CSCI 494 Readings

Last modified: Sat Apr 16 11:52:26 CDT 2011

News

4 Apr - Added two missing articles for Apr 6.

23 Mar - I've started to add pointers to some books.

3 Mar - Last batch of additions, I hope. Note that I've added where to find [Everett].

13 Jan - This has not been updated for 2011 (particularly regarding which readings are required vs. recommended). But you may find some useful pointers here. Links here have not been checked to see whether they are still valid.

Contents

Organizations and web sites

RISKS Digest
Freedom to Tinker
Blogs at Princeton's Center for Information Technology Policy
ACM Special Interest Group on Computers and Society (SIGCAS)
Computer Professionals for Social Responsibility (CPSR)
PRIVACY Forum
A moderated mailing list similar to RISKS Digest, but dealing with privacy issues
Electronic Frontier Foundation (EFF)
Electronic Privacy Information Center
People for Internet Responsibility
Institute for Women and Technology
NetFuture

Fiction

Two short stories by Kurt Vonnegut are included in the textbook ([Vonnegut4], [Vonnegut10]).

Other interesting fiction:

[Forster]
E.M. Forster. The machine stops.
In the public domain, text available from Wikisource.
(This is also the first story in Fairy Tales for Computers. My copy is in the CS lounge; it is a small volume with a bluish cover.)
[Everett]
Percival Everett. The fix. In Best American Short Stories 2000.
(My copy of this book is in the CS lounge. It has an orange cover.)

Late Additions

[Chr11]
Brian Christian. Mind vs. machine. Atlantic Monthly, March 2011.
http://www.theatlantic.com/magazine/archive/2011/01/mind-vs-machine/8386/.
[Hal06]
Mark Halpern. The trouble with the Turing test. The New Atlantis, Winter 2006.
http://www.thenewatlantis.com/publications/the-trouble-with-the-turing-test.
[You11]
Jeffrey R. Young. Programmed for love: The unsettling future of robotics. The Chronicle of Higher Education, 57(20), 21 Jan 2011.
http://chronicle.com/article/Programmed-for-Love-The/125922/.
[For11a]
Martin Ford. Anything you can do, robots can do better. The Atlantic, online only, 14 Feb 2011.
http://www.theatlantic.com/business/archive/2011/02/anything-you-can-do-robots-can-do-better/71227/.
[For11b]
Martin Ford. Can a computer do a lawyer's job? The Atlantic, online only, 15 Feb 2011.
http://www.theatlantic.com/business/archive/2011/02/can-a-computer-do-a-lawyers-job/71238/.
[For11c]
Martin Ford. Artificial intelligence is the next killer app. The Atlantic, online only, 17 Feb 2011.
http://www.theatlantic.com/business/archive/2011/02/artificial-intelligence-is-the-next-killer-app/71265/.
[DL08]
Whitfield Diffie and Susan Landau. Brave new world of wiretapping. Scientific American 299(3):56-63, Sep 2008.
Via library resources.
[Cat10]
Fred H. Cate. Government access to private-sector data. IEEE Security & Privacy 8(6):68-71, Nov/Dec 2010.
Available via IEEE Computing Now at http://www.computer.org/cms/Computer.org/ComputingNow/homepage/2011/0211/W_SP_GovtAccessPrivateSectorData.pdf
[Gar08]
Simson L. Garfinkel. Information of the world, unite! Scientific American 299(3):82-87, Sep 2008.
Via library resources.
[Fal08]
James Fallows. “The connection has been reset”. Atlantic Monthly, Mar 2008. At http://www.theatlantic.com/magazine/archive/2008/03/-ldquo-the-connection-has-been-reset-rdquo/6650/
[Per11]
Tekla Perry. Cellphones take the witness stand. IEEE Spectrum Tech Talk blog, 2 February 2011.
http://spectrum.ieee.org/tech-talk/telecom/wireless/cellphones-take-the-witness-stand/
[Jon11]
Keith Johnson. Qualified success claimed against computer worm. Wall Street Journal, 24 January 2011.
http://online.wsj.com/article/SB10001424052748704279704576102433926728902.html

Books

[Les99]
Lawrense Lessig. Code: And Other Laws of Cyberspace. Basic Books, 1999.
An updated version, Code v2 is available via a link from the author's web site, http://www.lessig.org/.
See especially chapters 7 and 10.
[Tur11]
Sherry Turkle. Alone Together: Why We Expect More from Technology and Less from Each Other. Basic Books, 2011.

Additional Suggested Readings

[Arb02]
Bill Arbaugh. Improving the TCPA specification. IEEE Computer, 35(8):77-79, August 2002.

[Car08]
Nicholas Carr. Is Google Making Us Stupid? Atlantic Monthly, (302)1:56-63, July/August 2008.
http://www.theatlantic.com/magazine/archive/2008/07/is-google-making-us-stupid/6868/.
Via Buswell Library's online resources.

[Cha95]
Daniel Chandler. Technological or media determinism, 1995.
http://www.aber.ac.uk/media/Documents/tecdet/tecdet.html.

[Cla88]
Roger Clarke. Information technology and dataveillance. Communications of the ACM, 31(5):498-512, May 1988.
ACM library, local PDF

[Den01]
Peter J. Denning. The profession of IT: who are we? Communications of the ACM, 44(2):15-19, February 2001.
ACM library, local PDF

[D+93]
Dorothy E. Denning et al. To tap or not to tap. Communications of the ACM, 36(3):24-44, March 1993.
Opening: ACM library, local PDF
Comments: ACM library, local PDF
Closing: ACM library, local PDF

[D+89]
Edsgar W. Dijkstra et al. A debate on teaching computing science. Communications of the ACM, 32(12):1397-1414, December 1989. Includes "On the Cruelty of Really Teaching Computing Science", presented at the February 1989 ACM Computer Science Conference, and responses.
ACM library, local PDF

[DF94]
Stephen Doheny-Farina. Default = offline, or why Ubicomp scares me. Computer-Mediated Communications Magazine, 1(6):18, October 1 1994.
http://sunsite.unc.edu/cmc/mag/1994/oct/last.html.

[EC99]
Amitai Etzioni and Michael Cromartie. Why we need less privacy. Books & Culture, May/June 1999.
http://www.christianitytoday.com/bc/1999/mayjun/9b3026.html

[Fal00]
James Fallows. Inside the leviathan. Atlantic Monthly, (285)2:34-38, February 2000.
http://www.theatlantic.com/issues/2000/02/002fallows.htm.

[Giv02]
Beth Givens. Public records on the Internet: the privacy dilemma. Proceeings of the 12th Annual Conference on Computers, Freedom, and Privacy, ACM, April 2002.
ACM library, local PDF

[G+99]
Don Gotterbarn et al. Computer Society and ACM approve Software Engineering Code of Ethics. Computer, 32(10):84-88, October 1999.

[Gra07]
Jennifer Granick. Sowing the Seeds of Surveilance. Wired News, January 31, 2007.
http://www.wired.com/news/columns/0,72608-0.html

[Jac02a]
Alan Jacobs. Computer control: Life among the Cyber-Amish. Books & Culture, 8(4):14-, July/August 2002.
http://www.christianitytoday.com/bc/2002/julaug/6.14.html

[Jac02b]
Alan Jacobs. Computer control: The virtues of resistance. Books & Culture, 8(5):22-, September/October 2002. http://www.christianitytoday.com/bc/2002/sepoct/14.22.html

[Jac02c]
Alan Jacobs. Computer control: Who's in charge? Books & Culture, 8(3):16-, May/June 2002.
http://www.christianitytoday.com/bc/2002/mayjun/10.16.html

[Kus84]
Richard P. Kusserow. The government needs computer matching to root out waste and fraud. Communications of the ACM, 27(6):542-545, June 1984.
ACM library, local PDF

[Man99]
Charles C. Mann. The unacknowledged legislators of the digital world. Atlantic Unbound, (1999.12.15), 1999.
http://www.theatlantic.com/unbound/digicult/dc991215.htm.

[Man00a]
Charles C. Mann. Bugged. Atlantic Unbound, (2000.03.15), 2000.
http://www.theatlantic.com/unbound/digicult/dc2000-03-15.htm.

[Man00b]
Charles C. Mann. The heavenly jukebox. Atlantic Monthly, 286(3):39-59, September 2000.
http://www.theatlantic.com/doc/200009/file-sharing.

[Man02]
Charles C. Mann. Homeland insecurity. Atlantic Monthly, 290(2):81-102, September 2002.
http://www.theatlantic.com/doc/200209/mann.

[Mil99]
Eric Miller. Keeping up with the Amish. Christianity Today, 43(11):62-72, October 4 1999.
http://www.christianitytoday.com/ct/1999/october4/9tb044.html

[Mil02]
Ralph R. Miller. Viewpoint: Information management in the aftermath of 9/11. Communications of the ACM, 45(9):31-33, September 2002.
ACM library, local PDF

[NW01]
Peter G. Neumann and Lauren Weinstein. Risks of national identity cards. Communications of the ACM, 44(12):176, December 2001.
ACM library, local PDF

[Orr02]
Diana Mayer Orrick. Toward adequate online privacy safeguards. IEEE Computer, 35(8):92;90-91, August 2002.

[Por95]
David Porush. Ubiquitous computing vs. radical privacy: A reconsideration of the future. Computer-Mediated Communications Magazine, 2(3):46, March 1 1995.
http://metalab.unc.edu/cmc/mag/1995/mar/last.html.

[Pos92]
Neil Postman. Technopoly: The Surrender of Culture to Technology. Knopf, 1992.

[Ros02]
Paul F. Ross. Whatever became of integrity? Communications of the ACM, 45(9):27-28, September 2002.
ACM library, local PDF

[Sal68]
G. Salton. Editorial: On the future of mechanical infomration files. Communications of the ACM, 11(1):2, January 1968.
ACM library, local PDF

[San02]
Simone Santini. Using language more responsibly. IEEE Computer, 35(12):128;126-127, December 2002.

[Sha84]
John Shattuck. Computer matching is a serious threat to individual rights. Communications of the ACM, 27(6):538-541, June 1984.
ACM library, local PDF

[Spe99]
John R. Speed. What do you mean I can't call myself a software engineer? IEEE Software, 16(6):45-50, November/December 1999.

[Sto03]
Adam Stone. Software flaws: To tell or not to tell? IEEE Software, 20(1):70-73, January/February 2003.

[Tal95a]
Stephen L. Talbott. The Future Does Not Compute: Transcending the Machines in Our Midst. O'Reilly & Assoc., 1995.
http://netfuture.org/fdnc/.

[Tav96]
Herman T. Tavani. Computer matching and personal privacy: Can they be compatible? Proceeings of the 1996 Symposium on Computers and the Quality of Life, ACM SIGCAS, February 1996.
ACM library, local PDF

[TK02]
Leonard Tripp and Adam Kolawa. Software certification debate. IEEE Computer, 35(6):31-35, June 2002.

[Vai02]
Siva Vaidhyanathan. Copyright as cudgel. The Chronicle of Higher Education, page B7, August2 2002.
http://chronicle.com/free/v48/i47/47b00701.htm.

[Wei86]
Joseph Weizenbaum. Not without us. ACM SIGCAS Computers and Society, 16(2-3):2-7, Summer/Fall 1986.
ACM library, local PDF

[Win97]
Langdon Winner. Cyberlibertarian myths and the prospects for community. Computers and Society 27(3):14-19, September 1997.
A draft is available from the author, at http://www.rpi.edu/~winner/cyberlib2.html.

Required Readings

[AJGP93]
Ronald E. Anderson, Deborah G. Johnson, Donald Gotterbarn, and Judith Perrolle. Using the new ACM Code of Ethics in decision making. Communications of the ACM, 36(2):98-107, February 1993.
ACM library, local PDF

[And01]
Ross Anderson. Why information security is hard: An economic perspective. In 17th Annual Computer Security Applications Conference. Applied Computer Security Associates, 2001.
Available from the author's page at http://www.cl.cam.ac.uk/~rja14/.

[Bar93]
John Perry Barlow. Selling wine without bottles: The economy of mind on the global net, 1993.
http://www.eff.org/Misc/Publications/John_Perry_Barlow/HTML/idea_economy_article.html.

[Bas98]
Lionel Basney. Questioning "progress". Books & Culture, September/October 1998.
http://www.christianitytoday.com/bc/1998/sepoct/8b5018.html

[Ber00]
Hal Berghel. Identity theft, social security numbers, and the web. Communications of the ACM, 43(2):17-21, February 2000.
ACM library, local PDF

[Bow10]
Mark Bowden. The Enemy Within. Atlantic Monthly, 305(5):72-83 June 2010.
http://www.theatlantic.com/magazine/archive/2010/06/the-enemy-within/8098/

[Buc99]
Mark Buchanan. Trapped in the cult of the next thing. Christianity Today, 43(10):62-72, September 6 1999.
http://www.ctlibrary.com/ct/1999/september6/9ta062.html

[Hoa81]
C.A.R. Hoare. The emperor's old clothes. Communications of the ACM, 24(2):75-83, February 1981.
ACM library, local PDF

[Joy00]
Bill Joy. Why the future doesn't need us. Wired, April 2000. http://www.wired.com/wired/archive/8.04/joy.html.

[Lam88]
David Alex Lamb. Software engineering: An emerging profession? External Technical Report 88-233, Department of Computing and Information Science, Queen's University, September 1988. Available at http://research.cs.queensu.ca/TechReports/Reports/1988-233.pdf.

[Les99a]
Lawrence Lessig. What things regulate. In Code and Other Laws of Cyberspace, chapter 7. Basic Books, 1999.
Local PDF.

[Les01]
Toby Lester. The reinvention of privacy. Atlantic Monthly, 287(3):27-39, March 2001.
Possibly garbled at http://www.theatlantic.com/issues/2001/03/lester.htm
Via Buswell Library's online resources
[Man98]
Charles C. Mann. Who will own your next good idea? Atlantic Monthly, 282(3):57-82, September 1998.
http://www.theatlantic.com/issues/98sep/copy.htm

[Mor11]
Evgeny Morozov. Why the Internet Is a Great Tool for Totalitarians. Wired, 19(1), January 2011.
http://www.wired.com/magazine/2010/12/st_essay_totalitarians/

[Nis01]
Helen Nissenbaum. How computer systems embody values. IEEE Computer, 34(3):120;118-119, March 2001.
PDF at the author's site.

[Pos90]
Neil Postman. Informing ourselves to death, 1990.
http://www.eff.org/Net_culture/Criticisms/informing_ourselves_to_death.paper .

[Rac75]
James Rachels. Why privacy is important. Philosophy & Public Affairs, 4(4):323-333, 1975. Accessible via the library (JSTOR) as http://links.jstor.org/sici?sici=0048-3915%28197522%294%3A4%3C323%3AWPII%3E2.0.CO%3B2-G.

[Sta97]
Richard Stallman. The right to read. Communications of the ACM, pages 85–87, February 1997. ACM library, local PDF, or http://www.gnu.org/philosophy/right-to-read.html.

[Tal95]
Stephen L. Talbott. The machine in the ghost. In The Future Does Not Compute: Transcending the Machines in Our Midst, chapter 2. O'Reilly & Assoc., 1995.
http://netfuture.org/fdnc/ch02.html.

[Tho84]
Ken Thompson. Reflections on trusting trust. Communications of the ACM, 27(8):761-763, August 1984.
ACM library, local PDF

[Tou01]
David S. Touretzsky. Free speech rights for programmers. Communications of the ACM, 44(8):23-25, August 2001.
ACM library, local PDF

[Tur50]
Alan Turing. Computing machinery and intelligence. Mind, LIX(236):433-460, October 1950.
Local PDF (restricted access).

[Web02]
Arnd Weber. Enabling crypto: How radical innovations occur. Communications of the ACM, 45(4):103-107, April 2002.
ACM library, local PDF

[Wei95]
Mark Weiser. The technologist's responsibilities and social change. Computer-Mediated Communications Magazine, 2(4):17, April 1 1995.
http://metalab.unc.edu/cmc/mag/1995/apr/last.html.

Textbook Selections

[Mumford1]
Lewis Mumford. Assimilation of the machine: New cultural values. In Hester and Ford [HesterFord], chapter 1.

[Barbour1]
Ian Barbour. Views of technology. In Hester and Ford [HesterFord], chapter 1.

[Kranzberg1]
Melvin Kranzberg. Selections on technology. In Hester and Ford [HesterFord], chapter 1.

[Maner1]
Walter Maner. Unique problems in information technology. In Hester and Ford [HesterFord], chapter 1.

[Dertouzos2]
Michael Dertouzos. Creating the people's computer. In Hester and Ford [HesterFord], chapter 2.

[Roszak2]
Theodore Roszak. Computers and reason. In Hester and Ford [HesterFord], chapter 2.

[Heim2]
Michael Heim. Logic and intuition. In Hester and Ford [HesterFord], chapter 2.

[Newell2]
Allen Newell. Fairy tales. In Hester and Ford [HesterFord], chapter 2.

[Dorbolo3]
Jon Dorbolo. Social strategies for software. In Hester and Ford [HesterFord], chapter 3.

[Rheingold3]
Howard Rheingold. The virtual community. In Hester and Ford [HesterFord], chapter 3.

[Barlow3]
John Perry Barlow. Is there a there in cyberspace? In Hester and Ford [HesterFord], chapter 3.

[Zuboff4]
Shoshana Zuboff. In the age of the smart machine. In Hester and Ford [HesterFord], chapter 4.

[Maquire4]
G.Q. Maguire, Jr. and Ellen M. McGee. Implantable brain chips? Time for debate. In Hester and Ford [HesterFord], chapter 4.

[Vonnegut4]
Kurt Vonnegut, Jr. EPICAC. In Hester and Ford [HesterFord], chapter 4.

[Gozzi4]
Raymond Gozzi. Computers and the human identity. In Hester and Ford [HesterFord], chapter 4.

[Berman5]
Bruce Berman. The state, computers, and African development: The information non-revolution. In Hester and Ford [HesterFord], chapter 5.

[Sutz5]
Judith Sutz. The social implications of information technologies: A Latin American perspective. In Hester and Ford [HesterFord], chapter 5.

[Dyrkton5]
Joerge Dyrkton. Cool runnings: The contradictions of cybereality in Jamaica. In Hester and Ford [HesterFord], chapter 5.

[Baldeh5]
Yero Baldeh. The ethical dilemma caused by the transfer of information technology to developing countries. In Hester and Ford [HesterFord], chapter 5.

[Hodges6]
Michael P. Hodges. Does professional ethics include computer professionals?: Two models for understanding. In Hester and Ford [HesterFord], chapter 6.

[Johnson6]
Deborah G. Johnson. Professional relationships. In Hester and Ford [HesterFord], chapter 6.

[Kesar6]
Shalini Kesar and Simon Rogerson. Developing ethical practices to minimize computer misuse. In Hester and Ford [HesterFord], chapter 6.

[Ogden7]
Michael R. Ogden. Electronic power to the people: Who is technology's keeper on the cyberspace frontier? In Hester and Ford [HesterFord], chapter 7.

[Markey7]
Representative Edward J. Markey. Remarks at the Computers, Freedom, and Privacy Conference. In Hester and Ford [HesterFord], chapter 7.

[Elgesem7]
Dag Elgesem. Privacy, respect for persons, and risk. In Hester and Ford [HesterFord], chapter 7.

[Swinyard8]
W.R. Swinyard, H. Rinnie, and A. Keng Kau. The morality of software piracy: A cross-cultural analysis. In Hester and Ford [HesterFord], chapter 8.

[Nessenbaum8]
Helen Nissenbaum. Should I copy my neighbor's software? In Hester and Ford [HesterFord], chapter 8.

[Pirate8]
Pirate editorial. So you want to be a pirate? In Hester and Ford [HesterFord], chapter 8.

[Forester9]
Tom Forester and Perry Morrison. Hacking and viruses. In Hester and Ford [HesterFord], chapter 9. Not required.

[Mentor9]
The Mentor. The conscience of a hacker. In Hester and Ford [HesterFord], chapter 9.

[Spafford9]
Eugene Spafford. Are computer hacker break-ins ethical? In Hester and Ford [HesterFord], chapter 9.

[Spinello9]
Richard Spinello. Interview with a hacker. In Hester and Ford [HesterFord], chapter 9.

[Gozzi9]
Raymond Gozzi. The computer virus as metaphor. In Hester and Ford [HesterFord], chapter 9. Not required.

[Vonnegut10]
Kurt Vonnegut, Jr. Baku: EPICAC XIV. In Hester and Ford [HesterFord], chapter 10.

[Remenyi10]
Dan Remenyi and Brian Williams. Some aspects of ethics and research into the silicon brain. In Hester and Ford [HesterFord], chapter 10.

[Dreyfus10]
Hubert Dreyfus. Misrepresenting human intelligence. In Hester and Ford [HesterFord], chapter 10.

[Turkle10]
Sherry Turkle. What we are thinking about when we are thinking about computers: Thinking about aliveness. In Hester and Ford [HesterFord], chapter 10.

[Wilson11]
John Wilson. Effects of participating in virtual environments. In Hester and Ford [HesterFord], chapter 11.

[Whitby11]
Blay Whitby. The virtual sky is not the virtual limit: Ethics in virtual reality. In Hester and Ford [HesterFord], chapter 11.

[Lancet11]
The Lancet. Being and believing: Ethics of virtual reality. In Hester and Ford [HesterFord], chapter 11.

[Gore12]
Albert Gore, Jr. Remarks on the Internet and information technologies. In Hester and Ford [HesterFord], chapter 12. Not required.

[Kellner12]
Mark A. Kellner and Douglas Groothuis. Losing our souls in cyberspace. In Hester and Ford [HesterFord], chapter 12.

[Dibbell12]
Julian Dibbell. A rape in cyberspace. In Hester and Ford [HesterFord], chapter 12. Not required.

[Gilbert12]
Pamela Gilbert. On space, sex, and being stalked. In Hester and Ford [HesterFord], chapter 12. Not required.

[HesterFord]
D. Micah Hester and Paul J. Ford, editors. Computers and Ethics in the Cyberage. Prentice-Hall, 2001.

Valid HTML 4.01!