This additional list of references may perhaps duplicate items in the National Conferences on Computing and Values listing that was originally created in 1991.
See also BIBLIOGRAPHY ON COMPUTER ETHICS:
This list of references was developed in conjunction with the article,
"Using the new ACM code of ethics in decision making" (Commmunications of
the ACM, February, 1993) by Ronald E. Anderson, Deborah G. Johnson,
Donald Gotterbarn and Judith Perrolle.
ACM. 1989. "The Worm Story", A collection of papers and reports, Comm. ACM, Vol. 32, No. 6, pp. 677-703.
- Cavazos, Edward, and Gavino Morin. 1994. Cyberspace and the Law:
Your Rights and Duties in the On-Line World, MIT Press, Cambridge MA, ISBN 0-262-53123-2, 220 pp., 3 illus., $19.95.
- David, E. E., Jr., and Robert M. Fano. 1965. "Some Thoughts about the Social Implications of Accessible Computing", in AFIPS, Proc. Fall Joint Computer Conf., Vol. 27, Spartan Books Inc, Washington DC, pp. 243-247.
Donner, Irah H. "Intellectual property protection: Everything you've always wanted to know ...", IEEE Computer, Vol. 27, No. 10, October 1994, pp. 74-75.
Dorsey, Gary. 1990. The Fullness of Wings: The Making of a New Daedalus, Viking, New York, esp. chapter 3.
Gemignani, Michael. 1989. "Viruses and Criminal Law", Legally Speaking, Comm. ACM, Vol. 32, No. 6, pp. 669-671.
Irwin, Stephen T. 1990. "The Great Hacker Challenge of 1989", Technical Support,..
Jennings, Karla. 1990. The Devouring Fungus: Tales of the Computer Age, W.W. Norton & Co., Inc., New York.
Johnson, Deborah G. and John W. Snapper. 1985. Ethical Issues in the Use of Computers, Wadsworth Pub. Co.
Joyce, E. J. Oct. 3, 1986. "Malfunction 54: Unravelling Deadly Medical Mystery of Computerized Accelerator Gone Awry", American Medical News, 1,pp.13-17.
Kallman, E.A., and John P. Grillo. 1995. Ethical Decision Making and Information Technology, McGraw-Hill, New York, 138 pp.
Kephart, Jeffrey O.,Stephen R. White, and David Chess. May 1993. "Computers and Epidemiology" IEEE Spectrum, Vol. 30, No. 5, pp. 20-26.
- Landreth, Bill. 1985. Out of the Inner Circle: A Hacker's Guide to Computer Security, Microsoft Press, Bellvue WA, 230 pp.
Lee, J.A.N., Roz Steier, Gerald Segal. 1986. "Positive Alternatives: A Report of an ACM Panel on Hacking", Comm. ACM, Vol.29, No.4, April 1986, pp.297-299.
Leveson, Nancy G., and Clark S. Turner. "An Investigation of the Therac-25 Accidents", IEEE Computer, Vol. 26, No. 7, July 1993, pp. 18-41.
Leveson, Nancy G. "High Pressure Steam Engines and Computer Software", IEEE Computer, Vol. 27, No. 10, October 1994, pp. 65-73.
Levy, Steven. 1984. Hackers: Heroes of the Computer Revolution, Anchor Press/Doubleday, Garden City, NY, 458 pp.
Parker, Donn B. 1976. Crime by Computer, Scribner's, New York.
Parker, Donn B. 1983. Fighting Computer Crime, Scribner's, New York.
Parker, Donn, and John F. Maxfield. 1985. "The Nature and Extent of Electronic Computer Intrusion", Workshop on Protection of Computer Systems and Software, National Science Foundation.
Perry, Tekla S. and Paul Wallich. May 1984. "Can Computer Crime be Stopped?", IEEE Spectrum.
Robinett, Jane. 1991. "Ethics in Invisible Communities: Looking for Network Security in Our Changing Society", Computer Research News, Washington DC, Vol. 3, No. 1, p. 16.
Samuelson, Pamela. 1989. "Can Hackers be Sued for Damages Caused by Computer Viruses?", Legally Speaking, Comm. ACM, Vol. 32, No. 6, pp. 666-669.
Shapiro, Norman Z. and Robert H. Anderson. 1985. Towards an Ethics and Etiquette for Electronic Mail, Rep. No. R-3283-NSF/RC, Rand Corp., Santa Monica CA.
Steele, Jr., Guy L. et al. 1983. The Hacker's Dictionary, Harper & Row, Publ., New York.
Stoll, Cliff. 1989. The Cuckoo's Egg: Tracking a Spy through the Maze of Computer Espionage, Simon and Shuster Inc., New York.
- Wood-Harper, A.T., Steve Corder, J.R.G. Wood, and Heather Watson. "How We Profess: the Ethical Systems Systems Analyst", Comm. ACM, Vol. 39, No. 3, March 1996, pp. 69ff. Tries to answer the question "To whom is the analyst ultimately responsible?"
Other Related Courses Elsewhere
WARNING!! While these were current at the time of entry, sometimes items disappear from the World Wide Web without warning.
"Should IT Professionals Be in the Ethics Business?", by Marsha Heller, CIO Magazine, 15 July 2000.
- An on-line collection of materials on Ethical Theory, if you want to go a little more deeply into the subject, is available.
- The US Declaration of Independence, Consitution, and other important documents.
- The Virginia Tech Annual Conference entitled "Choices and Challenges" in 1995 concentrated on "Life in the Electronic Village". The bibliography is reproduced with permission here.
- I have found the Yahoo to be very useful in searching recent magazines for articles.
- Leveson, Nancy G., and Clark S. Turner. "An Investigation of the Therac-25 Accidents", IEEE Computer, Vol. 26, No. 7, July 1993, pp. 18-41.
- Virginia Tech Library
- Wired Magazine
- The Clipper Chip Archives
- New Hackers Dictionary
- A series of lectures on privacy being run as an on-line discussion group. Other items referring to privacy can be found in an ACM Crossroads article, and the text of the so-called Buckley Amendment.
- The Internet Society home page.
- Possibly overkill for this course, General Links to Law Resources contains a section on "Information Law"; Also try "The Legal List".
- A listing of links from the University of Michigan Law Library may be useful.
- The Electronic Frontier Foundation usually has some interesting items in their archives.
- The Computer-Mediated Communication Magazine may have some interesting comments. As of September 1995, they are seeking papers on Philosophical Perspectives Free Speech and thus may have some material on this topic in the future.
- My "hotlist" also contains some useful items -- mainly about WWW -- and with some duplications for this list. As does the WWW page for the 1995 "Challenges and Choices" conference held at Virginia Tech.
Last updated 2000/10/28
Copyright J.A.N. Lee, 1995-2000.
Return to Home Page