By Topic

Proceedings. 2005 International Symposium on Technology and Society, 2005. Weapons and Wires: Prevention and Safety in a Time of Fear. ISTAS 2005.

Date 8-10 June 2005

Filter Results

Displaying Results 1 - 18 of 18
  • 2005 International Symposium on Technology and Society (ISTAS 2005) Weapons and Wires: Prevention and Safety in a time of Fear (IEEE Cat. No.05CH37705)

    Publication Year: 2005
    Request permission for commercial reuse | PDF file iconPDF (1804 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reducing energy vulnerability

    Publication Year: 2005, Page(s):1 - 8
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1906 KB) | HTML iconHTML

    Energy is a strategic resource that has justified as well as influenced the outcomes of wars, fueled as well as strangled economic progress, polluted as well as cleaned up the environment. This paper sheds empirical light on the ideological battleground over energy security policy. Using international data, the paper demonstrates how countries have made distinctive choices affecting the importance... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Privacy: personal information, threats, and technologies

    Publication Year: 2005, Page(s):9 - 16
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1805 KB) | HTML iconHTML

    The three primary thrusts of this paper are: first, that people do not think enough about their own privacy, in particular, they may not know enough about their privacy that they can really make informed decisions about sharing information; second, that technologies exist that can mitigate some of the problems associated with information sharing; and third, that services (in addition to to technol... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Service robotics in area surveillance: criteria of usefulness

    Publication Year: 2005, Page(s):17 - 27
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1860 KB) | HTML iconHTML

    How can service robotics be useful? Beyond the immediate requirement of providing a customer with a useful solution lies the comfort of providing useful robots to society at large. A closer look is given to the use of machine vision, remote datacenter control and mobile robotics in area surveillance. Criteria of usefulness are identified from several vantage points: the market-demand, business and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The concern for genetic diversity: raising awareness for the loss of global biological diversity

    Publication Year: 2005, Page(s):28 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1802 KB) | HTML iconHTML

    The maintenance of biological diversity is a pervasive concern for many environmental groups and others interested in technological applications of genetic resources. The concept of biological diversity was first formally defined in the conservation literature by Elliott Norse and Roger McManus in the 1980 Council on Environmental Quality Annual Report. The term was immediately adopted by groups w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Technical risk information: decision tool or rhetorical ammunition? Undisputed facts in the Yucca mountain debate

    Publication Year: 2005, Page(s):33 - 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1811 KB) | HTML iconHTML

    This paper examines how both opponents and proponents of the proposed high-level nuclear waste repository at Yucca mountain Nevada claim that uncontroversial information supports their conflicting positions. Four pieces of information in particular are claimed by both sides: the distance of the proposed site from Las Vegas, the volume of waste that has been produced, the threat of terrorism since ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Freedom of silence vs. freedom of speech: technology, law and information security

    Publication Year: 2005, Page(s):37 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1807 KB) | HTML iconHTML

    Freedom of silence, not having to listen to unwanted speech, is a much less debated and less well understood concept than freedom of speech. While both of these freedoms are important, there is a natural tension between them. Society must find the proper balance between such opposing forces. Technological progress has greatly enhanced the freedom of speech, and less so the freedom of silence. With... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • People-appropriate policy models require new mathematical tools (I am not a number)

    Publication Year: 2005, Page(s):46 - 51
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1768 KB) | HTML iconHTML

    In this paper we argue (1) that new kinds of models and modeling techniques are needed to address the difficult public policy problems we all currently face, and (2) that new mathematical methods are required to support the new kinds of models and modeling techniques that are needed. We believe that proposed policy solutions have often failed in the past because of modeling deficiencies, and that ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cyberwarfare seen through a mariner's spyglass

    Publication Year: 2005, Page(s):52 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1831 KB) | HTML iconHTML

    The Internet has become an essential tool in the everyday conduct of commercial life and its security has become a topic of growing importance since 9/11. The ability of terrorists to conduct cyberwarfare is largely unknown, but the potential for the disruption of life worries many policymakers. In searching for precedent to anticipate the potential impact of a cyberwar, it is important to identif... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The business of warfighting: ethical implications of the industry-government relationship in the development of defense technologies

    Publication Year: 2005, Page(s):62 - 70
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1816 KB) | HTML iconHTML

    The defense contracting industry has played a significant role in the recent invasions of Iraq and Afghanistan. While the industry-government business partnership is a long-standing one; it is subject to unique ethical pressures. Those pressures are exacerbated, rightly or wrongly, in the context of warfighting and research into defense technologies. This paper intends to draw out those areas wher... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The war of the worlds

    Publication Year: 2005, Page(s):71 - 78
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1803 KB) | HTML iconHTML

    Modernist engineering is commonly seen as serving the corporate whim, but today the corporation is in the service of empire. What is this empire idea all about? More than mere metaphysical musings, the notion of empire was powerfully portrayed in a book by Michael Hardt and Antonio Negri called Empire (2000) which created quite a stir a few years ago. If we are indeed in the throes of empire, the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Social acceptance of RFID as a biometric security method

    Publication Year: 2005, Page(s):79 - 87
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1823 KB) | HTML iconHTML

    The acceptance of biometric security controls in documentation, travel, and employment may soon be facing a strong test as it is further expanded through RFID, with advocates of global security aggressively working toward broadening the scope of tracking to the individual human level through implanted chips. Implanting chips in humans has only recently come to the forefront, as the FDA approved im... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ain't misbehavin': the relationship between writing and social interaction in computer-mediated group (CMG) process

    Publication Year: 2005, Page(s):88 - 93
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1863 KB) | HTML iconHTML

    In the study of computer-mediated communication (CMC), it is important to understand the concept of "writing behavior "from the perspective of social interaction and computer-mediated group (CMG) process (CMGP) and development. This work asserts that there is an identifiable relationship between language use and group process and development, as observed in peer pressure in the form of writing beh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Revolution or evolution? The rise of the UAVs

    Publication Year: 2005, Page(s):94 - 101
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1807 KB) | HTML iconHTML

    Less than fifteen years after Orville Wright took flight in December of 1903, the army signal corps flew its first unmanned air (or aerial) vehicle (UAV): the Kettering Bug flying bomb. Since UAV are often included in the ongoing revolution in military affairs, they are seen as a new concept, created for the age of "information warfare" and "net-centric operations". Many identity changes over the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Impediments to and incentives for automation in the Air Force

    Publication Year: 2005, Page(s):102 - 110
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1853 KB) | HTML iconHTML

    The paper outlines a collection of impediments and incentives that has been influential in the adoption of automation technologies in the United States Air Force over the last century. I focus on technologies that replace the pilot or reduce his role in the operation of his aircraft. I conclude that pilot-replacing technologies are opposed, while performance augmenting technologies are welcomed as... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Archival perspective on the social history of computing

    Publication Year: 2005, Page(s):111 - 113
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1879 KB) | HTML iconHTML

    Toward a social history of computing, this paper focuses on the computer professionals' grass-roots community. Then we point out the archival issues from the viewpoint according to our ongoing project for collectively accessible institutional memory. CPSR (Computer Professionals for Social Responsibility) has provided various types of seriously researched publications, and the archiving of its act... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The national champion in ICT standard competition: evidence from an emerging country

    Publication Year: 2005, Page(s):114 - 120
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1818 KB) | HTML iconHTML

    Some emerging countries, like China, hope to capture value from indigenous innovation through a more aggressive approach to the management of their intellectual properties, and especially toward the establishment of indigenous standards which reflect the technological capabilities accumulated by local leading ICT firms. Some local players are not satisfied to be followers behind foreign multinatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Breaker page]

    Publication Year: 2005, Page(s): 122
    Request permission for commercial reuse | PDF file iconPDF (1703 KB)
    Freely Available from IEEE