Last modified: Sat Apr  2 09:40:05 CDT 2016 
Contents
- RISKS
	  Digest
 
- Freedom to
	  Tinker
 -  Blogs at Princeton's
	Center for Information Technology Policy
 
- ACM Special Interest Group on Computers and Society (SIGCAS)
 
- PRIVACY Forum
 - A moderated mailing list similar to RISKS Digest, but dealing with privacy issues
 
- Electronic Frontier Foundation (EFF)
 
- Electronic Privacy Information Center
 
- People for Internet Responsibility
 
- Institute for Women and Technology
 
- NetFuture
 
  - [Gel16]
 - David Gelernter.
    Machines That Will Think and Feel.
    Wall Street Journal, 18 March 2016.
    http://www.wsj.com/articles/when-machines-think-and-feel-1458311760?mg=id-wsj.
 
Not in the lounge
- [Bro02]
 - Rodney A. Brooks.
Flesh and Machines: How Robots Will Change Us. Vintage, 2002.
 - [Ell64]
 - Jacques Ellul.
  The Technological Society.  Vintage Books, 1964.
 
 - [Kur99]
 - Ray Kurzweil.
The Age of Spiritual Machines: When Computers Exceed Human Intelligence. Penguin, 1999.
 - [Les06a]
 - Lawrence Lessig.
Code: And Other Laws of Cyberspace, version 2.0.
Basic Books, 2006.
Available in various forms, including full PDF, http://www.codev2.cc/.
  See especially chapters 7 and 10.
 - [Lew47]
 - C.S. Lewis. 
  The Abolition of Man.  MacMillan, 1947.
 
 - [Ros94]
 - Theodore Roszak.
The Cult of Information. U California Press, 1994.
 
My books in the CS lounge
  - [Doc00]
 - E.L. Doctorow, ed.
    Best American Short Stories 2000. Houghton Mifflin, 2000.
    Contains [Everett].
    
 - [Fai69]
 - Various.
    Fairy Tales for Computers. Eakins Press, 1969.
    Contains [Forster].
 - [For01]
 - 
    Forbes ASAP Big Issues: The Examined Life in the Digital Age. Wiley, 2001.
    Contains [Helprin].
    
 - [ALL08]
 - Hal Abelson, Ken Ledeen, and Harry Lewis.
Blown to Bits: Your Life, Liberty and Happiness After the
  Digital Explosion.
Addison-Wesley, 2008.
 - [Bor84c]
 - Albert Borgmann.
Technology and the Character of Contemporary Life. U
  Chicago Press, 1984.
 - [Bor99]
 - Albert Borgmann.
Holding On to Reality: The Nature of Information at the Turn of
  the Millenium. U Chicago Press, 1999.
 - [Bre04]
 - Eric Brende.
Better Off: Flipping the Switch on
  Technology. HarperCollins, 2004.
 - [DL07]
 - Whitfield Diffie and Susan Landau.
Privacy on the Line: The Politics of Wiretapping and Encryption.
MIT Press, 2007.
 - [Gar00]
 - Simson Garfinkel.
Database Nation: The Death of Privacy in the 21st Century. O'Reilly and Associates, 2000.
 - [Hat88]
 - Nathan Hatch, ed.
The Professions in American History. U. Notre Dame Press, 1988.
  Also in Buswell library.
 
 - [JS12]
 - Douglas W. Jones and Barbara Simons.
Broken Ballots: Will Your Vote Count?. CSLI Publications, 2012.
 - [Lan10a]
 - Susan Landau.
Surveillance or Security? The Risks Posed by New Wiretapping Technologies.
MIT Press, 2010.
 - [Lan10b]
 - Jaron Lanier.
You Are Not a Gadget. Knopf, 2010.
 - [Les99]
 - Lawrence Lessig.
Code: And Other Laws of Cyberspace. Basic Books, 1999.
  This is an earlier edition of [Les06].
 
 - [Lev95b]
 - Nancy G. Leveson.
Safeware: System Safety and Computers. Addison-Wesley,
  1995.
 - [Mac11]
 - Rebecca MacKinnon.
Consent of the Networked: The Worldwide Struggle for Internet Freedom.
Basic Books, 2011.
 - [Mor11a]
 - Evgeny Morozov.
The Net Delusion:  The Dark Side of Internet Freedom.
Public Affairs, 2011.
 - [Par11]
 - Eli Pariser.
The Filter Bubble: What the Internet is Hiding from
  You. Penguin, 2011.
 - [Pet95]
 - Ivars Peterson.
Fatal Defect: Chasing Killer Computer Bugs. Vintage Books, 1995.
 - [Pos92]
 - Neil Postman.
Technopoly: The Surrender of Culture to Technology.
Knopf, 1992.
 - [Sin09]
 - P. W. Singer.
Wired for War: The Robotics Revolution and Conflict in the 21st
  Century. Penguin, 2009.
missing
 - [Tal95a]
 - Stephen L. Talbott.
The Future Does Not Compute: Transcending the Machines in Our
 Midst.
O'Reilly & Assoc., 1995.
http://netfuture.org/fdnc/.
 - [Tur11]
 - Sherry Turkle.
Alone Together: Why We Expect More from Technology and Less from
  Each Other. Basic Books, 2011.
 - [Wei76]
 - Joseph Weizenbaum.
Computer Power and Human Reason: From Judgment to
  Calculation. W.H. Freeman, 1976.
  
 - [Zit08]
 - Jonathan Zittrain.
The Future of the Internet, And How to Stop It.
Yale University Press, 2008.
 
Other books in the CS lounge
- [Car10a]
 - Nicholas Carr.
    The Shallows: What the Internet is Doing to Our Brains.
    W.W. Norton, 2010.
    An expansion of [Car08].
 
- [Arn14]
 - Axel Arnbak.
"Loopholes for Circumventing the Constitution", the NSA Statement, and
  Our Response.
  Freedom to Tinker (Princeton Center for Information Technology Policy),
  11 July 2014.
https://freedom-to-tinker.com/blog/axel/our-response-to-the-nsa-reaction-to-our-new-internet-traffic-shaping-paper/.
  (Note also the referenced conference paper and news coverage.)
 - [Bas98]
 - 
Lionel Basney.
Questioning "progress".
Books & Culture, September/October 1998.
http://www.christianitytoday.com/bc/1998/sepoct/8b5018.html
  Publisher's link (above) is now restricted.  I will locate it elsewhere.
 - [Ber00]
 - 
Hal Berghel.
Identity theft, social security numbers, and the web.
Communications of the ACM, 43(2):17-21, February 2000.
ACM library 
 - [Bog15]
 - Ian Bogost.
Programmers: Stop calling yourselves engineers.
Atlantic, November~5 2015.
http://www.theatlantic.com/technology/archive/2015/11/programmers-should-not-call-themselves-engineers/414271/.
 - [Bor84a]
 - Albert Borgmann.
  The Device Paradigm.  Chapter 9 of [Bor84c], pages 40-48.
  Local
  PDF excerpt.
 - [Bor84b]
 - Albert Borgmann.
  Focal Things and Practices.  Chapter 23 of [Bor84c], pages 196-210.
  Local
  PDF excerpt.
   - [Car10b]
 - Nicholas Carr.
    Tracking Is an Assault on Liberty, With Real Dangers.
    Wall Street Journal, 6 August 2010.
    http://online.wsj.com/article/SB10001424052748703748904575411682714389888.html.
    
   - [Cat10]
 - 
    Fred H. Cate.
    Government access to private-sector data.
    IEEE Security & Privacy 8(6):68-71, Nov/Dec 2010.
    Available via IEEE Computing Now at
    http://www.computer.org/cms/Computer.org/ComputingNow/homepage/2011/0211/W_SP_GovtAccessPrivateSectorData.pdf
 
    - [Cha95]
 - Daniel Chandler.
Technological or media determinism, 1995.
http://www.aber.ac.uk/media/Documents/tecdet/tecdet.html.
       - [Chr11]
 - Brian Christian.
Mind vs. machine.
Atlantic Monthly, March 2011.
http://www.theatlantic.com/magazine/archive/2011/01/mind-vs-machine/8386/.
Via Buswell.
	
 - [Cla88]
 - 
Roger Clarke.
Information technology and dataveillance.
Communications of the ACM, 31(5):498-512, May 1988.
ACM library
 - [Dav11]
 - 
  Michael Davis.
  Will Software Engineering Ever Be Engineering?
  Communications of the ACM, 54(11):32-34, November 2011.
ACM library
  
 - [D+93]
 - 
Dorothy E. Denning et al.
To tap or not to tap.
Communications of the ACM, 36(3):24-44, March 1993.
Opening: ACM library 
Comments: ACM library 
Closing: ACM library
 - [Den01]
 - 
Peter J. Denning.
The profession of {IT}: Who are we?
Communications of the ACM, 44(2):15--19, February 2001.
ACM library
     - [D+89]
 - Edsgar W. Dijkstra et al.
A debate on teaching computing science.
Communications of the ACM, 32(12):1397-1414, December 1989.
Includes "On the Cruelty of Really Teaching Computing Science",
 presented at the February 1989 ACM Computer Science Conference, and
 responses.
ACM library
 - [DF94]
 - Stephen Doheny-Farina.
Default = offline, or why Ubicomp scares me.
Computer-Mediated Communications Magazine, 1(6):18, October 1
 1994.
http://sunsite.unc.edu/cmc/mag/1994/oct/last.html.
  
 - [EC99]
 - 
Amitai Etzioni and Michael Cromartie.
Why we need less privacy.
Books & Culture, May/June 1999.
Publisher's
  link is restricted to subscribers.
 - [Fal00]
 - James Fallows.
Inside the leviathan.
Atlantic Monthly, (285)2:34-38, February 2000.
http://www.theatlantic.com/issues/2000/02/002fallows.htm.
Via Buswell.
 - [For11a]
 - Martin Ford.
Anything you can do, robots can do better.
The Atlantic, online only, 14 Feb 2011.
http://www.theatlantic.com/business/archive/2011/02/anything-you-can-do-robots-can-do-better/71227/.
 - [For11b]
 - Martin Ford.
Can a computer do a lawyer's job?
The Atlantic, online only, 15 Feb 2011.
http://www.theatlantic.com/business/archive/2011/02/can-a-computer-do-a-lawyers-job/71238/.
 - [For11c]
 - Martin Ford.
Artificial intelligence is the next killer app.
The Atlantic, online only, 17 Feb 2011.
http://www.theatlantic.com/business/archive/2011/02/artificial-intelligence-is-the-next-killer-app/71265/.
  - [Gar08]
 - 
    Simson L. Garfinkel.
    Information of the world, unite!
    Scientific American 299(3):82-87, Sep 2008.
    Via library resources.
 
    
- [Giv02]
 - Beth Givens.
Public records on the Internet:  the privacy dilemma.
Proceeings of the 12th Annual Conference on 
Computers, Freedom, and Privacy, ACM, April 2002.
ACM library
 - [G+99]
 - Don Gotterbarn et al.
Computer Society and ACM approve Software Engineering Code of
 Ethics.
Computer, 32(10):84-88, October 1999.
 - [Got15]
 - 
Don Gotterbarn.
Professional practice by unlicensed professionals.
ACM Inroads, 6(4):16--19, November 2015.
ACM library
 - [Gra07]
 - 
Jennifer Granick.
Sowing the Seeds of Surveilance.
Wired News, January 31, 2007.
http://archive.wired.com/politics/law/commentary/circuitcourt/2007/01/72608?currentPage=all
 - [Hal06]
 - Mark Halpern.
The trouble with the Turing test.
The New Atlantis, Winter 2006.
http://www.thenewatlantis.com/publications/the-trouble-with-the-turing-test.
 - [Jac02a]
 - Alan Jacobs.
Computer control: Who's in charge?
Books & Culture, 8(3):16-, May/June 2002.
via Buswell Library; publisher's restricted
  link
 - [Jac02b]
 - Alan Jacobs.
Life among the Cyber-Amish. (Computer Control Part 2)
Books & Culture, 8(4):14-, July/August 2002.
via
  Buswell Library;  publisher's restricted
  link
 - [Jac02c]
 - Alan Jacobs.
The virtues of resistance. (Computer Control Part 3)
Books & Culture, 8(5):22-, September/October 2002.
via
  Buswell Library; publisher's restricted
  link
   - [Joh11]
 - Keith Johnson.
    Qualified success claimed against computer worm.
    Wall Street Journal, 24 January 2011.
    http://online.wsj.com/article/SB10001424052748704279704576102433926728902.html
    
   - [Kus84]
 - 
Richard P. Kusserow.
The government needs computer matching to root out waste and fraud.
Communications of the ACM, 27(6):542-545, June 1984.
ACM library
 - [Lam88]
 - 
David Alex Lamb.
Software engineering: An emerging profession?
External Technical Report 88-233, Department of Computing and
 Information Science, Queen's University, September 1988.
Available at http://research.cs.queensu.ca/TechReports/Reports/1988-233.pdf.
 - [Les06b]
 - Lawrence Lessig.
  Intellectual Property.  Chapter 10 of [Les06].
  Wiki, 
  local
  PDF excerpt.
 - [Les01]
 - Toby Lester.
The reinvention of privacy.
Atlantic Monthly, 287(3):27-39, March 2001.
Via Buswell Library's online resources
Online at http://www.theatlantic.com/magazine/archive/2001/03/the-reinvention-of-privacy/302140/
 - [Lev95a]
 - Nancy G. Leveson.
Medical Devices: The Therac-25 Story.
In Safeware: System Safety and
  Computers, appendix A. Addison-Wesley, 1995.
  Available from the author at http://sunnyday.mit.edu/therac-25.html.
  
 - [Man98]
 - 
Charles C. Mann.
Who will own your next good idea?
  Atlantic Monthly, 282(3):57-82, September 1998.
  Via Buswell.
http://www.theatlantic.com/issues/98sep/copy.htm
 - [Man99]
 - Charles C. Mann.
The unacknowledged legislators of the digital world.
Atlantic Unbound, (1999.12.15), 1999.
http://www.theatlantic.com/unbound/digicult/dc991215.htm.
 - [Man00a]
 - Charles C. Mann.
Bugged.
Atlantic Unbound, (2000.03.15), 2000.
http://www.theatlantic.com/unbound/digicult/dc2000-03-15.htm.
 - [Man00b]
 - Charles C. Mann.
The heavenly jukebox.
Atlantic Monthly, 286(3):39-59, September 2000.
Via Buswell.
  http://www.theatlantic.com/magazine/archive/2000/09/the-heavenly-jukebox/305141/?single_page=true.
 - [Man02]
 - Charles C. Mann.
Homeland insecurity.
  Atlantic Monthly, 290(2):81-102, September 2002.
  Via Buswell.
http://www.theatlantic.com/doc/200209/mann.
 
 - [Mil99]
 - Eric Miller.
Keeping up with the Amish.
Christianity Today, 43(11):62-72, October 4 1999.
Via
  Buswell Library; publisher's restricted
  link
 - [Mil02]
 - 
Ralph R. Miller. 
Viewpoint: Information management in the aftermath of 9/11.
Communications of the ACM, 45(9):31-33, September 2002.
ACM library 
 - [Mona]
 - Lowell Monke.
Computers in education: The web and the plow.
At NETFUTURE. May 16, 1996.
http://www.netfuture.org/1996/May1696_19.html#4.
 - [NW01]
 - Peter G. Neumann and Lauren Weinstein.
Risks of national identity cards.
Communications of the ACM, 44(12):176, December 2001.
ACM library
 - [New14]
 - 
  Room for Debate: Apple vs. the Law.
  New York Times, 30 Sep 2014.
http://www.nytimes.com/roomfordebate/2014/09/30/apple-vs-the-law?partner=rss&emc=rss.
    
 - [Orr02]
 - Diana Mayer Orrick.
Toward adequate online privacy safeguards.
IEEE Computer, 35(8):92;90-91, August 2002.
   - [Per11]
 - Tekla Perry.
    Cellphones take the witness stand. IEEE Spectrum Tech Talk
    blog, 2 February 2011.
    http://spectrum.ieee.org/tech-talk/telecom/wireless/cellphones-take-the-witness-stand/
    
 - [Por95]
 - David Porush.
Ubiquitous computing vs. radical privacy: A reconsideration of the
 future.
Computer-Mediated Communications Magazine, 2(3):46, March 1
 1995.
http://metalab.unc.edu/cmc/mag/1995/mar/last.html.
 - [Ros02]
 - 
Paul F. Ross.
Whatever became of integrity?
Communications of the ACM, 45(9):27-28, September 2002.
ACM library
 - [Sal68]
 - 
G. Salton.
Editorial: On the future of mechanical information files.
Communications of the ACM, 11(1):2, January 1968.
ACM library
 - [San02]
 - 
Simone Santini.
Using language more responsibly.
IEEE Computer, 35(12):128;126-127, December 2002.
 - [Sei14]
 - 
Stephen Seidman.
Computing: An emerging profession?
ACM Inroads, 5(4):6--11, December 2014.
ACM library
  
 - [Sha84]
 - 
John Shattuck.
Computer matching is a serious threat to individual rights.
Communications of the ACM, 27(6):538-541, June 1984.
ACM library
 - [Spe99]
 - 
John R. Speed.
What do you mean I can't call myself a software engineer?
IEEE Software, 16(6):45-50, November/December 1999.
 - [Sto03]
 - 
Adam Stone.
Software flaws:  To tell or not to tell?
IEEE Software, 20(1):70-73, January/February 2003.
 - [Tav96]
 - Herman T. Tavani.
Computer matching and personal privacy:  Can they be compatible?
Proceeings of the 1996 Symposium on Computers and the Quality of Life,
ACM SIGCAS, February 1996.
ACM library
 - [TK02]
 - Leonard Tripp and Adam Kolawa.
Software certification debate.
IEEE Computer, 35(6):31-35, June 2002.
 - [Vai02]
 - Siva Vaidhyanathan.
Copyright as cudgel.
The Chronicle of Higher Education, page B7, August 2, 2002.
http://chronicle.com/free/v48/i47/47b00701.htm.
 - [VDSV12]
 - Jennifer
  Valentino-Devries and Jeremy Singer-Vine.
    They Know What You're Shopping For.
    Wall Street Journal, 7 December 2012.
    http://online.wsj.com/news/articles/SB10001424127887324784404578143144132736214.
    
 - [Wal10]
 - 
    What They Know.
    Wall Street Journal, 2010.
    A "special report" at
    http://online.wsj.com/public/page/what-they-know-2010.html.
  Additional collections for subsequent years also reachable there
  (though not all articles are directly accessible).
    
 - [Web02]
 - 
Arnd Weber.
Enabling crypto: How radical innovations occur.
Communications of the ACM, 45(4):103-107, April 2002.
ACM library
 - [Win97]
 - 
Langdon Winner.  Cyberlibertarian myths and the prospects for community.
Computers and Society 27(3):14-19, September 1997.
  ACM library.
A draft is also available from the author, at http://www.rpi.edu/~winner/cyberlib2.html.
 - [Wei95]
 - 
Mark Weiser.
The technologist's responsibilities and social change.
Computer-Mediated Communications Magazine, 2(4):17, April 1
 1995.
http://metalab.unc.edu/cmc/mag/1995/apr/last.html.
 
- [AJGP93]
 - 
Ronald E. Anderson, Deborah G. Johnson, Donald Gotterbarn, and Judith Perrolle.
Using the new ACM Code of Ethics in decision making.
Communications of the ACM, 36(2):98-107, February 1993.
ACM library
 - [And01]
 - 
Ross Anderson.
Why information security is hard: An economic perspective.
In 17th Annual Computer Security Applications Conference.
 Applied Computer Security Associates, 2001.
Available from the author's page at
 http://www.cl.cam.ac.uk/~rja14/;
  PDF.
 - [Bar93]
 - 
John Perry Barlow.
Selling wine without bottles: The economy of mind on the global net,
 1993.
http://www.eff.org/Misc/Publications/John_Perry_Barlow/HTML/idea_economy_article.html.
 - [Bow10]
 - 
Mark Bowden.
The Enemy Within.
Atlantic Monthly, 305(5):72-83 June 2010.
Via Buswell.
http://www.theatlantic.com/magazine/archive/2010/06/the-enemy-within/308098/?single_page=true
  
 - [Buc99]
 - 
Mark Buchanan.
Trapped in the cult of the next thing.
Christianity Today, 43(10):62-72, September 6 1999.
Via
  Buswell Library; publisher's restricted link
 - [Car08]
 - Nicholas Carr.
Is Google Making Us Stupid?
Atlantic Monthly, (302)1:56-63, July/August 2008.
http://www.theatlantic.com/magazine/archive/2008/07/is-google-making-us-stupid/6868/.
Via Buswell.
 - [DL08]
 - 
    Whitfield Diffie and Susan Landau.
    Brave new world of wiretapping.
    Scientific American 299(3):56-63, Sep 2008.
    Via library resources.
 
- [Duh12]
 - Charles Duhigg.
    How Companies Learn Your Secrets.
    New York Times Magazine, MM30, 19 February 2012.
    http://www.nytimes.com/2012/02/19/magazine/shopping-habits.html?pagewanted=all&emc=rss
    
 - [Eve00]
 - 
Percival Everett.
The fix.
In Best American Short Stories 2000.
 
 - [Fal08]
 - 
      James Fallows.
      “The connection has been reset”.
   Atlantic Monthly, Mar 2008.
Via Buswell.
      Also at http://www.theatlantic.com/magazine/archive/2008/03/-ldquo-the-connection-has-been-reset-rdquo/6650/
 
- [For09]
 - 
E.M. Forster.
The machine stops.  1909.
In the public domain, text available from  
Wikisource.
(First story in Fairy Tales for Computers.)
 
- [GP13]
 - Barton Gellman and Laura Poitras.
U.S., British intelligence mining data from nine U.S. Internet
  companies in broad secret program.
  Washington Post, 7 June 2013.
http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html?hpid=z1.
    
 - [GM13]
 - Glenn Greenwald and Ewen MacAskill.
  NSA Prism program taps in to user data of Apple, Google and others.
  The Guardian, 6 June 2013.
http://www.theguardian.com/world/2013/jun/06/us-tech-giants-nsa-data.
    
  
 - [Har10]
 - Jim Harper.
    It's Modern Trade: Web Users Get as Much as They Give.
    Wall Street Journal, 7 August 2010.
    http://online.wsj.com/article/SB10001424052748703748904575411530096840958.html.
    
 - [Hel01]
 - Mark Helprin.
The Acceleration of Tranquility.
In Forbes ASAP Big Issues: The Examined Life in the Digital
  Age, pp. 9-21, John Wiley & Sons, 2001.
  Previously published as Forbes 158(13), 3 Dec 1996,
  p. 14.
  Available via Buswell.
  
 - [Hoa81]
 - 
C.A.R. Hoare.
The emperor's old clothes.
Communications of the ACM, 24(2):75-83, February 1981.
ACM library
 - [Joy00]
 - 
Bill Joy.
Why the future doesn't need us.
Wired, April 2000.
http://www.wired.com/wired/archive/8.04/joy.html.
 - [Les06c]
 - 
Lawrence Lessig.
What things regulate.
In Code: And Other Laws of
  Cyberspace, chapter 7. Basic Books, 2006.
  Wiki, 
local
  PDF extract.
 - [Mor11b]
 - 
Evgeny Morozov.
Why the Internet Is a Great Tool for Totalitarians.
Wired, 19(1), January 2011.
http://www.wired.com/magazine/2010/12/st_essay_totalitarians/
 - [Nis01]
 - 
Helen Nissenbaum.
How computer systems embody values.
IEEE Computer, 34(3):120;118-119, March 2001.
PDF at the author's site.
 - [Pos90]
 - 
Neil Postman.
Informing ourselves to death, 1990.
http://w2.eff.org/Net_culture/Criticisms/informing_ourselves_to_death.paper
.
 - [Pur14]
 - Newley Purnell.
Smartphone Spyware Targets Hong Kong Protesters.
  WSJ.D, 3 Oct 2014.
http://blogs.wsj.com/digits/2014/10/03/smartphone-spyware-targets-hong-kong-protesters/?mod=WSJBlog.
    
 - [Rac75]
 - 
James Rachels.
Why privacy is important.
Philosophy & Public Affairs, 4(4):323-333, 1975.
Accessible via the library (JSTOR) as http://links.jstor.org/sici?sici=0048-3915%28197522%294%3A4%3C323%3AWPII%3E2.0.CO%3B2-G.
 - [SC14]
 - David E. Sanger and Brian X. Chen.
Signaling Post-Snowden Era, New iPhone Locks Out N.S.A.
  NY Times, 26 Sep 2014.
http://www.nytimes.com/2014/09/27/technology/iphone-locks-out-the-nsa-signaling-a-post-snowden-era-.html?partner=rss&emc=rss.
    
 - [Sol11]
 - Daniel J. Solove.
Why Privacy Matters Even if You Have 'Nothing to Hide'.
The Chronicle of Higher Education, 57(37), 15 May 2011.
http://chronicle.com/article/Why-Privacy-Matters-Even-if/127461/.
 - [Sta97]
 - 
Richard Stallman.
The right to read.
Communications of the ACM, 40(2):85-87, February 1997.
ACM library, 
or http://www.gnu.org/philosophy/right-to-read.html
  (with additional notes).
 - [Tal95b]
 - 
Stephen L. Talbott.
The machine in the ghost.
In [Tal95a], chapter 2.
http://netfuture.org/fdnc/ch02.html.
 - [Tho84]
 - 
Ken Thompson.
Reflections on trusting trust.
Communications of the ACM, 27(8):761-763, August 1984.
ACM library
 - [Tou01]
 - 
David S. Touretzsky.
Free speech rights for programmers.
Communications of the ACM, 44(8):23-25, August 2001.
ACM library
 - [Tur50]
 - 
Alan Turing.
Computing machinery and intelligence.
Mind, LIX(236):433-460, October 1950.
Via Buswell Library's online resources.
 - [Wei86]
 - Joseph Weizenbaum.
Not without us.
ACM SIGCAS Computers and Society, 16(2-3):2-7, Summer/Fall 1986.
ACM library
 - [You11]
 - Jeffrey R. Young.
Programmed for love: The unsettling future of robotics.
The Chronicle of Higher Education, 57(20), 21 Jan 2011.
http://chronicle.com/article/Programmed-for-Love-The/125922/.
 - [Zuc14]
 - 
      Ethan Zuckerman.
      The Internet's original sin.
      Atlantic Monthly, Aug 2014.
      At http://www.theatlantic.com/technology/archive/2014/08/advertising-is-the-internets-original-sin/376041/?single_page=true
 
- [1Mumford]
 - 
Lewis Mumford.
Assimilation of the machine: New cultural values.
In Hester and Ford [HesterFord], chapter 1, 3-7.
 - [1Barbour]
 - 
Ian Barbour.
Views of technology.
In Hester and Ford [HesterFord], chapter 1, 7-34.
 - [1Kranzberg]
 - 
Melvin Kranzberg.
Selections on technology.
In Hester and Ford [HesterFord], chapter 1, 34-39.
 - [1Maner]
 - 
Walter Maner.
Unique problems in information technology.
In Hester and Ford [HesterFord], chapter 1, 39-56.
 - [2Dertouzos]
 - 
Michael Dertouzos.
Creating the people's computer.
In Hester and Ford [HesterFord], chapter 2, 57-63.
 - [2Roszak]
 - 
Theodore Roszak.
Computers and reason.
In Hester and Ford [HesterFord], chapter 2, 63-74.
 - [2Heim]
 - 
Michael Heim.
Logic and intuition.
In Hester and Ford [HesterFord], chapter 2, 74-85.
 - [2Newell]
 - 
Allen Newell.
Fairy tales.
In Hester and Ford [HesterFord], chapter 2, 85-90.
 - [3Dorbolo]
 - 
Jon Dorbolo.
Social strategies for software.
In Hester and Ford [HesterFord], chapter 3, 95-99.
 - [3Rheingold]
 - 
Howard Rheingold.
The virtual community.
In Hester and Ford [HesterFord], chapter 3, 100-111.
 - [3Barlow]
 - 
John Perry Barlow.
Is there a there in cyberspace?
In Hester and Ford [HesterFord], chapter 3, 111-117.
 - [4Zuboff]
 - 
Shoshana Zuboff.
In the age of the smart machine.
In Hester and Ford [HesterFord], chapter 4, 118-129.
 - [4Maquire]
 - 
G.Q. Maguire, Jr. and Ellen M. McGee.
Implantable brain chips? Time for debate.
In Hester and Ford [HesterFord], chapter 4, 129-141.
 - [4Vonnegut]
 - 
Kurt Vonnegut, Jr.
EPICAC.
In Hester and Ford [HesterFord], chapter 4, 141-147.
 - [4Gozzi]
 - 
Raymond Gozzi.
Computers and the human identity.
In Hester and Ford [HesterFord], chapter 4, 146-152.
 - [5Berman]
 - 
Bruce Berman.
The state, computers, and African development: The information
 non-revolution.
In Hester and Ford [HesterFord], chapter 5, 153-166.
 - [5Sutz]
 - 
Judith Sutz.
The social implications of information technologies: A Latin
 American perspective.
In Hester and Ford [HesterFord], chapter 5, 166-177.
 - [5Dyrkton]
 - 
Joerge Dyrkton.
Cool runnings: The contradictions of cybereality in Jamaica.
In Hester and Ford [HesterFord], chapter 5, 178-186.
 - [5Baldeh]
 - 
Yero Baldeh.
The ethical dilemma caused by the transfer of information technology
 to developing countries.
In Hester and Ford [HesterFord], chapter 5, 187-190.
 - [6Hodges]
 - 
Michael P. Hodges.
Does professional ethics include computer professionals?: Two models
 for understanding.
In Hester and Ford [HesterFord], chapter 6, 195-203.
 - [6Johnson]
 - 
Deborah G. Johnson.
Professional relationships.
In Hester and Ford [HesterFord], chapter 6, 204-218.
 - [6Kesar]
 - 
Shalini Kesar and Simon Rogerson.
Developing ethical practices to minimize computer misuse.
In Hester and Ford [HesterFord], chapter 6, 218-232.
 - [7Ogden]
 - 
Michael R. Ogden.
Electronic power to the people: Who is technology's keeper on the
 cyberspace frontier?
In Hester and Ford [HesterFord], chapter 7, 233-249.
 - [7Markey]
 - 
Representative Edward J. Markey.
Remarks at the Computers, Freedom, and Privacy Conference.
In Hester and Ford [HesterFord], chapter 7, 249-255.
 - [7Elgesem]
 - 
Dag Elgesem.
Privacy, respect for persons, and risk.
In Hester and Ford [HesterFord], chapter 7, 256-277.
 - [8Swinyard]
 - 
W.R. Swinyard, H. Rinnie, and A. Keng Kau.
The morality of software piracy: A cross-cultural analysis.
In Hester and Ford [HesterFord], chapter 8, 278-292.
 - [8Nissenbaum]
 - 
Helen Nissenbaum.
Should I copy my neighbor's software?
In Hester and Ford [HesterFord], chapter 8, 292-307.
 - [8Pirate]
 - 
Pirate editorial.
So you want to be a pirate?
In Hester and Ford [HesterFord], chapter 8, 308-309.
 - [9Forester]
 - 
Tom Forester and Perry Morrison.
Hacking and viruses.
In Hester and Ford [HesterFord], chapter 9, 310-330.
Not required.
 - [9Mentor]
 - 
The Mentor.
The conscience of a hacker.
In Hester and Ford [HesterFord], chapter 9, 331-332.
 - [9Spafford]
 - 
Eugene Spafford.
Are computer hacker break-ins ethical?
In Hester and Ford [HesterFord], chapter 9, 332-344.
 - [9Spinello]
 - 
Richard Spinello.
Interview with a hacker.
In Hester and Ford [HesterFord], chapter 9, 344-347.
 - [9Gozzi]
 - 
Raymond Gozzi.
The computer virus as metaphor.
In Hester and Ford [HesterFord], chapter 9, 348-351.
Not required.
 - [10Vonnegut]
 - 
Kurt Vonnegut, Jr.
Baku: EPICAC XIV.
In Hester and Ford [HesterFord], chapter 10, 356-362.
 - [10Remenyi]
 - 
Dan Remenyi and Brian Williams.
Some aspects of ethics and research into the silicon brain.
In Hester and Ford [HesterFord], chapter 10, 362-374.
 - [10Dreyfus]
 - 
Hubert Dreyfus.
Misrepresenting human intelligence.
In Hester and Ford [HesterFord], chapter 10, 374-386.
 - [10Turkle]
 - 
Sherry Turkle.
What we are thinking about when we are thinking about computers:
 Thinking about aliveness.
In Hester and Ford [HesterFord], chapter 10, 387-392.
 - [11Wilson]
 - 
John Wilson.
Effects of participating in virtual environments.
In Hester and Ford [HesterFord], chapter 11, 393-407.
 - [11Whitby]
 - 
Blay Whitby.
The virtual sky is not the virtual limit: Ethics in virtual reality.
In Hester and Ford [HesterFord], chapter 11, 408-420.
 - [11Lancet]
 - 
The Lancet.
Being and believing: Ethics of virtual reality.
In Hester and Ford [HesterFord], chapter 11, 420-423.
 - [12Gore]
 - 
Albert Gore, Jr.
Remarks on the Internet and information technologies.
In Hester and Ford [HesterFord], chapter 12, 424-435.
Not required.
 - [12Kellner]
 - 
Mark A. Kellner and Douglas Groothuis.
Losing our souls in cyberspace.
In Hester and Ford [HesterFord], chapter 12, 436-439.
 - [12Dibbell]
 - 
Julian Dibbell.
A rape in cyberspace.
In Hester and Ford [HesterFord],
  chapter 12, 439-452.
Not required.
 - [12Gilbert]
 - 
Pamela Gilbert.
On space, sex, and being stalked.
In Hester and Ford [HesterFord], chapter 12, 452-463.
Not required.
 - [AppendixA]
 - 
ACM/IEEE Software Engineering Code of Ethics and Professional Practice.
In Hester and Ford [HesterFord],
  appendix A, 467-476.
 - [HesterFord]
 - 
D. Micah Hester and Paul J. Ford, editors.
Computers and Ethics in the Cyberage.
Prentice-Hall, 2001.