This new column calls for information technology to be defined as a profession rather than a discipline and invites computer scientists to cross the chasm.
Peter J. Denning Pages 15-19
Using traditional and emerging access control approaches to develop secure applications for the Web.James B. D. Joshi, Walid G. Aref, Arif Ghafoor, Eugene H. Spafford Pages 38-44
Whatever they are, the full terms of privacy these products offer are seldom made clear.David M. Martin, Richard M. Smith, Michael Brittain, Ivan Fetch, Hailin Wu Pages 45-50
Defying the legal categories of patent, copyright, and protected speech, and barring a new category all its own, software may be destined for further awkward accommodation in established law.Dan L. Burk Pages 69-75
How intellectual property laws might embrace the apparently paradoxical goals of motivating individual creation and preserving the ultimate benefits of that creation for the common good.Randall Davis Pages 77-83
How U.S. law, by adding exclusive private rights to information, favors traditional industrial production of information products and discourages the emerging culture of Net-based peer production.Yochai Benkler Pages 84-90
The increasingly uneasy coexistence between the Internet's domain-name system and established trademark law raises questions about whether the Internet's regulations are technically expert or democratic and fair.A. Michael Froomkin Pages 91-97
Despite the appeal of equating virtual and real property rights, providing relatively open Web access is likely to yield a more vibrant Internet.Maureen A. O'Rourke Pages 98-103