K. Computing Milieux
- K.0 GENERAL
- K.1 THE COMPUTER INDUSTRY
- Markets
- Standards
- Statistics
- Suppliers
- K.2 HISTORY OF COMPUTING
- Hardware
- People
- Software
- Systems
- Theory
- K.3 COMPUTERS AND EDUCATION
- K.3.0 General
- K.3.1 Computer Uses in Education
- Collaborative learning (new)
- Computer-assisted instruction (CAI)
- Computer-managed instruction (CMI)
- Distance learning (new)
- K.3.2 Computer and Information Science Education
- Accreditation (new)
- Computer science education
- Curriculum
- Information systems education
- Literacy (new)
- Self-assessment
- K.3.m Miscellaneous
- Accreditation (retired since 1998)
- Computer literacy (retired since 1998)
- K.4 COMPUTERS AND SOCIETY
- K.4.0 General
- K.4.1 Public Policy Issues
- Abuse and crime involving computers (new)
- Computer-related health issues (new)
- Ethics (new)
- Human safety
- Intellectual property rights (new)
- Privacy
- Regulation
- Transborder data flow
- Use/abuse of power (new)
- K.4.2 Social Issues
- Abuse and crime involving computers (retired since 1998)
- Assistive technologies for persons with disabilities (new)
- Employment
- Handicapped persons/special needs (retired since 1998)
- K.4.3 Organizational Impacts
- Automation (new)
- Computer-supported collaborative work (new)
- Employment (new)
- Reengineering (new)
- K.4.4 Electronic Commerce (new)
(see also J.1)
- Cybercash, digital cash (new)
- Distributed commercial transactions (new)
- Electronic data interchange (EDI) (new)
- Intellectual property (new)
- Payment schemes (new)
- Security (new)
- K.4.m Miscellaneous
- K.5 LEGAL ASPECTS OF COMPUTING
- K.5.0 General
- K.5.1 Hardware/Software Protection (revised 1998)
- Copyrights (retired since 1998)
- Licensing (new)
- Patents
- Proprietary rights
- Trade secrets (retired since 1998)
- K.5.2 Governmental Issues
- Censorship (new)
- Regulation
- Taxation
- K.5.m Miscellaneous
- Contracts (retired since 1998)
- Hardware patents (retired since 1998)
- K.6 MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS
- K.6.0 General
- K.6.1 Project and People Management
- Life cycle
- Management techniques (e.g., PERT/CPM)
- Staffing
- Strategic information systems planning (new)
- Systems analysis and design
- Systems development
- Training
- K.6.2 Installation Management
- Benchmarks
- Computer selection
- Computing equipment management
- Performance and usage measurement
- Pricing and resource allocation
- K.6.3 Software Management
(see also D.2.9)
- Software development
- Software maintenance
- Software process (new)
- Software selection
- K.6.4 System Management
- Centralization/decentralization
- Management audit
- Quality assurance
- K.6.5 Security and Protection
(see also D.4.6,
K.4.2)
- Authentication
- Insurance (retired since 1991)
- Invasive software (e.g., viruses, worms, Trojan horses)
- Physical security (retired since 1998)
- Unauthorized access (e.g., hacking, phreaking) (new)
- K.6.m Miscellaneous
- Insurance (revised 1991)
- Security (revised 1991)
- K.7 THE COMPUTING PROFESSION
- K.7.0 General
- K.7.1 Occupations
- K.7.2 Organizations
- K.7.3 Testing, Certification, and Licensing
- K.7.4 Professional Ethics (new)
(see also K.4)
- Codes of ethics (new)
- Codes of good practice (new)
- Ethical dilemmas (new)
- K.7.m Miscellaneous
- Codes of good practice (retired since 1998)
- Ethics (retired since 1998)
- K.8 PERSONAL COMPUTING
- Games (revised 1991)
- K.8.0 General
- Games (retired since 1991)
- K.8.1 Application Packages
- Data communications
- Database processing
- Freeware/shareware (new)
- Graphics
- Spreadsheets
- Word processing
- K.8.2 Hardware
- K.8.3 Management/Maintenance
- K.8.m Miscellaneous (new)
- K.m MISCELLANEOUS