Conferences related to Public Policy

Back to Top

2014 IEEE International Conference on Systems, Man and Cybernetics - SMC

SMC2014 targets advances in Systems Science and Engineering, Human-Machine Systems, and Cybernetics involving state-of-art technologies interacting with humans to provide an enriching experience and thereby improving the quality of lives including theories, methodologies, and emerging applications.

  • 2013 IEEE International Conference on Systems, Man and Cybernetics - SMC

    SMC 2013 targets advances in Systems Science and Engineering Human-machine Systems and Cybernetics involving state-of-the-art technologies interacting with humans to provide an enriching experience and thereby improving the quality of lives including theories, methodologies and emerging applications.

  • 2012 IEEE International Conference on Systems, Man and Cybernetics - SMC

    Theory, research and technology advances including applications in all aspects of systems science and engineering, human machine systems, and emerging cybernetics.

  • 2011 IEEE International Conference on Systems, Man and Cybernetics - SMC

    Theory, research, and technology advances including applications in all aspects of systems science and engineering, human machine systems, and emerging cybernetics.

  • 2010 IEEE International Conference on Systems, Man and Cybernetics - SMC

    The 2010 IEEE International Conference on Systems, Man, and Cybernetics (SMC2010) provides an international forum that brings together those actively involved in areas of interest to the IEEE Systems, Man, and Cybernetics Society, to report on up-to-the-minute innovations and developments, to summarize the state-of-the-art, and to exchange ideas and advances in all aspects of systems science and engineering, human machine systems, and cybernetics.

  • 2009 IEEE International Conference on Systems, Man and Cybernetics - SMC

    The 2009 IEEE International Conference on Systems, Man, and Cybernetics (SMC2009) provides an international forum that brings together those actively involved in areas of interest to the IEEE Systems, Man, and Cybernetics Society, to report on up-to-the-minute innovations and developments, to summarize the state-of-the-art, and to exchange ideas and advances in all aspects of systems science and engineering, human machine systems, and cybernetics.


OCEANS 2014 - TAIPEI

The OCEANS conference covers all aspects of ocean engineering from physics aspects through development and operation of undersea vehicles and equipment.

  • OCEANS 2013 - NORWAY

    Ocean related technologies. Program includes tutorials, three days of technical papers and a concurrent exhibition. Student poster competition.

  • OCEANS 2012 - YEOSU

    The OCEANS conferences covers four days with tutorials, exhibits and three days of parallel tracks that address all aspects of oceanic engineering.

  • OCEANS 2011 - SPAIN

    All Oceans related technologies.

  • OCEANS 2010 IEEE - Sydney


2013 IEEE International Conference on Intelligence and Security Informatics (ISI)

Intelligence and Security Informatics (ISI) research is an interdisciplinary research field involving academic researchers in information technologies, computer science, public policy, bioinformatics, and social and behavior studies as well as local, state, and federal law enforcement and intelligence experts, and information technology industry consultants and practitioners to support counterterrorism and homeland security missions of anticipation, interdiction, prevention, preparedness and response to terrorist acts. The annual IEEE International ISI Conference series was started in 2003. In 2013, the main conference themes are: Big Data, Emergent Threats and Decision-Making in Security Informatics. ISI 2013 will be organized in three main streams focusing on: Big Data in Security Informatics, Emergent Threats, Decision-Making in Security Informatics.

  • 2012 IEEE International Conference on Intelligence and Security Informatics (ISI 2012)

    Intelligence and Security Informatics (ISI) research is an interdisciplinary research field involving academic researchers in information technologies, computer science, public policy, bioinformatics, and social and behavior studies as well as local, state, and federal law enforcement and intelligence experts, and information technology industry consultants and practitioners, to support counter-terrorism and homeland security missions of anticipation, interdiction, prevention, preparedness and response to terrorist acts.

  • 2011 IEEE International Conference on Intelligence and Security Informatics (ISI 2011)

    Intelligence and Security Informatics (ISI) research is an interdisciplinary research field involving academic researchers in information technologies, computer science, public policy, bioinformatics, medical informatics, and social and behavior studies as well as local, state, and federal law enforcement and intelligence experts, and information technology industry consultants and practitioners to support counterterrorism and homeland security missions of anticipation, interdiction, prevention.

  • 2010 IEEE International Conference on Intelligence and Security Informatics (ISI 2010)

    Intelligence and Security Informatics (ISI) research is an interdisciplinary research field, involving academic researchers in information technologies, computer science, public policy, bioinformatics, medical informatics, and social and behavior studies, local, state, and federal law enforcement and intelligence experts, and information technology industry consultants and practitioners to support counterterrorism and homeland security s missions of anticipation, interdiction, prevention, preparedness and r

  • 2009 IEEE International Conference on Intelligence and Security Informatics (ISI 2009)

    This conference provides a forum for discussion among academic researchers, law enforcment at all levels, and the intelligence community on current research in intelligence and security informatics, which is the study of advanced information technologies and systems, computer science, and algorithms for national and international security-related applications.

  • 2008 IEEE International Conference on Intelligence and Security Informatics (ISI 2008)

    The study of the development and use of advanced information technologies and systems, computer science, and algorithms for national, international, and societal security-related applications, through an integrated technological, organizational, and policy based approach.

  • 2007 IEEE Intelligence and Security Informatics (ISI 2007)

    Informatics research has emerged as a key scientific discipline and applications domain supporting counterterrorism and homeland security's missions of anticipation, interdiction, prevention, preparedness and response to terrorist acts. ISI 2007 provides a forum for discussions among these vital communities: academic researchers (in information technologies, computer science, public policy, and social studies), local, state, and federal law enforcement and intelligence experts.


2013 IEEE International Professional Communication Conference (IPCC 2013)

The theme of the conference is "Beyond Borders: Communicating Globally." Sessons will include empirical studies, workshops, tutorials, and industry applications.


2013 International Conference on Management Science and Engineering (ICMSE)

Management science and engineering, including operations research, organizational systems and behavior, economics and finance, and public administration.


More Conferences

Periodicals related to Public Policy

Back to Top

Circuits and Systems Magazine, IEEE


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Proceedings of the IEEE

The most highly-cited general interest journal in electrical engineering and computer science, the Proceedings is the best way to stay informed on an exemplary range of topics. This journal also holds the distinction of having the longest useful archival life of any EE or computer related journal in the world! Since 1913, the Proceedings of the IEEE has been the ...


Professional Communication, IEEE Transactions on

The study, development, improvement, and promotion of techniques for preparing, organizing for use, processing, editing, collecting, conserving, and disseminating any form of information in the electrical and electronics fields.




Xplore Articles related to Public Policy

Back to Top

A Fairness-Aware and Privacy-Preserving Online Insurance Application System

Aiqing Zhang; Abel Bacchus; Xiaodong Lin 2016 IEEE Global Communications Conference (GLOBECOM), 2016

Due to health information sensitivity, privacy-preserving is a crucial issue in electronic health record systems. Users must provide their health information to insurance companies for their applications. This introduces potential threats to user privacy. In this paper, we propose the fairness- aware and privacy-preserving (FAPP) protocol for online health insurance systems. In the FAPP protocol, a user's health condition is ...


The Next Wave of Innovation: Martinich Masters the Art of Science and Public Policy [Amperes: Current Affairs from Around the World]

Leslie Prives IEEE Women in Engineering Magazine, 2013

Leslie Martinich is constantly looking to catch the next wave of innovation: she?s worked for a variety of start-ups, started her own management consulting firm that guides companies in leading innovation, and spent 2012 serving as the sole IEEE Congressional Fellow in Washington, D.C. In fact, Martinich began innovating at a young age when she acted against the expected societal ...


Problems and Strategies for Performance Evaluation in Public Decision-Making: What Can AHP Do?

Minjuan Lin; Yuan Ma 2011 Fourth International Conference on Business Intelligence and Financial Engineering, 2011

In order to break through the problems of performance evaluation in public decision-making, the Analytic Hierarchy Process (AHP) is used in this paper. With the analysis of operating process of AHP approach, the problems such as difficult presentation of systematic evaluation information, difficult quantification of performance index and difficult realization of effective comprehensive evaluation in performance evaluation can be solved ...


Proposed rules on endangered species and clean water: the impacts on project development

Lowell Rothschild 2015 IEEE-IAS/PCA Cement Industry Conference (IAS/PCA CIC), 2015

Over the course of three weeks in the spring of 2014, the United States Environmental Protection Agency (EPA), Army Corps of Engineers (Corps), U.S. Fish and Wildlife Service (FWS) and National Marine Fisheries Service (NMFS) proposed three new rules and a policy regarding the regulation of water and endangered species. Each proposal on its own represents a significantly change to ...


Birds/bats movement tracking with IR camera for wind farm applications

Lai Wei; Golrokh Mirzaei; Mohammad W. Majid; Mohsin M. Jamali; J. Ross; P. V. Gorsevski; V. P. Bingman 2014 IEEE International Symposium on Circuits and Systems (ISCAS), 2014

Nocturnally migratory birds and bats are at higher risk of colliding with wind turbines. It is important to gather scientific data in an area which have potential of wind farm development. An IR camera recording and its analysis can provide necessary information to wildlife biologists involve with interaction of birds/bats with wind turbines. An efficient IR video processing algorithm has ...


More Xplore Articles

Educational Resources on Public Policy

Back to Top

eLearning

A Fairness-Aware and Privacy-Preserving Online Insurance Application System

Aiqing Zhang; Abel Bacchus; Xiaodong Lin 2016 IEEE Global Communications Conference (GLOBECOM), 2016

Due to health information sensitivity, privacy-preserving is a crucial issue in electronic health record systems. Users must provide their health information to insurance companies for their applications. This introduces potential threats to user privacy. In this paper, we propose the fairness- aware and privacy-preserving (FAPP) protocol for online health insurance systems. In the FAPP protocol, a user's health condition is ...


The Next Wave of Innovation: Martinich Masters the Art of Science and Public Policy [Amperes: Current Affairs from Around the World]

Leslie Prives IEEE Women in Engineering Magazine, 2013

Leslie Martinich is constantly looking to catch the next wave of innovation: she?s worked for a variety of start-ups, started her own management consulting firm that guides companies in leading innovation, and spent 2012 serving as the sole IEEE Congressional Fellow in Washington, D.C. In fact, Martinich began innovating at a young age when she acted against the expected societal ...


Problems and Strategies for Performance Evaluation in Public Decision-Making: What Can AHP Do?

Minjuan Lin; Yuan Ma 2011 Fourth International Conference on Business Intelligence and Financial Engineering, 2011

In order to break through the problems of performance evaluation in public decision-making, the Analytic Hierarchy Process (AHP) is used in this paper. With the analysis of operating process of AHP approach, the problems such as difficult presentation of systematic evaluation information, difficult quantification of performance index and difficult realization of effective comprehensive evaluation in performance evaluation can be solved ...


Proposed rules on endangered species and clean water: the impacts on project development

Lowell Rothschild 2015 IEEE-IAS/PCA Cement Industry Conference (IAS/PCA CIC), 2015

Over the course of three weeks in the spring of 2014, the United States Environmental Protection Agency (EPA), Army Corps of Engineers (Corps), U.S. Fish and Wildlife Service (FWS) and National Marine Fisheries Service (NMFS) proposed three new rules and a policy regarding the regulation of water and endangered species. Each proposal on its own represents a significantly change to ...


Birds/bats movement tracking with IR camera for wind farm applications

Lai Wei; Golrokh Mirzaei; Mohammad W. Majid; Mohsin M. Jamali; J. Ross; P. V. Gorsevski; V. P. Bingman 2014 IEEE International Symposium on Circuits and Systems (ISCAS), 2014

Nocturnally migratory birds and bats are at higher risk of colliding with wind turbines. It is important to gather scientific data in an area which have potential of wind farm development. An IR camera recording and its analysis can provide necessary information to wildlife biologists involve with interaction of birds/bats with wind turbines. An efficient IR video processing algorithm has ...


More eLearning Resources

IEEE-USA E-Books

  • Privacy and Data Protection

    This chapter contains sections titled: Public Policy Objectives, Types of Code Regulation, Institutional Political Economy, Outcomes

  • Copyrights

    This chapter contains sections titled: Public Policy Objectives, Types of Code Regulation, Institutional Political Economy, Outcomes

  • Differing Regulatory Treatment of Access Modes

    Until the 1980s, it was presumed that technical change in most communications services could easily be monitored from centralized state and federal agencies. This presumption was long outdated prior to the commercialization of the Internet. With the Internet, the long-forecast convergence of voice, video, and text bits became a reality. Legislation, capped by the Telecommunications Act of 1996, created new quasi-standards such as "fair" and "reasonable" for the FCC and courts to apply, leading to nonstop litigation and occasional gridlock.This book addresses some of the many telecommunications areas on which public policy makers, corporate strategists, and social activists must reach agreement. Topics include the regulation of access, Internet architecture in a commercial era, communications infrastructure development, the Digital Divide, and information policy issues such as intellectual property and the retransmission of TV programming via the Internet.

  • Censors

    This chapter contains sections titled: Public Policy and Market Failure, Types of Code Regulation, Institutional Political Economy, Outcomes

  • Social Networking Services

    This chapter contains sections titled: Public Policy and Market Failure, Types of Code Regulation, User-Generated Regulation, Institutional Political Economy, Outcomes and Divergences

  • The Case for Free Trade

    This chapter contains sections titled: Questions of Approach, Criteria for Assessing Public Policy toward the Auto Industry, Conclusions on Public Policy Options, Summary, Acknowledgments

  • Public Health Campaigns

    Public health campaigns are a specific type of care communication that are almost ubiquitous. They are designed to prompt long‐term changes in knowledge, attitudes, behaviors, and, sometimes, public policy. This chapter presents some guidelines based on research and best practices for public health campaigns. Understanding the goal of the campaign drives the communication plan, including measurements of effectiveness. Formative research is used to form the communication, helping designers choose content, format, and delivery strategies through participatory design. It is important to use several channels, such as the news media, paid placements, independent coverage, and online venues, to ensure that the information is reaching those at risk. The chapter also discusses evaluation methods for public health campaigns.

  • The Evolution of Legal Rights

    The contributors to this volume examine issues raised by the intersection of new communications technologies and public policy in this post-boom, post-bust era. Originally presented at the 30th Research Conference on Communication, Information, and Internet Policy (TPRC 2002)--traditionally a showcase for the best academic research on this topic--their work combines hard data and deep analysis to explore the dynamic interplay between technological development and society.The chapters in the first section consider the ways society conceptualizes new information technologies and their implications for law and policy, examining the common metaphor of "cyberspace as place," alternative definitions of the Internet, the concept of a namespace, and measures of diffusion. The chapters in the second section discuss how technological change may force the rethinking of legal rights; topics considered include spectrum rights, intellectual property, copyright and "paracopyright," and the abridgement of constitutional rights by commercial rights in ISP rules. Chapters in the third and final section examine the constant adjustment and reinterpretation of regulations in response to technological change, considering, among other subjects, liability regimes for common carriers and the 1996 detariffing rule, privacy and enhanced 911, and the residual effect of state ownership on privatized telecommunication carriers. The policy implications of Rethinking Rights and Regulations are clear: major institutional changes may be the necessary response to major advances in telecommunications technology.

  • Issues across Borders

    Today millions of technologically empowered individuals are able to participate freely in international transactions and enterprises, social and economic. These activities are governed by national and local laws designed for simpler times and now challenged by a new technological and market environment as well as by the practicalities and politics of enforcement across national boundaries.Borders in Cyberspace investigates issues arising from national differences in law, public policy, and social and cultural values as these differences are reformulated in the emerging global information infrastructure. The contributions include detailed analyses of some of the most visible issues, including intellectual property, security, privacy, and censorship.

  • About the Editor

    "In SOCIAL, ETHICAL, AND POLICY IMPLICATIONS OF ENGINEERING, engineers, faculty, and students will find an informative guide to the professional, societal, and ethical responsibilities that face practicing engineers today. Through an integrated approach to the theory of engineering ethics and practical real-world issues, this comprehensive book offers readers an in- depth analysis of technology's current social role. Drawing on readings and case studies first published in IEEE Technology and Society Magazine, this easy-to-read text will develop readers' understanding of the important issues surrounding ""macroethical"" public policy debates, including discussions of sustainable development, public health, risk and product liability, and telecommunications. These cases and readings also provide an opportunity to apply the theory in real-world situations. SOCIAL, ETHICAL, AND POLICY IMPLICATIONS OF ENGINEERING will help students meet the new accreditation criteria for engineering adopted by the Accreditation Board for Engineering and Technology (ABET). In addition, contemporary issues presented in this far- reaching book will allow students and practicing engineers to gain greater insight into how social and ethical concerns shape contributions to the engineering field. For more information and related articles go towww4.ncsu.edu/unity/users/j/jherkert/jrh.html Professors: To request an examination copy simply e-mail collegeadoption@ieee.org." Sponsored by: IEEE Social Implications of Technology Society



Standards related to Public Policy

Back to Top

No standards are currently tagged "Public Policy"


Jobs related to Public Policy

Back to Top