By Topic

IEEE Potentials

Issue 5 • Date Sept.-Oct. 2016

Filter Results

Displaying Results 1 - 18 of 18
  • Front Cover

    Publication Year: 2016, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (769 KB)
    Freely Available from IEEE
  • Table of Contents

    Publication Year: 2016, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (2255 KB)
    Freely Available from IEEE
  • Masthead

    Publication Year: 2016, Page(s): 2
    Request permission for commercial reuse | PDF file iconPDF (2255 KB)
    Freely Available from IEEE
  • Goodbye Caveman

    Publication Year: 2016, Page(s): 3
    Request permission for commercial reuse | PDF file iconPDF (466 KB)
    Freely Available from IEEE
  • Uncle Ben Knows Best [The Way Ahead]

    Publication Year: 2016, Page(s): 4
    Request permission for commercial reuse | PDF file iconPDF (400 KB)
    Freely Available from IEEE
  • [Gamesman Solutions]

    Publication Year: 2016, Page(s):5 - 6
    Request permission for commercial reuse | PDF file iconPDF (883 KB)
    Freely Available from IEEE
  • Unintended Consequences: The Paradox of Technological Potential

    Publication Year: 2016, Page(s):7 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1004 KB)

    In this paper, articles are found on the implications of rapidly advancing technology on government, organizations, privacy, and autonomy. It begins with an interview with Douglas Rushkoff, one of the founding fathers of the study of technological paradox. In this conversation with Ramona Pringle, Rushkoff explains how he not-so secretly hopes for a public revolt or revolution, possibly the only w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Valuations and Human Values (A.K.A. The Irony of Granola Bar Economics)

    Publication Year: 2016, Page(s):11 - 15
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1122 KB)

    It's 80?F and sunny, an exquisitely warm day even by California standards. Douglas Rushkoff is driving up the coast to Facebook's Silicon Valley headquarters, when I reach him over Skype to talk about his newest book, Throwing Rocks at the Google Bus. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • "Let's Protest": Surprises in Communicating Against Repression

    Publication Year: 2016, Page(s):16 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (732 KB)

    In Egypt in June 2010, a young man named Khaled Said was beaten to death by the secret police. In response, Google executive Wael Ghonim set up the Facebook page "We are all Khaled Said," and within a day, tens of thousands of people had joined. The Facebook page was used to publicize a series of protests against police brutality and government corruption, including a huge protest on 25 January 20... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Predictive Policing and Civilian Oversight: What Will It Take to Get It Right?

    Publication Year: 2016, Page(s):19 - 22
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (906 KB)

    To serve and protect: that is the mandate of the modern police force. However, as they acquire more tools for processing information, the notion of serving and protecting necessarily evolves. What are the digital tools necessary to properly protect the public, and how can we ensure that the use of these tools ensures that the police serve the public and not the other way around? View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Converging Veillances: Border Crossings in an Interconnected World

    Publication Year: 2016, Page(s):23 - 25
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (895 KB)

    We are rapidly entering the uncharted and precarious terrain of an interconnected world of pervasive technologies. There will be amalgamations of networks. Machines, connected to networks of other machines, will act more autonomously and make decisions for humans. Devices will continue to be far more intelligent and ubiquitous, thereby thinking and acting for us unobtrusively behind the lines of v... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Privacy in Public

    Publication Year: 2016, Page(s):26 - 29
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (832 KB)

    This dystopian vision, written almost 60 years ago about a future predicted for a time that is now over 30 years in the past, is closer than it has ever been to becoming a reality. Even mind-reading technology is currently being developed and refined, leading us to an even-more dystopian reality in which our physical bodies will become vessels of surveillance. Überveillance, (omnipresent surv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Privacy in the Age of the Smartphone

    Publication Year: 2016, Page(s):30 - 35
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (852 KB)

    There is no doubt that we live in an age of persistent connectedness and are increasingly empowered as individuals to generate large volumes of digital data. This can range from simple text messages and e-mail, to photographs, video clips, and a broad range of metadata ranging from our location throughout the day to the webpages we browse, the online stores we visit, the travel arrangements we mak... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Paradoxes in Information Security

    Publication Year: 2016, Page(s):36 - 39
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1190 KB)

    In this article, we approach information security from a novel perspective as we examine its unintended ramifications and its paradoxes. Information security and cybersecurity are necessities of modern societies. Simply put, services that are based on information and communication technologies would not function without information security. Thus, information security can easily tend to be thought... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Problems with Moral Intuitions Regarding Technologies

    Publication Year: 2016, Page(s):40 - 42
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (907 KB)

    Social networks' commodification of personal data, digital rights management software, corporate back doors, technology enabled global surveillance, e-waste, and the working conditions in much of ICT manufacturing-many of the technologies that define the lives of 21st century, first-world citizens-possess significant moral dimensions, which, as it appears, more often than not, remain largely negle... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • International Council on Global Privacy and Security, By Design

    Publication Year: 2016, Page(s):43 - 46
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (864 KB)

    Make no mistake, privacy is a necessary condition for both a prosperous and free society. However, ever since the tragic events of 11 September 2001 and the terrorist acts that have followed, privacy has been increasingly cast as an antagonist of public safety. (I use the term public safety as an all-encompassing term that includes the necessary security measures to bring it about.) This zero-sum,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Unintended Consequences: A Study Guide

    Publication Year: 2016, Page(s):47 - 48
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (983 KB)

    Now that you've immersed yourself in some of the challenges and paradoxes we face as a society (as our cities, businesses, governments, and personal lives become more digitized), it is time to reflect on everything you've read. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Gamesman Problems]

    Publication Year: 2016, Page(s): C3
    Request permission for commercial reuse | PDF file iconPDF (2944 KB)
    Freely Available from IEEE

Aims & Scope

IEEE Potentials is the magazine dedicated to undergraduate and graduate students and young professionals.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Sachin Seth
Texas Instruments
sachin3006@gmail.com