


default search action
ISTAS 2015: Dublin, Ireland
- 2015 IEEE International Symposium on Technology and Society, ISTAS 2015, Dublin, Ireland, November 11-12, 2015. IEEE 2015, ISBN 978-1-4799-8283-7
- Brian R. Hall:
A snapshot of the subject matter of computing ethics. 1-5 - Christine Winberg
, Shaun Pather, Mike du Plessis:
Supporting a culture of innovation at a new university of technology. 1-6 - Simon Lucas Winberg:
Development of the Fynbos Leaf Optical Recognition Application (FLORA): An innovation journey of a tool to assist in identifying plants. 1-6 - John Lewis, Siaw-Teng Liaw, Pradeep Ray
:
Applying "big data" and business intelligence insights to improving clinical care for cancer. 1-4 - Lynette Herbst, Jorg Lalk:
A review of the policy documents behind South Africa's Renewable Energy Independent Power Producer Procurement Programme: How its hits and misses impact society. 1-6 - Amos Gichamba, Peter Waiganjo, Dan Orwa:
Agriculture among pastoralist communities: A case of livestock farmers in kenyan arid and semi-arid lands. 1-3 - Marco J. Haenssgen
:
Exploring the mismatch between mobile phone adoption and use through survey data from rural India and China. 1-15 - Tony Partridge:
To what extent has human thought and personality become encapsulated by technology-related activity? 1-5 - Kehinde Kayode Agbele, Peter K. Oriogun, Ayodele G. Seluwa, Kehinde D. Aruleba
:
Towards a model for enhancing ICT4 development and information security in healthcare system. 1-6 - Simona Tiuc, Marius Marcu
, Cosmin Cernazanu-Glavan:
Study on content rating and security permissions of mobile applications in google play. 1-6 - Peter S. Excell, Rae A. Earnshaw:
The future of computing - The implications for society of technology forecasting and the Kurzweil singularity. 1-6 - Hanen Jemal, Zied Kechaou, Mounir Ben Ayed, Adel M. Alimi
:
Cloud computing and mobile devices based system for healthcare application. 1-5 - Janet Cox Achora, Haroon Sseguya:
ICT supported extension services in conservation agriculture information access for small holder farmers in Laikipia County, Kenya. 1-6 - Frank Gleeson, Vincent Hargaden
:
Improving knowledge worker efficiency. 1-8 - Hossein Shahrokni, Anca Solacolu:
Real-time ethics - A technology enabled paradigm of everyday ethics in smart cities: Shifting sustainability responsibilities through citizen empowerment. 1-5 - Jackie Phahlamohlaka, Zama Dlamini, Linda Malinga
, Sipho Ngobeni, Thami Mnisi:
A practise-based theory of SEIDET smart community centre model. 1-9 - Cathryn Peoples, M. Hetherington:
The cloud afterlife: Managing your digital legacy. 1-7 - Shely Koshy, Sakeer Husain, Kishore Kumar:
Agricultural information delivery mechanism using ICT: A case study from Kerala, India. 1-3 - Philip A. Catherwood, Dewar D. Finlay
, James McLaughlin
:
Subcutaneous body area networks: A SWOT analysis. 1-8 - Rossouw de Bruin, Sebastiaan H. von Solms:
Modelling Cyber Security Governance Maturity. 1-8 - Guiou Kobayashi, Mariana Claudia Broens, Maria Eunice Quilici González, Jose Artur Quilici González:
The internet of things and its impact on social relationships involving mutual trust. 1-6 - Sergei Frolov, Elena Dmitrieva, Sara Buzadzhi:
Mobile communication tools for the reduction of secondhand smoke in public places: Russian public health programs using mHealth. 1-4 - Tuomas Tanskanen, Anne-Marie Tuikka, Sami Hyrynsalmi
, Kai K. Kimppa
:
The potential development impact of mobile application vendors in developing countries. 1-6 - Pascale-L. Blyth, Milos N. Mladenovic
, Bonnie A. Nardi, Norman Makoto Su, Hamid R. Ekbia:
Driving the self-driving vehicle: Expanding the technological design horizon. 1-6 - Grant Tucker:
Forming an ethical paradigm for morally sentient robots: Sentience is not necessary for evil. 1-5 - Maija Poikela, Robert Schmidt, Ina Wechsung, Sebastian Möller:
"About your smartphone usage" - Privacy in location-based mobile participation. 1-6 - Teuku Aulia Geumpana, Fethi A. Rabhi, John Lewis, Pradeep Kumar Ray
, Liming Zhu
:
Mobile cloud computing for disaster emergency operation: A systematic review. 1-8 - Fiona Edwards Murphy, Michelle Donovan, James Cunningham, Tristan Jezequel, Enrique García, Alex Jaeger, John C. McCarthy
, Emanuel M. Popovici:
i4Toys: Video technology in toys for improved access to play, entertainment, and education. 1-6 - Stuart Elder, Alex Vakaloudis
:
Towards uniformity for smart glasses devices: An assessment of function as the driver for standardisation. 1-7 - Dhvanik Miglani, Arnold Hensman:
Vision for secure home robots: Implementation of two-factor authentication. 1-4 - Amoldo Diaz-Ramirez, Edgar Dominguez, Luís Martínez-Alvarado:
A falls detection system for the elderly based on a WSN. 1-6 - Oluwadara Asinobi, Janet Allison, Martin McKinney, Siobhan Flynn, Michaela M. Black, Adrian Moore:
Empirical findings: The use of robotics to engage the youth from lower socio-economic areas. 1-6 - Wilhelm E. J. Klein:
Pocket psychopaths: An anthropomorphic intentional stance to facilitate moral intuitions about (Consumer) technology. 1-6 - Ivan Ganchev
, Zhanlin Ji
, Mairtin O'Droma
:
Making the UCWW a reality. 1-4 - Andy Dearden, William D. Tucker:
The ethical limits of bungee research in ICTD. 1-6 - David N. Crowley, John G. Breslin, Edward Curry
:
Towards a citizen actuation framework for smart environments. 1-5 - Marc C. Canellas
, Rachel A. Haga:
Toward meaningful human control of autonomous weapons systems through function allocation. 1-7 - Patrick McAllister
, Huiru Zheng
, Raymond R. Bond
, Anne Moorhead:
A semi-automated food voting classification system: Combining user interaction and Support Vector Machines. 1-7 - Christopher J. Soraghan, Gerard Boyle
, Luis Dominguez-Villoria, Jennifer Feighan, David Robinson
:
Challenges of implementing a social prescription service in the clinic: Social prescribing in the LAMP project. 1-6 - Haiyang Zhang
, Nikola S. Nikolov
, Ivan Ganchev
:
UCWW semantic-based service recommendation framework. 1-6 - Sally Ann Applin
, Michael D. Fischer:
New technologies and mixed-use convergence: How humans and algorithms are adapting to each other. 1-6 - Susan Helser:
FIT: Identity theft education: Study of text-based versus game-based learning. 1-4 - Helen van de Haar, Darelle van Greunen, Dalenca Pottas
:
Biometrics in social grants: Separating myth from reality. 1-8 - Peter M. Corcoran, Claudia Costache:
Biometric technology and smartphones: A consideration of the practicalities of a broad adoption of biometrics and the likely impacts. 1-7 - Shejin Thavalengal
, Peter M. Corcoran:
Iris recognition on consumer devices - Challenges and progress. 1-4 - Hossein Javidnia
, Adrian Ungureanu, Peter M. Corcoran:
Palm-print recognition for authentication on smartphones. 1-5 - Greg Adamson
:
Ethical challenges for future technologists: The growing role of technology and the growing ethical responsibility of the technologist. 1-6 - Eddie Conlon:
A critical realist approach to engineering ethics. 1-6 - Alida Veldsman, Darelle van Greunen:
ICT interventions for socio-economic development - A practitioner's view. 1-6 - Lindsay Robertson
, Katina Michael, Albert Munoz Aneiros
:
Supply system's technology configuration as a contributor to end-user vulnerability. 1-6 - Miriam Cunningham:
Factors impacting on adoption of Technology-enhanced Learning techniques by universities in Nairobi, Kenya. 1-7 - Paul Cunningham:
Insights into open innovation and ICT entrepreneurship in Africa. 1-8

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.