DEPARTMENT: Editorial pointers
DEPARTMENT: News track
DEPARTMENT: Hot links
COLUMN: Security watch
The computer's role in identity theft incidents may have been misgauged through overestimates of reported losses.
COLUMN: Staying connected
Laws governing surveillance must keep pace with technology.
COLUMN: President's letter
Two years ago I entered the race for ACM President with my campaign statement. In the second-to-last President's Letter of my term, I thought I would revisit what I said we would do and reflect on what we did.
Algorithmic thinking is transforming both the descriptive sciences and the humanities, bringing them all closer to the mathematical core of computer science.
SPECIAL ISSUE: Two decades of the language-action perspective
By learning seven foundational practices, anyone can become a skillful innovator.
Coordinating the role of IT with business processes.
Delving beneath organizational surface structure to reveal the essential structure of business processes.
Developing a framework for effective design principles.
The book in which Fernando Flores and I introduced our version of the language-action perspective had an ambitious and provocative subtitle: Understanding Computers and Cognition: A New Foundation for Design
. This special …
The Amorphic system works to extract Web information for use in business intelligence applications.
Before investing in the technology, business managers must focus on their collaborative business future and the extent to which their technology can be integrated.
Because information system performance is multidimensional, specialist theories of performance dimensions must be integrated into a model of system design.
Recognizing and understanding knowledge flow between scientists is valuable for science. Discovering, managing, and utilizing such knowledge are advanced services of the e-science knowledge grid environment.
Many UML projects are not Use Case driven.
The frequent citations to IS research suggest its role in advancing science.
Collecting consumer viewing habits will come back to bite advertisers who do not understand or appreciate how consumers feel about privacy infringement.
COLUMN: Technical opinion
A traditional style of software development can be just as productive as a more modern approach.
COLUMN: Inside risks