scispace - formally typeset
Search or ask a question

Showing papers in "Communications of The ACM in 2004"


Journal ArticleDOI
TL;DR: They are susceptible to a variety of attacks, including node capture, physical tampering, and denial of service, while prompting a range of fundamental research challenges.
Abstract: They are susceptible to a variety of attacks, including node capture, physical tampering, and denial of service, while prompting a range of fundamental research challenges.

1,443 citations


Journal ArticleDOI
TL;DR: Bloggers are driven to document their lives, provide commentary and opinions, express deeply felt emotions, articulate ideas through writing, and form and maintain community forums.
Abstract: Bloggers are driven to document their lives, provide commentary and opinions, express deeply felt emotions, articulate ideas through writing, and form and maintain community forums.

1,027 citations


Journal ArticleDOI
TL;DR: In an e-learning environment that emphasizes learner-centered activity and system interactivity, remote learners can outperform traditional classroom students.
Abstract: In an e-learning environment that emphasizes learner-centered activity and system interactivity, remote learners can outperform traditional classroom students.

910 citations


Journal ArticleDOI
TL;DR: In this paper, lazy cryptographers do AI and show how lazy they can be, and how they do it well, and why they do so poorly, and they are lazy.
Abstract: How lazy cryptographers do AI.

890 citations


Journal ArticleDOI
TL;DR: These networks deliver to ecologists data on localized environmental conditions at the scale of individual organisms to help settle large-scale land-use issues affecting animals, plants, and people as mentioned in this paper.
Abstract: These networks deliver to ecologists data on localized environmental conditions at the scale of individual organisms to help settle large-scale land-use issues affecting animals, plants, and people.

782 citations


Journal ArticleDOI
TL;DR: In this paper, the authors explore research-derived best practices for effective management of global software teams, and propose a methodology for managing global teams based on best practices derived from research.
Abstract: Exploring research-derived best practices for effective management of global software teams.

527 citations


Journal ArticleDOI
TL;DR: The latest research indicates using a combination of biometric avenues for human identification is more effective, and far more challenging, than using just one method.
Abstract: The latest research indicates using a combination of biometric avenues for human identification is more effective, and far more challenging.

494 citations


Journal ArticleDOI
TL;DR: For every clever method and tool being developed to hide information in multimedia data, an equal number of clever methods and tools areBeing developed to detect and reveal its secrets.
Abstract: For every clever method and tool being developed to hide information in multimedia data, an equal number of clever methods and tools are being developed to detect and reveal its secrets.

444 citations


Journal ArticleDOI
TL;DR: In scientific and engineering domains, end users frequently develop complex systems with standard programming languages such as C++ and Java, however, only a minority of users adapt commercial off-the-shelf (COTS) software products.
Abstract: End-user development (EUD) activities range from customization to component configuration and programming. Office software, such as the ubiquitous spreadsheet, provides customization facilities, while the growth of the Web has added impetus to end-user scripting for interactive functions in Web sites. In scientific and engineering domains, end users frequently develop complex systems with standard programming languages such as C++ and Java. However, only a minority of users adapt commercial off-the-shelf (COTS) software products. Indeed, composing systems from reusable components, such as enterprise resource planing (ERP) systems, defeats most end users who resort to expensive and scarce expert developers for implementation.

443 citations


Journal ArticleDOI
TL;DR: Travel and tourism are illustrating how e-commerce can change the structure of an industry---and in the process create new business opportunities.
Abstract: Travel and tourism are illustrating how e-commerce can change the structure of an industry---and in the process create new business opportunities.

443 citations


Journal ArticleDOI
TL;DR: All emphasize low-cost components operating on shoestring power budgets for years at a time in potentially hostile environments without hope of human intervention.
Abstract: All emphasize low-cost components operating on shoestring power budgets for years at a time in potentially hostile environments without hope of human intervention.

Journal ArticleDOI
TL;DR: A critical look at more than one million bloggers and the individual entries of some 25,000 blogs reveals blogger demographics, friendships, and activity patterns over time.
Abstract: A critical look at more than one million bloggers and the individual entries of some 25,000 blogs reveals blogger demographics, friendships, and activity patterns over time.

Journal ArticleDOI
TL;DR: While calculating ROSI seems taxing, increasing possibility and scope of IT security breaches due to increasing interconnectivity makes it imperative, as the number of security breaches increases exponentially according to the CERT, so does their cost.
Abstract: A ssessing the return on investment has always been a sticking point for technology investments. Similar to IT productivity paradox [1], Return on Security Investment (ROSI) has become a controversial topic due to immense growth of e-businesses. Defining the value of security investments is challenging. However, it is clear that “security consumers will need to understand the variables that define ROSI and endure the discomfort of assigning dollar values to quantities that currently are extremely ill-defined” [12]. While calculating ROSI seems taxing, increasing possibility and scope of IT security breaches due to increasing interconnectivity makes it imperative. As the number of security breaches increases exponentially according to the CERT (see Table 1) so does their cost. The 2003 CSI/FBI Computer Crime and Security Survey revealed that 56% of respondents detected security breaches. Information Week and PricewaterhouseCoopers LLP estimated that computer viruses and hacking took a $1.6 trillion toll on the worldwide economy and $266 billion in the U.S. [5]. Security breaches have a significant impact on the market values of firms too. We have estimated that compromised firms, on average, lost approximately 2.1% of their market values within two days surrounding security breaches [3]. This translates to an average loss of $1.65 billion in market capitalization per incident. Moitra and Konda [10] found that as investment in security increases the survivability of firms from security breaches increases rapidly at first and then more slowly at higher levels of investment. Undoubtedly these figures point to the importance of more studies on the economics and management of IT security investments. Fear, uncertainty, and doubt (FUD) strategy has been used for years to sell investments in security [1]. However, according to Earthlink security experts Lisa Ekman and Lisa Hoyt, “Crying wolf may get the first firewall, but over the long run, you need a more well-rounded perspective” [12]. Since diverse security techA Model for Evaluating IT Security Investments

Journal ArticleDOI
TL;DR: One weak spot is all it takes to open secured digital doors and online accounts causing untold damage and consequences.
Abstract: One weak spot is all it takes to open secured digital doors and online accounts causing untold damage and consequences.

Journal ArticleDOI
TL;DR: Adopting new and innovative mobile financial applications and service provisioning methods is an important step towards achieving financial inclusion in the developing world.
Abstract: Adopting new and innovative mobile financial applications and service provisioning methods.

Journal ArticleDOI
TL;DR: How to identify the risks that interact to pose the most significant threats to successful project outcomes and how to mitigate these risks.
Abstract: How to identify the risks that interact to pose the most significant threats to successful project outcomes.

Journal ArticleDOI
TL;DR: This section discusses human-computer etiquette in traditional social interactions involving the use of computers that explicitly strive to elicit a perception of “personhood” from the human participant, and focuses on computers that occupy more traditional roles as complex and largely unpersonified machines involved in high-criticality working relationships with humans.
Abstract: 1 It might, perhaps, be more accurate to say the etiquette is perceived by human users rather than exhibited by the automation itself, but that subtlety is largely irrelevant to the work we review here. Whereas the other articles in this section discuss human-computer etiquette in traditional social interactions involving the use of computers that explicitly strive to elicit a perception of “personhood” from the human participant, we focus on computers that occupy more traditional roles as complex and largely unpersonified machines involved in high-criticality working relationships with humans—where the consequences of failure can be catastrophic in terms of lives, money, or both. Politeness and social niceties are important in many human-human social interactions, but in critical, highly technical work, there is the common misperception that we can “dispense with protocol” and get down to business, even with those who are not particularly courteous. In fact, excessive adherence to polite norms can seem stilted and sometimes frustrating in such settings. Here, we argue the etiquette exhibited 1

Journal ArticleDOI
TL;DR: Comparing the topics and methods of the three major subdivisions of the computing realm is compared to find out what works and what doesn't in the area of knowledge representation.
Abstract: Many people consider the contemporary time period the "era of computing." Indeed, technological advances in the computing field are leading in exciting new directions. It is their intention here to analyze the field of computing by examining computing research, in order to better understand where the field has been, and to consider where it may be going. The possibility of amalgamation among computing disciplines raises some potentially interesting questions. It is interesting to contrast the findings for the three disciplines. Computer science examines topics related to computer concepts at technical levels of analysis by formulating processes/methods/algorithms largely using mathematically based conceptual analysis; further, it does not rely on reference disciplines. Regarding any potential amalgamation of the fields, whether at the level of the discipline or of the institution, it is important that it be based on both mutual understanding and mutual acceptance. The research findings provide information to address such issues directly.

Journal ArticleDOI
TL;DR: JMUI (Journal on Multimodal User Interfaces), Special issue “Best of affective computing and intelligent Guidelines for multimodal user interface design”, characteristics to the design of a user-oriented and guidelines of multimmodal interface design.
Abstract: JMUI (Journal on Multimodal User Interfaces), Special issue “Best of affective computing and intelligent Guidelines for multimodal user interface design. support, human multi-modal information processing. characteristics to the design of a user-oriented and guidelines of multimodal interface design. Artifact lifecycle management, Consumer and user, Interfaces in Automated.Aug 2 Aug 7Los Angeles, CA, USAThursday, 6 August 2015 / HCI International 20152015.hci.international/thursday​CachedDefining and Optimizing User Interfaces Information Complexity for AI Design and Development of Multimodal Applications: A Vision on Key Issues and Traditional Heuristics and Industry Guidelines to Evaluate Multimodal Digital Artifacts

Journal ArticleDOI
TL;DR: Spurred by easy-to-use commercial software, blogging is less about creating links and references to sites and sources, and increasingly about bloggers' own comments and personal interests.
Abstract: Spurred by easy-to-use commercial software, blogging is less about creating links and references to sites and sources, and increasingly about bloggers' own comments and personal interests.

Journal ArticleDOI
TL;DR: Personality type analysis can help take the guesswork out of putting together a high-performance software project team.
Abstract: Personality type analysis can help take the guesswork out of putting together a high-performance software project team.

Journal ArticleDOI
TL;DR: As I review performance trends, I am struck by a consistent theme across many technologies: bandwidth improves much more quickly than latency.
Abstract: As I review performance trends, I am struck by a consistent theme across many technologies: bandwidth improves much more quickly than latency. Here, I list a half-dozen performance milestones to document this observation, many reasons why it happens, a few ways to cope with it, a rule of thumb to quantify it, plus an example of how to design systems differently based on this observation.

Journal ArticleDOI
TL;DR: Enhancing traditional algorithmic techniques for improved pattern analysis with new approaches to reinforcement learning and reinforcement learning.
Abstract: Enhancing traditional algorithmic techniques for improved pattern analysis.

Journal ArticleDOI
TL;DR: The idea is that the Internet has become so embedded in the daily fabric of people’s lives that they simply cannot live without it.
Abstract: As was empirically demonstrated in [3], “the adoption rate of the Internet has exceeded that of earlier mass communication technologies by several magnitudes,” making it an “irreversible” innovation. Studies have also shown that for the generation of U.S.-based youth that grew up with the Internet, it is gradually displacing television as their main source of entertainment, communication, and education [6]. Here, we explore how the Internet has become indispensable to people in their daily lives and develop a conceptual model allowing us to address the associated research questions. The idea is that the Internet has become so embedded in the daily fabric of people’s lives that they simply cannot live without it. How is the Internet indispensable and in what ways? For which groups of people is it indispensable, for what tasks, and how has BY DONNA L. HOFFMAN, THOMAS P. NOVAK, AND ALLADI VENKATESH

Journal ArticleDOI
TL;DR: Avoiding the usability pitfalls involved in managing the software development life cycle by focusing on the most important parts of the development process: design,UX, andUX.
Abstract: Avoiding the usability pitfalls involved in managing the software development life cycle.

Journal ArticleDOI
TL;DR: The goal is to make it possible for people to express their ideas in the same way they think about them, and to achieve this, the team has performed various studies about how people think about programming tasks, and developed new tools for programming and debugging.
Abstract: Over the last six years, we have been working to create programming languages and environments that are more natural, or closer to the way people think about their tasks. Our goal is to make it possible for people to express their ideas in the same way they think about them. To achieve this, we have performed various studies about how people think about programming tasks, both when trying to create a new program and when trying to find and fix bugs in existing programs. We then use this knowledge to develop new tools for programming and debugging. Our user studies have shown the resulting systems provide significant benefits to users.

Journal ArticleDOI
TL;DR: How did Singapore manage to get most of its public services deliverable online?
Abstract: How did Singapore manage to get most of its public services deliverable online?

Journal ArticleDOI
TL;DR: This work has been investigating ways to address the problem of dependability in end-user programming by developing a software engineering paradigm viable for end- user programming, an approach it is called end-users software engineering.
Abstract: End-user programming has become the most common form of programming in use today [2], but there has been little investigation into the dependability of the programs end users create. This is problematic because the dependability of these programs can be very important; in some cases, errors in end-user programs, such as formula errors in spreadsheets, have cost millions of dollars. (For example, see www.theregister.co.uk/content/67/31298.html or panko.cba.hawaii.edu/ssr/Mypapers/whatknow.htm.) We have been investigating ways to address this problem by developing a software engineering paradigm viable for end-user programming, an approach we call end-user software engineering.

Journal ArticleDOI
Steve Cayzer1
TL;DR: Tapping into the structured metadata in snippets of information gives communities of interest effective access to their collective knowledge.
Abstract: Tapping into the structured metadata in snippets of information gives communities of interest effective access to their collective knowledge.

Journal ArticleDOI
TL;DR: To improve performance of IS development projects, first measure the key dimensions of project complexity and understand how they affect project outcomes.
Abstract: To improve performance of IS development projects, first measure the key dimensions of project complexity and understand how they affect project outcomes.