March 2004 - Vol. 47 No. 3
Features
Who Is Liable For Bugs and Security Flaws in Software?
How Computer Games Affect CS (and Other) Students’ School Performance
Countering Terrorism Through Information Technology
Graph-Based Technologies For Intelligence Analysis
Proactive Information Gathering For Homeland Security Teams
Cyber Defense Technology Networking and Evaluation
Mobility and the First Responder
Rescue Robotics For Homeland Security
Automatically Detecting Deceptive Criminal Identities
Questioning Lawful Access to Traffic Data
Toward an Integrated Framework For Modeling Enterprise Processes
How to Manage Your Software Product Life Cycle with Maui
The Role of Personality in Web-Based Distance Education Courses
What Causes Stress in Information System Professionals?