| 2005 | Ain't misbehavin': the relationship between writing and social interaction in computer-mediated group (CMG) process. Rae Carrington Schipke |
| 2005 | Archival perspective on the social history of computing. Shinji R. Yamane, Akira Baba |
| 2005 | Cyberwarfare seen through a mariner's spyglass. John Laprise |
| 2005 | Freedom of silence vs. freedom of speech: technology, law and information security. Bogdan Hoanca |
| 2005 | Impediments to and incentives for automation in the Air Force. Jeffrey M. Sullivan |
| 2005 | People-appropriate policy models require new mathematical tools (I am not a number). Christopher Landauer |
| 2005 | Privacy: personal information, threats, and technologies. Richard Beckwith, Scott D. Mainwaring |
| 2005 | Reducing energy vulnerability. Clinton J. Andrews |
| 2005 | Revolution or evolution? The rise of the UAVs. Jeffrey M. Sullivan |
| 2005 | Service robotics in area surveillance: criteria of usefulness. Raphael Cariou |
| 2005 | Social acceptance of RFID as a biometric security method. Christine Perakslis, Robert M. Wolk |
| 2005 | Technical risk information: decision tool or rhetorical ammunition? Undisputed facts in the Yucca mountain debate. David M. Hassenzahl, Denise Tillery, Paulette Laidler |
| 2005 | The business of warfighting: ethical implications of the industry-government relationship in the development of defense technologies. M. Monahan |
| 2005 | The concern for genetic diversity: raising awareness for the loss of global biological diversity. Timothy J. Farnham |
| 2005 | The national champion in ICT standard competition: evidence from an emerging country. Jiang Yu |
| 2005 | The war of the worlds. Gene Moriarty |
| 2005 | Weapons and Wires - Prevention and Safety in a Time of Fear: Proceedings of the 2005 International Symposium on Technology and Society, ISTAS 2005, Los Angeles, CA, USA, June 8-10, 2005 |