DEPARTMENT: Editorial pointers
DEPARTMENT: News track
COLUMN: Practical programmer
In this second installment of a three-part series, the succession of interconnected creative milestones is traced.
Robert L. Glass
DEPARTMENT: Hot links
COLUMN: Digital village
The security risks of WiFi connectivity have been established---the reasons for these risks of intrusion are not as well understood.
Hal Berghel, Jacob Uecker
DEPARTMENT: President's letter
ACM is one of many organizations that sponsors IT conferences and journals. So, why use ACM?
David A. Patterson
Computer science is nothing less than a new way of thinking; explaining it to the wider world is critical to the future of the field.
Sanjeev Arora, Bernard Chazelle
SPECIAL ISSUE: Spyware
Anyone who has ever dealt with spyware knows the irritation of lost bandwidth, the frustration of commandeered machine processor cycles, the innumerable pop-up ads and spam trails that result from an infestation. It is indeed …
Thomas F. Stafford
That which begins as minor nuisances and curiosities enabled by the subversion of new technological capabilities has always evolved into invasive problems once someone has found a way to profit from their application.
Spyware is becoming a relentless onslaught from those seeking to capture and use private information for their own ends. Spyware is annoying and negatively impacts the computing experience. Even worse, there are real and significant …
Technology has revolutionized information collection and distribution to the point where marketers have expanded and implemented new technologies to enable efficient consumer information acquisition. Such sophisticated data collection …
Few people or corporations believe spyware is beneficial to the computing experience, but this issue has not been well studied . This assertion is based on the trade press and countless Internet sites providing numerous articles …
Lee A. Freeman, Andrew Urbaczewski
Before effective legislation against spyware can be drawn, lawmakers and vendors must understand what users find most deceptive and offensive about this stealth software.
Neveen Farag Awad, Kristina Fitzgerald
Recent media attention to spyware [2, 5, 7, 8] has brought to light the blunt intrusion into individual privacy and the uncertain hidden cost of free access to Internet sites, along with freeware and shareware. Most spyware programs …
Qing Hu, Tamara Dinev
With the increased dependence on networks and the near ubiquitous availability of the Internet, there is a new paradigm in place for the proliferation of spyware, viruses, and other malware. In fact, much attention has been given …
Mark B. Schmidt, Kirk P. Arnett
Spyware is the latest epidemic security threat for Internet users. There are various types of spyware programs (see Table 1) creating serious problems such as copying and sending personal information, consuming CPU power, reducing …
Younghwa Lee, Kenneth A. Kozar
One of the most challenging problems confronting the IT community is responding to the threat of spyware. Recent research, legislative actions, and policy changes have been hastened to counter spyware's threat to the privacy …
Merrill Warkentin, Xin Luo, Gary F. Templeton
Spyware poses serious privacy and security issues to users of e-commerce and m-commerce [3, 5, 8]. Microsoft claims that half of all computer crashes reported by its customers were caused by spyware and its equivalents. Spyware …
Sudhindra Shukla, Fiona Fui-Hoon Nah
This article describes an attempt to infect two new Dell WindowsXP-SP2 PCs (named Grease and Grime) with spyware and examines the results of the spyware infections. Each PC carried Symantec Antivirus 184.108.40.206, Spyware Doctor …
Kirk P. Arnett, Mark B. Schmidt
There are indications of late that the use of anti-spyware software is on the rise, with more than 100 million Internet users downloading Lavasoft's free anti-spyware software . Some big-name companies are also beginning to …
Robin Poston, Thomas F. Stafford, Amy Hennington
Tagging every item in a supply chain promises to help send the right product to the right destination at the right time, reducing the cost of operations and transportation and minimizing distribution lead times.
Indranil Bose, Raktim Pal
A firm's presence on the Internet opens a valuable channel for its competitors to collect and analyze its business information---to the firm's competitive disadvantage---unless it devises a defensive strategy.
Yihua Philip Sheng, Peter P. Mykytyn, Charles R. Litecky
A model for quickly sifting through emerging technologies to find the best organizational fit.
Casey G. Cegielski, Brian J. Reithel, Carl M. Rebman
Encouraging a greater appreciation of the interplay between software and fine art.
Gregory W. Bond
Donald E. Hardaway
Certification based on a generally accepted body of knowledge is needed for clients, as well as the general public, to trust software professionals and their work.
Jeanette Nasem Morgan
COLUMN: Technical opinion
Determining where project management education fits into the overall curriculum.
Harry L. Reif, Michel Mitri
COLUMN: Inside risks
Peter G. Neumann, Michael D. Byrne