DEPARTMENT: Editorial pointers
Diane Crawford
Page 5
DEPARTMENT: News track
Robert Fox
Pages 9-10
DEPARTMENT: Forum
Diane Crawford
Pages 11-13
COLUMN: Electronic frontier
Where are the voices defending the very fought-after privacy rights now threatened in the name of Homeland Security?
Brock N. Meeks
Pages 15-16
COLUMN: The business of software
A natural hierarchical management response to a rapidly changing environment.
Phillip Armour
Pages 19-22
COLUMN: On site
Technology may support a knowledge-sharing environment, but getting users to participate in effective ways is key.
Jessica Brazelton, G. Anthony Gorry
Pages 23-25
DEPARTMENT: ACM inducts new fellows
Diane Crawford
Page 26
COLUMN: Viewpoint
The P2P design philosophy needs far more detail before we can appreciate a clear picture of its potential.
Detlef Schoder, Kai Fischbach
Pages 27-29
SPECIAL ISSUE: Technical and social components of peer-to-peer computing
Peer-to-Peer (P2P) computing has both technical and social components. Both these components share the attraction of distributed control, where computers operating as peers collaborate to achieve an end result without a central …
Richard Lethin
Pages 30-32
The P2P revolution promises freedom from boundaries, censorship, and centralized control. P2P proponents claim the vast untapped resource of personal computers owned by ordinary people can be combined together to build something …
John Kubiatowicz
Pages 33-38
Technologies often come wrapped in stories about politics. These stories may not explain the motives of the technologists, but they do often explain the social energy that propels the technology into the larger world. In the …
Philip E. Agre
Pages 39-42
The main challenge in P2P computing is to design and implement a robust and scalable distributed system composed of inexpensive, individually unreliable computers in unrelated administrative domains. The participants in a typical …
Hari Balakrishnan, M. Frans Kaashoek, David Karger, Robert Morris, Ion Stoica
Pages 43-48
P2P file-sharing systems enable their users to share files directly among themselves without the need for a central file server. They form one of the most well-known categories of P2P systems, thanks largely to the Napster controversy …
Jintae Lee
Pages 49-53
Comparing internal and external approaches to enterprise business integration.
Jinyoul Lee, Keng Siau, Soongoo Hong
Pages 54-60
The Enterprise Object Model captures and transforms user requirements into detailed configuration settings for ERP software, reducing ERP system configuration effort and maintenance costs.
Bay Arinze, Murugan Anandarajan
Pages 61-65
Understanding the sociotechnical aspects of Internet growth helps anticipate Internet diffusion, even in countries with vastly different socioeconomic conditions and telecommunication infrastructures.
Amitava Dutta, Rahul Roy
Pages 66-71
A method for measuring service quality that includes both the user and IS service provider perspectives.
James J. Jiang, Gary Klein, Debbie Tesch, Hong-Gee Chen
Pages 72-76
Developing a framework for enhancing the design of systems and improving management control of complex relationships.
Ravindra Krovi, Akhilesh Chandra, Balaji Rajagopalan
Pages 77-82
Want to incorporate the Internet into your business strategy? Be sure you have a sound business plan, a product that people (with enough money) want to buy, and management, employees, and contractors able to implement and use …
Xinping Shi, Philip C. Wright
Pages 83-87
COLUMN: Thinking objectively
Its potential sounds so appealing, but there are several challenges to overcome before true ubiquitous computing will garner global acceptance.
Nayeem Islam, Mohamed Fayad
Pages 89-92
COLUMN: Inside risks
Peter G. Neumann
Page 120