scispace - formally typeset
Search or ask a question

Showing papers in "Communications of The ACM in 2003"


Journal Article
TL;DR: This keynote argues that there is in fact even more profound change that the authors are facing – the programmability aspect that is intimately associated with all IoT systems.

1,171 citations



Journal ArticleDOI
TL;DR: The main challenge in P2P computing is to design and implement a robust and scalable distributed system composed of inexpensive, individually unreliable computers in unrelated administrative domains.
Abstract: The main challenge in P2P computing is to design and implement a robust and scalable distributed system composed of inexpensive, individually unreliable computers in unrelated administrative domains. The participants in a typical P2P system might include computers at homes, schools, and businesses, and can grow to several million concurrent participants.

705 citations


Journal ArticleDOI
TL;DR: Utilizing user location as a key determinant of information requirement needs is suggested to improve the quality of information provided to marketers and decision-makers.
Abstract: Utilizing user location as a key determinant of information requirement needs.

619 citations


Journal ArticleDOI
TL;DR: Without device adoption, there is no mobile commerce, according to the World Bank.
Abstract: Without device adoption, there is no mobile commerce.

524 citations


Journal ArticleDOI
Francisco Curbera1, Rania Khalaf1, Nirmal K. Mukhi1, Stefan Tai1, Sanjiva Weerawarana1 
TL;DR: How three specifications support creating robust service compositions are supported and how to incorporate them into service compositions is explained.
Abstract: How three specifications support creating robust service compositions.

504 citations


Journal ArticleDOI
TL;DR: Comparing internal and external approaches to enterprise business integration is a good place to start if you want to know how to integrate your company into the global supply chain.
Abstract: Comparing internal and external approaches to enterprise business integration.

493 citations


Journal ArticleDOI
TL;DR: An organizing framework for viral marketing is proposed that draws on prior theory and highlights different behavioral mechanisms underlying knowledge-sharing, influence, and compliance in online social networks.
Abstract: Online social networks are increasingly being recognized as an important source of information influencing the adoption and use of products and services. Viral marketing—the tactic of creating a process where interested people can market to each other—is therefore emerging as an important means to spread-the-word and stimulate the trial, adoption, and use of products and services. Consider the case of Hotmail, one of the earliest firms to tap the potential of viral marketing. Based predominantly on publicity from word-of-mouse [4], the Web-based email service provider garnered one million registered subscribers in its first six months, hit two million subscribers two months later, and passed the eleven million mark in eighteen months [7]. Wired magazine put this growth in perspective in its December 1998 issue: “The Hotmail user base grew faster than [that of ] any media company in history—faster than CNN, faster than AOL, even faster than Seinfeld’s audience. By mid-2000, Hotmail had over 66 million users with 270,000 new accounts being established each day.” While the potential of viral marketing to efficiently reach out to a broad set of potential users is attracting considerable attention, the value of this approach is also being questioned [5]. There needs to be a greater understanding of the contexts in which this strategy works and the characteristics of products and services for which it is most effective. This is particularly important because the inappropriate use of viral marketing can be counterproductive by creating unfavorable attitudes towards products. Work examining this phenomenon currently provides either descriptive accounts of particular initiatives [8] or advice based on anecdotal evidence [2]. What is missing is an analysis of viral marketing that highlights systematic patterns in the nature of knowledge-sharing and persuasion by influencers and responses by recipients in online social networks. To this end, we propose an organizing framework for viral marketing that draws on prior theory and highlights different behavioral mechanisms underlying knowledge-sharing, influence, and compliance in online social networks. Though the framework is descrip-

429 citations


Journal ArticleDOI
TL;DR: Firms must take full advantage of Net-based e-service opportunities, particularly in the transition of products to services, to garner long-term customer relationships and loyalty.
Abstract: Firms must take full advantage of Net-based e-service opportunities, particularly in the transition of products to services, to garner long-term customer relationships and loyalty.

415 citations


Journal ArticleDOI
TL;DR: This paper discusses the design, building, and implementing of an architecture for distributed knowledge discovery, and the challenges faced in designing and implementing this architecture.
Abstract: Designing, building, and implementing an architecture for distributed knowledge discovery.

390 citations


Journal ArticleDOI
TL;DR: Ramifications for wireless design: 'e' ≠ 'm' ≡ 'm', and so on.
Abstract: Ramifications for wireless design: 'e' ≠ 'm'.

Journal ArticleDOI
TL;DR: Creating computing and communication systems that sense and reason about human attention by fusing together information from multiple streams is a challenge.
Abstract: Creating computing and communication systems that sense and reason about human attention by fusing together information from multiple streams.

Journal ArticleDOI
TL;DR: To achieve complex solutions in the rapidly changing world of e-commerce, it is impossible to go it alone, which explains the latest trend in IT outsourcing---global and partner-based alliances.
Abstract: To achieve complex solutions in the rapidly changing world of e-commerce, it is impossible to go it alone. This explains the latest trend in IT outsourcing---global and partner-based alliances. But where do we go from here?

Journal ArticleDOI
TL;DR: Mobile devices enable secure, convenient authorization of e-banking, retail payment, brokerage, and other types of transactions.
Abstract: Mobile devices enable secure, convenient authorization of e-banking, retail payment, brokerage, and other types of transactions.

Journal ArticleDOI
TL;DR: A firm can build more effective security strategies by identifying and ranking the severity of potential threats to its IS efforts.
Abstract: A firm can build more effective security strategies by identifying and ranking the severity of potential threats to its IS efforts.

Journal ArticleDOI
TL;DR: The current swirl of diversity could signal a return to the days of ad hoc systems development, lack of formal methodology, and consequent increase in failure.
Abstract: The current swirl of diversity could signal a return to the days of ad hoc systems development, lack of formalmethodology, and consequent increase in failure.

Book ChapterDOI
TL;DR: Sauer and Willcocks as discussed by the authors found many organizations struggling to integrate their legacy and relatively new ERP systems with e-business initiatives and technologies, a finding explained by Kanter and Sauer in terms of cultural, organizational, and political issues.
Abstract: Introduction By 1999 the ERP ‘revolution’ was generating over $US20 billion revenues annually for suppliers and a further $20 billion to consulting firms. If 2000 and 2001 saw a fall-off in business globally, then some believed that once the distractions of Y2K deadlines were over, new ERP business plus the need to support and capitalise on the sunk investment in IT infrastructure ERP already represented would guarantee further take-off. Once again, at first without many noticing, information technology (IT) not only raised itself high above the cost parapet, but also set off traditional alarm bells about questionable business value. For many firms ERP represents the return of the old IT catch 22 with a vengeance – competitively and technically it is a ‘must-do’, but economically there is conflicting evidence, suggesting it is difficult to cost justify, and difficult to derive benefits from. The problem has been further complicated by the coming of web-based technologies. Thus Sauer and Willcocks (2001) found many organizations struggling to integrate their legacy and relatively new ERP systems with e-business initiatives and technologies. The goal of a relatively seamless e-business infrastructure seemed particularly difficult to achieve in ‘bricks and mortar’ companies trying to move to the web (Sauer and Willcocks, 2000), a finding explained by Kanter (2001) and Willcocks and Sauer (2000) in terms of cultural, organizational, and political issues, together with less than good organization and project management for e-business.

Journal ArticleDOI
TL;DR: Exploring the importance and untangling the complexity of the notion of context in the context of a youth-services agency.
Abstract: Exploring the importance and untangling the complexity of the notion of context.

Journal ArticleDOI
TL;DR: A longitudinal study at four companies provides valuable insights about the evolution of IT outsourcing relationships.
Abstract: A longitudinal study at four companies provides valuable insights about the evolution of IT outsourcing relationships.

Journal ArticleDOI
TL;DR: Theories of ontology lead to improved conceptual models and help ensure they are indeed faithful representations of their focal domains.
Abstract: Theories of ontology lead to improved conceptual models and help ensure they are indeed faithful representations of their focal domains.

Journal ArticleDOI
TL;DR: A Web service, as defined by the W3C Web Services Architecture Working Group, is a software application identified by a URI, whose interfaces and bindings are capable of being defined, described, and discovered as XML artifacts.
Abstract: A Web service, as defined by the W3C Web Services Architecture Working Group, is "a software application identified by a URI, whose interfaces and bindings are capable of being defined, described, and discovered as XML artifacts. A Web service supports direct interactions with other software agents using XML-based messages exchanged via Internet-based protocols."1 Others refine this definition further by requiring the description be a Web Services Description Language (WSDL) document and the protocol be SOAP.

Journal ArticleDOI
TL;DR: Understanding the unique characteristics of m-commerce to enhance and improve the user interface and how these characteristics can be leveraged for improved user interface quality and efficiency is key.
Abstract: Understanding the unique characteristics of m-commerce to enhance and improve the user interface.

Journal ArticleDOI
TL;DR: Seeking to protect an organization against a new form of business losses in the face of cyber-attack.
Abstract: Seeking to protect an organization against a new form of business losses.

Journal Article
TL;DR: Throughout the history of computing, developments in human-computer interaction (HCI) have often been preceded by breakthroughs in display and input technologies, including the invention of the trackball and light pen.
Abstract: Throughout the history of computing, developments in human-computer interaction (HCI) have often been preceded by breakthroughs in display and input technologies. The first use of a cathode ray tube (CRT) to display computer-generated (radar) data, in the Canadian DATAR [6] and MIT’s Whirlwind projects of the early 1950s, led to the development of the trackball and light pen. That development, in turn, influenced Sutherland’s and Engelbart’s work on interactive computer graphics, the mouse, and the graphical user interface (GUI) during the early 1960s. According to Alan Kay [3], seeing the first liquid crystal display (LCD) had a similar disruptive effect on his thinking about interactivity at Xerox PARC during the early 1970s. His vision of Dynabook led to the development of Smalltalk, the Alto GUI (1973), and eventually, the Tablet PC [2]:

Journal ArticleDOI
TL;DR: Economist Ronald Coase was not suggesting that because the size of firms is tied to transaction costs, the lower transaction costs of e-commerce would cause e-businesses to grow smaller and smaller.
Abstract: Economist Ronald Coase was not suggesting that because the size of firms is tied to transaction costs, the lower transaction costs of e-commerce would cause e-businesses to grow smaller and smaller.

Journal ArticleDOI
TL;DR: Considering the similarities and unique characteristics of online file sharing and software piracy, this paper proposed a framework for file sharing in the context of file-sharing and file-piracy, which can be found in this paper.
Abstract: Considering the similarities and unique characteristics of online file sharing and software piracy.

Journal ArticleDOI
TL;DR: In response to the September 11 terrorist attacks, major government efforts to modernize federal law enforcement authorities' intelligence collection and processing capabilities have been initiated.
Abstract: In response to the September 11 terrorist attacks, major government efforts to modernize federal law enforcement authorities' intelligence collection and processing capabilities have been initiated. At the state and local levels, crime and police report data is rapidly migrating from paper records to automated records management systems in recent years, making them increasingly accessible.

Journal ArticleDOI
TL;DR: Applying technology acceptance theory to understand why iMode has become so popular in Japan, and whether its popularity will extend to the rest of the world.
Abstract: Applying technology acceptance theory to understand why iMode has become so popular in Japan, and whether its popularity will extend to the rest of the world.

Journal ArticleDOI
TL;DR: Sharings insights from a humanistic and entertainment approach to improving organizational efficiency are provided.
Abstract: Sharings insights from a humanistic and entertainment approach to improving organizational efficiency.

Journal ArticleDOI
TL;DR: This article is focused on examining the factors and relationships that influence the browsing and buying behavior of individuals when they shop online, and is interested in individual buyers using business-to-consumer sites.
Abstract: This article is focused on examining the factors and relationships that influence the browsing and buying behavior of individuals when they shop online. Specifically, we are interested in individual buyers using business-to-consumer sites. We are also interested in examining shopping preferences based on various demographic categories that might exhibit distinct purchasing attitudes and behaviors for certain categories of products and services. We examine these behaviors in the context of both products and services. After a period of decline in recent months, online shopping is on the rise again. By some estimates, total U.S. spending on online sales increased to $5.7 billion in December 2001 from $3.2 billion in June of 2001 [3, 5]. By these same estimates, the number of households shopping online increased to 18.7 million in December