|
Journals in DBLP
Commun. ACM 2000, volume: 43, number: 12
- Diane Crawford
Editorial Pointers. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2000, v:43, n:12, pp:5- [Journal]
- Robert Fox
News track. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2000, v:43, n:12, pp:9-10 [Journal]
- Diane Crawford
Forum: Software piracy is not just economics anymore. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2000, v:43, n:12, pp:11-13 [Journal]
- Elliot Soloway, Cathleen A. Norris, Phyllis Blumenfeld, Ronald Marx, Joseph Krajcik, Barry Fishman
The three Ts of elementary education. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2000, v:43, n:12, pp:15-19 [Journal]
- Roy Rada, John Craparo
Sharing standards: standardizing software projects. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2000, v:43, n:12, pp:21-25 [Journal]
- Boaz Gelbord
Signing your 011001010 - The problems of digital signatures. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2000, v:43, n:12, pp:27-28 [Journal]
- Andrew Rosenbloom
Trusting technology: Introduction. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2000, v:43, n:12, pp:31-32 [Journal]
- Batya Friedman, Peter H. Kahn Jr., Daniel C. Howe
Trust online. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2000, v:43, n:12, pp:34-40 [Journal]
- Judith S. Olson, Gary M. Olson
i2i trust in e-commerce. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2000, v:43, n:12, pp:41-44 [Journal]
- Paul Resnick, Ko Kuwabara, Richard Zeckhauser, Eric Friedman
Reputation systems. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2000, v:43, n:12, pp:45-48 [Journal]
- Justine Cassell, Timothy W. Bickmore
External manifestations of trustworthiness in the interface. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2000, v:43, n:12, pp:50-56 [Journal]
- Ben Shneiderman
Designing trust into online experiences. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2000, v:43, n:12, pp:57-59 [Journal]
- Eric M. Uslaner
Social capital and the net. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2000, v:43, n:12, pp:60-64 [Journal]
- Jennifer Kreie, Timothy Paul Cronan
Making ethical decisions. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2000, v:43, n:12, pp:66-71 [Journal]
- Detlef Schoder, Pai-Ling Yin
Building firm trust online. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2000, v:43, n:12, pp:73-79 [Journal]
- Sara Jones, Marc Wilikens, Philip Morris, Marcelo Masera
Trust requirements in e-business. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2000, v:43, n:12, pp:81-87 [Journal]
- Trevor T. Moores, Gurpreet Dhillon
Software piracy: a view from Hong Kong. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2000, v:43, n:12, pp:88-93 [Journal]
- Masud Ahmad Malik
On the perils of programming. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2000, v:43, n:12, pp:95-97 [Journal]
- Bruce Schneier
Semantic network attacks. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2000, v:43, n:12, pp:168- [Journal]
|