Journal: IEEE Technol. Soc. Mag.

Volume 28, Issue 4

6 -- 15Bernard Amadei, William A. Wallace. Engineering for humanitarian development
16 -- 24Stephen E. Silliman. Assessing experiences of international students in Haiti and Benin
25 -- 31Karl Perusich, Harold Tepper, J. Roberto B. de Marca, Russ Lefevre, Richard Baseil. Linking technologists and humanitarians: IEEE/UN FoundationHumanitarian Technology Challenge
32 -- 41Jonathan D. J. Vandersteen, Caroline A. Baillie, Kevin R. Hall. International humanitarian engineering: Who benefits and who pays?
42 -- 48Jen Schneider, Juan Lucena, Jon A. Leydens. Engineering to help: The value of critique in engineering service

Volume 28, Issue 3

10 -- 17Seref Sagiroglu, Gurol Canbek. Keyloggers: Increasing Threats to Computer Security and Privacy
18 -- 27Edward A. Friedman. Computer-assisted medical diagnosis for rural Sub-Saharan Africa
28 -- 36Haiko Van Der Voort, Hans de Bruijn. Learning from disasters
37 -- 46L. Jean Camp. Mental models of privacy and security
47 -- 54Chuck Huff, Laura Barnard. Good computing
55 -- 63Louis-François Pau. Privacy management service contacts as business opportunity
64 -- 72Patrick E. Meyer. Greening IEEE

Volume 28, Issue 2

4 -- 0Edward A. Friedman. Enhancing rural healthcare in Rwanda through clinical decision support [News and Notes]
5 -- 6Clinton J. Andrews. Innovation as energy policy for the world [Policy Perspectives]
9 -- 15Matthew A. Wong. Wireless nomad: Pioneer in an urban residential environment
16 -- 22Susan O'Donnell, Sonja Perley, Deanne C. Simms, Brecken Rose Hancock. Video communication roadblocks facing remote indigenous communities
23 -- 33Adam Fiser, Andrew Clement. K-Net and Canadian Aboriginal communities
34 -- 41Gordon A. Gow, Tara McGee, David Townsend, Peter Anderson, Stanley Varnhagen. Communication technology, emergency alerts, and campus safety
42 -- 48Víctor M. González, Luís A. Castro, Marcela D. Rodríguez. Technology and connections Mexican immigrants in the U.S
49 -- 56Han-Teng Liao. Conflict and consensus in the Chinese version of Wikipedia
57 -- 64Ofer Arazy, Ian R. Gellatly, Soobaek Jang, Raymond A. Patterson. Wiki deployment in corporate settings

Volume 28, Issue 1

13 -- 15John S. Canning. "You've just been disarmed. Have a nice day!"
16 -- 19Noel E. Sharkey. Death strikes from the sky: the calculus of proportionality
20 -- 24Peter M. Asaro. Modeling the moral user
25 -- 29Robert Sparrow. Predators or plowshares? arms control of robotic weapons
30 -- 33Ronald C. Arkin. Ethical robots in warfare
34 -- 40Mark Burdon. Commercializing public sector information privacy and security concerns
41 -- 47Lucy Resnyansky. The internet and the changing nature of intelligence
48 -- 56Melih Kirlidog, Meric Aykol, Sevinc Gulsecen. Interpersonal communication and gender in the ICT profession