Diane Crawford
Page 5
Robert Fox
Pages 9-10
After a second consulting visit to a software company, what seemed so obvious the first time suddenly seemed less so.
Robert L. Glass
Pages 11-13
Getting from here to there: Putting a boundary around process.
Phillip G. Armour
Pages 15-17
Replacing an inequitable system with one that will better serve the world.
Lenny Foner
Pages 19-21
Åke Grönlund
Pages 22-26
Implementing a true e-democracy requires a careful and comprehensive plan for citizens to learn how to use it.
Richard T. Watson, Bryan Mundy
Pages 27-30
Fitting democracy into the techno-economic mold of the European Union is easier said than done.
Ari-Veikko Anttiroiko
Pages 31-35
An essential part of democracy is the debate. In a thin democracy (see Åström's article in this section), the elected representatives do the debating. This is not only for ideological reasons, but also for practical reasons. …
Per-Olof Ågren
Pages 36-38
Information and communication technologies are transforming democracies worldwide. In fact, we are only beginning to tap their true potential.
Ted Becker
Pages 39-43
Ignace Snellen
Pages 45-48
Joachim Åström
Pages 49-51
The computing community is responsible for building the tools that have worked to change the face of democracy. But can we do more as responsible citizens?
Doug Schuler
Pages 52-57
Some of the best examples of using technologies to strengthen the democractic role can be found in the efforts of voluntary campaign organizations.
John A. Taylor, Eleanor Burt
Pages 58-62
The Cyberspace Policy Research Group tracks the diffusion and use of the Web in governments around the world and their survey serves up some fascinating findings.
Todd M. La Porte, Chris C. Demchak, Christian Friis
Pages 63-67
A way to ensure free and fair elections or an electronic invitation for ballot fraud and unequal representation?
Lance J. Hoffman, Lorrie Cranor
Pages 69-71
The March 2000 Arizona Democratic Party's presidential preference primary illustrates the promise of accessibility, inclusiveness, and accountability in online elections.
Joe Mohen, Julia Glidden
Pages 72-ff.
Removed from independent public scrutiny, hidden inside a possibly insecure infrastructure, Internet voting may offer a cloak for vote theft, voter coercion, and lost public confidence in the outcome.
Deborah M. Phillips, Hans A. von Spakovsky
Pages 73-ff.
Finding a place to efficiently store all of one's digital materials.
Gordon Bell
Pages 86-91
Improvements are needed in network infrastructure and protocols for continued growth of the Internet.
Thomas M. Chen
Pages 93-98
Maximizing the channel potential increases the business value of a firm's Web site.
Abhijit Chaudhury, Debasish Mallick, H. Raghav Rao
Pages 99-104
Simon N. Foley, Robert Dumigan
Pages 105-107
Rebecca T. Mercuri, Peter G. Neumann
Page 160