Society and the Computing Profession

Available Speakers on this Topic

Saurabh Bagchi

Brian A. Barsky

Kaveh Bazargan

Michel Beaudouin-Lafon

Erik Brunvand

Margaret Burnett

  • Is our software gender-inclusive?
    Gender inclusiveness in the software workforce is receiving a lot of attention these days, but it overlooks a potentially critical factor—the software itself. Research into how individual...

Tracy K Camp

  • The Incredible Shrinking Pipeline

    The number of Bachelor degrees awarded in Computer Science in the United States reached an all-time high in 2002-03 (57,439), and the trend of women earning a decreasing...

  • What I know now ... that I wish I knew then

     Tracy Camp, a Full Professor of computer science, has received over 20 grants from the National Science Foundation, including a prestigious NSF CAREER award. In total, her projects have received...

Alain Chesnais

  • 3D Content For The Web
    One of the most exciting developments in browser technology is the ability to present and interact with 3D assets in a web page. This talk will focus on the introduction of WebGL since 2011 and...
  • Managing Your ACM Chapter
    Alain Chesnais will talk about his experience working in chapter leadership for the past 25 years. He started out his ACM experience volunteering to stuff envelopes for the Paris chapter in the...

Luca Chittaro

  • Mobile Persuasion for Health and Safety Promotion
    Mobile apps are a very promising tool to promote attitude and behavior change in users. However, creating effective and successful mobile apps for health and safety promotion requires a wealth of multidisciplinary...

Dipankar Dasgupta

  • Coordination in Open Collaboration Communities
    Open collaboration communities produce highly complex work yet lack many of the coordination mechanisms that exist in more traditional organizations. This study examines an open source software community...

Kerstin Dautenhahn

Gianluca Demartini

  • The Power of Big Data
    More and more data is being generated around us by every activity we do in our daily life. Such large amounts of data are changing the way we do things and are used to make data-driven decisions by...

David R Ellis

  • The Law of Cyberspace, Computers, and Technology
    The presentation focuses on the emerging fields of cyberspace and computer and technology law. Included are topics such as the law of the Internet; protection of computer software and technology...

Geraldine Fitzpatrick

Dennis J Frailey

Silvia Giordano

  • The role of Applied Studies
    The applied research is more close to real world than basic research, and for this reason is closer to industry. But, it is also fun and as challenging as basic research. How applied research can be...

Jennifer - Golbeck

Donald Gotterbarn

  • Computer Ethics and Technology
    This talk focuses on computer ethics as it relates to the day to day activities of practicing computer professionals. The emphasis is on real world moral and legal issues for the practicing computer...
  • Software Development: More Than Just Programming
    We are often surprised by the number of non-programming related issues that affect the professional’s efforts to develop quality software and web interfaces. Development efforts are constrained...
  • Unmanaged Risk: Why Systems Don't Work
    The focus on software testing and risk analysis during software development has only had a limited effect in reducing software failures. This talk will present a new approach to the identification of...

Michael Gschwind

Laura M Haas

Vicki L Hanson

  • Inclusive Technologies



    Nearly 1 of every 5 people either currently has a disability or will develop a one in their lifetime.  For these individuals,...
  • The Age Wave

    Are technology difficulties an inescapable fact of ageing?  Or are there factors that can equip future generations of older adults with skills that will erase or...

James A Hendler

James D Herbsleb

Seiji Isotani

Joaquim A Jorge

  • Game Over? New Approaches to Teaching Engineering Courses
    Gamification has been explored recently as a way to promote content delivery in education, yielding promising results. However, little is known regarding how it helps different students experience...
  • How to get your paper rejected from a Computer Graphics Journal
    This is a tongue-in-cheek lecture about what NOT to do to publish a paper in an international scientific journal dedicated to Computer Graphics and Interactive Techniques. Writing papers is Important....
  • The Future of Media Interfaces
    We are living in a post-WIMP world. Indeed, more and more users access information, communicate and operate mobile information appliances foregoing the still common mouse and keyboard of yonder. However,...

Fernando Koch

  • Disruptive Technologies and the Future of Society
    The new generation of technology development -- including Computational intelligence, Cognitive Computing, Internet of Things, Social Computing and Virtual Reality, and others – will disrupt the...
  • Evolution of Digital Education and Impact on Learning Performance
    The evolution of Digital Education focuses on delivering the best quality education for all. The results will be the enhancement of society as a whole, impacting from health to happiness, from markets...
  • Social Applications and Sensible Societies
    In this lecture, we will entice the audience to think of mobile media technologies as a tool to address urban social issues. The explanation will explore the potential of mobile devices, social...
  • The New Era of Cognitive Computing Experience
    In this lecture, we explain the nature of potential new experiences that the era of Cognitive Computing will require.  Historically, human-computer interaction has progressed from machine-oriented,...

Dirk Lewandowski

  • THE POWER OF SEARCH ENGINES
    Search engines are the premier tools when it comes to finding information on the Internet. Newer technological developments show how search is changing from the query-results paradigm to search...

Oge Marques

Jeanna N Matthews

Jacquelyn F Morie

Amit Nanavati

Zoran Obradovic

Sharath Pankanti

  • Actionable Video Content Summarization: Lessons from Practical Case Studies
    For the first time in the history of universe, the video data generated by humans has exceeds all other forms of the data. While no one denies the utility of the information hidden within this...
  • Biometrics
    The determination of identity can be accomplished by three generic means. Conventionally, an exclusive possession (either a physical, e.g., key or electronic, e.g., cookie), knowledge (e.g., password,...
  • Multi-media Compliance: A practical paradigm for managing business integrity
    In virtually every business context there is a need to establish some form of monitoring system to ensure that employees comply with business processes and policies. Compliance failures range from organized...
  • Public Sector Surveillance
    Situation awareness is the key to security. Awareness requires information that spans multiple scales of space and time. The increasing need for sophisticated surveillance systems and the move to a...
  • Retail video analytics
    The retail industry grosses trillions of USD revenue annually worldwide and provides numerous opportunities for innovation to facilitate real-world business operations. Applications include: loss prevention,...

Gyana R Parija

Shrisha Rao

  • Safety Issues in Cyber-Physical Systems
    Computers and software components are now integral to large complex systems in almost all sectors of modern society.  The safety of such systems is therefore dependent upon many components...

Andrzej Rucinski

  • OPPORTUNITY OF INTERNET OF THINGS SEMINAR
    Internet of Things (IoT) is an expanding space for researchers, students, and professionals.  Development of IoT applications is hindered by the lack of available design tools, methodologies,...

Valentina Salapura

  • Innovation at IBM -- Smarter Planet Initiative
    When IBM set its sights on helping to create a smarter planet two years ago, we predicted the evolution of an increasingly instrumented, intelligent and interconnected world. Intelligence is being infused...

Xipeng Shen

Seth Shostak

Biplav Srivastava

Richard Stallman

  • A Free Digital Society: What Makes Digital Inclusion Good Or Bad?
    There are many threats to freedom in the digital society. They include massive surveillance, censorship, digital handcuffs, nonfree software that controls users, and the War on Sharing. Other...
  • Computing, Freedom and Privacy
    The way digital technology is developing, it threatens our freedom, within our computers and in the internet. What are the threats? What must we change?
  • Free Software and Your Freedom
    The Free Software Movement campaigns for computer users' freedom to cooperate and control their own computing. The Free Software Movement developed the GNU operating system, typically used...
  • Should We Have More Surveillance Than The USSR?
    Digital technology has enabled governments to impose surveillance  that Stalin could only dream of, making it next to impossible to talk with a reporter undetected.  This puts democracy...
  • The Danger of Software Patents
    Richard Stallman will explain how software patents obstruct software development. Software patents are patents that cover software ideas. They restrict the development of software, so that every design...

David G. Stork

Harold Thimbleby

  • Creativity, innovation and taking risk in your research
    Most people just “do” research without thinking strategically about their work, their interests and how to do better. What is their plan when a paper or a funding application gets rejected?...
  • Human error is not the problem
    Error, if it was a disease, would be classified as the third biggest killer after cancer and heart disease. Why is it neglected, and what can be done? 

    When...
  • Missed solutions to WWII Enigma design weaknesses
    The German World War II Enigma suffered from design weaknesses that facilitated its large-scale decryption by the British throughout the war. The main technical weaknesses (self-coding and reciprocal...
  • Pirate talks: Getting to great presentations
    Pirates say Arrrrr! This is the best mnemnonic on how to give great presentations: audience, remember, route... 
     
    Pirate Harold Thimbleby explains,...
  • Social network analysis and interactive device design analysis
    All interactive systems respond to what users do by changing what they are doing Ñ though sometimes maybe not in the way you intended! What they were doing before and after any particular user...
  • Unsafe in any bed
    ‘Unsafe At Any Speed’ was the title of Ralph Nader’s damning critique of the 1960s car industry. We are at a similar position with today’s healthcare: Terrible, but quite able...

André Tricot

Ingmar G Weber

  • A Digital Socioscope
    How can Twitter data be used to study individual-level human behavior and social interaction on a global scale? This talk introduces the audience to the methods, opportunities, and challenges...
  • Introduction to Computational Social Science
    Due to the increasing availability of large-scale data on human behavior collected on the social web, as well as advances in analyzing larger and larger data sets, interest in applying computer...
  • Using Social Media for Health Studies
    Given that users share all kinds of minutiae on social media, can this noisy, crowd-sourced data be used for health studies? This talk presents a number of recent examples that show the feasibility...

Bebo White

Tao Xie

Moustafa A Youssef

Demetrios Zeinalipour-Yazti