


default search action
IEEE Technology and Society Magazine, Volume 22
Volume 22, Number 1, Spring 2003
- Stephen H. Unger:

Judges versus engineers. 5-8 - David Shepherd:

Networked microsensors and the end of the world as we know it. 16-22 - Martin Peckerar:

Addressing myths of science and public policy in the United States - 1. 23-33 - Rosalyn Berne:

Recognizing religious mythology in visions of new technology. 34-39 - William C. Pittman:

Evolution of the DOD microwave and millimeter wave monolithic IC program. 40-46 - Jerome E. Dobson, Peter F. Fisher:

Geoslavery. 47-52 - Jonathan Meer:

Getting on the Net: the struggle for digital inclusion of the Navajo. 53-58
Volume 22, Number 2, Summer 2003
- Chuck Huff, Deborah G. Johnson, Keith W. Miller:

Virtual harms and real responsibility. 12-19 - Simone Cecchini

:
Tapping ICT to reduce poverty in rural India. 20-27 - Rajiv C. Shah, Jay P. Kesan:

Incorporating societal concerns into communication technologies. 28-33 - Roberta Brody:

Information ethics in the design and use of metadata. 34-39 - Dan L. Burk

:
Anti-circumvention misuse. 40-47
Volume 22, Number 3, Fall 2003
- William Aspray:

Diversifying computing. 8-9 - Caroline E. Wardle:

NSF initiatives for the information technology workforce. 10-11 - Jane Margolis, Jennifer Jellison Holme, Rachel Estrella, Joanna Goode, Kim Nao, Simeon Stumme:

The computer science pipeline in urban high schools: access to what? For whom? 12-19 - Sandra Katz, John M. Aronis, David Allbritton, Christine Wilson, Mary Lou Soffa:

Gender and race in predicting achievement in computer science. 20-27 - Joanne McGrath Cohoon, Katharine M. Baylor:

Female graduate students and program quality. 28-35 - Cheryl B. Leggon:

Women of color in IT: degree trends and policy implications. 36-42 - Vashti Galpin

, Ian Douglas Sanders
, Heather Turner, Bernadine Venter:
Computer self-efficacy, gender, and educational background in South Africa. 43-48
Volume 22, Number 4, Winter 2003
- Missy L. Cummings:

The double-edged sword of secrecy in military weapon development. 4-12 - Adam J. Elbirt:

Information warfare: are you at risk? 13-19 - Victor Wacham A. Mbarika:

Approaching subSaharan Africa's educational dilemma with teleeducation. 20-26

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














