Valerie
J. H. Powell, RT(R), Ph.D., C&IS Department, Robert Morris
University
Information
Technology Issues Page
Topics:
v Operating Systems
v Telecommunications and Networking
v General
v Databases
v Paper Topics
v Applications
v Social Issues and Impacts
Operating Systems and Processors
- Spintronics
- See David D. Awschalom, Michael E. Flatté, and Nitin Samarth,
"Spintronics" in the June 2002 issue
of Scientific American 286,6 (June 2002): 66-73. Link to http://www.sciam.com and from there link
to the 2002 issue page and then to the page for this article.
See also an American Scientist (publication of Sigma Xi) article by
Sankar Das Sarma -
link to:
http://americanscientist.org/articles/01articles/Dassarma.html
This page has a number of spintronics links.
From Computerworld: http://www.computerworld.com/hardwaretopics/hardware/story/0,10801,83987,00.html
You may also try web searches (using, for
example, Google) on the term spintronics.
- "Millipede"
storage - see http://www.zurich.ibm.com/st/storage/millipede.html
or http://domino.watson.ibm.com/Comm/bios.nsf/pages/millipede.html
See Peter Vettiger and Gerd
Binnig, "The Nanodrive Project: Inventing a
Nanotechnology Device for Mass Production and Consumer Use Is Trickier Than
It Sounds," Scientific American 288, 1 (January 2003): 47-53
- Fluid chip does binary logic, by Kimberly Patch,
Technology Research News, October
6/13, 2004: http://trnmag.com/Stories/2004/100604/Fluid_chip_does_binary_logic_100604.html
- Clockless
or Asynchronous Systems - See Ivan E. Sutherland and Jo Ebergen, "Computers without Clocks", Scientific
American 287, 2 (August 2002): 62-69. See
also http://www.cs.man.ac.uk/async/
and http://www.win.tue.nl/~wsinap/async.html
- Quantum Information (Qubits) - See Michael A. Nielson, "Rules for
a Complex Quantum World, Scientific American 287, 5 (November
2002): 62-69. See also http://www.qubit.org
- Interval Computations and
Calculators (about the
accuracy of calculator/computer-based computations, rounding, number
representation): Vladik Kreinovich, Computer
Science, University
of Texas at El Paso: http://www.cs.utep.edu/interval-comp/
Telecommunications and Networking
- RFID (Radio Frequency Identification) Issues: David Molnar and
David Wagner, “Privacy and
Security in Library RFID: Issues, Practices, and Architectures,” Berkeley, regarding
2005 ALA Proposition, at http://www.cs.berkeley.edu/~dmolnar/library.pdf
. From RFID Gazette, April 7, 2004, by Jimmy
Atkinson, “There are Bigger RFID Issues than Compliance,” at http://www.rfidgazette.org/2004/04/abi_research_th.html
. From SNTReport.com, Sept. 15, 2004,
Addressing RFID Issues.” at http://www.sntreport.com/archives/000797.html
. RFIDIsights presented by Information Week,
Dept. 13, 2004, by Party Aftab, “The Privacy
Lawyer, RFID may be Risky Business,” at http://www.rfidinsights.com/bestpractices/47101943
AMCIS 2005, Omaha, NE, See http://aisel.isworld.org/proceedings/amcis/2005/program.asp
for RFID titles in sections for “Radio Frequency Identification (RFID)
Adoption Drivers: A Radical Innovation Adoption Perspective” – Papers by Aditya Sharmja and Alex Citurs, Emory University.
See the September 2005 issue of Communications
of the ACM (CACM 48, 9) with
a focus on RFID:
- Gaetano
Borriello, Introduction
- Joshua R. Smith et
al., “RFID-based Techniques for Human-Activity Detection.”
- Ramesh
Raskar et al., “Photosensing
Wireless Tags for Geometric Procedures”
- Trevor Pering et al., “Spontaneous Marriages of Mobile Devices and Interactive Spaces”
- Sherry Hsi and Holly Fait, “RFID Enhances Visitors’ Museum
Experiences at the Exploratorium”
- Miyako
Ohkubo et al., “RFID Privacy Issues and Technical Challenges”
- Oliver Günther and Sarah Spiekermann,
“RFID and the Perception of Control: The Consumer’s View”
- Bruce Eckfields, “What does RFID do for the consumer?”
- RF Interference and Electromagnetic Compatibility Issues – See
Ian Dilworth, “RF Fundamentals
and the Electromagnetic Spectrum,” at http://www.hkstp.org/english/news/news_coming/files/agenda_modernrf.pdf
; see also Jim Geier, “Interference from
Cordless Phones,” April 15 2003, WiFiPlanet, at http://www.wi-fiplanet.com/tutorials/article.php/2191241
; also RF interference between RFID and wireless networking technologies,
see CIO, “Ask the Expert,” Larry Sawyer, at http://www2.cio.com/ask/expert/2004/questions/question1910.html?CATEGORY=18&NAME=Knowledge%20Management
; and, “Fro EDN Japan, Jan 20, 2005: “Technology Minimizes RFID Reader
Interference,” ay http://www.edn.com/article/CA497835.html?industryid=23439
- Wireless Security and Privacy – See Roberto Di Pietro and Luigi V. Mancini, “Security and Privacy
Issues of Handheld and Wearable Wireless Devices,” in the September 2003
issue of Communications of the ACM 46, 9 (September 2003): 75-79)
- Smart-antenna technology
– adaptive antenna arrays with spatial-division multiple access - See
Martin Cooper, "Antennas Get Smart," in the July 2003 issue of Scientific
American 289,1 (July 2003): 48-55) (article contain links on the
topic) and http://arraycom.com/Company/laymans_guide.pdf
Note: Smart antenna technology used in RFID systems.
- Free-Space Optics (FSO)
- See Anthony Acampora, "Last Mile by
Laser," in the July 2002 issue of Scientific American 287,1
(July 2002): 49-53) (article contain links to FSO developers) and http://www.freespaceoptic.com as
well as http://www.lightpointe.com
- UWB (ultrawideband) for wireless communication. Links:
http://www.uwb.org
http://www.its.bldrdoc.gov/home/programs/uwb/
- Spread-spectrum systems
as a solution to the problem of radio-frequency spectrum scarcity. See
Wendy M. Grossman, "Radio Space: A Renegade Plan to Show that
Spectrum Isn't Scarce," Scientific American 287, 3 (September
2002): 29. Links:
http://www.tapr.org/tapr/html/ssf.html
http://www.sss-mag.com/ss.html
- Comparison of Scale-Free
Networks and Random Networks. See Albert-László
Barabási and Eric Bonabeau,
"Scale-Free Networks," Scientific American 288, 5 (May
2003): 60-69. Links:
http://www.nd.edu/~networks
http://arxiv.org/abs/cond-mat/0205601
http://www.santafe.edu/sfi/publications/Working-Papers/02-04-019.pdf
Books: Albert-László Barabási, Linked: How
Everything Is Connected to Everything Else and What It Means for Business,
Science, and Everyday Life (Penguin
Putnam, 2003); Albert-László Barabási, Linked: The New Science of Networks
(Perseus, 2002)
- Virtual Hosting and
Filtering - Regarding the virtual hosting (Web sites sharing IPv4
addresses) and filtering controversy, see:
http://cyber.law.harvard.edu/people/edelman/ip-sharing/
This site (Benjamin Edelman - Berkman Center for
Internet & Society - Harvard Law School) provides technical
information on how Web sites share IPv4 addresses and on the problems
associated with filtering in various jurisdictions and countries.
http://www.attorneygeneral.gov/
- Pennsylvania Attorney General's Office
http://www.cdt.org/ - The Center for
Democracy and Technology (CDT)
- This site covers such issues as free speech, data privacy, government
surveillance, cryptography, and unsolicited e-mail (spamming)
- Grid Technology and
Global Computing Integration. See Ian Foster, “The Grid: Computing
without Bounds,” Scientific American 288, 4 (April 2003): 78-83.
Links:
http://www.globus.org/research/papers/ogsa.pdf
http://www.gridcomputing.com/
http://www.gridcomputingplanet.com/
http://www.gridforum.org/
- Carbon nanotubes and “light antennas.” See PhysicsWeb,
January 1998: http://physicsweb.org/articles/world/11/1/9;
Science Daily, December 2003: http://www.sciencedaily.com/releases/2003/12/031231082951.htm;
noise and nanotubes, see Space Daily, 2000: http://www.spacedaily.com/news/carbon-00a.html
also noise boosts energy levels in nanotubes,
see TRN
(Technology Research News, February 2004: http://www.trnmag.com/Stories/2004/021104/Noise_boosts_nanotube_antennas_021104.html.
Databases
·
Computer
Assisted Passenger Prescreening System, or CAPPS II. See:
CAPPS II Testing in Wired at http://www.wired.com/news/print/0,1294,59252,00.html
Ass’n of Corporate Travel Executives (ACTE) at http://www.acte.org/initiatives/ACTE_initiatives_CAPPSII.shtml
·
DNA databases. SeeD.H. Kaye & Michael E.
Smith, DNA Identification
Databases:
“Legality, Legitimacy, and the Case for Population-Wide Coverage,” submitted
for Spring 2003 issue of Wisconsin Law
Review at http://www.law.asu.edu/homepages/kaye/pubs/dna/03-WisLR.htm
·
National
Identification Database: See:
Intelligent Transportation
Society of America (ITSA), “’Smart’ ID
Card Gaining Support in U.S.? Hurdles and Doubts Remain Huge,” at http://www.itsa.org/ITSNEWS.NSF/0/c2dad4688ffea3c385256b26006357d2?OpenDocument
·
The Semantic Web and globally unique identifiers.
See Nicholas Matsakis and David Karger, “Resource Identification on the Semantic Web,” at http://www.lcs.mit.edu/research/abstracts2003/pdf/269.pdf
·
Unique identification. See Don Norman, “Name confusion and its
implications,” The Risks Digest: Forum on
Risks to the Public in Computers and Related Systems, ACM Committee on Computers and Public Policy, Peter G. Neumann,
moderator, at http://catless.ncl.ac.uk/Risks/14.16.html
Paper Topics
Looking for a paper topic for a class? Check
these sites!
- Telecommunications,
Internet, and Connectivity in Africa: See: http://www.africa.upenn.edu/Global_Comm/afr_inet96.html
and http://www.uneca.org/disd/ict/connectivity_model.htm
and http://demiurge.wn.apc.org/africa/afcosts.htm
- Telecommunications,
Internet, and Connectivity in the Middle East: http://opennet.net/research/regions/mena;
Satellite Connectivity: http://www.satsig.net/ivsat2.htm;
Statistics: http://www.internetworldstats.com/middle2.htm;
- Telecommunications,
Internet, and Connectivity in Central and South
America: http://www.redhucyt.oas.org/default.htm
You can use this site to inform your self about the development of networking
technology/infrastructure and Internet connectivity in Central and South
American countries.
- Telecommunications,
Internet, and Connectivity in Central and Eastern
Europe: http://www.cdt.org/international/ceeaccess/
You can use this site to inform your self about the development of networking
technology/infrastructure and Internet connectivity in Central and Eastern
European countries.
- Internet Technology
Worldwide - the Internet Society: http://www.isoc.org/oti/about/index.html
This site is called "e-On the
Internet" and is "the international electronic magazine
and information resource of the Internet Society." e-OTI discusses
"the ongoing development of Internet technology and its impact on
business, education, and society."
- Internet Technology
Worldwide -http://www.internetworld.com/
General
- Object-Oriented (OO)
Techniques - See H. James Nelson, Deborah J. Armstrong, and Mehdi Ghods, "Old Dogs
and New Tricks," Communications of the ACM 45, 10 (October
2002): 132-137. In particular note the two lists of questions in a section
entitled "The OO Thinking Process" on p. 137.
See also Bryan Hayes, "The Post-OOP Paradigm," American
Scientist 91, 2 (March/April 2003): 106-110.
- Electrostatic Discharges
(ESDs) - See Steven H. Voldman,
"Lightning Rods for Nanoelectronics"
on the barriers to miniaturization of electronic devices in the October
2002 issue of Scientific American 287, 4 (October 2002): 90-93.
Online link to http://www.sciam.com
and from there link to this article.
Applications
- Speech Recognition -
See W. Wayt Gibbs, "Whatever you say: with
speech-recognition software, your voice is the computer's command" in
the June 2002 issue of Scientific American 286,6 (June 2002):
98-100
Social Issues and Impacts
·
Electronic
Voting Technology – see:
o Voting
with a paper trail; see: http://en.wikipedia.org/wiki/Voter-verified_paper_audit_trail
and verifiedvoring.org at https://www.verifiedvoting.org/resources/vvpr-legislation
(2012)
o
Draft voting machine standards (2009): http://www.nist.gov/itl/csd/voting_060209.cfm
o
http://www.csmonitor.com/USA/Elections/2012/1026/Could-e-voting-machines-in-Election-2012-be-hacked-Yes
- Clayton M, “Could
e-voting machines in Election 2012 be hacked? Yes: Security experts say a specific
kind of electronic-voting machine is vulnerable to being hacked. Influencing a
national election would be difficult, but the advance of malware makes it
possible.” Christian Science
Monitor (October 26, 2012).
o
http://www.cs.ucsb.edu/~vigna/publications/2007_mcdaniel_blaze_vigna_voting.pdf
- “EVEREST: Evaluation and Validation of Election-Related Equipment, Standards
and Testing” (2007).
o http://queue.acm.org/detail.cfm?id=1035606
Simons B, “Electronic Voting Systems: The Good, the Bad, and the Stupid: Is it
True that Politics and Technology don’t mix?” ACMQueue (October 1, 2004).
o
http://www.acm.org/usacm/Issues/EVoting.htm
- ACM on E-Voting Technology and Standards
o
DREs (Direct Recording Electronic Voting
Systems): http://www.leagueissues.org/tutorial.html,
League of Women Voters of
Winchester, MA (2004).
o
http://grouper.ieee.org/groups/scc38/1583/
- IEEE standard - Project 1583 – Voting Equipment Standards
o
Black Box Voting - http://www.blackboxvoting.org/ “America’s
Elections Watchdog Group”
o
http://www.diebold.com/
- Diebold site – Choose election systems; see also http://www.diebold.com/technicalresponse.pdf
o
“Sequoia voting machines flawed” - http://blog.wired.com/27bstroke6/2008/07/ny-50-percent-o.html
o
http://www.mail-archive.com/ctrl@listserv.aol.com/msg108154.html
- discussion about Diebold and Black Box Voting site
o
http://www.cs.uiowa.edu/~jones/voting/dieboldftp.html
- voting and network security
o
”E-voting Security,” by Avi
Rubin, Computer Science, Johns
Hopkins University:
http://avirubin.com/vote/ - includes
link to report on voting in Venezuela
o
”Electronic Voting,” by Helgat Lipmaa,
Finland
(international coverage): http://www.tcs.hut.fi/~helger/crypto/link/protocols/voting.html
o
”Electronic Voting Hot List,” by Lorrie Cranor: http://lorrie.cranor.org/voting/hotlist.html
o
Verified Voting – an advocacy group for paper
ballots: http://www.verifiedvoting.org/
o
http://www.scoop.co.nz/mason/stories/HL0307/S00065.htm
- security of voting systems
o
http://www.onlinejournal.com/Special_Reports/082003Landes/082003landes.html
- voting machines
This is an active topic – search for more sites and/or
use links on the sites given above.
o Grokker search tool (CNN) at http://www.cnn.com/2003/TECH/ptech/12/17/fortune.ff.deeper.google/index.html
o CNN
– AP story “Does Power Point Make Us Stupid?” on using Power Point artistically
at http://www.cnn.com/2003/TECH/ptech/12/30/byrne.powerpoint.ap/index.html
- The Global Open-Source
Software Movement - see:
o Eric
S. Raymond, Bob Young, and Tim O'Reilly, The Cathedral and the Bazaar:
Musings on Linux and Open Source by an Accidental Revolutionary, 2nd ed.
(O'Reilly & Associates; 2001)
o http://www.tuxedo.org/~esr/writings/cathedral-bazaar/
o http://www.firstmonday.dk/issues/issue3_3/raymond/#author
o http://www.tuxedo.org/~esr/ Eric
Raymond's site
o SourceForge: http://sourceforge.net
o http://www.li.org/ - Linux International
o http://www.spi-inc.org/ - SPI
o http://www.publicknowledge.org/
- Web/Internet Etiquette – see:
o Whitworth,
B. (Oct, 2005) Polite Computing, “Polite Computing,” forthcoming in Behaviour & Information Technology, at: http://brianwhitworth.com/polite.rtf
- Unsolicited E-mails
(Spamming) – see:
o Please
see the Spamlaw site to identify and review
legislation regarding unsolicited e-mails: http://www.spamlaws.com/
o “Spam and the Social-Technical Gap,” IEEE
Computer, October, 38-45 http://brianwhitworth.com/spam-computer.pdf
o Brian
Whitworth, “Spam – A social-technical problem,” forthcoming in Dr Claude Ghaoui (Ed) (2005) Encyclopedia of Human Computer
Interaction; at http://web.njit.edu/~whitwort/hcie-spam.rtf
o Whitworth,
B. (2005), “Social-technical Systems,” in press, Encyclopedia of HCI, Edited
Claude Ghaoui. http://brianwhitworth.com/hcie-sts.rtf
o See
Janice C. Sipior, “Should Spam be
on the Menu?” Communications of the ACM (CACM 47, 6, June 2004):
59-63.
o http://www.cdt.org/ - The Center for Democracy
and Technology (CDT)
o http://www.the-dma.org/ - The Direct
Marketing Association (DMA)
o Cost
of spam is estimated at over $21 billion, February 2005, National Technology Readiness Survey (NTRS), produced by the Center for Excellence
in Service at the University of Maryland Robert H. Smith School of Business and
by Rockbridge Associates, Inc., at http://www.bmgt.umd.edu/ntrs/
o Fraudulent
information in e-mail hoax (CNN story): http://www.cnn.com/2003/WORLD/europe/12/30/uk.bankhoax/index.html
o Cyber-blackmail
e-mails (CNN – Reuters story) at http://www.cnn.com/2003/TECH/internet/12/29/cyber.blackmail.reut/index.html
o “Spamming : hearing before the Subcommittee on Communications
of the Committee on Commerce, Science, and Transportation, United States,
One Hundred Fifth Congress, second session, June 17, 1998.” RMU Libraries Y
4.C73/7:S.HRG.105-1028 –
o also:
“Spamming, the e-mail you want to can” - hearing before the Subcommittee on
Telecommunications, Trade, and Consumer Protection of the Committee on
Commerce, House of Representatives, One Hundred Sixth Congress, first session,
November 3, 1999." RMU Libraries Y 4.C 73/8:106-84
o United States.
Federal Trade Commission, Division of Marketing Practices, “False claims in
spam” -a report by the FTC'S Division of Marketing Practices. Mode of access:
Internet from the FTC web site. Address as of 2003-05-16: http://www.ftc.gov/reports/spam/030429spamreport.pdf;
current access is available via PURL; call # FT 1.2:2003013771
o Alan
Schwartz and Simon Garfinkel, Stopping spam: Stamping out unwanted email & news postings
(O'Reilly, 1998), RMU Libraries 658.478
S399s 1998 Moon
- Legitimate Information Technology Environments for Virtual
Communities
o Whitworth,
B., and deMoor, A. (2003). “Legitimate by design:
Towards trusted virtual community environments,” Behaviour
& Information Technology 22:1, p31-51; at: http://brianwhitworth.com/legitimacy2002.rtf
- Disasters and Information Systems - Katrina
o “Katrina’s
total system disruption: How
many recovery plans anticipate what actual human beings might do?” From
the Analysts, by David L. Margulius,
September 09,
2005, The Data Administration Newsletter
http://www.infoworld.com/article/05/09/09/37OPanalysts_1.html
o
Blackengineer.com
on Katrina, many interesting articles at: http://www.blackengineer.com/artman/publish/index.shtml
o
Informationweek,
“Rebounding from Katrina,” at: http://www.informationweek.com/showArticle.jhtml?articleID=170700744&tid=16033
o
University
of California, “Hurricane Katrina Aftermath and Recovery Efforts,”
at http://www.universityofcalifornia.edu/news/hurricaneexperts.html
o
American Bar Association, “Technology Related Resources for Hurricane
Katrina Disaster Relief”, at: http://www.abanet.org/tech/ltrc/katrina.html
- See August 2005 issue of Communications of the ACM (CACM 48, 8) with a focus on Spyware
- Access to Information
Technology:
o Reaching
Out with Technology: Connecting the Low-Income Population to the Financial
Mainstream by Steven Davidson: http://www.fanniemaefoundation.org/programs/bb/v3i2-reachingout.shtml
- Broadcasting Technologies
and International Influence on Cultural Diversity
o -
See Harvey B. Feigenbaum, "Digital Entertainment
Jumps the Border," Scientific American 288, 3 (March 2003): 78-83.
See also Harvey B. Feigenbaum, "Globalization
and Cultural Diplomacy" (Center for Arts and Culture), at http://culturalpolicy.org/pdf/globalization.pdf
and Ben Goldsmith, Julian Thomas, Tom O'Regan, and
Stuart Cunningham, "The Future for Local Content? Options for Emerging
Technologies" (Australian Broadcasting Authority), at http://www.aba.gov.au/tv/research/projects/local_cont.htm
- Use of information
technology concepts in dealing with globalization – see
o Thomas
L. Friedman, The Lexus and the Olive Tree:
Understanding Globalization (Anchor Books, 2000). Particularly note
Friedman's discussions of the electronic herd and DOScapital
6.0. See also: http://www.lexusandtheolivetree.com/
http://www.washingtonmonthly.com/books/
1999/9906.krugman.lexus.html
http://www.webreview.com/pi/1999/10_08_99.shtml
- Information Overload
- See
o Ali
F. Farhoomand and Dan H. Drury, "Managerial
Information Overload," Communications of the ACM 45, 10 (October
2002): 127-131.
RMU
C&IS – Updated 11/10/2012