Other interesting articles and books

The resources listed here are provided mainly to give some ideas for your term paper. Many come from a list of readings (including supplement) for the Spring 2016 offering of CSCI 494 by Dr Cary Gray. The categorization is to give some guidance through this list; many of the works could be in more than one of these categories.

Computer sceicne and personality

Randy Pausch with Jeffrey Zaslow, The Last Lecture. Hyperion, 2008.

Computer science and women

Jane Margolis and Allan Fisher, Unlocking the Clubhouse: Women in Computing. MIT Press, 2002.

The production of software (more from hacker culture)

Eric Raymond, The Cathedral and the Bazaar Richard Gabriel, "Mob Software". Available here Thomas VanDrunen, "A Christian Analysis of Gabriel's 'Mob Software'". Available here Fred Brooks, The Mythical Man Month, Addison-Wesley, 1975 and 1995.

Computer science and Christian faith

Donald Knuth, Things a Computer Scientist Rarely Talks about. CSLI Publications, 2001. Derek Schuurman, Shaping a Digital World. IVP Academic, 2013.

Computers and being human

Rodney A. Brooks. Flesh and Machines: How Robots Will Change Us. Vintage, 2002.

Ray Kurzweil. The Age of Spiritual Machines: When Computers Exceed Human Intelligence. Penguin, 1999.

Hal Abelson, Ken Ledeen, and Harry Lewis. Blown to Bits: Your Life, Liberty and Happiness After the Digital Explosion. Addison-Wesley, 2008.

Albert Borgmann. Holding On to Reality: The Nature of Information at the Turn of the Millenium. U Chicago Press, 1999.

Jaron Lanier. You Are Not a Gadget. Knopf, 2010.

Eli Pariser. The Filter Bubble: What the Internet is Hiding from You. Penguin, 2011.

Stephen L. Talbott. The Future Does Not Compute: Transcending the Machines in Our Midst. O'Reilly & Assoc., 1995.
http://netfuture.org/fdnc/.

Brian Christian. Mind vs. machine. Atlantic Monthly, March 2011.
http://www.theatlantic.com/magazine/archive/2011/01/mind-vs-machine/8386/.
Via Buswell.


Martin Ford. Anything you can do, robots can do better. The Atlantic, online only, 14 Feb 2011.
http://www.theatlantic.com/business/archive/2011/02/anything-you-can-do-robots-can-do-better/71227/.

Mark Halpern. The trouble with the Turing test. The New Atlantis, Winter 2006.
http://www.thenewatlantis.com/publications/the-trouble-with-the-turing-test.

Bill Joy. Why the future doesn't need us. Wired, April 2000. http://www.wired.com/wired/archive/8.04/joy.html.

Neil Postman. Informing ourselves to death, 1990.
http://w2.eff.org/Net_culture/Criticisms/informing_ourselves_to_death.paper .

Alan Turing. Computing machinery and intelligence. Mind, LIX(236):433-460, October 1950.
Via Buswell Library's online resources.

Jeffrey R. Young. Programmed for love: The unsettling future of robotics. The Chronicle of Higher Education, 57(20), 21 Jan 2011.
http://chronicle.com/article/Programmed-for-Love-The/125922/.

Ethics

P. W. Singer. Wired for War: The Robotics Revolution and Conflict in the 21st Century. Penguin, 2009.

Nancy G. Leveson. Medical Devices: The Therac-25 Story. In Safeware: System Safety and Computers, appendix A. Addison-Wesley, 1995.
Available from the author at http://sunnyday.mit.edu/therac-25.html.

Helen Nissenbaum. How computer systems embody values. IEEE Computer, 34(3):120;118-119, March 2001.
PDF at the author's site.

Computers and society

Jacques Ellul. The Technological Society. Vintage Books, 1964.

Theodore Roszak. The Cult of Information. U California Press, 1994.

Albert Borgmann. Technology and the Character of Contemporary Life. U Chicago Press, 1984.

Eric Brende. Better Off: Flipping the Switch on Technology. HarperCollins, 2004.

Sherry Turkle. Alone Together: Why We Expect More from Technology and Less from Each Other. Basic Books, 2011.

Jonathan Zittrain. The Future of the Internet, And How to Stop It. Yale University Press, 2008.

Lionel Basney. Questioning "progress". Books & Culture, September/October 1998.
http://www.christianitytoday.com/bc/1998/sepoct/8b5018.html
Publisher's link (above) is now restricted. I will locate it elsewhere.

Martin Ford. Artificial intelligence is the next killer app. The Atlantic, online only, 17 Feb 2011.
http://www.theatlantic.com/business/archive/2011/02/artificial-intelligence-is-the-next-killer-app/71265/.

Alan Jacobs. Life among the Cyber-Amish. (Computer Control Part 2) Books & Culture, 8(4):14-, July/August 2002.
via Buswell Library; publisher's restricted link

Eric Miller. Keeping up with the Amish. Christianity Today, 43(11):62-72, October 4 1999.
Via Buswell Library; publisher's restricted link

Intellectual property

Charles C. Mann. Who will own your next good idea? Atlantic Monthly, 282(3):57-82, September 1998.
Via Buswell.
http://www.theatlantic.com/issues/98sep/copy.htm

Room for Debate: Apple vs. the Law. New York Times, 30 Sep 2014.
http://www.nytimes.com/roomfordebate/2014/09/30/apple-vs-the-law?partner=rss&emc=rss.

John Perry Barlow. Selling wine without bottles: The economy of mind on the global net, 1993.
http://www.eff.org/Misc/Publications/John_Perry_Barlow/HTML/idea_economy_article.html.

Richard Stallman. The right to read. Communications of the ACM, 40(2):85-87, February 1997. ACM library, or http://www.gnu.org/philosophy/right-to-read.html (with additional notes).

Privacy and security

Whitfield Diffie and Susan Landau. Privacy on the Line: The Politics of Wiretapping and Encryption. MIT Press, 2007.

Simson Garfinkel. Database Nation: The Death of Privacy in the 21st Century. O'Reilly and Associates, 2000.

Susan Landau. Surveillance or Security? The Risks Posed by New Wiretapping Technologies. MIT Press, 2010.

Hal Berghel. Identity theft, social security numbers, and the web. Communications of the ACM, 43(2):17-21, February 2000.
ACM library

Nicholas Carr. Tracking Is an Assault on Liberty, With Real Dangers. Wall Street Journal, 6 August 2010.
http://online.wsj.com/article/SB10001424052748703748904575411682714389888.html.

Fred H. Cate. Government access to private-sector data. IEEE Security & Privacy 8(6):68-71, Nov/Dec 2010.
Available via IEEE Computing Now at http://www.computer.org/cms/Computer.org/ComputingNow/homepage/2011/0211/W_SP_GovtAccessPrivateSectorData.pdf

Amitai Etzioni and Michael Cromartie. Why we need less privacy. Books & Culture, May/June 1999.
Publisher's link is restricted to subscribers.

Beth Givens. Public records on the Internet: the privacy dilemma. Proceeings of the 12th Annual Conference on Computers, Freedom, and Privacy, ACM, April 2002.
ACM library

Tekla Perry. Cellphones take the witness stand. IEEE Spectrum Tech Talk blog, 2 February 2011.
http://spectrum.ieee.org/tech-talk/telecom/wireless/cellphones-take-the-witness-stand/

Charles Duhigg. How Companies Learn Your Secrets. New York Times Magazine, MM30, 19 February 2012.
http://www.nytimes.com/2012/02/19/magazine/shopping-habits.html?pagewanted=all&emc=rss

Daniel J. Solove. Why Privacy Matters Even if You Have 'Nothing to Hide'. The Chronicle of Higher Education, 57(37), 15 May 2011.
http://chronicle.com/article/Why-Privacy-Matters-Even-if/127461/.

Public policy

Lawrence Lessig. Code: And Other Laws of Cyberspace, version 2.0. Basic Books, 2006.
Available in various forms, including full PDF, http://www.codev2.cc/.
See especially chapters 7 and 10.

Douglas W. Jones and Barbara Simons. Broken Ballots: Will Your Vote Count?. CSLI Publications, 2012.

Rebecca MacKinnon. Consent of the Networked: The Worldwide Struggle for Internet Freedom. Basic Books, 2011.

Evgeny Morozov. The Net Delusion: The Dark Side of Internet Freedom. Public Affairs, 2011.

Axel Arnbak. "Loopholes for Circumventing the Constitution", the NSA Statement, and Our Response. Freedom to Tinker (Princeton Center for Information Technology Policy), 11 July 2014.
https://freedom-to-tinker.com/blog/axel/our-response-to-the-nsa-reaction-to-our-new-internet-traffic-shaping-paper/.
(Note also the referenced conference paper and news coverage.)

Charles C. Mann. The unacknowledged legislators of the digital world. Atlantic Unbound, (1999.12.15), 1999.
http://www.theatlantic.com/unbound/digicult/dc991215.htm.

Charles C. Mann. Homeland insecurity. Atlantic Monthly, 290(2):81-102, September 2002.
Via Buswell.
http://www.theatlantic.com/doc/200209/mann.

Peter G. Neumann and Lauren Weinstein. Risks of national identity cards. Communications of the ACM, 44(12):176, December 2001.
ACM library

Langdon Winner. Cyberlibertarian myths and the prospects for community. Computers and Society 27(3):14-19, September 1997.
ACM library. A draft is also available from the author, at http://www.rpi.edu/~winner/cyberlib2.html.

Evgeny Morozov. Why the Internet Is a Great Tool for Totalitarians. Wired, 19(1), January 2011.
http://www.wired.com/magazine/2010/12/st_essay_totalitarians/

Newley Purnell. Smartphone Spyware Targets Hong Kong Protesters. WSJ.D, 3 Oct 2014.
http://blogs.wsj.com/digits/2014/10/03/smartphone-spyware-targets-hong-kong-protesters/?mod=WSJBlog.

Thomas VanDrunen
Last modified: Mon Jan 6 15:46:30 CST 2020