Computer Professionals for Social Responsibility Records M1633
Total Page:16
File Type:pdf, Size:1020Kb
http://oac.cdlib.org/findaid/ark:/13030/c8nc6728 No online items Guide to the Computer Professionals for Social Responsibility Records M1633 Department of Special Collections and University Archives 2019 Green Library 557 Escondido Mall Stanford 94305-6064 [email protected] URL: http://library.stanford.edu/spc Guide to the Computer M1633 1 Professionals for Social Responsibility Records M1633 Language of Material: English Contributing Institution: Department of Special Collections and University Archives Title: Computer Professionals for Social Responsibility records source: Computer Professionals for Social Responsibility creator: Computer Professionals for Social Responsibility Identifier/Call Number: M1633 Physical Description: 48 Linear Feet(96 boxes) Date (inclusive): 1980-2004 Abstract: Records of the policy group Computer Professionals for Social Responsibility (CPSR), consisting of correspondence, memoranda, newsletters, board minutes, publications, media, and other material. Finding aid contains folder listing only; collection has not been physically processed. Related Materials Stanford University Archives holds the Stanford University Computer Professionals for Social Responsibility records (SC1199) https://searchworks.stanford.edu/view/10556271 The Charles Babbage Institute at the University of Minnesota also holds a CPSR collection: http://purl.umn.edu/40803 Conditions Governing Access Open for research. Note that material must be requested at least 36 hours in advance of intended use. Audiovisual and computer media material is not available in original format, and must be reformatted to digital use copies. Conditions Governing Use While Special Collections is the owner of the physical and digital items, permission to examine collection materials is not an authorization to publish. These materials are made available for use in research, teaching, and private study. Any transmission or reproduction beyond that allowed by fair use requires permission from the owners of rights, heir(s) or assigns. Immediate Source of Acquisition Gift of Computer Professionals for Social Responsibility (CPSR), 2008. Accession 2008-188. Preferred Citation [identification of item], Computer Professionals for Social Responsibility records (M1633). Dept. of Special Collections and University Archives, Stanford Libraries, Stanford, Calif. Scope and Contents Computer Professionals for Social Responsibility (CPSR) was an organization promoting the responsible use of computer technology. CPSR was incorporated in 1983 following discussions and organizing that began in 1981. It educated policymakers and the public on a wide range of issues including privacy, design, and the role of computers in defense. The organisation was dissolved in May 2013. Subjects and Indexing Terms Computers -- Reliability. Strategic Defense Initiative. Technology -- social aspects. Computer Professionals for Social Responsibility Computer Professionals for Social Responsibility box 1, folder 1 Gordon, Diane R. box 1, folder 2 Hearings box 1, folder 3 Illinois box 1, folder 4 FBI: NCARL box 1, folder 5 Reporters' decision box 1, folder 6 Research in brief box 1, folder 7 SEARCH, Interface box 1, folder 8 Clippings box 1, folder 9 Resumes box 1, folder 10 Mary Karen Dahl - task force box 1, folder 11 Budget 1987-1988 Guide to the Computer M1633 2 Professionals for Social Responsibility Records M1633 box 1, folder 12 Net correspondence box 1, folder 13 Expert panel box 1, folder 14 Effects of task force box 1, folder 15 California box 1, folder 16 ACLU box 1, folder 17 Security clearinghouse box 1, folder 18 Bibliography box 1, folder 19 FBI - NCIC - Background box 1, folder 20 Statement on Strategic Defense System box 1, folder 21 Computer experts warn box 1, folder 22 Conscience crisis box 1, folder 23 Sense of responsibility box 2, folder 1 Software seen as obstacle box 2, folder 2 Buchsbaum statement - Senate Committee on Nuclear Forces box 2, folder 3 Computers invade box 2, folder 4 Calculated lies box 2, folder 5 Star Wars box 2, folder 6 Annals of law box 2, folder 7 SV employment profile box 2, folder 8 Ethical questions box 2, folder 9 Limits of correctness box 2, folder 10 Could we trust box 2, folder 11 Message box 2, folder 12 Reliability & responsibility box 2, folder 13 Strategic computing box 2, folder 14 Unreliable - SDI - Limits box 2, folder 15 Software - SDI box 2, folder 16 Why I won't work on SDI box 2, folder 17 Why communications systems are not like SDI box 2, folder 18 Annotated bibliography box 2, folder 19 Computer unreliability box 2, folder 20 EFF mission statement box 2, folder 21 Fletcher report box 2, folder 22 Star Wars defense box 2, folder 23 Computer system reliability (IPPNW) box 2, folder 24 Computer system reliability (ACM) box 2, folder 25 Lean, mean warriors box 2, folder 26 Campuses' role box 2, folder 27 Debate box 2, folder 28 Challenge to Reagan box 2, folder 29 Software/military box 2, folder 30 Soviet veto box 2, folder 31 Resolving the Star Wars box 2, folder 32 Pentagon plans box 2, folder 33 West interview box 2, folder 34 Defense agency box 2, folder 35 Wonders box 2, folder 36 Feasible computer box 2, folder 37 Army turns box 2, folder 38 Can we trust box 2, folder 39 Pravda box 2, folder 40 Computer bugs box 2, folder 41 Warning label box 2, folder 42 Rift over high tech box 2, folder 43 Study cites box 2, folder 44 Redell trip report box 2, folder 45 Project keyhole Guide to the Computer M1633 3 Professionals for Social Responsibility Records M1633 box 2, folder 46 New law box 2, folder 47 Super snoops box 2, folder 48 Dreams box 2, folder 50 Military spending box 2, folder 51 House passes box 2, folder 52 Computer madness box 2, folder 53 Eastport's findings box 2, folder 54 Errors box 2, folder 55 Experts' growing box 2, folder 56 Illusion box 2, folder 57 Programmed box 2, folder 58 Calculated lies box 2, folder 59 Fight box 2, folder 60 Debate box 2, folder 61 Even the experts box 2, folder 62 Federal agencies box 2, folder 63 Failure of colleges box 2, folder 64 Dim view box 2, folder 65 Big Brother box 3, folder 1 Roger Clarke box 3, folder 2 Computer system box 3, folder 3 Universal service box 3, folder 4 Eastport study group box 3, folder 5 Computer system box 3, folder 6 CPSR, Inc. box 3, folder 7 Annotated bibliography box 3, folder 8 National security box 3, folder 9 Eavesdropping box 3, folder 10 Big Brother 1980 box 3, folder 11 Unveiling box 3, folder 12 Ears of America box 3, folder 13 Sons box 3, folder 14 Superspy box 3, folder 15 Questionnaire box 3, folder 16 CHIP box 3, folder 17 Black chip box 3, folder 18 Big screen box 3, folder 19 ADL dirty box 3, folder 20 Cyberspace, knowledge box 3, folder 21 FCC box 3, folder 22 Conscience box 3, folder 23 BCS Impact! box 3, folder 24 INES newsletter box 3, folder 25 Illustrative risks box 3, folder 26 Artwork box 3, folder 27 Survey box 3, folder 28 Reliability box 3, folder 29 Boisjoly box 3, folder 30 Information box 4, folder 1 Women in computing box 4, folder 2 NAIS interim report box 4, folder 3 ACM-W meeting 1997-09-20 box 4, folder 4 EECS - Women graduate students box 4, folder 5 Incredible shrinking box 4, folder 5 Summit on women in engineering box 4, folder 6 Technology gap box 4, folder 7 Leveraging Guide to the Computer M1633 4 Professionals for Social Responsibility Records M1633 box 4, folder 8 CS programs in engineering colleges = fewer females box 4, folder 9 Privacy scam box 4, folder 10 Bridge box 4, folder 11 Universal literacy box 4, folder 12 Senior's women summit box 4, folder 13 Report on women's summit box 4, folder 14 UBC DCS technical reports box 4, folder 15 ACM-W poster box 4, folder 16 ACM-W annual report 1997-1998 box 4, folder 17 Survey of national leaders box 4, folder 18 CRAW grad school info guide box 4, folder 19 ACM-W meeting Dec. 1998 box 4, folder 20 Public-key cryptography box 4, folder 21 Cryptology goes public box 4, folder 22 Cryptology revolution box 4, folder 23 Cryptology secret meeting box 4, folder 24 Factoring on microcomputers box 4, folder 25 Flaws found box 4, folder 26 ACM's committee on women in computing box 5, folder 1 We the people box 5, folder 2 Bill ACA 36 box 5, folder 3 Bill of rights box 5, folder 4 CA lawmakers box 5, folder 5 HR145 box 5, folder 6 Dangers of information control box 5, folder 7 Panel backs expansion box 5, folder 8 NCIC renews proposal box 5, folder 9 Toward a GIP box 5, folder 10 Feynman goes to Washington box 5, folder 11 Computing risks box 5, folder 12 Detectives know-how box 5, folder 13 Modern criminal procedure box 5, folder 14 Officer's neglected report box 5, folder 15 Positive alternatives box 5, folder 16 Prosecutors mint box 5, folder 17 Hair ID box 5, folder 18 G-Men box 5, folder 19 Cunliffe box 5, folder 20 High-tech spooks box 5, folder 21 Big Brother isn't box 5, folder 22 NSA DES box 5, folder 23 Computer encryption box 5, folder 24 Crypto-censors box 5, folder 25 NSA to provide box 5, folder 26 Knapsack box 5, folder 27 NSA seeks box 5, folder 28 MIT seeks box 5, folder 29 Code is broken box 5, folder 30 New codes box 5, folder 31 Prior restraints box 5, folder 32 Prior restraints box 5, folder 33 More secrecy box 5, folder 34 New group box 5, folder 35 Unpacking knapsack box 5, folder 36 Public key box 5, folder 37 DOD vacillates box 5, folder 38 Shredded knapsack Guide to the Computer M1633 5 Professionals for Social Responsibility Records M1633 box 5, folder 39 Public's secrets box 5, folder 40 Promising code falls box 5, folder 41 Encryption boom box 5, folder 42 Foiling electronic box 5, folder 43 Arabsat satellite box 5, folder 44 Mathematical games box 5, folder 45 Short-circuiting box 5, folder 46 Computer encryption box 5, folder 47 Computer security box 5, folder 48 Shunning box 5, folder 49 Public cryptology box 5, folder 50 National security vs.