By Topic

IEEE Technology and Society Magazine

Issue 3 • Fall 2004

Filter Results

Displaying Results 1 - 22 of 22
  • ISTAS'04 Examines Impacts of Globalization [News]

    Publication Year: 2004, Page(s):5 - 12
    Request permission for commercial reuse | PDF file iconPDF (405 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Redefining security in public space: the case of LOVE park

    Publication Year: 2004, Page(s):19 - 20
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (211 KB) | HTML iconHTML

    By controlling the public spaces in which true human interaction occurs, planners and policymakers are challenging the fundamental desires of groups to forge social bonds and enhance their own sense familiarity with the environment. Security is not merely achieved through an understanding of territory but through acknowledgement and confrontation with individuals or groups maintaining diverse pers... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formal and ethical aspects of security in public spaces

    Publication Year: 2004, Page(s):15 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (231 KB) | HTML iconHTML

    According to John Habraken, there is today a tension between the planners' tendency to expand public space and the citizens' wish to extend their private control over that same space. Processes of appropriation and exclusion governing the public space geared by policies intended to increase security must therefore be concurrently informed to address the complexities of social reality. As far as ar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Territory and mobility in the American suburb

    Publication Year: 2004, Page(s):13 - 15
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB) | HTML iconHTML

    In suburban America, the kinds of activities that Habraken celebrates, fostered by a sense of security, occur in the gated courtyard, have traditionally occurred on the front porch. The porch is the courtyard inside out and like the courtyard, it is an important buffer between public and private realms. Protected by nested markers of territory, a cordon of sidewalk, a patch of grass, and a screen ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • World Wide Plaza: the corporatization of urban public space

    Publication Year: 2004, Page(s):17 - 18
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (317 KB) | HTML iconHTML

    In the preceding interview, John Habraken argues that planners' antipathy toward articulating space and acknowledging boundaries has led to increasing spatial incomprehensiveness, deterritorialization, and consequently, a growing lack of security in public areas. Although we agree that urban spatial patterns are increasingly fragmented and often incomprehensible, we argue that this is due to the i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security and the built environment: an interview with John Habraken

    Publication Year: 2004, Page(s):7 - 12
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2917 KB) | HTML iconHTML

    Safety sits at the top of our list of basic needs, alongside food and shelter. Humans everywhere ask the built environment to provide both shelter and safety. John Habraken, a revered architect and educator, has investigated the links between urban design and security, and his findings have provoked both admiration and controversy. This interview explores the nature and origins of Habraken's ideas... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Crime proofing of products: the idea and the substance

    Publication Year: 2004, Page(s):21 - 27
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (687 KB) | HTML iconHTML

    Modifying products to prevent crime is not a new idea. At the end of the 17th century, milled edges were introduced for silver coins to stop people from clipping the edges to collect enough silver to make new coins. In fact, manufacturers have modified hundreds of different products to prevent crime. In most cases they have made these modifications to protect business profits. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Between Human and Machine: Feedback, Control, and Computing Before Cybernetics [Book Review]

    Publication Year: 2004, Page(s):46 - 48
    Request permission for commercial reuse | PDF file iconPDF (237 KB) | HTML iconHTML
    Freely Available from IEEE
  • Creating moral buffers in weapon control interface design

    Publication Year: 2004, Page(s):28 - 33, 41
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1129 KB) | HTML iconHTML

    We examine the ethical and social issues surrounding the design of human-computer interfaces that are designed for control of highly autonomous weapons systems. With the improvements of global positioning satellite communications and control algorithms, it is currently possible to launch weapons. These systems are highly autonomous in that they do not need constant human supervision and manual con... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Soundscape of Modernity: Architectural Acoustics and the Culture of Listening in America, 1900-1933 [Book Review]

    Publication Year: 2004, Page(s):42 - 43
    Request permission for commercial reuse | PDF file iconPDF (199 KB) | HTML iconHTML
    Freely Available from IEEE
  • Digital identity

    Publication Year: 2004, Page(s):34 - 41
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1249 KB) | HTML iconHTML

    The lack of conceptual clarity reflected by the overload of the word is confounding the ubiquitous practice of risk management via identity management. Thus we clarifies the nature of identification in a digital networked world, as opposed to a paper-based world. The examples and the context are identification as used in law enforcement in the United States. Together the definitions and the exampl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Blue Sky Dreams: A Memoir of America's Fall from Grace [Book Review]

    Publication Year: 2004, Page(s):44 - 46
    Request permission for commercial reuse | PDF file iconPDF (236 KB) | HTML iconHTML
    Freely Available from IEEE
  • IEEE Technology and Society Magazine - Front cover

    Publication Year: 2004, Page(s): 0_1
    Request permission for commercial reuse | PDF file iconPDF (1841 KB)
    Freely Available from IEEE
  • Information for authors

    Publication Year: 2004, Page(s): 02
    Request permission for commercial reuse | PDF file iconPDF (173 KB)
    Freely Available from IEEE
  • IEEE Technology and Society Magazine - Table of contents

    Publication Year: 2004, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (218 KB)
    Freely Available from IEEE
  • IEEE Technology and Society Magazine - Staff List

    Publication Year: 2004, Page(s): 2
    Request permission for commercial reuse | PDF file iconPDF (237 KB)
    Freely Available from IEEE
  • 2005 International Symposium on Technology and Society (ISTAS'05) - Call for papers

    Publication Year: 2004, Page(s): 3
    Request permission for commercial reuse | PDF file iconPDF (185 KB)
    Freely Available from IEEE
  • President's Message - Expanding the Conversation

    Publication Year: 2004, Page(s):4 - 5
    Request permission for commercial reuse | PDF file iconPDF (420 KB) | HTML iconHTML
    Freely Available from IEEE
  • Guest editorial - Social implications of security and crime prevention

    Publication Year: 2004, Page(s): 6
    Request permission for commercial reuse | PDF file iconPDF (210 KB) | HTML iconHTML
    Freely Available from IEEE
  • Letter [to the editor]

    Publication Year: 2004, Page(s): 20
    Request permission for commercial reuse | PDF file iconPDF (182 KB) | HTML iconHTML
    Freely Available from IEEE
  • IEEE-SSIT Affiliate Application

    Publication Year: 2004, Page(s): 49
    Request permission for commercial reuse | PDF file iconPDF (85 KB)
    Freely Available from IEEE
  • IEEE Technology and Society Magazine - Subscribe and/or join SSIT [advertisement]

    Publication Year: 2004, Page(s): 50
    Request permission for commercial reuse | PDF file iconPDF (314 KB)
    Freely Available from IEEE

Aims & Scope

The following topics describe the scope of IEEE Society on Social Implications of Technology (IEEE SSIT) and of IEEE Technology and Society Magazine : Health and safety implications of technology, Engineering ethics and professional responsibility, Engineering education in social implications of technology, History of electrotechnology, Technical expertise and public policy, Social issues related to energy, Social issues related to information technology, Social issues related to telecommunications, Systems analysis in public policy decisions, Economic issues related to technology, Peace technology, and Environmental implications of technology. Beyond these specific topics, IEEE Technology and Society Magazine  is concerned with the broad area of the social implications of technology, especially electrotechnology.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Katina Michael
School of Information Systems and Technology
University of Wollongong