Computer

Issue 6 • June 2009

Filter Results

Displaying Results 1 - 25 of 34
  • [Front cover]

    Publication Year: 2009, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (74 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (293 KB)
    Freely Available from IEEE
  • Computer Highlights Society Magazines

    Publication Year: 2009, Page(s):4 - 5
    Request permission for commercial reuse | PDF file iconPDF (569 KB)
    Freely Available from IEEE
  • Letters

    Publication Year: 2009, Page(s):6 - 7
    Request permission for commercial reuse | PDF file iconPDF (15358 KB) | HTML iconHTML
    Freely Available from IEEE
  • Compsac [advertisement]

    Publication Year: 2009, Page(s): 8
    Request permission for commercial reuse | PDF file iconPDF (193 KB)
    Freely Available from IEEE
  • Marking the Fall of Sparrows

    Publication Year: 2009, Page(s):9 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1087 KB) | HTML iconHTML

    Electronic systems change the flow of work, the habits of thought, the way we perceive our activities. In the case of healthcare, such changes could easily produce a system that is radically different from the one we know. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 32 and 16 Years Ago

    Publication Year: 2009, Page(s):13 - 14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (170 KB) | HTML iconHTML

    Highlights new technologies being written about in Computer Magazine in 1977 and 1993. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Future of Mobile VoIP in the Enterprise

    Publication Year: 2009, Page(s):15 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2628 KB) | HTML iconHTML

    Mobile voice over IP (mVoIP) is a tempting prospect for many companies. After all, sending wireless phone calls over IP networks is considerably less expensive than sending them over cellular voice networks. This may become an important service in the coming years as device manufacturers exploit more-powerful processors and cheaper memory. Faster processors and cheaper memory will enable conferenc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Trail of the Conficker Worm

    Publication Year: 2009, Page(s):19 - 22
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1775 KB) | HTML iconHTML

    The recent Conficker worm has garnered considerable attention by infecting millions of machines and having the potential to cause many problems. Conficker has created a new level of cohesion between security, domain-name-administration, routing, and code-analysis professionals, according to the Shadowserver Foundation's Di Mino. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • News Briefs

    Publication Year: 2009, Page(s):23 - 25
    Request permission for commercial reuse | PDF file iconPDF (564 KB) | HTML iconHTML
    Freely Available from IEEE
  • [CS Info Page]

    Publication Year: 2009, Page(s): 26
    Request permission for commercial reuse | PDF file iconPDF (64 KB)
    Freely Available from IEEE
  • Internet Banking: Client-Side Attacks and Protection Mechanisms

    Publication Year: 2009, Page(s):27 - 33
    Cited by:  Papers (11)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB) | HTML iconHTML

    Although current mechanisms protect against offline credential-stealing attacks, effective protection against online channel-breaking attacks requires technologies to defeat man-in-the-middle (MITM) attacks, and practical protection against content-manipulation attacks requires transaction-authentication technologies. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software Engineering Ethics in a Digital World

    Publication Year: 2009, Page(s):34 - 41
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (761 KB) | HTML iconHTML

    In ethics-aware software engineering, ethical considerations are explicitly taken into account across the software development life cycle and are an integral part of risk assessment and acceptance criteria. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ensuring Trust, Privacy, and Etiquette in Web 2.0 Applications

    Publication Year: 2009, Page(s):42 - 49
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1433 KB) | HTML iconHTML

    An analysis of three user studies of Web 2.0 applications reveals the most important requirements related to ethical issues. The development of features that support these requirements should be tailored to the type of application and specific community needs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Precautionary Principle in a World of Digital Dependencies

    Publication Year: 2009, Page(s):50 - 56
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (339 KB) | HTML iconHTML

    As organizations become deperimeterized, a new paradigm in software engineering ethics becomes necessary. We can no longer rely on an ethics of consequences, but might instead rely on the precautionary principle, which lets software engineers focus on creating a more extensive moral framework. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CSDA and CSDP [advertisement]

    Publication Year: 2009, Page(s): 57
    Request permission for commercial reuse | PDF file iconPDF (8863 KB)
    Freely Available from IEEE
  • Social Impact of Information System Failures

    Publication Year: 2009, Page(s):58 - 65
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (701 KB) | HTML iconHTML

    The social impact of information systems becomes visible when serious system failures occur. A case of mistyping in entering a stock order by Mizuho Securities and the following lawsuit between Mizuho and the Tokyo Stock Exchange sheds light on the critical role of software in society. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Public is the Priority: Making Decisions Using the Software Engineering Code of Ethics

    Publication Year: 2009, Page(s):66 - 73
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1313 KB) | HTML iconHTML

    The software engineering code of ethics and professional practice encourages software engineers to undertake positive actions and to resist pressures to act unethically. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Career opportunities

    Publication Year: 2009, Page(s):74 - 76
    Request permission for commercial reuse | PDF file iconPDF (303 KB)
    Freely Available from IEEE
  • Advertisers index

    Publication Year: 2009, Page(s): 77
    Request permission for commercial reuse | PDF file iconPDF (63 KB)
    Freely Available from IEEE
  • IEEE Foundation Gives Away More Than $300,000

    Publication Year: 2009, Page(s):78 - 79
    Request permission for commercial reuse | PDF file iconPDF (361 KB)
    Freely Available from IEEE
  • Call and Calendar

    Publication Year: 2009, Page(s):80 - 81
    Request permission for commercial reuse | PDF file iconPDF (349 KB)
    Freely Available from IEEE
  • CS membership forms

    Publication Year: 2009, Page(s): 82
    Request permission for commercial reuse | PDF file iconPDF (364 KB)
    Freely Available from IEEE
  • CS membership forms

    Publication Year: 2009, Page(s): 83
    Request permission for commercial reuse | PDF file iconPDF (78 KB)
    Freely Available from IEEE
  • CS membership forms

    Publication Year: 2009, Page(s): 84
    Request permission for commercial reuse | PDF file iconPDF (105 KB)
    Freely Available from IEEE

Aims & Scope

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sumi Helal
Lancaster University
sumi.helal@computer.org