By Topic

Technology and Society, 2002. (ISTAS'02). 2002 International Symposium on

Date 8-8 June 2002

Filter Results

Displaying Results 1 - 25 of 54
  • IEEE 2002 International Symposium on Technology and Society (ISTAS'02). Social Implications of Information and Communication Technology. Proceedings (Cat. No.02CH37293)

    Publication Year: 2002
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (274 KB)

    The following topics are dealt with: information technology; communication technology; social implications; online communities; intellectual property; gender issues; digital divide; technology policy; computer ethics teaching resources; online instruction; electronic documents; privacy; legal issues; free speech; distance education technologies; design issues; virtual harms; and information securi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2002, Page(s):393 - 394
    Request permission for commercial reuse | PDF file iconPDF (54 KB)
    Freely Available from IEEE
  • Anti-circumvention misuse, or, how I learned to stop worrying and love the DMCA

    Publication Year: 2002, Page(s):244 - 251
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (559 KB) | HTML iconHTML

    The anti-circumvention provisions of the Digital Millennium Copyright Act grants owners of technologically protected content a new right of access entirely separate from the protection of content under copyright law. This new right of access, which some commentators have dubbed "paracopyright," has already been employed in litigation arguably calculated to suppress competition in uncopyrighted ite... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interactive television in distance education: benefits and compromises

    Publication Year: 2002, Page(s):255 - 261
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (517 KB) | HTML iconHTML

    This ethnographic study examined the leaching and learning process in interactive television and analyzed the gains and losses of the three parties involved in the process: the instructor, the remote students, and the local students. In terms of teaching and learning, instructors lost their connectedness with remote students, and the technology involved restricted the instructors' pedagogical opti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Personal, private, secret, public [ethics of data privacy]

    Publication Year: 2002, Page(s):157 - 161
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (418 KB) | HTML iconHTML

    Although discussions of privacy and technology are often issue centered, some do address fundamental questions such as what a "right to privacy" might entail. This paper proposes to address a still more fundamental question. Arguing that a better understanding of "privacy" hinges on the better understanding of the related terms, "personal," "private," "secret," and "public," this paper first sugge... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile telephony and learning: nuisance or potential enhancement?

    Publication Year: 2002, Page(s):262 - 266
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (389 KB) | HTML iconHTML

    The growth of mobile telephony has been phenomenal in the UK and other countries. However, as next-generation technologies approach, there is already an acknowledged issue of nuisance attributed to mobile phones. This paper attempts to outline how current work in educational technology (including that of the author and LTRG) may contribute towards a move towards using mobile telephony in education... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Choosing passwords: security and human factors

    Publication Year: 2002, Page(s):369 - 373
    Cited by:  Papers (8)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (405 KB) | HTML iconHTML

    Password security is essential to the security of information systems. Human fallibility makes it nearly impossible to follow all of the recommended rules simultaneously. A user with many different passwords, frequently changing, will be forced to write them down somewhere. Some systems constrain them to have a certain minimum length, or to require them to contain a combination of letters and numb... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Gender, culture and science: exploring underrepresentation

    Publication Year: 2002, Page(s):77 - 83
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (507 KB) | HTML iconHTML

    This paper discusses the concerns of some faculty and administrators at James Madison University over the lack of female and minority students as science and technology majors It describes efforts of those faculty and administrators to raise student awareness of the opportunities available to them in these majors. These efforts include the design of several new courses; the development of teaching... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Preparing to teach ethics in a computer science curriculum

    Publication Year: 2002, Page(s):121 - 125
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB) | HTML iconHTML

    At Towson University, the Computer and Information Sciences Department is preparing newer faculty members to teach courses in computer ethics. There are two separate ethics courses, which are identified as Professionalism and Computer Ethics (a 1 credit course) and Social and Ethical Issues (a 3 credit course). This paper will provide several types of resources available for preparing a new facult... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • "Daddy, daddy, my computer has a fever!" Children and communication technologies in everyday life

    Publication Year: 2002, Page(s):186 - 189
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (361 KB) | HTML iconHTML

    Media and communication technologies are an organic part of the everyday lives of ever younger people. In Finland, alongside mobile communication, the Internet has become a central medium that enables children and youth to engage in versatile content production and independent creation of culture. Children and young people are a group with their own usage cultures and communication patterns that d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Including the technical personnel: an alternative IP model in the development of distributed learning courses

    Publication Year: 2002, Page(s):53 - 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (334 KB) | HTML iconHTML

    Intellectual property and copyright policy debates in the production of online courses in higher education have focused almost exclusively on rights of faculty and administration. Yet, those online courses most likely to foster debate generally require a production team of a faculty member and technical specialists to produce. This paper suggests an alternative model for compensation that would re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New technologies, old practices: the traditional use of electronic courseware in the changing geography of the classroom

    Publication Year: 2002, Page(s):135 - 140
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (383 KB) | HTML iconHTML

    Electronic course management software has emerged as a significant aspect of instructional technology infrastructure among institutions of higher education. This study sought to investigate the ways in which electronic courseware is being adopted by higher educational institutions, and how this technological change might impact the role of the instructor and the geography of the classroom. Results... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Community knowledge sharing: an Internet application to support communications across literacy levels

    Publication Year: 2002, Page(s):37 - 44
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (544 KB) | HTML iconHTML

    This paper presents Community Knowledge Sharing (CKS), an asynchronous discussion system designed for use in the developing world. CKS supports community development by allowing communities to interact, share and learn from each other. Recognizing that large segments of the population in rural communities have low levels of literacy, CKS implements a multi-literate design in which the system can b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ethical hacking: the security justification redux

    Publication Year: 2002, Page(s):374 - 379
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (465 KB) | HTML iconHTML

    The state of security on the Internet is bad and becoming worse. One reaction to this state of affairs is a behavior termed "Ethical Hacking" which attempts to proactively increase security protection by identifying and patching known security vulnerabilities on systems owned by other parties. Ethical hackers may beta test unreleased software, stress test released software, and scan networks of co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Educators and pornography: the "unacceptable use" of school computers

    Publication Year: 2002, Page(s):340 - 344
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (388 KB) | HTML iconHTML

    More companies are requiring their employees to sign acceptable-use policies for Internet computers. Some employees are unaware of the implications of the policies, and do not realize the extent to which their activities can be monitored by computer technicians. In academia, three important cases of "unacceptable use" are those of Dean Ronald F. Thiemann, Professor Eric Neil Angevine, and Superint... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Providing Web search capability for low-connectivity communities

    Publication Year: 2002, Page(s):87 - 91
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (382 KB) | HTML iconHTML

    There are many technical problems that exist in communities other than our own. These problems both deserve our attention and require focused research. We present one example: the TEK Search Engine. TEK is an email-based search engine designed to deliver low-bandwidth information to low-connectivity communities. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving Web-based civic information access: a case study of the 50 US states

    Publication Year: 2002, Page(s):275 - 282
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (499 KB) | HTML iconHTML

    An analysis of the home pages of all fifty US states reveals great variety in key design features that influence efficacy. Some states had excessively large byte counts that would slow users connected by commonly-used 56 K modems. Many web sites had low numbers of or poorly organized links that would make it hard for citizens to find what they were interested in. Features such as search boxes, pri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Information ethics in the design, creation and use of metadata

    Publication Year: 2002, Page(s):197 - 201
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (362 KB) | HTML iconHTML

    Just as information contains the explicit and implicit values of its creators, so does the metadata that represents these objects. This paper discusses issues of fair representation in the ethical design, creation and use of metadata, data about data. Ethical issues arise in the planned design of metadata, the creation of surrogates as representative of data or text, as well as in the use and owne... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Credibly constructing risk comparisons

    Publication Year: 2002, Page(s):113 - 116
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (339 KB) | HTML iconHTML

    This paper briefly recounts the experience of the New Jersey Comparative Risk Project in order to illustrate the role played by insights from the science and technology studies literature in the project's design. It shows that a project's adequacy and legitimacy can be enhanced by treating the potential contributions of experts, officials, stakeholders, and the public respectfully, and by building... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The meaning of an online health community in the lives of its members: roles, relationships and group dynamics

    Publication Year: 2002, Page(s):20 - 27
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB) | HTML iconHTML

    This research is concerned with understanding the role a long established and thriving health bulletin board plays in the lives of its members; the impact of usability and sociability issues on group process, and the membership roles, patterns of social interaction, and group dynamics exhibited in the community. An ethnographic research approach is taken in this study in combination with social ne... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multimodal delivery systems

    Publication Year: 2002, Page(s):267 - 272
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (488 KB) | HTML iconHTML

    The non-formal (open/distance) education has progressively adopted new technologies leading to the development of interactive multimedia courses and experiments like the virtual classroom. However, the new technology poses problems of equity and raises the bogey of digital divide. This paper was motivated by a UNESCO project at IGNOU on using Radio Vision for imparting education. Enthused by the s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Virtual harms and virtual responsibility: a rape in cyberspace

    Publication Year: 2002, Page(s):323 - 330
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (518 KB) | HTML iconHTML

    Julian Dibbell reported a "rape in cyberspace" in 1993. In this paper we use the case to explore the moral nature of actions in virtual environments. We emphasize the themes of harm and responsibility and conclude with some tentative lessons learned, and extend the analysis to virtual sex. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Is the patent system broken? (If it isn't broken, don't fix it)

    Publication Year: 2002, Page(s):57 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB) | HTML iconHTML

    For many years computer software and ways of doing business were not considered to be patentable. Software was finally deemed patentable in the early eighties and ways of doing business were patented in the nineties, especially with the advent of e-commerce. In this paper I review the expanded scope of patents being issued by the PTO (Patent and Trademark Office) and the roles of the congress, the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A research information portal for telecommunications

    Publication Year: 2002, Page(s):143 - 149
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (480 KB) | HTML iconHTML

    The increasing use of mobile devices and the Internet has led to new research in telecommunications. The combination of various technologies has created interdisciplinary research groups with engineers, computer scientists, mathematicians and physicists working together. New problems have arisen within these teams. How do we find and exchange the necessary information produced by the entire field ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cyberstalking: moral responsibility, and legal liability issues for Internet service providers

    Publication Year: 2002, Page(s):331 - 339
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (610 KB) | HTML iconHTML

    The study examines a range of moral issues associated with recent cyberstalking cases. Particular attention is centered on the Amy Boyer/Liam Youens case of cyberstalking, which raises a host of considerations that we believe have a significant impact for ethical behavior on the Internet. Among the questions we consider are those having to do with legal liability and (possible) moral responsibilit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.