By Topic

IEEE Technology and Society Magazine

Issue 1 • Date Spring 2007

Filter Results

Displaying Results 1 - 15 of 15
  • Front cover - IEEE Technology and Society Magazine - Spring 2007

    Publication Year: 2007, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (2530 KB)
    Freely Available from IEEE
  • IEEE Technology and Society Magazine - Special Issue on Potentials and Limits of Cooperation in Wireless Communications: Toward Fourth Generation (4G) Wireless - Call for Papers March 2008

    Publication Year: 2007, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (31 KB)
    Freely Available from IEEE
  • Table of contents - Vol 26 No 1

    Publication Year: 2007, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (464 KB)
    Freely Available from IEEE
  • IEEE Technology and Society Magazine - Staff

    Publication Year: 2007, Page(s): 2
    Request permission for commercial reuse | PDF file iconPDF (163 KB)
    Freely Available from IEEE
  • Security and Usability [Guest Editor's Introduction]

    Publication Year: 2007, Page(s):3 - 24
    Request permission for commercial reuse | PDF file iconPDF (111 KB) | HTML iconHTML
    Freely Available from IEEE
  • Control, trust, privacy, and security: evaluating location-based services

    Publication Year: 2007, Page(s):4 - 16
    Cited by:  Papers (15)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (693 KB) | HTML iconHTML

    Location-based services (LBS) are those applications that utilize the position of an end-user, animal, or thing based on a given device (handheld, wearable, or implanted), for a particular purpose. This article uses scenario planning to identify the possible risks related to location-based services in the context of security and privacy. The original contribution of this article is that the dilemm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Good neighbors can make good fences: a peer-to-peer user security system

    Publication Year: 2007, Page(s):17 - 24
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (905 KB) | HTML iconHTML

    The basic concept of good neighbors system is straightforward: users scan friends' machines with a trustworthy "good worm" and patch vulnerabilities, leaving records to propagate the worm through a social network, and to foster social feedback. The intuition is of a community in which users can check each other's security fences and lock them if they are open. Such a system is, of course, not a pa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards usefully secure email

    Publication Year: 2007, Page(s):25 - 34
    Cited by:  Papers (3)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (775 KB) | HTML iconHTML

    We have built attribute based, usefully secure email (ABUSE), a system that leverages users by enabling them to build a decentralized, nonhierarchical public key infrastructure (PKI) to express their trust relationships with each other, and then use this PKI to manage their trust in people with whom they correspond via secure email. Our design puts humans into the system - to do things that humans... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Privacy and security as ideology

    Publication Year: 2007, Page(s):35 - 45
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (574 KB) | HTML iconHTML

    Privacy and data protection are among the prime problems of the information society. The terms privacy and security promotes a particular ideology and uses the ethical recognition of the concepts to limit critical discourses. This article uses a critical approach in the tradition of critical theory and its developments in critical research in information systems (CRIS) to expose and overcome these... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE-SSIT Distinguished Service Award

    Publication Year: 2007, Page(s): 45
    Request permission for commercial reuse | PDF file iconPDF (36 KB)
    Freely Available from IEEE
  • Designing ethical phishing experiments

    Publication Year: 2007, Page(s):46 - 58
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1034 KB) | HTML iconHTML

    While fraud has been part of human society for as long as we know, the automated type of fraud that is known as phishing is a relatively recent phenomenon. It is becoming clear to society that phishing is a problem of quite catastrophic dimensions. Phishing is a multifaceted techno-social problem for which there is no known single silver bullet. As a result of these insights, an increasing number ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • American Prometheus: The Triumph and Tragedy of J. Robert Oppenheimer (Bird, K. and Sherwin, M.J.; 2005) [Book Review]

    Publication Year: 2007, Page(s):59 - 61
    Request permission for commercial reuse | PDF file iconPDF (84 KB) | HTML iconHTML
    Freely Available from IEEE
  • Dark Hero of the Information Age: In Search of Norbert Wiener The Father of Cybernetics (Conway, F. and Siegelman, J.; 2004) [Book Review]

    Publication Year: 2007, Page(s):61 - 63
    Request permission for commercial reuse | PDF file iconPDF (77 KB) | HTML iconHTML
    Freely Available from IEEE
  • T&S Magazine wins STC Awards for 2006 [News]

    Publication Year: 2007, Page(s): 64
    Request permission for commercial reuse | PDF file iconPDF (1805 KB)
    Freely Available from IEEE
  • New Editor chosen for T&S Magazine [News]

    Publication Year: 2007, Page(s): 64
    Request permission for commercial reuse | PDF file iconPDF (1805 KB)
    Freely Available from IEEE

Aims & Scope

The following topics describe the scope of IEEE Society on Social Implications of Technology (IEEE SSIT) and of IEEE Technology and Society Magazine : Health and safety implications of technology, Engineering ethics and professional responsibility, Engineering education in social implications of technology, History of electrotechnology, Technical expertise and public policy, Social issues related to energy, Social issues related to information technology, Social issues related to telecommunications, Systems analysis in public policy decisions, Economic issues related to technology, Peace technology, and Environmental implications of technology. Beyond these specific topics, IEEE Technology and Society Magazine  is concerned with the broad area of the social implications of technology, especially electrotechnology.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Katina Michael
School of Information Systems and Technology
University of Wollongong