By Topic

Technology and Society Magazine, IEEE

Issue 2 • Date Summer 2013

Filter Results

Displaying Results 1 - 19 of 19
  • [Front cover]

    Page(s): C1
    Save to Project icon | Request Permissions | PDF file iconPDF (4351 KB)  
    Freely Available from IEEE
  • Scope of the Society on Social Implications of Technology

    Page(s): C2
    Save to Project icon | Request Permissions | PDF file iconPDF (262 KB)  
    Freely Available from IEEE
  • [Table of contents]

    Page(s): 1 - 2
    Save to Project icon | Request Permissions | PDF file iconPDF (4871 KB)  
    Freely Available from IEEE
  • [Masthead]

    Page(s): 3
    Save to Project icon | Request Permissions | PDF file iconPDF (330 KB)  
    Freely Available from IEEE
  • High-tech lust [Editorial]

    Page(s): 4 - 5
    Save to Project icon | Request Permissions | PDF file iconPDF (211 KB)  
    Freely Available from IEEE
  • 2014 ISTAS and ETHICS

    Page(s): 6
    Save to Project icon | Request Permissions | PDF file iconPDF (3581 KB)  
    Freely Available from IEEE
  • When the Lights Went Out (Nye, D.; 2010) [Book Review]

    Page(s): 7 - 8
    Save to Project icon | Request Permissions | PDF file iconPDF (167 KB)  
    Freely Available from IEEE
  • How the Hippies Saved Physics (Kaiser, D.; 2011) [Book Review]

    Page(s): 9 - 11
    Save to Project icon | Request Permissions | PDF file iconPDF (177 KB)  
    Freely Available from IEEE
  • Risk, complexity and sustainability [special section introduction]

    Page(s): 12
    Save to Project icon | Request Permissions | PDF file iconPDF (127 KB)  
    Freely Available from IEEE
  • Technology, Technique, Interplay: Questioning Die Frage nach der Technik

    Page(s): 13 - 21
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1334 KB) |  | HTML iconHTML  

    Heidegger's reading of the essence of Technik is beset with a fatal ambiguity between technology and technique, which can be traced back further to an ambiguity lodged in the heart of Aristotle's metaphysical concept of power. This unresolved ambiguity, in turn, is intimately related to the historical cover-up of the twofold in the manifold of being between whatness (quiddity) and whoness (quissity). This cover-up is exposed using the example of the art of rhetoric. Ultimately the fog has to lift from the clearing to see, through adequate ontological concepts, that and how all beings are in estimating interplay with one another (the much abused phenomenon of value) and above all, that human beings strive to be somewho in a free power play with each other. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Technology as Risk

    Page(s): 22 - 31
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (494 KB) |  | HTML iconHTML  

    Technology is a source of risk. Technology is a risk not only because it often has unintended consequences, but also because accelerating technological change creates compound risks resulting from multiple interacting technologies. More importantly, a fast changing technological environment introduces additional risk because of the numerous social, economic, and political opportunities it creates, and because of the threats it facilitates. In a competitive world, taking advantage of these new opportunities, and protecting against emerging threats are constant battles not only for individuals, but also for businesses and governments. These risks are most pronounced in global communication, military, and banking systems, but no social institution is immune. Reduction of these risks should be a major concern for all social institutions. The undesirable consequences need to be dealt with before, not after they occur. There are numerous risk-reduction technologies that can be deployed to minimize risk while still maintaining the efficiencies created by efficiency-raising technologies. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SSIT Logo Design Contest [News and Notes]

    Page(s): 31
    Save to Project icon | Request Permissions | PDF file iconPDF (246 KB)  
    Freely Available from IEEE
  • Building Trust-Based Sustainable Networks

    Page(s): 32 - 38
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1527 KB) |  | HTML iconHTML  

    Trust is modeled in many disciplines as a key factor in determining if entities cooperate with each other. In the social sciences, particularly within the social, economic, and environmental domains, trust has received considerable attention as the key element to building sustainable societies. However, in the networking and telecommunications fields, trust-based approaches to developing sustainable systems have yet to be examined. In this work, we study how trust can be facilitated among entities to build sustainable networks with limited resources or misbehaving entities by learning from the lessons in the social sciences. We discuss the multifaceted relationships of trust with both security and decision making. We also investigate how socio-cognitive models of trust may enhance the sustainability of a system. We discuss ways to make more intelligent interactions based on trust and economic principles. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Human Information Appliance in Combat, Intelligence, and Diplomacy Space

    Page(s): 39 - 51
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1393 KB) |  | HTML iconHTML  

    In this article we introduce the concept of a human information appliance as a merging of advanced information technologies architectures (Martin Libicki) - Jeff Raskin's 1978 idea of an "information appliance" - and advancing science and engineering in cybernetics (the fusion of human and machine into a hybrid entity. That we create this technology/entity for the purpose of conducting and advancing situational awareness capability in intelligence - homeland - and diplomacy spaces - invokes the primary environment of national security critical infrastructures and their protection (CIP) for which we must investigate performance and risk dimensions in the future states that we describe. Due to the unique nature of this technology as a function of human evolution and human enhancement - we identify the variable of public human ethics for inclusion into the policy decision-matrix for our open society. This is initiated by examining the ethics of human enhancement in another national security scenario that involves information technology for enhancement outcomes within the realm of genetic therapy applied to weaponization and corresponding defensive technologies. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Teaching Social Responsibility for the Conduct of Research

    Page(s): 52 - 58
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (740 KB) |  | HTML iconHTML  

    In this essay I draw on the history of engineering and research ethics, and on the way priorities in those disciplines were established in the United States, to discuss how we should teach social responsibility in research ethics. Following Deborah Johnson, I use the term ?social responsibility? in the sense of having a moral obligation ?to protect the safety and welfare of society? [1]-[3].1 I focus on one obstacle in teaching this aspect of research ethics: the long-standing belief that social responsibility is not the primary concern of scientists because they produce basic knowledge rather than technology. In this view, scientific knowledge is seen as neutral, neither good nor bad, and those who apply this knowledge, mainly engineers, should bear the primary social responsibility for its use. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • User-Centered Engineering Ethics Curricula

    Page(s): 59 - 65
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1031 KB) |  | HTML iconHTML  

    Ethical training in the classroom offers engineering students the opportunity to assess theoretical frameworks and consider crucial diverse perspectives that they can apply in the workplace. With practice, and exposure to decision-making processes supported by ethical theory, students can develop the agility to consider dilemmas from multiple ethical perspectives in order to make more astute decisions. Ethical theory in engineering applications exists in a diverse multicultural environment. It is important to design engineering ethics courses so that they are culturally sensitive and inclusive of the diverse students in the classroom. This preliminary study uses a short ethics course coupled with a student assessment survey to understand the diversity and perspectives operative in the engineering classroom. The goal is to design a student-centered engineering ethics curriculum and, eventually, a globally acceptable online engineering ethics course. Presented here are the survey data collected as evidence for substantiating diversity-warranted user-centered pedagogy in the engineering ethics curricula along with a framework for designing and implementing user-centered globally ethical curricula. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Region 8 in a Persian Market

    Page(s): 66 - 73
    Save to Project icon | Request Permissions | PDF file iconPDF (772 KB)  
    Freely Available from IEEE
  • Gravitating to "the new shiny thing": Meaning, emotions, and tablets

    Page(s): 74 - 80
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (846 KB) |  | HTML iconHTML  

    Technology continuously revolutionizes the way people interact with information technology (IT). In this article we argue that, while extant literature has certainly provided rich insights into meaning making with IT artifacts, the tablet's proliferation calls for reassigning the significance these may hold for users. Approaching user experience as subjective, we seek to explore the relationship individuals develop with the tablet in their daily lives. We follow the case study research method, and build upon a paradigmatic case, that of the iPad, because it is considered as the exemplar in its class; even though tablets have existed for years, it is only with the launching of the iPad, that they became popular among the mass consumer market. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Society on Social Implications of Technology

    Page(s): C3
    Save to Project icon | Request Permissions | PDF file iconPDF (701 KB)  
    Freely Available from IEEE

Aims & Scope

IEEE Technology and Society Magazine covers the impact of technology (as embodied by the fields of interest in IEEE) on society

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Katina Michael
School of Information Systems and Technology
University of Wollongong