CSCI 494 Readings

Last modified: Mon Oct 6 22:32:22 CDT 2014

News

I have begun to populate the lounge bookshelf.

All links should work, except as noted.

Contents

Organizations and web sites

RISKS Digest
Freedom to Tinker
Blogs at Princeton's Center for Information Technology Policy
ACM Special Interest Group on Computers and Society (SIGCAS)
PRIVACY Forum
A moderated mailing list similar to RISKS Digest, but dealing with privacy issues
Electronic Frontier Foundation (EFF)
Electronic Privacy Information Center
People for Internet Responsibility
Institute for Women and Technology
NetFuture

Late Additions

9 Sep: added [Bor84a].

30 Sep: added privacy readings here.

[Mims14]
Christopher Mims. Computer Programming Is a Trade; Let's Act Like It. Wall Street Journal, Section B, page 1, 4 August 2014.
http://online.wsj.com/articles/computer-programming-is-a-trade-lets-act-like-it-1407109947
[WSJ14a]
Various. Letters in response to “Computer Programming Is a Trade; Let's Act Like It.” Wall Street Journal, Section B, page 1, 14 August 2014.
http://online.wsj.com/articles/computer-programming-is-a-trade-lets-act-like-it-1407109947
[Duh12]
Charles Duhigg. How Companies Learn Your Secrets. New York Times Magazine, MM30, 9 February 2012.
http://www.nytimes.com/2012/02/19/magazine/shopping-habits.html?pagewanted=all&emc=rss
[WSJ10]
What They Know. Wall Street Journal, 2010.
A "special report" at http://online.wsj.com/public/page/what-they-know-2010.html. Additional collections for subsequent years also reachable there (though not all articles are directly accessible).
[Car10b]
Nicholas Carr. Tracking Is an Assault on Liberty, With Real Dangers. Wall Street Journal, 6 August 2010.
http://online.wsj.com/article/SB10001424052748703748904575411682714389888.html.
[Har10]
Jim Harper. It's Modern Trade: Web Users Get as Much as They Give. Wall Street Journal, 7 August 2010.
http://online.wsj.com/article/SB10001424052748703748904575411530096840958.html.
[VDSV12]
Jennifer Valentino-Devries and Jeremy Singer-Vine. They Know What You're Shopping For. Wall Street Journal, 7 December 2012.
http://online.wsj.com/news/articles/SB10001424127887324784404578143144132736214.
[Sol11]
Daniel J. Solove. Why Privacy Matters Even if You Have 'Nothing to Hide'. The Chronicle of Higher Education, 57(37), 15 May 2011.
http://chronicle.com/article/Why-Privacy-Matters-Even-if/127461/.
[GP13]
Barton Gellman and Laura Poitras. U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program. Washington Post, 7 June 2013.
http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html?hpid=z1.
[GM13]
Glenn Greenwald and Ewen MacAskill. NSA Prism program taps in to user data of Apple, Google and others. The Guardian, 6 June 2013.
http://www.theguardian.com/world/2013/jun/06/us-tech-giants-nsa-data.
[Sanger]
David E. Sanger and Brian X. Chen. Signaling Post-Snowden Era, New iPhone Locks Out N.S.A. NY Times, 26 Sep 2014.
http://www.nytimes.com/2014/09/27/technology/iphone-locks-out-the-nsa-signaling-a-post-snowden-era-.html?partner=rss&emc=rss.
[NYTDebate]
Room for Debate: Apple vs. the Law. NY Times, 30 Sep 2014.
http://www.nytimes.com/roomfordebate/2014/09/30/apple-vs-the-law?partner=rss&emc=rss.
[Purnell]
Newley Purnell. Smartphone Spyware Targets Hong Kong Protesters. WSJ.D, 3 Oct 2014.
http://blogs.wsj.com/digits/2014/10/03/smartphone-spyware-targets-hong-kong-protesters/?mod=WSJBlog.
[Arnbak]
Axel Arnbak. "Loopholes for Circumventing the Constitution", the NSA Statement, and Our Response. Freedom to Tinker (Princeton Center for Information Technology Policy), 11 July 2014.
https://freedom-to-tinker.com/blog/axel/our-response-to-the-nsa-reaction-to-our-new-internet-traffic-shaping-paper/.
(Note also the referenced conference paper and news coverage.)

Books

Not in the lounge

[Les06]
Lawrence Lessig. Code: And Other Laws of Cyberspace, version 2.0. Basic Books, 2006.
Available in various forms, including full PDF, http://www.codev2.cc/.
See especially chapters 7 and 10.
[Lew47]
C.S. Lewis. The Abolition of Man. MacMillan, 1947.

My books in the CS lounge

[BAS00]
E.L. Doctorow, ed. Best American Short Stories 2000. Houghton Mifflin, 2000.
Contains [Everett].
[FTfC]
Various. Fairy Tales for Computers. Eakins Press, 1969.
Contains [Forster].
[Forb01]
Editors of Forbes ASAP. Forbes ASAP Big Issues: The Examined Life in the Digital Age. Wiley, 2001.
Contains [Helprin].
[ALL08]
Hal Abelson, Ken Ledeen, and Harry Lewis. Blown to Bits: Your Life, Liberty and Happiness After the Digital Explosion. Addison-Wesley, 2008.
[Bor84]
Albert Borgmann. Technology and the Character of Contemporary Life. U Chicago Press, 1984.
[Bor99]
Albert Borgmann. Holding On to Reality: The Nature of Information at the Turn of the Millenium. U Chicago Press, 1999.
[Bre04]
Eric Brende. Better Off: Flipping the Switch on Technology. HarperCollins, 2004.
[Bro02]
Rodney A. Brooks. Flesh and Machines: How Robots Will Change Us. Vintage, 2002.
[DL07]
Whitfield Diffie and Susan Landau. Privacy on the Line: The Politics of Wiretapping and Encryption. MIT Press, 2007.
[Gar00]
Simson Garfinkel. Database Nation: The Death of Privacy in the 21st Century. O'Reilly and Associates, 2000.
[Hat88]
Nathan Hatch, ed. The Professions in American History. U. Notre Dame Press, 1988.
Also in Buswell library.
[JS12]
Douglas W. Jones and Barbara Simons. Broken Ballots: Will Your Vote Count?. CSLI Publications, 2012.
[Kur99]
Ray Kurzweil. The Age of Spiritual Machines: When Computers Exceed Human Intelligence. Penguin, 1999.
[Land10]
Susan Landau. Surveillance or Security? The Risks Posed by New Wiretapping Technologies. MIT Press, 2010.
[Lani10]
Jaron Lanier. You Are Not a Gadget. Knopf, 2010.
[Les99]
Lawrence Lessig. Code: And Other Laws of Cyberspace. Basic Books, 1999.
This is an earlier edition of [Les06].
[Lev95]
Nancy G. Leveson. Safeware: System Safety and Computers. Addison-Wesley, 1995.
[Mac11]
Rebecca MacKinnon. Consent of the Networked: The Worldwide Struggle for Internet Freedom. Basic Books, 2011.
[Mor11]
Evgeny Morozov. The Net Delusion: The Dark Side of Internet Freedom. Public Affairs, 2011.
[Par11]
Eli Pariser. The Filter Bubble: What the Internet is Hiding from You. Penguin, 2011.
[Pet95]
Ivars Peterson. Fatal Defect: Chasing Killer Computer Bugs. Vintage Books, 1995.
[Pos92]
Neil Postman. Technopoly: The Surrender of Culture to Technology. Knopf, 1992.
[Ros94]
Theodore Roszak. The Cult of Information. U California Press, 1994.
[Sin09]
P. W. Singer. Wired for War: The Robotics Revolution and Conflict in the 21st Century. Penguin, 2009.
[Tal95]
Stephen L. Talbott. The Future Does Not Compute: Transcending the Machines in Our Midst. O'Reilly & Assoc., 1995.
http://netfuture.org/fdnc/.
[Tur11]
Sherry Turkle. Alone Together: Why We Expect More from Technology and Less from Each Other. Basic Books, 2011.
[Wei76]
Joseph Weizenbaum. Computer Power and Human Reason: From Judgment to Calculation. W.H. Freeman, 1976.
[Zit08]
Jonathan Zittrain. The Future of the Internet, And How to Stop It. Yale University Press, 2008.

Other books in the CS lounge

[Car10]
Nicholas Carr. The Shallows: What the Internet is Doing to Our Brains. W.W. Norton, 2010.
An expansion of [Car08].

Additional Suggested Readings

[Arb02]
Bill Arbaugh. Improving the TCPA specification. IEEE Computer, 35(8):77-79, August 2002.

[Bor84a]
Albert Borgmann. The Device Paradigm. Chapter 9 of [Bor84], pages 40-48.
Local PDF excerpt.

[Cat10]
Fred H. Cate. Government access to private-sector data. IEEE Security & Privacy 8(6):68-71, Nov/Dec 2010.
Available via IEEE Computing Now at http://www.computer.org/cms/Computer.org/ComputingNow/homepage/2011/0211/W_SP_GovtAccessPrivateSectorData.pdf
[Cha95]
Daniel Chandler. Technological or media determinism, 1995.
http://www.aber.ac.uk/media/Documents/tecdet/tecdet.html.

[Chr11]
Brian Christian. Mind vs. machine. Atlantic Monthly, March 2011.
http://www.theatlantic.com/magazine/archive/2011/01/mind-vs-machine/8386/.
[Cla88]
Roger Clarke. Information technology and dataveillance. Communications of the ACM, 31(5):498-512, May 1988.
ACM library,
[D+93]
Dorothy E. Denning et al. To tap or not to tap. Communications of the ACM, 36(3):24-44, March 1993.
Opening: ACM library Comments: ACM library Closing: ACM library
[DL08]
Whitfield Diffie and Susan Landau. Brave new world of wiretapping. Scientific American 299(3):56-63, Sep 2008.
Via library resources.
[D+89]
Edsgar W. Dijkstra et al. A debate on teaching computing science. Communications of the ACM, 32(12):1397-1414, December 1989. Includes "On the Cruelty of Really Teaching Computing Science", presented at the February 1989 ACM Computer Science Conference, and responses.
ACM library
[DF94]
Stephen Doheny-Farina. Default = offline, or why Ubicomp scares me. Computer-Mediated Communications Magazine, 1(6):18, October 1 1994.
http://sunsite.unc.edu/cmc/mag/1994/oct/last.html.
[EC99]
Amitai Etzioni and Michael Cromartie. Why we need less privacy. Books & Culture, May/June 1999.
Publisher's link is restricted to subscribers.
[Fal00]
James Fallows. Inside the leviathan. Atlantic Monthly, (285)2:34-38, February 2000.
http://www.theatlantic.com/issues/2000/02/002fallows.htm.
[Gar08]
Simson L. Garfinkel. Information of the world, unite! Scientific American 299(3):82-87, Sep 2008.
Via library resources.
[Giv02]
Beth Givens. Public records on the Internet: the privacy dilemma. Proceeings of the 12th Annual Conference on Computers, Freedom, and Privacy, ACM, April 2002.
ACM library
[G+99]
Don Gotterbarn et al. Computer Society and ACM approve Software Engineering Code of Ethics. Computer, 32(10):84-88, October 1999.
[Gra07]
Jennifer Granick. Sowing the Seeds of Surveilance. Wired News, January 31, 2007.
http://archive.wired.com/politics/law/commentary/circuitcourt/2007/01/72608?currentPage=all
[Jac02a]
Alan Jacobs. Computer control: Who's in charge? Books & Culture, 8(3):16-, May/June 2002.
via Buswell Library; publisher's restricted link
[Jac02b]
Alan Jacobs. Life among the Cyber-Amish. (Computer Control Part 2) Books & Culture, 8(4):14-, July/August 2002.
via Buswell Library; publisher's restricted link
[Jac02c]
Alan Jacobs. The virtues of resistance. (Computer Control Part 3) Books & Culture, 8(5):22-, September/October 2002.
via Buswell Library; publisher's restricted link
[Jon11]
Keith Johnson. Qualified success claimed against computer worm. Wall Street Journal, 24 January 2011.
http://online.wsj.com/article/SB10001424052748704279704576102433926728902.html
[Kus84]
Richard P. Kusserow. The government needs computer matching to root out waste and fraud. Communications of the ACM, 27(6):542-545, June 1984.
ACM library
[Les06b]
Lawrence Lessig. Intellectual Property. Chapter 10 of Local PDF excerpt.

[Les01]
Toby Lester. The reinvention of privacy. Atlantic Monthly, 287(3):27-39, March 2001.
Online at http://www.theatlantic.com/magazine/archive/2001/03/the-reinvention-of-privacy/302140/
Via Buswell Library's online resources
[Lev95a]
Nancy G. Leveson. Medical Devices: The Therac-25 Story. In Safeware: System Safety and Computers, appendix A. Addison-Wesley, 1995.
Available from the author at http://sunnyday.mit.edu/therac-25.html.
[Man98]
Charles C. Mann. Who will own your next good idea? Atlantic Monthly, 282(3):57-82, September 1998.
http://www.theatlantic.com/issues/98sep/copy.htm

[Man99]
Charles C. Mann. The unacknowledged legislators of the digital world. Atlantic Unbound, (1999.12.15), 1999.
http://www.theatlantic.com/unbound/digicult/dc991215.htm.

[Man00a]
Charles C. Mann. Bugged. Atlantic Unbound, (2000.03.15), 2000.
http://www.theatlantic.com/unbound/digicult/dc2000-03-15.htm.

[Man00b]
Charles C. Mann. The heavenly jukebox. Atlantic Monthly, 286(3):39-59, September 2000.
http://www.theatlantic.com/magazine/archive/2000/09/the-heavenly-jukebox/305141/?single_page=true.

[Man02]
Charles C. Mann. Homeland insecurity. Atlantic Monthly, 290(2):81-102, September 2002.
http://www.theatlantic.com/doc/200209/mann.

[Mil99]
Eric Miller. Keeping up with the Amish. Christianity Today, 43(11):62-72, October 4 1999.
Via Buswell Library; publisher's restricted link
[Mil02]
Ralph R. Miller. Viewpoint: Information management in the aftermath of 9/11. Communications of the ACM, 45(9):31-33, September 2002.
ACM library
[Mon]
Lowell Monke. Computers in education: The web and the plow. At NETFUTURE. May 16, 1996.
http://www.netfuture.org/1996/May1696_19.html#4.

[NW01]
Peter G. Neumann and Lauren Weinstein. Risks of national identity cards. Communications of the ACM, 44(12):176, December 2001.
ACM library
[Orr02]
Diana Mayer Orrick. Toward adequate online privacy safeguards. IEEE Computer, 35(8):92;90-91, August 2002.

[Per11]
Tekla Perry. Cellphones take the witness stand. IEEE Spectrum Tech Talk blog, 2 February 2011.
http://spectrum.ieee.org/tech-talk/telecom/wireless/cellphones-take-the-witness-stand/
[Por95]
David Porush. Ubiquitous computing vs. radical privacy: A reconsideration of the future. Computer-Mediated Communications Magazine, 2(3):46, March 1 1995.
http://metalab.unc.edu/cmc/mag/1995/mar/last.html.

[Ros02]
Paul F. Ross. Whatever became of integrity? Communications of the ACM, 45(9):27-28, September 2002.
ACM library
[Sal68]
G. Salton. Editorial: On the future of mechanical infomration files. Communications of the ACM, 11(1):2, January 1968.
ACM library
[San02]
Simone Santini. Using language more responsibly. IEEE Computer, 35(12):128;126-127, December 2002.

[Sha84]
John Shattuck. Computer matching is a serious threat to individual rights. Communications of the ACM, 27(6):538-541, June 1984.
ACM library
[Spe99]
John R. Speed. What do you mean I can't call myself a software engineer? IEEE Software, 16(6):45-50, November/December 1999.

[Sto03]
Adam Stone. Software flaws: To tell or not to tell? IEEE Software, 20(1):70-73, January/February 2003.

[Tav96]
Herman T. Tavani. Computer matching and personal privacy: Can they be compatible? Proceeings of the 1996 Symposium on Computers and the Quality of Life, ACM SIGCAS, February 1996.
ACM library
[TK02]
Leonard Tripp and Adam Kolawa. Software certification debate. IEEE Computer, 35(6):31-35, June 2002.

[Vai02]
Siva Vaidhyanathan. Copyright as cudgel. The Chronicle of Higher Education, page B7, August 2, 2002.
http://chronicle.com/free/v48/i47/47b00701.htm.

[Web02]
Arnd Weber. Enabling crypto: How radical innovations occur. Communications of the ACM, 45(4):103-107, April 2002.
ACM library
[Win97]
Langdon Winner. Cyberlibertarian myths and the prospects for community. Computers and Society 27(3):14-19, September 1997.
ACM library. A draft is also available from the author, at http://www.rpi.edu/~winner/cyberlib2.html.

Required Readings

[AJGP93]
Ronald E. Anderson, Deborah G. Johnson, Donald Gotterbarn, and Judith Perrolle. Using the new ACM Code of Ethics in decision making. Communications of the ACM, 36(2):98-107, February 1993.
ACM library
[And01]
Ross Anderson. Why information security is hard: An economic perspective. In 17th Annual Computer Security Applications Conference. Applied Computer Security Associates, 2001.
Available from the author's page at http://www.cl.cam.ac.uk/~rja14/; PDF.

[Bar93]
John Perry Barlow. Selling wine without bottles: The economy of mind on the global net, 1993.
http://www.eff.org/Misc/Publications/John_Perry_Barlow/HTML/idea_economy_article.html.

[Bas98]
Lionel Basney. Questioning "progress". Books & Culture, September/October 1998.
http://www.christianitytoday.com/bc/1998/sepoct/8b5018.html
Publisher's link (above) is now restricted. I will locate it elsewhere.

[Ber00]
Hal Berghel. Identity theft, social security numbers, and the web. Communications of the ACM, 43(2):17-21, February 2000.
ACM library
[Bow10]
Mark Bowden. The Enemy Within. Atlantic Monthly, 305(5):72-83 June 2010.
http://www.theatlantic.com/magazine/archive/2010/06/the-enemy-within/308098/?single_page=true

[Buc99]
Mark Buchanan. Trapped in the cult of the next thing. Christianity Today, 43(10):62-72, September 6 1999.
Via Buswell Library; publisher's restricted link
[Car08]
Nicholas Carr. Is Google Making Us Stupid? Atlantic Monthly, (302)1:56-63, July/August 2008.
http://www.theatlantic.com/magazine/archive/2008/07/is-google-making-us-stupid/6868/.
Via Buswell Library's online resources.

[Den01]
Peter J. Denning. The profession of IT: who are we? Communications of the ACM, 44(2):15-19, February 2001.
ACM library
[Everett]
Percival Everett. The fix. In Best American Short Stories 2000.
[Fal08]
James Fallows. “The connection has been reset”. Atlantic Monthly, Mar 2008.
At http://www.theatlantic.com/magazine/archive/2008/03/-ldquo-the-connection-has-been-reset-rdquo/6650/
[For11a]
Martin Ford. Anything you can do, robots can do better. The Atlantic, online only, 14 Feb 2011.
http://www.theatlantic.com/business/archive/2011/02/anything-you-can-do-robots-can-do-better/71227/.
[For11b]
Martin Ford. Can a computer do a lawyer's job? The Atlantic, online only, 15 Feb 2011.
http://www.theatlantic.com/business/archive/2011/02/can-a-computer-do-a-lawyers-job/71238/.
[For11c]
Martin Ford. Artificial intelligence is the next killer app. The Atlantic, online only, 17 Feb 2011.
http://www.theatlantic.com/business/archive/2011/02/artificial-intelligence-is-the-next-killer-app/71265/.
[Forster]
E.M. Forster. The machine stops.
In the public domain, text available from Wikisource.
(First story in Fairy Tales for Computers.)
[Hal06]
Mark Halpern. The trouble with the Turing test. The New Atlantis, Winter 2006.
http://www.thenewatlantis.com/publications/the-trouble-with-the-turing-test.
[Helprin]
Mark Helprin. The Acceleration of Tranquility. In Forbes ASAP Big Issues: The Examined Life in the Digital Age, pp. 9-21, John Wiley & Sons, 2001.
[Hoa81]
C.A.R. Hoare. The emperor's old clothes. Communications of the ACM, 24(2):75-83, February 1981.
ACM library
[Joy00]
Bill Joy. Why the future doesn't need us. Wired, April 2000. http://www.wired.com/wired/archive/8.04/joy.html.

[Lam88]
David Alex Lamb. Software engineering: An emerging profession? External Technical Report 88-233, Department of Computing and Information Science, Queen's University, September 1988. Available at http://research.cs.queensu.ca/TechReports/Reports/1988-233.pdf.

[Les06a]
Lawrence Lessig. What things regulate. In Code: And Other Laws of Cyberspace, chapter 7. Basic Books, 2006.
Local PDF extract.

[Mor11]
Evgeny Morozov. Why the Internet Is a Great Tool for Totalitarians. Wired, 19(1), January 2011.
http://www.wired.com/magazine/2010/12/st_essay_totalitarians/

[Nis01]
Helen Nissenbaum. How computer systems embody values. IEEE Computer, 34(3):120;118-119, March 2001.
PDF at the author's site.

[Pos90]
Neil Postman. Informing ourselves to death, 1990.
http://w2.eff.org/Net_culture/Criticisms/informing_ourselves_to_death.paper .

[Rac75]
James Rachels. Why privacy is important. Philosophy & Public Affairs, 4(4):323-333, 1975. Accessible via the library (JSTOR) as http://links.jstor.org/sici?sici=0048-3915%28197522%294%3A4%3C323%3AWPII%3E2.0.CO%3B2-G.

[Sta97]
Richard Stallman. The right to read. Communications of the ACM, 40(2):85-87, February 1997. ACM library, or http://www.gnu.org/philosophy/right-to-read.html (with additional notes).

[Tal95a]
Stephen L. Talbott. The machine in the ghost. In [Tal95], chapter 2.
http://netfuture.org/fdnc/ch02.html.

[Tho84]
Ken Thompson. Reflections on trusting trust. Communications of the ACM, 27(8):761-763, August 1984.
ACM library
[Tou01]
David S. Touretzsky. Free speech rights for programmers. Communications of the ACM, 44(8):23-25, August 2001.
ACM library
[Tur50]
Alan Turing. Computing machinery and intelligence. Mind, LIX(236):433-460, October 1950.
Via Buswell Library's online resources.

[Wei95]
Mark Weiser. The technologist's responsibilities and social change. Computer-Mediated Communications Magazine, 2(4):17, April 1 1995.
http://metalab.unc.edu/cmc/mag/1995/apr/last.html.

[Wei86]
Joseph Weizenbaum. Not without us. ACM SIGCAS Computers and Society, 16(2-3):2-7, Summer/Fall 1986.
ACM library
[You11]
Jeffrey R. Young. Programmed for love: The unsettling future of robotics. The Chronicle of Higher Education, 57(20), 21 Jan 2011.
http://chronicle.com/article/Programmed-for-Love-The/125922/.

[Zuc14]
Ethan Zuckerman.. The Internnet's original sin. Atlantic Monthly, Aug 2014. At http://www.theatlantic.com/technology/archive/2014/08/advertising-is-the-internets-original-sin/376041/?single_page=true

Textbook Selections

[1Mumford]
Lewis Mumford. Assimilation of the machine: New cultural values. In Hester and Ford [HesterFord], chapter 1, 3-7.

[1Barbour]
Ian Barbour. Views of technology. In Hester and Ford [HesterFord], chapter 1, 7-34.

[1Kranzberg]
Melvin Kranzberg. Selections on technology. In Hester and Ford [HesterFord], chapter 1, 34-39.

[1Maner]
Walter Maner. Unique problems in information technology. In Hester and Ford [HesterFord], chapter 1, 39-56.

[2Dertouzos]
Michael Dertouzos. Creating the people's computer. In Hester and Ford [HesterFord], chapter 2, 57-63.

[2Roszak]
Theodore Roszak. Computers and reason. In Hester and Ford [HesterFord], chapter 2, 63-74.

[2Heim]
Michael Heim. Logic and intuition. In Hester and Ford [HesterFord], chapter 2, 74-85.

[2Newell]
Allen Newell. Fairy tales. In Hester and Ford [HesterFord], chapter 2, 85-90.

[3Dorbolo]
Jon Dorbolo. Social strategies for software. In Hester and Ford [HesterFord], chapter 3, 95-99.

[3Rheingold]
Howard Rheingold. The virtual community. In Hester and Ford [HesterFord], chapter 3, 100-111.

[3Barlow]
John Perry Barlow. Is there a there in cyberspace? In Hester and Ford [HesterFord], chapter 3, 111-117.

[4Zuboff]
Shoshana Zuboff. In the age of the smart machine. In Hester and Ford [HesterFord], chapter 4, 118-129.

[4Maquire]
G.Q. Maguire, Jr. and Ellen M. McGee. Implantable brain chips? Time for debate. In Hester and Ford [HesterFord], chapter 4, 129-141.

[4Vonnegut]
Kurt Vonnegut, Jr. EPICAC. In Hester and Ford [HesterFord], chapter 4, 141-147.

[4Gozzi]
Raymond Gozzi. Computers and the human identity. In Hester and Ford [HesterFord], chapter 4, 146-152.

[5Berman]
Bruce Berman. The state, computers, and African development: The information non-revolution. In Hester and Ford [HesterFord], chapter 5, 153-166.

[5Sutz]
Judith Sutz. The social implications of information technologies: A Latin American perspective. In Hester and Ford [HesterFord], chapter 5, 166-177.

[5Dyrkton]
Joerge Dyrkton. Cool runnings: The contradictions of cybereality in Jamaica. In Hester and Ford [HesterFord], chapter 5, 178-186.

[5Baldeh]
Yero Baldeh. The ethical dilemma caused by the transfer of information technology to developing countries. In Hester and Ford [HesterFord], chapter 5, 187-190.

[6Hodges]
Michael P. Hodges. Does professional ethics include computer professionals?: Two models for understanding. In Hester and Ford [HesterFord], chapter 6, 195-203.

[6Johnson]
Deborah G. Johnson. Professional relationships. In Hester and Ford [HesterFord], chapter 6, 204-218.

[6Kesar]
Shalini Kesar and Simon Rogerson. Developing ethical practices to minimize computer misuse. In Hester and Ford [HesterFord], chapter 6, 218-232.

[7Ogden]
Michael R. Ogden. Electronic power to the people: Who is technology's keeper on the cyberspace frontier? In Hester and Ford [HesterFord], chapter 7, 233-249.

[7Markey]
Representative Edward J. Markey. Remarks at the Computers, Freedom, and Privacy Conference. In Hester and Ford [HesterFord], chapter 7, 249-255.

[7Elgesem]
Dag Elgesem. Privacy, respect for persons, and risk. In Hester and Ford [HesterFord], chapter 7, 256-277.

[8Swinyard]
W.R. Swinyard, H. Rinnie, and A. Keng Kau. The morality of software piracy: A cross-cultural analysis. In Hester and Ford [HesterFord], chapter 8, 278-292.

[8Nissenbaum]
Helen Nissenbaum. Should I copy my neighbor's software? In Hester and Ford [HesterFord], chapter 8, 292-307.

[8Pirate]
Pirate editorial. So you want to be a pirate? In Hester and Ford [HesterFord], chapter 8, 308-309.

[9Forester]
Tom Forester and Perry Morrison. Hacking and viruses. In Hester and Ford [HesterFord], chapter 9, 310-330. Not required.

[9Mentor]
The Mentor. The conscience of a hacker. In Hester and Ford [HesterFord], chapter 9, 331-332.

[9Spafford]
Eugene Spafford. Are computer hacker break-ins ethical? In Hester and Ford [HesterFord], chapter 9, 332-344.

[9Spinello]
Richard Spinello. Interview with a hacker. In Hester and Ford [HesterFord], chapter 9, 344-347.

[9Gozzi]
Raymond Gozzi. The computer virus as metaphor. In Hester and Ford [HesterFord], chapter 9, 348-351. Not required.

[10Vonnegut]
Kurt Vonnegut, Jr. Baku: EPICAC XIV. In Hester and Ford [HesterFord], chapter 10, 356-362.

[10Remenyi]
Dan Remenyi and Brian Williams. Some aspects of ethics and research into the silicon brain. In Hester and Ford [HesterFord], chapter 10, 362-374.

[10Dreyfus]
Hubert Dreyfus. Misrepresenting human intelligence. In Hester and Ford [HesterFord], chapter 10, 374-386.

[10Turkle]
Sherry Turkle. What we are thinking about when we are thinking about computers: Thinking about aliveness. In Hester and Ford [HesterFord], chapter 10, 387-392.

[11Wilson]
John Wilson. Effects of participating in virtual environments. In Hester and Ford [HesterFord], chapter 11, 393-407.

[11Whitby]
Blay Whitby. The virtual sky is not the virtual limit: Ethics in virtual reality. In Hester and Ford [HesterFord], chapter 11, 408-420.

[11Lancet]
The Lancet. Being and believing: Ethics of virtual reality. In Hester and Ford [HesterFord], chapter 11, 420-423.

[12Gore]
Albert Gore, Jr. Remarks on the Internet and information technologies. In Hester and Ford [HesterFord], chapter 12, 424-435. Not required.

[12Kellner]
Mark A. Kellner and Douglas Groothuis. Losing our souls in cyberspace. In Hester and Ford [HesterFord], chapter 12, 436-439.

[12Dibbell]
Julian Dibbell. A rape in cyberspace. In Hester and Ford [HesterFord], chapter 12, 439-452. Not required.

[12Gilbert]
Pamela Gilbert. On space, sex, and being stalked. In Hester and Ford [HesterFord], chapter 12, 452-463. Not required.

[AppendixA]
ACM/IEEE Software Engineering Code of Ethics and Professional Practice. In Hester and Ford [HesterFord], appendix A, 467-476.
[HesterFord]
D. Micah Hester and Paul J. Ford, editors. Computers and Ethics in the Cyberage. Prentice-Hall, 2001.

Valid HTML 4.01!