By Topic

IEEE Technology and Society Magazine

Issue 3 • Date Fall 2006

Filter Results

Displaying Results 1 - 17 of 17
  • ISTAS 2006 explores "disaster preparedness and recovery"

    Publication Year: 2006, Page(s): 56
    Request permission for commercial reuse | PDF file iconPDF (196 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Man Behind the Microchip: Robert Noyce and the Invention of Silicon Valley [Book Review]

    Publication Year: 2006, Page(s):50 - 51
    Cited by:  Papers (2)
    Request permission for commercial reuse | PDF file iconPDF (44 KB) | HTML iconHTML
    Freely Available from IEEE
  • IEEE Technology and Society Magazine - Fall 2006

    Publication Year: 2006, Page(s): 0_1
    Request permission for commercial reuse | PDF file iconPDF (1785 KB)
    Freely Available from IEEE
  • Information for authors

    Publication Year: 2006, Page(s): 02
    Request permission for commercial reuse | PDF file iconPDF (43 KB)
    Freely Available from IEEE
  • Table of contents - Vol 25 No 3

    Publication Year: 2006, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (62 KB)
    Freely Available from IEEE
  • IEEE Technology and Society Magazine - List staff

    Publication Year: 2006, Page(s): 2
    Request permission for commercial reuse | PDF file iconPDF (168 KB)
    Freely Available from IEEE
  • 2007 International Symposium on Technology and Society (ISTAS'07) - Call for Papers

    Publication Year: 2006, Page(s): 3
    Request permission for commercial reuse | PDF file iconPDF (145 KB)
    Freely Available from IEEE
  • Now more than ever [President's message]

    Publication Year: 2006, Page(s): 4
    Request permission for commercial reuse | PDF file iconPDF (95 KB) | HTML iconHTML
    Freely Available from IEEE
  • A method of value assessment for social technologies [Guest Editor's Introduction]

    Publication Year: 2006, Page(s):5 - 7
    Request permission for commercial reuse | PDF file iconPDF (450 KB) | HTML iconHTML
    Freely Available from IEEE
  • Freedom of silence vs. freedom of speech: Technology, law, and information security

    Publication Year: 2006, Page(s):8 - 15
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (603 KB) | HTML iconHTML

    Freedom of speech and freedom of silence (privacy) are viewed very differently and are protected by laws in different ways in our society. In fact, there is a natural tension between the two, and society must find the proper balance between such opposing forces. Technology is playing an increasing role in supporting both freedom of speech and freedom of silence. At the same time, recent implicatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • National responses to energy vulnerability

    Publication Year: 2006, Page(s):16 - 25
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (661 KB) | HTML iconHTML

    Energy availability has again become an important and polarizing issue. Different countries have made distinctive choices affecting the importance of energy as a determinant of economic growth. Analysis of these varying choices helps put the current debate over oil imports in historical context, and illuminates the relative merits of supply-side and demand-side solutions. Some nations have achieve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cyber-warfare seen through a mariner's spyglass

    Publication Year: 2006, Page(s):26 - 33
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (281 KB) | HTML iconHTML

    The Internet is now an essential tool in the everyday conduct of commercial life. The ability of terrorists to conduct cyber-warfare is largely unknown, but the potential for the disruption of life worries many policymakers. In searching for precedent to anticipate the potential impact of a cyber-war, it is important to identify modes of conflict that are useful both against asymmetrically matched... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Social acceptance of RFID as a biometric security method

    Publication Year: 2006, Page(s):34 - 42
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (293 KB) | HTML iconHTML

    The acceptance of biometric security controls in documentation, travel, and employment may soon be facing a strong test as those controls are further expanded through radio frequency identification (RFID). Global security advocates are working aggressively toward broadening the scope of tracking to the individual human level through implanted chips. An anticipated solution is to implant a small me... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evolution or revolution? the rise of UAVs

    Publication Year: 2006, Page(s):43 - 49
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (486 KB) | HTML iconHTML

    Evolutionary trends in pilotless aircraft need to be identified and put in context. Instead of focusing on trends in the technical development of pilotless aircraft, in this article the pilotless aircraft concept will be tracked through its various incarnations over time. Since unmanned aerial vehicles (UAVs) are often included in the ongoing revolution in military affairs, they are seen as a new ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Gone phishing

    Publication Year: 2006, Page(s):52 - 55
    Cited by:  Papers (4)
    Request permission for commercial reuse | PDF file iconPDF (2344 KB) | HTML iconHTML
    Freely Available from IEEE
  • Introducing the IEEE Power & Energy Library

    Publication Year: 2006, Page(s): 03
    Request permission for commercial reuse | PDF file iconPDF (317 KB)
    Freely Available from IEEE
  • Subscribe and/or join SSIT! [advertisement]

    Publication Year: 2006, Page(s): 04
    Request permission for commercial reuse | PDF file iconPDF (314 KB)
    Freely Available from IEEE

Aims & Scope

The following topics describe the scope of IEEE Society on Social Implications of Technology (IEEE SSIT) and of IEEE Technology and Society Magazine : Health and safety implications of technology, Engineering ethics and professional responsibility, Engineering education in social implications of technology, History of electrotechnology, Technical expertise and public policy, Social issues related to energy, Social issues related to information technology, Social issues related to telecommunications, Systems analysis in public policy decisions, Economic issues related to technology, Peace technology, and Environmental implications of technology. Beyond these specific topics, IEEE Technology and Society Magazine  is concerned with the broad area of the social implications of technology, especially electrotechnology.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Katina Michael
School of Information Systems and Technology
University of Wollongong