How a professor of computer science returned after the country's civil war to help build the national information infrastructureand her own career.Ghinwa Jalloul Pages 25-26
An innovative way to become an invisible user is simply to get lost in the crowd. After all, anonymity loves company.Michael K. Reiter, Aviel D. Rubin Pages 32-48
One way to camouflage communication over a public network is to mingle connections from a variety of users and applications to make them difficult to distinguish.David Goldschlag, Michael Reed, Paul Syverson Pages 39-41
The Lucent Personalized Web Assistant offers a single, effective method for adopting differing personae.
Eran Gabber, Phillip B. Gibbons, David M. Kristol, Yossi Matias, Alain Mayer Pages 42-47
Web sites can bolster user confidence by clarifying their privacy practices upfront, allowing visitors to become active players in the decision-making process.Joseph Reagle, Lorrie Faith Cranor Pages 48-55
Public confidence in matters of online privacy seemingly lessens as the Internet grows. Indeed, there is mounting evidence the necessary remedy may be a protective framework that includes (gulp) legislative provisions.Roger Clarke Pages 60-67
It's not just mainframe-based applications: servers and workstations pose significant Y2K problem risks for organizations and individuals.J. Arthur Gowan, Chris Jesse, Richard G. Mathieu Pages 68-73