default search action
IEEE Technology and Society Magazine, Volume 22
Volume 22, Number 1, Spring 2003
- Stephen H. Unger:
Judges versus engineers. 5-8 - David Shepherd:
Networked microsensors and the end of the world as we know it. 16-22 - Martin Peckerar:
Addressing myths of science and public policy in the United States - 1. 23-33 - Rosalyn Berne:
Recognizing religious mythology in visions of new technology. 34-39 - William C. Pittman:
Evolution of the DOD microwave and millimeter wave monolithic IC program. 40-46 - Jerome E. Dobson, Peter F. Fisher:
Geoslavery. 47-52 - Jonathan Meer:
Getting on the Net: the struggle for digital inclusion of the Navajo. 53-58
Volume 22, Number 2, Summer 2003
- Chuck Huff, Deborah G. Johnson, Keith W. Miller:
Virtual harms and real responsibility. 12-19 - Simone Cecchini:
Tapping ICT to reduce poverty in rural India. 20-27 - Rajiv C. Shah, Jay P. Kesan:
Incorporating societal concerns into communication technologies. 28-33 - Roberta Brody:
Information ethics in the design and use of metadata. 34-39 - Dan L. Burk:
Anti-circumvention misuse. 40-47
Volume 22, Number 3, Fall 2003
- William Aspray:
Diversifying computing. 8-9 - Caroline E. Wardle:
NSF initiatives for the information technology workforce. 10-11 - Jane Margolis, Jennifer Jellison Holme, Rachel Estrella, Joanna Goode, Kim Nao, Simeon Stumme:
The computer science pipeline in urban high schools: access to what? For whom? 12-19 - Sandra Katz, John M. Aronis, David Allbritton, Christine Wilson, Mary Lou Soffa:
Gender and race in predicting achievement in computer science. 20-27 - Joanne McGrath Cohoon, Katharine M. Baylor:
Female graduate students and program quality. 28-35 - Cheryl B. Leggon:
Women of color in IT: degree trends and policy implications. 36-42 - Vashti Galpin, Ian Douglas Sanders, Heather Turner, Bernadine Venter:
Computer self-efficacy, gender, and educational background in South Africa. 43-48
Volume 22, Number 4, Winter 2003
- Missy L. Cummings:
The double-edged sword of secrecy in military weapon development. 4-12 - Adam J. Elbirt:
Information warfare: are you at risk? 13-19 - Victor Wacham A. Mbarika:
Approaching subSaharan Africa's educational dilemma with teleeducation. 20-26
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.