scispace - formally typeset
Search or ask a question

Showing papers in "Communications of The ACM in 2005"


Journal ArticleDOI
TL;DR: Traditional, plan-driven software development methodologies lack the flexibility to dynamically adjust the development process, so emergent organizations need information systems that constantly evolve to meet their changing requirements.
Abstract: Software development methodologies are constantly evolving due to changing technologies and new demands from users. Today's dynamic business environment has given rise to emergent organizations that continuously adapt their structures, strategies, and policies to suit the new environment [12]. Such organizations need information systems that constantly evolve to meet their changing requirements---but the traditional, plan-driven software development methodologies lack the flexibility to dynamically adjust the development process.

1,017 citations


Journal ArticleDOI
TL;DR: The human-computer interaction community aims to increase the awareness and acceptance of established methods among software practitioners to drive an Information Society for all.
Abstract: The human-computer interaction community aims to increase the awareness and acceptance of established methods among software practitioners. Indeed, awareness of the basic usability methods will drive an Information Society for all.

896 citations


Journal ArticleDOI
TL;DR: Context is not simply the state of a predefined environment with a fixed set of interaction resources; it's part of a process of interacting with an ever-changing environment composed of reconfigurable, migratory, distributed, and multiscale resources.
Abstract: Context is not simply the state of a predefined environment with a fixed set of interaction resources. It's part of a process of interacting with an ever-changing environment composed of reconfigurable, migratory, distributed, and multiscale resources.

524 citations


Journal ArticleDOI
TL;DR: The possibility of a "transparent human," whose vital information is up for grabs, can most easily be envisioned in the realm of e-commerce, due in part to the large amounts of data available, and the high payoffs expected from using this data for marketing purposes.
Abstract: In times of ubiquitous electronic communication and increasing industry pressure for standard electronic authentication, the maintenance of privacy, or "the right to be left alone" becomes a subject of increasing concern. The possibility of a "transparent human," whose vital information is up for grabs, can most easily be envisioned in the realm of e-commerce, due in part to the large amounts of data available, and in part to the high payoffs expected from using this data for marketing purposes.

467 citations


Journal ArticleDOI
TL;DR: IT is transforming the way governments function and valuable lessons can be learned from the pioneering e-government programs that have led the charge.
Abstract: IT is transforming the way governments function and valuable lessons can be learned from the pioneering e-government programs that have led the charge.

368 citations


Journal ArticleDOI
TL;DR: This publication contains reprint articles for which IEEE does not hold copyright and which are likely to be copyrighted.
Abstract: User-Centered Design (UCD) is a multidisciplinary design approach based on the active involvement of users to improve the understanding of user and task requirements, and the iteration of design and evaluation. It is widely considered the key to product usefulness and usability---an effective approach to overcoming the limitations of traditional system-centered design. Much has been written in the research literature about UCD. As further proof of internationally endorsed best practice, UCD processes are also defined in ISO documents, including ISO 13407 and the associated technical report, ISO TR 18529. Increasingly, UCD has become part of the cultural vernacular of the executives and managers who drive technology development in companies of all sizes.

350 citations


Journal ArticleDOI
TL;DR: Agile project management lets software project managers and employees alike adapt to changing circumstances, rather than try to impose rigid formal controls, as in traditional linear development methods.
Abstract: Agile project management lets software project managers and employees alike adapt to changing circumstances, rather than try to impose rigid formal controls, as in traditional linear development methods.

337 citations


Journal ArticleDOI
TL;DR: By leveraging customer reactions to personalized products and services, companies continuously improve their personalization processes through an iterative feedback loop resulting in the `virtuous cycle' of personalization.
Abstract: By leveraging customer reactions to personalized products and services, companies continuously improve their personalization processes through an iterative feedback loop resulting in the `virtuous cycle' of personalization.

330 citations


Journal ArticleDOI
TL;DR: Studying the transformation of education and its changing role in society is a major challenge for the future of education in India.
Abstract: Studying the transformation of education and its changing role in society.

316 citations


Journal ArticleDOI
TL;DR: Web-based businesses succeed by cultivating consumers' trust, starting with their beliefs, attitudes, intentions, and willingness to perform transactions at Web sites and with the organizations behind them.
Abstract: Web-based businesses succeed by cultivating consumers' trust, starting with their beliefs, attitudes, intentions, and willingness to perform transactions at Web sites and with the organizations behind them.

301 citations


Journal ArticleDOI
TL;DR: This publication contains reprint articles for which IEEE does not hold copyright and which are likely to be copyrighted.
Abstract: Consumers need to feel they have control over the RFID infrastructure before they routinely trust its services.

Journal ArticleDOI
TL;DR: A new generation of data mining tools and applications work to unearth hidden patterns in large volumes of crime data to help solve crime.
Abstract: A new generation of data mining tools and applications work to unearth hidden patterns in large volumes of crime data.

Journal ArticleDOI
TL;DR: Locality of reference is a fundamental principle of computing with many applications and here is the story of its story.
Abstract: Locality of reference is a fundamental principle of computing with many applications. Here is its story.

Journal ArticleDOI
TL;DR: Digital augmentation dissolves many of the physical barriers to learning by offering tools to integrate data and discoveries that travel with students as they explore new terrain.
Abstract: Digital augmentation dissolves many of the physical barriers to learning by offering tools to integrate data and discoveries that travel with students as they explore new terrain.

Journal ArticleDOI
TL;DR: Two-factor authentication has been around for at least two decades, but it is only recently that they have received mass-market attention and some banks are issuing them to customers, and even more are talking about doing it.
Abstract: T wo-factor authentication isn't our savior. It won't defend against phishing. It's not going to prevent identity theft. It's not going to secure online accounts from fraudulent transactions. It solves the security problems we had 10 years ago, not the security problems we have today. The problem with passwords is that it is too easy to lose control of them. People give their passwords to other people. People write them down, and other people read them. People send them in email, and that email is intercepted. People use them to log into remote servers, and their communications are eavesdropped on. Passwords are also easy to guess. And once any of that happens, the password no longer works as an authentication token because you can never be sure who is typing in that password. Two-factor authentication mitigates this problem. If your password includes a number that changes every minute, or a unique reply to a random challenge, then it's difficult for someone else to intercept. You can't write down the ever-changing part. An intercepted password won't be usable the next time it's needed. And a two-factor password is more difficult to guess. Sure, someone can always give his password and token to his secretary, but no solution is foolproof. These tokens have been around for at least two decades, but it's only recently that they have received mass-market attention. AOL is rolling them out. Some banks are issuing them to customers , and even more are talking about doing it. It seems that corporations are finally recognizing the fact that passwords don't provide adequate security , and are hoping that two-factor authentication will fix their problems. Unfortunately, the nature of attacks has changed over those two decades. Back then, the threats were all passive: eavesdropping and offline password guessing. Today, the threats are more active: phishing and Trojan horses. Two new active attacks we're starting to see include: Man-in-the-Middle Attack. An attacker puts up a fake bank Web site and entices a user to that Web site. The user types in his password, and the attacker in turn uses it to access the bank's real Web site. Done correctly, the user will never realize that he isn't at the bank's Web site. Then the attacker either disconnects the user and makes any fraudulent transactions he wants, or passes along the user's banking transactions while making his own transactions at the same …

Journal ArticleDOI
TL;DR: A new generation of entertainment technology takes computer games to the streets and beyond, and shows how they can be used for good and ill.
Abstract: A new generation of entertainment technology takes computer games to the streets---and ultimately beyond.

Journal ArticleDOI
TL;DR: Evaluating the potential advantages and considering the risks associated with electronic health care records suggests that the use of EHRs should be considered as a viable option in the clinical practice.
Abstract: Evaluating the potential advantages and considering the risks associated with electronic health care records.

Journal ArticleDOI
TL;DR: The value proposition of mobile applications can be defined as the net value of the benefits and costs associated with the adoption and adaptation ofMobile applications.
Abstract: Mobile and wireless devices are enabling organizations to conduct business more effectively. Mobile applications can be used to support e-commerce with customers and suppliers, and to conduct e-business within and across organizational boundaries. Despite these benefits, organizations and their customers still lack an understanding of the value of mobile applications. Value is defined here as the principles for evaluating the consequences of action, inaction, or decision [4]. The value proposition of mobile applications can be defined as the net value of the benefits and costs associated with the adoption and adaptation of mobile applications [2].

Journal ArticleDOI
TL;DR: This work has shown that tracking common search terms used on the Web can produce accurate, useful statistics about the unemployment rate, and hopes to extend this approach to other economic statistics.
Abstract: Tracking common search terms used on the Web can produce accurate, useful statistics about the unemployment rate. We hope to extend this approach to other economic statistics.

Journal ArticleDOI
TL;DR: This publication contains reprint articles for which IEEE does not hold copyright and is not available on IEEE Xplore for these articles.
Abstract: Cheap tags and technology simple and secure enough to ensure personal data privacy are required before retailers implement and consumers trust and confidently use them on a mass scale.

Journal ArticleDOI
Sherry Hsi1, Holly Fait1
TL;DR: Interactive RFID-enhanced museum exhibits let visitors continue their scientific exploration beyond the museum's walls, but museums must still help them understand the technology and address their data privacy concerns.
Abstract: Interactive RFID-enhanced museum exhibits let visitors continue their scientific exploration beyond the museum's walls. But museums must still help them understand the technology and address their data privacy concerns.

Journal ArticleDOI
Ping Zhang1, Na Li1
TL;DR: Users aren't always rational logical beings---emotion plays an often overlooked role in user acceptance of technology.
Abstract: Users aren't always rational logical beings---emotion plays an often overlooked role in user acceptance of technology.

Journal ArticleDOI
TL;DR: Realizing the benefits of continuous software process improvement is a major challenge in the rapidly changing environment and the need to continually improve the quality of software products is a challenge.
Abstract: Realizing the benefits of continuous software process improvement.

Journal ArticleDOI
TL;DR: With the recent widespread application of IT and the Internet throughout China, technostress has become a serious issue for both users and IT professionals due to its potential effect on users' mental health and on-the-job productivity.
Abstract: Technostress has been defined as any negative effect on human attitudes, thoughts, behavior, and psychology that directly or indirectly results from technology [8]. With the recent widespread application of IT and the Internet throughout China, technostress has become a serious issue for both users and IT professionals due to its potential effect on users' mental health and on-the-job productivity. Chinese employees are surrounded, often overwhelmed, by modern technology. The top 100 largest Chinese enterprises, accounting for 25% of China's GDP, are investing heavily ($10--$15 billion annually) in new IT applications, including enterprise resource planning systems. A 2002 report by the Chinese Ministry of Information Industry stated that there are 380 million mobile phone subscribers in China, making the country the world's largest mobile phone market. And a survey conducted in 2004 by the China Internet Network Information Center found that 87 million Chinese frequently accessed the Internet in 2004, an increase of 19 million, or 27.9%, over 2003.

Journal ArticleDOI
TL;DR: The iBracelet and the Wireless Identification and Sensing Platform promise the ability to infer human activity directly from sensor readings.
Abstract: The iBracelet and the Wireless Identification and Sensing Platform promise the ability to infer human activity directly from sensor readings.

Journal ArticleDOI
TL;DR: 3PL providers with advanced IT are expected to lower logistics costs and integrate the supply chain with increased productivity and growth, and here is a set of criteria for choosing the most suitable provider.
Abstract: 3PL providers with advanced IT are expected to lower logistics costs and integrate the supply chain with increased productivity and growth. Here, a set of criteria for choosing the most suitable provider.

Journal ArticleDOI
TL;DR: The Wikipedia (WP) applies the wiki technology (from a Hawaiian word for “quick”) to the encyclopedia, a venerable form of knowledge organization and dissemination, but will this process actually yield a reliable, authoritative reference encompassing the entire range of human knowledge?
Abstract: The Wikipedia (WP; en.wikipedia.org/wiki/) applies the wiki technology (from a Hawaiian word for “quick”) to the encyclopedia, a venerable form of knowledge organization and dissemination. Wikipedia provides a fast and flexible way for anyone to create and edit encyclopedia articles without the delay and intervention of a formal editor or review process. The WP’s over 750,000 articles are written and edited by volunteers. WP founder Jimmy Wales believes WP’s free, open, and largely unregulated process will evolve toward an Encyclopædia Britannica or better quality. But will this process actually yield a reliable, authoritative reference encompassing the entire range of human knowledge? Opinions are mixed. WP claims to be the most popular reference site on the Internet. It has been hailed as the quintessence of the “wisdom of crowds,” as a model of democratized information, and as a nail in the coffin of the “stodgy old commercial encyclopedia.” Others are concerned about the reliability of an uncontrolled reference work that may include any number of purposeful or accidental inaccuracies. Some observers wonder why anyone would accept information from anonymous strangers of unknown qualifications. WP’s first editor in chief, Larry Sanger, believes that an anti-expertise bias among “Wikipedians” foreshadows the death of accuracy in scholarship (“Why Wikipedia Must Jettison Its Anti-Elitism”; www.kuro5hin.org/story/2004/12/30/142458/25). Robert McHenry, former editor of Encyclopædia Britannica, is even more blunt in asserting that the community-accretion process of Wikipedia is fundamentally incapable of rising to a high standard of excellence (“The Faith-Based Encyclopedia”; www.techcentralstation.com/111504A.html). Regardless of which side you’re on, relying on Wikipedia presents numerous risks: • Accuracy: You cannot be sure which information is accurate and which is not. Misinformation has a negative value; even if you get it for free, you’ve paid too much. • Motives: You cannot know the motives of the contributors to an article. They may be altruists, political or commercial opportunists, practical jokers, or even vandals. • Uncertain Expertise: Some contributors exceed their expertise and supply speculations, rumors, hearsay, or incorrect information. It is difficult to determine how qualified an article’s contributors are; the revision histories often identify them by pseudonyms, making it difficult to check credentials and sources. • Volatility: Contributions and corrections may be negated by future contributors. One of the coauthors of this column found it disconcerting that he had the power to independently alter the Wikipedia article about himself. Volatility creates a conundrum for citations: Should you cite the version of the article that you read (meaning that those who follow your link may miss corrections and other improvements), or the latest version (which may differ significantly from the article you saw)? • Coverage: Voluntary contributions largely represent the interests and knowledge of a self-selected set of contributors. They are not part of a careful plan to organize human knowledge. Topics that interest the young and Internet-savvy are wellcovered, while events that happened “before the Web” may be covered inadequately or inaccurately, if at all. More is written about current news than about historical knowledge. • Sources: Many articles do not cite independent sources. Few articles contain citations to works not digitized and stored in the open Internet. The foregoing effects can pollute enough information to undermine trust in the work as a whole. The WP organizers are aware of some of these risks, acknowledging that “Wikipedia contains no formal peer review process for fact-checking, and the editors themselves may not be well-versed in the topics they write about.” The organizers have established a background editorial process to mitigate some of the risks. Still, no one stands officially behind the authenticity and accuracy of any information in WP. There is no mechanism for subject-matter authorities to review and vouch for articles. There are no processes to ferret out little-known facts and include them, or to ensure that the full range of human knowledge, past and present, is represented. The Wikipedia is an interesting social experiment in knowledge compilation and codification. However, it cannot attain the status of a true encyclopedia without more formal content-inclusion and expert review procedures.

Journal ArticleDOI
TL;DR: A composite of the top 50 computing journals over the last 15 years was created by examining how those rankings fared over time and across studies.
Abstract: Many have studied and ranked the quality of computing journals over the last 15 years. This composite of the top 50 was created by examining how those rankings fared over time and across studies.

Journal ArticleDOI
TL;DR: Though conventional OO design suggests programs should be built from many small objects, like Lego bricks, they are instead built from objects that are scale-free, like fractals, and unlike Lego bricks.
Abstract: Though conventional OO design suggests programs should be built from many small objects, like Lego bricks, they are instead built from objects that are scale-free, like fractals, and unlike Lego bricks.

Journal ArticleDOI
TL;DR: Using a common set of attributes to determine which methodology to use in a particular data warehousing project.
Abstract: Using a common set of attributes to determine which methodology to use in a particular data warehousing project.