Last modified: Fri May  7 10:24 CDT 2010
Contents
- RISKS
	  Digest
 
- Freedom to
	  Tinker
 -  Blogs at Princeton's
	Center for Information Technology Policy
 
- ACM Special Interest Group on Computers and Society (SIGCAS)
 
- Computer Professionals for Social Responsibility (CPSR)
 
- PRIVACY Forum
 - A moderated mailing list similar to RISKS Digest, but dealing with privacy issues
 
- Electronic Frontier Foundation (EFF)
 
- Electronic Privacy Information Center
 
- People for Internet Responsibility
 
- Institute for Women and Technology
 
- NetFuture
 
Two short stories by Kurt Vonnegut are included in the textbook
([Vonnegut4], [Vonnegut10]).
Other interesting fiction:
- [Forster]
 - 
E.M. Forster.
The machine stops.
In the public domain, text available from  
Wikisource.
This is also the first story in Fairy Tales for Computers.  
My copy is in the lab; it is a small volume with a bluish cover.
 
- [Everett]
 - 
Percival Everett.
The fix.
In Best American Short Stories 2000.
(My copy of this book is in the lounge area of the lab.  It has an orange 
 |cover.)
 
- [Arb02]
 - Bill Arbaugh.
Improving the TCPA specification.
IEEE Computer, 35(8):77-79, August 2002.
 - [Car08]
 - Nicholas Carr.
Is Google Making Us Stupid?
Atlantic Monthly, (302)1:56-63, July/August 2008.
http://www.theatlantic.com/magazine/archive/2008/07/is-google-making-us-stupid/6868/.
Via Buswell Library's online resources.
 - [Cha95]
 - Daniel Chandler.
Technological or media determinism, 1995.
http://www.aber.ac.uk/media/Documents/tecdet/tecdet.html.
 - [Cla88]
 - 
Roger Clarke.
Information technology and dataveillance.
Communications of the ACM, 31(5):498-512, May 1988.
ACM library, 
local PDF
 - [D+93]
 - 
Dorothy E. Denning et al.
To tap or not to tap.
Communications of the ACM, 36(3):24-44, March 1993.
Opening: ACM library, 
local PDF
Comments: ACM library, 
local PDF
Closing: ACM library, 
local PDF
 - [D+89]
 - Edsgar W. Dijkstra et al.
A debate on teaching computing science.
Communications of the ACM, 32(12):1397-1414, December 1989.
Includes "On the Cruelty of Really Teaching Computing Science",
 presented at the February 1989 ACM Computer Science Conference, and
 responses.
ACM library, 
local PDF
 - [DF94]
 - Stephen Doheny-Farina.
Default = offline, or why Ubicomp scares me.
Computer-Mediated Communications Magazine, 1(6):18, October 1
 1994.
http://sunsite.unc.edu/cmc/mag/1994/oct/last.html.
 - [EC99]
 - 
Amitai Etzioni and Michael Cromartie.
Why we need less privacy.
Books & Culture, May/June 1999.
http://www.christianitytoday.com/bc/1999/mayjun/9b3026.html
 - [Fal00]
 - James Fallows.
Inside the leviathan.
Atlantic Monthly, (285)2:34-38, February 2000.
http://www.theatlantic.com/issues/2000/02/002fallows.htm.
 - [Giv02]
 - Beth Givens.
Public records on the Internet:  the privacy dilemma.
Proceeings of the 12th Annual Conference on 
Computers, Freedom, and Privacy, ACM, April 2002.
ACM library, 
local PDF
 - [G+99]
 - Don Gotterbarn et al.
Computer Society and ACM approve Software Engineering Code of
 Ethics.
Computer, 32(10):84-88, October 1999.
 - [Gra07]
 - 
Jennifer Granick.
Sowing the Seeds of Surveilance.
Wired News, January 31, 2007.
http://www.wired.com/news/columns/0,72608-0.html
 - [Jac02a]
 - Alan Jacobs.
Computer control: Life among the Cyber-Amish.
Books & Culture, 8(4):14-, July/August 2002.
http://www.christianitytoday.com/bc/2002/julaug/6.14.html
 - [Jac02b]
 - Alan Jacobs.
Computer control: The virtues of resistance.
Books & Culture, 8(5):22-, September/October 2002.
http://www.christianitytoday.com/bc/2002/sepoct/14.22.html
 - [Jac02c]
 - Alan Jacobs.
Computer control: Who's in charge?
Books & Culture, 8(3):16-, May/June 2002.
http://www.christianitytoday.com/bc/2002/mayjun/10.16.html
 - [Kus84]
 - 
Richard P. Kusserow.
The government needs computer matching to root out waste and fraud.
Communications of the ACM, 27(6):542-545, June 1984.
ACM library, 
local PDF
 - [Man99]
 - Charles C. Mann.
The unacknowledged legislators of the digital world.
Atlantic Unbound, (1999.12.15), 1999.
http://www.theatlantic.com/unbound/digicult/dc991215.htm.
 - [Man00a]
 - Charles C. Mann.
Bugged.
Atlantic Unbound, (2000.03.15), 2000.
http://www.theatlantic.com/unbound/digicult/dc2000-03-15.htm.
 - [Man00b]
 - Charles C. Mann.
The heavenly jukebox.
Atlantic Monthly, 286(3):39-59, September 2000.
http://www.theatlantic.com/doc/200009/file-sharing.
 - [Man02]
 - Charles C. Mann.
Homeland insecurity.
Atlantic Monthly, 290(2):81-102, September 2002.
http://www.theatlantic.com/doc/200209/mann.
 
 - [Mil99]
 - Eric Miller.
Keeping up with the Amish.
Christianity Today, 43(11):62-72, October 4 1999.
http://www.christianitytoday.com/ct/1999/october4/9tb044.html
 - [Mil02]
 - 
Ralph R. Miller. 
Viewpoint: Information management in the aftermath of 9/11.
Communications of the ACM, 45(9):31-33, September 2002.
ACM library, 
local PDF
 - [NW01]
 - Peter G. Neumann and Lauren Weinstein.
Risks of national identity cards.
Communications of the ACM, 44(12):176, December 2001.
ACM library, 
local PDF
 - [Orr02]
 - Diana Mayer Orrick.
Toward adequate online privacy safeguards.
IEEE Computer, 35(8):92;90-91, August 2002.
 - [Por95]
 - David Porush.
Ubiquitous computing vs. radical privacy: A reconsideration of the
 future.
Computer-Mediated Communications Magazine, 2(3):46, March 1
 1995.
http://metalab.unc.edu/cmc/mag/1995/mar/last.html.
 - [Pos92]
 - Neil Postman.
Technopoly: The Surrender of Culture to Technology.
Knopf, 1992.
 - [Ros02]
 - 
Paul F. Ross.
Whatever became of integrity?
Communications of the ACM, 45(9):27-28, September 2002.
ACM library, 
local PDF
 - [Sal68]
 - 
G. Salton.
Editorial: On the future of mechanical infomration files.
Communications of the ACM, 11(1):2, January 1968.
ACM library, 
local PDF
 - [San02]
 - 
Simone Santini.
Using language more responsibly.
IEEE Computer, 35(12):128;126-127, December 2002.
 - [Sha84]
 - 
John Shattuck.
Computer matching is a serious threat to individual rights.
Communications of the ACM, 27(6):538-541, June 1984.
ACM library, 
local PDF
 - [Spe99]
 - 
John R. Speed.
What do you mean I can't call myself a software engineer?
IEEE Software, 16(6):45-50, November/December 1999.
 - [Sto03]
 - 
Adam Stone.
Software flaws:  To tell or not to tell?
IEEE Software, 20(1):70-73, January/February 2003.
 - [Tal95a]
 - Stephen L. Talbott.
The Future Does Not Compute: Transcending the Machines in Our
 Midst.
O'Reilly & Assoc., 1995.
http://netfuture.org/fdnc/.
 - [Tav96]
 - Herman T. Tavani.
Computer matching and personal privacy:  Can they be compatible?
Proceeings of the 1996 Symposium on Computers and the Quality of Life,
ACM SIGCAS, February 1996.
ACM library, 
local PDF
 - [TK02]
 - Leonard Tripp and Adam Kolawa.
Software certification debate.
IEEE Computer, 35(6):31-35, June 2002.
 - [Vai02]
 - Siva Vaidhyanathan.
Copyright as cudgel.
The Chronicle of Higher Education, page B7, August2 2002.
http://chronicle.com/free/v48/i47/47b00701.htm.
 - [Wei86]
 - Joseph Weizenbaum.
Not without us.
ACM SIGCAS Computers and Society, 16(2-3):2-7, Summer/Fall 1986.
ACM library, 
local PDF
 - [Win97]
 - 
Langdon Winner.  Cyberlibertarian myths and the prospects for community.
Computers and Society 27(3):14-19, September 1997.
A draft is available from the author, at http://www.rpi.edu/~winner/cyberlib2.html.
 
- [AJGP93]
 - 
Ronald E. Anderson, Deborah G. Johnson, Donald Gotterbarn, and Judith Perrolle.
Using the new ACM Code of Ethics in decision making.
Communications of the ACM, 36(2):98-107, February 1993.
ACM library, 
local PDF
 - [And01]
 - 
Ross Anderson.
Why information security is hard: An economic perspective.
In 17th Annual Computer Security Applications Conference.
 Applied Computer Security Associates, 2001.
Available from the author's page at
 http://www.cl.cam.ac.uk/~rja14/.
 - [Bar93]
 - 
John Perry Barlow.
Selling wine without bottles: The economy of mind on the global net,
 1993.
http://w2.eff.org/Misc/Publications/John_Perry_Barlow/?f=idea_economy.article.txt.
 - [Bas98]
 - 
Lionel Basney.
Questioning "progress".
Books & Culture, September/October 1998.
http://www.christianitytoday.com/bc/1998/sepoct/8b5018.html
 - [Ber00]
 - 
Hal Berghel.
Identity theft, social security numbers, and the web.
Communications of the ACM, 43(2):17-21, February 2000.
ACM library, 
local PDF
 - [Buc99]
 - 
Mark Buchanan.
Trapped in the cult of the next thing.
Christianity Today, 43(10):62-72, September 6 1999.
http://www.ctlibrary.com/ct/1999/september6/9ta062.html
 - [Hoa81]
 - 
C.A.R. Hoare.
The emperor's old clothes.
Communications of the ACM, 24(2):75-83, February 1981.
ACM library, 
local PDF
 - [Joy00]
 - 
Bill Joy.
Why the future doesn't need us.
Wired, April 2000.
http://www.wired.com/wired/archive/8.04/joy.html.
 - [Lam88]
 - 
David Alex Lamb.
Software engineering: An emerging profession?
External Technical Report 88-233, Department of Computing and
 Information Science, Queen's University, September 1988.
Available at http://research.cs.queensu.ca/TechReports/Reports/1988-233.pdf.
 - [Les01]
 - Toby Lester.
The reinvention of privacy.
Atlantic Monthly, 287(3):27-39, March 2001.
Possibly garbled at http://www.theatlantic.com/issues/2001/03/lester.htm
Via Buswell Library's online resources
 - [Man98]
 - 
Charles C. Mann.
Who will own your next good idea?
Atlantic Monthly, 282(3):57-82, September 1998.
http://www.theatlantic.com/issues/98sep/copy.htm
 - [Nis01]
 - 
Helen Nissenbaum.
How computer systems embody values.
IEEE Computer, 34(3):120;118-119, March 2001.
PDF at the author's site.
 - [Pos90]
 - 
Neil Postman.
Informing ourselves to death, 1990.
http://www.eff.org/Net_culture/Criticisms/informing_ourselves_to_death.paper
.
 - [Rac75]
 - 
James Rachels.
Why privacy is important.
Philosophy & Public Affairs, 4(4):323-333, 1975.
Accessible via the library (JSTOR) as http://links.jstor.org/sici?sici=0048-3915%28197522%294%3A4%3C323%3AWPII%3E2.0.CO%3B2-G.
 - [Sta97]
 - 
Richard Stallman.
The right to read.
Communications of the ACM, pages 85–87, February 1997.
ACM library, 
local 
PDF, or http://www.gnu.org/philosophy/right-to-read.html.
 - [Tal95]
 - 
Stephen L. Talbott.
The machine in the ghost.
In The Future Does Not Compute: Transcending the Machines in Our
 Midst, chapter 2. O'Reilly & Assoc., 1995.
http://netfuture.org/fdnc/ch02.html.
 - [Tho84]
 - 
Ken Thompson.
Reflections on trusting trust.
Communications of the ACM, 27(8):761-763, August 1984.
ACM library, 
local PDF
 - [Tou01]
 - 
David S. Touretzsky.
Free speech rights for programmers.
Communications of the ACM, 44(8):23-25, August 2001.
ACM library, 
local PDF
 - [Tur50]
 - 
Alan Turing.
Computing machinery and intelligence.
Mind, LIX(236):433-460, October 1950.
Local PDF (restricted access).
 - [Web02]
 - 
Arnd Weber.
Enabling crypto: How radical innovations occur.
Communications of the ACM, 45(4):103-107, April 2002.
ACM library, 
local PDF
 - [Wei95]
 - 
Mark Weiser.
The technologist's responsibilities and social change.
Computer-Mediated Communications Magazine, 2(4):17, April 1
 1995.
http://metalab.unc.edu/cmc/mag/1995/apr/last.html.
 
- [Mumford1]
 - 
Lewis Mumford.
Assimilation of the machine: New cultural values.
In Hester and Ford [HesterFord], chapter 1.
 - [Barbour1]
 - 
Ian Barbour.
Views of technology.
In Hester and Ford [HesterFord], chapter 1.
 - [Kranzberg1]
 - 
Melvin Kranzberg.
Selections on technology.
In Hester and Ford [HesterFord], chapter 1.
 - [Maner1]
 - 
Walter Maner.
Unique problems in information technology.
In Hester and Ford [HesterFord], chapter 1.
 - [Dertouzos2]
 - 
Michael Dertouzos.
Creating the people's computer.
In Hester and Ford [HesterFord], chapter 2.
 - [Roszak2]
 - 
Theodore Roszak.
Computers and reason.
In Hester and Ford [HesterFord], chapter 2.
 - [Heim2]
 - 
Michael Heim.
Logic and intuition.
In Hester and Ford [HesterFord], chapter 2.
 - [Newell2]
 - 
Allen Newell.
Fairy tales.
In Hester and Ford [HesterFord], chapter 2.
 - [Dorbolo3]
 - 
Jon Dorbolo.
Social strategies for software.
In Hester and Ford [HesterFord], chapter 3.
 - [Rheingold3]
 - 
Howard Rheingold.
The virtual community.
In Hester and Ford [HesterFord], chapter 3.
 - [Barlow3]
 - 
John Perry Barlow.
Is there a there in cyberspace?
In Hester and Ford [HesterFord], chapter 3.
 - [Zuboff4]
 - 
Shoshana Zuboff.
In the age of the smart machine.
In Hester and Ford [HesterFord], chapter 4.
 - [Maquire4]
 - 
G.Q. Maguire, Jr. and Ellen M. McGee.
Implantable brain chips? Time for debate.
In Hester and Ford [HesterFord], chapter 4.
 - [Vonnegut4]
 - 
Kurt Vonnegut, Jr.
EPICAC.
In Hester and Ford [HesterFord], chapter 4.
 - [Gozzi4]
 - 
Raymond Gozzi.
Computers and the human identity.
In Hester and Ford [HesterFord], chapter 4.
 - [Berman5]
 - 
Bruce Berman.
The state, computers, and African development: The information
 non-revolution.
In Hester and Ford [HesterFord], chapter 5.
 - [Sutz5]
 - 
Judith Sutz.
The social implications of information technologies: A Latin
 American perspective.
In Hester and Ford [HesterFord], chapter 5.
 - [Dyrkton5]
 - 
Joerge Dyrkton.
Cool runnings: The contradictions of cybereality in Jamaica.
In Hester and Ford [HesterFord], chapter 5.
 - [Baldeh5]
 - 
Yero Baldeh.
The ethical dilemma caused by the transfer of information technology
 to developing countries.
In Hester and Ford [HesterFord], chapter 5.
 - [Hodges6]
 - 
Michael P. Hodges.
Does professional ethics include computer professionals?: Two models
 for understanding.
In Hester and Ford [HesterFord], chapter 6.
 - [Johnson6]
 - 
Deborah G. Johnson.
Professional relationships.
In Hester and Ford [HesterFord], chapter 6.
 - [Kesar6]
 - 
Shalini Kesar and Simon Rogerson.
Developing ethical practices to minimize computer misuse.
In Hester and Ford [HesterFord], chapter 6.
 - [Ogden7]
 - 
Michael R. Ogden.
Electronic power to the people: Who is technology's keeper on the
 cyberspace frontier?
In Hester and Ford [HesterFord], chapter 7.
 - [Markey7]
 - 
Representative Edward J. Markey.
Remarks at the Computers, Freedom, and Privacy Conference.
In Hester and Ford [HesterFord], chapter 7.
 - [Elgesem7]
 - 
Dag Elgesem.
Privacy, respect for persons, and risk.
In Hester and Ford [HesterFord], chapter 7.
 - [Swinyard8]
 - 
W.R. Swinyard, H. Rinnie, and A. Keng Kau.
The morality of software piracy: A cross-cultural analysis.
In Hester and Ford [HesterFord], chapter 8.
 - [Nessenbaum8]
 - 
Helen Nissenbaum.
Should I copy my neighbor's software?
In Hester and Ford [HesterFord], chapter 8.
 - [Pirate8]
 - 
Pirate editorial.
So you want to be a pirate?
In Hester and Ford [HesterFord], chapter 8.
 - [Forester9]
 - 
Tom Forester and Perry Morrison.
Hacking and viruses.
In Hester and Ford [HesterFord], chapter 9.
Not required.
 - [Mentor9]
 - 
The Mentor.
The conscience of a hacker.
In Hester and Ford [HesterFord], chapter 9.
 - [Spafford9]
 - 
Eugene Spafford.
Are computer hacker break-ins ethical?
In Hester and Ford [HesterFord], chapter 9.
 - [Spinello9]
 - 
Richard Spinello.
Interview with a hacker.
In Hester and Ford [HesterFord], chapter 9.
 - [Gozzi9]
 - 
Raymond Gozzi.
The computer virus as metaphor.
In Hester and Ford [HesterFord], chapter 9.
Not required.
 - [Vonnegut10]
 - 
Kurt Vonnegut, Jr.
Baku: EPICAC XIV.
In Hester and Ford [HesterFord], chapter 10.
 - [Remenyi10]
 - 
Dan Remenyi and Brian Williams.
Some aspects of ethics and research into the silicon brain.
In Hester and Ford [HesterFord], chapter 10.
 - [Dreyfus10]
 - 
Hubert Dreyfus.
Misrepresenting human intelligence.
In Hester and Ford [HesterFord], chapter 10.
 - [Turkle10]
 - 
Sherry Turkle.
What we are thinking about when we are thinking about computers:
 Thinking about aliveness.
In Hester and Ford [HesterFord], chapter 10.
 - [Wilson11]
 - 
John Wilson.
Effects of participating in virtual environments.
In Hester and Ford [HesterFord], chapter 11.
 - [Whitby11]
 - 
Blay Whitby.
The virtual sky is not the virtual limit: Ethics in virtual reality.
In Hester and Ford [HesterFord], chapter 11.
 - [Lancet11]
 - 
The Lancet.
Being and believing: Ethics of virtual reality.
In Hester and Ford [HesterFord], chapter 11.
 - [Gore12]
 - 
Albert Gore, Jr.
Remarks on the Internet and information technologies.
In Hester and Ford [HesterFord], chapter 12.
Not required.
 - [Kellner12]
 - 
Mark A. Kellner and Douglas Groothuis.
Losing our souls in cyberspace.
In Hester and Ford [HesterFord], chapter 12.
 - [Dibbell12]
 - 
Julian Dibbell.
A rape in cyberspace.
In Hester and Ford [HesterFord], chapter 12.
Not required.
 - [Gilbert12]
 - 
Pamela Gilbert.
On space, sex, and being stalked.
In Hester and Ford [HesterFord], chapter 12.
Not required.
 - [HesterFord]
 - 
D. Micah Hester and Paul J. Ford, editors.
Computers and Ethics in the Cyberage.
Prentice-Hall, 2001.