DEPARTMENT: Editorial pointers
DEPARTMENT: News track
DEPARTMENT: ACM A.M. Turing Award nominations solicited
COLUMN: The business of software
The cost of risk on software projects.
Phillip G. Armour
Without a threat model and a system model, voting standards cannot ensure the integrity or accuracy of the voting process.
Earl Barr, Matt Bishop, Mark Gondree
DEPARTMENT: SIGs announce candidates for election
DEPARTMENT: ACM fellows
SPECIAL SECTION: Emergency response information systems: emerging trends and technologies
Bartel Van de Walle, Murray Turoff
Building the computer as part of the emergency management team ensures that people continue to do the things they do well, supported by the technology, not driven by it.
Liz Carver, Murray Turoff
Simon French, Murray Turoff
Frank Fiedrich, Paul Burghardt
Using the emergent interoperability approach to address unanticipated contingencies during emergency response.
David Mendonça, Theresa Jefferson, John Harrald
B.S. Manoj, Alexandra Hubenko Baker
"When danger arises, the rule in normal situations is for people to help those next to them before they help themselves."
Leysia Palen, Starr Roxanne Hiltz, Sophia B. Liu
Art Botterell, Ronja Addams-Moring
Evaluating how the Sahana disaster information system coordinates disparate institutional and technical resources in the wake of the Indian Ocean tsunami.
Paul Currion, Chamindra de Silva, Bartel Van de Walle
What do CEOs expect from technology? What do they expect from their technology leaders? How should technology leaders "brand" themselves? Today'stechnology leaders would do best to learn the specific leadership skills required …
Stephen J. Andriole
Emergency medical services have never been more ready for the implementation of time-critical interorganizational information services for the public good.
Thomas A. Horan, Benjamin L. Schooley
The traditional goal of optimization and control is making way for learning and innovation.
Sridhar Nerur, VenuGopal Balijepally
Consumers' first impressions (and loyalties) are made in the opening moments of a Web site visit and the degree to which that visit may be intruded by pop-ups, pop-unders, and banner ads.
Scott McCoy, Andrea Everard, Peter Polak, Dennis F. Galletta
Users and businesses alike get to turn their raw data into new science, technology, and money.
Ning Zhong, Jiming Liu, Yiyu Yao
Until they are certain that outsourcing IT management is the best possible option, firms would do well to maintain and invest in their own in-house IT assets.
James A. Hall, Stephen L. Liedtka
DEPARTMENT: Hot links
COLUMN: Technical opinion
Providing a general calculator for students to compare where they are likely to get accepted for graduate school.
COLUMN: Inside risks
Donn B. Parker