IEEE 2002 International Symposium on Technology and Society (ISTAS'02). Social Implications of Information and Communication Technology. Proceedings (Cat. No.02CH37293)最新文献
{"title":"Ethical hacking: the security justification redux","authors":"Bryan Smith, W. Yurcik, D. Doss","doi":"10.1109/ISTAS.2002.1013840","DOIUrl":"https://doi.org/10.1109/ISTAS.2002.1013840","url":null,"abstract":"The state of security on the Internet is bad and becoming worse. One reaction to this state of affairs is a behavior termed \"Ethical Hacking\" which attempts to proactively increase security protection by identifying and patching known security vulnerabilities on systems owned by other parties. Ethical hackers may beta test unreleased software, stress test released software, and scan networks of computers for vulnerabilities. Previous work has emphasized ethical hacking as an altruistic behavior but we find ethical hackers act rationally, in self-interest, to secure systems that are within their own community (sometimes for pay)-networked systems are only as secure as the weakest system within perimeter defenses.","PeriodicalId":377470,"journal":{"name":"IEEE 2002 International Symposium on Technology and Society (ISTAS'02). Social Implications of Information and Communication Technology. Proceedings (Cat. No.02CH37293)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114084119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Gender, culture and science: exploring underrepresentation","authors":"Pauline Cushman, A. Teate, Elizabeth L. Adams","doi":"10.1109/ISTAS.2002.1013799","DOIUrl":"https://doi.org/10.1109/ISTAS.2002.1013799","url":null,"abstract":"This paper discusses the concerns of some faculty and administrators at James Madison University over the lack of female and minority students as science and technology majors It describes efforts of those faculty and administrators to raise student awareness of the opportunities available to them in these majors. These efforts include the design of several new courses; the development of teaching materials and innovative course assignments.","PeriodicalId":377470,"journal":{"name":"IEEE 2002 International Symposium on Technology and Society (ISTAS'02). Social Implications of Information and Communication Technology. Proceedings (Cat. No.02CH37293)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114094251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adapting the Internet to citizen deliberations: lessons learned","authors":"P. W. Hamlett","doi":"10.1109/ISTAS.2002.1013818","DOIUrl":"https://doi.org/10.1109/ISTAS.2002.1013818","url":null,"abstract":"This paper reviews a research project involving two versions of the Danish consensus conference conducted at North Carolina State University in 2001. One version was conducted in the usual, face-to-face mode, while the other version was conducted entirely on the Internet-the first consensus conference conducted via the Internet. The paper discusses the importance of public deliberations in making public policy about science and technology, the organization and implementation of the Citizens Technology Forum, and some lessons learned from the experience.","PeriodicalId":377470,"journal":{"name":"IEEE 2002 International Symposium on Technology and Society (ISTAS'02). Social Implications of Information and Communication Technology. Proceedings (Cat. No.02CH37293)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127899904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Including the technical personnel: an alternative IP model in the development of distributed learning courses","authors":"Sarah Stein","doi":"10.1109/ISTAS.2002.1013795","DOIUrl":"https://doi.org/10.1109/ISTAS.2002.1013795","url":null,"abstract":"Intellectual property and copyright policy debates in the production of online courses in higher education have focused almost exclusively on rights of faculty and administration. Yet, those online courses most likely to foster debate generally require a production team of a faculty member and technical specialists to produce. This paper suggests an alternative model for compensation that would recognize the contributions of all participants.","PeriodicalId":377470,"journal":{"name":"IEEE 2002 International Symposium on Technology and Society (ISTAS'02). Social Implications of Information and Communication Technology. Proceedings (Cat. No.02CH37293)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133735391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Teaching Ethics and the Internet 2.0: pervasive computing, consumer electronics and progressive embodiment","authors":"Wendy Robinson","doi":"10.1109/ISTAS.2002.1013814","DOIUrl":"https://doi.org/10.1109/ISTAS.2002.1013814","url":null,"abstract":"An instructional technology grant to use hand-held devices to augment Ethics and the Internet, which the author has taught for seven years in the Department of Religion at Duke University, enabled the course to address the broader societal implications of digital technology. Using hand-held devices to experience the course on the go, in and beyond the classroom, students were encouraged to consider the pervasive computing and \"progressive embodiment\" metaphors. Students were prompted to think outside the deskbound Web box and to bring to bear synchronous and asynchronous consumer electronics popularly used and enjoyed today, such as MP3 players, cellular telephones and mobile messaging devices. Thereby the discussion of the ethical issues that arise from the increasing presence of the Internet in everyday life was extended to portable devices and concerns relevant in 2001-02 and beyond.","PeriodicalId":377470,"journal":{"name":"IEEE 2002 International Symposium on Technology and Society (ISTAS'02). Social Implications of Information and Communication Technology. Proceedings (Cat. No.02CH37293)","volume":"219 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114580951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Anti-circumvention misuse, or, how I learned to stop worrying and love the DMCA","authors":"D. Burk","doi":"10.1109/ISTAS.2002.1013822","DOIUrl":"https://doi.org/10.1109/ISTAS.2002.1013822","url":null,"abstract":"The anti-circumvention provisions of the Digital Millennium Copyright Act grants owners of technologically protected content a new right of access entirely separate from the protection of content under copyright law. This new right of access, which some commentators have dubbed \"paracopyright,\" has already been employed in litigation arguably calculated to suppress competition in uncopyrighted items related to the sale of copyrighted works. Such use of the anti-circumvention statute reaches well beyond the Congressional purpose of preventing unauthorized copying. In the past, such leveraging of patent rights or of copyright has been curbed by the equitable doctrine of misuse. An extension of the misuse doctrine to \"paracopyright\" may be the proper remedy to curtail overreaching uses of the anti-circumvention right.","PeriodicalId":377470,"journal":{"name":"IEEE 2002 International Symposium on Technology and Society (ISTAS'02). Social Implications of Information and Communication Technology. Proceedings (Cat. No.02CH37293)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114826601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Andrés Martínez, Valentín Villarroel, J. Seoane, F. Pozo
{"title":"EHAS program: rural telemedicine systems for primary healthcare in developing countries","authors":"Andrés Martínez, Valentín Villarroel, J. Seoane, F. Pozo","doi":"10.1109/ISTAS.2002.1013792","DOIUrl":"https://doi.org/10.1109/ISTAS.2002.1013792","url":null,"abstract":"The Biomedical Engineering and Telemedicine Group of the Technical University of Madrid (UPM in Spanish) and the non governmental organization Engineering Without Frontiers (ISF in Spanish) are leading the \"Hispano-American Health Link\" program (EHAS in Spanish), to develops low-cost telecommunication systems and information services specially designed for rural primary health care personnel of isolated areas in developing countries. The EHAS program has five lines of work: 1) Research on the communication and information needs of rural health personnel in developing countries, 2) R&D on voice and data communication systems designed according with conditions of rural areas, 3) R&D on information services systems suited to the needs of health personnel, 4) Deployment of those services and systems through pilot projects, and 5) Evaluate the impact of these telemedicine systems on health services. This paper presents the results of each line of work, specially those results verified from fieldwork, and the future plans of the EHAS program.","PeriodicalId":377470,"journal":{"name":"IEEE 2002 International Symposium on Technology and Society (ISTAS'02). Social Implications of Information and Communication Technology. Proceedings (Cat. No.02CH37293)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123070076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Choosing passwords: security and human factors","authors":"E. Gehringer","doi":"10.1109/ISTAS.2002.1013839","DOIUrl":"https://doi.org/10.1109/ISTAS.2002.1013839","url":null,"abstract":"Password security is essential to the security of information systems. Human fallibility makes it nearly impossible to follow all of the recommended rules simultaneously. A user with many different passwords, frequently changing, will be forced to write them down somewhere. Some systems constrain them to have a certain minimum length, or to require them to contain a combination of letters and numbers. Some systems also impose maximum lengths, and some prohibit special characters. The lack of common standards for passwords makes it difficult for a user to remember which password is used for which system. To make matters worse, systems frequently revoke a user's access after a password has been incorrectly entered as few as three times. What is needed, then, is an analysis of passwords that takes both human factors and security into account. We must recognize that what really matters is the security of the total system-offline as well as online. This paper explores the tradeoffs that need to be made to achieve maximum security in everyday use by forgetful users.","PeriodicalId":377470,"journal":{"name":"IEEE 2002 International Symposium on Technology and Society (ISTAS'02). Social Implications of Information and Communication Technology. Proceedings (Cat. No.02CH37293)","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116628658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"\"Secondary effects\", digital technology, and free speech: the Internet and the First Amendment","authors":"T. Flynn","doi":"10.1109/ISTAS.2002.1013820","DOIUrl":"https://doi.org/10.1109/ISTAS.2002.1013820","url":null,"abstract":"Digital technology is challenging established legal doctrine concerning sexually-oriented expression, an area of relative stability for the past thirty years. This paper examines The Child Online Protection Act and the viability of \"community standards\" to assess obscenity, and The Child Pornography Prevention Act and the emergence of the \"secondary-effects\" doctrine as rational for censoring sexual expression. It identifies the fundamental implications these two cases pose for the First Amendment.","PeriodicalId":377470,"journal":{"name":"IEEE 2002 International Symposium on Technology and Society (ISTAS'02). Social Implications of Information and Communication Technology. Proceedings (Cat. No.02CH37293)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122567878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Educators and pornography: the \"unacceptable use\" of school computers","authors":"Myra G. Day, E. Gehringer","doi":"10.1109/ISTAS.2002.1013835","DOIUrl":"https://doi.org/10.1109/ISTAS.2002.1013835","url":null,"abstract":"More companies are requiring their employees to sign acceptable-use policies for Internet computers. Some employees are unaware of the implications of the policies, and do not realize the extent to which their activities can be monitored by computer technicians. In academia, three important cases of \"unacceptable use\" are those of Dean Ronald F. Thiemann, Professor Eric Neil Angevine, and Superintendent Robert Herrold. All three lost, or resigned from, their positions after pornography was discovered on their employer-owned computers. Several issues regarding \"acceptable use\" are common to all the cases, including privacy rights, the right of the institution to control its equipment, and who might see what is stored on that equipment. This paper explores these questions, and suggests guidelines for employers and employees.","PeriodicalId":377470,"journal":{"name":"IEEE 2002 International Symposium on Technology and Society (ISTAS'02). Social Implications of Information and Communication Technology. Proceedings (Cat. No.02CH37293)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130824087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}