Valerie J. H. Powell, RT(R), Ph.D., C&IS Department, Robert Morris University

Information Technology Issues Page

Topics:

v  Operating Systems

v  Telecommunications and Networking

v  General

v  Databases

v  Paper Topics

v  Applications

v  Social Issues and Impacts

Operating Systems and Processors

Telecommunications and Networking

Databases

·         Computer Assisted Passenger Prescreening System, or CAPPS II. See:
CAPPS II Testing in Wired at http://www.wired.com/news/print/0,1294,59252,00.html
Ass’n of Corporate Travel Executives (ACTE) at http://www.acte.org/initiatives/ACTE_initiatives_CAPPSII.shtml

·         DNA databases. SeeD.H. Kaye & Michael E. Smith, DNA Identification Databases:
“Legality, Legitimacy, and the Case for Population-Wide Coverage,” submitted for Spring 2003 issue of Wisconsin Law Review at http://www.law.asu.edu/homepages/kaye/pubs/dna/03-WisLR.htm

·         National Identification Database: See:
Intelligent Transportation Society of America (ITSA), “’Smart’ ID Card Gaining Support in U.S.? Hurdles and Doubts Remain Huge,” at http://www.itsa.org/ITSNEWS.NSF/0/c2dad4688ffea3c385256b26006357d2?OpenDocument

·         The Semantic Web and globally unique identifiers. See Nicholas Matsakis and David Karger, “Resource Identification on the Semantic Web,” at http://www.lcs.mit.edu/research/abstracts2003/pdf/269.pdf

·         Unique identification. See Don Norman, “Name confusion and its implications,” The Risks Digest: Forum on Risks to the Public in Computers and Related Systems, ACM Committee on Computers and Public Policy, Peter G. Neumann, moderator, at http://catless.ncl.ac.uk/Risks/14.16.html

Paper Topics

Looking for a paper topic for a class? Check these sites!

General

  • Object-Oriented (OO) Techniques - See H. James Nelson, Deborah J. Armstrong, and Mehdi Ghods, "Old Dogs and New Tricks," Communications of the ACM 45, 10 (October 2002): 132-137. In particular note the two lists of questions in a section entitled "The OO Thinking Process" on p. 137.
    See also Bryan Hayes, "The Post-OOP Paradigm," American Scientist 91, 2 (March/April 2003): 106-110.
  • Electrostatic Discharges (ESDs) - See Steven H. Voldman, "Lightning Rods for Nanoelectronics" on the barriers to miniaturization of electronic devices in the October 2002 issue of Scientific American 287, 4 (October 2002): 90-93. Online link to http://www.sciam.com and from there link to this article.

Applications

  • Speech Recognition - See W. Wayt Gibbs, "Whatever you say: with speech-recognition software, your voice is the computer's command" in the June 2002 issue of Scientific American 286,6 (June 2002): 98-100

Social Issues and Impacts

·         Electronic Voting Technology – see:

o   Voting with a paper trail; see: http://en.wikipedia.org/wiki/Voter-verified_paper_audit_trail and verifiedvoring.org at https://www.verifiedvoting.org/resources/vvpr-legislation (2012)

o   Draft voting machine standards (2009): http://www.nist.gov/itl/csd/voting_060209.cfm

o   http://www.csmonitor.com/USA/Elections/2012/1026/Could-e-voting-machines-in-Election-2012-be-hacked-Yes - Clayton M, “Could e-voting machines in Election 2012 be hacked? Yes: Security experts say a specific kind of electronic-voting machine is vulnerable to being hacked. Influencing a national election would be difficult, but the advance of malware makes it possible.” Christian Science Monitor (October 26, 2012).

o   http://www.cs.ucsb.edu/~vigna/publications/2007_mcdaniel_blaze_vigna_voting.pdf - “EVEREST: Evaluation and Validation of Election-Related Equipment, Standards and Testing” (2007).

o   http://queue.acm.org/detail.cfm?id=1035606 Simons B, “Electronic Voting Systems: The Good, the Bad, and the Stupid: Is it True that Politics and Technology don’t mix?” ACMQueue (October 1, 2004).

o   http://www.acm.org/usacm/Issues/EVoting.htm - ACM on E-Voting Technology and Standards

o   DREs (Direct Recording Electronic Voting Systems): http://www.leagueissues.org/tutorial.html, League of Women Voters of Winchester, MA (2004).

o   http://grouper.ieee.org/groups/scc38/1583/ - IEEE standard - Project 1583 – Voting Equipment Standards

o   Black Box Voting - http://www.blackboxvoting.org/America’s Elections Watchdog Group”

o   http://www.diebold.com/ - Diebold site – Choose election systems; see also http://www.diebold.com/technicalresponse.pdf

o   “Sequoia voting machines flawed” - http://blog.wired.com/27bstroke6/2008/07/ny-50-percent-o.html

o   http://www.mail-archive.com/ctrl@listserv.aol.com/msg108154.html - discussion about Diebold and Black Box Voting site

o   http://www.cs.uiowa.edu/~jones/voting/dieboldftp.html - voting and network security

o   ”E-voting Security,” by Avi Rubin, Computer Science, Johns Hopkins University: http://avirubin.com/vote/ - includes link to report on voting in Venezuela

o   ”Electronic Voting,” by Helgat Lipmaa, Finland (international coverage): http://www.tcs.hut.fi/~helger/crypto/link/protocols/voting.html

o   ”Electronic Voting Hot List,” by Lorrie Cranor: http://lorrie.cranor.org/voting/hotlist.html

o   Verified Voting – an advocacy group for paper ballots: http://www.verifiedvoting.org/

o   http://www.scoop.co.nz/mason/stories/HL0307/S00065.htm - security of voting systems

o   http://www.onlinejournal.com/Special_Reports/082003Landes/082003landes.html - voting machines
This is an active topic – search for more sites and/or use links on the sites given above.

  • Interfaces – see:

o    Grokker search tool (CNN) at http://www.cnn.com/2003/TECH/ptech/12/17/fortune.ff.deeper.google/index.html

o    CNN – AP story “Does Power Point Make Us Stupid?” on using Power Point artistically at http://www.cnn.com/2003/TECH/ptech/12/30/byrne.powerpoint.ap/index.html

  • The Global Open-Source Software Movement - see:

o    Eric S. Raymond, Bob Young, and Tim O'Reilly, The Cathedral and the Bazaar: Musings on Linux and Open Source by an Accidental Revolutionary, 2nd ed. (O'Reilly & Associates; 2001)

o    http://www.tuxedo.org/~esr/writings/cathedral-bazaar/

o    http://www.firstmonday.dk/issues/issue3_3/raymond/#author

o    http://www.tuxedo.org/~esr/ Eric Raymond's site

o    SourceForge: http://sourceforge.net

o    http://www.li.org/ - Linux International

o    http://www.spi-inc.org/ - SPI

o    http://www.publicknowledge.org/

  • Web/Internet Etiquette – see:

o    Whitworth, B. (Oct, 2005) Polite Computing, “Polite Computing,” forthcoming in Behaviour & Information Technology, at: http://brianwhitworth.com/polite.rtf

  • Unsolicited E-mails (Spamming) – see:

o    Please see the Spamlaw site to identify and review legislation regarding unsolicited e-mails: http://www.spamlaws.com/

o    “Spam and the Social-Technical Gap,” IEEE Computer, October, 38-45 http://brianwhitworth.com/spam-computer.pdf

o    Brian Whitworth, “Spam – A social-technical problem,” forthcoming in Dr Claude Ghaoui (Ed) (2005) Encyclopedia of Human Computer Interaction; at http://web.njit.edu/~whitwort/hcie-spam.rtf

o    Whitworth, B. (2005), “Social-technical Systems,” in press, Encyclopedia of HCI, Edited Claude Ghaoui. http://brianwhitworth.com/hcie-sts.rtf

o    See Janice C. Sipior, “Should Spam be on the Menu?” Communications of the ACM (CACM 47, 6, June 2004): 59-63.

o    http://www.cdt.org/ - The Center for Democracy and Technology (CDT)

o    http://www.the-dma.org/ - The Direct Marketing Association (DMA)

o    Cost of spam is estimated at over $21 billion, February 2005, National Technology Readiness Survey (NTRS), produced by the Center for Excellence in Service at the University of Maryland Robert H. Smith School of Business and by Rockbridge Associates, Inc., at http://www.bmgt.umd.edu/ntrs/

o    Fraudulent information in e-mail hoax (CNN story): http://www.cnn.com/2003/WORLD/europe/12/30/uk.bankhoax/index.html

o    Cyber-blackmail e-mails (CNN – Reuters story) at http://www.cnn.com/2003/TECH/internet/12/29/cyber.blackmail.reut/index.html

o    Spamming : hearing before the Subcommittee on Communications of the Committee on Commerce, Science, and Transportation, United States, One Hundred Fifth Congress, second session, June 17, 1998.” RMU Libraries Y 4.C73/7:S.HRG.105-1028

o    also: “Spamming, the e-mail you want to can” - hearing before the Subcommittee on Telecommunications, Trade, and Consumer Protection of the Committee on Commerce, House of Representatives, One Hundred Sixth Congress, first session, November 3, 1999." RMU Libraries Y 4.C 73/8:106-84

o    United States. Federal Trade Commission, Division of Marketing Practices, “False claims in spam” -a report by the FTC'S Division of Marketing Practices. Mode of access: Internet from the FTC web site. Address as of 2003-05-16: http://www.ftc.gov/reports/spam/030429spamreport.pdf; current access is available via PURL; call # FT 1.2:2003013771

o    Alan Schwartz and Simon Garfinkel, Stopping spam: Stamping out unwanted email & news postings (O'Reilly, 1998), RMU Libraries 658.478 S399s 1998 Moon

  • Legitimate Information Technology Environments for Virtual Communities

o    Whitworth, B., and deMoor, A. (2003). “Legitimate by design: Towards trusted virtual community environments,” Behaviour & Information Technology 22:1, p31-51; at: http://brianwhitworth.com/legitimacy2002.rtf

  • Disasters and Information Systems - Katrina

o   “Katrina’s total system disruption: How many recovery plans anticipate what actual human beings might do?” From the Analysts, by David L. Margulius, September 09, 2005, The Data Administration Newsletter
http://www.infoworld.com/article/05/09/09/37OPanalysts_1.html

o    Blackengineer.com on Katrina, many interesting articles at: http://www.blackengineer.com/artman/publish/index.shtml

o    Informationweek, “Rebounding from Katrina,” at: http://www.informationweek.com/showArticle.jhtml?articleID=170700744&tid=16033

o    University of California, Hurricane Katrina Aftermath and Recovery Efforts,” at http://www.universityofcalifornia.edu/news/hurricaneexperts.html

o    American Bar Association, “Technology Related Resources for Hurricane Katrina Disaster Relief”, at: http://www.abanet.org/tech/ltrc/katrina.html

  • Spyware:
    • See August 2005 issue of Communications of the ACM (CACM 48, 8) with a focus on Spyware
  • Access to Information Technology:

o    Reaching Out with Technology: Connecting the Low-Income Population to the Financial Mainstream by Steven Davidson: http://www.fanniemaefoundation.org/programs/bb/v3i2-reachingout.shtml

  • Broadcasting Technologies and International Influence on Cultural Diversity

o    - See Harvey B. Feigenbaum, "Digital Entertainment Jumps the Border," Scientific American 288, 3 (March 2003): 78-83. See also Harvey B. Feigenbaum, "Globalization and Cultural Diplomacy" (Center for Arts and Culture), at http://culturalpolicy.org/pdf/globalization.pdf and Ben Goldsmith, Julian Thomas, Tom O'Regan, and Stuart Cunningham, "The Future for Local Content? Options for Emerging Technologies" (Australian Broadcasting Authority), at http://www.aba.gov.au/tv/research/projects/local_cont.htm

  • Use of information technology concepts in dealing with globalization – see

o    Thomas L. Friedman, The Lexus and the Olive Tree: Understanding Globalization (Anchor Books, 2000). Particularly note Friedman's discussions of the electronic herd and DOScapital 6.0. See also: http://www.lexusandtheolivetree.com/
http://www.washingtonmonthly.com/books/ 1999/9906.krugman.lexus.html
http://www.webreview.com/pi/1999/10_08_99.shtml

  • Information Overload - See

o    Ali F. Farhoomand and Dan H. Drury, "Managerial Information Overload," Communications of the ACM 45, 10 (October 2002): 127-131.

RMU C&IS – Updated 11/10/2012