By Topic

Technology and Society Magazine, IEEE

Issue 1 • Date Spring 2007

Filter Results

Displaying Results 1 - 15 of 15
  • Front cover - IEEE Technology and Society Magazine - Spring 2007

    Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (2530 KB)  
    Freely Available from IEEE
  • IEEE Technology and Society Magazine - Special Issue on Potentials and Limits of Cooperation in Wireless Communications: Toward Fourth Generation (4G) Wireless - Call for Papers March 2008

    Page(s): c2
    Save to Project icon | Request Permissions | PDF file iconPDF (31 KB)  
    Freely Available from IEEE
  • Table of contents - Vol 26 No 1

    Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (464 KB)  
    Freely Available from IEEE
  • IEEE Technology and Society Magazine - Staff

    Page(s): 2
    Save to Project icon | Request Permissions | PDF file iconPDF (163 KB)  
    Freely Available from IEEE
  • Security and Usability [Guest Editor's Introduction]

    Page(s): 3 - 24
    Save to Project icon | Request Permissions | PDF file iconPDF (111 KB)  
    Freely Available from IEEE
  • Control, trust, privacy, and security: evaluating location-based services

    Page(s): 4 - 16
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (693 KB) |  | HTML iconHTML  

    Location-based services (LBS) are those applications that utilize the position of an end-user, animal, or thing based on a given device (handheld, wearable, or implanted), for a particular purpose. This article uses scenario planning to identify the possible risks related to location-based services in the context of security and privacy. The original contribution of this article is that the dilemma has been related specifically to LBS, under the privacy-security dichotomy. Here, each side of the dichotomy is divided into three key components that combine to greatly magnify risk. Removing one or more components for each set decreases the privacy or security risk. Where more elements are present in conjunction, the risk is increased View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Good neighbors can make good fences: a peer-to-peer user security system

    Page(s): 17 - 24
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (905 KB) |  | HTML iconHTML  

    The basic concept of good neighbors system is straightforward: users scan friends' machines with a trustworthy "good worm" and patch vulnerabilities, leaving records to propagate the worm through a social network, and to foster social feedback. The intuition is of a community in which users can check each other's security fences and lock them if they are open. Such a system is, of course, not a panacea against all attacks, but offers the potential of a new paradigm in user-focused security. The good neighbors system will help users manage their security needs, yet will not introduce new security risks. The good neighbors system combines the functional scanning and repairing of the "good worm" with the robustness of P2P networks and the embeddedness of social networks. While social and economic underpinnings of this model are addressed, there are also legal considerations. Scanning and altering resources meets the definition of a computer crime in many jurisdictions View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards usefully secure email

    Page(s): 25 - 34
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (775 KB) |  | HTML iconHTML  

    We have built attribute based, usefully secure email (ABUSE), a system that leverages users by enabling them to build a decentralized, nonhierarchical public key infrastructure (PKI) to express their trust relationships with each other, and then use this PKI to manage their trust in people with whom they correspond via secure email. Our design puts humans into the system - to do things that humans are good at but machines are not - at both the creation of credentials as well as the interpretation of credentials. By doing so, we hope this system can overcome the failings of approaches based on standard PKI View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Privacy and security as ideology

    Page(s): 35 - 45
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (574 KB) |  | HTML iconHTML  

    Privacy and data protection are among the prime problems of the information society. The terms privacy and security promotes a particular ideology and uses the ethical recognition of the concepts to limit critical discourses. This article uses a critical approach in the tradition of critical theory and its developments in critical research in information systems (CRIS) to expose and overcome these discursive closures. The author begins with a review of the literature on privacy and security, which will support the contention that these are ethical concepts. The concept of ideology and critical research is discussed. This will lead to a critical discourse analysis of a text from a commercial software vendor, which will provide empirical evidence of the ideological use of the terms privacy and security View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE-SSIT Distinguished Service Award

    Page(s): 45
    Save to Project icon | Request Permissions | PDF file iconPDF (36 KB)  
    Freely Available from IEEE
  • Designing ethical phishing experiments

    Page(s): 46 - 58
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1034 KB) |  | HTML iconHTML  

    While fraud has been part of human society for as long as we know, the automated type of fraud that is known as phishing is a relatively recent phenomenon. It is becoming clear to society that phishing is a problem of quite catastrophic dimensions. Phishing is a multifaceted techno-social problem for which there is no known single silver bullet. As a result of these insights, an increasing number of researchers and practitioners are attempting to quantify risks and degrees of vulnerabilities in order to understand where to focus protective measures. When academic researchers plan phishing studies, they are faced with the reality that such studies must not only be conducted in an ethical manner, but they also must be reviewed and approved by their Institutional Review Board (IRB). This article provides an overview of the review process used by IRBs, an outline of the section of the federal regulations, 45 CFR 46, 116(d)(14), that provide the circumstances where aspects of the informed consent process can be waived. Moreover, it contains a discussion of the controversial ethical issues inherent in phishing studies that request a waiver of aspects of the informed consent requirement. Finally, this paper outlines the process of designing and analyzing phishing experiments in an ethical manner, and in accordance with the principles and regulations guiding IRBs View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • American Prometheus: The Triumph and Tragedy of J. Robert Oppenheimer (Bird, K. and Sherwin, M.J.; 2005) [Book Review]

    Page(s): 59 - 61
    Save to Project icon | Request Permissions | PDF file iconPDF (84 KB)  
    Freely Available from IEEE
  • Dark Hero of the Information Age: In Search of Norbert Wiener The Father of Cybernetics (Conway, F. and Siegelman, J.; 2004) [Book Review]

    Page(s): 61 - 63
    Save to Project icon | Request Permissions | PDF file iconPDF (77 KB)  
    Freely Available from IEEE
  • T&S Magazine wins STC Awards for 2006 [News]

    Page(s): 64
    Save to Project icon | Request Permissions | PDF file iconPDF (1805 KB)  
    Freely Available from IEEE
  • New Editor chosen for T&S Magazine [News]

    Page(s): 64
    Save to Project icon | Request Permissions | PDF file iconPDF (1805 KB)  
    Freely Available from IEEE

Aims & Scope

IEEE Technology and Society Magazine covers the impact of technology (as embodied by the fields of interest in IEEE) on society

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Katina Michael
School of Information Systems and Technology
University of Wollongong