


default search action
ISTAS 2011: Chicago, IL, USA
- 2011 IEEE International Symposium on Technology and Society, ISTAS 2011, Chicago, IL, USA, May 23-25, 2011. IEEE 2011
- Greg Adamson
:
Socially beneficial technology [can it be achieved in practice?]. 1-5 - Queen Esther Booker, Fred L. Kitchens:
An exploratory study of student confidence in using electronic books as learning tools. 1-5 - Sabine Cikic, Julian R. Kücklich:
What farmville can teach us about cooperative workflows and architectures. 1-7 - Michael Davis, Keith W. Miller
, Andreas F. X. Wolkenstein:
The rules [moral responsibility for computing artifacts]. 1 - Tyler C. Folsom
:
Social ramifications of autonomous urban land vehicles. 1-6 - Sarah Jean Fusco, Katina Michael, Anas Aloudat
, Roba Abbas
:
Monitoring people using location-based social networking and its negative impact on trust. 1-11 - Frances S. Grodzinsky, Marty J. Wolf, Keith W. Miller:
Quantum computing and cloud computing: humans trusting humans via machines. 1-5 - Sriram Guddireddigari, Helena Grunfeld, Graeme Johanson:
Exploring the role of digital diaspora in ICT4D project implementation. 1 - Margaret Hamilton
, Flora Dilys Salim
, Eva Cheng
, Sue Lynn Choy
:
Transafe: a crowdsourced mobile platform for crime and safety perception management. 1-6 - Susan Helser:
An interdisciplinary approach to address identity theft education. 1-8 - Timothy Kostyk:
Embedded governance in technology and the development of the smart grid. 1-6 - Timothy Kostyk, Clinton J. Andrews
, Joseph Herkert
, Clark Miller:
Energy and society: challenges ahead. 1 - Raja S. Kushalnagar
, Brian P. Trager:
Improving classroom visual accessibility with cooperative smartphone recordings. 1-5 - Jane Chu Prey:
Why so few of us? the mystery of the lack of women in computing. 1 - Aimee Rickman:
Learning how to be normal online [college newspaper comment boards and the college student identity]. 1 - Gautam B. Singh:
E-discovery regulations and information technology management. 1-4 - Siddharth Taduri, Gloria T. Lau, Kincho H. Law, Hang Yu, Jay P. Kesan:
An ontology to integrate multiple information domains in the patent system. 1-9 - Mary Sheila Tracy, Florence Appel, Lucinda Caughey:
Acting locally: engaging girls in computer technology. 1 - Chin Chin Wong, Santha Vaithilingam, Mahendhiran Nair:
Adoption of mobile advertising [empirical evidence from a developing country]. 1-5

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.