April 2002 - Vol. 45 No. 4

April 2002 issue cover image

Features

Opinion Editorial pointers

Editorial Pointers

Millions of us meet online each day to share a form of community still so new to our social milieu we are just beginning to appreciate the powerful potential it holds. We create communities to share common interests, debate world events, or simply offer comfort during trying times. The dynamics and connections are limitless. This […]
News News Track

News Track

As companies and governments look to secure their most critical IT systems in the wake of 9/11, the worldwide security-software market is expected to grow to $4.3 billion this year, up 18% from 3.6 billion in 2001, reports Dataquest. Managed security services should grow even faster, according to market researcher IDC, which estimates network protection […]
Opinion Forum

Forum

The ACM, as stated in the masthead of every issue of Communications, is "an international scientific and educational organization … serving both professional and public interests…" This statement of the purpose and goals of the ACM is why I’m a member. In that context, I found Neil Munro’s "From Washington" column ("Too Much of a […]
Research and Advances Supporting community and building social capital

Introduction

The terrorist attacks on the World Trade Center and the Pentagon last September shocked us all. Many reached for the telephone to contact loved ones and watched TV or listened to the radio for news in the days directly following the attacks. Others, however, sought support and exchanged information via online communities. In fact, some 30 million Americans---about one-third of all U.S. Internet users---turned to email, mailing lists, instant messaging, chat rooms, and threaded discussion systems [1]. They wrote detailed eyewitness descriptions and tender words of comfort. They engaged in soul-searching debate about why these events occurred, what response was appropriate, and what should be done to avert future atrocities.
Opinion Inside Risks

Digital Evidence

Those of you concerned with privacy issues and identity theft will be familiar with the concept of dumpster diving. Trash often reveals the dealings of an individual or a corporation. The risks of revealing private information through the trash has led to a boom in the sale of paper shredders (and awareness of the risks […]
Research and Advances Virtual extension

A comparison of three delivery systems for teaching an information technology course

An important aspect of the global, knowledge-based, technology-enabled economy is that organizations must invest in continuous training [4]. Managers, now exposed to concepts such as knowledge economy, organizational intelligence, learning organization, knowledge era, and organizational learning, [2, 3, 12], need to establish the optimum mix of continuous training activities to leverage organizational knowledge to its fullest potential. Several methods and models aimed at managing organizational knowledge at a macro level are now available [2, 3, 5, 6, 8, 9, 11]. But these methods don't address the micro level problem of planning and selecting continuous training activities while taking into account manager and employee preferences, and constraints such as budget or deliverables. The analysis of empirical data presented in this article incorporated factors, criteria, and weights into a model named Econof. Our findings provide managers with valuable tools to implement a continuous training management process aligned to organizational strategy---a step toward the development of knowledge management strategies.
Research and Advances Virtual extension

Understanding ontological engineering

Ontological engineering has garnered increasing attention over the last few years, as researchers have recognized ontologies are not just for knowledge-based systems---all software needs models of the world, and hence can make use of ontologies at design time [1]. A recent survey of the field [4] suggests developers of practical AI systems may especially benefit from their use. This survey earmarked several application classes that benefit from using ontologies, including natural language processing, intelligent information retrieval (especially from the Internet), virtual organizations, and simulation and modeling.
Research and Advances Virtual extension

Strategies for accelerating the worldwide adoption of e-commerce

In recent years, many organizations have recognized the potential of e-commerce to improve profitability by increasing productivity and market penetration while reducing costs. But the vision of an electronically interconnected world requires the global adoption of e-commerce, not just in industrialized nations, but also in developing ones, where most of world's population lives. To successfully encourage the embrace of the Internet and e-commerce, one must carefully study the unique socioeconomic and cultural aspects of such nations. This article discusses ways to stimulate the worldwide adoption of e-commerce, based on our case study of Greece, a nation that has been slow to embrace Internet technologies.
Research and Advances Virtual extension

NASA’s TReK project: a case study in using the spiral model of software development

Software development projects face numerous challenges that threaten their successful completion. Whether it is not enough money, too little time, or a case of "requirements creep" that turns into a full sprint, projects must meet these challenges or face possible disastrous consequences. The funds needed to purchase supporting software tools or computing hardware may not be available, or they may be available for so short a period that informed purchase decisions become infeasible. Personnel resources are often limited, and it is difficult to adjust to personnel fluctuations during the project. The composition of the team personnel also offers potential challenges. A new software development team may begin with some members unfamiliar with the software development environment and project tools, and their learning curve can affect early productivity.
Research and Advances Virtual extension

Java distributed objects for numerical visualization in VisAD

The scientific world is evolving to require more collaboration among different institutions and disciplines. Understanding long-term changes in the Earth environment, for example, requires models that integrate disciplines such as meteorology, oceanography, hydrology (rivers and groundwater), soil science and geology. During the past 15 years, scientists have started sharing data using FTP and software on the Internet, but collaborative work and more routine data sharing require a new kind of scientific software.
Research and Advances Virtual extension

Making the computer accessible to mentally retarded adults

Little research has been conducted on how to teach computer skills to developmentally disabled adults. A head counselor at a home for mentally retarded adults, who served as the inspiration for this article, was an enthusiastic personal computer user who tried to share computer instruction with home residents. Efforts at using commercial applications designed for young children were unsuccessful. Residents briefly watched the counselor use the applications, then lost interest. Staff members had neither the time nor the user interface background to investigate which applications and user interaction design factors might make computers accessible to home residents. In this article, we describe our empirical investigation of computer use among moderately developmentally disabled individuals. We investigated the input devices preferred, and the user interaction design issues to be considered when designing or selecting applications for this population.
Research and Advances Virtual extension

Information quality benchmarks: product and service performance

Information quality (IQ) is an inexact science in terms of assessment and benchmarks. Although various aspects of quality and information have been investigated [1, 4, 6, 7, 9, 12], there is still a critical need for a methodology that assesses how well organizations develop information products and deliver information services to consumers. Benchmarks developed from such a methodology can help compare information quality across organizations, and provide a baseline for assessing IQ improvements.
Research and Advances Virtual extension

The role of software processes and communication in offshore software development

Offshore software development is a new trend in the information technology (IT) outsourcing field, fueled by the globalization of IT and the improvement of telecommunication facilities. Countries such as India, Ireland, and Israel have established a significant presence in this market. In this article, we discuss how software processes affect offshore development projects. We use data from projects in India, and focus on three measures of project performance: effort, elapsed time, and software rework.
Research and Advances Virtual extension

Development infrastructure characteristics and process capability

A substantial portion of most organizational budgets goes toward developing IT applications. Despite the existence of many tools and methodologies, Information Systems Departments (ISDs) continue to face burgeoning costs and delays. In this article, we explore methods of improving the productivity and effectiveness of the application development process using the Capability Maturity Model (CMM) by the Software Engineering Institute (SEI) at Carnegie Mellon University as a benchmark for process maturity levels.
Research and Advances Virtual extension

Data quality assessment

How good is a company's data quality? Answering this question requires usable data quality metrics. Currently, most data quality measures are developed on an ad hoc basis to solve specific problems [6, 8], and fundamental principles necessary for developing usable metrics in practice are lacking. In this article, we describe principles that can help organizations develop usable data quality metrics.
Research and Advances Virtual extension

Securing PC applications: the relay race approach

The widespread use of personal computers and the growth of end-user computing have introduced a myriad of security concerns. As PC-based information systems become readily available and more individuals become computer literate, the risk of ill-intentioned individuals obtaining unauthorized access to computing resources and violating the secrecy and integrity of data increases significantly. But many of these computer security concerns for PCs remain largely unaddressed [6].

Recent Issues

  1. July 2024 CACM cover
    July 2024 Vol. 67 No. 7
  2. June 2024 Vol. 67 No. 6
  3. May 2024 CACM cover
    May 2024 Vol. 67 No. 5
  4. April 2024 CACM cover with text
    April 2024 Vol. 67 No. 4