The John Glenn Commission on Education pushes for the biggest change in public education in 200 years.Elliot Soloway, Cathleen Norris, Phyllis Blumenfeld, Ron Marx, Joe Krajcik, Barry Fishman Pages 15-19
How can technology be engineered to inspire user trust? How can businesses, consumers, and individuals employ that trustwithout destroying itfor the sake of their human relationships?Andrew Rosenbloom Pages 31-32
Trust can be cultivated to enhance our personal and social lives and increase our social capital.Batya Friedman, Peter H. Khan, Daniel C. Howe Pages 34-40
The depth of participants' trust and trustworthiness depends on how the medium transmits and translates the social experience, including its often unviewable cultural and personal cues.Judith S. Olson, Gary M. Olson Pages 41-44
For buyers and sellers alike, there's no better way to earn one another's trust in online interactions.Paul Resnick, Ko Kuwabara, Richard Zeckhauser, Eric Friedman Pages 45-48
Humans gradually learn to trust embodied interface agents that use the same social cues people use, including interaction rituals like small talk.Justine Cassell, Timothy Bickmore Pages 50-56
These principles and their guidelines enhance cooperative behaviors and win user/customer loyalty by giving assurances, references, certifications from third parties, and guarantees of privacy and security.Ben Shneiderman Pages 57-59
The Internet neither destroys nor creates social capital. Sometimes trust matters, sometimes it doesn't in our technology-mediated relationships.Eric M. Uslaner Pages 60-64
A conceptual framework for understanding the needs and concerns of different stakeholders.Sara Jones, Marc Wilikens, Philip Morris, Marcelo Masera Pages 81-87
Software piracy accounts for billions of dollars in lost sales. But for many nations, U.S. price tags make legal ownership impossible. Here's how one thriving city perceives the act of piracy.Trevor Moores, Gurpreet Dhillon Pages 88-93
Viewed as an art and a science among professionals and academics, programming retains its significance in any teaching or training program in the field of computing.Masud Ahmad Malik Pages 95-97