DEPARTMENT: Editorial pointers
DEPARTMENT: News track
COLUMN: Staying connected
Relying on the pervasive technology network for security is potentially perilous when the technology fails.
COLUMN: Digital village
Although WiFi technology security vulnerabilities are well known, the extent of these vulnerabilities may be surprising: War driving experiences identify many potential points of entry.
Granting ownership rights to data, as if it were private property, only limits data access without ensuring the benefits of researcher precedence or the rewards for good data collection.
James A. Jacobs, Charles Humphrey
SPECIAL ISSUE: End-user development
Alistair Sutcliffe, Nikolay Mehandjiev
End-user development (EUD) activities range from customization to component configuration and programming. Office software, such as the ubiquitous spreadsheet, provides customization facilities, while the growth of the Web has …
G. Fischer, E. Giaccardi, Y. Ye, A. G. Sutcliffe, N. Mehandjiev
As an explicit design topic, end-user development (EUD) is rather new to human-computer interaction (HCI), although it is implicitly embedded in many design projects. What makes EUD different from other HCI topics is that in …
The productivity paradox raised concerns that IT investment rarely leads to productivity gains . End-user development (EUD), however, may provide the answer to this concern if increased productivity can be demonstrated. Recent …
Volker Wulf, Matthias Jarke
The goal of agent-based end-user development (EUD) is to empower end users with agents they can instruct directly. This process of instruction is completely transparent to the user; that is, it is not based on opaque adaptation …
Alexander Repenning, Andri Ioannidou
Over the last six years, we have been working to create programming languages and environments that are more natural, or closer to the way people think about their tasks. Our goal is to make it possible for people to express …
Brad A. Myers, John F. Pane, Amy J. Ko
End-user programming has become the most common form of programming in use today , but there has been little investigation into the dependability of the programs end users create. This is problematic because the dependability …
Margaret Burnett, Curtis Cook, Gregg Rothermel
Component-based software development (CBSD) involves multiple roles. Framework builders create the infrastructure for components to interact; developers identify suitable domains and develop new components for them; application …
Anders I. Mørch, Gunnar Stevens, Markus Won, Markus Klann, Yvonne Dittrich, Volker Wulf
A goal of natural development is to ease the building of interactive software systems. Some work has been dedicated to obtaining natural programming , which aims to support programming through languages understandable by people …
Silvia Berti, Fabio Paternò, Carmen Santoro
There have been many "homes of the future" demonstrations, in which intelligent appliances communicate with each other for the convenience of the homeowner. Manufacturers, wealthy celebrities, gadget lovers, and researchers think …
Alan F. Blackwell
Surveys in the U.S. have found that 95% of schools , 43% of public libraries , and 33% of teenagers' parents  employ filtering software to block access to pornography and other inappropriate content. Many products are …
Paul J. Resnick, Derek L. Hansen, Caroline R. Richardson
Demonstrating the usefulness of integrating context-based views into the systems analysis and design process.
Ozgur Turetken, David Schuff, Ramesh Sharda, Terence T. Ow
The Internet, along with its myriad resources and users, constitutes a vast artificial virtual environment that benefits all of human society. But both the general public and the research community may be unaware of its developmental …
Hai Zhuge, Xiaoqing Shi
A new software system allows users with disabilities, and their potential employers, to make informed choices about job opportunities and the impact those decisions may have on current and future benefits.
Michael J. Hine, Mark Hill, David Ruth, Bob Carlson, Dave Banks, Jim Troxell
The gap between academic and practitioner research focus and time perspectives inhibits the education and training of systems analysts and undermines systems planning and performance.
Susan K. Lippert, Murugan Anandarajan
COLUMN: Technical opinion
Considering the potential benefits and trade-offs of file-sharing systems.
Jason E. Bailes, Gary F. Templeton
COLUMN: Inside risks
In this column we provide a high-level overview of some of the most pressing problem areas associated with risks to the constructive use of information technology. Although this may seem repetitive to those of you who have seen …
Peter G. Neumann