Advertisement

Improved Security Through Information Security Governance

Within the modern, hyper-connected business landscape, organizations are constantly under attack. According to the 2005 Computer Crime and Security Survey, conducted jointly by the Computer Security Institute (CSI) and the San Francisco Office of the Federal Bureau of Investigation (FBI), 56% of respondents reported unauthorized computer system use during the past year.2 These unauthorized uses […]

Exploring the Black Box of Task-Technology Fit

As professionals, such as knowledge workers and managers increasingly perform tasks outside of traditional office environments, mobile technology often provides critical support, in particular to mid-level executives, project managers, company and sales representatives, and field service workers.4 Nevertheless, the requirements for the development and use of mobile information systems to support mobile professionals are not […]

Disaster Response in Health Care: A Design Extension For Enterprise Data Warehouse

August 29, 2005. Hurricane katrina made landfall and caused catastrophic damage along the coastlines of Alabama, Mississippi, and Louisiana killing at least 1,836 people.12 Nearly 80% of the city of New Orleans and surrounding areas were ravaged. Katrina is estimated to be responsible for more than $80 billion in damages, making it the costliest hurricane […]

The Relationship Between Software Development Team Size and Software Development Cost

Most of the Software development cost is related to the programmers’ salaries and recent evidence shows that team-related factors can affect project performance and its cost.10,12 Selecting an appropriate team size for software development projects continues to be a challenge for most project managers. Larger teams represent better distribution of skills, but lead to higher […]

Enhancing Business Performance via Vendor Managed Inventory Applications

Modern Information and Communications Technologies (ICTs) connect companies in new and novel ways and, as a result, allow them to develop new competencies for competing successfully. ICTs make it possible for companies to collaborate on the design of new products and services, configure new sales and distribution channels, and efficiently replenish those channels to reduce […]

A Framework of ICT Exploitation For E-Participation Initiatives

Governments around the world are tapping on the potential of information and communication technologies (ICT) to transform the public sector, a phenomenon broadly known as e-government. Deployment of ICT in government is expected to improve internal efficiency and provide citizens with better information and services. The increasing interest in e-government is evident in the rising […]

Evolving Innovations Through Design and Use

Design and development of an innovative system does not end with delivery and installation of the software product. Nor is innovation facilitated by system maintenance focused on “bug fixes.” Rather it requires recognizing how users innovate around system dysfunctionalities. It requires designers to go “native,” as if they were an applied anthropologist, and understand how […]

Two Approaches to an Information Security Laboratory

Hands-on course work plays an important role in information security education. Through such course work, students can apply, deepen, and extend the conceptual knowledge taught in more theory-oriented lectures. Moreover, they can acquire experience with, and an understanding of, realistic systems, which is particularly important in Information Security. Hands-on experience shows how often a system’s […]

Opening Up to Agile Games Development

In fast-paced business environments like computer games, Agile would seem to be the appropriate style of software development. However, our study of three computer game studios revealed that game development does not deploy Agile methods as such, but rather it shares some of Agile’s practices and values. We were intrigued by how agility was triggered […]

Worst Practices in Search Engine Optimization

Many online companies have become aware of the importance of ranking well in the search engines. A recent article reveals that 62% of search engine users click only on results that appear on the first search engine results page (SERP) and less than 10% of users click on results that appear after the third page.3 […]

Shape the Future of Computing

ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.

Get Involved

Communications of the ACM (CACM) is now a fully Open Access publication.

By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.

Learn More