DEPARTMENT: Editorial pointers
Diane Crawford
Page 5
DEPARTMENT: News track
CACM Staff
Pages 9-10
DEPARTMENT: Forum
Pages 11-13
COLUMN: Digital village
Legislative mandates potentially replace CIO's primary concerns of technology risk management with the possibility of serving jail time.
Hal Berghel
Pages 15-20
DEPARTMENT: President's letter
The intellectual opportunities are huge, the social benefits transforming, yet redesigning a workable funding model for CS&E research will require our collective imagination and collaboration between many IT sectors.
David A. Patterson
Pages 21-25
COLUMN: The profession of IT
Computer science meets every criterion for being a science, but it has a self-inflicted credibility problem.
Peter J. Denning
Pages 27-31
DEPARTMENT: Hot links
Pages 33-34
COLUMN: Viewpoint
Chinese technology executives, government officials, and members of its research community are debating how far to push the country's strategy for promoting technology standards at home and abroad.
Richard P. Suttmeier
Pages 35-37
Abolishing spam, and its morphing forms, will take more than public protest and current filtering and legislative quick fixes.
Vinton G. Cerf
Pages 39-43
SPECIAL ISSUE: Transforming China
In the 19th century, Napoleon Bonaparte predicted "When China awakens, it will astonish the world." China's recent stirring from its centuries-old slumber has far-reaching implications for international business and politics, …
Maris G. Martinsons
Pages 44-48
China has embraced the Internet. As of December 2004, 94 million people had gone online, making China the second largest Internet-user market in the world, behind only the U.S., according to the China Internet Network Information …
Jonathan J. H. Zhu, Enhai Wang
Pages 49-53
The Internet is increasingly indispensable to national economies worldwide. Here, we focus on the Internet diffusion process in Chinese businesses and its link to the general growth of IT spending throughout the Chinese economy …
Xunhua Guo, Guoqing Chen
Pages 54-58
Charles Zhang is founder, chairman, and chief executive of Sohu.com, a company incorporated in the U.S. state of Delaware with headquarters in Beijing. In 2004, Sohu took in more than $100 million (U.S.) in revenue by providing …
Maris G. Martinsons
Pages 59-60
Western China is a vast area of just over four million square kilometers traditionally associated with the historic Silk Road connecting traders, manufacturers, and consumers in Europe and Asia. But for the past few hundred years …
Robert M. Davison, Douglas R. Vogel, Roger W. Harris
Pages 62-67
A 2004 report by consulting firm Gartner Dataquest forecasts that the worldwide market for IT services will top $762.3 billion in 2008, up from $608.1 billion in 2004. The Asia-Pacific region's compound annual growth rate of …
Jing Quan, Qing Hu, Xinan Wang
Pages 69-72
China's high-priority effort to become a more knowledge-based economy and society means that knowledge management (KM) is increasingly important. For example, the timely transfer and use of business knowledge can provide a competitive …
Glen R. Burrows, Damon L. Drummond, Maris G. Martinsons
Pages 73-76
Technostress has been defined as any negative effect on human attitudes, thoughts, behavior, and psychology that directly or indirectly results from technology [8]. With the recent widespread application of IT and the Internet …
Qiang Tu, Kanliang Wang, Qin Shu
Pages 77-81
In a
Forbes cover story, an investment banker expressed a preference for hiring former athletes, not because they are competitive, but "because they recycle so quickly after things go wrong" [12]. Their ability to quickly get …
Charalambos L. Iacovou, Albert S. Dexter
Pages 83-86
We are all too aware of the ravages of misconduct in the academic community. Students submit assignments inherited from their friends, online papermills provide term papers on popular topics, and occasionally researchers are …
Christian Collberg, Stephen Kobourov
Pages 88-94
Some recent integration hubs provide configurations that facilitate optimization beyond the buyer-supplier dyad provided by traditional point-to-point integration. We argue that coordination so far has been preliminary dyadic …
Ellen Christiaanse
Pages 95-100
In times of ubiquitous electronic communication and increasing industry pressure for standard electronic authentication, the maintenance of privacy, or "the right to be left alone" becomes a subject of increasing concern. The …
Bettina Berendt, Oliver GÜnther, Sarah Spiekermann
Pages 101-106
Current business modeling methods are one-dimensional. Here, an integrated modeling approach helps decision makers study the enterprise as a whole from multiple perspectives.
Dursun Delen, Nikunj P. Dalal, Perakath C. Benjamin
Pages 107-112
Effectively utilizing distributed computational resources while hiding the complexity of the network programming.
K. C. Tan, M. L. Wang, W. Peng
Pages 113-116
COLUMN: Technical opinion
Creating a new interconnection environment incorporating the Internet, sensor networks, mobile devices, and the interconnection semantics.
Hai Zhuge
Pages 117-119
COLUMN: Inside risks
Bruce Schneier
Page 136