ISTAS C

17 papers

YearTitle / Authors
2005Ain't misbehavin': the relationship between writing and social interaction in computer-mediated group (CMG) process.
Rae Carrington Schipke
2005Archival perspective on the social history of computing.
Shinji R. Yamane, Akira Baba
2005Cyberwarfare seen through a mariner's spyglass.
John Laprise
2005Freedom of silence vs. freedom of speech: technology, law and information security.
Bogdan Hoanca
2005Impediments to and incentives for automation in the Air Force.
Jeffrey M. Sullivan
2005People-appropriate policy models require new mathematical tools (I am not a number).
Christopher Landauer
2005Privacy: personal information, threats, and technologies.
Richard Beckwith, Scott D. Mainwaring
2005Reducing energy vulnerability.
Clinton J. Andrews
2005Revolution or evolution? The rise of the UAVs.
Jeffrey M. Sullivan
2005Service robotics in area surveillance: criteria of usefulness.
Raphael Cariou
2005Social acceptance of RFID as a biometric security method.
Christine Perakslis, Robert M. Wolk
2005Technical risk information: decision tool or rhetorical ammunition? Undisputed facts in the Yucca mountain debate.
David M. Hassenzahl, Denise Tillery, Paulette Laidler
2005The business of warfighting: ethical implications of the industry-government relationship in the development of defense technologies.
M. Monahan
2005The concern for genetic diversity: raising awareness for the loss of global biological diversity.
Timothy J. Farnham
2005The national champion in ICT standard competition: evidence from an emerging country.
Jiang Yu
2005The war of the worlds.
Gene Moriarty
2005Weapons and Wires - Prevention and Safety in a Time of Fear: Proceedings of the 2005 International Symposium on Technology and Society, ISTAS 2005, Los Angeles, CA, USA, June 8-10, 2005