DEPARTMENT: Editorial pointers
Diane Crawford
Page 5
DEPARTMENT: News track
CACM Staff
Pages 9-10
DEPARTMENT: Forum
Pages 11-13
COLUMN: The business of software
A planning approach to managing risk.
Phillip G. Armour
Pages 15-19
COLUMN: Staying connected
The science of manipulating small particles unleashes big issues.
Meg McGinity Shannon
Pages 21-23
COLUMN: President's letter
Inaccurate impressions of the opportunities of 21st century CS are shrinking the next generation of IT professionals. You can help by dispelling incorrect beliefs about employment and by helping improve pre-college education.
David A. Patterson
Pages 25-28
DEPARTMENT: Hot links
Pages 29-30
COLUMN: Viewpoint
In a world saturated with RFID tags, protecting the privacy of individuals is technically difficult. Without a proper alignment of interests it may be impossible.
Frank Stajano
Pages 31-33
SPECIAL ISSUE: RFID: tagging the world
Cheap, tiny, plentiful radio-frequency identification tags will make it possible to tag almost everything, spurring a revolution in how physical objects interact with information services.
Gaetano Borriello
Pages 34-37
The iBracelet and the Wireless Identification and Sensing Platform promise the ability to infer human activity directly from sensor readings.
Joshua R. Smith, Kenneth P. Fishkin, Bing Jiang, Alexander Mamishev, Matthai Philipose, Adam D. Rea, Sumit Roy, Kishore Sundara-Rajan
Pages 39-44
Interacting with a self-describing, self-locating world sprinkled with RFIG tags, physical objects come alive through augmented reality labels and context-sensitive annotation.
Ramesh Raskar, Paul Beardsley, Paul Dietz, Jeroen van Baar
Pages 46-51
Configuring themselves through Elope middleware, tagged physical objects and rooms let users seamlessly integrate their content and invoke services.
Trevor Pering, Rafael Ballagas, Roy Want
Pages 53-59
Interactive RFID-enhanced museum exhibits let visitors continue their scientific exploration beyond the museum's walls. But museums must still help them understand the technology and address their data privacy concerns.
Sherry Hsi, Holly Fait
Pages 60-65
Cheap tags and technology simple and secure enough to ensure personal data privacy are required before retailers implement and consumers trust and confidently use them on a mass scale.
Miyako Ohkubo, Koutarou Suzuki, Shingo Kinoshita
Pages 66-71
Consumers need to feel they have control over the RFID infrastructure before they routinely trust its services.
Oliver GÜnther, Sarah Spiekermann
Pages 73-76
Want consumers to adopt RFID-based systems? Make the perceived (and real) risk acceptable through convenience, variety, and lower prices.
Bruce Eckfeldt
Pages 77-79
How societal institutions shape the development of software.
Rajiv C. Shah, Jay P. Kesan
Pages 80-85
An economic perspective on quality standards in the certification services market.
James Backhouse, Carol Hsu, Jimmy C. Tseng, John Baptista
Pages 87-91
Multimedia technologies (such as Flash and QuickTime) have been widely used in online product presentation and promotion to portray products in a dynamic way. The continuous visual stimuli and associated sound effects provide …
Zhenhui Jiang, Weiquan Wang, Izak Benbasat
Pages 92-98
Using SQL and database technology to seamlessly retrieve information from any corporate or external Web site.
Charles A. Wood, Terence T. Ow
Pages 99-104
Users aren't always rational logical beings---emotion plays an often overlooked role in user acceptance of technology.
Ping Zhang, Na Li
Pages 105-108
Rules of bio-epidemic and e-epidemic inspire scientists to create a live, scalable interconnected environment for effectively managing situations in nature, society, and the digital virtual world.
Hai Zhuge
Pages 109-114
The learning process must evolve and expand throughout one's IT career. Most would agree that's often easier said than done. Here are some ways professionals can overcome mental blocks that may prevent learning.
Deborah K. Smith, Trevor Moores, Jerry Chang
Pages 115-118
COLUMN: Technical opinion
How the use of technology affects what we know and how we know it.
G. Anthony Gorry
Pages 119-122
COLUMN: Inside risks
Barbara Simons, Jim Horning
Page 136