Journal: IEEE Technol. Soc. Mag.

Volume 26, Issue 4

10 -- 15Heinz C. Luegenbiehl. Disasters as object Lessons in Ethics: Hurricane Katrina
16 -- 22Michael Davis. Perils of Using Hurricane Katrina to Teach Engineering Ethics
23 -- 28J. Douglass Klein, Roland Balmer. Engineering, Liberal Arts, and Technological Literacy in Higher Education
29 -- 35Kathryn W. Jablokow. Engineers as Problem-Solving Leaders: Embracing the Humanities
36 -- 44Marilyn A. Dyrud. Ethics, Gaming, and Industrial training

Volume 26, Issue 3

10 -- 0Roli Varma, Marcella LaFever. Correction [to "Importance of gender homophily in the computer science classroom" (Summer 07 43-47]
13 -- 23Timothy J. Cousins. Devising Post-Disaster Continuity Plans that Meet Actual Recovery Needs
24 -- 29Eng Seng Chia. Engineering Disaster Relief
30 -- 41Faye Karababa, Peter M. Guthrie. Vulnerability reduction through local seismic culture
42 -- 48Karl D. Stephan. We've Got to Talk: Emergency Communications and Engineering Ethics
49 -- 56Victor Wacham A. Mbarika, Muhammadou Kah, Kibily Samake, Jeffrey G. Sumrall. Information Technology Access: Cybercafe Diffusion in Sub-Saharan Africa

Volume 26, Issue 2

10 -- 21Jameson M. Wetmore. Amish Technology: Reinforcing values and building community
22 -- 31Karen Renaud, Elin Skjegstad Olsen. DynaHand: Observation-resistant recognition-based web authentication
32 -- 42S. C. Yang. Toward a Wireless World
43 -- 47Roli Varma, Marcella LaFever. Importance of gender homophily in the computer science classroom
48 -- 56Ahson Wardak, Michael E. Gorman, Nathan Swami, Dave Rejeski. Environmental Regulation of Nanotechnology and the TSCA

Volume 26, Issue 1

4 -- 16Laura Perusco, Katina Michael. Control, trust, privacy, and security: evaluating location-based services
17 -- 24Allan Friedman. Good neighbors can make good fences: a peer-to-peer user security system
25 -- 34Christopher Masone, Sean W. Smith. Towards usefully secure email
35 -- 45Bernd Carsten Stahl. Privacy and security as ideology
46 -- 58Peter Finn, Markus Jakobsson. Designing ethical phishing experiments