default search action
ISTAS 2007: Las Vegas, NV, USA
- IEEE International Symposium on Technology and Society, ISTAS 2007, Las Vegas, NV, USA, June 1-2, 2007. IEEE 2007, ISBN 978-1-4244-0587-9
- Daniel Adams:
Business/Engineering Ethics. 1-4 - Ronald C. Arkin, Lilia Moshkina:
Lethality and Autonomous Robots: An Ethical Stance. 1-3 - Ellen Bales:
From Calamity Mesa to Boyertown, Pennsylvania: Risk, Radon, and Regulation in Cold War America. 1-6 - Dennis Bechtel:
Radioactive Dispersion Devices (RDD): What are the Odds? 1-7 - Dennis Bechtel:
The National Environmental Policy Act (NEPA): Is it all that it can be? The Case for Evaluating Stigma Effects. 1-7 - R. J. Bogumil:
The Century of Living Dangerously, part II: Confronting Uncertainty. 1-12 - Farag Botros, Ahmed E. Hassan, Greg Pohll:
Block-effective Dispersivity in Heterogeneous Media: Effects of Porosity and Distribution Coefficient Variability. 1-8 - Chad M. Briggs:
National Security, Risk, and the Politics of Precaution: Addressing the Military Role in Endocrine Disrupting Chemicals. 1-5 - Pat Byrne, Graham Durant-Law:
A Strategic Risk Based Approach to Regulating Technologies and Vulnerabilities. 1-11 - Leisl A. Carr:
"Rationalizing the Home Front: The Cold War, The Nevada Test Site, and Radiation Exposure". 1-5 - Jenny B. Chapman, Greg Pohll, Ahmed E. Hassan, Karl Pohlmann:
Using Uncertainty to Guide Characterization, Closure, and Long-Term Management of an Underground Nuclear Test Site. 1-5 - Eng Seng Chia:
Is the Integrated Resort a Good Gamble? 1-7 - Ndubuisi Ekekwe, Aham Maduka:
Security and Risk Challenges of Voice over IP Telephony. 1-3 - Lois Eveleth:
Managing the Uncertainty of Ethical Codes. 1-6 - Timothy J. Farnham:
Technology and the Creation of Wilderness: The Making of Quabbin Reservoir. 1-5 - Ronald M. Frazzini:
Historical Risk Mitigation in Commercial Aircraft Avionics as an Indicator for Intelligent Vehicle Systems. 1-8 - Anna Gawkowska:
Neuroenhancement: an Ethical Analysis. 1-7 - William T. Hartwell:
The Community Environmental Monitoring Program: Reducing Public Perception of Risk through Stakeholder Involvement. 1-4 - Bin He, Keiji Takase, Yi Wang:
Evaluation of Groundwater Risk due to Anthropogenic Activities in a Coastal Plain of the Seto Inland Sea, Japan. 1-6 - Mavis Jones:
Qual+Quant=? Integrating the Social with the Technical in a Regulatory Evidence Base. 1-8 - Julian Kilker:
Risk education: Teaching (and learning) about technology and uncertainty in society. 1-4 - Andrew C. Koehler, Karen Taylor:
Towards A Political Framework for Socio-Technical System Design. 1-2 - Daniel E. LeBas:
"Dangerous Things": A Symbolic Domain for Killer Bees. 1-11 - Ye Li:
Scenario-Based Analysis on the Impacts of Plug-In Hybrid Electric Vehicles' (PHEV) Penetration into the Transportation Sector. 1-6 - Samuel Liles:
Cyber warfare compared to fourth and fifth generation warfare as applied to the Internet. 1-3 - Mary Palevsky:
Cold War Technoscience in Nevada: The Nevada Test Site Oral History Project. 1-3 - Karl Perusich:
Using Organizational Structure to Overcome Uncertainties in Technology. 1-4 - Sarah K. A. Pfatteicher:
"A New Era": The Limits of Engineering Expertise in a Post-9/11 World. 1-4 - Karl Pohlmann, Ming Ye, Greg Pohll, Jenny B. Chapman:
Use of Numerical Groundwater Modeling to Evaluate Uncertainty in Conceptual Models of Recharge and Hydrostratigraphy. 1-5 - Qiang Yan, Huaying Shu:
A Systematic Research and Simulation of the Internet Security Governance. 1-4 - Srini Ramaswamy, Remzi Seker, Sithu D. Sudarsan, D. Moix:
Societal-Consciousness in the Computing Curricula: A Time for Serious Introspection. 1-6 - Jeff Robbins:
Gaming: The Technology / Energy Efficiency Hook. 1-9 - Benjamin Sims, Christopher Henke:
Stockpile Stewardship and the Reliable Replacement Warhead: Socio-Technical Repair in the U.S. Nuclear Weapons Complex. 1-6 - William James Smith:
A Comparative Geographic Analysis of the Impact of Scale on Hazards and Vulnerability in Industrialized Continental Lands and Small Pacific Islands. 1-9 - Hans de Bruijn, Mark de Bruijne, Bauke Steenhuisen:
Managing infrastructure vulnerability: An empirical study on the use of performance management systems that seek to reduce vulnerability of network industries. 1-7 - Karen Taylor, Andrew C. K. Wiedlea:
In Defense of Ugliness: The Role of Technical Presence in Critical Infrastructure System Endurance. 1-6 - Chris Vammen, Jennifer Perkins:
An Unobserved Societal Issue, Video Game Addiction in the 21st Century. 1-4 - Hans de Bruijn, Haiko Van Der Voort:
Learning from Disasters: Why Is It So Hard? 1-7 - Raymond Wu:
Decision Process and Fuzzy Techniques in Component Based Design. 1-7 - Walter W. Zessner:
Innovative Socio-Technological Evolutions: A Conceptual Ecological Dynamic between Open-Ended and Closed-Ended Transformation? 1-7
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.