{"title":"A Conversation on Waste and Local Action","authors":"Ketra Schmitt;Faisal Shennib;Anna Timm-Bottos;Arrien Weeks","doi":"10.1109/MTS.2025.3565029","DOIUrl":"https://doi.org/10.1109/MTS.2025.3565029","url":null,"abstract":"Presents a panel discussion on the topic of (A Conversation on Waste and Local Action).","PeriodicalId":55016,"journal":{"name":"IEEE Technology and Society Magazine","volume":"44 2","pages":"12-21"},"PeriodicalIF":2.1,"publicationDate":"2025-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11018502","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144186016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Day Trip Through Technology Choices","authors":"Ketra Schmitt","doi":"10.1109/MTS.2025.3560347","DOIUrl":"https://doi.org/10.1109/MTS.2025.3560347","url":null,"abstract":"","PeriodicalId":55016,"journal":{"name":"IEEE Technology and Society Magazine","volume":"44 2","pages":"6-11"},"PeriodicalIF":2.1,"publicationDate":"2025-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11018501","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144185993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart AI, Private Lives: Can We Have Both?","authors":"Murty Polavarapu","doi":"10.1109/MTS.2025.3563037","DOIUrl":"https://doi.org/10.1109/MTS.2025.3563037","url":null,"abstract":"","PeriodicalId":55016,"journal":{"name":"IEEE Technology and Society Magazine","volume":"44 2","pages":"4-5"},"PeriodicalIF":2.1,"publicationDate":"2025-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11018442","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144186012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IEEE Foundation","authors":"","doi":"10.1109/MTS.2025.3566129","DOIUrl":"https://doi.org/10.1109/MTS.2025.3566129","url":null,"abstract":"","PeriodicalId":55016,"journal":{"name":"IEEE Technology and Society Magazine","volume":"44 2","pages":"23-23"},"PeriodicalIF":2.1,"publicationDate":"2025-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11018453","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144185945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real Is Beautiful: Selfies, Social Media, and Self-Determination","authors":"Katina Michael;M. G. Michael","doi":"10.1109/MTS.2025.3549210","DOIUrl":"https://doi.org/10.1109/MTS.2025.3549210","url":null,"abstract":"","PeriodicalId":55016,"journal":{"name":"IEEE Technology and Society Magazine","volume":"44 2","pages":"31-37"},"PeriodicalIF":2.1,"publicationDate":"2025-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11018446","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144185826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IEEE SSIT","authors":"","doi":"10.1109/MTS.2025.3562472","DOIUrl":"https://doi.org/10.1109/MTS.2025.3562472","url":null,"abstract":"","PeriodicalId":55016,"journal":{"name":"IEEE Technology and Society Magazine","volume":"44 2","pages":"C4-C4"},"PeriodicalIF":2.1,"publicationDate":"2025-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11018444","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144179167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohamed Koroma;Jinfu Chen;Ibrahim Abdulai Sawaneh;Rexford Nii Ayitey Sosu
{"title":"Self-Efficacy, Innovativeness, and Their Influence on Cybersecurity Compliance Intentions Among Public-Sector Employees in Sierra Leone","authors":"Mohamed Koroma;Jinfu Chen;Ibrahim Abdulai Sawaneh;Rexford Nii Ayitey Sosu","doi":"10.1109/MTS.2025.3550791","DOIUrl":"https://doi.org/10.1109/MTS.2025.3550791","url":null,"abstract":"This study investigates cybersecurity compliance in Sierra Leone’s public sector, exploring factors such as self-efficacy, innovativeness, perceived security (PS), trust, and cybersecurity awareness (CSA). The research uses structural equation modeling (SEM) to analyze survey data from 492 public-sector employees from five ministries and one agency. Reliable measurement models confirm these constructs’ validity. Analysis shows that self-efficacy and innovativeness positively impact cybersecurity compliance, with perceived trust (PT) mediating these relationships. However, the PS’s mediating role is less significant. CSA notably moderates these relationships, enhancing compliance intention. The study offers significant insights for enhancing cybersecurity strategies, particularly in developing countries, and underscores the importance of individual factors in cybersecurity compliance.","PeriodicalId":55016,"journal":{"name":"IEEE Technology and Society Magazine","volume":"44 2","pages":"59-71"},"PeriodicalIF":2.1,"publicationDate":"2025-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144186009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy-Preserving Federated Learning for Phishing Detection","authors":"Amr I. Elkhawas;Thomas M. Chen;Ilir Gashi","doi":"10.1109/MTS.2025.3558971","DOIUrl":"https://doi.org/10.1109/MTS.2025.3558971","url":null,"abstract":"Machine learning is one of the most prominent technologies used to combat phishing detection; however, the vast amount of data required for training models for detection raises a privacy concern for end users. Gathering email or document data may very well contain private information, and the machine learning models learn from the words and other attributes of these text-based documents. Gathering this information in a centralized location and using it to train models could pose a security risk on all levels of data acquisition, from the transfer of the data to the storage. Federated learning is emerging as a promising alternative to traditionally centralized machine learning for phishing detection. The advantages of federated learning, mainly in privacy and scalability, are weighed against the issue of detection accuracy. Federated learning provides the ability to train models without the transfer of sensitive data, more or less no raw data from the device, and allows the training to be done locally; this eliminates the privacy exposure accompanied by traditional machine learning models that operate in a centralized manner. However, this alone is not enough to comply with privacy regulations, such as General Data Protection Regulation (GDPR) and the European Union (EU) Artificial Intelligence Act (AI Act), and privacy-preserving technology must be used in conjunction to ensure federated learning’s compliance with privacy regulations. This article is a dedication to Professor Thomas Chen’s aspirations in the field of cybersecurity. This article is dedicated to his memory.","PeriodicalId":55016,"journal":{"name":"IEEE Technology and Society Magazine","volume":"44 2","pages":"77-84"},"PeriodicalIF":2.1,"publicationDate":"2025-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144178860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Role of Protocol Papers, Scoping Reviews, and Systematic Reviews in Responsible AI Research","authors":"Calvin Hillis;Ebrahim Bagheri;Zack Marshall","doi":"10.1109/MTS.2025.3558666","DOIUrl":"https://doi.org/10.1109/MTS.2025.3558666","url":null,"abstract":"Research protocol papers, scoping reviews, and systematic reviews are important tools for ensuring transparency, methodological rigor, accountability, and reproducibility in scholarly research. While widely adopted in disciplines such as medicine and social sciences, these practices remain underutilized in computer science and engineering, particularly within responsible AI research. This article explores the critical role that scoping and systematic reviews play in synthesizing knowledge, identifying gaps, and guiding future research in responsible AI. It also examines how research protocol papers—especially those developed for structured reviews—can improve the credibility, clarity, and replicability of responsible AI studies. By outlining the benefits and challenges of these methods, we argue for their greater adoption in AI ethics and responsible AI research. We conclude with recommendations to support the institutional, editorial, and cultural shifts necessary to integrate these rigorous methodological tools into responsible AI scholarship.","PeriodicalId":55016,"journal":{"name":"IEEE Technology and Society Magazine","volume":"44 2","pages":"72-76"},"PeriodicalIF":2.1,"publicationDate":"2025-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144185977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"We Want to Hear From You!","authors":"","doi":"10.1109/MTS.2025.3544951","DOIUrl":"https://doi.org/10.1109/MTS.2025.3544951","url":null,"abstract":"","PeriodicalId":55016,"journal":{"name":"IEEE Technology and Society Magazine","volume":"44 1","pages":"100-100"},"PeriodicalIF":2.1,"publicationDate":"2025-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10910250","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143553110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}