researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: IEEE Technol. Soc. Mag.
Home
Index
Info
Volume
Volume
26
, Issue
4
10
--
15
Heinz C. Luegenbiehl
.
Disasters as object Lessons in Ethics: Hurricane Katrina
16
--
22
Michael Davis
.
Perils of Using Hurricane Katrina to Teach Engineering Ethics
23
--
28
J. Douglass Klein
,
Roland Balmer
.
Engineering, Liberal Arts, and Technological Literacy in Higher Education
29
--
35
Kathryn W. Jablokow
.
Engineers as Problem-Solving Leaders: Embracing the Humanities
36
--
44
Marilyn A. Dyrud
.
Ethics, Gaming, and Industrial training
Volume
26
, Issue
3
10
--
0
Roli Varma
,
Marcella LaFever
.
Correction [to "Importance of gender homophily in the computer science classroom" (Summer 07 43-47]
13
--
23
Timothy J. Cousins
.
Devising Post-Disaster Continuity Plans that Meet Actual Recovery Needs
24
--
29
Eng Seng Chia
.
Engineering Disaster Relief
30
--
41
Faye Karababa
,
Peter M. Guthrie
.
Vulnerability reduction through local seismic culture
42
--
48
Karl D. Stephan
.
We've Got to Talk: Emergency Communications and Engineering Ethics
49
--
56
Victor Wacham A. Mbarika
,
Muhammadou Kah
,
Kibily Samake
,
Jeffrey G. Sumrall
.
Information Technology Access: Cybercafe Diffusion in Sub-Saharan Africa
Volume
26
, Issue
2
10
--
21
Jameson M. Wetmore
.
Amish Technology: Reinforcing values and building community
22
--
31
Karen Renaud
,
Elin Skjegstad Olsen
.
DynaHand: Observation-resistant recognition-based web authentication
32
--
42
S. C. Yang
.
Toward a Wireless World
43
--
47
Roli Varma
,
Marcella LaFever
.
Importance of gender homophily in the computer science classroom
48
--
56
Ahson Wardak
,
Michael E. Gorman
,
Nathan Swami
,
Dave Rejeski
.
Environmental Regulation of Nanotechnology and the TSCA
Volume
26
, Issue
1
4
--
16
Laura Perusco
,
Katina Michael
.
Control, trust, privacy, and security: evaluating location-based services
17
--
24
Allan Friedman
.
Good neighbors can make good fences: a peer-to-peer user security system
25
--
34
Christopher Masone
,
Sean W. Smith
.
Towards usefully secure email
35
--
45
Bernd Carsten Stahl
.
Privacy and security as ideology
46
--
58
Peter Finn
,
Markus Jakobsson
.
Designing ethical phishing experiments