IEEE 2002 International Symposium on Technology and Society (ISTAS'02). Social Implications of Information and Communication Technology. Proceedings (Cat. No.02CH37293)最新文献
{"title":"Emergence of a triple helix of academia-industry-government relations in ICT R&D in developing countries: private, professional and public dimensions of China's 3/sup rd/ generation mobile communications system task force","authors":"Lin Miao, Su Jun, Chen Junrui","doi":"10.1109/ISTAS.2002.1013837","DOIUrl":"https://doi.org/10.1109/ISTAS.2002.1013837","url":null,"abstract":"A closer interaction among government, industry and academia, forming a triple helix, is playing an increasingly important role in S&T capacity. It is proving to be more successful than the previous bilateral relationships between academia and government, industry and government, and academia and industry. This sort of triple helix has evolved in an historical process, in which exchanges among the actors are based on a high degree of functional differentiation and are mainly of a collaborative nature. This paper focuses on the mapping of inter-relationships in the ICT research and development (R&D) in the Peoples Republic of China. In the empirical part of this paper, it reconsiders both of the formation and membership structure of China's 3rd Generation Mobile Communications System Task Force (C3G). The findings facilitate our understanding of how the most important institutions and interest groups emerge and become integrated into the strategic technology alliance.","PeriodicalId":377470,"journal":{"name":"IEEE 2002 International Symposium on Technology and Society (ISTAS'02). Social Implications of Information and Communication Technology. Proceedings (Cat. No.02CH37293)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133429956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information and communications technology for poverty reduction. lessons from rural India","authors":"S. Ceechini","doi":"10.1109/ISTAS.2002.1013801","DOIUrl":"https://doi.org/10.1109/ISTAS.2002.1013801","url":null,"abstract":"Information and communications technology (ICT) can reduce poverty by improving poor people's access to education, health, government and financial services. ICT can also help small farmers and artisans by connecting them to markets. It is clear that in rural India, as well as in much of the developing world, realization of this potential is not guaranteed. Low-cost access to information infrastructure is a necessary prerequisite for the successful use of ICT by the poor, but it is not sufficient. The implementation of ICT projects needs to be performed by organizations and individuals who have the appropriate incentives to work with marginalized groups. As this paper attests, these intermediaries are best suited to promote local ownership and poor people's participation, as well as the availability of content that responds to the most pressing information needs of the community.","PeriodicalId":377470,"journal":{"name":"IEEE 2002 International Symposium on Technology and Society (ISTAS'02). Social Implications of Information and Communication Technology. Proceedings (Cat. No.02CH37293)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115995247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Community knowledge sharing: an Internet application to support communications across literacy levels","authors":"H. Shakeel, M. Best","doi":"10.1109/ISTAS.2002.1013793","DOIUrl":"https://doi.org/10.1109/ISTAS.2002.1013793","url":null,"abstract":"This paper presents Community Knowledge Sharing (CKS), an asynchronous discussion system designed for use in the developing world. CKS supports community development by allowing communities to interact, share and learn from each other. Recognizing that large segments of the population in rural communities have low levels of literacy, CKS implements a multi-literate design in which the system can be customized based on the abilities and preferences of the user. An evaluation of CKS, conducted in a rural agricultural community in the Dominican Republic, found that low literate users prefer fully iconic interfaces. Future systems designed for use by people with a range of literacy skills must ensure that iconic interfaces provide users with the audio and visual cues they need to work effectively.","PeriodicalId":377470,"journal":{"name":"IEEE 2002 International Symposium on Technology and Society (ISTAS'02). Social Implications of Information and Communication Technology. Proceedings (Cat. No.02CH37293)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132435216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards a critical approach to examining the digital divide","authors":"W. McIver, Arthur P. Prokosch","doi":"10.1109/ISTAS.2002.1013832","DOIUrl":"https://doi.org/10.1109/ISTAS.2002.1013832","url":null,"abstract":"This paper reports on the results of a pilot study conducted of digital divide issues within two communities in Providence, Rhode Island in the summer of 2001. This study took place at the Wiggin Village and the International Institute of Rhode Island. Wiggin Village is a housing community in South Providence that consists of 285 households whose rents are subsidized by the US Housing and Urban Development's Section 8 program. The International Institute of Rhode Island (IIRI) provides services, education and job training for immigrants and refugees. The results of this study revealed unique relationships between the subjects and the digital divide that are not captured by access-oriented models. Results indicate that language and social networks are often more important in information seeking behavior than having access to a telephone, the Internet, or other types of communication such as newspapers. The study also revealed value judgements about electronic media that have not been clearly revealed in the context of previous digital divide studies.","PeriodicalId":377470,"journal":{"name":"IEEE 2002 International Symposium on Technology and Society (ISTAS'02). Social Implications of Information and Communication Technology. Proceedings (Cat. No.02CH37293)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131209777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Internet hack back: counter attacks as self-defense or vigilantism?","authors":"Vikas Jayaswal, W. Yurcik, D. Doss","doi":"10.1109/ISTAS.2002.1013841","DOIUrl":"https://doi.org/10.1109/ISTAS.2002.1013841","url":null,"abstract":"The poor state of security on the Internet calls for more effective ways to protect networked systems from attacks. One solution is to be able to counter attack with offensive capabilities. With attacker information available, companies find themselves in a dilemma-counter attack for immediate self-defense, retaliate for future deterrence, inform the appropriate law enforcement authorities, or do nothing. We examine justification for the hack back self-defense and deterrence arguments in the context Of current technology and legal framework. This paper extends discussion of issues surrounding using offensive capabilities for defensive purposes to the civilian/commercial Internet context beyond information warfare.","PeriodicalId":377470,"journal":{"name":"IEEE 2002 International Symposium on Technology and Society (ISTAS'02). Social Implications of Information and Communication Technology. Proceedings (Cat. No.02CH37293)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114325476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile telephony and learning: nuisance or potential enhancement?","authors":"A. Stone","doi":"10.1109/ISTAS.2002.1013824","DOIUrl":"https://doi.org/10.1109/ISTAS.2002.1013824","url":null,"abstract":"The growth of mobile telephony has been phenomenal in the UK and other countries. However, as next-generation technologies approach, there is already an acknowledged issue of nuisance attributed to mobile phones. This paper attempts to outline how current work in educational technology (including that of the author and LTRG) may contribute towards a move towards using mobile telephony in education as a potential enhancement, and minimising the nuisance effects and stigma in the process.","PeriodicalId":377470,"journal":{"name":"IEEE 2002 International Symposium on Technology and Society (ISTAS'02). Social Implications of Information and Communication Technology. Proceedings (Cat. No.02CH37293)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115555186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving Web-based civic information access: a case study of the 50 US states","authors":"Irina Ceaparu, B. Shneiderman","doi":"10.1109/ISTAS.2002.1013826","DOIUrl":"https://doi.org/10.1109/ISTAS.2002.1013826","url":null,"abstract":"An analysis of the home pages of all fifty US states reveals great variety in key design features that influence efficacy. Some states had excessively large byte counts that would slow users connected by commonly-used 56 K modems. Many web sites had low numbers of or poorly organized links that would make it hard for citizens to find what they were interested in. Features such as search boxes, privacy policies, online help, or contact information need to be added by several states. Our analysis concludes with ten recommendations and finds many further opportunities for individual states to improve their Websites. However still greater benefits will come through collaboration among the states that would lead to consistency, appropriate tagging, and common tools.","PeriodicalId":377470,"journal":{"name":"IEEE 2002 International Symposium on Technology and Society (ISTAS'02). Social Implications of Information and Communication Technology. Proceedings (Cat. No.02CH37293)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130650416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Digital inclusion, social exclusion and retailing: an analysis of data from the 1999 Scottish Household Survey","authors":"D. Fitch","doi":"10.1109/ISTAS.2002.1013831","DOIUrl":"https://doi.org/10.1109/ISTAS.2002.1013831","url":null,"abstract":"Data from the 1999 Scottish Household Survey is analysed to identify segments of the population who are 'socially excluded', and the rates of home ownership of PCs and of home Internet access of these groups are analysed The data show that the excluded invariably fall on the wrong side of the digital divide, and are thus unable to take advantage of recent developments in ICTs. The excluded who are faced with limited retail choice lack home access to ecommerce.","PeriodicalId":377470,"journal":{"name":"IEEE 2002 International Symposium on Technology and Society (ISTAS'02). Social Implications of Information and Communication Technology. Proceedings (Cat. No.02CH37293)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121621709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Internet honeypots: protection or entrapment?","authors":"Brian Scottberg, W. Yurcik, D. Doss","doi":"10.1109/ISTAS.2002.1013842","DOIUrl":"https://doi.org/10.1109/ISTAS.2002.1013842","url":null,"abstract":"A honeypot is a decoy computer system designed to look like a legitimate system an intruder will want to break into while, unbeknownst to the intruder, they are being covertly observed. Honeypots are effective precisely because attackers do not know if they are there and where they will be. However, honeypots are also a controversial technique; they essentially bait and capture intruders skirting the fine line between keeping attackers out of a network versus inviting them in. Little legal precedent has been established. Some see them as unfair entrapment tools while others see them as an effective data gathering and deterrence mechanism. This paper attempts to flush out the issues on both sides of a technique that may become ubiquitous in the future.","PeriodicalId":377470,"journal":{"name":"IEEE 2002 International Symposium on Technology and Society (ISTAS'02). Social Implications of Information and Communication Technology. Proceedings (Cat. No.02CH37293)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121769388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Video surveillance for the rest of us: proliferation, privacy, and ethics education","authors":"Peter Danielson","doi":"10.1109/ISTAS.2002.1013812","DOIUrl":"https://doi.org/10.1109/ISTAS.2002.1013812","url":null,"abstract":"The ethics of video surveillance has focused on policy and professional issues. But more individuals will use and encounter remote video surveillance technology as these devices become cheaper and easier to use. We propose an educational approach to the ethics of the emerging practice of non-professional remote video surveillance. Extending the approach to ethics and technology used in our Robot Ethics Lab, we first sketch an abstract model to explain some of the value issues surveillance technology generates. Second, using widely available robotic toys and networking software, we show how working within a technologically and ethically rich environment can move us from a crude remote surveillance prototype towards a more acceptable social contract covering this technology.","PeriodicalId":377470,"journal":{"name":"IEEE 2002 International Symposium on Technology and Society (ISTAS'02). Social Implications of Information and Communication Technology. Proceedings (Cat. No.02CH37293)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121958098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}