DEPARTMENT: Editorial pointers
Diane Crawford
Page 5
DEPARTMENT: News track
CACM Staff
Pages 9-10
DEPARTMENT: Forum
Pages 11-13
COLUMN: Practical programmer
In this second installment of a three-part series, the succession of interconnected creative milestones is traced.
Robert L. Glass
Pages 15-18
DEPARTMENT: Hot links
Pages 19-20
COLUMN: Digital village
The security risks of WiFi connectivity have been established---the reasons for these risks of intrusion are not as well understood.
Hal Berghel, Jacob Uecker
Pages 21-28
DEPARTMENT: President's letter
ACM is one of many organizations that sponsors IT conferences and journals. So, why use ACM?
David A. Patterson
Pages 29-30
COLUMN: Viewpoint
Computer science is nothing less than a new way of thinking; explaining it to the wider world is critical to the future of the field.
Sanjeev Arora, Bernard Chazelle
Pages 31-33
SPECIAL ISSUE: Spyware
Anyone who has ever dealt with spyware knows the irritation of lost bandwidth, the frustration of commandeered machine processor cycles, the innumerable pop-up ads and spam trails that result from an infestation. It is indeed …
Thomas F. Stafford
Pages 34-36
That which begins as minor nuisances and curiosities enabled by the subversion of new technological capabilities has always evolved into invasive problems once someone has found a way to profit from their application.
Steve Gibson
Pages 37-39
Spyware is becoming a relentless onslaught from those seeking to capture and use private information for their own ends. Spyware is annoying and negatively impacts the computing experience. Even worse, there are real and significant …
Roger Thompson
Pages 41-43
Technology has revolutionized information collection and distribution to the point where marketers have expanded and implemented new technologies to enable efficient consumer information acquisition. Such sophisticated data collection …
Xiaoni Zhang
Pages 44-48
Few people or corporations believe spyware is beneficial to the computing experience, but this issue has not been well studied [6]. This assertion is based on the trade press and countless Internet sites providing numerous articles …
Lee A. Freeman, Andrew Urbaczewski
Pages 50-53
Before effective legislation against spyware can be drawn, lawmakers and vendors must understand what users find most deceptive and offensive about this stealth software.
Neveen Farag Awad, Kristina Fitzgerald
Pages 55-60
Recent media attention to spyware [2, 5, 7, 8] has brought to light the blunt intrusion into individual privacy and the uncertain hidden cost of free access to Internet sites, along with freeware and shareware. Most spyware programs …
Qing Hu, Tamara Dinev
Pages 61-66
With the increased dependence on networks and the near ubiquitous availability of the Internet, there is a new paradigm in place for the proliferation of spyware, viruses, and other malware. In fact, much attention has been given …
Mark B. Schmidt, Kirk P. Arnett
Pages 67-70
Spyware is the latest epidemic security threat for Internet users. There are various types of spyware programs (see Table 1) creating serious problems such as copying and sending personal information, consuming CPU power, reducing …
Younghwa Lee, Kenneth A. Kozar
Pages 72-77
One of the most challenging problems confronting the IT community is responding to the threat of spyware. Recent research, legislative actions, and policy changes have been hastened to counter spyware's threat to the privacy …
Merrill Warkentin, Xin Luo, Gary F. Templeton
Pages 79-84
Spyware poses serious privacy and security issues to users of e-commerce and m-commerce [3, 5, 8]. Microsoft claims that half of all computer crashes reported by its customers were caused by spyware and its equivalents. Spyware …
Sudhindra Shukla, Fiona Fui-Hoon Nah
Pages 85-90
This article describes an attempt to infect two new Dell WindowsXP-SP2 PCs (named Grease and Grime) with spyware and examines the results of the spyware infections. Each PC carried Symantec Antivirus 8.1.0.125, Spyware Doctor …
Kirk P. Arnett, Mark B. Schmidt
Pages 92-95
There are indications of late that the use of anti-spyware software is on the rise, with more than 100 million Internet users downloading Lavasoft's free anti-spyware software [2]. Some big-name companies are also beginning to …
Robin Poston, Thomas F. Stafford, Amy Hennington
Pages 96-99
Tagging every item in a supply chain promises to help send the right product to the right destination at the right time, reducing the cost of operations and transportation and minimizing distribution lead times.
Indranil Bose, Raktim Pal
Pages 100-106
A firm's presence on the Internet opens a valuable channel for its competitors to collect and analyze its business information---to the firm's competitive disadvantage---unless it devises a defensive strategy.
Yihua Philip Sheng, Peter P. Mykytyn, Charles R. Litecky
Pages 107-112
A model for quickly sifting through emerging technologies to find the best organizational fit.
Casey G. Cegielski, Brian J. Reithel, Carl M. Rebman
Pages 113-117
Encouraging a greater appreciation of the interplay between software and fine art.
Gregory W. Bond
Pages 118-124
Donald E. Hardaway
Pages 125-128
Certification based on a generally accepted body of knowledge is needed for clients, as well as the general public, to trust software professionals and their work.
Jeanette Nasem Morgan
Pages 129-133
COLUMN: Technical opinion
Determining where project management education fits into the overall curriculum.
Harry L. Reif, Michel Mitri
Pages 134-136
COLUMN: Inside risks
Peter G. Neumann, Michael D. Byrne
Page 144