February 2001 - Vol. 44 No. 2
Features
The Profession of IT: Who Are We?
Staying Connected: Name Is the Game
On Site: to Opt-in or Opt-Out?: It Depends on the Question
Securing Network Software Applications: Introduction
Trust (and Mistrust) in Secure Applications
Security Models For Web-Based Applications
The Privacy Practices of Web Browser Extensions
Software Security and Privacy Risks in Mobile E-Commerce
An Operating System Approach to Securing E-Services
Intellectual Property For an Information Age: Introduction
Copyrightable Functions and Patentable Speech
The Battle Over the Institutional Ecosystem in the Digital Environment
The Collision of Trademarks, Domain Names, and due Process in Cyberspace
Is Virtual Trespass an Apt Analogy?
Inside Risks: What to Know About