Last modified: Tue Jan 24 12:48:47 CST 2012
Note: This page has not been significantly updated this year,
but is being provided in its current form as a resource to the class.
Categories ("required" and "suggested") do not currently apply, and
notes about what is available in the lounge are not accurate.
Contents
- RISKS
Digest
- Freedom to
Tinker
- Blogs at Princeton's
Center for Information Technology Policy
- ACM Special Interest Group on Computers and Society (SIGCAS)
- Computer Professionals for Social Responsibility (CPSR)
- PRIVACY Forum
- A moderated mailing list similar to RISKS Digest, but dealing with privacy issues
- Electronic Frontier Foundation (EFF)
- Electronic Privacy Information Center
- People for Internet Responsibility
- Institute for Women and Technology
- NetFuture
Two short stories by Kurt Vonnegut are included in the textbook
([Vonnegut4], [Vonnegut10]).
Other interesting fiction:
- [Forster]
-
E.M. Forster.
The machine stops.
In the public domain, text available from
Wikisource.
(This is also the first story in Fairy Tales for Computers.
My copy is in the CS lounge; it is a small volume with a bluish cover.)
- [Everett]
-
Percival Everett.
The fix.
In Best American Short Stories 2000.
(My copy of this book is in the CS lounge. It has an orange cover.)
- [Chr11]
- Brian Christian.
Mind vs. machine.
Atlantic Monthly, March 2011.
http://www.theatlantic.com/magazine/archive/2011/01/mind-vs-machine/8386/.
- [Hal06]
- Mark Halpern.
The trouble with the Turing test.
The New Atlantis, Winter 2006.
http://www.thenewatlantis.com/publications/the-trouble-with-the-turing-test.
- [You11]
- Jeffrey R. Young.
Programmed for love: The unsettling future of robotics.
The Chronicle of Higher Education, 57(20), 21 Jan 2011.
http://chronicle.com/article/Programmed-for-Love-The/125922/.
- [For11a]
- Martin Ford.
Anything you can do, robots can do better.
The Atlantic, online only, 14 Feb 2011.
http://www.theatlantic.com/business/archive/2011/02/anything-you-can-do-robots-can-do-better/71227/.
- [For11b]
- Martin Ford.
Can a computer do a lawyer's job?
The Atlantic, online only, 15 Feb 2011.
http://www.theatlantic.com/business/archive/2011/02/can-a-computer-do-a-lawyers-job/71238/.
- [For11c]
- Martin Ford.
Artificial intelligence is the next killer app.
The Atlantic, online only, 17 Feb 2011.
http://www.theatlantic.com/business/archive/2011/02/artificial-intelligence-is-the-next-killer-app/71265/.
- [DL08]
-
Whitfield Diffie and Susan Landau.
Brave new world of wiretapping.
Scientific American 299(3):56-63, Sep 2008.
Via library resources.
- [Cat10]
-
Fred H. Cate.
Government access to private-sector data.
IEEE Security & Privacy 8(6):68-71, Nov/Dec 2010.
Available via IEEE Computing Now at
http://www.computer.org/cms/Computer.org/ComputingNow/homepage/2011/0211/W_SP_GovtAccessPrivateSectorData.pdf
- [Gar08]
-
Simson L. Garfinkel.
Information of the world, unite!
Scientific American 299(3):82-87, Sep 2008.
Via library resources.
- [Fal08]
-
James Fallows.
“The connection has been reset”.
Atlantic Monthly, Mar 2008.
At http://www.theatlantic.com/magazine/archive/2008/03/-ldquo-the-connection-has-been-reset-rdquo/6650/
- [Per11]
- Tekla Perry.
Cellphones take the witness stand. IEEE Spectrum Tech Talk
blog, 2 February 2011.
http://spectrum.ieee.org/tech-talk/telecom/wireless/cellphones-take-the-witness-stand/
- [Jon11]
- Keith Johnson.
Qualified success claimed against computer worm.
Wall Street Journal, 24 January 2011.
http://online.wsj.com/article/SB10001424052748704279704576102433926728902.html
- [Les06]
- Lawrense Lessig.
Code: And Other Laws of Cyberspace, version 2.0.
Basic Books, 2006.
Available via a link from
the author's web site, http://www.lessig.org/.
See especially chapters 7 and 10.
- [Les99]
- Lawrense Lessig.
Code: And Other Laws of Cyberspace. Basic Books, 1999.
[Les06] is a later edition.
- [Tur11]
- Sherry Turkle.
Alone Together: Why We Expect More from Technology and Less from
Each Other. Basic Books, 2011.
- [Arb02]
- Bill Arbaugh.
Improving the TCPA specification.
IEEE Computer, 35(8):77-79, August 2002.
- [Car08]
- Nicholas Carr.
Is Google Making Us Stupid?
Atlantic Monthly, (302)1:56-63, July/August 2008.
http://www.theatlantic.com/magazine/archive/2008/07/is-google-making-us-stupid/6868/.
Via Buswell Library's online resources.
- [Cha95]
- Daniel Chandler.
Technological or media determinism, 1995.
http://www.aber.ac.uk/media/Documents/tecdet/tecdet.html.
- [Cla88]
-
Roger Clarke.
Information technology and dataveillance.
Communications of the ACM, 31(5):498-512, May 1988.
ACM library,
local PDF
- [Den01]
-
Peter J. Denning.
The profession of IT: who are we?
Communications of the ACM, 44(2):15-19, February 2001.
ACM library,
local PDF
- [D+93]
-
Dorothy E. Denning et al.
To tap or not to tap.
Communications of the ACM, 36(3):24-44, March 1993.
Opening: ACM library,
local PDF
Comments: ACM library,
local PDF
Closing: ACM library,
local PDF
- [D+89]
- Edsgar W. Dijkstra et al.
A debate on teaching computing science.
Communications of the ACM, 32(12):1397-1414, December 1989.
Includes "On the Cruelty of Really Teaching Computing Science",
presented at the February 1989 ACM Computer Science Conference, and
responses.
ACM library,
local PDF
- [DF94]
- Stephen Doheny-Farina.
Default = offline, or why Ubicomp scares me.
Computer-Mediated Communications Magazine, 1(6):18, October 1
1994.
http://sunsite.unc.edu/cmc/mag/1994/oct/last.html.
- [EC99]
-
Amitai Etzioni and Michael Cromartie.
Why we need less privacy.
Books & Culture, May/June 1999.
http://www.christianitytoday.com/bc/1999/mayjun/9b3026.html
- [Fal00]
- James Fallows.
Inside the leviathan.
Atlantic Monthly, (285)2:34-38, February 2000.
http://www.theatlantic.com/issues/2000/02/002fallows.htm.
- [Giv02]
- Beth Givens.
Public records on the Internet: the privacy dilemma.
Proceeings of the 12th Annual Conference on
Computers, Freedom, and Privacy, ACM, April 2002.
ACM library,
local PDF
- [G+99]
- Don Gotterbarn et al.
Computer Society and ACM approve Software Engineering Code of
Ethics.
Computer, 32(10):84-88, October 1999.
- [Gra07]
-
Jennifer Granick.
Sowing the Seeds of Surveilance.
Wired News, January 31, 2007.
http://www.wired.com/news/columns/0,72608-0.html
- [Jac02a]
- Alan Jacobs.
Computer control: Life among the Cyber-Amish.
Books & Culture, 8(4):14-, July/August 2002.
http://www.christianitytoday.com/bc/2002/julaug/6.14.html
- [Jac02b]
- Alan Jacobs.
Computer control: The virtues of resistance.
Books & Culture, 8(5):22-, September/October 2002.
http://www.christianitytoday.com/bc/2002/sepoct/14.22.html
- [Jac02c]
- Alan Jacobs.
Computer control: Who's in charge?
Books & Culture, 8(3):16-, May/June 2002.
http://www.christianitytoday.com/bc/2002/mayjun/10.16.html
- [Kus84]
-
Richard P. Kusserow.
The government needs computer matching to root out waste and fraud.
Communications of the ACM, 27(6):542-545, June 1984.
ACM library,
local PDF
- [Man99]
- Charles C. Mann.
The unacknowledged legislators of the digital world.
Atlantic Unbound, (1999.12.15), 1999.
http://www.theatlantic.com/unbound/digicult/dc991215.htm.
- [Man00a]
- Charles C. Mann.
Bugged.
Atlantic Unbound, (2000.03.15), 2000.
http://www.theatlantic.com/unbound/digicult/dc2000-03-15.htm.
- [Man00b]
- Charles C. Mann.
The heavenly jukebox.
Atlantic Monthly, 286(3):39-59, September 2000.
http://www.theatlantic.com/doc/200009/file-sharing.
- [Man02]
- Charles C. Mann.
Homeland insecurity.
Atlantic Monthly, 290(2):81-102, September 2002.
http://www.theatlantic.com/doc/200209/mann.
- [Mil99]
- Eric Miller.
Keeping up with the Amish.
Christianity Today, 43(11):62-72, October 4 1999.
http://www.christianitytoday.com/ct/1999/october4/9tb044.html
- [Mil02]
-
Ralph R. Miller.
Viewpoint: Information management in the aftermath of 9/11.
Communications of the ACM, 45(9):31-33, September 2002.
ACM library,
local PDF
- [NW01]
- Peter G. Neumann and Lauren Weinstein.
Risks of national identity cards.
Communications of the ACM, 44(12):176, December 2001.
ACM library,
local PDF
- [Orr02]
- Diana Mayer Orrick.
Toward adequate online privacy safeguards.
IEEE Computer, 35(8):92;90-91, August 2002.
- [Por95]
- David Porush.
Ubiquitous computing vs. radical privacy: A reconsideration of the
future.
Computer-Mediated Communications Magazine, 2(3):46, March 1
1995.
http://metalab.unc.edu/cmc/mag/1995/mar/last.html.
- [Pos92]
- Neil Postman.
Technopoly: The Surrender of Culture to Technology.
Knopf, 1992.
- [Ros02]
-
Paul F. Ross.
Whatever became of integrity?
Communications of the ACM, 45(9):27-28, September 2002.
ACM library,
local PDF
- [Sal68]
-
G. Salton.
Editorial: On the future of mechanical infomration files.
Communications of the ACM, 11(1):2, January 1968.
ACM library,
local PDF
- [San02]
-
Simone Santini.
Using language more responsibly.
IEEE Computer, 35(12):128;126-127, December 2002.
- [Sha84]
-
John Shattuck.
Computer matching is a serious threat to individual rights.
Communications of the ACM, 27(6):538-541, June 1984.
ACM library,
local PDF
- [Spe99]
-
John R. Speed.
What do you mean I can't call myself a software engineer?
IEEE Software, 16(6):45-50, November/December 1999.
- [Sto03]
-
Adam Stone.
Software flaws: To tell or not to tell?
IEEE Software, 20(1):70-73, January/February 2003.
- [Tal95a]
- Stephen L. Talbott.
The Future Does Not Compute: Transcending the Machines in Our
Midst.
O'Reilly & Assoc., 1995.
http://netfuture.org/fdnc/.
- [Tav96]
- Herman T. Tavani.
Computer matching and personal privacy: Can they be compatible?
Proceeings of the 1996 Symposium on Computers and the Quality of Life,
ACM SIGCAS, February 1996.
ACM library,
local PDF
- [TK02]
- Leonard Tripp and Adam Kolawa.
Software certification debate.
IEEE Computer, 35(6):31-35, June 2002.
- [Vai02]
- Siva Vaidhyanathan.
Copyright as cudgel.
The Chronicle of Higher Education, page B7, August2 2002.
http://chronicle.com/free/v48/i47/47b00701.htm.
- [Wei86]
- Joseph Weizenbaum.
Not without us.
ACM SIGCAS Computers and Society, 16(2-3):2-7, Summer/Fall 1986.
ACM library,
local PDF
- [Win97]
-
Langdon Winner. Cyberlibertarian myths and the prospects for community.
Computers and Society 27(3):14-19, September 1997.
A draft is available from the author, at http://www.rpi.edu/~winner/cyberlib2.html.
- [AJGP93]
-
Ronald E. Anderson, Deborah G. Johnson, Donald Gotterbarn, and Judith Perrolle.
Using the new ACM Code of Ethics in decision making.
Communications of the ACM, 36(2):98-107, February 1993.
ACM library,
local PDF
- [And01]
-
Ross Anderson.
Why information security is hard: An economic perspective.
In 17th Annual Computer Security Applications Conference.
Applied Computer Security Associates, 2001.
Available from the author's page at
http://www.cl.cam.ac.uk/~rja14/.
- [Bar93]
-
John Perry Barlow.
Selling wine without bottles: The economy of mind on the global net,
1993.
http://www.eff.org/Misc/Publications/John_Perry_Barlow/HTML/idea_economy_article.html.
- [Bas98]
-
Lionel Basney.
Questioning "progress".
Books & Culture, September/October 1998.
http://www.christianitytoday.com/bc/1998/sepoct/8b5018.html
- [Ber00]
-
Hal Berghel.
Identity theft, social security numbers, and the web.
Communications of the ACM, 43(2):17-21, February 2000.
ACM library,
local PDF
- [Bow10]
-
Mark Bowden.
The Enemy Within.
Atlantic Monthly, 305(5):72-83 June 2010.
http://www.theatlantic.com/magazine/archive/2010/06/the-enemy-within/8098/
- [Buc99]
-
Mark Buchanan.
Trapped in the cult of the next thing.
Christianity Today, 43(10):62-72, September 6 1999.
http://www.ctlibrary.com/ct/1999/september6/9ta062.html
- [Hoa81]
-
C.A.R. Hoare.
The emperor's old clothes.
Communications of the ACM, 24(2):75-83, February 1981.
ACM library,
local PDF
- [Joy00]
-
Bill Joy.
Why the future doesn't need us.
Wired, April 2000.
http://www.wired.com/wired/archive/8.04/joy.html.
- [Lam88]
-
David Alex Lamb.
Software engineering: An emerging profession?
External Technical Report 88-233, Department of Computing and
Information Science, Queen's University, September 1988.
Available at http://research.cs.queensu.ca/TechReports/Reports/1988-233.pdf.
- [Les06b]
- Lawrense Lessig.
Intellectual Property. Chapter 10 of [Les06].
Local
PDF excerpt.
- [Les99a]
-
Lawrence Lessig.
What things regulate.
In Code and Other Laws of Cyberspace, chapter 7. Basic Books, 1999.
Local
PDF.
- [Les01]
- Toby Lester.
The reinvention of privacy.
Atlantic Monthly, 287(3):27-39, March 2001.
Possibly garbled at http://www.theatlantic.com/issues/2001/03/lester.htm
Via Buswell Library's online resources
- [Man98]
-
Charles C. Mann.
Who will own your next good idea?
Atlantic Monthly, 282(3):57-82, September 1998.
http://www.theatlantic.com/issues/98sep/copy.htm
- [Mor11]
-
Evgeny Morozov.
Why the Internet Is a Great Tool for Totalitarians.
Wired, 19(1), January 2011.
http://www.wired.com/magazine/2010/12/st_essay_totalitarians/
- [Nis01]
-
Helen Nissenbaum.
How computer systems embody values.
IEEE Computer, 34(3):120;118-119, March 2001.
PDF at the author's site.
- [Pos90]
-
Neil Postman.
Informing ourselves to death, 1990.
http://www.eff.org/Net_culture/Criticisms/informing_ourselves_to_death.paper
.
- [Rac75]
-
James Rachels.
Why privacy is important.
Philosophy & Public Affairs, 4(4):323-333, 1975.
Accessible via the library (JSTOR) as http://links.jstor.org/sici?sici=0048-3915%28197522%294%3A4%3C323%3AWPII%3E2.0.CO%3B2-G.
- [Sta97]
-
Richard Stallman.
The right to read.
Communications of the ACM, pages 85–87, February 1997.
ACM library,
local
PDF, or http://www.gnu.org/philosophy/right-to-read.html.
- [Tal95]
-
Stephen L. Talbott.
The machine in the ghost.
In The Future Does Not Compute: Transcending the Machines in Our
Midst, chapter 2. O'Reilly & Assoc., 1995.
http://netfuture.org/fdnc/ch02.html.
- [Tho84]
-
Ken Thompson.
Reflections on trusting trust.
Communications of the ACM, 27(8):761-763, August 1984.
ACM library,
local PDF
- [Tou01]
-
David S. Touretzsky.
Free speech rights for programmers.
Communications of the ACM, 44(8):23-25, August 2001.
ACM library,
local PDF
- [Tur50]
-
Alan Turing.
Computing machinery and intelligence.
Mind, LIX(236):433-460, October 1950.
Local PDF (restricted access).
- [Web02]
-
Arnd Weber.
Enabling crypto: How radical innovations occur.
Communications of the ACM, 45(4):103-107, April 2002.
ACM library,
local PDF
- [Wei95]
-
Mark Weiser.
The technologist's responsibilities and social change.
Computer-Mediated Communications Magazine, 2(4):17, April 1
1995.
http://metalab.unc.edu/cmc/mag/1995/apr/last.html.
- [Mumford1]
-
Lewis Mumford.
Assimilation of the machine: New cultural values.
In Hester and Ford [HesterFord], chapter 1.
- [Barbour1]
-
Ian Barbour.
Views of technology.
In Hester and Ford [HesterFord], chapter 1.
- [Kranzberg1]
-
Melvin Kranzberg.
Selections on technology.
In Hester and Ford [HesterFord], chapter 1.
- [Maner1]
-
Walter Maner.
Unique problems in information technology.
In Hester and Ford [HesterFord], chapter 1.
- [Dertouzos2]
-
Michael Dertouzos.
Creating the people's computer.
In Hester and Ford [HesterFord], chapter 2.
- [Roszak2]
-
Theodore Roszak.
Computers and reason.
In Hester and Ford [HesterFord], chapter 2.
- [Heim2]
-
Michael Heim.
Logic and intuition.
In Hester and Ford [HesterFord], chapter 2.
- [Newell2]
-
Allen Newell.
Fairy tales.
In Hester and Ford [HesterFord], chapter 2.
- [Dorbolo3]
-
Jon Dorbolo.
Social strategies for software.
In Hester and Ford [HesterFord], chapter 3.
- [Rheingold3]
-
Howard Rheingold.
The virtual community.
In Hester and Ford [HesterFord], chapter 3.
- [Barlow3]
-
John Perry Barlow.
Is there a there in cyberspace?
In Hester and Ford [HesterFord], chapter 3.
- [Zuboff4]
-
Shoshana Zuboff.
In the age of the smart machine.
In Hester and Ford [HesterFord], chapter 4.
- [Maquire4]
-
G.Q. Maguire, Jr. and Ellen M. McGee.
Implantable brain chips? Time for debate.
In Hester and Ford [HesterFord], chapter 4.
- [Vonnegut4]
-
Kurt Vonnegut, Jr.
EPICAC.
In Hester and Ford [HesterFord], chapter 4.
- [Gozzi4]
-
Raymond Gozzi.
Computers and the human identity.
In Hester and Ford [HesterFord], chapter 4.
- [Berman5]
-
Bruce Berman.
The state, computers, and African development: The information
non-revolution.
In Hester and Ford [HesterFord], chapter 5.
- [Sutz5]
-
Judith Sutz.
The social implications of information technologies: A Latin
American perspective.
In Hester and Ford [HesterFord], chapter 5.
- [Dyrkton5]
-
Joerge Dyrkton.
Cool runnings: The contradictions of cybereality in Jamaica.
In Hester and Ford [HesterFord], chapter 5.
- [Baldeh5]
-
Yero Baldeh.
The ethical dilemma caused by the transfer of information technology
to developing countries.
In Hester and Ford [HesterFord], chapter 5.
- [Hodges6]
-
Michael P. Hodges.
Does professional ethics include computer professionals?: Two models
for understanding.
In Hester and Ford [HesterFord], chapter 6.
- [Johnson6]
-
Deborah G. Johnson.
Professional relationships.
In Hester and Ford [HesterFord], chapter 6.
- [Kesar6]
-
Shalini Kesar and Simon Rogerson.
Developing ethical practices to minimize computer misuse.
In Hester and Ford [HesterFord], chapter 6.
- [Ogden7]
-
Michael R. Ogden.
Electronic power to the people: Who is technology's keeper on the
cyberspace frontier?
In Hester and Ford [HesterFord], chapter 7.
- [Markey7]
-
Representative Edward J. Markey.
Remarks at the Computers, Freedom, and Privacy Conference.
In Hester and Ford [HesterFord], chapter 7.
- [Elgesem7]
-
Dag Elgesem.
Privacy, respect for persons, and risk.
In Hester and Ford [HesterFord], chapter 7.
- [Swinyard8]
-
W.R. Swinyard, H. Rinnie, and A. Keng Kau.
The morality of software piracy: A cross-cultural analysis.
In Hester and Ford [HesterFord], chapter 8.
- [Nessenbaum8]
-
Helen Nissenbaum.
Should I copy my neighbor's software?
In Hester and Ford [HesterFord], chapter 8.
- [Pirate8]
-
Pirate editorial.
So you want to be a pirate?
In Hester and Ford [HesterFord], chapter 8.
- [Forester9]
-
Tom Forester and Perry Morrison.
Hacking and viruses.
In Hester and Ford [HesterFord], chapter 9.
Not required.
- [Mentor9]
-
The Mentor.
The conscience of a hacker.
In Hester and Ford [HesterFord], chapter 9.
- [Spafford9]
-
Eugene Spafford.
Are computer hacker break-ins ethical?
In Hester and Ford [HesterFord], chapter 9.
- [Spinello9]
-
Richard Spinello.
Interview with a hacker.
In Hester and Ford [HesterFord], chapter 9.
- [Gozzi9]
-
Raymond Gozzi.
The computer virus as metaphor.
In Hester and Ford [HesterFord], chapter 9.
Not required.
- [Vonnegut10]
-
Kurt Vonnegut, Jr.
Baku: EPICAC XIV.
In Hester and Ford [HesterFord], chapter 10.
- [Remenyi10]
-
Dan Remenyi and Brian Williams.
Some aspects of ethics and research into the silicon brain.
In Hester and Ford [HesterFord], chapter 10.
- [Dreyfus10]
-
Hubert Dreyfus.
Misrepresenting human intelligence.
In Hester and Ford [HesterFord], chapter 10.
- [Turkle10]
-
Sherry Turkle.
What we are thinking about when we are thinking about computers:
Thinking about aliveness.
In Hester and Ford [HesterFord], chapter 10.
- [Wilson11]
-
John Wilson.
Effects of participating in virtual environments.
In Hester and Ford [HesterFord], chapter 11.
- [Whitby11]
-
Blay Whitby.
The virtual sky is not the virtual limit: Ethics in virtual reality.
In Hester and Ford [HesterFord], chapter 11.
- [Lancet11]
-
The Lancet.
Being and believing: Ethics of virtual reality.
In Hester and Ford [HesterFord], chapter 11.
- [Gore12]
-
Albert Gore, Jr.
Remarks on the Internet and information technologies.
In Hester and Ford [HesterFord], chapter 12.
Not required.
- [Kellner12]
-
Mark A. Kellner and Douglas Groothuis.
Losing our souls in cyberspace.
In Hester and Ford [HesterFord], chapter 12.
- [Dibbell12]
-
Julian Dibbell.
A rape in cyberspace.
In Hester and Ford [HesterFord], chapter 12.
Not required.
- [Gilbert12]
-
Pamela Gilbert.
On space, sex, and being stalked.
In Hester and Ford [HesterFord], chapter 12.
Not required.
- [HesterFord]
-
D. Micah Hester and Paul J. Ford, editors.
Computers and Ethics in the Cyberage.
Prentice-Hall, 2001.