DEPARTMENT:
Editorial pointers
Editorial Pointers
Diane Crawford
Pages 5-6
DEPARTMENT:
News track
News Track
CACM Staff
Pages 7-8
DEPARTMENT:
Forum
Forum
Pages 9-11
DEPARTMENT:
SIG election candidates
SIGs Announce Candidates For Election
Page 14
COLUMN:
Technology strategy and management
Managing Software Development in Globally Distributed Teams
Surveying the basic elements needed for globally distributed teams to function smoothly and efficiently.
Michael A. Cusumano
Pages 15-17
COLUMN:
Viewpoint
Peer to Patent Needs Your Expertise
You can help ensure that computer-related patents are properly reviewed and stop the worthless ones from being granted.
Andy Oram
Pages 19-20
COLUMN:
Legally speaking
How to Achieve (Some) Balance in Anti-Circumvention Laws
Should users of technically protected content be able to give notice and require content owners to take down the technical measure to enable fair uses?
Pamela Samuelson, Jerome H. Reichman, Graeme Dinwoodie
Pages 21-25
COLUMN:
ACM annual report for FY07
ACM Annual Report For FY07
Stuart I. Feldman
Pages 27-34
Alternate Reality Gaming
Millions update the state of the game on the way to a common conclusion, in one case to help the Operator regain control of a spaceship and bring her crew back to the future.
Jeffrey Y. Kim, Jonathan P. Allen, Elan Lee
Pages 36-42
IT Diffusion in Developing Countries
Policymakers need to recognize that developing economies have different drivers for IT investment than their wealthier brethren.
Eric Shih, Kenneth L. Kraemer, Jason Dedrick
Pages 43-48
Are People Biased in Their Use of Search Engines?
Assessing user search behavior when deciding which links to follow in rank-ordered results lists.
Mark T. Keane, Maeve O'Brien, Barry Smyth
Pages 49-52
Alternative Scenarios to the 'Banner' Years
A test of alternative formats to Web banner ads.
Nolan J. Taylor, Eleanor T. Loiacono, Richard T. Watson
Pages 53-58
Sharing Knowledge
How managerial prompting, group identification, and social value orientation affect knowledge-sharing behavior.
Peter Marks, Peter Polak, Scott McCoy, Dennis Galletta
Pages 60-65
The Myths and Truths of Wireless Security
Technology will never cure all wireless security ills. It will take a coordinated effort involving corporations, manufacturers, employers, and end users to fight the fight.
Alfred Loo
Pages 66-71
Municipal Broadband Wireless Networks
"...people lack many things: jobs, shelter, food, health care and drinkable water. Today, being cut off from basic telecommunications services is a hardship almost as acute as these other deprivations, and may indeed reduce the …
Munir Mandviwalla, Abhijit Jain, Julie Fesenmaier, Jeff Smith, Paul Weinberg, Greg Meyers
Pages 72-80
Women and Men in the IT Profession
Fewer women entering IT drives the underrepresentation problem.
Vicki R. McKinney, Darryl D. Wilson, Nita Brooks, Anne O'Leary-Kelly, Bill Hardgrave
Pages 81-84
Managing Large Collections of Data Mining Models
Data analysts and naive users alike in information-intensive organizations need automated ways to build, analyze, and maintain very large collections of data mining models.
Bing Liu, Alexander Tuzhilin
Pages 85-89
COLUMN:
Technical opinion
Record Matching in Digital Library Metadata
Using evidence from external sources to create more accurate matching systems.
Min-Yen Kan, Yee Fan Tan
Pages 91-94
COLUMN:
Inside risks
Software Transparency and Purity
Pascal Meunier
Page 104