Conferences related to Public Policy

Back to Top

2014 IEEE International Conference on Systems, Man and Cybernetics - SMC

SMC2014 targets advances in Systems Science and Engineering, Human-Machine Systems, and Cybernetics involving state-of-art technologies interacting with humans to provide an enriching experience and thereby improving the quality of lives including theories, methodologies, and emerging applications.

  • 2013 IEEE International Conference on Systems, Man and Cybernetics - SMC

    SMC 2013 targets advances in Systems Science and Engineering Human-machine Systems and Cybernetics involving state-of-the-art technologies interacting with humans to provide an enriching experience and thereby improving the quality of lives including theories, methodologies and emerging applications.

  • 2012 IEEE International Conference on Systems, Man and Cybernetics - SMC

    Theory, research and technology advances including applications in all aspects of systems science and engineering, human machine systems, and emerging cybernetics.

  • 2011 IEEE International Conference on Systems, Man and Cybernetics - SMC

    Theory, research, and technology advances including applications in all aspects of systems science and engineering, human machine systems, and emerging cybernetics.

  • 2010 IEEE International Conference on Systems, Man and Cybernetics - SMC

    The 2010 IEEE International Conference on Systems, Man, and Cybernetics (SMC2010) provides an international forum that brings together those actively involved in areas of interest to the IEEE Systems, Man, and Cybernetics Society, to report on up-to-the-minute innovations and developments, to summarize the state-of-the-art, and to exchange ideas and advances in all aspects of systems science and engineering, human machine systems, and cybernetics.

  • 2009 IEEE International Conference on Systems, Man and Cybernetics - SMC

    The 2009 IEEE International Conference on Systems, Man, and Cybernetics (SMC2009) provides an international forum that brings together those actively involved in areas of interest to the IEEE Systems, Man, and Cybernetics Society, to report on up-to-the-minute innovations and developments, to summarize the state-of-the-art, and to exchange ideas and advances in all aspects of systems science and engineering, human machine systems, and cybernetics.


OCEANS 2014 - TAIPEI

The OCEANS conference covers all aspects of ocean engineering from physics aspects through development and operation of undersea vehicles and equipment.

  • OCEANS 2013 - NORWAY

    Ocean related technologies. Program includes tutorials, three days of technical papers and a concurrent exhibition. Student poster competition.

  • OCEANS 2012 - YEOSU

    The OCEANS conferences covers four days with tutorials, exhibits and three days of parallel tracks that address all aspects of oceanic engineering.

  • OCEANS 2011 - SPAIN

    All Oceans related technologies.

  • OCEANS 2010 IEEE - Sydney


2013 IEEE International Conference on Intelligence and Security Informatics (ISI)

Intelligence and Security Informatics (ISI) research is an interdisciplinary research field involving academic researchers in information technologies, computer science, public policy, bioinformatics, and social and behavior studies as well as local, state, and federal law enforcement and intelligence experts, and information technology industry consultants and practitioners to support counterterrorism and homeland security missions of anticipation, interdiction, prevention, preparedness and response to terrorist acts. The annual IEEE International ISI Conference series was started in 2003. In 2013, the main conference themes are: Big Data, Emergent Threats and Decision-Making in Security Informatics. ISI 2013 will be organized in three main streams focusing on: Big Data in Security Informatics, Emergent Threats, Decision-Making in Security Informatics.

  • 2012 IEEE International Conference on Intelligence and Security Informatics (ISI 2012)

    Intelligence and Security Informatics (ISI) research is an interdisciplinary research field involving academic researchers in information technologies, computer science, public policy, bioinformatics, and social and behavior studies as well as local, state, and federal law enforcement and intelligence experts, and information technology industry consultants and practitioners, to support counter-terrorism and homeland security missions of anticipation, interdiction, prevention, preparedness and response to terrorist acts.

  • 2011 IEEE International Conference on Intelligence and Security Informatics (ISI 2011)

    Intelligence and Security Informatics (ISI) research is an interdisciplinary research field involving academic researchers in information technologies, computer science, public policy, bioinformatics, medical informatics, and social and behavior studies as well as local, state, and federal law enforcement and intelligence experts, and information technology industry consultants and practitioners to support counterterrorism and homeland security missions of anticipation, interdiction, prevention.

  • 2010 IEEE International Conference on Intelligence and Security Informatics (ISI 2010)

    Intelligence and Security Informatics (ISI) research is an interdisciplinary research field, involving academic researchers in information technologies, computer science, public policy, bioinformatics, medical informatics, and social and behavior studies, local, state, and federal law enforcement and intelligence experts, and information technology industry consultants and practitioners to support counterterrorism and homeland security s missions of anticipation, interdiction, prevention, preparedness and r

  • 2009 IEEE International Conference on Intelligence and Security Informatics (ISI 2009)

    This conference provides a forum for discussion among academic researchers, law enforcment at all levels, and the intelligence community on current research in intelligence and security informatics, which is the study of advanced information technologies and systems, computer science, and algorithms for national and international security-related applications.

  • 2008 IEEE International Conference on Intelligence and Security Informatics (ISI 2008)

    The study of the development and use of advanced information technologies and systems, computer science, and algorithms for national, international, and societal security-related applications, through an integrated technological, organizational, and policy based approach.

  • 2007 IEEE Intelligence and Security Informatics (ISI 2007)

    Informatics research has emerged as a key scientific discipline and applications domain supporting counterterrorism and homeland security's missions of anticipation, interdiction, prevention, preparedness and response to terrorist acts. ISI 2007 provides a forum for discussions among these vital communities: academic researchers (in information technologies, computer science, public policy, and social studies), local, state, and federal law enforcement and intelligence experts.


2013 IEEE International Professional Communication Conference (IPCC 2013)

The theme of the conference is "Beyond Borders: Communicating Globally." Sessons will include empirical studies, workshops, tutorials, and industry applications.


2013 International Conference on Management Science and Engineering (ICMSE)

Management science and engineering, including operations research, organizational systems and behavior, economics and finance, and public administration.


More Conferences

Periodicals related to Public Policy

Back to Top

Circuits and Systems Magazine, IEEE


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Proceedings of the IEEE

The most highly-cited general interest journal in electrical engineering and computer science, the Proceedings is the best way to stay informed on an exemplary range of topics. This journal also holds the distinction of having the longest useful archival life of any EE or computer related journal in the world! Since 1913, the Proceedings of the IEEE has been the ...


Professional Communication, IEEE Transactions on

The study, development, improvement, and promotion of techniques for preparing, organizing for use, processing, editing, collecting, conserving, and disseminating any form of information in the electrical and electronics fields.




Xplore Articles related to Public Policy

Back to Top

A modest proposal: licensing personal computers and Internet service providers

C. Ray IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003., 2003

As the threat to the Internet at large from poorly configured or maintained personal computers continues to increase it is increasingly important to consider ways to 'harden' these machines. By adopting a model based on the already familiar requirement for licensing and safety checks for individually owned vehicles operated on public thoroughfares, it may be possible to facilitate the public ...


On Developing Policies to Improve Technological Innovation and Productivity in the United States

R. W. House; C. H. Kimzey; T. Nash IEEE Transactions on Systems, Man, and Cybernetics, 1979

Technological innovation and productivity are important for a number of reasons and especially for their influence on inflation and on the competitiveness of a nation's goods in world markets. Technological innovation is a complex process dependent on a large number of essential elements. Public policies aimed at improving technological innovation and productivity should include consideration of these elements individually and ...


Cable: a flexible transport infrastructure for PCS

S. D. Dukes 1992 IEEE International Conference on Selected Topics in Wireless Communications, 1992

Cable is a transport medium capable of providing a full range of narrowband and broadband applications. With the advent of hybrid fiber/coax transport facilities, cable is positioned to provide a transport medium superior to the telephone company local loop for broadband applications. Personal communications services (PCS) is a specific application that has caused the cable television industry to examine several ...


Electric Vehicle Penetration Model Considering Policy Subsidy and Fuel Price Uncertainty

D. Yamashita; Y. Daisho; D. Satoya; H. Takamori; R. Yokoyama 2014 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology, 2014

In this paper, the authors present the estimation of plug-in electric vehicle (PEV) market growth including the uncertainty of gasoline price fluctuation. The authors earlier have developed a model to estimate the market penetration of electric vehicles considering such factors as vehicle prices and availability of quick charging facilities. The optimization of public policy initiatives to support the market growth, ...


A System Dynamics Model of the Interaction of Aviation Logistics with Regional Economy Development in Guangxi Faced to CAFTA

Changzheng Zheng; Zhixue Liu; Chen Wang; Xiaojing Wang; Binbin Xu 2009 International Conference on E-Business and Information System Security, 2009

On the basis of qualitative analysis we develop a system dynamics model of the interaction of aviation logistics with regional economy development in Guangxi faced to CAFTA. The entire system is divided into five sub-systems, namely regional economy sub-system, aviation logistics demand subsystem, aviation logistics supply sub-system, trade of China-ASEAN sub-system, public policies sub-system. By using this model, we simulate ...


More Xplore Articles

Educational Resources on Public Policy

Back to Top

eLearning

A modest proposal: licensing personal computers and Internet service providers

C. Ray IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003., 2003

As the threat to the Internet at large from poorly configured or maintained personal computers continues to increase it is increasingly important to consider ways to 'harden' these machines. By adopting a model based on the already familiar requirement for licensing and safety checks for individually owned vehicles operated on public thoroughfares, it may be possible to facilitate the public ...


On Developing Policies to Improve Technological Innovation and Productivity in the United States

R. W. House; C. H. Kimzey; T. Nash IEEE Transactions on Systems, Man, and Cybernetics, 1979

Technological innovation and productivity are important for a number of reasons and especially for their influence on inflation and on the competitiveness of a nation's goods in world markets. Technological innovation is a complex process dependent on a large number of essential elements. Public policies aimed at improving technological innovation and productivity should include consideration of these elements individually and ...


Cable: a flexible transport infrastructure for PCS

S. D. Dukes 1992 IEEE International Conference on Selected Topics in Wireless Communications, 1992

Cable is a transport medium capable of providing a full range of narrowband and broadband applications. With the advent of hybrid fiber/coax transport facilities, cable is positioned to provide a transport medium superior to the telephone company local loop for broadband applications. Personal communications services (PCS) is a specific application that has caused the cable television industry to examine several ...


Electric Vehicle Penetration Model Considering Policy Subsidy and Fuel Price Uncertainty

D. Yamashita; Y. Daisho; D. Satoya; H. Takamori; R. Yokoyama 2014 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology, 2014

In this paper, the authors present the estimation of plug-in electric vehicle (PEV) market growth including the uncertainty of gasoline price fluctuation. The authors earlier have developed a model to estimate the market penetration of electric vehicles considering such factors as vehicle prices and availability of quick charging facilities. The optimization of public policy initiatives to support the market growth, ...


A System Dynamics Model of the Interaction of Aviation Logistics with Regional Economy Development in Guangxi Faced to CAFTA

Changzheng Zheng; Zhixue Liu; Chen Wang; Xiaojing Wang; Binbin Xu 2009 International Conference on E-Business and Information System Security, 2009

On the basis of qualitative analysis we develop a system dynamics model of the interaction of aviation logistics with regional economy development in Guangxi faced to CAFTA. The entire system is divided into five sub-systems, namely regional economy sub-system, aviation logistics demand subsystem, aviation logistics supply sub-system, trade of China-ASEAN sub-system, public policies sub-system. By using this model, we simulate ...


More eLearning Resources

IEEE-USA E-Books

  • The Virtual Displaces the Physical

    This chapter contains sections titled: From Circuits to Packets Lies, Damn Lies and Statistical Access Networks Moore's Law Finally Reaches Telecom The New Broadband Eclipses Neo Broadband Regulatory and Public Policy Collide with Technology Shifts References

  • References

    The idea of the "digital divide," the great social division between information haves and have-nots, has dominated policy debates and scholarly analysis since the 1990s. In Working-Class Network Society, Jack Linchuan Qiu describes a more complex social and technological reality in a newly mobile, urbanizing China. Qiu argues that as inexpensive Internet and mobile phone services become available and are closely integrated with the everyday work and life of low-income communities, they provide a critical seedbed for the emergence of a new working class of "network labor" crucial to China's economic boom. Between the haves and have-nots, writes Qiu, are the information "have-less": migrants, laid-off workers, micro-entrepreneurs, retirees, youth, and others, increasingly connected by cybercafés, prepaid service, and used mobile phones. A process of class formation has begun that has important implications for working-class network society in China and beyond. Qiu brings class back into the scholarly discussion, not as a secondary factor but as an essential dimension in our understanding of communication technology as it is shaped in the vast, industrializing society of China. Basing his analysis on his more than five years of empirical research conducted in twenty cities, Qiu examines technology and class, networked connectivity and public policy, in the context of massive urban reforms that affect the new working class disproportionately. The transformation of Chinese society, writes Qiu, is emblematic of the new technosocial reality emerging in much of the Global South.

  • Index

    Today millions of technologically empowered individuals are able to participate freely in international transactions and enterprises, social and economic. These activities are governed by national and local laws designed for simpler times and now challenged by a new technological and market environment as well as by the practicalities and politics of enforcement across national boundaries.Borders in Cyberspace investigates issues arising from national differences in law, public policy, and social and cultural values as these differences are reformulated in the emerging global information infrastructure. The contributions include detailed analyses of some of the most visible issues, including intellectual property, security, privacy, and censorship.

  • References

    Emerging biotechnologies that manipulate human genetic material have drawn a chorus of objections from politicians, pundits, and scholars. In Humanity Enhanced, Russell Blackford eschews the heated rhetoric that surrounds genetic enhancement technologies to examine them in the context of liberal thought, discussing the public policy issues they raise from legal and political perspectives. Some see the possibility of genetic choice as challenging the values of liberal democracy. Blackford argues that the challenge is not, as commonly supposed, the urgent need for a strict regulatory action. Rather, the challenge is that fear of these technologies has created an atmosphere in which liberal tolerance itself is threatened. Focusing on reproductive cloning, pre-implantation genetic diagnosis of embryos, and genetic engineering, Blackford takes on objections to enhancement technologies (raised by Jürgen Habermas and others) based on such concerns as individual autonomy and distributive justice. He argues that some enhancements would be genuinely beneficial, and that it would be justified in some circumstances even to exert pressure on parents to undertake genetic modification of embryos. Blackford argues against draconian suppression of human enhancement, although he acknowledges that some specific and limited regulation may be required in the future. More generally, he argues, liberal democracies would demonstrate liberal values by tolerating and accepting the emerging technologies of genetic choice.

  • Censors

    This chapter contains sections titled: Public Policy and Market Failure, Types of Code Regulation, Institutional Political Economy, Outcomes

  • Index

    The idea of the "digital divide," the great social division between information haves and have-nots, has dominated policy debates and scholarly analysis since the 1990s. In Working-Class Network Society, Jack Linchuan Qiu describes a more complex social and technological reality in a newly mobile, urbanizing China. Qiu argues that as inexpensive Internet and mobile phone services become available and are closely integrated with the everyday work and life of low-income communities, they provide a critical seedbed for the emergence of a new working class of "network labor" crucial to China's economic boom. Between the haves and have-nots, writes Qiu, are the information "have-less": migrants, laid-off workers, micro-entrepreneurs, retirees, youth, and others, increasingly connected by cybercafés, prepaid service, and used mobile phones. A process of class formation has begun that has important implications for working-class network society in China and beyond. Qiu brings class back into the scholarly discussion, not as a secondary factor but as an essential dimension in our understanding of communication technology as it is shaped in the vast, industrializing society of China. Basing his analysis on his more than five years of empirical research conducted in twenty cities, Qiu examines technology and class, networked connectivity and public policy, in the context of massive urban reforms that affect the new working class disproportionately. The transformation of Chinese society, writes Qiu, is emblematic of the new technosocial reality emerging in much of the Global South.

  • Index

    Emerging biotechnologies that manipulate human genetic material have drawn a chorus of objections from politicians, pundits, and scholars. In Humanity Enhanced, Russell Blackford eschews the heated rhetoric that surrounds genetic enhancement technologies to examine them in the context of liberal thought, discussing the public policy issues they raise from legal and political perspectives. Some see the possibility of genetic choice as challenging the values of liberal democracy. Blackford argues that the challenge is not, as commonly supposed, the urgent need for a strict regulatory action. Rather, the challenge is that fear of these technologies has created an atmosphere in which liberal tolerance itself is threatened. Focusing on reproductive cloning, pre-implantation genetic diagnosis of embryos, and genetic engineering, Blackford takes on objections to enhancement technologies (raised by Jürgen Habermas and others) based on such concerns as individual autonomy and distributive justice. He argues that some enhancements would be genuinely beneficial, and that it would be justified in some circumstances even to exert pressure on parents to undertake genetic modification of embryos. Blackford argues against draconian suppression of human enhancement, although he acknowledges that some specific and limited regulation may be required in the future. More generally, he argues, liberal democracies would demonstrate liberal values by tolerating and accepting the emerging technologies of genetic choice.

  • Engineering Ethics and Public Policy

    "In SOCIAL, ETHICAL, AND POLICY IMPLICATIONS OF ENGINEERING, engineers, faculty, and students will find an informative guide to the professional, societal, and ethical responsibilities that face practicing engineers today. Through an integrated approach to the theory of engineering ethics and practical real-world issues, this comprehensive book offers readers an in- depth analysis of technology's current social role. Drawing on readings and case studies first published in IEEE Technology and Society Magazine, this easy-to-read text will develop readers' understanding of the important issues surrounding ""macroethical"" public policy debates, including discussions of sustainable development, public health, risk and product liability, and telecommunications. These cases and readings also provide an opportunity to apply the theory in real-world situations. SOCIAL, ETHICAL, AND POLICY IMPLICATIONS OF ENGINEERING will help students meet the new accreditation criteria for engineering adopted by the Accreditation Board for Engineering and Technology (ABET). In addition, contemporary issues presented in this far- reaching book will allow students and practicing engineers to gain greater insight into how social and ethical concerns shape contributions to the engineering field. For more information and related articles go towww4.ncsu.edu/unity/users/j/jherkert/jrh.html Professors: To request an examination copy simply e-mail collegeadoption@ieee.org." Sponsored by: IEEE Social Implications of Technology Society

  • What Public Policy Pitfalls Can Be Avoided in the Development and Regulation of Nanotechnology?

    Advances in physics, molecular biology, and computer science are converging on the capacity to control, with molecular precision, the structure and function of matter. These twenty original contributions provide the first broad-based multidisciplinary definition and examination of the revolutionary new discipline of molecular engineering, or nanotechnology. They address both the promise as well as the economic, environmental, and cultural challenges of this emerging atomic-scale technology.Leaders in their field describe current technologies that feed into nanotechnology - atomic imaging and positioning, protein engineering, and the de novo, design and synthesis of self-assembling molecular structures. They present development strategies for coordinating recent work in chemistry, biotechnology, and scanning-probe microscopy in order to successfully design and engineer molecular systems. They also explore advances in molecular and quantum electronics as well as reversible computational systems and the fundamental physical constraints on computation. Additional chapters discuss research efforts in Japan and present the prospects of nanotechnology as seen from the perspective of a microtechnologist.The final section looks at the implications of success, including the prospects of enormous computational power and the radical consequences of molecular mechanical systems in the fields of medicine and life extension.BC Crandall is Cofounder and Vice President of Prime Arithmetics, Inc.Contributors: Robert Birge. Federico Capasso. BC Crandall. K. Eric Drexler. Gregory Fahy. Richard Feynman. John Foster. Tracy Handel. Bill Joy. Arthur Kantrowitz. Joseph Mallon. Norman Margolus. Ralph Merkle. Lester Milbrath. Gordon Tullock. Hiroyuki Sasabe. Michael Ward.

  • Index

    Design structure matrix (DSM) is a straightforward and flexible modeling technique that can be used for designing, developing, and managing complex systems. DSM offers network modeling tools that represent the elements of a system and their interactions, thereby highlighting the system's architecture (or designed structure). Its advantages include compact format, visual nature, intuitive representation, powerful analytical capacity, and flexibility. Used primarily so far in the area of engineering management, DSM is increasingly being applied to complex issues in health care management, financial systems, public policy, natural sciences, and social systems. This book offers a clear and concise explanation of DSM methods for practitioners and researchers. The book's four sections correspond to the four primary types of DSM models, offering tools for representing product architectures, organization architectures, process architectures, and multidomain architectures (which combine different types of DSM models to represent multiple domains simultaneously). In each section, a chapter introducing the technique is followed by a chapter of examples showing a variety of applications of that DSM type. The forty-four applications represent a wide range of industries (including automotive, aerospace, electronics, building, and pharmaceutical), countries (among them Australia, Germany, Japan, Turkey, and the United States), and problems addressed (modularity, outsourcing, system integration, knowledge management, and others).



Standards related to Public Policy

Back to Top

No standards are currently tagged "Public Policy"


Jobs related to Public Policy

Back to Top