prev / next
Back to Home
katina-150-150.png
14
About
cfp2.jpg
107
Call for Papers
editor2.jpg
2
Editor
jai.gif
1
Emerging Tech Series
24-MICHAUD-SHIELDS-image01.jpg
22
SINS16
20151110_193325.jpg
0
End-user Vulnerability
cybernetics.png
0
Cybernetics
cslr.gif
0
LBS Regulation
theconversation2.jpg
1
Defence and Tech
privacy.jpg
2
Privacy Networked
mindshift.jpg
7
Human Machine
dollars and bytes.jpg
2
Dollar Bytes
rfid magic.png
0
RFID and Privacy
wearable.png
0
Wearables
irie.png
1
IOT Ethics
Uberveillance music.jpg
3
In the Cloud
ethics in bio.jpg
0
Pervasive-Tech Issues
lsa download.jpg
0
Drones and Kills Lists
Catapult Brochure.jpeg
0
Youth and Technology
DMMDI_Symposium.jpg
1
Data-driven Decisions
fst media2.jpg
0
Financial Services Tech
uberveillance_front_cover.jpg
2
Uberveillance
iqv2.jpg
3
Tech Enslavement
the computer after me.jpg
0
Autonomic Systems
qsymp.jpg
2
QSymposium
commsacm.jpg
1
Limits to Watching
ieecomp.jpg
5
Big Data
telematics and engineering.gif
0
Mobile Government
informa.jpg
0
Police Technology
amient intel.png
0
User Acceptance of LBS
1000w.jpg
0
Emerging Tech
drone forum.jpg
1
Pros and Cons of Drones
Google_Glass.jpg
2
ISTAS13
tedx.jpg
4
Microchip People
centennial.png
0
Social Implications
transformation.png
0
AIDC Technology
this pervasive day.jpg
1
Pervasive Computing
ICT ethics.png
0
ICT Ethics
ecr.jpg
0
LBS in Emergencies
aware.png
0
Smart Surveillance
JITR.png
0
Government LBS
TLBS_185_262.jpg
0
Social Issues in LBS
igu.png
0
Mobile Alerts in Emergencies
Proceedings_IEEE_001.jpg
0
RFID Innovation
cross border law enforcement.jpg
0
Cross-Border Law
istas10_implant.jpg
11
ISTAS10
download2010.jpg
0
Covert Policing
uber.png
1
Sur/Uber(veillance)
perada.jpg
0
Implant Implications
illicit.jpg
0
Mobile Social Networking
fidis.jpg
0
ID and Citizenship
autoID_lbs_front_cover.jpg
3
Automatic Identification
wires.png
0
Women in Engineering
resilience.png
0
Resilience
uic.jpg
0
Inventory Challenges
hicssdownload.jpg
0
RFID Inventory Control
ecis2009.png
0
ERP Investment Decisions
CES-EU-flag200-100_0.jpg
0
High Tech Policing
anzsoc.jpg
0
Tracking Prison Inmates
quadMarch2009.jpg
0
Social Media and Suicide
aupov.png
0
Implications of Veillance
ibm.jpg
0
Privacy Value Control
computercommunications.gif
2
Advanced LBS
designdownload.jpg
0
RFID Warehouse Optimisation
winmecimages.jpg
0
RFID Investment Decisions
you are ere.jpg
0
Location Privacy
IJEBscoverijeb.jpg
0
Visibility RFID and SMEs
esociety.jpg
0
Social Information Security
etiv2.png
0
Verichip
2009.jpg
0
Evidence-Based Policy
JCIT.png
0
Knowledge Management
jtaer.jpg
1
RFID in SCM
set07.png
0
Emergency Management
eurasia.jpg
0
Barriers to RFID Adoption
terraincognita.jpg
0
Location Tech and Privacy
2008.jpg
0
Data/Uber(Veillance)
innovation.png
0
Homo Electricus
infoethics.jpg
0
Ethics and Security
CPRO.jpg
2
National Security
safeguardingoz.png
0
AVIAN Flu Tracker
gps+tracking.jpg
0
Location Intel GPS Tracking
images.png
0
Privacy-Security in LBS
ecra.jpg
0
Microchip implants
homelad sec.jpg
0
Positioning Tech in Defense
2006.jpg
0
Information Security
catac06.jpg
0
Chipification and Body Art
rise of electrophorus.jpg
0
Rise of Electrophorus
icmit2.png
0
Auto-ID Coexistence
gov news.jpg
0
ID Tech in Public Admin
rnsa_logo.jpg
7
RNSA
step.png
0
Doctoral Student Mentoring
indigenous and IT.jpg
0
Tech for Preserving Culture
annual research seminar.jpg
0
Hierarchical Positioning
wmsci.jpg
0
Digital Aid Framework
icebe.jpg
0
Precise Location Services
germany workshop.png
0
Humancentric RFID Implants
ICMB05.png
0
Pros/Cons of RFID in SCM
proceedings icecr7.gif
0
Socio-Cultural-Religio ID
engineering and digital.png
0
LBS Catalyst
collecter.png
0
Auto-ID Selection