Software Certification Debate
Leonard L. Tripp, Benefits of Certification and
Adam Kolawa, Certification Will Do More Harm than Good
(both from Computer, v35, n6, June 2002, IEEE-CS.).
Aftermath of 9/11
Ralph R. Miller. Information Management in the Aftermath of 9/11.
Communications of the ACM, V45/n9, Sept. 2002 and
Friedrich W. Kistermann. Locating the Victims: The Nonrole of
Punched Card Technology and Census Work. Annals of the History
of Computing, v19/n2, 1997.
How the Virtual Inspires the Real
Daniel Hillis, The Power to Shape the World
Alvy Ray Smith, The Reality of Simulated Actors and
Clemens Wagner, Markus Schill and Reinhard Maenner, Intracoular
Surgery on a Virtual Eye
(from Communications of the ACM, v45/n7, July 2002, pp 33-35,
37-38 and 45-49).
Computer Forensics
``Computer Forensics: High-Tech Law Enforcement''. Garber,
Lee. IEEE Computer. January 2001. pg.22-27.
``Forensic Methodologies: A computer Forensic Professional's
Compass''. Kuchta, Kelly J. Information Systems Security
January/February 200
``EPIC analysis of New Justice Department Guidelines on
Searching and Seizing Computers''.
http://www.cpsr.org/cpsr/privacy/epic/guidelines_analysis.txt