Journals in DBLP
Commun. ACM 2005, volume: 48, number: 8
Diane Crawford Editorial pointers. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2005, v:48, n:8, pp:5- [Journal ] News track. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2005, v:48, n:8, pp:9-10 [Journal ] Diane Crawford Forum. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2005, v:48, n:8, pp:11-13 [Journal ] Robert L. Glass "Silver bullet" milestones in software history. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2005, v:48, n:8, pp:15-18 [Journal ] Diane Crawford Top 10 downloads from ACM's digital library. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2005, v:48, n:8, pp:19-20 [Journal ] Hal Berghel , Jacob Uecker WiFi attack vectors. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2005, v:48, n:8, pp:21-28 [Journal ] David A. Patterson Does ACM support matter to conferences or journals? [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2005, v:48, n:8, pp:29-30 [Journal ] Sanjeev Arora , Bernard Chazelle Is the thrill gone? [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2005, v:48, n:8, pp:31-33 [Journal ] Thomas F. Stafford Introduction. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2005, v:48, n:8, pp:34-36 [Journal ] Steve Gibson Spyware was inevitable. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2005, v:48, n:8, pp:37-39 [Journal ] Roger Thompson Why spyware poses multiple threats to security. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2005, v:48, n:8, pp:41-43 [Journal ] Xiaoni Zhang What do consumers really know about spyware? [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2005, v:48, n:8, pp:44-48 [Journal ] Lee A. Freeman , Andrew Urbaczewski Why do people hate spyware? [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2005, v:48, n:8, pp:50-53 [Journal ] Neveen Farag Awad , Kristina Fitzgerald The deceptive behaviors that offend us most about spyware. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2005, v:48, n:8, pp:55-60 [Journal ] Qing Hu , Tamara Dinev Is spyware an Internet nuisance or public menace? [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2005, v:48, n:8, pp:61-66 [Journal ] Mark B. Schmidt , Kirk P. Arnett Spyware: a little knowledge is a wonderful thing. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2005, v:48, n:8, pp:67-70 [Journal ] Younghwa Lee , Kenneth A. Kozar Investigating factors affecting the adoption of anti-spyware systems. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2005, v:48, n:8, pp:72-77 [Journal ] Merrill Warkentin , Xin Luo , Gary F. Templeton A framework for spyware assessment. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2005, v:48, n:8, pp:79-84 [Journal ] Sudhindra Shukla , Fiona Fui-Hoon Nah Web browsing and spyware intrusion. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2005, v:48, n:8, pp:85-90 [Journal ] Kirk P. Arnett , Mark B. Schmidt Busting the ghost in the machine. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2005, v:48, n:8, pp:92-95 [Journal ] Robin Poston , Thomas F. Stafford , Amy Hennington Spyware: a view from the (online) street. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2005, v:48, n:8, pp:96-99 [Journal ] Indranil Bose , Raktim Pal Auto-ID: managing anything, anywhere, anytime in the supply chain. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2005, v:48, n:8, pp:100-106 [Journal ] Yihua Philip Sheng , Peter P. Mykytyn Jr. , Charles R. Litecky Competitor analysis and its defenses in the e-marketplace. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2005, v:48, n:8, pp:107-112 [Journal ] Casey G. Cegielski , Brian J. Reithel , Carl M. Rebman Emerging information technologies: developing a timely IT strategy. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2005, v:48, n:8, pp:113-117 [Journal ] Gregory W. Bond Software as art. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2005, v:48, n:8, pp:118-124 [Journal ] Don Hardaway Sharing research in the 21st century: borrowing a page from open source software. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2005, v:48, n:8, pp:125-128 [Journal ] Jeanette Nasem Morgan Why the software industry needs a good ghostbuster. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2005, v:48, n:8, pp:129-133 [Journal ] Harry L. Reif , Michel Mitri How university professors teach project management for information systems. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2005, v:48, n:8, pp:134-136 [Journal ] Peter G. Neumann , Michael D. Byrne Disability-related risks. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2005, v:48, n:8, pp:144- [Journal ]