acm-header
Sign In

Communications of the ACM

Editorial pointers

Editorial Pointers


It too often follows that as applications and implementations of computer technology escalate in sophistication and usage, so too do their abuses. Indeed, it is such abuses and a growing incidence of illegal intrusions that necessitated the development of computer forensics as a way to obtain evidence of criminal activity supported by a computer.

But computer crimes today rarely involve "a" computer. Illegal activities most often involve many computers spanning multiple networks, thus prompting the need for computer-based evidence across expanses of virtual territory. Cyber forensics, therefore, deals with the challenges of locating and collecting evidence in or near real time and often across networks of possibilities.

This month's special section explores the field of cyber forensics, presenting many of the current tools and technologies, along with the technical needs for the future, and the challenges of mixing technological prowess in a way the judicial community can decipher and employ. Guest editors Brajendra Panda, Joseph V. Giordano, and Daniel Kalil have called on many recognized experts in the forensics field, who contend that creating better evidence-acquisition techniques requires the combined research efforts of law enforcement, industry, academia, and government agencies.

Also this month, metadata may be the bane of every system developer's existence, but Shankaranarayanan and Even contend its value trumps its (sometimes torturous) implementation efforts. Owen et al. focus on the neglected practice of protocol analysis, examining how it can be applied to solve programmers' problems. And Varma shares the results of a study examining the attitudes of minority students in CS.

Damsgaard et al. report on the potential user abuses in wireless commons by overindulging their own self-interest, offering ways to help ward off such scenarios and maintaining control for the common good. H.M. Gladney proposes a Trustworthy Digital Object methodology for preserving the authenticity of digital objects and for assuring that users will have access to their content. Deborah Armstrong defines key OO ingredients by analyzing existing literature. And Poon and Lau present a B2C framework that may help vendors draw customers and earn their trust.

In addition, our columnists voice their own takes on some timely—and global—issues. In "Viewpoint," Kumar and Mowshowitz warn that U.S. governance of the Internet could do more harm than good if continued. And Uldal and Marjan offer a fascinating account of computing in post-war Afghanistan in "International Perspectives." After a recent visit to Russia, Michael Cusumano wonders where the nation fits in the worldwide software market in "Technology Strategy and Management." And in "President's Letter," David Patterson praises the efforts of ACM's Job Migration Task Force, whose year-long examination of the effects of outsourcing on a global scale has resulted in an in-depth report.

Diane Crawford
Editor


©2006 ACM  0001-0782/06/0200  $5.00

Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee.

The Digital Library is published by the Association for Computing Machinery. Copyright © 2006 ACM, Inc.


 

No entries found

Sign In for Full Access
» Forgot Password? » Create an ACM Web Account
Article Contents: