default search action
ISTAS 2002: Raleigh, NC, USA
- 2002 International Symposium on Technology and Society, ISTAS 2002, Raleigh, NC, USA, June 8, 2002. IEEE 2002, ISBN 0-7803-7284-0
- Don Gotterbarn:
Addressing ethical and professional risks of ICT development using software development impact statements. - Amanda Aizlewood, Maureen Doody:
Seeking community on the Internet: ethnocultural use of information communication technology. 5-12 - Diane Maloney-Krichmar, Chadia Abras, Jennifer Preece:
Revitalizing an online community. 13-19 - Diane Maloney-Krichmar, Jennifer Preece:
The meaning of an online health community in the lives of its members: roles, relationships and group dynamics. 20-27 - Andrés Martínez, Valentín Villarroel, Joaquín Seoane, Francisco del Pozo:
EHAS program: rural telemedicine systems for primary healthcare in developing countries. 31-36 - Hani Umar Shakeel, Michael L. Best:
Community knowledge sharing: an Internet application to support communications across literacy levels. 37-44 - Muna M. Odeh, Edson dos Santos Moreira, Thais F. Leite Madeira:
Electronic commerce and its socio-economic implications in Brazilian small and medium enterprises. 45-50 - Sarah Stein:
Including the technical personnel: an alternative IP model in the development of distributed learning courses. 53-56 - R. D. Hunter:
Is the patent system broken? (If it isn't broken, don't fix it). 57-59 - Hendrik Speck:
Nothing to claim-there is no such thing as intellectual property. 60-67 - Sheila French:
Gender Equity and the use of Information Communication Technologies in the knowledge economy: taking a feminist poststructuralist approach. 71-76 - Pauline Cushman, Anthony Teate, Elizabeth Adams:
Gender, culture and science: exploring underrepresentation. 77-83 - Libby Levison, William Thies, Saman P. Amarasinghe:
Providing Web search capability for low-connectivity communities. 87-91 - Simone Cecchini:
Information and communications technology for poverty reduction. lessons from rural India. 93-99 - Edward Farell, Marta Rumich:
Effective application of ICT to improving the quality of life and reducing poverty in poor countries: recent experiences and new approaches. 100-107 - Clinton J. Andrews:
Credibly constructing risk comparisons. 113-116 - Alfreda Dudley-Sponaugle, Doris K. Lidtke:
Preparing to teach ethics in a computer science curriculum. 121-125 - Frances S. Grodzinsky, Joe Griffin:
Blackboard: a Web-based resource in the teaching of a multi-disciplinary/multi-institutional computer ethics course. 126-131 - Pauline Hope Cheong, Namkee Park, William H. Dutton:
New technologies, old practices: the traditional use of electronic courseware in the changing geography of the classroom. 135-140 - Kerstin Zimmermann:
A research information portal for telecommunications. 143-149 - David F. McAllister, Nancy C. McAllister, Steven Vivian:
The impact of digital books upon print publishing. 150-154 - David Primeaux, James E. Ames:
Personal, private, secret, public [ethics of data privacy]. 157-161 - Peter Danielson:
Video surveillance for the rest of us: proliferation, privacy, and ethics education. 162-167 - Kumiko Aoki, Edward J. Downes:
Cell phone usage: an analysis of users' subjective responses in the adoption. 171-177 - Wendy Robinson:
Teaching Ethics and the Internet 2.0: pervasive computing, consumer electronics and progressive embodiment. 178-185 - Virpi Oksman:
"Daddy, daddy, my computer has a fever!" Children and communication technologies in everyday life. 186-189 - Roberta Brody:
Information ethics in the design, creation and use of metadata. 197-201 - Markus Helfen, Lydia Krüger:
Information technology, new organizational concepts and employee participation-will unionism survive? 202-209 - Patrick W. Hamlett:
Adapting the Internet to citizen deliberations: lessons learned. 213-218 - Kathleen Prosseda:
Policy debate on the Internet: panelists evaluate the process. 219-223 - Thomas R. Flynn:
"Secondary effects", digital technology, and free speech: the Internet and the First Amendment. 229-235 - Robert Plotkin:
Intellectual property and the process of invention: why software is different. 236-243 - Dan L. Burk:
Anti-circumvention misuse, or, how I learned to stop worrying and love the DMCA. 244-251 - Liang Zhao:
Interactive television in distance education: benefits and compromises. 255-261 - Andy Stone:
Mobile telephony and learning: nuisance or potential enhancement? 262-266 - V. R. Jagannathan:
Multimodal delivery systems. 267-272 - Irina Ceaparu, Ben Shneiderman:
Improving Web-based civic information access: a case study of the 50 US states. 275-282 - Judith Davis, Tyler Kendall, Hal Meeks:
The message is the message: designing information technology for inclusiveness and accessibility. 283-289 - Rajiv C. Shah, Jay P. Kesan:
Incorporating societal concerns into communication technologies. 290-295 - Randal D. Pinkett:
Toward social and cultural resonance with technology: case studies from the Creating Community Connections Project. 301-308 - David Fitch:
Digital inclusion, social exclusion and retailing: an analysis of data from the 1999 Scottish Household Survey. 309-313 - William McIver, Arthur P. Prokosch:
Towards a critical approach to examining the digital divide. 314-319 - Chuck Huff, Deborah G. Johnson, Keith W. Miller:
Virtual harms and virtual responsibility: a rape in cyberspace. 323-330 - Frances S. Grodzinsky, Herman T. Tavani:
Cyberstalking: moral responsibility, and legal liability issues for Internet service providers. 331-339 - Myra G. Day, Edward F. Gehringer:
Educators and pornography: the "unacceptable use" of school computers. 340-344 - Mookhan Kim:
Planning for the next ICT cluster? Seoul's Digital Media City project. 347-352 - Lin Miao, Su Jun, Chen Junrui:
Emergence of a triple helix of academia-industry-government relations in ICT R&D in developing countries: private, professional and public dimensions of China's 3rd generation mobile communications system task force. 353-358 - Shiri Ahuja:
Multiplying the wisdom at grassroots: leveraging on information technology. 359-366 - Edward F. Gehringer:
Choosing passwords: security and human factors. 369-373 - Bryan Smith, William Yurcik, David Doss:
Ethical hacking: the security justification redux. 374-379 - Vikas Jayaswal, William Yurcik, David Doss:
Internet hack back: counter attacks as self-defense or vigilantism? 380-386 - Brian Scottberg, William Yurcik, David Doss:
Internet honeypots: protection or entrapment? 387-391
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.