{"title":"The Slow Tech Journey: An Approach to Teaching Corporate Social Responsibility — Part 2","authors":"R. Hammons, N. Patrignani, D. Whitehouse","doi":"10.1109/ntpe.2018.9778134","DOIUrl":"https://doi.org/10.1109/ntpe.2018.9778134","url":null,"abstract":"","PeriodicalId":138853,"journal":{"name":"IEEE Technology Policy and Ethics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128631242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Slow Tech Journey: An Approach to Teaching Corporate Social Responsibility — Part 1","authors":"R. Hammons, N. Patrignani, D. Whitehouse","doi":"10.1109/ntpe.2017.9778107","DOIUrl":"https://doi.org/10.1109/ntpe.2017.9778107","url":null,"abstract":"","PeriodicalId":138853,"journal":{"name":"IEEE Technology Policy and Ethics","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125854574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Upsetting the Apple Cart — Are FinTechs a Threat to Banks?","authors":"Heike Menne-Spohr, Mohammad Saud Khan","doi":"10.1109/ntpe.2017.9778132","DOIUrl":"https://doi.org/10.1109/ntpe.2017.9778132","url":null,"abstract":"","PeriodicalId":138853,"journal":{"name":"IEEE Technology Policy and Ethics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122393316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cybersecurity Law & Emerging Technologies Part 1: The Federal Trade Commission, Reasonable Security Measures, and IoT","authors":"Emile Loza de Siles","doi":"10.1109/ntpe.2017.9778111","DOIUrl":"https://doi.org/10.1109/ntpe.2017.9778111","url":null,"abstract":"","PeriodicalId":138853,"journal":{"name":"IEEE Technology Policy and Ethics","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124905466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Big Data, Analytics, and Technology's Impact on Society","authors":"L. B. Moses, G. Adamson","doi":"10.1109/ntpe.2017.9778027","DOIUrl":"https://doi.org/10.1109/ntpe.2017.9778027","url":null,"abstract":"","PeriodicalId":138853,"journal":{"name":"IEEE Technology Policy and Ethics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128854139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Internet of Threats and Context Aware Security: Part Two","authors":"J. Chaudhry, Ahmed Ibrahim, A. Bashir","doi":"10.1109/ntpe.2017.9778026","DOIUrl":"https://doi.org/10.1109/ntpe.2017.9778026","url":null,"abstract":"","PeriodicalId":138853,"journal":{"name":"IEEE Technology Policy and Ethics","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123196562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Internet of Threats and Context Aware Security: Part One","authors":"J. Chaudhry, Ahmed Ibrahim, A. Bashir","doi":"10.1109/ntpe.2017.9778104","DOIUrl":"https://doi.org/10.1109/ntpe.2017.9778104","url":null,"abstract":"","PeriodicalId":138853,"journal":{"name":"IEEE Technology Policy and Ethics","volume":"50 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114058994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}