Opinion
Architecture and Hardware Editorial pointers

Editorial Pointers

Posted
  1. Article

It too often follows that as applications and implementations of computer technology escalate in sophistication and usage, so too do their abuses. Indeed, it is such abuses and a growing incidence of illegal intrusions that necessitated the development of computer forensics as a way to obtain evidence of criminal activity supported by a computer.

But computer crimes today rarely involve "a" computer. Illegal activities most often involve many computers spanning multiple networks, thus prompting the need for computer-based evidence across expanses of virtual territory. Cyber forensics, therefore, deals with the challenges of locating and collecting evidence in or near real time and often across networks of possibilities.

This month’s special section explores the field of cyber forensics, presenting many of the current tools and technologies, along with the technical needs for the future, and the challenges of mixing technological prowess in a way the judicial community can decipher and employ. Guest editors Brajendra Panda, Joseph V. Giordano, and Daniel Kalil have called on many recognized experts in the forensics field, who contend that creating better evidence-acquisition techniques requires the combined research efforts of law enforcement, industry, academia, and government agencies.

Also this month, metadata may be the bane of every system developer’s existence, but Shankaranarayanan and Even contend its value trumps its (sometimes torturous) implementation efforts. Owen et al. focus on the neglected practice of protocol analysis, examining how it can be applied to solve programmers’ problems. And Varma shares the results of a study examining the attitudes of minority students in CS.

Damsgaard et al. report on the potential user abuses in wireless commons by overindulging their own self-interest, offering ways to help ward off such scenarios and maintaining control for the common good. H.M. Gladney proposes a Trustworthy Digital Object methodology for preserving the authenticity of digital objects and for assuring that users will have access to their content. Deborah Armstrong defines key OO ingredients by analyzing existing literature. And Poon and Lau present a B2C framework that may help vendors draw customers and earn their trust.

In addition, our columnists voice their own takes on some timely—and global—issues. In "Viewpoint," Kumar and Mowshowitz warn that U.S. governance of the Internet could do more harm than good if continued. And Uldal and Marjan offer a fascinating account of computing in post-war Afghanistan in "International Perspectives." After a recent visit to Russia, Michael Cusumano wonders where the nation fits in the worldwide software market in "Technology Strategy and Management." And in "President’s Letter," David Patterson praises the efforts of ACM’s Job Migration Task Force, whose year-long examination of the effects of outsourcing on a global scale has resulted in an in-depth report.

Diane Crawford
Editor

Join the Discussion (0)

Become a Member or Sign In to Post a Comment

The Latest from CACM

Shape the Future of Computing

ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.

Get Involved

Communications of the ACM (CACM) is now a fully Open Access publication.

By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.

Learn More