Abstract is missing.
- Palm-print recognition for authentication on smartphonesHossein Javidnia, Adrian Ungureanu, Peter M. Corcoran. 1-5 [doi]
- UCWW semantic-based service recommendation frameworkHaiyang Zhang, Nikola S. Nikolov, Ivan Ganchev. 1-6 [doi]
- Towards a citizen actuation framework for smart environmentsDavid N. Crowley, John G. Breslin, Edward Curry. 1-5 [doi]
- Applying "big data" and business intelligence insights to improving clinical care for cancerJohn Lewis, Siaw-Teng Liaw, Pradeep Ray. 1-4 [doi]
- Mobile communication tools for the reduction of secondhand smoke in public places: Russian public health programs using mHealthSergei Frolov, Elena Dmitrieva, Sara Buzadzhi. 1-4 [doi]
- Vision for secure home robots: Implementation of two-factor authenticationDhvanik Miglani, Arnold Hensman. 1-4 [doi]
- Ethical challenges for future technologists: The growing role of technology and the growing ethical responsibility of the technologistGreg Adamson. 1-6 [doi]
- Biometric technology and smartphones: A consideration of the practicalities of a broad adoption of biometrics and the likely impactsPeter M. Corcoran, Claudia Costache. 1-7 [doi]
- ICT interventions for socio-economic development - A practitioner's viewAlida Veldsman, Darelle van Greunen. 1-6 [doi]
- The ethical limits of bungee research in ICTDAndy Dearden, William D. Tucker. 1-6 [doi]
- Challenges of implementing a social prescription service in the clinic: Social prescribing in the LAMP projectChristopher J. Soraghan, Gerard Boyle, L. Dominguez-Villoria, J. Feighan, D. Robinson. 1-6 [doi]
- Biometrics in social grants: Separating myth from realityHelen van de Haar, Darelle van Greunen, Dalenca Pottas. 1-8 [doi]
- Subcutaneous body area networks: A SWOT analysisP. A. Catherwood, Dewar D. Finlay, James McLaughlin. 1-8 [doi]
- Agriculture among pastoralist communities: A case of livestock farmers in kenyan arid and semi-arid landsAmos Gichamba, Peter Waiganjo, Dan Orwa. 1-3 [doi]
- Pocket psychopaths: An anthropomorphic intentional stance to facilitate moral intuitions about (Consumer) technologyWilhelm E. J. Klein. 1-6 [doi]
- FIT: Identity theft education: Study of text-based versus game-based learningSusan Helser. 1-4 [doi]
- Cloud computing and mobile devices based system for healthcare applicationHanen Jemal, Zied Kechaou, Mounir Ben Ayed, Adel M. Alimi. 1-5 [doi]
- Mobile cloud computing for disaster emergency operation: A systematic reviewTeuku Aulia Geumpana, Fethi A. Rabhi, John Lewis, Pradeep Kumar Ray, Liming Zhu. 1-8 [doi]
- The future of computing - The implications for society of technology forecasting and the Kurzweil singularityPeter S. Excell, Rae A. Earnshaw. 1-6 [doi]
- The potential development impact of mobile application vendors in developing countriesTuomas Tanskanen, Anne-Marie Tuikka, Sami Hyrynsalmi, Kai K. Kimppa. 1-6 [doi]
- The internet of things and its impact on social relationships involving mutual trustGuiou Kobayashi, Mariana Claudia Broens, Maria Eunice Quilici González, Jose Artur Quilici González. 1-6 [doi]
- Factors impacting on adoption of Technology-enhanced Learning techniques by universities in Nairobi, KenyaMiriam Cunningham. 1-7 [doi]
- Supply system's technology configuration as a contributor to end-user vulnerabilityLindsay Robertson, Katina Michael, Albert Munoz Aneiros. 1-6 [doi]
- Supporting a culture of innovation at a new university of technologyChristine Winberg, Shaun Pather, Mike du Plessis. 1-6 [doi]
- A review of the policy documents behind South Africa's Renewable Energy Independent Power Producer Procurement Programme: How its hits and misses impact societyLynette Herbst, Jorg Lalk. 1-6 [doi]
- Towards a model for enhancing ICT4 development and information security in healthcare systemKehinde Kayode Agbele, Peter K. Oriogun, Ayodele G. Seluwa, Kehinde D. Aruleba. 1-6 [doi]
- Insights into open innovation and ICT entrepreneurship in AfricaPaul Cunningham. 1-8 [doi]
- Development of the Fynbos Leaf Optical Recognition Application (FLORA): An innovation journey of a tool to assist in identifying plantsSimon L. Winberg. 1-6 [doi]
- Iris recognition on consumer devices - Challenges and progressShejin Thavalengal, Peter M. Corcoran. 1-4 [doi]
- New technologies and mixed-use convergence: How humans and algorithms are adapting to each otherSally A. Applin, Michael D. Fischer. 1-6 [doi]
- Modelling Cyber Security Governance MaturityRossouw de Bruin, Sebastiaan H. von Solms. 1-8 [doi]
- A practise-based theory of SEIDET smart community centre modelJackie Phahlamohlaka, Zama Dlamini, Linda Malinga, Sipho Ngobeni, Thami Mnisi. 1-9 [doi]
- Study on content rating and security permissions of mobile applications in google playSimona Tiuc, Marius Marcu, Cosmin Cernazanu-Glavan. 1-6 [doi]
- A semi-automated food voting classification system: Combining user interaction and Support Vector MachinesPatrick McAllister, Huiru Zheng, Raymond Bond, Anne Moorhead. 1-7 [doi]
- Empirical findings: The use of robotics to engage the youth from lower socio-economic areasOluwadara Asinobi, Janet Allison, Martin McKinney, Siobhan Flynn, Michaela M. Black, Adrian Moore. 1-6 [doi]
- A falls detection system for the elderly based on a WSNAmoldo Diaz-Ramirez, Edgar Dominguez, Luís Martínez-Alvarado. 1-6 [doi]
- Improving knowledge worker efficiencyFrank Gleeson, Vincent Hargaden. 1-8 [doi]
- Towards uniformity for smart glasses devices: An assessment of function as the driver for standardisationStuart Elder, Alex Vakaloudis. 1-7 [doi]
- Toward meaningful human control of autonomous weapons systems through function allocationMarc C. Canellas, Rachel A. Haga. 1-7 [doi]
- Making the UCWW a realityIvan Ganchev, Zhanlin Ji, Mairtin O'Droma. 1-4 [doi]
- Real-time ethics - A technology enabled paradigm of everyday ethics in smart cities: Shifting sustainability responsibilities through citizen empowermentHossein Shahrokni, Anca Solacolu. 1-5 [doi]
- Agricultural information delivery mechanism using ICT: A case study from Kerala, IndiaShely Koshy, Sakeer Husain, Kishore Kumar. 1-3 [doi]
- i4Toys: Video technology in toys for improved access to play, entertainment, and educationFiona Edwards Murphy, Michelle Donovan, James Cunningham, Tristan Jezequel, Enrique Garcia, Alex Jaeger, John McCarthy, Emanuel M. Popovici. 1-6 [doi]
- "About your smartphone usage" - Privacy in location-based mobile participationMaija Poikela, Robert Schmidt, Ina Wechsung, Sebastian Möller. 1-6 [doi]
- Driving the self-driving vehicle: Expanding the technological design horizonPascale-L. Blyth, Milos N. Mladenovic, Bonnie A. Nardi, Norman M. Su, Hamid R. Ekbia. 1-6 [doi]
- A critical realist approach to engineering ethicsEddie Conlon. 1-6 [doi]
- The cloud afterlife: Managing your digital legacyCathryn Peoples, M. Hetherington. 1-7 [doi]
- A snapshot of the subject matter of computing ethicsBrian R. Hall. 1-5 [doi]