December 1999 - Vol. 42 No. 12
Features
It’s that time of year. No, I mean, it’s finally that time of year—the time of year that we’ve dissected in some respect in every issue of this…
A proposal to improve the way information flows across the Internet has privacy advocates worried the design could be used to trace a person’s identity. The…
As with any new and powerful technology, there is the inevitable specter of panic. Be wary, the bark may be worse than the bite.
Staying Connected: Flying Wireless, With a Net
Mobile Internet providers prepare for takeoff.
On Site: The Esprit Atlas Project
Two European research technology development (RTD) managers of IT companies have been brainstorming for half a day. Lots of food has been consumed, exhausted secretaries…
As the 21st century fast approaches, computing professionals still do not have a clear understanding of the nature of their profession. This is unfortunate, especially…
Déj`a vu. As I read the many comments on software engineering licensing I’m reminded of the debate on the merits of the "go to" statement that…
Predictors of Online Buying Behavior
What personal characteristics predict whether or not people buy on the Net? Look for a "wired" lifestyle and time starvation, not demographics.
Why users compromise computer security mechanisms and how to take remedial measures.
A Case Study of a Netizen’s Guide to Elections
Political hopefuls learn to use the intrinsic powers of information, democracy, and the Internet.
Voting Technology Implementation
Two recent—yet very different—real-world experiences provide valuable lessons for building the technologies necessary for true teledemocracy.
Teledemocracy in Local Government
Politicians in a small Norwegian municipality experience how telecommunications technology can support and impact the election process.
The Driving Forces in the Virtual Society
Examining the factors propelling the evolution to a virtual workplace and the arrangements being used to implement these changes in a societal context.
Exploring cultural practices in managing heterogeneity within system design.
Companies like British Telecommunications whose business is based on the performance of their software systems, should emphasize accessibility, adaptability,…
How a Community Health Information Network Is Really -sed
Use is not always what the user says it is in practically any domain, including health care delivery, as the authors' research revealed.
Are We Ready?: The FAA’s Y2K Preparedness
Over the last few years, media attention has focused on the Y2K computer problem and potential disasters that it may cause. Computer systems worldwide may encounter…
Are We Ready?: Risk, Reality, and Readiness
After five long years of dealing with and studying the Y2K computer problem in hundreds of public and private enterprises and scores of countries, does it just come down…
Inside Risks: Risks of Insiders
This month we consider some of the risks associated with insiders. An insider is someone who has been (explicitly or implicitly) granted privileges authorizing use of a…