DEPARTMENT: Editorial pointers
Diane Crawford
Page 5
DEPARTMENT: News track
CACM Staff
Pages 9-10
DEPARTMENT: Forum
Diane Crawford
Pages 11-13
COLUMN: Legally speaking
Seeking to balance the needs of copyright holders and technology developers.
Pamela Samuelson
Pages 15-20
COLUMN: Viewpoint
Embed responsibility for privacy into radio-frequency identification tags and other information technology designed to network the physical world.
Gregory J. Pottie
Pages 21-23
COLUMN: Practical programmer
Is open source the future of the software field or a passing fad?
Robert L. Glass
Pages 25-27
SPECIAL ISSUE: Information cities
With so many of us infohabitants living and working on the Internet, we've now established urban centers there, with dwellings, commerce, social and civic services, government institutions, and lots of social interaction.
Jakka Sairamesh, Alison Lee, Loretta Anania
Pages 28-31
Let the most rewarding aspects of our virtual experience and online social interaction also guide participation in our real-world physical communities.
Lee Sproull, John F. Patterson
Pages 33-37
Blurring the notional boundary between the digital and the physical in social activity spaces helps blend---and motivate---online and face-to-face community participation.
Elizabeth Churchill, Andreas Girgensohn, Les Nelson, Alison Lee
Pages 38-44
Helping mimic full-scale urban environments, this middleware promises to help build a vast ecosystem of e-commerce, collaboration, and social computing, along with access to real-world municipal regulations and services.
Donald Ferguson, Jakka Sairamesh, Stuart Feldman
Pages 45-49
To ensure a constant increase in user interest, clicks, recommendations, loyalty, and market share, first understand the information flows and connection networks surrounding each Web site in cyberspace.
Petros Kavassalis, Stelios Lelis, Mahmoud Rafea, Seif Haridi
Pages 50-55
How lazy cryptographers do AI.
Luis von Ahn, Manuel Blum, John Langford
Pages 56-60
Current outsourcing practices are relatively unsophisticated in comparison with the techniques prescribed by economic theory. Customers end up bearing all long-term risk, and vendors have no direct incentive to achieve long-term …
Yossi Lichtenstein
Pages 61-65
If developers are not wise with its application, SOAP may lose the ability to tunnel through firewalls---an ability that represents one of its primary advantages.
Conan C. Albrecht
Pages 66-68
Using a forward-lockstep build-test process that combines theoretic and pragmatic approaches to ontology building.
Rajiv Kishore, Hong Zhang, R. Ramesh
Pages 69-75
It's a delicate, dynamic relationship that changes with time, demands, and different approaches to procurement.
Pearl Brereton
Pages 77-81
The control matrix, long used by IS auditors to evaluate information integrity, can be modified to assess the reliability of information products.
Elizabeth M. Pierce
Pages 82-86
Lessons learned in Hong Kong highlight important issues and common pitfalls in telemedicine technology implementation.
Patrick Y. K. Chau, Paul Jen-Hwa Hu
Pages 87-92
RM-ODP gives architects the level of detail necessary to address key integration and interoperability issues.
Csaba Egyhazy, Raj Mukherji
Pages 93-97
COLUMN: Technical opinion
Informed searches begin by determining which indexes to use.
Ruth Bolotin Schwartz, Michele C. Russo
Pages 98-101
COLUMN: Inside risks
Lauren Weinstein
Page 120