DEPARTMENT: Editorial pointers
Diane Crawford
Pages 5-6
DEPARTMENT: News track
CACM Staff
Pages 9-10
DEPARTMENT: Forum
Pages 11-13
DEPARTMENT: Hot links
Pages 15-16
COLUMN: Security watch
The ever-changing nature of technology contributes to the problems encountered by experts when collecting and preparing digital evidence for courtroom presentation.
Rebecca Mercuri
Pages 17-21
COLUMN: Digital village
Identifying and defending against port-related vulnerabilities.
Hal Berghel, David Hoelzer
Pages 23-30
COLUMN: President's letter
DARPA's grand challenge spurred advances in the application of AI and, ironically, acted as a referendum on its de-emphasis on academic research.
David A. Patterson
Pages 31-33
COLUMN: Viewpoint
To help students understand the art of research and the reliability of sources in the age of online information, we should teach them about the nature of `truth'.
Amy S. Bruckman
Pages 35-37
SPECIAL ISSUE: The semantic e-business vision
Much work is required to understand how the conceptualizations that comprise business processes across the extended enterprise can be captured, represented, shared, and processed by both human and intelligent software agents. …
Rahul Singh, Lakshmi S. Iyer, A. F. Salam
Pages 38-41
The Web infrastructure offers businesses a way to partner and work together, integrating differing applications and communications in a seamless manner.
Jos de Bruijn, Dieter Fensel, Uwe Keller, Rubén Lara
Pages 43-47
Strengthening security within the domain of shared knowledge is a critical issue, and great challenge, to businesses today. A number of different protocols currently available offer an array of benefits and limitations.
JinKyu Lee, Shambhu J. Upadhyaya, H. Raghav Rao, Raj Sharman
Pages 48-54
Finding an effective method for managing and evaluating the performance of business processes is a key element for e-business success.
Manoj Thomas, Richard Redmond, Victoria Yoon, Rahul Singh
Pages 55-59
Moving online business processes and practices from a static collection of data to a distributed multiprocessing framework of interoperability.
Ejub Kajan, Leonid Stoimenov
Pages 60-66
Meshing formal business processes with informal human collaborations is needed to support business activities.
Thomas P. Moran, Alex Cozzi, Stephen P. Farrell
Pages 67-70
Developing secure semantic e-business applications requires focusing first on securing the Semantic Web, knowledge management, and e-business processes.
Bhavani Thuraisingham
Pages 71-73
Coupling business and IT models provides a top-down business perspective.
Juhnyoung Lee
Pages 75-77
The human meaning of domain names attracts conflict over their control, degrading their reliability as permanent handles. Solution: support handles separately from names.
Michael J. O'Donnell
Pages 78-83
Agile project management lets software project managers and employees alike adapt to changing circumstances, rather than try to impose rigid formal controls, as in traditional linear development methods.
Sanjiv Augustine, Bob Payne, Fred Sencindiver, Susan Woodcock
Pages 85-89
Seeking to enhance communication systems by adding expressive cues.
Younghwa Lee, Kenneth A. Kozar, Kai R. Larsen
Pages 91-95
Assessing the contribution of a technical skills management tool for supporting organizational learning.
Torgeir Dingsøyr, Hans Karim Djarraya, Emil Røyrvik
Pages 96-100
Biometrics are a promising technology for improving security, if they can overcome technical and social challenges.
Akhilesh Chandra, Thomas Calderon
Pages 101-106
Using critical data and predictive modeling can help identify high-risk candidates in a total health plan population.
Stephan Kudyba, G. Brent Hamar, William M. Gandy
Pages 107-110
Developing nations need a technology jumpstart—via basic technologies geared toward education, farming, and health care.
Philip F. Musa, Victor W. Mbarika, Peter Meso
Pages 111-116
COLUMN: Inside risks
Peter Denning, Jim Horning, David Parnas, Lauren Weinstein
Page 152