Abstract is missing.
- Introduction and OverviewBart P. Knijnenburg, Xinru Page, Pamela J. Wisniewski, Heather Richter Lipford, Nicholas Proferes, Jennifer Romano. 1-11 [doi]
- Current Trends in AI-Based Educational Processes - An OverviewMirjana Ivanovic, Aleksandra Klasnja Milicevic, Marcin Paprzycki, Maria Ganzha, Costin Badica, Amelia Badica, Lakhmi C. Jain. 1-15 [doi]
- Introduction to Virtual and Augmented RealityRalf Doerner, Wolfgang Broll, Bernhard Jung 0001, Paul Grimm, Martin Göbel, Rolf Kruse. 1-37 [doi]
- Introduction and BackgroundSrinivas Katkoori, Sheikh Ariful Islam. 1-14 [doi]
- Are We Losing Control?Edward A. Lee. 3-7 [doi]
- Social Robots: Their History and What They Can Do for UsNadia Magnenat-Thalmann. 9-17 [doi]
- Privacy Theories and FrameworksPamela J. Wisniewski, Xinru Page. 15-41 [doi]
- Digitalization of EducationDjordje Nadrljanski, Mila Nadrljanski, Mira Pavlinovic. 17-39 [doi]
- Behavioral Synthesis of Key-Obfuscated RTL IPSheikh Ariful Islam, Srinivas Katkoori. 17-42 [doi]
- Artificial Intelligence and the Problem of ControlStuart Russell 0001. 19-24 [doi]
- The Challenge of Human Dignity in the Era of Autonomous SystemsPaola Inverardi. 25-29 [doi]
- The Real Cost of Surveillance Capitalism: Digital Humanism in the United States and EuropeAllison Stanger. 33-40 [doi]
- Perceptual Aspects of VRRalf Doerner, Frank Steinicke. 39-70 [doi]
- Democratic Discourse in the Digital Public Sphere: Re-imagining Copyright Enforcement on Online Social Media PlatformsSunimal Mendis. 41-46 [doi]
- Remote Teaching and Learning Math in English Through CLILMaria Guida, Letizia Cinganotto. 41-59 [doi]
- Source Code Obfuscation of Behavioral IPs: Challenges and SolutionsNandeesha Veeranna, Benjamin Carrion Schafer. 43-56 [doi]
- Revisiting APCOChristoph Buck, Tamara Dinev, Reza Ghaiumy Anaraky. 43-60 [doi]
- The Internet Is Dead: Long Live the InternetGeorge Zarkadakis. 47-52 [doi]
- Return to Freedom: Governance of Fair Innovation EcosystemsHans Akkermans, Jaap Gordijn, Anna Bon. 53-60 [doi]
- Hardware IP Protection Using Register Transfer Level Locking and Obfuscation of Control and Data FlowPranesh Santikellur, Rajat Subhra Chakraborty, Swarup Bhunia. 57-69 [doi]
- Privacy and Behavioral EconomicsAlessandro Acquisti, Laura Brandimarte, George Loewenstein. 61-77 [doi]
- Decolonizing Technology and Society: A Perspective from the Global SouthAnna Bon, Francis Dittoh, Gossa Lô, Mónica Pini, Robert Masua Bwana, WaiShiang Cheah, Narayanan Kulathuramaiyer, André Baart. 61-68 [doi]
- The Potential of Artificial Intelligence for Assistive Technology in EducationKaterina Zdravkova. 61-85 [doi]
- Digital Humanism and the Limits of Artificial IntelligenceJulian Nida-Rümelin. 71-75 [doi]
- Protecting Behavioral IPs During Design Time: Key-Based Obfuscation Techniques for HLS in the CloudHannah Badier, Jean-Christophe Le Lann, Philippe Coussy, Guy Gogniat. 71-93 [doi]
- Virtual WorldsBernhard Jung 0001, Arnd Vitzthum. 71-106 [doi]
- Explorative Experiments and Digital Humanism: Adding an Epistemic Dimension to the Ethical DebateViola Schiaffonati. 77-82 [doi]
- The Development of Privacy NormsNicholas Proferes. 79-90 [doi]
- Digital Humanism and Global Issues in Artificial Intelligence EthicsGuglielmo Tamburrini. 83-88 [doi]
- Adaptive and Intelligent Web-Based Learning and Control TechnologiesValery M. Kaziev, Lyudmila V. Glukhova. 87-101 [doi]
- Our Digital MirrorErich Prem. 89-94 [doi]
- Privacy Beyond the Individual LevelJennifer Jiyoung Suh, Miriam J. Metzger. 91-109 [doi]
- Protecting Hardware IP Cores During High-Level SynthesisChristian Pilato, Donatella Sciuto, Francesco Regazzoni 0001, Siddharth Garg, Ramesh Karri. 95-115 [doi]
- Fictionalizing the Robot and Artificial IntelligenceNathalie Weidenfeld. 97-100 [doi]
- How to Be a Digital Humanist in International Relations: Cultural Tech Diplomacy Challenges Silicon ValleyClara Blume, Martin Rauchbauer. 101-107 [doi]
- Exemplar Use-Cases for Training Teachers on Learning AnalyticsArvind W. Kiwelekar, Manjushree D. Laddha, Laxman D. Netak. 103-119 [doi]
- VR/AR Input Devices and TrackingPaul Grimm, Wolfgang Broll, Rigo Herold, Johannes Hummel, Rolf Kruse. 107-148 [doi]
- We Are Needed More Than Ever: Cultural Heritage, Libraries, and ArchivesAnita Eichinger, Katharina Prager. 109-114 [doi]
- Social Media and PrivacyXinru Page, Sara Berrios, Daricia Wilkinson, Pamela J. Wisniewski. 113-147 [doi]
- Humanism and the Great Opportunity of Intelligent User Interfaces for Cultural HeritageOliviero Stock. 115-120 [doi]
- Hardware (IP) Watermarking During Behavioral SynthesisAnirban Sengupta, Mahendra Rathor. 119-145 [doi]
- Impact of Lesson Planning on Students' Achievement Using Learner Profile SystemMunazza A. Mirza, Khawar Khurshid, Zawar Shah, Faryal Shah, Andrew Vakarau Levula, Aleksandra Klasnja Milicevic. 121-143 [doi]
- The Attention Economy and the Impact of Artificial IntelligenceRicardo Baeza-Yates, Usama M. Fayyad. 123-134 [doi]
- Did You Find It on the Internet? Ethical Complexities of Search Engine RankingsCansu Canca. 135-144 [doi]
- Towards an Understanding of Student Digital Ecosystems for EducationPeter Ilic. 145-160 [doi]
- Personalization, Fairness, and Post-UserismRobin Burke. 145-150 [doi]
- Encoding of Finite-State Controllers for Graded Security and PowerRicha Agrawal, Ranga Vemuri. 147-175 [doi]
- VR/AR Output DevicesWolfgang Broll, Paul Grimm, Rigo Herold, Dirk Reiners, Carolina Cruz-Neira. 149-200 [doi]
- Privacy-Enhancing TechnologiesKent E. Seamons. 149-170 [doi]
- The Curation ChokepointJames Larus. 153-158 [doi]
- Business Model Innovation and the Rise of Technology GiantsGeoffrey G. Parker 0001. 159-163 [doi]
- Computational Argumentation for Supporting Learning Processes: Applications and ChallengesCarlos Iván Chesñevar, César A. Collazos 0001, Ana Gabriela Maguitman. 161-183 [doi]
- Scaling Up Broken Systems? Considerations from the Area of Music StreamingPeter Knees. 165-171 [doi]
- Tracking and PersonalizationRahat Masood, Shlomo Berkovsky, Mohamed Ali Kâafar. 171-202 [doi]
- The Platform Economy After COVID-19: Regulation and the Precautionary PrincipleCristiano Codagnone. 173-179 [doi]
- State Encoding Based Watermarking of Sequential Circuits Using Hybridized Darwinian Genetic AlgorithmMatthew Lewandowski, Srinivas Katkoori. 177-202 [doi]
- Educational Requirements for Positive Social RoboticsJohanna Seibt. 183-189 [doi]
- Revealing Latent Student Traits in Distance Learning Through SNA and PCARozita Tsoni, Evangelos Sakkopoulos, Vassilios S. Verykios. 185-209 [doi]
- Informatics as a Fundamental Discipline in General Education: The Danish PerspectiveMichael E. Caspersen. 191-200 [doi]
- The Unbearable Disembodiedness of Cognitive MachinesEnrico Nardelli. 201-210 [doi]
- Interaction in Virtual WorldsRalf Doerner, Christian Geiger, Leif Oppermann, Volker Paelke, Steffi Beckhaus. 201-244 [doi]
- Healthcare PrivacyVivian Genaro Motti, Shlomo Berkovsky. 203-231 [doi]
- Hardware Trojan Localization: Modeling and Empirical ApproachSheikh Ariful Islam, Srinivas Katkoori. 205-231 [doi]
- Smart Technology in the Classroom: Systematic Review and Prospects for Algorithmic AccountabilityMaria Ovchinnikova, Daniel Ostnes, Arian Garshi, Malin Wist Jakobsen, Jørgen Nyborg-Christensen, Marija Slavkovik 0001. 211-237 [doi]
- The Technological Construction of SovereigntyPaul Timmers. 213-218 [doi]
- A Crucial Decade for European Digital SovereigntyGeorge Metakides. 219-225 [doi]
- Geopolitics and Digital SovereigntyCiaran Martin. 227-231 [doi]
- Cultural Influences on Artificial Intelligence: Along the New Silk RoadLynda Hardman. 233-239 [doi]
- Privacy and the Internet of ThingsHeather Richter Lipford, Madiha Tabassum, Paritosh Bahirat, Yaxing Yao, Bart P. Knijnenburg. 233-264 [doi]
- Defense Against Hardware Trojan Collusion in MPSoCsChen Liu 0013, Chengmo Yang. 233-264 [doi]
- Objective Tests in Automated Grading of Computer Science Courses: An OverviewMarin Lujak, Marija Slavkovik 0001, Alexis Lebis, Mathieu Vermeulen, Arnaud Doniec. 239-268 [doi]
- Geopolitics, Digital Sovereignty...What's in a Word?Hannes Werthner. 241-248 [doi]
- Real-Time Aspects of VR SystemsMathias Buhr, Thies Pfeiffer, Dirk Reiners, Carolina Cruz-Neira, Bernhard Jung 0001. 245-289 [doi]
- Work Without JobsDaniel K. Samaan. 251-256 [doi]
- Why Don't You Do Something to Help Me? Digital Humanism: A Call for Cities to ActMichael Stampfer. 257-262 [doi]
- Ethics or Quality of Life?Hubert Österle. 263-269 [doi]
- A Framework for Detecting Hardware Trojans in RTL Using Artificial Immune SystemsFarhath Zareen, Robert Karam. 265-287 [doi]
- Cross-Cultural Privacy DifferencesYao Li. 267-292 [doi]
- Correlating Universal Design of Learning and the Performance in Science at Elementary School LevelMunazza A. Mirza, Khawar Khurshid, Asma Hasan, Zawar Shah, Faryal Shah. 269-298 [doi]
- Responsible Technology Design: Conversations for SuccessSusan J. Winter, Brian S. Butler. 271-275 [doi]
- Navigating Through Changes of a Digital WorldNathalie Hauk, Manfred Hauswirth. 277-282 [doi]
- Efficiency vs. Resilience: Lessons from COVID-19Moshe Y. Vardi. 285-289 [doi]
- Contact Tracing Apps: A Lesson in Societal Aspects of Technological DevelopmentWalter Hötzendorfer. 291-296 [doi]
- Augmented RealityWolfgang Broll. 291-329 [doi]
- High-Level Synthesis for Minimizing Power Side-Channel Information LeakageS. T. Choden Konigsmark, Wei Ren, Martin D. F. Wong, Deming Chen. 291-317 [doi]
- Accessible PrivacyYang Wang, Charlotte Emily Price. 293-313 [doi]
- Data, Models, and Decisions: How We Can Shape Our World by Not Predicting the FutureNiki Popper. 297-302 [doi]
- Facilitating Collaborative Learning with Virtual Reality Simulations, Gaming and Pair ProgrammingPiia Näykki, Janne Fagerlund, Minna Silvennoinen, Mari Manu, Tuula Nousiainen, Merja Juntunen, Mikko Vesisenaho. 299-315 [doi]
- Lessons Learned from the COVID-19 PandemicAlfonso Fuggetta. 303-307 [doi]
- The Need for Respectful Technologies: Going Beyond PrivacyElissa M. Redmiles. 309-313 [doi]
- Privacy in AdolescencePamela J. Wisniewski, Jessica Vitak, Heidi Hartikainen. 315-336 [doi]
- Digital Humanism: Navigating the Tensions AheadHelga Nowotny. 317-321 [doi]
- Gamification and the Internet of Things in EducationGeorgios Pappas, Joshua Siegel, Ioannis N. Vogiatzakis, Konstantinos Politopoulos. 317-339 [doi]
- S*FSMs for Reduced Information Leakage: Power Side Channel Protection Through Secure EncodingMike Borowczak, Ranga Vemuri. 319-342 [doi]
- Should We Rethink How We Do Research?Carlo Ghezzi. 323-327 [doi]
- Interdisciplinarity: Models and Values for Digital HumanismSally Wyatt. 329-334 [doi]
- VR/AR Case StudiesRalf Doerner, Alexander Tesch, Axel Hildebrand, Stephan Leenders, Tobias Tropper, Wilhelm Wilke, Christian Winkler, Julian Hillig, Alec Pestov, James A. Walsh, Bruce H. Thomas, Gerhard Kimenkowski, Stephen Walton, Torsten W. Kuhlen, Geert Matthys, Holger Regenbrecht, Chris Heinrich, Xiumin Shang, Marcelo Kallmann, Benjamin Lok, Francisco A. Jimenez, Cheryl Wilson, Marc Erich Latoschik, Carolin Wienrich, Silke Grafe, Mario Botsch, Jonny M. Collins. 331-369 [doi]
- It Is Simple, It Is ComplicatedJulia Neidhardt, Hannes Werthner, Stefan Woltran. 335-342 [doi]
- Privacy and Vulnerable PopulationsNora McDonald, Andrea Forte. 337-363 [doi]
- Communication-Driven Digital Learning Environments: 10 years of Research and Development of the Campus PlatformLuís Pedro, Carlos Santos 0004. 341-359 [doi]
- Generation and Verification of Timing Attack Resilient Schedules During the High-Level Synthesis of Integrated CircuitsSteffen Peter, Tony Givargis. 343-363 [doi]
- Educational Computer Games and Social Skills TrainingMargarita Stankova, Daniela Tuparova, Polina Mihova, Tsveta Kamenski, Georgi Tuparov, Krista Mehandzhiyska. 361-392 [doi]
- Integrating Information Flow Tracking into High-Level Synthesis Design FlowWei Hu, Armaiti Ardeshiricham, Lingjuan Wu, Ryan Kastner. 365-387 [doi]
- User-Tailored PrivacyBart P. Knijnenburg, Reza Ghaiumy Anaraky, Daricia Wilkinson, Moses Namara, Yangyang He, David Cherry, Erin Ash. 367-393 [doi]
- Authoring of VR/AR ApplicationsWolfgang Broll, Florian Weidner, Tobias Schwandt, Kai Weber 0004, Ralf Doerner. 371-400 [doi]
- The Ethics of Privacy in Research and Design: Principles, Practices, and PotentialLorraine G. Kisselburgh, Jonathan Beever. 395-426 [doi]
- Mathematical Foundations of VR/ARRalf Doerner. 401-412 [doi]
- EU GDPR: Toward a Regulatory Initiative for Deploying a Private Digital EraVasiliki Diamantopoulou, Costas Lambrinoudakis, Jennifer King, Stefanos Gritzalis. 427-448 [doi]
- Reflections: Bringing Privacy to PracticeJennifer Romano, Liz Keneski. 449-462 [doi]