Volume 48,
Number 1,
January 2005
The business of software
Hot links
Staying connected
President's letter
Viewpoint
Interaction design and children
- Allison Druin, Juan Pablo Hourcade:
Introduction.
32-34
- David Kestenbaum:
The challenges of IDC: what have we learned from our past?
35-38
- Mona Leigh Guha, Allison Druin, Gene Chipman, Jerry Alan Fails, Sante Simms, Allison Farber:
Working with young children as technology design partners.
39-42
- Johanna Höysniemi, Perttu Hämäläinen, Laura Turkki, Teppo Rouvi:
Children's intuitive gestures in vision-based action games.
44-50
- Michael Eisenberg:
The material side of educational technology.
51-54
- Yvonne Rogers, Sara Price, Cliff Randell, Danae Stanton Fraser, Mark J. Weal, Geraldine Fitzpatrick:
Ubi-learning integrates indoor and outdoor experiences.
55-59
- Judy Robertson, Judith Good:
Story creation in virtual game worlds.
61-65
- RadhaKanta Mahapatra, Vincent S. Lai:
Evaluating end-user training programs.
66-70
- Andreas Holzinger:
Usability engineering methods for software developers.
71-74
- John Tillquist, Waymond Rodgers:
Using asset specificity and asset scope to measure the value of IT.
75-80
- Rodrigo C. Fonseca, Virgílio A. F. Almeida, Mark Crovella:
Locality in a web of streams.
82-88
- Ganesh Vaidyanathan:
A framework for evaluating third-party logistics.
89-94
- Michael Ettredge, John Gerdes Jr.:
Timeliness of investor relations data at corporate web sites.
95-100
- Ines Herrero, Jose L. Salmeron:
Using the DEA methodology to rank software technical efficiency.
101-105
Technical opinion
Inside risks
Volume 48,
Number 2,
February 2005
President's letter
Technology strategy and management
Viewpoint
SIGs elections
- SIGs announce candidates for election.
21-22
Hot links
Medical image modeling tools and applications
- Notice of intent to de-charter professional chapters.
61-62
- Notice of intent to de-charter student chapters.
63-65
- J. Roberto Evaristo, Kevin C. Desouza, Kevin Hollister:
Centralization momentum: the pendulum swings back again.
66-71
- Al Farooq Salam, Lakshmi S. Iyer, Prashant Palvia, Rahul Singh:
Trust in e-commerce.
72-77
- Lawrence Bodin, Lawrence A. Gordon, Martin P. Loeb:
Evaluating information security investments using the analytic hierarchy process.
78-83
- Fiona Fui-Hoon Nah, Keng Siau, Hong Sheng:
The value of mobile applications: a utility company study.
85-90
- R. Kelly Rainer Jr., Mark D. Miller:
Examining differences across journal rankings.
91-94
- Yufei Yuan, Brian Detlor:
Intelligent mobile crisis response systems.
95-98
Technical opinion
Inside risks
Volume 48,
Number 3,
March 2005
Editorial pointers
News track
Forum
ACM Fellows
President's letter
The business of software
Hot links
Viewpoint
- Gregory J. Conti:
Why computer scientists should attend hacker conferences.
23-24
Practical programmer
- Robert L. Glass:
The first business application: a significant milestone in software history.
25-26
Legally speaking
The disappearing computer
- Norbert A. Streitz, Paddy Nixon:
Introduction.
32-35
- Gaetano Borriello, Matthew Chalmers, Anthony LaMarca, Paddy Nixon:
Delivering real-world ubiquitous location systems.
36-41
- Daniel M. Russell, Norbert A. Streitz, Terry Winograd:
Building disappearing computers.
42-48
- Joëlle Coutaz, James L. Crowley, Simon Dobson, David Garlan:
Context is key.
49-53
- Steve Benford, Carsten Magerkurth, Peter Ljungstrand:
Bridging the physical and digital in pervasive gaming.
54-57
- Saadi Lahlou, Marc Langheinrich, Carsten Röcker:
Privacy and trust issues with invisible computers.
59-60
- Liam J. Bannon, Steve Benford, John Bowers, Christian Heath:
Hybrid design creates innovative museum experiences.
62-65
- Hans Gellersen:
Smart-Its: computers for artifacts in the physical world.
66
- Spyros Lalis, Alexandros Karypidis, Anthony Savidis:
Ad-hoc composition in wearable and mobile computing.
67-68
- Achilles Kameas, Irene Mavrommati:
Extrovert gadgets.
69
- Joseph A. Paradiso:
Sensate media.
70
- Anatole Gershman, Andrew E. Fano:
Examples of commercial applications of ubiquitous computing.
71
- Jacques Cohen:
Computer science and bioinformatics.
72-78
- Arun Sen, Atish P. Sinha:
A comparison of data warehousing methodologies.
79-84
SIGs elections
- SIGs announce candidates for election.
85
- Trevor T. Moores:
Do consumers understand the role of privacy seals in e-commerce?
86-91
- Bonnie Rubenstein-Montano, Victoria Y. Yoon, Stuart Lowry, Teresa Merlau:
A multiagent system for U.S. defense research contracting.
93-97
- William L. Hibbard, Curtis Rueden, Steve Emmerson, Tom Rink, David Glowacki, Tom Whittaker, Don Murray, David Fulker, John Anderson:
Java distributed components for numerical visualization in VisAD.
98-104
- Ji-Ye Mao, Karel Vredenburg, Paul W. Smith, Tom Carey:
The state of user-centered design practice.
105-109
- Xiaoni Zhang, Victor R. Prybutok:
How the mobile communication markets differ in China, the U.S., and Europe.
111-114
Technical opinion
Inside risks
Volume 48,
Number 4,
April 2005
Editorial pointers
News track
Forum
Digital village
- Hal Berghel:
The two sides of ROI: return on investment vs. risk of incarceration.
15-20
President's letter
- David A. Patterson:
The state of funding for new initiatives in computer science and engineering.
21-25
The profession of IT
Hot links
Viewpoint
Transforming China
- Maris G. Martinsons:
Introduction.
44-48
- Jonathan J. H. Zhu, Enhai Wang:
Diffusion, use, and effect of the internet in China.
49-53
- Xunhua Guo, Guoqing Chen:
Internet diffusion in Chinese companies.
54-58
- Maris G. Martinsons:
The internet enlightens and empowers Chinese society.
59-60
- Robert M. Davison, Douglas R. Vogel, Roger W. Harris:
The e-transformation of western China.
62-67
- Jing Quan, Qing Hu, Xinan Wang:
IT is not for everyone in China.
69-72
- Glen R. Burrows, Damon L. Drummond, Maris G. Martinsons:
Knowledge management in China.
73-76
- Qiang Tu, Kanliang Wang, Qin Shu:
Computer-related technostress in China.
77-81
Technical opinion
- Hai Zhuge:
Semantic grid: scientific issues, infrastructure, and methodology.
117-119
Inside risks
Volume 48,
Number 5,
May 2005
Editorial pointers
News track
Forum
Security watch
Hot links
Staying connected
President's letter
Viewpoint
- Satish Nambisan:
How to prepare tomorrow's technologists for global networks of innovation.
29-31
Adaptive complex enterprises
Articles
- Ashley A. Bush, Amrit Tiwana:
Designing sticky knowledge networks.
66-71
- Sridhar P. Nerur, RadhaKanta Mahapatra, George Mangalaraj:
Challenges of migrating to agile methodologies.
72-78
- Vincent S. Lai, Bo K. Wong:
Business types, e-strategies, and performance.
80-85
- Suzanne D. Pawlowski, Pratim Datta, Andrea L. Houston:
The (gradually) changing face of state IT jobs.
87-91
- Kenneth R. Fleischmann, William A. Wallace:
A covenant with transparency: opening the black box of models.
93-97
- Alex Potanin, James Noble, Marcus R. Frean, Robert Biddle:
Scale-free geometry in OO programs.
99-103
- Baihua Zheng, Dik Lun Lee:
Information dissemination via wireless broadcast.
105-110
- Serge Abiteboul, Rakesh Agrawal, Philip A. Bernstein, Michael J. Carey, Stefano Ceri, W. Bruce Croft, David J. DeWitt, Michael J. Franklin, Hector Garcia-Molina, Dieter Gawlick, Jim Gray, Laura M. Haas, Alon Y. Halevy, Joseph M. Hellerstein, Yannis E. Ioannidis, Martin L. Kersten, Michael J. Pazzani, Michael Lesk, David Maier, Jeffrey F. Naughton, Hans-Jörg Schek, Timos K. Sellis, Avi Silberschatz, Michael Stonebraker, Richard T. Snodgrass, Jeffrey D. Ullman, Gerhard Weikum, Jennifer Widom, Stanley B. Zdonik:
The Lowell database research self-assessment.
111-118
Technical opinion
- Ben Light:
Potential pitfalls in packaged software adoption.
119-121
Inside risks
Volume 48,
Number 6,
June 2005
Editorial pointers
News track
Forum
The business of software
Hot links
Legally speaking
President's letter
Viewpoint
3d hard copy
Articles
- U. N. Umesh, Minh Q. Huynh, Leonard M. Jessup:
Creating successful entrepreneurial ventures in IT.
82-87
- Jo Ellen Moore, Mary Sue Love:
IT professionals as organizational citizens.
88-93
- James A. M. McHugh, Fadi P. Deek:
An incentive system for reducing malware attacks.
94-99
- Jennifer Jie Xu, Hsinchun Chen:
Criminal network analysis and visualization.
100-107
- Rahul Singh, Al Farooq Salam, Lakshmi S. Iyer:
Agents in e-supply chains.
108-115
- Fiona Fui-Hoon Nah, Keng Siau, Yuhong Tian:
Knowledge management mechanisms of financial service sites.
117-123
- Tapas Kanungo, Philip Resnik, Song Mao, Doe-Wan Kim, Qigong Zheng:
The Bible and multilingual optical character recognition.
124-130
Technical opinion
- Younghwa Lee:
The CAN-SPAM Act: a silver bullet solution?
131-132
Inside risks
Volume 48,
Number 7,
July 2005
Editorial pointers
News track
Forum
President's letter
Hot links
The profession of IT
Technology strategy and management
Viewpoint
Designing for the mobile device:
experiences,
challenges,
and methods
Articles
- Barbara P. Heath, David J. McArthur, Marilyn McClelland, Ronald J. Vetter:
Metadata lessons from the iLumina digital library.
68-74
- Gun A. Lee, Gerard Jounghyun Kim, Mark Billinghurst:
Immersive authoring: What You eXperience Is What You Get (WYXIWYG).
76-81
- Dennis F. Galletta, Alexandra Durcikova, Andrea Everard, Brian M. Jones:
Does spell-checking software need a warning label?
82-86
- James J. Cappel, Victor R. Prybutok, Benny Varghese:
A closer look at attention to detail.
87-92
- Mike Thelwall:
Scientific web intelligence: finding relationships in university webs.
93-96
- Rudy Hirschheim:
The internet-based education bandwagon: look before you leap.
97-101
Technical opinion
Inside risks
Volume 48,
Number 8,
August 2005
Editorial pointers
News track
Forum
Practical programmer
Hot links
Digital village
President's letter
Viewpoint
Spyware
- Thomas F. Stafford:
Introduction.
34-36
- Steve Gibson:
Spyware was inevitable.
37-39
- Roger Thompson:
Why spyware poses multiple threats to security.
41-43
- Xiaoni Zhang:
What do consumers really know about spyware?
44-48
- Lee A. Freeman, Andrew Urbaczewski:
Why do people hate spyware?
50-53
- Neveen Farag Awad, Kristina Fitzgerald:
The deceptive behaviors that offend us most about spyware.
55-60
- Qing Hu, Tamara Dinev:
Is spyware an Internet nuisance or public menace?
61-66
- Mark B. Schmidt, Kirk P. Arnett:
Spyware: a little knowledge is a wonderful thing.
67-70
- Younghwa Lee, Kenneth A. Kozar:
Investigating factors affecting the adoption of anti-spyware systems.
72-77
- Merrill Warkentin, Xin Luo, Gary F. Templeton:
A framework for spyware assessment.
79-84
- Sudhindra Shukla, Fiona Fui-Hoon Nah:
Web browsing and spyware intrusion.
85-90
- Kirk P. Arnett, Mark B. Schmidt:
Busting the ghost in the machine.
92-95
- Robin Poston, Thomas F. Stafford, Amy Hennington:
Spyware: a view from the (online) street.
96-99
Articles
Technical opinion
Inside risks
Volume 48,
Number 9,
September 2005
Editorial pointers
News track
Forum
The business of software
Staying connected
President's letter
Hot links
Viewpoint
RFID:
tagging the world
- Gaetano Borriello:
Introduction.
34-37
- Joshua R. Smith, Kenneth P. Fishkin, Bing Jiang, Alexander Mamishev, Matthai Philipose, Adam D. Rea, Sumit Roy, Kishore Sundara-Rajan:
RFID-based techniques for human-activity detection.
39-44
- Ramesh Raskar, Paul A. Beardsley, Paul H. Dietz, Jeroen van Baar:
Photosensing wireless tags for geometric procedures.
46-51
- Trevor Pering, Rafael Ballagas, Roy Want:
Spontaneous marriages of mobile devices and interactive spaces.
53-59
- Sherry Hsi, Holly Fait:
RFID enhances visitors' museum experience at the Exploratorium.
60-65
- Miyako Ohkubo, Koutarou Suzuki, Shingo Kinoshita:
RFID privacy issues and technical challenges.
66-71
- Oliver Günther, Sarah Spiekermann:
RFID and the perception of control: the consumer's view.
73-76
- Bruce Eckfeldt:
What does RFID do for the consumer?
77-79
Articles
- Rajiv C. Shah, Jay P. Kesan:
Nurturing software.
80-85
- James Backhouse, Carol Hsu, Jimmy C. Tseng, John Baptista:
A question of trust.
87-91
- Zhenhui Jiang, Weiquan Wang, Izak Benbasat:
Multimedia-based interactive advising technology for online consumer decision support.
92-98
- Charles A. Wood, Terence T. Ow:
WEBVIEW: an SQL extension for joining corporate data to data derived from the web.
99-104
- Ping Zhang, Na Li:
The importance of affective quality.
105-108
- Hai Zhuge:
Exploring an epidemic in an e-science environment.
109-114
- Deborah K. Smith, Trevor T. Moores, Jerry Chang:
Prepare your mind for learning.
115-118
Technical opinion
Inside risks
Volume 48,
Number 10,
October 2005
Editorial pointers
News track
Forum
President's letter
- David A. Patterson:
The new Professional Development Centre boasts 1, 000 courses, O'Reilly Books, and CS classics.
15-16
Hot links
Legally speaking
Technology strategy and management
- Michael A. Cusumano:
Software in Ireland: a balance of entrepreneurship and ... lifestyle management?
25-27
Viewpoint
The digital society
Articles
- Yong Jin Kim, Rajiv Kishore, G. Lawrence Sanders:
From DQ to EQ: understanding data quality in the context of e-business systems.
75-81
- Gediminas Adomavicius, Alexander Tuzhilin:
Personalization technologies: a process-oriented perspective.
83-90
- Bipin Prabhakar, Charles R. Litecky, Kirk P. Arnett:
IT skills in a tough job market.
91-94
- Dragomir R. Radev, Jahna Otterbacher, Adam Winkel, Sasha Blair-Goldensohn:
NewsInEssence: summarizing online news topics.
95-98
- Sang M. Lee, Xin Tan, Silvana Trimi:
Current practices of leading e-government countries.
99-104
- Arvind Malhotra, Albert H. Segars:
Investigating wireless web adoption patterns in the U.S.
105-110
Technical opinion
Inside risks
Volume 48,
Number 11,
November 2005
Editorial pointers
News track
Forum
The profession of IT
Practical programmer
Hot links
Viewpoint
President's letter
Articles