Abstract is missing.
- Addressing ethical and professional risks of ICT development using software development impact statementsDon Gotterbarn. [doi]
- Seeking community on the Internet: ethnocultural use of information communication technologyAmanda Aizlewood, Maureen Doody. 5-12 [doi]
- Revitalizing an online communityDiane Maloney-Krichmar, Chadia Abras, Jennifer Preece. 13-19 [doi]
- The meaning of an online health community in the lives of its members: roles, relationships and group dynamicsDiane Maloney-Krichmar, Jennifer Preece. 20-27 [doi]
- EHAS program: rural telemedicine systems for primary healthcare in developing countriesAndrés Martínez, Valentín Villarroel, Joaquín Seoane, Francisco del Pozo. 31-36 [doi]
- Community knowledge sharing: an Internet application to support communications across literacy levelsHani Umar Shakeel, Michael L. Best. 37-44 [doi]
- Electronic commerce and its socio-economic implications in Brazilian small and medium enterprisesMuna M. Odeh, Edson dos Santos Moreira, Thais F. Leite Madeira. 45-50 [doi]
- Including the technical personnel: an alternative IP model in the development of distributed learning coursesSarah Stein. 53-56 [doi]
- Is the patent system broken? (If it isn't broken, don't fix it)R. D. Hunter. 57-59 [doi]
- Nothing to claim-there is no such thing as intellectual propertyHendrik Speck. 60-67 [doi]
- Gender Equity and the use of Information Communication Technologies in the knowledge economy: taking a feminist poststructuralist approachSheila French. 71-76 [doi]
- Gender, culture and science: exploring underrepresentationPauline Cushman, Anthony Teate, Elizabeth Adams. 77-83 [doi]
- Providing Web search capability for low-connectivity communitiesLibby Levison, William Thies, Saman P. Amarasinghe. 87-91 [doi]
- Information and communications technology for poverty reduction. lessons from rural IndiaSimone Cecchini. 93-99 [doi]
- Effective application of ICT to improving the quality of life and reducing poverty in poor countries: recent experiences and new approachesEdward Farell, Marta Rumich. 100-107 [doi]
- Credibly constructing risk comparisonsClinton J. Andrews. 113-116 [doi]
- Preparing to teach ethics in a computer science curriculumAlfreda Dudley-Sponaugle, Doris K. Lidtke. 121-125 [doi]
- Blackboard: a Web-based resource in the teaching of a multi-disciplinary/multi-institutional computer ethics courseFrances S. Grodzinsky, Joe Griffin. 126-131 [doi]
- New technologies, old practices: the traditional use of electronic courseware in the changing geography of the classroomPauline Hope Cheong, Namkee Park, William H. Dutton. 135-140 [doi]
- A research information portal for telecommunicationsKerstin Zimmermann. 143-149 [doi]
- The impact of digital books upon print publishingDavid F. McAllister, Nancy C. McAllister, Steven Vivian. 150-154 [doi]
- Personal, private, secret, public [ethics of data privacy]David Primeaux, James E. Ames. 157-161 [doi]
- Video surveillance for the rest of us: proliferation, privacy, and ethics educationPeter Danielson. 162-167 [doi]
- Cell phone usage: an analysis of users' subjective responses in the adoptionKumiko Aoki, Edward J. Downes. 171-177 [doi]
- Teaching Ethics and the Internet 2.0: pervasive computing, consumer electronics and progressive embodimentWendy Robinson. 178-185 [doi]
- "Daddy, daddy, my computer has a fever!" Children and communication technologies in everyday lifeVirpi Oksman. 186-189 [doi]
- Information ethics in the design, creation and use of metadataRoberta Brody. 197-201 [doi]
- Information technology, new organizational concepts and employee participation-will unionism survive?Markus Helfen, Lydia Krüger. 202-209 [doi]
- Adapting the Internet to citizen deliberations: lessons learnedPatrick W. Hamlett. 213-218 [doi]
- Policy debate on the Internet: panelists evaluate the processKathleen Prosseda. 219-223 [doi]
- "Secondary effects", digital technology, and free speech: the Internet and the First AmendmentThomas R. Flynn. 229-235 [doi]
- Intellectual property and the process of invention: why software is differentRobert Plotkin. 236-243 [doi]
- Anti-circumvention misuse, or, how I learned to stop worrying and love the DMCADan L. Burk. 244-251 [doi]
- Interactive television in distance education: benefits and compromisesLiang Zhao. 255-261 [doi]
- Mobile telephony and learning: nuisance or potential enhancement?Andy Stone. 262-266 [doi]
- Multimodal delivery systemsV. R. Jagannathan. 267-272 [doi]
- Improving Web-based civic information access: a case study of the 50 US statesIrina Ceaparu, Ben Shneiderman. 275-282 [doi]
- The message is the message: designing information technology for inclusiveness and accessibilityJudith Davis, Tyler Kendall, Hal Meeks. 283-289 [doi]
- Incorporating societal concerns into communication technologiesRajiv C. Shah, Jay P. Kesan. 290-295 [doi]
- Toward social and cultural resonance with technology: case studies from the Creating Community Connections ProjectRandal D. Pinkett. 301-308 [doi]
- Digital inclusion, social exclusion and retailing: an analysis of data from the 1999 Scottish Household SurveyDavid Fitch. 309-313 [doi]
- Towards a critical approach to examining the digital divideWilliam McIver, Arthur P. Prokosch. 314-319 [doi]
- Virtual harms and virtual responsibility: a rape in cyberspaceChuck Huff, Deborah G. Johnson, Keith W. Miller. 323-330 [doi]
- Cyberstalking: moral responsibility, and legal liability issues for Internet service providersFrances S. Grodzinsky, Herman T. Tavani. 331-339 [doi]
- Educators and pornography: the "unacceptable use" of school computersMyra G. Day, Edward F. Gehringer. 340-344 [doi]
- Planning for the next ICT cluster? Seoul's Digital Media City projectMookhan Kim. 347-352 [doi]
- rd generation mobile communications system task forceLin Miao, Su Jun, Chen Junrui. 353-358 [doi]
- Multiplying the wisdom at grassroots: leveraging on information technologyShiri Ahuja. 359-366 [doi]
- Choosing passwords: security and human factorsEdward F. Gehringer. 369-373 [doi]
- Ethical hacking: the security justification reduxBryan Smith, William Yurcik, David Doss. 374-379 [doi]
- Internet hack back: counter attacks as self-defense or vigilantism?Vikas Jayaswal, William Yurcik, David Doss. 380-386 [doi]
- Internet honeypots: protection or entrapment?Brian Scottberg, William Yurcik, David Doss. 387-391 [doi]