Last modified: Mon Oct 6 22:32:22 CDT 2014
News
I have begun to populate the lounge bookshelf.
All links should work, except as noted.
Contents
- RISKS
Digest
- Freedom to
Tinker
- Blogs at Princeton's
Center for Information Technology Policy
- ACM Special Interest Group on Computers and Society (SIGCAS)
- PRIVACY Forum
- A moderated mailing list similar to RISKS Digest, but dealing with privacy issues
- Electronic Frontier Foundation (EFF)
- Electronic Privacy Information Center
- People for Internet Responsibility
- Institute for Women and Technology
- NetFuture
9 Sep: added [Bor84a].
30 Sep: added privacy readings here.
- [Mims14]
- Christopher Mims.
Computer Programming Is a Trade; Let's Act Like It.
Wall Street Journal, Section B, page 1, 4 August 2014.
http://online.wsj.com/articles/computer-programming-is-a-trade-lets-act-like-it-1407109947
- [WSJ14a]
- Various.
Letters in response to “Computer Programming Is a Trade; Let's Act Like It.”
Wall Street Journal, Section B, page 1, 14 August 2014.
http://online.wsj.com/articles/computer-programming-is-a-trade-lets-act-like-it-1407109947
- [Duh12]
- Charles Duhigg.
How Companies Learn Your Secrets.
New York Times Magazine, MM30, 9 February 2012.
http://www.nytimes.com/2012/02/19/magazine/shopping-habits.html?pagewanted=all&emc=rss
- [WSJ10]
-
What They Know.
Wall Street Journal, 2010.
A "special report" at
http://online.wsj.com/public/page/what-they-know-2010.html.
Additional collections for subsequent years also reachable there
(though not all articles are directly accessible).
- [Car10b]
- Nicholas Carr.
Tracking Is an Assault on Liberty, With Real Dangers.
Wall Street Journal, 6 August 2010.
http://online.wsj.com/article/SB10001424052748703748904575411682714389888.html.
- [Har10]
- Jim Harper.
It's Modern Trade: Web Users Get as Much as They Give.
Wall Street Journal, 7 August 2010.
http://online.wsj.com/article/SB10001424052748703748904575411530096840958.html.
- [VDSV12]
- Jennifer
Valentino-Devries and Jeremy Singer-Vine.
They Know What You're Shopping For.
Wall Street Journal, 7 December 2012.
http://online.wsj.com/news/articles/SB10001424127887324784404578143144132736214.
- [Sol11]
- Daniel J. Solove.
Why Privacy Matters Even if You Have 'Nothing to Hide'.
The Chronicle of Higher Education, 57(37), 15 May 2011.
http://chronicle.com/article/Why-Privacy-Matters-Even-if/127461/.
- [GP13]
- Barton Gellman and Laura Poitras.
U.S., British intelligence mining data from nine U.S. Internet
companies in broad secret program.
Washington Post, 7 June 2013.
http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html?hpid=z1.
- [GM13]
- Glenn Greenwald and Ewen MacAskill.
NSA Prism program taps in to user data of Apple, Google and others.
The Guardian, 6 June 2013.
http://www.theguardian.com/world/2013/jun/06/us-tech-giants-nsa-data.
- [Sanger]
- David E. Sanger and Brian X. Chen.
Signaling Post-Snowden Era, New iPhone Locks Out N.S.A.
NY Times, 26 Sep 2014.
http://www.nytimes.com/2014/09/27/technology/iphone-locks-out-the-nsa-signaling-a-post-snowden-era-.html?partner=rss&emc=rss.
- [NYTDebate]
-
Room for Debate: Apple vs. the Law.
NY Times, 30 Sep 2014.
http://www.nytimes.com/roomfordebate/2014/09/30/apple-vs-the-law?partner=rss&emc=rss.
- [Purnell]
- Newley Purnell.
Smartphone Spyware Targets Hong Kong Protesters.
WSJ.D, 3 Oct 2014.
http://blogs.wsj.com/digits/2014/10/03/smartphone-spyware-targets-hong-kong-protesters/?mod=WSJBlog.
- [Arnbak]
- Axel Arnbak.
"Loopholes for Circumventing the Constitution", the NSA Statement, and
Our Response.
Freedom to Tinker (Princeton Center for Information Technology Policy),
11 July 2014.
https://freedom-to-tinker.com/blog/axel/our-response-to-the-nsa-reaction-to-our-new-internet-traffic-shaping-paper/.
(Note also the referenced conference paper and news coverage.)
Not in the lounge
- [Les06]
- Lawrence Lessig.
Code: And Other Laws of Cyberspace, version 2.0.
Basic Books, 2006.
Available in various forms, including full PDF, http://www.codev2.cc/.
See especially chapters 7 and 10.
- [Lew47]
- C.S. Lewis.
The Abolition of Man. MacMillan, 1947.
My books in the CS lounge
- [BAS00]
- E.L. Doctorow, ed.
Best American Short Stories 2000. Houghton Mifflin, 2000.
Contains [Everett].
- [FTfC]
- Various.
Fairy Tales for Computers. Eakins Press, 1969.
Contains [Forster].
- [Forb01]
- Editors of Forbes ASAP.
Forbes ASAP Big Issues: The Examined Life in the Digital Age. Wiley, 2001.
Contains [Helprin].
- [ALL08]
- Hal Abelson, Ken Ledeen, and Harry Lewis.
Blown to Bits: Your Life, Liberty and Happiness After the
Digital Explosion.
Addison-Wesley, 2008.
- [Bor84]
- Albert Borgmann.
Technology and the Character of Contemporary Life. U
Chicago Press, 1984.
- [Bor99]
- Albert Borgmann.
Holding On to Reality: The Nature of Information at the Turn of
the Millenium. U Chicago Press, 1999.
- [Bre04]
- Eric Brende.
Better Off: Flipping the Switch on
Technology. HarperCollins, 2004.
- [Bro02]
- Rodney A. Brooks.
Flesh and Machines: How Robots Will Change Us. Vintage, 2002.
- [DL07]
- Whitfield Diffie and Susan Landau.
Privacy on the Line: The Politics of Wiretapping and Encryption.
MIT Press, 2007.
- [Gar00]
- Simson Garfinkel.
Database Nation: The Death of Privacy in the 21st Century. O'Reilly and Associates, 2000.
- [Hat88]
- Nathan Hatch, ed.
The Professions in American History. U. Notre Dame Press, 1988.
Also in Buswell library.
- [JS12]
- Douglas W. Jones and Barbara Simons.
Broken Ballots: Will Your Vote Count?. CSLI Publications, 2012.
- [Kur99]
- Ray Kurzweil.
The Age of Spiritual Machines: When Computers Exceed Human Intelligence. Penguin, 1999.
- [Land10]
- Susan Landau.
Surveillance or Security? The Risks Posed by New Wiretapping Technologies.
MIT Press, 2010.
- [Lani10]
- Jaron Lanier.
You Are Not a Gadget. Knopf, 2010.
- [Les99]
- Lawrence Lessig.
Code: And Other Laws of Cyberspace. Basic Books, 1999.
This is an earlier edition of [Les06].
- [Lev95]
- Nancy G. Leveson.
Safeware: System Safety and Computers. Addison-Wesley,
1995.
- [Mac11]
- Rebecca MacKinnon.
Consent of the Networked: The Worldwide Struggle for Internet Freedom.
Basic Books, 2011.
- [Mor11]
- Evgeny Morozov.
The Net Delusion: The Dark Side of Internet Freedom.
Public Affairs, 2011.
- [Par11]
- Eli Pariser.
The Filter Bubble: What the Internet is Hiding from
You. Penguin, 2011.
- [Pet95]
- Ivars Peterson.
Fatal Defect: Chasing Killer Computer Bugs. Vintage Books, 1995.
- [Pos92]
- Neil Postman.
Technopoly: The Surrender of Culture to Technology.
Knopf, 1992.
- [Ros94]
- Theodore Roszak.
The Cult of Information. U California Press, 1994.
- [Sin09]
- P. W. Singer.
Wired for War: The Robotics Revolution and Conflict in the 21st
Century. Penguin, 2009.
- [Tal95]
- Stephen L. Talbott.
The Future Does Not Compute: Transcending the Machines in Our
Midst.
O'Reilly & Assoc., 1995.
http://netfuture.org/fdnc/.
- [Tur11]
- Sherry Turkle.
Alone Together: Why We Expect More from Technology and Less from
Each Other. Basic Books, 2011.
- [Wei76]
- Joseph Weizenbaum.
Computer Power and Human Reason: From Judgment to
Calculation. W.H. Freeman, 1976.
- [Zit08]
- Jonathan Zittrain.
The Future of the Internet, And How to Stop It.
Yale University Press, 2008.
Other books in the CS lounge
- [Car10]
- Nicholas Carr.
The Shallows: What the Internet is Doing to Our Brains.
W.W. Norton, 2010.
An expansion of [Car08].
- [Arb02]
- Bill Arbaugh.
Improving the TCPA specification.
IEEE Computer, 35(8):77-79, August 2002.
- [Bor84a]
- Albert Borgmann.
The Device Paradigm. Chapter 9 of [Bor84], pages 40-48.
Local
PDF excerpt.
- [Cat10]
-
Fred H. Cate.
Government access to private-sector data.
IEEE Security & Privacy 8(6):68-71, Nov/Dec 2010.
Available via IEEE Computing Now at
http://www.computer.org/cms/Computer.org/ComputingNow/homepage/2011/0211/W_SP_GovtAccessPrivateSectorData.pdf
- [Cha95]
- Daniel Chandler.
Technological or media determinism, 1995.
http://www.aber.ac.uk/media/Documents/tecdet/tecdet.html.
- [Chr11]
- Brian Christian.
Mind vs. machine.
Atlantic Monthly, March 2011.
http://www.theatlantic.com/magazine/archive/2011/01/mind-vs-machine/8386/.
- [Cla88]
-
Roger Clarke.
Information technology and dataveillance.
Communications of the ACM, 31(5):498-512, May 1988.
ACM library,
- [D+93]
-
Dorothy E. Denning et al.
To tap or not to tap.
Communications of the ACM, 36(3):24-44, March 1993.
Opening: ACM library
Comments: ACM library
Closing: ACM library
- [DL08]
-
Whitfield Diffie and Susan Landau.
Brave new world of wiretapping.
Scientific American 299(3):56-63, Sep 2008.
Via library resources.
- [D+89]
- Edsgar W. Dijkstra et al.
A debate on teaching computing science.
Communications of the ACM, 32(12):1397-1414, December 1989.
Includes "On the Cruelty of Really Teaching Computing Science",
presented at the February 1989 ACM Computer Science Conference, and
responses.
ACM library
- [DF94]
- Stephen Doheny-Farina.
Default = offline, or why Ubicomp scares me.
Computer-Mediated Communications Magazine, 1(6):18, October 1
1994.
http://sunsite.unc.edu/cmc/mag/1994/oct/last.html.
- [EC99]
-
Amitai Etzioni and Michael Cromartie.
Why we need less privacy.
Books & Culture, May/June 1999.
Publisher's
link is restricted to subscribers.
- [Fal00]
- James Fallows.
Inside the leviathan.
Atlantic Monthly, (285)2:34-38, February 2000.
http://www.theatlantic.com/issues/2000/02/002fallows.htm.
- [Gar08]
-
Simson L. Garfinkel.
Information of the world, unite!
Scientific American 299(3):82-87, Sep 2008.
Via library resources.
- [Giv02]
- Beth Givens.
Public records on the Internet: the privacy dilemma.
Proceeings of the 12th Annual Conference on
Computers, Freedom, and Privacy, ACM, April 2002.
ACM library
- [G+99]
- Don Gotterbarn et al.
Computer Society and ACM approve Software Engineering Code of
Ethics.
Computer, 32(10):84-88, October 1999.
- [Gra07]
-
Jennifer Granick.
Sowing the Seeds of Surveilance.
Wired News, January 31, 2007.
http://archive.wired.com/politics/law/commentary/circuitcourt/2007/01/72608?currentPage=all
- [Jac02a]
- Alan Jacobs.
Computer control: Who's in charge?
Books & Culture, 8(3):16-, May/June 2002.
via Buswell Library; publisher's restricted
link
- [Jac02b]
- Alan Jacobs.
Life among the Cyber-Amish. (Computer Control Part 2)
Books & Culture, 8(4):14-, July/August 2002.
via
Buswell Library; publisher's restricted
link
- [Jac02c]
- Alan Jacobs.
The virtues of resistance. (Computer Control Part 3)
Books & Culture, 8(5):22-, September/October 2002.
via
Buswell Library; publisher's restricted
link
- [Jon11]
- Keith Johnson.
Qualified success claimed against computer worm.
Wall Street Journal, 24 January 2011.
http://online.wsj.com/article/SB10001424052748704279704576102433926728902.html
- [Kus84]
-
Richard P. Kusserow.
The government needs computer matching to root out waste and fraud.
Communications of the ACM, 27(6):542-545, June 1984.
ACM library
- [Les06b]
- Lawrence Lessig.
Intellectual Property. Chapter 10 of Local
PDF excerpt.
- [Les01]
- Toby Lester.
The reinvention of privacy.
Atlantic Monthly, 287(3):27-39, March 2001.
Online at http://www.theatlantic.com/magazine/archive/2001/03/the-reinvention-of-privacy/302140/
Via Buswell Library's online resources
- [Lev95a]
- Nancy G. Leveson.
Medical Devices: The Therac-25 Story.
In Safeware: System Safety and
Computers, appendix A. Addison-Wesley, 1995.
Available from the author at http://sunnyday.mit.edu/therac-25.html.
- [Man98]
-
Charles C. Mann.
Who will own your next good idea?
Atlantic Monthly, 282(3):57-82, September 1998.
http://www.theatlantic.com/issues/98sep/copy.htm
- [Man99]
- Charles C. Mann.
The unacknowledged legislators of the digital world.
Atlantic Unbound, (1999.12.15), 1999.
http://www.theatlantic.com/unbound/digicult/dc991215.htm.
- [Man00a]
- Charles C. Mann.
Bugged.
Atlantic Unbound, (2000.03.15), 2000.
http://www.theatlantic.com/unbound/digicult/dc2000-03-15.htm.
- [Man00b]
- Charles C. Mann.
The heavenly jukebox.
Atlantic Monthly, 286(3):39-59, September 2000.
http://www.theatlantic.com/magazine/archive/2000/09/the-heavenly-jukebox/305141/?single_page=true.
- [Man02]
- Charles C. Mann.
Homeland insecurity.
Atlantic Monthly, 290(2):81-102, September 2002.
http://www.theatlantic.com/doc/200209/mann.
- [Mil99]
- Eric Miller.
Keeping up with the Amish.
Christianity Today, 43(11):62-72, October 4 1999.
Via
Buswell Library; publisher's restricted
link
- [Mil02]
-
Ralph R. Miller.
Viewpoint: Information management in the aftermath of 9/11.
Communications of the ACM, 45(9):31-33, September 2002.
ACM library
- [Mon]
- Lowell Monke.
Computers in education: The web and the plow.
At NETFUTURE. May 16, 1996.
http://www.netfuture.org/1996/May1696_19.html#4.
- [NW01]
- Peter G. Neumann and Lauren Weinstein.
Risks of national identity cards.
Communications of the ACM, 44(12):176, December 2001.
ACM library
- [Orr02]
- Diana Mayer Orrick.
Toward adequate online privacy safeguards.
IEEE Computer, 35(8):92;90-91, August 2002.
- [Per11]
- Tekla Perry.
Cellphones take the witness stand. IEEE Spectrum Tech Talk
blog, 2 February 2011.
http://spectrum.ieee.org/tech-talk/telecom/wireless/cellphones-take-the-witness-stand/
- [Por95]
- David Porush.
Ubiquitous computing vs. radical privacy: A reconsideration of the
future.
Computer-Mediated Communications Magazine, 2(3):46, March 1
1995.
http://metalab.unc.edu/cmc/mag/1995/mar/last.html.
- [Ros02]
-
Paul F. Ross.
Whatever became of integrity?
Communications of the ACM, 45(9):27-28, September 2002.
ACM library
- [Sal68]
-
G. Salton.
Editorial: On the future of mechanical infomration files.
Communications of the ACM, 11(1):2, January 1968.
ACM library
- [San02]
-
Simone Santini.
Using language more responsibly.
IEEE Computer, 35(12):128;126-127, December 2002.
- [Sha84]
-
John Shattuck.
Computer matching is a serious threat to individual rights.
Communications of the ACM, 27(6):538-541, June 1984.
ACM library
- [Spe99]
-
John R. Speed.
What do you mean I can't call myself a software engineer?
IEEE Software, 16(6):45-50, November/December 1999.
- [Sto03]
-
Adam Stone.
Software flaws: To tell or not to tell?
IEEE Software, 20(1):70-73, January/February 2003.
- [Tav96]
- Herman T. Tavani.
Computer matching and personal privacy: Can they be compatible?
Proceeings of the 1996 Symposium on Computers and the Quality of Life,
ACM SIGCAS, February 1996.
ACM library
- [TK02]
- Leonard Tripp and Adam Kolawa.
Software certification debate.
IEEE Computer, 35(6):31-35, June 2002.
- [Vai02]
- Siva Vaidhyanathan.
Copyright as cudgel.
The Chronicle of Higher Education, page B7, August 2, 2002.
http://chronicle.com/free/v48/i47/47b00701.htm.
- [Web02]
-
Arnd Weber.
Enabling crypto: How radical innovations occur.
Communications of the ACM, 45(4):103-107, April 2002.
ACM library
- [Win97]
-
Langdon Winner. Cyberlibertarian myths and the prospects for community.
Computers and Society 27(3):14-19, September 1997.
ACM library.
A draft is also available from the author, at http://www.rpi.edu/~winner/cyberlib2.html.
- [AJGP93]
-
Ronald E. Anderson, Deborah G. Johnson, Donald Gotterbarn, and Judith Perrolle.
Using the new ACM Code of Ethics in decision making.
Communications of the ACM, 36(2):98-107, February 1993.
ACM library
- [And01]
-
Ross Anderson.
Why information security is hard: An economic perspective.
In 17th Annual Computer Security Applications Conference.
Applied Computer Security Associates, 2001.
Available from the author's page at
http://www.cl.cam.ac.uk/~rja14/;
PDF.
- [Bar93]
-
John Perry Barlow.
Selling wine without bottles: The economy of mind on the global net,
1993.
http://www.eff.org/Misc/Publications/John_Perry_Barlow/HTML/idea_economy_article.html.
- [Bas98]
-
Lionel Basney.
Questioning "progress".
Books & Culture, September/October 1998.
http://www.christianitytoday.com/bc/1998/sepoct/8b5018.html
Publisher's link (above) is now restricted. I will locate it elsewhere.
- [Ber00]
-
Hal Berghel.
Identity theft, social security numbers, and the web.
Communications of the ACM, 43(2):17-21, February 2000.
ACM library
- [Bow10]
-
Mark Bowden.
The Enemy Within.
Atlantic Monthly, 305(5):72-83 June 2010.
http://www.theatlantic.com/magazine/archive/2010/06/the-enemy-within/308098/?single_page=true
- [Buc99]
-
Mark Buchanan.
Trapped in the cult of the next thing.
Christianity Today, 43(10):62-72, September 6 1999.
Via
Buswell Library; publisher's restricted link
- [Car08]
- Nicholas Carr.
Is Google Making Us Stupid?
Atlantic Monthly, (302)1:56-63, July/August 2008.
http://www.theatlantic.com/magazine/archive/2008/07/is-google-making-us-stupid/6868/.
Via Buswell Library's online resources.
- [Den01]
-
Peter J. Denning.
The profession of IT: who are we?
Communications of the ACM, 44(2):15-19, February 2001.
ACM library
- [Everett]
-
Percival Everett.
The fix.
In Best American Short Stories 2000.
- [Fal08]
-
James Fallows.
“The connection has been reset”.
Atlantic Monthly, Mar 2008.
At http://www.theatlantic.com/magazine/archive/2008/03/-ldquo-the-connection-has-been-reset-rdquo/6650/
- [For11a]
- Martin Ford.
Anything you can do, robots can do better.
The Atlantic, online only, 14 Feb 2011.
http://www.theatlantic.com/business/archive/2011/02/anything-you-can-do-robots-can-do-better/71227/.
- [For11b]
- Martin Ford.
Can a computer do a lawyer's job?
The Atlantic, online only, 15 Feb 2011.
http://www.theatlantic.com/business/archive/2011/02/can-a-computer-do-a-lawyers-job/71238/.
- [For11c]
- Martin Ford.
Artificial intelligence is the next killer app.
The Atlantic, online only, 17 Feb 2011.
http://www.theatlantic.com/business/archive/2011/02/artificial-intelligence-is-the-next-killer-app/71265/.
- [Forster]
-
E.M. Forster.
The machine stops.
In the public domain, text available from
Wikisource.
(First story in Fairy Tales for Computers.)
- [Hal06]
- Mark Halpern.
The trouble with the Turing test.
The New Atlantis, Winter 2006.
http://www.thenewatlantis.com/publications/the-trouble-with-the-turing-test.
- [Helprin]
- Mark Helprin.
The Acceleration of Tranquility.
In Forbes ASAP Big Issues: The Examined Life in the Digital
Age, pp. 9-21, John Wiley & Sons, 2001.
- [Hoa81]
-
C.A.R. Hoare.
The emperor's old clothes.
Communications of the ACM, 24(2):75-83, February 1981.
ACM library
- [Joy00]
-
Bill Joy.
Why the future doesn't need us.
Wired, April 2000.
http://www.wired.com/wired/archive/8.04/joy.html.
- [Lam88]
-
David Alex Lamb.
Software engineering: An emerging profession?
External Technical Report 88-233, Department of Computing and
Information Science, Queen's University, September 1988.
Available at http://research.cs.queensu.ca/TechReports/Reports/1988-233.pdf.
- [Les06a]
-
Lawrence Lessig.
What things regulate.
In Code: And Other Laws of Cyberspace, chapter 7. Basic Books, 2006.
Local
PDF extract.
- [Mor11]
-
Evgeny Morozov.
Why the Internet Is a Great Tool for Totalitarians.
Wired, 19(1), January 2011.
http://www.wired.com/magazine/2010/12/st_essay_totalitarians/
- [Nis01]
-
Helen Nissenbaum.
How computer systems embody values.
IEEE Computer, 34(3):120;118-119, March 2001.
PDF at the author's site.
- [Pos90]
-
Neil Postman.
Informing ourselves to death, 1990.
http://w2.eff.org/Net_culture/Criticisms/informing_ourselves_to_death.paper
.
- [Rac75]
-
James Rachels.
Why privacy is important.
Philosophy & Public Affairs, 4(4):323-333, 1975.
Accessible via the library (JSTOR) as http://links.jstor.org/sici?sici=0048-3915%28197522%294%3A4%3C323%3AWPII%3E2.0.CO%3B2-G.
- [Sta97]
-
Richard Stallman.
The right to read.
Communications of the ACM, 40(2):85-87, February 1997.
ACM library,
or http://www.gnu.org/philosophy/right-to-read.html
(with additional notes).
- [Tal95a]
-
Stephen L. Talbott.
The machine in the ghost.
In [Tal95], chapter 2.
http://netfuture.org/fdnc/ch02.html.
- [Tho84]
-
Ken Thompson.
Reflections on trusting trust.
Communications of the ACM, 27(8):761-763, August 1984.
ACM library
- [Tou01]
-
David S. Touretzsky.
Free speech rights for programmers.
Communications of the ACM, 44(8):23-25, August 2001.
ACM library
- [Tur50]
-
Alan Turing.
Computing machinery and intelligence.
Mind, LIX(236):433-460, October 1950.
Via Buswell Library's online resources.
- [Wei95]
-
Mark Weiser.
The technologist's responsibilities and social change.
Computer-Mediated Communications Magazine, 2(4):17, April 1
1995.
http://metalab.unc.edu/cmc/mag/1995/apr/last.html.
- [Wei86]
- Joseph Weizenbaum.
Not without us.
ACM SIGCAS Computers and Society, 16(2-3):2-7, Summer/Fall 1986.
ACM library
- [You11]
- Jeffrey R. Young.
Programmed for love: The unsettling future of robotics.
The Chronicle of Higher Education, 57(20), 21 Jan 2011.
http://chronicle.com/article/Programmed-for-Love-The/125922/.
- [Zuc14]
-
Ethan Zuckerman..
The Internnet's original sin.
Atlantic Monthly, Aug 2014.
At http://www.theatlantic.com/technology/archive/2014/08/advertising-is-the-internets-original-sin/376041/?single_page=true
- [1Mumford]
-
Lewis Mumford.
Assimilation of the machine: New cultural values.
In Hester and Ford [HesterFord], chapter 1, 3-7.
- [1Barbour]
-
Ian Barbour.
Views of technology.
In Hester and Ford [HesterFord], chapter 1, 7-34.
- [1Kranzberg]
-
Melvin Kranzberg.
Selections on technology.
In Hester and Ford [HesterFord], chapter 1, 34-39.
- [1Maner]
-
Walter Maner.
Unique problems in information technology.
In Hester and Ford [HesterFord], chapter 1, 39-56.
- [2Dertouzos]
-
Michael Dertouzos.
Creating the people's computer.
In Hester and Ford [HesterFord], chapter 2, 57-63.
- [2Roszak]
-
Theodore Roszak.
Computers and reason.
In Hester and Ford [HesterFord], chapter 2, 63-74.
- [2Heim]
-
Michael Heim.
Logic and intuition.
In Hester and Ford [HesterFord], chapter 2, 74-85.
- [2Newell]
-
Allen Newell.
Fairy tales.
In Hester and Ford [HesterFord], chapter 2, 85-90.
- [3Dorbolo]
-
Jon Dorbolo.
Social strategies for software.
In Hester and Ford [HesterFord], chapter 3, 95-99.
- [3Rheingold]
-
Howard Rheingold.
The virtual community.
In Hester and Ford [HesterFord], chapter 3, 100-111.
- [3Barlow]
-
John Perry Barlow.
Is there a there in cyberspace?
In Hester and Ford [HesterFord], chapter 3, 111-117.
- [4Zuboff]
-
Shoshana Zuboff.
In the age of the smart machine.
In Hester and Ford [HesterFord], chapter 4, 118-129.
- [4Maquire]
-
G.Q. Maguire, Jr. and Ellen M. McGee.
Implantable brain chips? Time for debate.
In Hester and Ford [HesterFord], chapter 4, 129-141.
- [4Vonnegut]
-
Kurt Vonnegut, Jr.
EPICAC.
In Hester and Ford [HesterFord], chapter 4, 141-147.
- [4Gozzi]
-
Raymond Gozzi.
Computers and the human identity.
In Hester and Ford [HesterFord], chapter 4, 146-152.
- [5Berman]
-
Bruce Berman.
The state, computers, and African development: The information
non-revolution.
In Hester and Ford [HesterFord], chapter 5, 153-166.
- [5Sutz]
-
Judith Sutz.
The social implications of information technologies: A Latin
American perspective.
In Hester and Ford [HesterFord], chapter 5, 166-177.
- [5Dyrkton]
-
Joerge Dyrkton.
Cool runnings: The contradictions of cybereality in Jamaica.
In Hester and Ford [HesterFord], chapter 5, 178-186.
- [5Baldeh]
-
Yero Baldeh.
The ethical dilemma caused by the transfer of information technology
to developing countries.
In Hester and Ford [HesterFord], chapter 5, 187-190.
- [6Hodges]
-
Michael P. Hodges.
Does professional ethics include computer professionals?: Two models
for understanding.
In Hester and Ford [HesterFord], chapter 6, 195-203.
- [6Johnson]
-
Deborah G. Johnson.
Professional relationships.
In Hester and Ford [HesterFord], chapter 6, 204-218.
- [6Kesar]
-
Shalini Kesar and Simon Rogerson.
Developing ethical practices to minimize computer misuse.
In Hester and Ford [HesterFord], chapter 6, 218-232.
- [7Ogden]
-
Michael R. Ogden.
Electronic power to the people: Who is technology's keeper on the
cyberspace frontier?
In Hester and Ford [HesterFord], chapter 7, 233-249.
- [7Markey]
-
Representative Edward J. Markey.
Remarks at the Computers, Freedom, and Privacy Conference.
In Hester and Ford [HesterFord], chapter 7, 249-255.
- [7Elgesem]
-
Dag Elgesem.
Privacy, respect for persons, and risk.
In Hester and Ford [HesterFord], chapter 7, 256-277.
- [8Swinyard]
-
W.R. Swinyard, H. Rinnie, and A. Keng Kau.
The morality of software piracy: A cross-cultural analysis.
In Hester and Ford [HesterFord], chapter 8, 278-292.
- [8Nissenbaum]
-
Helen Nissenbaum.
Should I copy my neighbor's software?
In Hester and Ford [HesterFord], chapter 8, 292-307.
- [8Pirate]
-
Pirate editorial.
So you want to be a pirate?
In Hester and Ford [HesterFord], chapter 8, 308-309.
- [9Forester]
-
Tom Forester and Perry Morrison.
Hacking and viruses.
In Hester and Ford [HesterFord], chapter 9, 310-330.
Not required.
- [9Mentor]
-
The Mentor.
The conscience of a hacker.
In Hester and Ford [HesterFord], chapter 9, 331-332.
- [9Spafford]
-
Eugene Spafford.
Are computer hacker break-ins ethical?
In Hester and Ford [HesterFord], chapter 9, 332-344.
- [9Spinello]
-
Richard Spinello.
Interview with a hacker.
In Hester and Ford [HesterFord], chapter 9, 344-347.
- [9Gozzi]
-
Raymond Gozzi.
The computer virus as metaphor.
In Hester and Ford [HesterFord], chapter 9, 348-351.
Not required.
- [10Vonnegut]
-
Kurt Vonnegut, Jr.
Baku: EPICAC XIV.
In Hester and Ford [HesterFord], chapter 10, 356-362.
- [10Remenyi]
-
Dan Remenyi and Brian Williams.
Some aspects of ethics and research into the silicon brain.
In Hester and Ford [HesterFord], chapter 10, 362-374.
- [10Dreyfus]
-
Hubert Dreyfus.
Misrepresenting human intelligence.
In Hester and Ford [HesterFord], chapter 10, 374-386.
- [10Turkle]
-
Sherry Turkle.
What we are thinking about when we are thinking about computers:
Thinking about aliveness.
In Hester and Ford [HesterFord], chapter 10, 387-392.
- [11Wilson]
-
John Wilson.
Effects of participating in virtual environments.
In Hester and Ford [HesterFord], chapter 11, 393-407.
- [11Whitby]
-
Blay Whitby.
The virtual sky is not the virtual limit: Ethics in virtual reality.
In Hester and Ford [HesterFord], chapter 11, 408-420.
- [11Lancet]
-
The Lancet.
Being and believing: Ethics of virtual reality.
In Hester and Ford [HesterFord], chapter 11, 420-423.
- [12Gore]
-
Albert Gore, Jr.
Remarks on the Internet and information technologies.
In Hester and Ford [HesterFord], chapter 12, 424-435.
Not required.
- [12Kellner]
-
Mark A. Kellner and Douglas Groothuis.
Losing our souls in cyberspace.
In Hester and Ford [HesterFord], chapter 12, 436-439.
- [12Dibbell]
-
Julian Dibbell.
A rape in cyberspace.
In Hester and Ford [HesterFord],
chapter 12, 439-452.
Not required.
- [12Gilbert]
-
Pamela Gilbert.
On space, sex, and being stalked.
In Hester and Ford [HesterFord], chapter 12, 452-463.
Not required.
- [AppendixA]
-
ACM/IEEE Software Engineering Code of Ethics and Professional Practice.
In Hester and Ford [HesterFord],
appendix A, 467-476.
- [HesterFord]
-
D. Micah Hester and Paul J. Ford, editors.
Computers and Ethics in the Cyberage.
Prentice-Hall, 2001.