


default search action
IEEE Technology and Society Magazine, Volume 28
Volume 28, Number 1, Spring 2009
- John S. Canning

:
"You've just been disarmed. Have a nice day!". 13-15 - Noel E. Sharkey:

Death strikes from the sky: the calculus of proportionality. 16-19 - Peter M. Asaro:

Modeling the moral user. 20-24 - Robert Sparrow

:
Predators or plowshares? arms control of robotic weapons. 25-29 - Ronald C. Arkin:

Ethical robots in warfare. 30-33
- Mark Burdon

:
Commercializing public sector information privacy and security concerns. 34-40 - Lucy Resnyansky

:
The internet and the changing nature of intelligence. 41-47 - Melih Kirlidog, Meric Aykol, Sevinç Gülseçen:

Interpersonal communication and gender in the ICT profession. 48-56
Volume 28, Number 2, Summer 2009
- Edward A. Friedman:

Enhancing rural healthcare in Rwanda through clinical decision support [News and Notes]. 4 - Clinton J. Andrews

:
Innovation as energy policy for the world [Policy Perspectives]. 5-6 - Matthew A. Wong:

Wireless nomad: Pioneer in an urban residential environment. 9-15 - Susan O'Donnell, Sonja Perley, Deanne C. Simms, Brecken Rose Hancock:

Video communication roadblocks facing remote indigenous communities. 16-22 - Adam Fiser, Andrew Clement:

K-Net and Canadian Aboriginal communities. 23-33 - Gordon A. Gow

, Tara McGee
, David Townsend, Peter Anderson, Stanley Varnhagen:
Communication technology, emergency alerts, and campus safety. 34-41 - Víctor M. González

, Luís A. Castro
, Marcela D. Rodríguez
:
Technology and connections Mexican immigrants in the U.S. 42-48 - Han-Teng Liao

:
Conflict and consensus in the Chinese version of Wikipedia. 49-56
- Ofer Arazy, Ian R. Gellatly, Soobaek Jang, Raymond A. Patterson

:
Wiki deployment in corporate settings. 57-64
Volume 28, Number 3, Fall 2009
- Seref Sagiroglu, Gurol Canbek

:
Keyloggers: Increasing Threats to Computer Security and Privacy. 10-17 - Edward A. Friedman:

Computer-assisted medical diagnosis for rural Sub-Saharan Africa. 18-27 - Haiko Van Der Voort, Hans de Bruijn:

Learning from disasters. 28-36 - L. Jean Camp:

Mental models of privacy and security. 37-46 - Chuck Huff, Laura Barnard:

Good computing. 47-54 - Louis-François Pau

:
Privacy management service contacts as business opportunity. 55-63 - Patrick E. Meyer:

Greening IEEE. 64-72
Volume 28, Number 4, Winter 2009
- Bernard Amadei, William A. Wallace:

Engineering for humanitarian development. 6-15 - Stephen E. Silliman:

Assessing experiences of international students in Haiti and Benin. 16-24 - Karl Perusich, Harold Tepper, J. Roberto B. de Marca, Russ Lefevre, Richard Baseil:

Linking technologists and humanitarians: IEEE/UN FoundationHumanitarian Technology Challenge. 25-31 - Jonathan D. J. Vandersteen, Caroline A. Baillie, Kevin R. Hall:

International humanitarian engineering: Who benefits and who pays? 32-41 - Jen Schneider, Juan C. Lucena, Jon A. Leydens

:
Engineering to help: The value of critique in engineering service. 42-48

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














