DEPARTMENT: Editorial pointers
DEPARTMENT: News track
DEPARTMENT: Hot links
COLUMN: Security watch
The ever-changing nature of technology contributes to the problems encountered by experts when collecting and preparing digital evidence for courtroom presentation.
COLUMN: Digital village
Identifying and defending against port-related vulnerabilities.
Hal Berghel, David Hoelzer
COLUMN: President's letter
DARPA's grand challenge spurred advances in the application of AI and, ironically, acted as a referendum on its de-emphasis on academic research.
David A. Patterson
To help students understand the art of research and the reliability of sources in the age of online information, we should teach them about the nature of `truth'.
Amy S. Bruckman
SPECIAL ISSUE: The semantic e-business vision
Much work is required to understand how the conceptualizations that comprise business processes across the extended enterprise can be captured, represented, shared, and processed by both human and intelligent software agents. …
Rahul Singh, Lakshmi S. Iyer, A. F. Salam
The Web infrastructure offers businesses a way to partner and work together, integrating differing applications and communications in a seamless manner.
Jos de Bruijn, Dieter Fensel, Uwe Keller, Rubén Lara
Strengthening security within the domain of shared knowledge is a critical issue, and great challenge, to businesses today. A number of different protocols currently available offer an array of benefits and limitations.
JinKyu Lee, Shambhu J. Upadhyaya, H. Raghav Rao, Raj Sharman
Finding an effective method for managing and evaluating the performance of business processes is a key element for e-business success.
Manoj Thomas, Richard Redmond, Victoria Yoon, Rahul Singh
Moving online business processes and practices from a static collection of data to a distributed multiprocessing framework of interoperability.
Ejub Kajan, Leonid Stoimenov
Meshing formal business processes with informal human collaborations is needed to support business activities.
Thomas P. Moran, Alex Cozzi, Stephen P. Farrell
Developing secure semantic e-business applications requires focusing first on securing the Semantic Web, knowledge management, and e-business processes.
Coupling business and IT models provides a top-down business perspective.
The human meaning of domain names attracts conflict over their control, degrading their reliability as permanent handles. Solution: support handles separately from names.
Michael J. O'Donnell
Agile project management lets software project managers and employees alike adapt to changing circumstances, rather than try to impose rigid formal controls, as in traditional linear development methods.
Sanjiv Augustine, Bob Payne, Fred Sencindiver, Susan Woodcock
Seeking to enhance communication systems by adding expressive cues.
Younghwa Lee, Kenneth A. Kozar, Kai R. Larsen
Assessing the contribution of a technical skills management tool for supporting organizational learning.
Torgeir Dingsøyr, Hans Karim Djarraya, Emil Røyrvik
Biometrics are a promising technology for improving security, if they can overcome technical and social challenges.
Akhilesh Chandra, Thomas Calderon
Using critical data and predictive modeling can help identify high-risk candidates in a total health plan population.
Stephan Kudyba, G. Brent Hamar, William M. Gandy
Developing nations need a technology jumpstart—via basic technologies geared toward education, farming, and health care.
Philip F. Musa, Victor W. Mbarika, Peter Meso
COLUMN: Inside risks
Peter Denning, Jim Horning, David Parnas, Lauren Weinstein