National Conference on Computing and Values, 1991


1990 Symposium on Research in Security and Privacy, IEEE Computer Society Press, l990

1991Symposium on Research in Security and Privacy, IEEE Computer Society Press, l991

Proceedings: The Computer Security Foundations Workshop III, June 12-14, l990, IEEE Computer Society Press, l990

Proceedings: The Computer Security Foundations Workshop III, June 18-20, l991, IEEE Computer Society Press, l991

Sixth Annual Computer Security Applications Conference, December 3-7, l990, IEEE Computer Society Press, l990

Adam, J. A. & Fischeeti, M.A., Star Wars: The Grand Experiment, IEEE Spectrum, September l985.

American Bar Association, Lawyers on Line: Ethical Perspectives in the use of Telecomputer Communication, American Bar Association, l986 ISBN 0-89707-212-x

Robert L. Baber, Software Reflected: The Socially Responsible Programming of Computers, Elsevier Science Publishing Company, l982, 192 pp.

Richard H. Baker, Computer Security Handbook, 2nd ed., TAB Books, l991 ISBN 0-8306-7592-2

David Bellin and Gary Chapman, eds., Computers in Battle: Will They Work?, Harcourt Brace Jovanovich, l987, 362 pp.

Beniger, J., The Control Revolution: Technical and economic origins of the information society, Harvard University Press, l986.

T.A. Berson, ed., Local Area Network Security, Springer-Verlag Inc., l989, 152 pp. ISBN 0-387-51754-5

Jay BloomBecker, ed., Computer Crime, Computer Security, Computer Ethics, National Center for Computer Crime Data, l986 ISBN 0-933561-02-4

British Computer Society Staff, Privacy and the Computer: Steps to Practicality, John Wiley and Sons, Inc., l972, ISBN 0-471-25610-2

F. P. Brooks, Jr., The Mythical Man-Month: Essays on software engineering, Addison-Wesley, l975.

Geoffrey Brown, The Information Game: Ethical Issues in a Microchip World, Humanities Press Intl., l989. ISBN 0-391-03575-4

Linda J. Burkhart, Using Computers & Speech Synthesis to Facilitate Communicative Interaction with Young & or Severely Handicapped Children, Linda J. Burkhart, l987 ISBN 0-9619338-0-1

David Burnham, The Rise of the Computer State, Random House, Inc., l984

Terrell Ward Bynum, ed., Computers & Ethics, Volume 16, No. 4, October l985, Basil Blackwell, 377 pp.

W.J. Caelli, Computer Security in the Age of Information: Proceedings of the 5 IFIP International Conference (IFIP-Sec '88), Gold Coast, Queensland, Australia, 19-21 May, l988, Elsevier Science Publishing Co., Inc., l989 ISBN 0-444-88324-x

Linda R. Caporael and Warren Thorngate, eds., Computing: Prophecy and Experience, Journal of Social Issues Volume 40 No. 3 l984

Robert J. Cattoche, Computers for the Disabled, Watts, Franklin Inc., l986, 96 pp. ISBN 0-531-10212-2

David D. Clark, Computers at Risk: Safe Computing in the Information Age, l990 National Research Council, National Academy Press

A. Clement, Electronic Management: The new technology of workplace surveillance, Proceedings of Session 84, Canadian Information Processing Society, l984.

Computers & Society: Proceedings of the Conference on Computers and the Quality of Life CQL '90, September 13-16, l990m SIGCAS Volume 20, Number 3, October l990.

Computer Data Security: A Legal & Practical Guide to Liability, Loss Prevention & Criminal & Civil Remedies, BNA Books, l990 ISBN 1-55871-149-x

Computer Technology Research Corp. Staff, Security in IBM Systems, Computer Technology Research Corp., l990 ISBN 0-927695-51-0

Computing Curricula 1991, Report of the ACM/IEEE-CS Joint Curriculum Task Force, IEEE Computer Society Press, l991, 160 pp.

M. Cooley, Architech or Bee? The Human/technology relationship, South End, l980.

Council for Science & Society Staff, Benefits & Risks of Knowledge-Based Systems, Oxford University Press, l989, 88 p. ISBN 0-19-854743-9

W. E. Cundiff & M. Reid, Issues in Canadian/US Transborder Computer Data Flows, Butterworth & Co., l978.

Howard Curtis, ed., Public Access Microcomputers in Academic Libraries: The Mann Library Model at Cornell University, American Library Association, l987, ISBN 0-8389-0464-5

T. Daler, Security of Information and Data, Prentice Hall, l989 ISBN 0-470-21381-7

B.K. Daniels ed., Safety of Computer Control Systems, l990: Safety, Security & Reliability Related Computers for the l990's, Pergamon Press, Inc., l990, ISBN 0-08-040953-9

Datapro reports on Information Security, Datapro Research, McGraw Hill, l989.Volumes I, II, III

D. W. Davies & W. L. Price, Security for Computer Networks: An Introduction to Data Security in Teleprocessing and Electronic Funds Transfer, second edition, John Wiley & Sons, l989, 377 pp.

Dorothy E. Denning, Cryptography & Data Security, Addison-Wesley Publishing Company, Inc., l982, 500 pp.

Dorothy E. Denning, Peter G. Neumann and Donn B. Parker, Social Aspects of Computer Security, Proceedings of the 10th National Computer Security Conference, Baltimore MD, September l987.

Peter J. Denning ed., Computers under Attack: Intruders, Worms and Viruses, Addison-Wesley Publishing Company, Inc., l990, ISBN 0-201-53067-8

Patrick R. Dewey, Public Access Microcomputers, 2nd ed., G.K. Hall & Company, l990, 300 pp. ISBN 0-8161-1896-5

H. L. Dreyfus, What computers can't do: The limits of artificial intelligence ( rev. ed.), Harper & Row, l986.

Charles Dunlop and Rob Kling, eds., Computerization & Controversy: Value Conflicts & Social Choices, Academic Press, l991, 800 pp. ISBN 0-12-224355-2

M.D. Erdmann, M.B. Willimas & C. Gutierrez, Computers, Ethics andSociety, Oxford University Press, l990.

E. Feigenbaum & P. McCorduck, Fifth Generation: Artificial intelligence and Japan's computer challenge to the world.Addison-Wesley, l983.

Philip E. Fites, Martin P. J. Fratz & Alan F. Brebner, Control and Security of Computer Information Systems, Computer Science Press, 1989, 298 pp.

Philip E. Fites, The Computer Virus Crisis, Van Nostrand Reinhold, l988, 171 pp.

Jerry Fitzgerald, Business Data Communications: Basic Concepts, Security & Design, 3rd ed., Wiley, John & Sons, Inc., l990, ISBN 0-471-50877-2

D. Flaherty, Protecting privacy in surveillance societies. University of North Carolina Press, l989.

Tom Forester, ed., Computers in the Human Context: Information Theory, Productivity & People, MIT Press, l989, 528 pp. ISBN 0-262-06124-4

Tom Forester and Perry Morrison, Computer Ethics: Cautionary Tales and Ethical Dilemmas in Computing, The MIT Press, l990, 193 pp. ISBN 0-262-06131-7

Warren Freedman, The Right of Privacy in the Computer Age, Greenwood Publishing Group, Inc., l987 ISBN 0-89930-187-8

Batya Friedman and Terry Winograd, eds., Computing and Social Responsibility: A Collection of Course Syllabi, Computer Professionals for Social Responsibility, l990, 143 pp.

Simson Garfinkel and Gene Spafford, Practical UNIX Security, O'Reilly & Associates, Inc., l991, 500 pp.

B. Garson, The Electronic Sweatshop, Simon and Schuster, l988.

Morrie Gasser, Building a Secure Computer System, Van Nostrand Reinhold, l988, ISBN 0-442-23022-2

Michael Gergen, Computer Technology for the Handicapped: Proceedings from the l984 Closing the Gap Conference, Closing the Gap, l985, 253 pp. ISBN 0-932719-00-7

E. M. Gerson & S. L. Star, Analyzing due process in the workplace, ACM Transactions on Office Information Systems, l986 Volume 4

C. Goodman, Digital Visions: Computers and Art, Harry N. Abrams, l987.

Carol C. Gould ed., The Information Web: Ethical and Social Implications of Computer Networking, Westview Press, l989, 280 pp. ISBN 0-8133-0699-X

Martin Greenberger ed., Computers, Communications and the Public Interest, Books on Demand ISBN 0-317-09278-2

Mark W. Greenia, Computers and Computing: A Chronology of Men and Machines That Made Computer History, Lexikon Services Publications, l991, 95 pp.

Mark W. Greenia, ed., Manager's Guide to Computer Security: A Sourcebook of Key Reference Material, Lexikon Services, l990, ISBN 0-944601-16-2

Mark W. Greenia, Security in Computing: A Sourcebook for Security Officers & Managers, l990, Lexikon Services

Mark W. Greenia, Computer Security Information Source Book, Lexikon Services, l990

Mark W. Greenia, Lawyers Guide to Computer Security: A Sourcebook for Attorneys, Librarians, Researchers, Lexikon Services, l990

Uma Gupta, ed., Validating & Verifying Knowledge-Based Systems, IEEE Computer Society Press, l991

Katie Hafner & John Markoff, Cyberpunk: Outlaws and Hackers on the Computer Frontier, Simon and Schuster, l991, 368 pp.

Dolores Hagan, Microcomputer Resource Book for Special Education: How to Use the Microcomputer with Handicapped Children, Prentice Hall, l984 ISBN 0-8359-4345-3

C. J. Hamelink, Cultural autonomy in global communication, Longman, Inc. l983.

Colin Haynes, Computer Virus Protection Handbook, Sybex, Inc., l990, 192 pp.

Cheryl Helsing, Computer User's Guide to the Protection of Information Resources, US Government Printing Office, l989 ISBN 0-16-000295-8

R. A. Hirschheim, Office Automation: A social and organizational perspective., John Wiley & Sons, l985.

Lance J. Hoffman ed., Computer and Privacy in the Next Decade, Academic Press, Inc., l980 ISBN 0-12-352060-6

Lance J. Hoffman ed., Rogue Programs: Viruses, Worms, and Trojan Horses, Van Nostrand Reinhold, l990

Michael W. Hoffman and Jennifer Mills Moors, eds., Ethics and the Management of Computer Technology: Proceedings of the Fourth national Conference on Business Ethics Sponsored by the Center for Business Ethics, Bentley College, Oelgeschlager, Gunn and Hain, l982

Jan Hruska, Computer Viruses & Anti-Virus Warfare, Prentice Hall, l990

Human Resources Research Organization Staff, Academic Computing Directory: A Search for Exemplary Institutions Using Computers for Learning & Teaching, Human Resources Research Organization, Robotics Center l977 ISBN 0-686-26204-2

H. Allan Hunt, Human Resource Implications of Robotics, W.E. Upjohn, Institute for Employment Research, l983, 208 pp. ISBN 0-88099-009-0

Richard J. Hyman, Information Access: Capabilities & Limitations of Printed & Computerized Sources, American Library Association, l989, 175 pp. ISBN 0-8389-0512-9

Karla Jennings, The Devouring Fungus: Tales of the Computer Age, W.W. Norton & Company, l990, 237 pp. ISBN 0-393-02897-6

Robert Johansen, Telecommunications & Developmentally Disabled People: Evaluations of Audio Conferencing, Personal computers, Computers Conferencing, & Electronic Mail, Institute for the Future, l981, 235 pp. ISBN 0-318-91995-4

Douglas W. Johnson, Computer Ethics: A Guide for the New Age, Brethren Press, l984, 128 pp. ISBN 0-87178-155-7

Deborah G. Johnson and John W. Snapper, Ethical Issues In the Use of Computers, Wadsworth Publishing Company, l985, 363 pp. ISBN 0-534-04257-0 (OUT OF PRINT)

Deborah G. Johnson, Computer Ethics, Prentice-Hall, Inc., l985, 110 pp.

B. Jones, Sleepers, wake: Technology and the future of work, Wheatsheaf Books, l982.

Dr. Thomas Milton Kemnitz & Philip Fitch Vincent, Computer Ethics, Trillium Press, l985, 58 pp.

I. V. Kerlow & J. Rosebush, Computer graphics for designers and artists, Van Nostrand Rheinhold, l986.

R. Kling, Commentary: The new wave of computing in colleges and universities: A Social Analysis, SIGCUE Outlook, l986.

Stephen G. Kochan, Unix System Security(revised edition), Macmillan Publishing Co., Inc., l990, ISBN 0-672-48446-3

R. E. Kraut, ed., Technology and the transformation of white collar work, Lawrence Erlbaum, l987.

Morten Kyng, Computers and Democracy: A Scandinavian Challange, Gower Publishing Company, l987 ISBN 0-566-05476-0

Bill Landreth, Out of the Inner Circle: The True Story of a Computer Intruder Capable of Cracking the Nation's Most Secure Computer Systems, Microsoft Press, l989, 240 pp. ISBN 1-55615-223-x

C.E. Landwehr, ed., Database Security, Vol. 2 - Status & Prospects: Results of the IFIP WG11.3 Workshop, Kingston, Ontario, Canada, 5-7 October l988, Elsevier Science Publishing Company, l989, 282 pp. ISBN 0-444-87483-6

Kenneth C. Laudon, Dossier Society: Value Choices in the Desing of National Information Systems, Columbia University Press, l986, 400 pp.

J.A.N. Lee, G. Segal, and R. Steir. Positive Alternatives: a Report of an ACM Panel on Hacking. Comm. ACM, 29(4): 297-9, april 1986.

Richard Levin, Computer Virus Handbook, Osborne/McGraw-Hill, l990

S. Levy, Hackers: Heroes of the computer revolution, Doubleday Press, l984.

Seth E. Lipner and Stephen Kalman, Computer Law: Cases and Materials, C.E. Merrill Publishing Co., l989, 597 pp.

Allan Lundell, Virus!: The Secret World of Computer Invaders that Breed & Destroy, Contemporary Books, Inc., l989, 192 pp.

David Lyon, The Information Society: Issues and Illusions, Polity Press, New York, l988

John McAfee & Colin Haynes, Computer Viruses, Worms, Data Diddlers, Killer Programs, & Other Threats to Your System: What They Are, How They Work & How to Defend Your PC of Mainframe, Saint Martin's Press, l989, 240 pp.

Donald A. Marchand, The Politics of Privacy, Computers, and Criminal Justice Records Controlling the Social Costs of Technological Change, Information Resources Press, l980, ISBN 0-87815-030-7

MASP Staff, Computer Viruses: Realities, Myths & Safeguards, Management Advisory Publications, l990, 200 pp.

Barbara T. Mates, Library Technology for Visually & Physically Handicapped Patrons, Meckler Corporation, l991, 175 pp. ISBN 0-88736704-6

Rolf T. Moulton, Computer Security Handbook: Strategies and Techniques for Preventive Data Loss of Theft, Prentice Hall, l986, ISBN 0-13-165804-2

Abbe Mowshowitz, Conquest of Will: Information Processing in Human Affairs, Addison Wesley, l976

National Conference on Business Ethics Staff, Ethics & the Management of Computer Technology: Proceedings of the National Conference on Business Ethics, 4th, Oelgeschlager, Gunn & Hain, Inc., l982, ISBN 0-89946-144-1

Raymond S. Nickerson, Using Computers: Human Factors in Information Systems, MIT Press, 1986

D. Noble, Forces of production: A social history of industrial automation, Knopf, l984

Ian Palmer, Computer Security Risk Management, Van Nostrand Reinhold, l990 ISBN 0-442-30290-8

S. Papert, Mindstorms: Children, computers and powerful ideas, Basic Books, Inc., l980

D. B. Parker, Ethical conflicts in computer science and technology, Appendix A-Association for computing machinery code of professional ethics, AFIPS Press l979

Donn Parker, Computer Crime: Criminal Justice Resource Manual, 2nd ed., National Institute of Justice, August l989

Patent, Trademark, & Copyright Law Section Staff, Software Ownership Confidentiality Forms, American Bar Association, l984, 245 pp.

Judith A. Perrolle, Computers and Social Change: Information, Property, and Power, Wadsworth Publishing Company, l987, 297 pp. ISBN 0-534-07464-2

Margaret S. Polley, Computer-Assisted Legal Analysis: Minimizing the risks for the consumer, American Bar Association, l985

Suresh Rai and Dharma Agrawal, eds., Advances in Distributed Systems Reliability, IEEE Computer Society Press, l990

Suresh Rai and Dharma Agrawal, eds., Distributed computing Network Reliability, IEEE Computer Society Press, l990

J. Raviv, ed., Uses of Computers in Aiding the Disabled: Proceedings of the IFIP-IMIA Working Conference, Haifa, Israel, November 3-5, l981, Elsevier Science Publishing Company, l981, 446 pp. ISBN 0-444-86436-9

Harold Remmes, Computers: New Opportunities for the Disabled, Pilot Books, l984, 31 p. ISBN 0-87576-114-3

Ralph Roberts, Computer Security, Compute Publications, l989, 180 pp. ISBN 0-87455-188-9

Ralph Roberts, Computer Viruses, Compute Publications, l988, 170 pp.

David Robertson, Alan Bundy etc., Eco-Logic: Logic-Based Approaches to Ecological Modelling, The MIT Press, l991, 243 pp.

Jane Robinett, ed., Computers & Ethics: A Sourcebook for Discussions, Polytechnic Press, l989, 46 p. ISBN 0-918902-25-8

R. S. Rosenberg, Computer and the Information Society, John Wiley and Sons, l986.

H. Rosenbrock, ed., Designing Human-Centred Technology, Springer-Verlag Inc., l989, 225 pp. ISBN 0-387-19567-X

Parker Rossman, Computers: Bridges to the Future, Judson Press, l985, 144pp.

Parker Rossman, Christians & the World of Computers: Professional & Social Excellence in the Computer World, Trinity Press Intl., l990, 160 pp.

Deborah Russell and G.T. Gangemi, Sr., Computer Security Basics, O'Reilly & Associates, Inc., l991, 425 pp.

Stuart Russell & Eric Wefald, Do the Right Thing: Studies in limited rationality, The MIT Press, l991, 200 pp.

Ken Ryba, Learning with Computers: Effective Teaching Strategies, International Society for Technology in Education, l990 ISBN 0-924667-64-8

SRI International Staff, Ethical Conflicts in Information & Computer Science, Technology & Business, QED Information Sciences, Inc., l990, 220 pp. ISBN 0-89435-313-6

Corey Sandler, Vax Security, John Wiley & Sons, Inc., l990, ISBN 0-471-51507-8

W. Scacchi, Managing software engineering projects: A social analysis, IEEE Transactions on Software Engineering, January l984

Kathryn Schellenberg, Computer Studies: Computers in Society, 3rd ed., Dushkin Publishing Group, l990, 224 pp. ISBN 0-87967-825-9

James A. Schweitzer, Managing Information Security: Administrative, Electronic and Legal Measures to Protect Business Information--end rev. ed., Butterworth-Heinemann, l989 ISBN 0-409-90195-4

Jennifer Seberry, Cryptography: An Introduction to Computer Security, Prentice Hall, l989 ISBN 0-13-194986-1

Security & Privacy, 10th IEEE symposium on l989 Proceedings, IEEE Computer Society Press, l989, 345 pp. ISBN 0-8186-8939-0

Security and Privacy-Volume 1 (1980-1984)(Compendium), IEEE Computer Society Press

Security and Privacy-Volume 2 (1985-1987)(Compendium), IEEE Computer Society Press

James A. Schweitzer, Managing Information Security: Administrative, Electronic & Legal Measures to Protect Business Information, 2nd rev. ed., Butterworth-Heinemann, l989, 224 pp.

Gary H. Sherman, Computer Software Protection Law, BNA Books, l989 (two looseleaf books)

Ulrich Sieber, The International Handbook on Computer Related Crime and the Infringements of Privacy, John Wiley and Sons., Inc., l987, ISBN 0-471-91224-7

Tony Solomonides and Lex Levidow, eds., Compulsive Technology: Computers as Culture, Free Association Books, l985

Gene Spafford, Computer Viruses: Dealing with Electronic Vandalism and Programmed Threats, ADAPSO, l989, 109 pp.

Lee Sproull and Sara Kesler, Connections: New ways of working in the networked organization, l991, MIT Press, 211 pp.

Linda Steward, ed., Public Access CD-ROMs in Libraries: Case Studies, Meckler Corporation, l990, 325 pp. ISBN 0-88736-516-7

Tom Stewart ed., Ergodesign 86: The Evolution of the Electronic Workplace Proceedings of the International Symposium a Special Issue of Behavior & Information Technology, Taylor & Francis, Inc., l987 ISBN 0-85066-925-1

Cliff Stoll, The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage, Doubleday, l989.

Time-Life Books Editors, Computer Security--rev. ed., Time Life Incorporated, l990 ISBN 0-8094-7566-9

Time-Life Books Editors, The Computerized Society-rev. ed., Time Life Incorporated, l990 ISBN 0-8094-7602-9

Mary A. Todd, Computer Security Training Guidelines, US Government Printing Office, l989 ISBN 0-26-000300-8

Sherry Turkle, The Second Self: Computers and the Human Spirit, Simon & Schuster, Inc., l984, 362 pp.

Mary Vance, Computer Crime, rev ed., Vance Bibliographies, l988, 35 p.

Martin Wasik, Crime & the Computer, (Oxford Monographs on Criminal Law), Oxford University Press, l991, 250 pp.

Michael G. Wessells, Computers, Self & Society, Prentice Hall, l989, 288 pp. ISBN 0-13-171273-x

Ron Westrum, Technologies: The Shaping of People and Things & Society, Wadsworth, Inc., l991, 394 pp.

Nathan Weinberg, Computers in the Information Society, Westview Press, l990, 158 pp. ISBN 0-8133-0986-7

Joseph Weizenbaum, Computer Power and Human Reason, W.H. Freeman, l976

John J. Williams, Absolute Computer File Security, Consumertronics, l990 ISBN 0-934274-10-x

Terry Winograd & Fernando Flores, Understanding Computers and Cognition: A New Foundation for Design, Addison-Wesley Publishing, l987, 207 pp.

Geoffrey H. Wold, Computer Crime: Techniques for Preventing & Detecting Crime in Financial Institutions, Bank Administration Institute, l990

Will Yanush, Computer Fraud & Collusion in Customer Service & Billing System, State Mutual Book & Periodical Service, Ltd., l989, 104 pp.

Yankee Group Staff, The Electronic Vault: Computer Piracy and Privacy, The Yankee Group, l984 no ISBN

Shoshana Zuboff, In the Age of the Smart Machine: The Future of Work and Power, Basic Books, l988.

In 1993, Ronald E. Anderson, Deborah G. Johnson, Donald Gotterbarn and Judith Perrolle published an article "Using the new ACM code of ethics in decision making" (Commmunications of the ACM, February, 1993) that contained a useful set of references. This is available on the WWW at gopher://ACM.ORG:70/00%5Bthe_files.sig_forums.SIGCAS.ethics%5Dethics_biblio.txt. There may be some overlap with the list above; one of these days I may get around to merging them!

More references.

Last updated 96/04/30