August 2003 - Vol. 46 No. 8
![August 2003 issue cover image](https://cacm.acm.org/wp-content/uploads/2003/08/859670.cover_.jpg?w=132)
Features
The Discipline of Internet Forensics
A Mugwump’s-Eye View of Web Work
Voting and Technology: Who Gets to Count Your Vote?
Extracting Library-Based Java Applications
Post-Pass Compaction Techniques
Cold Code Decompression at Runtime
Grammar-Based Compression of Interpreted Code
Risks and Challenges of Component-Based Software Development
How Cios Manage Their Superiors’ Expectations
-Understanding Email Interaction Increases Organizational Productivity
Relationship Quality: the Undervalued Dimension of Software Quality
Enemy at the Gate: Threats to Information Security
How a Silver Bullet May Lose its Shine
Analyzing the Application Asp Concept: Technologies, Economies, and Strategies
Software Reuse Strategies and Component Markets
Third Generation and Beyond Wireless Systems