Volume 50, Number 12, December 2007
Internal surveillance, external risks.

Steven M. Bellovin Matt Blaze Whitfield Diffie Susan Landau Jennifer Rexford Peter G. Neumann

Training future software developers to acquire agile development skills.

Chuan-Hoo Tan Hock-Hai Teo

Counting the cost of virtual teams.

Emmeline de Pillis Kimberly A. Furumo

Competing with IT: the role of shared IT-business understanding.

Gautam Ray Waleed A. Muhanna Jay B. Barney

Fix IT-business relationships through better decision rights.

Varun Grover Raymond M. Henry Jason Bennett Thatcher

Self-organization in manufacturing operations.

Klaus Schild Stefan Bussmann

Tracing variations in software product families.

Kannan Mohan Balasubramaniam Ramesh

Implementing component reuse strategy in complex products environments.

Ilan Oshri Sue Newell Shan Ling Pan

Standards development and diffusion: a case study of RosettaNet.

Wai Fong Boh Christina Soh Steven Yeo

Moving beyond user participation to achieve successful IS design.

Erica L. Wagner Gabriele Piccoli

Multidisciplinary research on the datapath of the computing disciplines.

Antonio M. Lopez Jr. Frederick G. Lopez Robert W. Lent Madonna G. Constantine

Trespass, nuisance, and spam: 11th century common law meets the internet.

Robert J. Aalberts Percy Poon Paul D. Thistle

Nominees for elections and report of the ACM nominating committee.

Are your citations clean?

Dongwon Lee Jaewoo Kang Prasenjit Mitra C. Lee Giles Byung-Won On

Creativity support tools: accelerating discovery and innovation.

Ben Shneiderman

PowerPoint at 20: back to basics.

Robert Gaskins

Credit Card Forensics.

Hal Berghel

Forum.

Diane Crawford

News track.

Editorial pointers.

Diane Crawford


Volume 50, Number 11, November 2007
Risks of e-voting.

Matt Bishop David A. Wagner

Top 10 downloads from ACM's digital library.

Drivers of price Premium in e-markets.

Hee-Woong Kim Yunjie Xu

Making knowledge work in virtual teams.

Dominic M. Thomas Robert P. Bostrom Marianne Gouge

The impact of size and volatility on IT project performance.

Chris Sauer Andrew Gemino Blaize Horner Reich

Does data warehouse end-user metadata add value?

Neil Foshay Avinandan Mukherjee Andrew Taylor

Information life cycle management.

Paul P. Tallon Richard Scannell

What motivates Wikipedians?

Oded Nov

How DARPA structures its robotics programs to improve locomotion and navigation.

Larry D. Jackel Douglas Hackett Eric Krotkov Michael Perschbacher James Pippine Charles Sullivan

TREC: Continuing information retrieval's tradition of experimentation.

Ellen M. Voorhees

Workloads (creation and use).

Alan Jay Smith

Experience-driven experimental systems research.

Larry L. Peterson Vivek S. Pai

Empirical studies to build a science of computer science.

Victor R. Basili Marvin V. Zelkowitz

Experimental algorithmics.

Catherine C. McGeoch

Introduction.

Dror G. Feitelson

Stop the numbers game.

David Lorge Parnas

The rewards of ACM's awards.

Stuart I. Feldman

A research project with important practitioner-oriented findings.

Robert L. Glass

The choice uncertainty principle.

Peter J. Denning

News track.

Editorial pointers.

Diane Crawford


Volume 50, Number 10, October 2007
Toward a safer and more secure cyberspace.

Herbert S. Lin Alfred Z. Spector Peter G. Neumann Seymour E. Goodman

Top 10 downloads from ACM's digital library.

Deterring internal information systems misuse.

John D&aposArcy Anat Hovav

Leveraging the flexibility of your data warehouse.

Richard J. Goeke Robert H. Faley

Necessary measures: metric-driven information security risk assessment and decision making.

Wade H. Baker Loren Paul Rees Peter S. Tippett

Social phishing.

Tom N. Jagatic Nathaniel A. Johnson Markus Jakobsson Filippo Menczer

Business applications of unstructured text.

William L. Kuechler Jr.

Business process development life cycle methodology.

Mike P. Papazoglou Willem-Jan van den Heuvel

Physical product reengineering with embedded information technology.

Prabhudev Konana Gautam Ray

Inspiring students to pursue computing degrees.

Asli Yagmur Akbulut Clayton A. Looney

[Getting ideas to market] Current issues faced by technology entrepreneurs.

U. N. Umesh Leonard M. Jessup Minh Q. Huynh

Knowledge services on the semantic web.

Gregoris Mentzas Kostas Kafentzis Panos Georgolios

[Software patents] The good, the bad, and the messy.

Matt E. Thatcher David E. Pingry

Nearshore locations in three principal global clusters and their respective attributes.

Erran Carmel Pamela Abbott

Why 'nearshore' means that distance matters.

Erran Carmel Pamela Abbott

Post-conflict communications: the case of Liberia.

Michael L. Best Kipp Jones Illenin Kondo Dhanaraj Thakur Edem Wornyo Calvin Yu

Why we compete in DARPA's Urban Challenge autonomous robot race.

Sebastian Thrun

Reflections and trends in the expansion of cellular wireless services in the U.S. and China.

Katia Passerini Karen P. Patten Michael R. Bartolacci Jerry Fjermestad

Does copyright law need to be reformed?

Pamela Samuelson

Extreme programming compared with Microsoft-style iterative development.

Michael A. Cusumano

Forum.

News track.

Editorial pointers.

Diane Crawford


Volume 50, Number 9, September 2007
E-migrating risks?

Peter G. Neumann

Top 10 downloads from ACM's digital library.

The online research "bubble".

Thomas F. Stafford Dennis Gonier

What's wrong with online privacy policies?

Irene Pollach

SOX, compliance, and power relationships.

Ashley Braganza Arnoud Franken

What matters when introducing new information technology.

Susan A. Brown Norman L. Chervany Bryan A. Reinicke

The online consumer's hierarchy of needs.

Joseph S. Valacich D. Veena Parboteeah John D. Wells

Domain expert user development: the smartgov approach.

George Lepouras Costas Vassilakis Constantin Halatsis Panagiotis Georgiadis

Parallel computing on any desktop.

Ami Marowka

Amoeba-based neurocomputing with chaotic dynamics.

Masashi Aono Masahiko Hara Kazuyuki Aihara

Micro/nanofluidic computing.

David W. M. Marr Toshinori Munakata

Optical computing: need and challenge.

Hossin Abdeldayem Donald O. Frazier

Toward a world with quantum computers.

Dave Bacon Debbie W. Leung

Autonomous programmable biomolecular devices using self-assembled DNA nanostructures.

John H. Reif Thomas H. LaBean

Molecular, chemical, and organic computing.

Robert Stadler

Computation with carbon nanotube devices.

Jing Kong

Computing with a trillion crummy components.

Warren Robinett Gregory S. Snider Philip Kuekes R. Stanley Williams

Introduction.

Toshinori Munakata

The conservation of uncertainty.

Phillip G. Armour

Shaking hands, kissing babies, and ... blogging?

Meg McGinity Shannon

Evolving the ACM journal distribution program.

Ronald F. Boisvert Mary Jane Irwin Holly E. Rushmeier

Why you can't cite Wikipedia in my class.

Neil L. Waters

Forum.

News track.

Editorial pointers.

Diane Crawford


Volume 50, Number 8, August 2007
Which is riskier: OS diversity or OS monopoly?

David Lorge Parnas

Offshore outsourcing: the risk of keeping mum.

Sakgasit Ramingwong A. S. M. Sajeev

Top 10 downloads from ACM's digital library.

Corporate governance of IT: a framework for development.

Wullianallur Raghupathi

Dynamic decision support through instantiation of UEML representations.

Sagnika Sen Haluk Demirkan Michael Goul

Testing object-oriented industrial software without precise oracles or results.

T. H. Tse Francis C. M. Lau W. K. Chan Peter C. K. Liu Colin K. F. Luk

Unintended invitation: organizational wi-fi use by external roaming users.

Janice C. Sipior Burke T. Ward

A classification of product comparison agents.

Yun Wan Satya Menon Arkalgud Ramaprasad

Designing large-scale supply chain linear programs in spreadsheets.

Larry J. LeBlanc Michael R. Galbreth

Involving top management in IT projects.

Jesper Simonsen

Theoretical and practical complexity of modeling methods.

John Erickson Keng Siau

Modeling the IT value paradox.

Matt E. Thatcher David E. Pingry

Dealing with change: components versus services.

Ahmed Elfatatry

Privacy-enhanced personalization.

Alfred Kobsa

A deja-vu look at software engineering researchers who care about practice.

Robert L. Glass

Software copyright and role models.

Amy Bruckman

Better-than-nothing security practices.

Hal Berghel

Call for nominations for ACM general election.

Forum.

News track.

Editorial pointers.

Diane Crawford


Volume 50, Number 7, July 2007
Disasters evermore?

Charles Perrow

Top 10 downloads from ACM's digital library.

Conferences under scrutiny.

Sabah S. Al-Fedaghi

The effects of web-based technologies on knowledge transfer.

Waymond Rodgers Solomon Negash

A roadmap for comprehensive online privacy policy management.

Annie I. Antón Elisa Bertino Ninghui Li Ting Yu

A knowledge architecture for IT security.

Someswar Kesh Pauline Ratnasingam

Examining RFID applications in supply chain management.

Fred Niederman Richard G. Mathieu Roger Morley Ik-Whan Kwon

Collaborative structuring: organizing document repositories effectively and efficiently.

Harris Wu Michael D. Gordon

An architecture for a next-generation holistic e-recruiting system.

In Lee

Evaluating the efficacy of a terrorism question/answer system.

Robert P. Schumaker Ying Liu Mark Ginsburg Hsinchun Chen

Real-time sound synthesis and propagation for games.

Nikunj Raghuvanshi Christian Lauterbach Anish Chandak Dinesh Manocha Ming C. Lin

Using storytelling to motivate programming.

Caitlin Kelleher Randy Pausch

Carnegie Mellon's entertainment technology center: combining the left and right brain.

Randy Pausch Donald Marinelli

How to build serious games.

Henry Kelly Kay Howell Eitan Glinert Loring Holding Chris Swain Adam Burrowbridge Michelle Roper

Games for training.

Ralph E. Chatham

Games for science and engineering education.

Merrilea J. Mayo

Introduction.

Michael Zyda

Public vs. private interest on the internet.

Abbe Mowshowitz Nanda Kumar

The changing labyrinth of software pricing.

Michael A. Cusumano

Computing is a natural science.

Peter J. Denning

News track.

Editorial pointers.

Diane Crawford


Volume 50, Number 6, June 2007
Risks are your responsibility.

Peter A. Freeman

Perceived health risks of 3G cell phones: do users care?

Mihail Cocosila Ofir Turel Norman P. Archer Yufei Yuan

Top 10 downloads from ACM's digital library.

Automatic and versatile publications ranking for research institutions and scholars.

Jie Ren Richard N. Taylor

Design patterns for managing product life cycle information.

Kary Främling Timo Ala-Risku Mikko Kärkkäinen Jan Holmström

Time to rethink health care and ICT?

David E. Avison Terry Young

An empirical investigation of the effectiveness of systems modeling and verification tools.

Anand Jeyaraj Vicki L. Sauter

Cutting checks: challenges and choices in B2B e-payments.

Mark J. Cotteleer Christopher A. Cotteleer Andrew Prochnow

The four incremental steps toward advanced mobile service adoption.

Ioanna D. Constantiou Jan Damsgaard Lars Andreas Knutsen

DNSSEC: a protocol toward securing the internet infrastructure.

Amy Friedlander Allison Mankin W. Douglas Maughan Stephen D. Crocker

Evolution and emerging issues in mobile wireless networks.

Sasha Dekleva Jung P. Shim Upkar Varshney Geoffrey Knoerzer

Smart business networks: how the network wins.

Eric van Heck Peter Vervest

Web science: a provocative invitation to computer science.

Ben Shneiderman

Twenty percent.

Phillip G. Armour

Software patents and the metaphysics of Section 271(f).

Pamela Samuelson

News track.

Forum.

Editorial pointers.

Diane Crawford


Volume 50, Number 5, May 2007
The psychology of security.

Bruce Schneier

Top 10 downloads from ACM's digital library.

The right place at the right time.

Geoffrey Goodell Paul F. Syverson

Does personality matter?: an analysis of code-review ability.

Alessandra Devito Da Cunha David Greathead

Modeling multi-agent systems.

Viviane Torres da Silva Carlos José Pereira de Lucena

Accessing the deep web.

Bin He Mitesh Patel Zhen Zhang Kevin Chen-Chuan Chang

The whitewater process: software product development in small IT businesses.

Michael L. Harris Kris Aebischer Tim Klaus

Universal accessibility as a multimodal design issue.

Zeljko Obrenovic Julio Abascal Dusan Starcevic

The software architect.

Matthew R. McBride

A history of the history of programming languages.

Thomas J. Bergin

SIGCOMM's archaeological journey into networking's past.

Chris Edmondson-Yurkanan

A history of ACM SIGGRAPH.

Judy Brown Steve Cunningham

The ACM and IEEE-CS guidelines for undergraduate CS education.

David Hemmendinger

Not only digital: a review of ACM's early involvement with analog computing technology.

Charles Care

Sources for ACM history: what, where, why.

Thomas Haigh

Edmund Berkeley and the origins of ACM.

Atsushi Akera

ACM established to develop communication about computing.

Bernadette Longo

Introduction.

David S. Wise

One man's quest for the state of software engineering's practice.

Robert L. Glass

The rime of the ancyent programmer.

Stephen B. Jenkins

The pearly gates of Internet TV.

Meg McGinity Shannon

News track.

ACM's past helps steer its future.

Stuart I. Feldman

Forum.

Editorial pointers.

Diane Crawford


Volume 50, Number 4, April 2007
Risks of virtual professionalism.

Jim Horning

Does telecommuting improve productivity?

E. Sonny Butler Cheryl Aasheim Susan Rebstock Williams

Top 10 downloads from ACM's digital library.

What are people searching on government web sites?

Michael Chau Xiao Fang Olivia R. Liu Sheng

Investigating value-based decision bias and mediation: do you do as you think?

Dianne J. Hall David B. Paradice

Inconsistencies and disconnects.

Jeffrey A. Stone Elinor M. Madigan

Managing risk in offshore systems development.

Sachidanandam Sakthivel

Analysis of active intrusion prevention data for predicting hostile activity in computer networks.

Ido Green Tzvi Raz Moshe Zviran

Designing data-intensive web applications for content accessibility using web marts.

Stefano Ceri Maristella Matera Francesca Rizzo Vera Demaldé

Consumer support systems.

Levent V. Orman

How to avoid disappointment by design.

Dorit Nevo Michael R. Wade

Is abstraction the key to computing?

Jeff Kramer

Flow in games (and everything else).

Jenova Chen

Proposal to dissolve SIGAPL.

Call for nominations for advanced member grades in ACM.

ACM honors distinguished members.

Mastering the mess.

Peter J. Denning

Hiding data, forensics, and anti-forensics.

Hal Berghel

News track.

Stop chasing the AI illusion.

Diane Crawford

Editorial pointers.

Diane Crawford


Volume 50, Number 3, March 2007
Risks of risk-based security.

Donn B. Parker

The (un)predictability of computer science graduate school admissions.

Nigel Ward

Top 10 downloads from ACM's Digital Library.

The Sarbanes-Oxley Act: implications for large-scale IT outsourcing.

James A. Hall Stephen L. Liedtka

Envisioning intelligent information technologies through the prism of web intelligence.

Ning Zhong Jiming Liu Yiyu Yao

The effects of online advertising.

Scott McCoy Andrea Everard Peter Polak Dennis F. Galletta

Theoretical reflections on agile development methodologies.

Sridhar P. Nerur Venugopal Balijepally

Time-critical information services.

Thomas A. Horan Benjamin L. Schooley

The 7 habits of highly effective technology leaders.

Stephen J. Andriole

Open source software for disaster management.

Paul Currion Chamindra de Silva Bartel Van de Walle

Public warning in the networked age: open standards to the rescue?

Art Botterell Ronja Addams-Moring

Online forums supporting grassroots participation in emergency preparedness and response.

Leysia Palen Starr Roxanne Hiltz Sophia B. Liu

Communication challenges in emergency response.

B. S. Manoj Alexandra Hubenko Baker

Collaborative adhocracies and mix-and-match technologies in emergency management.

David Mendonça Theresa I. Jefferson John R. Harrald

Agent-based systems for disaster management.

Frank Fiedrich Paul Burghardt

Decision support systems.

Simon French Murray Turoff

Human-computer interaction: the human and computer as a team in emergency management information systems.

Liz Carver Murray Turoff

Introduction.

Bartel Van de Walle Murray Turoff

ACM fellows.

SIGs announce candidates for election.

Fixing federal e-voting standards.

Earl T. Barr Matt Bishop Mark A. Gondree

Mortality play.

Phillip G. Armour

ACM A.M. Turing Award nominations solicited.

Forum.

News track.

Editorial pointers.

Diane Crawford