DEPARTMENT: Editorial pointers
DEPARTMENT: News track
COLUMN: President's letter
As my term ends, I offer my perspective on two important challenges facing ACM.
COLUMN: The business of software
Getting into the Flow of software development.
COLUMN: ACM plagiarism policy
ACM's Publications Board issues a plagiarism policy to help stem the disturbing increase in occurrences.
DEPARTMENT: Hot links
COLUMN: Legally speaking
Should standards be eligible for copyright protection?
SPECIAL ISSUE: Hacking and innovation
Why computer science should pay serious attention to the hacking community and its passion for pushing the limits of technology and its role as a counterbalance to its misuse.
Hackers advocate the free pursuit and sharing of knowledge without restriction, even as they acknowledge that applying it is something else.
The law alone won't prevent an unauthorized visit or even a deliberate attack. Security depends on being able to think like an attacker.
Laptops and PDAs are so vulnerable in wireless hotspots, users would do well to turn them off.
Enlist hacker expertise, but stay with academic fault naming conventions, when defending against the risk of exploitation of vulnerabilities and intrusions.
DNS cache scanning across a sample set of more than 500,000 name servers revealed the extent of last year's Sony rootkit infestation on client machines.
Searching for explanations to increasing global software piracy rates.
Seeking a mutually beneficial relationship between IS departments and users.
Who commits software misuse? Knowing the answer to this question will help organizations protect their information systems.
In current IT practices, the task of managing post-deployment system changes often falls in no-man's land.
Model checking is an effective component for performing online transactions that build customer trust and confidence.
The goal of enterprise integration---to create a shared informationenvironment that supports the delivery of products or services---becomes an even greater challenge when business units are spread throughout the world, decentralized …
COLUMN: Technical opinion
Going back to basics.
COLUMN: Inside risks