Software Management Issues
Total Page:16
File Type:pdf, Size:1020Kb

BIBLIOGRAPHY: Legal, Ethical, and Social Issues in Computing
Overall Reference Baase, Sara. A Gift of Fire Social, Legal, and Ethical Issues in Computing, 2 nd Edition. Upper Saddle River: Prentice Hall, 2003. Lessig, Lawrence. Code and Other Laws of Cyberspace. New York: Basic, 1999. (Read the preface and conclusion at http://code-is-law.org/excerpts.html An Adobe Acrobat Reader is necessary.) Shapiro, Andrew L. The Control Revolution. New York: PublicAffairs, 1999.
Law Alderman, Ellen, and Caroline Kennedy. The Right to Privacy. New York: Alfred A. Knopf, 1995. Cavazos, Edward A., and Gavino Martin. Cyberspace and the Law. Cambridge: MIT Press, 1994. Cherry, Steven M. “Getting Copyright Right.” IEEE Spectrum (Feb. 2002): 47-51. Clark, Drew. “How Copyright Became Controversial.” Apr. 2002.
MegaLaw.com has links to federal privacy law, federal privacy law decisions, and privacy law sites at: http://www.megalaw.com/index.php3? content=research/TopicIndex/topprivacy.html New York Times Archive on the Communications Decency Act.
1 Fall 2002 Resnick, Paul, and Jim Miller. “The CDA’s Silver Lining.” Wired Aug. 1996: 109- 110. Rose, Lance, and Jonathan Wallace. Syslaw. 2nd ed. Winona: PC Information Group, 1992. Turner, William Bennett. "What Part of “No Law” Don’t You Understand?" Wired Archive Mar. 1996 < http://www.wired.com/wired/archive/4.03/no.law.html >.
Privacy and Information Use Agre, Phil, and Marc Rotenberg, eds. Technology and Privacy: The New Landscape. Cambridge: MIT Press, 1997. Beeson, Ann. “Privacy in Cyberspace: Is Your E-mail Safe From the Boss, the SysOp, the Hackers, the Cops?”
2 Fall 2002 Goldman, Janlori, Zoe Hudson, and Richard M. Smith. "Privacy: Report on the Privacy Policies and Practices of Health Web Sites." Jan. 2000
3 Fall 2002 Swire, Peter and Lauren Steinfeld. “Security and Privacy after September 11: The Health Care Example”, CFP 2002,
Washington Post index on privacy articles by Robert O’Harrow, a finalist for a 2000 Pulitzer prize for his reporting on privacy in the Post http://washingtonpost.com/wp-dyn/business/specials/privacy/robertoharrow/
"Washington Post Index on Privacy in the Digital Age." Washington Post http://washingtonpost.com/wp-dyn/business/specials/privacy/index.html "Who Knows Your Medical Secrets?" Consumer Reports August 2000 22-26. www.privacy.org Launched by EPIC and Privacy International, this site has brief summaries and links to news items appearing both in the domestic and the international press. Its database of news storeis is searchable by text and extends back two years.
Ethics Barbour, Ian. Ethics in an Age of Technology. San Francisco: Harper Collins, 1993. Collins, W. Robert, Keith W. Miller, Bethany J. Spielman, and Philip Wherry. "How good is good enough?" Communications of the ACM 37.1 (1994): 81-91. Dejoie, Roy, George Fowler, and David Paradice. Ethical Issues in Information Systems. Boston: Boyd and Fraser, 1991. Edgar, Stacey L. Morality and Machines. Sudbury: Jones and Bartlett, 1997. Forester, Tom, and Perry Morrison. Computer Ethics. 2nd ed. Cambridge: MIT Press, 1994. Friedman, Batya, and Peter H. Kahn, Jr. "Educating Computer Scientists: Linking the Social and the Technical." Communications of the ACM 37.1 (1994): 65-70 Friedman, Batya, and Helen Nissenbaum. “Bias in Computer Systems.” ACM Transactions on Information Systems 14.3 (1996): 330-347.
4 Fall 2002 Nissenbaum, Helen. “Accountability in a Computerized Society.” Science and Engineering Ethics 2 (1996): 25-42.
Cryptography "Cryptography and Liberty 1999." (1999)
The Effects of Computers Compaine, Benjamin M., ed. The Digital Divide. Cambridge: MIT Press, 2001. Dertouzos, Michael. What Will Be. New York: Harper Collins, 1997. Healy, Jane. Endangered Minds. New York: Simon and Schuster, 1990. Kling, Rob, ed. Computerization and Controversy. 2nd ed. San Diego: Academic Press, 1996 Mander, Jerry. In the Absence of the Sacred: The Failure of Technology and the Survival of the Indian Nations. San Francisco: Sierra Club Books, 1992. Noble, David. The Religion of Technology. New York: Alfred A. Knopf, 1998. Weizenbaum, Joseph. Computer Power and Human Reason. New York: W.H. Freeman, 1976. Wresch, William. “Haves and Have-Nots in the Information Age.” ECUCOM Review Jan.-Feb. 1997: 52-59.
5 Fall 2002 Attacks on Computer Systems: Worms, Viruses, Hackers Adams, J. The Next World War: Computers Are the Weapons and the Front Line Is Everywhere. New York: Simon & Schuster, 1998. Denning, Dorothy. Information Warfare and Security. Reading: Addison Wesley, 1999. Denning, Dorothy, and Peter Denning. Internet Besieged: Countering Cyberspace Scofflaws. Reading: Addison Wesley, 1998. Denning, Peter, ed. Computers Under Attack: Intruders, Worms, and Viruses. Reading: Addison Wesley, 1990. "Fighting Computer Viruses." Scientific American Nov. 1997
Lewis, Peter. “Viruses and Their Cures: Year 2000 and Beyond.” New York Times 16 Dec. 1999
Internet/Web Bennahum, David S. “The Internet Revolution.” Wired Archive Apr 1997.
6 Fall 2002 Marshall, Joshua Micah. “Will Free Speech Get Tangled in the Net?” The American Prospect Online Jan.-Feb. 1998.
Safety and Reliability Leveson, Nancy. Safeware: System Safety and Computers. Reading: Addison Wesley 1995. Mercuri, Rebecca. "Corrupted Polling." Communications of the ACM 36.11 (1993): 122. Neumann, Peter. Computer Related Risks. Reading: Addison-Wesley 1995. About 100 pages of additions to Computer Related Risks is available online only at http://www.csl.sri.com/users/neumann/risks-new.html Wiener, Lauren. Digital Woes: Why We Should Not Depend on Software. Reading: Addison Wesley, 1993.
Electronic Games and Violence Anderson, Craig A., and Karen E. Dill. “Video Games and Aggressive Thoughts, Feelings, and Behavior in the Laboratory and in Life.” Journal of Personality and Social Psychology 78.4 (2000): 772-790
7 Fall 2002 Computerized and/or Internet Voting http://www.notablesoftware.com/evote.html homepage of Rebecca Mercuri, who recently completed her Ph.D. dissertation at the University of Pennsylvania on Electronic Vote Tabulation Checks & Balances. She is an expert in the area. California Internet Voting Task Force. "A Report on the Feasibility of Internet Voting." January, 2000.
Aftermath of September 11 Cole, David and James X. Dempsey. Terrorism and the Constitution: Sacrificing Civil Liberties in the Name of National Security. New York: The New Press 2002. Mann, Charles C. “Homeland Insecurity,” The Atlantic Monthly, Sept 2002. Stanley, Jay and Barry Steinhardt (American Civil Liberties Union). “Bigger Monster, Weaker Chains.” http://www.aclu.org/Privacy/Privacy.cfm?ID=11573&c=39 Jan, 2003. Schulhofer, Stephen J. The Enemy Within: Intelligence Gathering, Law Enforcement, and Civil Liberties in the Wake of September 11. New York: Century Foundation Press 2002.
Biometrics International Biometric Group, www.bioprivacy.org Kent, Stephen and Lynette Millett, eds. “Who Goes There? Authentication Through the Lens of Privacy,” National Research Council, 2003. Entire document is online and free at: http://www.nap.edu/books/0309088968/html/ Woodward, John D. Biometrics: Identity Assurance in the Information Age. Boston: McGraw-Hill/Osborne 2003.
General
8 Fall 2002 AAUW Educational Foundation Commission on Technology, Gender, and Teacher Education. Tech-Savvy Educating Girls in the New Computer Age. Washington: AAUW Educational Foundation, 2000. Margolis, Jane and Allan Fisher. Unlocking the Clubhouse: Women in Computing. Cambridge: MIT Press, 2001.
9 Fall 2002