default search action
IEEE Technology and Society Magazine, Volume 28
Volume 28, Number 1, Spring 2009
- John S. Canning:
"You've just been disarmed. Have a nice day!". 13-15 - Noel E. Sharkey:
Death strikes from the sky: the calculus of proportionality. 16-19 - Peter M. Asaro:
Modeling the moral user. 20-24 - Robert Sparrow:
Predators or plowshares? arms control of robotic weapons. 25-29 - Ronald C. Arkin:
Ethical robots in warfare. 30-33
- Mark Burdon:
Commercializing public sector information privacy and security concerns. 34-40 - Lucy Resnyansky:
The internet and the changing nature of intelligence. 41-47 - Melih Kirlidog, Meric Aykol, Sevinç Gülseçen:
Interpersonal communication and gender in the ICT profession. 48-56
Volume 28, Number 2, Summer 2009
- Edward A. Friedman:
Enhancing rural healthcare in Rwanda through clinical decision support [News and Notes]. 4 - Clinton J. Andrews:
Innovation as energy policy for the world [Policy Perspectives]. 5-6 - Matthew A. Wong:
Wireless nomad: Pioneer in an urban residential environment. 9-15 - Susan O'Donnell, Sonja Perley, Deanne C. Simms, Brecken Rose Hancock:
Video communication roadblocks facing remote indigenous communities. 16-22 - Adam Fiser, Andrew Clement:
K-Net and Canadian Aboriginal communities. 23-33 - Gordon A. Gow, Tara McGee, David Townsend, Peter Anderson, Stanley Varnhagen:
Communication technology, emergency alerts, and campus safety. 34-41 - Víctor M. González, Luís A. Castro, Marcela D. Rodríguez:
Technology and connections Mexican immigrants in the U.S. 42-48 - Han-Teng Liao:
Conflict and consensus in the Chinese version of Wikipedia. 49-56
- Ofer Arazy, Ian R. Gellatly, Soobaek Jang, Raymond A. Patterson:
Wiki deployment in corporate settings. 57-64
Volume 28, Number 3, Fall 2009
- Seref Sagiroglu, Gurol Canbek:
Keyloggers: Increasing Threats to Computer Security and Privacy. 10-17 - Edward A. Friedman:
Computer-assisted medical diagnosis for rural Sub-Saharan Africa. 18-27 - Haiko Van Der Voort, Hans de Bruijn:
Learning from disasters. 28-36 - L. Jean Camp:
Mental models of privacy and security. 37-46 - Chuck Huff, Laura Barnard:
Good computing. 47-54 - Louis-François Pau:
Privacy management service contacts as business opportunity. 55-63 - Patrick E. Meyer:
Greening IEEE. 64-72
Volume 28, Number 4, Winter 2009
- Bernard Amadei, William A. Wallace:
Engineering for humanitarian development. 6-15 - Stephen E. Silliman:
Assessing experiences of international students in Haiti and Benin. 16-24 - Karl Perusich, Harold Tepper, J. Roberto B. de Marca, Russ Lefevre, Richard Baseil:
Linking technologists and humanitarians: IEEE/UN FoundationHumanitarian Technology Challenge. 25-31 - Jonathan D. J. Vandersteen, Caroline A. Baillie, Kevin R. Hall:
International humanitarian engineering: Who benefits and who pays? 32-41 - Jen Schneider, Juan C. Lucena, Jon A. Leydens:
Engineering to help: The value of critique in engineering service. 42-48
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.