{"title":"\"Healthcare & public health: Perspectives on wearable computing, augmented reality and the veillances\"","authors":"Luis Kun","doi":"10.1109/ISTAS.2013.6613103","DOIUrl":"https://doi.org/10.1109/ISTAS.2013.6613103","url":null,"abstract":"In the past decade during IEEE sponsored professional meetings2, 3the theme of “Global Health Transformation through true Interoperability” was brought to the forefront in the inaugural keynotes. Some technologies that started with the monitoring of hemodynamic variables of astronauts by NASA in the 60s were further developed by the Department of Defense for the purposes of treating their injured in the battlefield via Telemedicine. By August 5th, 1997 President Clinton signed the first piece of legislation that was allowing the concepts of homecare to be tried to measure cost and medical effectiveness. With the development of Internet, the World Wide Web (WWW), social media, intelligent agents, mobile technology, sensors, and pieces of clothing containing them a new generation of devices have been created offering new possibilities for improvements particularly in areas such assist of living (for those suffering from chronic conditions), and homecare in general. The use of wearable computing in general and the use of augmented reality in the developed world in particular offer some unique opportunities to improve outcomes. In the 21st Century and as the Health Care and Public Health infrastructure intersect deeper into the many Information Technology (IT) subfields, abundant and formidable changes can occur that will allow society to shift current systems into some where wellness and disease prevention will be the focus. Many changes can affect positively medical and cost effective outcomes as well as the elimination of medical errors and patient safety for example. In these arenas, with the convergence of science, technology and with Information Technology acting as a catalyst for change, health care systems around the world are slowly shifting from “hospital based” ones into distributed systems that include: hospitals, clinics, homecare systems with treatment and management of chronic diseases for the elderly via Internet, etc. In order to achieve such visions, multiple efforts have been tried for creating electronic health record as well as the information highway for their use. In the US the health system is very scattered and most hospital systems do not contain for example mental health, dental health and or vaccine registry information. On one hand through major medical research the emergence of clinical and health data repositories or “Intelligent Data Warehouses” that not only include traditional clinical data, but also advanced imaging, molecular medicine, tissue micro-array analysis and other bioinformatics information is available. These increasingly multi-modality data warehouses are constantly updated, continuously expanded and populated with millions of records. Although these repositories of electronic information can be leveraged not only to improve point of care clinical decision-making for individual patients, they can also support population health chronic and infectious disease analytics (i.e., epidemiology and surveillance)","PeriodicalId":207586,"journal":{"name":"International Symposium on Technology and Society","volume":"29 1S2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124598970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Scholarly/professional scientific and engineering societies and globalization","authors":"K. Foster, J. Herkert","doi":"10.1109/ISTAS.2004.1314343","DOIUrl":"https://doi.org/10.1109/ISTAS.2004.1314343","url":null,"abstract":"","PeriodicalId":207586,"journal":{"name":"International Symposium on Technology and Society","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123981036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"\"Star Wars\" revisited-a continuing case study in ethics and safety-critical software","authors":"K. Bowyer","doi":"10.1109/ISTAS.2001.937721","DOIUrl":"https://doi.org/10.1109/ISTAS.2001.937721","url":null,"abstract":"Safety-critical software is a core topic in courses on \"ethics and computing\" or \"computers and society,\" as well as in software engineering courses. The Reagan-era Strategic Defense initiative (SDI) was the focus of a great deal of technical argument relating to design and testing of safety-critical software. Most of today's students have no familiarity with the substance of the SDI arguments. However, with presidents Clinton and Bush considering various versions of a national missile defense system, the topic has again become quite relevant and motivated by current events. This paper describes a curriculum module developed around a Reagan-era SDI debate on the theme-\"Star wars: can the computing requirements be met?\" This module should be appropriate for use in ethics-related or software-engineering-related courses taught in undergraduate Information Systems, Information Technology, Computer Science, or Computer Engineering programs.","PeriodicalId":207586,"journal":{"name":"International Symposium on Technology and Society","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115866476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Place of Wicked Problems in Engineering Problem Solving: A Proposed Taxonomy","authors":"B. Leech","doi":"10.1109/ISTAS50296.2020.9462174","DOIUrl":"https://doi.org/10.1109/ISTAS50296.2020.9462174","url":null,"abstract":"The engineering method is one of the key features of defining and identifying engineers. Engineering education overwhelmingly relies on well-structured problems to teach students the deductive process of breaking down problems into their components in order to find solutions. However, many of the problems facing society are not well-structured. This paper presents a taxonomy of different types of problems that engineers face based on both the structure of the problem (i.e., whether it is well-structured or ill-structured) and whether there is a previously identified solution space. The taxonomy includes four types of problem: Routine problems that are well-structured with established solutions; originative problems that are also well-structured, but have no established solution; Process-oriented problems that are ill-structured, but there are established solutions and methods for finding solutions; and Wicked problems that are ill-structured and have no pre-defined solutions. A study of the types of problems incorporated in engineering curricula in eight engineering programs is presented. The results show that there is an overwhelming reliance on well-structured problems, with an average of 95.4% of engineering courses using well-structured problems. Process-oriented problems are represented in an average of 5.6% of courses. originative problems are given in an average of 9.0% of courses. Wicked problems are not represented in any of the engineering courses.","PeriodicalId":207586,"journal":{"name":"International Symposium on Technology and Society","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122043817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Knowledge management and its application model in enterprise information systems","authors":"Lei Zhang, S. Ren, Xiao-Yao Jiang, Zuzhao Liu","doi":"10.1109/ISTAS.2000.915653","DOIUrl":"https://doi.org/10.1109/ISTAS.2000.915653","url":null,"abstract":"Knowledge management has come to be one of the hottest research domains over the last few years, which at the same time has brought lots of application interest from enterprises. The paper gives a brief introduction to knowledge management, which includes the definition, goal, procedure and structure of knowledge management, and also its comparison with information management. Then, a new enterprise information system model that is based on KM is put forward, together with its function model and key technologies. Also the restriction to realize knowledge management today is mentioned. The paper could be regarded as an overview of KM and also as a new application research project that puts the concepts into real enterprise implementations.","PeriodicalId":207586,"journal":{"name":"International Symposium on Technology and Society","volume":"13 35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116090745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Systematic Research and Simulation of the Internet Security Governance","authors":"Q. Yan, Huaying Shu","doi":"10.1109/ISTAS.2007.4362230","DOIUrl":"https://doi.org/10.1109/ISTAS.2007.4362230","url":null,"abstract":"The Internet security governance is a complex engineering covering multiple disciplines such as technology, economics, law and sociology. Although security issues have been studied in these fields respectively, there is still lack of a mechanism to integrate those achievements together. To conquer this problem, a systematic model for the Internet security governance is introduced in this paper based on the complexity theory and spreading dynamics. The model points out that the Internet security governance is an iterative and continuously improving process including four different stages. The simulation of the model is also discussed through analyzing the governance issue of harmful information on WWW.","PeriodicalId":207586,"journal":{"name":"International Symposium on Technology and Society","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114142966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}