Opinion
Computing Applications Editorial pointers

Editorial Pointers

Posted
  1. Article

Say the word "hacker" and an indelible image undoubtedly comes to mind. Yes, it’s different for each of us but probably not by much. It’s unfortunate that over the years the negative nuance of the stereotypical hacker has taken center stage in the global spotlight, while the brilliant, skillful, and, yes, ethical, expertise of its growing population is often ignored, rejected, or held suspect.

This month’s special section explores the practical lessons, knowledge, and know-how that computer science can gain from the hacker community—the white hats, as they are known, who are paid or inspired to weed out system vulnerabilities, who alert security system designers, owners, or users of their security weaknesses as well as how they might have already been exploited. Guest editor Gregory Conti may appear an unlikely advocate for this cause, but as an Academy Professor of Computer Science at the U.S. Military Academy at West Point, he finds the literature and technical conferences hosted by the hacking community professionally rewarding. He strongly believes that hacking and computer science are inherently intertwined and should foster far more cooperation and collaboration. He hopes this section narrows that divide through its technical articles and commentaries that present some of the great—good—work coming from the world of hackers.

Also in this issue are two perspectives on software piracy. A study by Bagchi et al. presents some empirical results on the causes of global piracy and how effective the war against it is working. And Cronan et al. trace the incidences of software misuse—including piracy—finding it starts early, despite the many security measures in place.

David Kang and Roger Chiang describe a systematic approach for managing IT changes from a project management perspective. Christopher Carr examines the relationship between IS departments and IS users to determine how to better appreciate and manage both sides for mutual benefit. And Barry Shore explores the challenges of enterprise integration when companies have multiple sites around the globe, each acclimated to its own way of working.

Ronald Boisvert and Mary Jane Irwin, co-chairs of ACM’s Publications Board, explain the reasons behind the development of ACM’s Plagiarism Policy, urging all authors to become familiar with its provisions. Pamela Samuelson wonders if standards should be eligible for copyright protection. And, finally, in his farewell address, ACM President David Patterson explores the major challenges that lie ahead for the association, confident we are in excellent shape to meet them.

Diane Crawford
Editor

Join the Discussion (0)

Become a Member or Sign In to Post a Comment

The Latest from CACM

Shape the Future of Computing

ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.

Get Involved

Communications of the ACM (CACM) is now a fully Open Access publication.

By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.

Learn More