Ortner:
Toward universal literacy: from computer science upward. 101-104
- Peter G. Neumann:
Optimistic optimization. 112
Volume 47, Number 7, July 2004
- Diane Crawford:
Editorial pointers. 5 - News track. 9-10
- Diane Crawford:
Forum. 11-13
- Peter J. Denning:
The field of programmers myth. 15-20
- Victor Wacham A. Mbarika:
Is telemedicine the panacea for Sub-Saharan Africa's medical nightmare? 21-24
- Rebecca Mercuri:
The HIPAA-potamus in health care data security. 25-28
- Michael A. Cusumano:
More lawyers than programmers? 29-31
- Catherine L. Mann:
What global sourcing means for U.S. IT workers and for the U.S. economy. 33-35
- Donna L. Hoffman, Thomas P. Novak, Alladi Venkatesh:
Has the Internet become indispensable? 37-42 - Linda A. Jackson, Alexander von Eye, Gretchen Barbatsis, Frank A. Biocca, Hiram E. Fitzgerald, Yong Zhao:
The impact of Internet use on the other side of the digital divide. 43-47 - Warren Harrison, George Heuston, Sarah Mocas, Mark Morrissey, John Richardson:
High-tech forensics. 49-52 - George P. Schell:
Universities marginalize online courses. 53-56 - Kaushal Chari, Saravanan Seshadri:
Demystifying integration. 59-63 - Maris G. Martinsons:
ERP in China: one package, two profiles. 65-68 - Huigang Liang, Yajiong Xue, William R. Boulton, Terry Anthony Byrd:
Why Western vendors don't dominate China's ERP market. 69-72 - Troy J. Strader, Sridhar N. Ramaswami:
Investor perceptions of traditional and online channels. 73-76 - Graeme G. Shanks, Elizabeth Tansley, Ron Weber:
Representing composites in conceptual modeling. 77-80 - Narasimha Bolloju:
Improving the quality of business object models using collaboration patterns. 81-86 - Huseyin Cavusoglu, Birendra K. Mishra, Srinivasan Raghunathan:
A model for evaluating IT security investments. 87-92
- Paul C. Kocher, Bruce Schneier:
Insider risks in elections. 104
Volume 47, Number 8, August 2004
- Diane Crawford:
Editorial pointers. 5 - News track. 9-10
- Diane Crawford:
Forum. 11-13
- Robert L. Glass:
The mystery of formal methods disuse. 15-17
- Peter Freeman, David Hart:
A science of design for software-intensive systems. 19-21
- Martin E. Bush:
Computer science education in Japan. 23-26
- Andrew Rosenbloom:
Introduction. 28-31 - Chris Scharver, Ray Evenhouse, Andrew E. Johnson, Jason Leigh:
Designing cranial implants in a haptic augmented reality environment. 32-38 - Ming C. Lin, William V. Baxter III, Vincent Scheib, Jeremy D. Wendt:
Physically based virtual painting. 40-47 - Benjamin Lok:
Toward the merging of real and virtual spaces. 48-53 - Mike Houston, Christopher Niederauer, Maneesh Agrawala, Greg Humphreys:
Visualizing dynamic architectural environments. 54-59 - Charles E. Jacobs, Wilmot Li, Evan Schrier, David Bargeron, David Salesin:
Adaptive document layout. 60-66 - Mike Burmester, Yvo Desmedt:
Is hierarchical public-key certification the next target for hackers? 68-74 - Rolf Oppliger:
Certified mail: the next challenge for secure messaging. 75-79 - John Gallaugher, Nigel Melville:
Electronic frontiers in foreign exchange trading. 81-87 - 2004 ACM awards banquet: a night to celebrate. 89-92
- Ralph D. Westfall:
Does telecommuting really increase productivity? 93-96 - David J. Paper, James A. Rodger, Steven John Simon:
Voice says it all in the Navy. 97-101 - Ahmed Elfatatry, Paul J. Layzell:
Negotiating in service-oriented environments. 103-108
- Lauren Weinstein:
Close exposures of the digital kind. 120
Volume 47, Number 9, September 2004
- Diane Crawford:
Editorial pointers. 5 - News track. 9-10
- Diane Crawford:
Forum. 11-13
- Meg McGinity:
Weaving a wireless safety net. 15-18
- Hal Berghel:
Wireless infidelity I: war driving. 21-26
- James A. Jacobs, Charles Humphrey:
Preserving research data. 27-29
- Alistair G. Sutcliffe, Nikolay Mehandjiev:
Introduction. 31-32 - Gerhard Fischer, Elisa Giaccardi, Yunwen Ye, Alistair G. Sutcliffe, Nikolay Mehandjiev:
Meta-design: a manifesto for end-user development. 33-37 - Joerg Beringer:
Reducing expertise tension. 39-40 - Volker Wulf, Matthias Jarke:
The economics of end-user development. 41-42 - Alexander Repenning, Andri Ioannidou:
Agent-based end-user development. 43-46 - Brad A. Myers, John F. Pane, Amy J. Ko:
Natural programming languages and environments. 47-52 - Margaret M. Burnett, Curtis R. Cook, Gregg Rothermel:
End-user software engineering. 53-58 - Anders I. Mørch, Gunnar Stevens, Markus Won, Markus Klann, Yvonne Dittrich, Volker Wulf:
Component-based technologies for end-user development. 59-62 - Silvia Berti, Fabio Paternò, Carmen Santoro:
Natural development of ubiquitous interfaces. 63-64 - Alan F. Blackwell:
End-user developers at home. 65-66 - Paul Resnick, Derek L. Hansen, Caroline R. Richardson:
Calculating error rates for filtering software. 67-71 - Ozgur Turetken, David Schuff, Ramesh Sharda, Terence T. Ow:
Supporting systems analysis and design through fisheye views. 72-77 - Hai Zhuge, Xiaoqing Shi:
Toward the eco-grid: a harmoniously evolved interconnection environment. 78-83 - Michael J. Hine, Mark Hill, David Ruth, Bob Carlson, Dave Banks, Jim Troxell:
Empowering persons with disabilities with decision-support technology. 85-89 - Susan K. Lippert, Murugan Anandarajan:
Academic vs. practitioner systems planning and analysis. 91-94
- Jason E. Bailes, Gary F. Templeton:
Managing P2P security. 95-98
- Peter G. Neumann:
The big picture. 112
Volume 47, Number 10, October 2004
- Diane Crawford:
Editorial pointers. 5 - News track. 9-10
- Diane Crawford:
Forum. 11-13
- Phillip G. Armour:
Not-defect: the mature discipline of testing. 15-18
- David A. Patterson:
Hot links. 19-20
- Fred von Lohmann:
Voluntary collective licensing for music file sharing. 21-24
- Michael A. Cusumano:
Reflections on free and open software. 25-27
- Peter G. Neumann:
Introduction. 28-30 - Herb Deutsch, Stephen Berger:
Voting systems standards and certifications. 31-33 - Carolyn Coggins:
Independent testing of voting systems. 34-38 - Brit J. Williams, Merle S. King:
Implementing voting systems: the Georgia method. 39-42 - Anthony Di Franco, Andrew Petro, Emmett Shear, Vladimir Vladimirov:
Small vote manipulations can swing elections. 43-45 - Douglas W. Jones:
Auditing elections. 46-50 - Rebecca T. Mercuri, L. Jean Camp:
The code of elections. 52-57 - David R. Jefferson, Aviel D. Rubin, Barbara Simons, David A. Wagner:
Analyzing internet voting security. 59-64 - Jason Kitcat:
Source availability and e-voting: an advocate recants. 65-67 - Jeff Grove:
ACM statement on voting systems. 69-70 - David A. Patterson:
Latency lags bandwith. 71-75 - Huaiqing Wang, Shuozhong Wang:
Cyber warfare: steganography vs. steganalysis. 76-82 - Ioannis Samoladas, Ioannis Stamelos, Lefteris Angelis, Apostolos Oikonomou:
Open source software development should strive for even greater code maintainability. 83-87 - Nancy J. Lightner:
Evaluating e-commerce functionality with a focus on customer service. 88-92 - Michael Alan Smith:
Portals: toward an application framework for interoperability. 93-97 - Peter B. Southard, Keng Siau:
A survey of online e-banking retail initiatives. 99-102
- Casey G. Cegielski:
Who values technology certification? 103-105
- Bruce Schneier:
The nonsecurity of secrecy. 120
Volume 47, Number 11, November 2004
- Diane Crawford:
Editorial pointers. 5-6 - News track. 9-10
- Diane Crawford:
Forum. 11-13
- Peter J. Denning:
Network laws. 15-20
- Diane Crawford:
Top 10 downloads from ACM's portal. 21-22
- Robert L. Glass:
Is this a revolutionary idea, or not? 23-25
- Norman S. Matloff:
Globalization and the American IT worker. 27-29
- Craig A. Stewart:
Introduction. 30-33 - David A. Bader:
Computational biology and high-performance computing. 34-41 - Toshikazu Ebisuzaki, Robert S. Germain, Makoto Taiji:
PetaFLOPS computing. 42-45 - Ross A. Overbeek, Terry Disz, Rick L. Stevens:
The SEED: a peer-to-peer environment for genome annotation. 46-51 - Mark H. Ellisman, Michael Brady, David Hart, Fang-Pang Lin, Matthias S. Müller, Larry Smarr:
The emerging role of biogrids. 52-57 - Homa Javahery, Ahmed Seffah, Thiruvengadam Radhakrishnan:
Beyond power: making bioinformatics tools user-centered. 58-63 - Christopher R. Johnson, Robert S. MacLeod, Steven G. Parker, David M. Weinstein:
Biomedical computing and visualization software environments. 64-71 - Amrit Tiwana, Mark Keil:
The one-minute risk assessment tool. 73-77 - James Y. L. Thong, Weiyin Hong, Kar Yan Tam:
What leads to acceptance of digital libraries? 78-83 - Theresa Edgington, Beomjin Choi, Katherine Henson, T. S. Raghu, Ajay S. Vinze:
Adopting ontology to facilitate knowledge sharing. 85-90 - Shobha Ganapathy, C. Ranganathan, Balaji Sankaranarayanan:
Visualization strategies and tools for enhancing customer relationship management. 92-99 - Markus Biehl, Edmund L. Prater, John R. McIntyre:
Remote repair, diagnostics, and maintenance. 100-106 - Thomas F. Stafford, Dennis Gonier:
What Americans like about being online. 107-112
- Ken Donaldson, Vicki Stone:
Nanoscience fact versus fiction. 113-115
- Poorvi L. Vora, Ben Adida, Ren Bucholz, David Chaum, David L. Dill, David R. Jefferson, Douglas W. Jones, William Lattin, Aviel D. Rubin, Michael Ian Shamos, Moti Yung:
Evaluation of voting systems. 144
Volume 47, Number 12, December 2004
- Diane Crawford:
Editorial pointers. 5 - News track. 9-10
- Diane Crawford:
Forum. 11-13
- Hal Berghel, Jacob Uecker:
Wireless infidelity II: airjacking. 15-20
- Diane Crawford:
Top 10 Downloads from ACM's Digital Library. 21-22
- David A. Patterson:
The health of research conferences and the dearth of big idea papers. 23-24
- Rebecca T. Mercuri:
The many colors of multimedia security. 25-29
- Andrew Rosenbloom:
Introduction. 30-33 - Ravi Kumar, Jasmine Novak, Prabhakar Raghavan, Andrew Tomkins:
Structure and evolution of blogspace. 35-39 - Bonnie A. Nardi, Diane J. Schiano, Michelle Gumbrecht, Luke Swartz:
Why we blog. 41-46 - Steve Cayzer:
Semantic blogging and decentralized knowledge management. 47-52 - Rebecca Blood:
How blogging software reshapes the online community. 53-55 - Cass R. Sunstein:
Democracy and filtering. 57-59
- Kenneth P. Birman:
Like it or not, web services are distributed objects. 60-62 - ACM annual report for FY04. 63-69
- Ahmed Seffah, Eduard Metzker:
The obstacles and myths of usability and software engineering. 71-76 - Pratyush Bharati, Abhijit Chaudhury:
Using choiceboards to create business value. 77-81 - Eleanor T. Loiacono:
Cyberaccess: web accessibility and corporate America. 82-87 - Yogesh Malhotra, Dennis F. Galletta:
Building systems that users want to use. 88-94 - Steve Sawyer:
Software development teams. 95-99 - Hannes Werthner, Francesco Ricci:
E-commerce and tourism. 101-105
- Steven M. Bellovin:
Spamming, phishing, authentication, and privacy. 144
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.