By Topic

Includes the top 50 most frequently accessed documents for this publication according to the usage statistics for the month of

  • Future Relations between Humans and Artificial Intelligence: A Stakeholder Opinion Survey in Japan

    Publication Year: 2016, Page(s):68 - 75
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2023 KB) | HTML iconHTML

    Concern about the potential benefits and risks of artificial intelligence (AI) has given impetus to the establishment of AI research. AI requires responsible research and innovation (RRI) with the collaboration of various stakeholders, including the public, from the early stages. However, stakeholders may have different opinions about AI and human-machine relations. We aim to discuss these viewpoi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Socially camouflaged technologies: the case of the electromechanical vibrator

    Publication Year: 1989, Page(s):3 - 11
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1406 KB)

    The case of the electromechanical vibrator, as a technology associated with women's sexuality, involves issues of acceptability rather than legality. The vibrator and its predecessor technologies, including the dildo, are associated with masturbation, a socially prohibited activity until well into the second half of this century. Devices for mechanically-assisted female masturbation, mainly vibrat... View full abstract»

    Freely Available from IEEE
  • Embedded Software Under the Courtroom Microscope: A Case Study of the Toyota Unintended Acceleration Trial

    Publication Year: 2016, Page(s):76 - 84
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1787 KB) | HTML iconHTML

    Product liability trials involving embedded software, such as those in which an automobile driver alleges that faulty embedded software was responsible for an accident, require the same standard of proof as other civil trials. The plaintiff must convince a jury that the defendant (for example, the automobile manufacturer) more likely than not is responsible for the accident [1]-[4].1 This includes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Expanding the Design Horizon for Self-Driving Vehicles: Distributing Benefits and Burdens

    Publication Year: 2016, Page(s):44 - 49
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1472 KB) | HTML iconHTML

    With over one billion vehicles in the world today, the motorized road vehicle is the pillar of modern society. Since the beginning of the 20th century, the automobile has revolutionized our spaces, practices, cultures, and identities through a complex matrix of technical, financial, economic, political, and social linkages. Visions of automobile use have always shaped its design, manufacture, and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sex Robot Matters: Slavery, the Prostituted, and the Rights of Machines

    Publication Year: 2016, Page(s):46 - 53
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1115 KB) | HTML iconHTML

    Why begin an article on sex robots, and the rights of machines, with an introduction to human slavery? Because these themes are more interlinked than one might imagine, but perhaps not for the reasons you would think. In this article, the author asks how a discussion about artificial intelligence (AI) and robots became fused with a discussion of slavery, rights, and objects (animate and inanimate)... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How to Avoid a Robotic Apocalypse: A Consideration on the Future Developments of AI, Emergent Consciousness, and the Frankenstein Effect

    Publication Year: 2016, Page(s):56 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1680 KB) | HTML iconHTML

    One of the greatest compliments I've ever received came from a gentleman who approached me after I had delivered a paper in Vancouver, British Columbia. He said: "You're from the future, aren't you?" He was responding to the manner in which I had considered logical entailments of how future episodes may play out. Although I was trained as a philosopher of science, the majority of my work for the l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Face recognition technology: security versus privacy

    Publication Year: 2004, Page(s):9 - 19
    Cited by:  Papers (34)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (557 KB) | HTML iconHTML

    Video surveillance and face recognition systems have become the subject of increased interest and controversy after the September 11 terrorist attacks on the United States. In favor of face recognition technology, there is the lure of a powerful tool to aid national security. On the negative side, there are fears of an Orwellian invasion of privacy. Given the ongoing nature of the controversy, and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Life and Contributions of Countess Ada Lovelace: Unintended Consequences of Exclusion, Prejudice, and Stereotyping

    Publication Year: 2016, Page(s):46 - 49
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1475 KB) | HTML iconHTML

    The scientific life and contributions of Augusta Ada King, Countess of Lovelace, are becoming increasingly well-known 200 years after her birth. Ada Lovelace had a privileged existence but lived in a world where girls were limited in the subjects they were taught, where young women were excluded from universities and where gender stereotypes were rigidly enforced. Despite the world in which she li... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application Areas of Additive Manufacturing : From Curiosity to Application

    Publication Year: 2015, Page(s):81 - 87
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1062 KB) | HTML iconHTML

    Innovation and finding new ways to do things in a smarter and more efficient way is necessary for organizations to stay competitive in an increasingly demanding environment. One such innovation is additive manufacturing (AM). This emerging technology is receiving increased attention and appears to embody a technology push, now that the number of applications is growing in an area that used to be p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robotic Prosthetics : Moving Beyond Technical Performance

    Publication Year: 2015, Page(s):71 - 79
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1526 KB) | HTML iconHTML

    While physical interaction with robots is becoming common in many domains, numerous devices are not appropriated by their users and remain unused in the cupboard. This phenomenon is observed particularly with robotic devices that are designed to interact closely with the body, especially if they are meant to compensate for a loss of sensory or motor capacity. This article uses the more extreme exa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Engineering globalization: oxymoron or opportunity?

    Publication Year: 2005, Page(s):8 - 15
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (673 KB) | HTML iconHTML

    Globalization can have a purely descriptive meaning, one that simply recognizes the facts of the increasing interdependence of national economies, the diffusion of technology and technological activity across international borders, and the intersection and integration of cultures. Taken in a normative sense, globalization, in addition to being a description of reality, can also turn out to be a pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Flying Ad-Hoc Networks: Technological and Social Implications

    Publication Year: 2016, Page(s):67 - 74
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1974 KB) | HTML iconHTML

    With the world turning into a global village due to technological advancements, automation in all aspects of life is gaining momentum. Wireless technologies address the everincreasing demands of portable and flexible communications. Wireless ad-hoc networks, which allow communication between devices without the need for any central infrastructure, are gaining significance, particularly for monitor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dimensions of Cyber-Attacks: Cultural, Social, Economic, and Political

    Publication Year: 2011, Page(s):28 - 38
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1402 KB) | HTML iconHTML

    Essential systems providing water, electricity, healthcare, finance, food, and transportation are now increasingly software dependent, distributed, and interconnected. The detrimental consequences of this growing dependence become apparent during times of political conflict, social instability, and other traumatic events. The Internet has made information exchange easier and more efficient, but it... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • App Stores for the Brain : Privacy and Security in Brain-Computer Interfaces

    Publication Year: 2015, Page(s):32 - 39
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1955 KB) | HTML iconHTML

    We believe emerging BCI privacy concerns call for a coordinated response by engineers and neuroscientists, lawyers and ethicists, government and industry. Ideally, devices, algorithms, standards and regulations can be designed to mitigate BCI privacy problems and ethical challenges. The first step towards doing so should be an open discussion between ethicists, legal experts, neuroscientists, and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • "Just Say No" to Drones

    Publication Year: 2012, Page(s):56 - 63
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1194 KB) | HTML iconHTML

    It is difficult to find a figure for the exact percentage of robotics research that is currently funded by the military. However, it is clear that military organizations and budgets fund a significant amount of and perhaps even most robotics research today. Recent technological progress, which has greatly increased the number of roles that it is plausible for robots to undertake; the potential for... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exoskeletons, Transhumanism, and Culture: Performing Superhuman Feats

    Publication Year: 2017, Page(s):37 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2229 KB) | HTML iconHTML

    In this article we study how exoskeletons are construed through three dominant but interrelated presentations: 1) popular science journalism, 2) advertisements of military innovation, and 3) blockbuster science fiction film. We address how these media function to alter attitudes about the future. The attitudinal framing of the exoskeleton asks that people aspire to transhumanism, and that they &#x... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Deterrents to women taking computer science courses

    Publication Year: 2004, Page(s):21 - 28
    Cited by:  Papers (21)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (400 KB) | HTML iconHTML

    The United States faces a shortage of computer scientists. Despite the current economic downturn, the most recent estimate indicates a labor force shortage of IT professionals. The shortage of IT professionals, and especially of computer scientists, provides impetus for increasing the representation of women in computer science (CS). We examine why so few students, and particularly few women, choo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Human by Design: An Ethical Framework for Human Augmentation

    Publication Year: 2017, Page(s):32 - 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1645 KB) | HTML iconHTML

    Rapid advances in science and technology are opening doors for the fulfillment of human desires in ways that were not previously possible. Neural, genetic, pharmacological, and physical forms of augmentation of the human experience promise to multiply both in number and complexity over the next decades. It is our responsibility to create a public, open discourse around the ethical implications of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robot Enhanced Therapy for Children with Autism Disorders: Measuring Ethical Acceptability

    Publication Year: 2016, Page(s):54 - 66
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1875 KB) | HTML iconHTML

    Children with autism spectrum disorders (ASD) have persistent deficits in social communication and social interaction, as well as restricted, repetitive patterns of behavior, interests, or activities [1]. The prevalence of autism is estimated at 1-2 per 1000, and close to 6 per 1000 for ASD [23]. ASD is a lifelong disorder, and many individuals need high levels of support throughout their lives [2... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ethical robots in warfare

    Publication Year: 2009, Page(s):30 - 33
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (769 KB) | HTML iconHTML

    It is a thesis of my ongoing research for the U.S. Army that robots not only can be better than soldiers in conducting warfare in certain circumstances, but they also can be more humane in the battlefield than humans. It is my contention that robots can be built that do not exhibit fear, anger, frustration, or revenge, and that ultimately (and the key word here is ultimately) behave in a more huma... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Amish Technology: Reinforcing values and building community

    Publication Year: 2007, Page(s):10 - 21
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2170 KB) | HTML iconHTML

    The Amish believe that their society and their technology are inextricably intertwined. In an effort to maintain and protect their community of believers, therefore, the Amish require that every technology they use not only conforms to, but reinforces their tradition, culture, and religion. They achieve these goals through two primary techniques. First they choose technologies that they believe wi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mental models of privacy and security

    Publication Year: 2009, Page(s):37 - 46
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (339 KB) | HTML iconHTML

    The mental models approach could significantly improve risk communication in the case of computer security. The particular mental models that will be discussed here are: physical, medical, criminal, warfare, and market models. Our strongest conclusion is that mental models can be used to improve risk communication. The second, untested, conclusion is that the best model may be the medical model. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Will My Next Car Be a Libertarian or a Utilitarian?: Who Will Decide?

    Publication Year: 2016, Page(s):40 - 45
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1040 KB) | HTML iconHTML

    Change is coming. Experimental, self-driving cars are plying public roads in many U.S. states, heralding what some automotive industry experts and regulators see as a profound and imminent disruption in the transportation industry, and a change to our way of life. With this change, a large swath of human choices regarding operation of vehicles, response to driving hazards, and compliance with impo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • World Building and the Future of Media: A Case Study-Makoko 2036

    Publication Year: 2016, Page(s):28 - 38
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2248 KB) | HTML iconHTML

    World building exists at the intersection of design, technology, and storytelling. In its ability to enable and conjure deeply considered holistic worlds, it represents the foundational narrative and design practice for transmedia, spherical storytelling, and the post-cinematic. World building takes a lateral anthropological stance, borrowing specifically from ethnographic practice to contextualiz... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Govcloud: Using Cloud Computing in Public Organizations

    Publication Year: 2013, Page(s):66 - 72
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (811 KB) | HTML iconHTML

    Governments are facing reductions in ICT budgets just as users are increasing demands for electronic services. One solution announced aggressively by vendors is cloud computing. Cloud computing is not a new technology, but it is a new way of offering services, taking into consideration business and economic models for providing and consuming ICT services. The paper explains the impact and benefits... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Building Trust in the Human?Internet of Things Relationship

    Publication Year: 2014, Page(s):73 - 80
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1161 KB) | HTML iconHTML

    Our vision in this paper is that agency, as the individual ability to intervene and tailor the system, is a crucial element in building trust in IoT technologies. Following up on this vision, we will first address the issue of agency, namely the individual capability to adopt free decisions, as a relevant driver in building trusted human-IoT relations, and how agency should be embedded in digital ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Argument Against "No-Look Texting" While Driving

    Publication Year: 2013, Page(s):53 - 59
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (620 KB) | HTML iconHTML

    Multiple countries across the globe and thirty-nine states in the U.S. have banned the act of sending “text messages” on handheld cell phones while behind the wheel of a car. The scientific research shows texting to result in substantial driver distraction. And a rough consensus between science, policy, and public opinion appears to be emerging that the distraction caused by the acts... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implanting Military RFID: Rights and Wrongs

    Publication Year: 2017, Page(s):48 - 51
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1150 KB) | HTML iconHTML

    There are potential benefits and potential risks that flow from the implantation of radio frequency identification (RFID) devices into humans. The potential benefits with respect to military personnel may be considered great enough to outweigh any potential risks. In particular, the ability to identify military personnel without the need for "dog tags," worn around the neck, could be beneficial. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Privacy vs. Security in National Emergencies

    Publication Year: 2012, Page(s):50 - 55
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2401 KB) | HTML iconHTML

    Emergence of a shared global risks rhetoric over the past few years has paralleled growth in some countries of political efforts to achieve national security. These efforts are characterized by the introduction and implementation of unprecedented measures to counter growing threats and to attempt to eliminate all identifiable potential human- and natural-caused risks and hazards. As every risk has... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Technologies of Taste

    Publication Year: 2016, Page(s):39 - 43
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1102 KB) | HTML iconHTML

    One unique aspect of our new digital media ecology is the massive proliferation of technologies of taste - recommendation engines that use collaborative or content-based filtering (or both). As technology allows us to move from a broadcast to an on-demand media culture, scholars and practitioners need to monitor the way people segregate themselves to media and entertainment content that reinforces... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security Threats and Mitigating Risk for USB Devices

    Publication Year: 2010, Page(s):44 - 49
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (840 KB) | HTML iconHTML

    Computer users have consistently sought out improvements to devices for removable storage to provide the quickest and most efficient means of transferring data from one computer to another. Portable storage media have always been fraught with risk. Security considerations have always been a concern and organizations have tried to mitigate these threats using many controls. However, since threats a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Religion, Science, and Technology: An Interview with Metropolitan Kallistos Ware [Interview]

    Publication Year: 2017, Page(s):20 - 26
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1036 KB) | HTML iconHTML

    Born Timothy Ware in Bath, Somerset, England, Metropolitan Kallistos was educated at Westminster School (to which he had won a scholarship) and Magdalen College, Oxford, where he took a Double First in Classics as well as reading Theology. In 1966 Kallistos became a lecturer at the University of Oxford, teaching Eastern Orthodox Studies, a position he held for 35 years until his retirement. In 197... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Digital identity

    Publication Year: 2004, Page(s):34 - 41
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1249 KB) | HTML iconHTML

    The lack of conceptual clarity reflected by the overload of the word is confounding the ubiquitous practice of risk management via identity management. Thus we clarifies the nature of identification in a digital networked world, as opposed to a paper-based world. The examples and the context are identification as used in law enforcement in the United States. Together the definitions and the exampl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • E-Policing and the Social Contract

    Publication Year: 2012, Page(s):33 - 41
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1283 KB) | HTML iconHTML

    The Age of Information has taken investigative and intelligence capabilities beyond the imaginations of Age of Enlightenment philosophers such as John Locke whose social contract theory of governance remains the moral justification for policing. Through philosophical analysis, taking as its starting point John Locke, and philosophers of policing such as John Kleinig and Seamus Miller, this article... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Privacy in the Age of Google and Facebook

    Publication Year: 2011, Page(s):58 - 63
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1006 KB) | HTML iconHTML

    Google and Facebook look to be at best naive, and at worst inept, when it comes to managing data privacy.Privacy is a key protection for intellectual, polit ical, and religious freedom, as well as the dignity of the individual. We cannot underestimate the power of the online revolution unleashed by Google and Facebook, but we can not ignore the inherent vulnerabili ties their size brings to digita... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Death strikes from the sky: the calculus of proportionality

    Publication Year: 2009, Page(s):16 - 19
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (285 KB) | HTML iconHTML

    The use of unmanned aerial vehicles (UAVs) in the conflict zones of Iraq and Afghanistan for both intelligence gathering and "decapitation" attacks has been heralded as an unprecedented success by U.S. military forces. There is a demand for substantially increased production of Predator MQ-1 and Reaper MQ-9 Digital Object Identifier 10.1109/MTS.2009.931865 drones and funding has been boosted to en... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Opposing Surveillance

    Publication Year: 2010, Page(s):26 - 32
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (599 KB) | HTML iconHTML

    Local critics of surveillance abuses may come under increased surveillance themselves. Exposing surveillance is crucial to challenging it. Those who oppose surveillance are said to be defending criminals, terrorists, and pedophiles. A really effective agency, one that gets in the way of poLocal critics of surveillance abuses may come under increased surveillance themselves. Exposing surveillance i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RFID implants: Opportunities and and challenges for identifying people

    Publication Year: 2008, Page(s):24 - 32
    Cited by:  Papers (28)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (347 KB) | HTML iconHTML

    Information and communication technologies (ICT), in general, and the Internet, in particular, have to a digitalization information and to "always-on" remotely accessible services. To ensure that these services are accessed with appropriate levels of security and privacy, the need for the identification and authentication (I&A) of individuals has increased. For most applications, the I&A p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ethics, Children, and Biometric Technology

    Publication Year: 2016, Page(s):67 - 72
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1174 KB) | HTML iconHTML

    This article investigates suitable biometrics for the identification of children. It describes the different properties of a good biometric, and concludes with some recommendations regarding ethics and the use of biometrics for children. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Anticipating military nanotechnology

    Publication Year: 2004, Page(s):33 - 40
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (990 KB) | HTML iconHTML

    According to some military visionaries, warriors will wield rifles that fire small self-guided missiles, dispatch flying mini-robots and micro-sensor nets as scouts and sentries, and carry devices that can gather water in any environment. They will be networked to tactical command through helmets that provide an "augmented reality" overlaid with information and instructions. Even nanotechnology (N... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Privacy Implications of Automated GPS Tracking and Profiling

    Publication Year: 2010, Page(s):39 - 46
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2382 KB) | HTML iconHTML

    The automobile has gradually evolved from an analog machine with mostly mechanical and hydraulic components to an electronic system with a growing number of computer-based systems. Within this "smart car" revolution, GPS vehicle navigation has attracted significant attention. There are efforts underway to use GPS vehicle navigation infrastructure for additional value-added services, for instance, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evolution or revolution? the rise of UAVs

    Publication Year: 2006, Page(s):43 - 49
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (486 KB) | HTML iconHTML

    Evolutionary trends in pilotless aircraft need to be identified and put in context. Instead of focusing on trends in the technical development of pilotless aircraft, in this article the pilotless aircraft concept will be tracked through its various incarnations over time. Since unmanned aerial vehicles (UAVs) are often included in the ongoing revolution in military affairs, they are seen as a new ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Networked microsensors and the end of the world as we know it

    Publication Year: 2003, Page(s):16 - 22
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4400 KB) | HTML iconHTML

    Microsensors promise to bring people into closer contact with computers and, in the process, change society significantly. The author examines the impact of sensors on four areas: industrial manufacturing, military operations, personal health, and individual freedoms. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Social Media, Disaster Studies, and Human Communication

    Publication Year: 2014, Page(s):54 - 65
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (990 KB) | HTML iconHTML

    Most sociologists of knowledge and science tend to agree that significant advances in an area come less from the accumulation of empirical studies, but more from reconceptualizations of basic ideas and definitions [1, p. 38]. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy and Autonomous Urban Land Vehicles

    Publication Year: 2012, Page(s):28 - 38
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (845 KB) | HTML iconHTML

    Most of what has been written about the social implications of autonomous vehicles concerns military vehicles, particularly aerial vehicles [1]. By contrast, this paper addresses the effects that civilian urban land vehicles could have on energy consumption. When the military designs land vehicles, it assumes an unknown or hostile environment. If the infrastructure instead cooperates with the vehi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ethics, engineering, and sustainable development

    Publication Year: 2002, Page(s):39 - 48
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (247 KB) | HTML iconHTML

    The author attempts to provide the rationale for a philosophy of engineering ethics grounded in the notion of sustainable development. It is central to his thesis that this new philosophy can be best inculcated into the culture of engineering through engineering education-experience and intuition are not enough. Engineering ethicists must work more closely with engineering scientists to ensure tha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent Subcutaneous Body Area Networks: Anticipating Implantable Devices

    Publication Year: 2016, Page(s):73 - 80
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1216 KB) | HTML iconHTML

    There is a long history of medicallyprescribed implantable devices used to assist in treating chronic health conditions. Examples include pacemakers [1], cochlear and retinal implants [2], insulin pumps [3], and deep brain stimulation implants for relief of Parkinson's disease tremors and seizures [4] to name but a few. There is also a growing trend towards wearable consumer electronics for a myri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Predators or plowshares? arms control of robotic weapons

    Publication Year: 2009, Page(s):25 - 29
    Cited by:  Papers (21)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (180 KB) | HTML iconHTML

    With the development of the General Atomics MQ-1 Predator, robotic weapons came of age. The operations of this unmanned aerial vehicle (UAV) in Iraq, Afghanistan, Pakistan, and northern Africa in the last few years have given us a glimpse of the future of high-tech war. It is a future in which thousands of miles separate those firing weapons from those whom they kill, in which joystick jockeys hav... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Associating Internet Usage with Depressive Behavior Among College Students

    Publication Year: 2012, Page(s):73 - 80
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1042 KB) | HTML iconHTML

    Depression is a serious mental health problem affecting a significant segment of American society today, and in particular college students. In a survey by the U.S. Centers for Disease Control (CDC) in 2009, 26.1% of U.S. students nationwide reported feeling so sad or hopeless almost every day for 2 or more weeks in a row that they stopped doing some usual activities. Similar statistics are also r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robotics, the New Industrial Revolution

    Publication Year: 2012, Page(s):51 - 58
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (751 KB) | HTML iconHTML

    Robots are becoming an important part of the “new social technology” defined by Hirai [1], where finding a robot in any environment is becoming more common. While we are used to finding robots in different environments such as supermarkets, nurseries (e.g., robotic pets), hospitals (e.g., for surgery), or at home (e.g., vacuuming robots), the environment that still has the most robot... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

The following topics describe the scope of IEEE Society on Social Implications of Technology (IEEE SSIT) and of IEEE Technology and Society Magazine : Health and safety implications of technology, Engineering ethics and professional responsibility, Engineering education in social implications of technology, History of electrotechnology, Technical expertise and public policy, Social issues related to energy, Social issues related to information technology, Social issues related to telecommunications, Systems analysis in public policy decisions, Economic issues related to technology, Peace technology, and Environmental implications of technology. Beyond these specific topics, IEEE Technology and Society Magazine  is concerned with the broad area of the social implications of technology, especially electrotechnology.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Katina Michael
School of Information Systems and Technology
University of Wollongong