What Academic Research Tells Us About Service
Research and Advances
Software Security Is Software Reliability
Reciprocity: The Golden Rule of IS-User Service Relationship Quality and Cooperation
Enterprise Integration Across the Globally Disbursed Service Organization
A Systematic Approach in Managing Post-Deployment System Changes
Global Software Piracy: Can Economic Factors Alone Explain the Trend?
The Application of Model Checking For Securing E-Commerce Transactions
Piracy, Computer Crime, and IS Misuse at the -niversity
Academic Freedom and the Hacker Ethic
Wireless Hotspots: Petri Dish of Wireless Security
Explorations in Namespace: White-Hat Hacking Across the Domain Name System
The Language-Action Perspective as a Basis For Communication Support Systems
Action and Media in Interorganizational Interaction
Adaptive Web Information Extraction
The Collaborate/Integrate Business Technology Strategy
Discovery of Knowledge Flow in Science
Designing a New Foundation For Design
The Pragmatic Web: A Manifesto
The Deep Structure of Business Processes
Shape the Future of Computing
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedCommunications of the ACM (CACM) is now a fully Open Access publication.
By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More