Table of Contents
Diane Crawford Page 5
Robert Fox Pages 9-10
Anne Adams and Martina Angela Sasse, in their article about password selection, "Users Are Not the Enemy" (Dec. 1999, p. 41), don't mention how to compose passwords that are both easy to remember and difficult to crack.
Rosemary McGuinness Pages 13-14
Corporations tout consumerism against citizenship.
Neil Munro Pages 15-17
For a medium that holds anonymity in high regard, privacy is fast eroding.
Meg McGinity Pages 19-21
Kuldeep Kumar, Jos van Hillegersberg Pages 22-26
Searching for ERP systems offering a perfect fit.
Yvonne van Everdingen, Jos van Hillegersberg, Eric Waarts Pages 27-31
Are some organizational decision-makers blind to the benefits of ERP?
Leslie P. Willcocks, Richard Sykes Pages 32-38
Implementing ERP into business education is as challenging as it is rewarding—and necessary.
Irma Becerra-Fernandez, Kenneth E. Murphy, Steven J. Simon Pages 39-41
The meanings of "enterprise" and "site" vary depending on unique organizational circumstances.
M. Lynne Markus, Cornelis Tanis, Paul C. van Fenema Pages 42-46
The universality of embedded business models of "industry best practices" is considered from an Asian perspective.
Christina Soh, Sia Siew Kien, Joanne Tay-Yap Pages 47-51
A provider's versus a customer's perspective.
Mark Kremers, Han van Dissel Pages 53-56
Using business process models to achieve positive results.
August-Wilhelm Scheer, Frank Habermann Pages 57-61
Tomorrow's customers will demand the ability to buy, reuse, and build their competitive-edge solutions: Can the package vendors adapt in time?
David Sprott Pages 63-69
More than another friendly face, Rea knows how to have a conversation with living, breathing human users with a wink, a nod, and a sidelong glance.
Justine Cassell Pages 70-78
Only the most advanced parallel computers are fast enough to produce high-quality ocean simulations and accurate global climate predictions of temperature and precipitation.
Albert Semtner Pages 80-89
There are many practices that should be avoided in order to enhance the safety features of software systems.
Jonathan Bowen Pages 91-97
Creating a cyberspace situational awareness environment will take more sophisticated tools and network sensors.
Tim Bass Pages 99-105
Virtually all real programmers are insensitive. Not personal insensitivity, but technical insensitivity, the kind that results from viewing a problem solely from one's own perspective.
Munindar P. Singh, Mona Singh Pages 107-108
Jerzy W. Grzymala-Busse, Wojciech Ziarko Pages 108-109
Friedrich Steimann Pages 109-111
Peter G. Neumann Page 136