IEEE 2002 International Symposium on Technology and Society (ISTAS'02). Social Implications of Information and Communication Technology. Proceedings (Cat. No.02CH37293)最新文献

筛选
英文 中文
Ethical hacking: the security justification redux 道德黑客:安全正当性还原
Bryan Smith, W. Yurcik, D. Doss
{"title":"Ethical hacking: the security justification redux","authors":"Bryan Smith, W. Yurcik, D. Doss","doi":"10.1109/ISTAS.2002.1013840","DOIUrl":"https://doi.org/10.1109/ISTAS.2002.1013840","url":null,"abstract":"The state of security on the Internet is bad and becoming worse. One reaction to this state of affairs is a behavior termed \"Ethical Hacking\" which attempts to proactively increase security protection by identifying and patching known security vulnerabilities on systems owned by other parties. Ethical hackers may beta test unreleased software, stress test released software, and scan networks of computers for vulnerabilities. Previous work has emphasized ethical hacking as an altruistic behavior but we find ethical hackers act rationally, in self-interest, to secure systems that are within their own community (sometimes for pay)-networked systems are only as secure as the weakest system within perimeter defenses.","PeriodicalId":377470,"journal":{"name":"IEEE 2002 International Symposium on Technology and Society (ISTAS'02). Social Implications of Information and Communication Technology. Proceedings (Cat. No.02CH37293)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114084119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Gender, culture and science: exploring underrepresentation 性别、文化和科学:探索代表性不足
Pauline Cushman, A. Teate, Elizabeth L. Adams
{"title":"Gender, culture and science: exploring underrepresentation","authors":"Pauline Cushman, A. Teate, Elizabeth L. Adams","doi":"10.1109/ISTAS.2002.1013799","DOIUrl":"https://doi.org/10.1109/ISTAS.2002.1013799","url":null,"abstract":"This paper discusses the concerns of some faculty and administrators at James Madison University over the lack of female and minority students as science and technology majors It describes efforts of those faculty and administrators to raise student awareness of the opportunities available to them in these majors. These efforts include the design of several new courses; the development of teaching materials and innovative course assignments.","PeriodicalId":377470,"journal":{"name":"IEEE 2002 International Symposium on Technology and Society (ISTAS'02). Social Implications of Information and Communication Technology. Proceedings (Cat. No.02CH37293)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114094251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Adapting the Internet to citizen deliberations: lessons learned 使互联网适应公民审议:经验教训
P. W. Hamlett
{"title":"Adapting the Internet to citizen deliberations: lessons learned","authors":"P. W. Hamlett","doi":"10.1109/ISTAS.2002.1013818","DOIUrl":"https://doi.org/10.1109/ISTAS.2002.1013818","url":null,"abstract":"This paper reviews a research project involving two versions of the Danish consensus conference conducted at North Carolina State University in 2001. One version was conducted in the usual, face-to-face mode, while the other version was conducted entirely on the Internet-the first consensus conference conducted via the Internet. The paper discusses the importance of public deliberations in making public policy about science and technology, the organization and implementation of the Citizens Technology Forum, and some lessons learned from the experience.","PeriodicalId":377470,"journal":{"name":"IEEE 2002 International Symposium on Technology and Society (ISTAS'02). Social Implications of Information and Communication Technology. Proceedings (Cat. No.02CH37293)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127899904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Including the technical personnel: an alternative IP model in the development of distributed learning courses 包括技术人员:分布式学习课程开发中的另一种IP模式
Sarah Stein
{"title":"Including the technical personnel: an alternative IP model in the development of distributed learning courses","authors":"Sarah Stein","doi":"10.1109/ISTAS.2002.1013795","DOIUrl":"https://doi.org/10.1109/ISTAS.2002.1013795","url":null,"abstract":"Intellectual property and copyright policy debates in the production of online courses in higher education have focused almost exclusively on rights of faculty and administration. Yet, those online courses most likely to foster debate generally require a production team of a faculty member and technical specialists to produce. This paper suggests an alternative model for compensation that would recognize the contributions of all participants.","PeriodicalId":377470,"journal":{"name":"IEEE 2002 International Symposium on Technology and Society (ISTAS'02). Social Implications of Information and Communication Technology. Proceedings (Cat. No.02CH37293)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133735391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Teaching Ethics and the Internet 2.0: pervasive computing, consumer electronics and progressive embodiment 教学伦理与互联网2.0:普适计算、消费电子及其进步体现
Wendy Robinson
{"title":"Teaching Ethics and the Internet 2.0: pervasive computing, consumer electronics and progressive embodiment","authors":"Wendy Robinson","doi":"10.1109/ISTAS.2002.1013814","DOIUrl":"https://doi.org/10.1109/ISTAS.2002.1013814","url":null,"abstract":"An instructional technology grant to use hand-held devices to augment Ethics and the Internet, which the author has taught for seven years in the Department of Religion at Duke University, enabled the course to address the broader societal implications of digital technology. Using hand-held devices to experience the course on the go, in and beyond the classroom, students were encouraged to consider the pervasive computing and \"progressive embodiment\" metaphors. Students were prompted to think outside the deskbound Web box and to bring to bear synchronous and asynchronous consumer electronics popularly used and enjoyed today, such as MP3 players, cellular telephones and mobile messaging devices. Thereby the discussion of the ethical issues that arise from the increasing presence of the Internet in everyday life was extended to portable devices and concerns relevant in 2001-02 and beyond.","PeriodicalId":377470,"journal":{"name":"IEEE 2002 International Symposium on Technology and Society (ISTAS'02). Social Implications of Information and Communication Technology. Proceedings (Cat. No.02CH37293)","volume":"219 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114580951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Anti-circumvention misuse, or, how I learned to stop worrying and love the DMCA 反规避滥用,或者,我是如何学会停止担心并爱上DMCA的
D. Burk
{"title":"Anti-circumvention misuse, or, how I learned to stop worrying and love the DMCA","authors":"D. Burk","doi":"10.1109/ISTAS.2002.1013822","DOIUrl":"https://doi.org/10.1109/ISTAS.2002.1013822","url":null,"abstract":"The anti-circumvention provisions of the Digital Millennium Copyright Act grants owners of technologically protected content a new right of access entirely separate from the protection of content under copyright law. This new right of access, which some commentators have dubbed \"paracopyright,\" has already been employed in litigation arguably calculated to suppress competition in uncopyrighted items related to the sale of copyrighted works. Such use of the anti-circumvention statute reaches well beyond the Congressional purpose of preventing unauthorized copying. In the past, such leveraging of patent rights or of copyright has been curbed by the equitable doctrine of misuse. An extension of the misuse doctrine to \"paracopyright\" may be the proper remedy to curtail overreaching uses of the anti-circumvention right.","PeriodicalId":377470,"journal":{"name":"IEEE 2002 International Symposium on Technology and Society (ISTAS'02). Social Implications of Information and Communication Technology. Proceedings (Cat. No.02CH37293)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114826601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
EHAS program: rural telemedicine systems for primary healthcare in developing countries EHAS计划:发展中国家用于初级卫生保健的农村远程医疗系统
Andrés Martínez, Valentín Villarroel, J. Seoane, F. Pozo
{"title":"EHAS program: rural telemedicine systems for primary healthcare in developing countries","authors":"Andrés Martínez, Valentín Villarroel, J. Seoane, F. Pozo","doi":"10.1109/ISTAS.2002.1013792","DOIUrl":"https://doi.org/10.1109/ISTAS.2002.1013792","url":null,"abstract":"The Biomedical Engineering and Telemedicine Group of the Technical University of Madrid (UPM in Spanish) and the non governmental organization Engineering Without Frontiers (ISF in Spanish) are leading the \"Hispano-American Health Link\" program (EHAS in Spanish), to develops low-cost telecommunication systems and information services specially designed for rural primary health care personnel of isolated areas in developing countries. The EHAS program has five lines of work: 1) Research on the communication and information needs of rural health personnel in developing countries, 2) R&D on voice and data communication systems designed according with conditions of rural areas, 3) R&D on information services systems suited to the needs of health personnel, 4) Deployment of those services and systems through pilot projects, and 5) Evaluate the impact of these telemedicine systems on health services. This paper presents the results of each line of work, specially those results verified from fieldwork, and the future plans of the EHAS program.","PeriodicalId":377470,"journal":{"name":"IEEE 2002 International Symposium on Technology and Society (ISTAS'02). Social Implications of Information and Communication Technology. Proceedings (Cat. No.02CH37293)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123070076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Choosing passwords: security and human factors 选择密码:安全和人为因素
E. Gehringer
{"title":"Choosing passwords: security and human factors","authors":"E. Gehringer","doi":"10.1109/ISTAS.2002.1013839","DOIUrl":"https://doi.org/10.1109/ISTAS.2002.1013839","url":null,"abstract":"Password security is essential to the security of information systems. Human fallibility makes it nearly impossible to follow all of the recommended rules simultaneously. A user with many different passwords, frequently changing, will be forced to write them down somewhere. Some systems constrain them to have a certain minimum length, or to require them to contain a combination of letters and numbers. Some systems also impose maximum lengths, and some prohibit special characters. The lack of common standards for passwords makes it difficult for a user to remember which password is used for which system. To make matters worse, systems frequently revoke a user's access after a password has been incorrectly entered as few as three times. What is needed, then, is an analysis of passwords that takes both human factors and security into account. We must recognize that what really matters is the security of the total system-offline as well as online. This paper explores the tradeoffs that need to be made to achieve maximum security in everyday use by forgetful users.","PeriodicalId":377470,"journal":{"name":"IEEE 2002 International Symposium on Technology and Society (ISTAS'02). Social Implications of Information and Communication Technology. Proceedings (Cat. No.02CH37293)","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116628658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 115
"Secondary effects", digital technology, and free speech: the Internet and the First Amendment “二次效应”、数字技术与言论自由:互联网与宪法第一修正案
T. Flynn
{"title":"\"Secondary effects\", digital technology, and free speech: the Internet and the First Amendment","authors":"T. Flynn","doi":"10.1109/ISTAS.2002.1013820","DOIUrl":"https://doi.org/10.1109/ISTAS.2002.1013820","url":null,"abstract":"Digital technology is challenging established legal doctrine concerning sexually-oriented expression, an area of relative stability for the past thirty years. This paper examines The Child Online Protection Act and the viability of \"community standards\" to assess obscenity, and The Child Pornography Prevention Act and the emergence of the \"secondary-effects\" doctrine as rational for censoring sexual expression. It identifies the fundamental implications these two cases pose for the First Amendment.","PeriodicalId":377470,"journal":{"name":"IEEE 2002 International Symposium on Technology and Society (ISTAS'02). Social Implications of Information and Communication Technology. Proceedings (Cat. No.02CH37293)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122567878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Educators and pornography: the "unacceptable use" of school computers 教育者和色情:学校电脑的“不可接受的使用”
Myra G. Day, E. Gehringer
{"title":"Educators and pornography: the \"unacceptable use\" of school computers","authors":"Myra G. Day, E. Gehringer","doi":"10.1109/ISTAS.2002.1013835","DOIUrl":"https://doi.org/10.1109/ISTAS.2002.1013835","url":null,"abstract":"More companies are requiring their employees to sign acceptable-use policies for Internet computers. Some employees are unaware of the implications of the policies, and do not realize the extent to which their activities can be monitored by computer technicians. In academia, three important cases of \"unacceptable use\" are those of Dean Ronald F. Thiemann, Professor Eric Neil Angevine, and Superintendent Robert Herrold. All three lost, or resigned from, their positions after pornography was discovered on their employer-owned computers. Several issues regarding \"acceptable use\" are common to all the cases, including privacy rights, the right of the institution to control its equipment, and who might see what is stored on that equipment. This paper explores these questions, and suggests guidelines for employers and employees.","PeriodicalId":377470,"journal":{"name":"IEEE 2002 International Symposium on Technology and Society (ISTAS'02). Social Implications of Information and Communication Technology. Proceedings (Cat. No.02CH37293)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130824087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信