Sciweavers

149
Voted
SEKE
2010
Springer
15 years 29 days ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li
104
Voted
SEE
2010
Springer
15 years 29 days ago
Development of Role-Play Scenarios for Teaching Responsible Conduct of Research
We describe the development, testing, and formative evaluation of nine role-play scenarios for teaching central topics in the responsible conduct of research to graduate students ...
Bradley J. Brummel, C. K. Gunsalus, Kerri L. Ander...
SEE
2010
Springer
15 years 29 days ago
The Social Nature of Engineering and its Implications for Risk Taking
Making decisions with an, often significant, element of risk seems to be an integral part of many of the projects of the diverse profession of engineering. Whether it be decisions...
Allison Ross, Nafsika Athanassoulis
106
Voted
SEE
2010
Springer
15 years 29 days ago
Managing Dual Use Technology: It Takes Two to Tango
Lalit Kant, D. T. Mourya
123
Voted
SEE
2010
Springer
15 years 29 days ago
Can Instruction in Engineering Ethics Change Students' Feelings about Professional Responsibility?
How can a course on engineering ethics affect an undergraduate student’s feelings of responsibility about moral problems? In this study, three groups of students were interviewed...
Golnaz Hashemian, Michael C. Loui
SEE
2010
Springer
15 years 29 days ago
The Potential Dual Use of Online Pharmacies
The technological advances of the 20th century resulted in the creation of
Slawomir Letkiewicz, Andrzej Górski
101
Voted
SEE
2010
Springer
15 years 29 days ago
The Social Construction of Copyright Ethics and Values
Sheila Slaughter, Gary Rhoades