DEPARTMENT: Editorial pointers
Diane Crawford
Pages 5-7
DEPARTMENT: News track
CACM Staff
Pages 9-10
DEPARTMENT: Forum
Pages 11-13
DEPARTMENT: Hot links
Pages 15-16
COLUMN: The business of software
Accuracy and the measurement of peaks and projects.
Phillip G. Armour
Pages 17-20
CACM Staff
Pages 21-30
COLUMN: Staying connected
Service providers must work together to ensure a fail-safe communication system.
Meg McGinity Shannon
Pages 29-32
COLUMN: President's letter
Much has changed since the 1980s when the current format of Communications of the ACM was cast. What should be the mission of ACM's flagship publication in the 21st century?
David A. Patterson
Pages 33-35
COLUMN: Viewpoint
Understanding complexity and feedback in security models highlights the need for better failure modes in solutions.
Scott Campbell
Pages 37-39
SPECIAL ISSUE: Personal information management
Cheap and fast search and storage technologies help bring order to our messy personal information environments, freeing us to make the most of our information collections.
Jaime Teevan, William Jones, Benjamin B. Bederson
Pages 40-43
A lifetime of digital memories is possible but raises many social, as well as technological, questions.
Mary Czerwinski, Douglas W. Gage, Jim Gemmell, Catherine C. Marshall, Manuel A. Pérez-Quiñones, Meredith M. Skeels, Tiziana Catarci
Pages 44-50
Integrating personal health information helps people manage their lives and actively participate in their own health care.
Wanda Pratt, Kenton Unruh, Andrea Civan, Meredith M. Skeels
Pages 51-55
The goal is a policy workbench enabling users to create and transform natural language policies into machine-readable code for enforcement and compliance audits.
Clare-Marie Karat, Carolyn Brodie, John Karat
Pages 56-57
Search systems can alleviate the need to organize personal information by helping us find it no matter where we encountered it, what we remember about it, and even if we forget it exists.
Edward Cutrell, Susan T. Dumais, Jaime Teevan
Pages 58-64
Utility, serendipity, and the pleasure of encountering what we save relies on more than search alone when using PIM tools.
Catherine C. Marshall, William Jones
Pages 66-67
Email's conduit function means the inbox, folders, search, and sort are used to support core PIM functions of task management, personal archiving, and contact management.
Steve Whittaker, Victoria Bellotti, Jacek Gwizdka
Pages 68-73
Sharing personal information with networked groups and institutions raises questions about privacy and control best addressed through a new field of inquiry: group information management.
Thomas Erickson
Pages 74-75
Users need ways to unify, simplify, and consolidate information too often fragmented by location, device, and software application.
David R. Karger, William Jones
Pages 77-82
How to study and understand the idiosyncratic PIM behaviors we exhibit naturally at home, at work, and in between, in the interests of developing future PIM tools.
Diane Kelly
Pages 84-86
Developing a platform for recording, storing, and accessing a personal lifetime archive.
Jim Gemmell, Gordon Bell, Roger Lueder
Pages 88-95
Reuse is such a powerful tool---so why isn't it more popular?
Kevin C. Desouza, Yukika Awazu, Amrit Tiwana
Pages 96-100
Striking a balance between the costs for Web content providers and the quality of service for Web customers.
George Pallis, Athena Vakali
Pages 101-106
Online communities deserve better than their current treatment---where they are largely relegated to the fringes of health care.
Grace J. Johnson, Paul J. Ambrose
Pages 107-113
The success of data warehouses depends on the interaction of technology and social context. We present new insights into the implementation process and interventions that can lead to success.
Tim Chenoweth, Karen Corral, Haluk Demirkan
Pages 114-119
Empirical evidence shows that cost-benefit analysis is a sound basis for budgeting information security expenditures.
Lawrence A. Gordon, Martin P. Loeb
Pages 121-125
Although culture has recently been recognized as one factor in interface design, CS and engineering are generally thought to be culturally neutral. The approach presented here recognizes society and culture in computational concepts …
Matti Tedre, Erkki Sutinen, Esko Kähkönen, Piet Kommers
Pages 126-130
COLUMN: Technical opinion
Developing a balance between author control and traditional scientific publication practices in a global digital library.
Christoph Meinel, Volker Klotz
Pages 131-134
COLUMN: Inside risks
John C. Knight, Nancy G. Leveson
Page 160