Say the word "hacker" and an indelible image undoubtedly comes to mind. Yes, it's different for each of us but probably not by much. It's unfortunate that over the years the negative nuance of the stereotypical hacker has taken center stage in the global spotlight, while the brilliant, skillful, and, yes, ethical, expertise of its growing population is often ignored, rejected, or held suspect.
This month's special section explores the practical lessons, knowledge, and know-how that computer science can gain from the hacker communitythe white hats, as they are known, who are paid or inspired to weed out system vulnerabilities, who alert security system designers, owners, or users of their security weaknesses as well as how they might have already been exploited. Guest editor Gregory Conti may appear an unlikely advocate for this cause, but as an Academy Professor of Computer Science at the U.S. Military Academy at West Point, he finds the literature and technical conferences hosted by the hacking community professionally rewarding. He strongly believes that hacking and computer science are inherently intertwined and should foster far more cooperation and collaboration. He hopes this section narrows that divide through its technical articles and commentaries that present some of the greatgoodwork coming from the world of hackers.
Also in this issue are two perspectives on software piracy. A study by Bagchi et al. presents some empirical results on the causes of global piracy and how effective the war against it is working. And Cronan et al. trace the incidences of software misuseincluding piracyfinding it starts early, despite the many security measures in place.
David Kang and Roger Chiang describe a systematic approach for managing IT changes from a project management perspective. Christopher Carr examines the relationship between IS departments and IS users to determine how to better appreciate and manage both sides for mutual benefit. And Barry Shore explores the challenges of enterprise integration when companies have multiple sites around the globe, each acclimated to its own way of working.
Ronald Boisvert and Mary Jane Irwin, co-chairs of ACM's Publications Board, explain the reasons behind the development of ACM's Plagiarism Policy, urging all authors to become familiar with its provisions. Pamela Samuelson wonders if standards should be eligible for copyright protection. And, finally, in his farewell address, ACM President David Patterson explores the major challenges that lie ahead for the association, confident we are in excellent shape to meet them.
Diane Crawford
Editor
©2006 ACM 0001-0782/06/0600 $5.00
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee.
The Digital Library is published by the Association for Computing Machinery. Copyright © 2006 ACM, Inc.
No entries found