SOFTWARE MANAGEMENT ISSUES



BIBLIOGRAPHY: Legal, Ethical, and Social Issues in Computing

Overall Reference

Baase, Sara. A Gift of Fire Social, Legal, and Ethical Issues in Computing, 2nd Edition. Upper Saddle River: Prentice Hall, 2003.

Lessig, Lawrence. Code and Other Laws of Cyberspace. New York: Basic, 1999. (Read the preface and conclusion at An Adobe Acrobat Reader is necessary.)

Shapiro, Andrew L. The Control Revolution. New York: PublicAffairs, 1999.

Law

Alderman, Ellen, and Caroline Kennedy. The Right to Privacy. New York: Alfred A. Knopf, 1995.

Cavazos, Edward A., and Gavino Martin. Cyberspace and the Law. Cambridge: MIT Press, 1994.

Cherry, Steven M. “Getting Copyright Right.” IEEE Spectrum (Feb. 2002): 47-51.

Clark, Drew. “How Copyright Became Controversial.” Apr. 2002.

Gleick, James. “Patently Absurd.” New York Times Magazine 12 March 2000: 44-49.

Godwin, Mike. CyberRights Defending Free Speech in the Digital Age. New York: Times Books, 1998.

Kaplan, Carl S. "Internet links of interest to Cyber Law Journal Readers." New York Times CyberLaw Journal .

Kaplan, Carl S. "Rambling Through Legal Web Sites." New York Times CyberLaw Journal 30 June 2000. . [Note that this site has descriptions of and links to many legal web sites, including Internet Case Digest and the U.S. Supreme Court.]

Lessig, Lawrence. The Future of Ideas. New York: Random House, 2001.

Litman, Jessica. Digital Copyright: Protecting Intellectual Property on the Internet. Prometheus Books, 2001.

Mann, Charles “Who Will Own Your Next Good Idea?” The Atlantic Monthly Sep. 1998. .

has links to federal privacy law, federal privacy law decisions, and privacy law sites at:

New York Times Archive on the Communications Decency Act. .

Nissenbaum, Helen. “Accountability in a Computerized Society.” Science and Engineering Ethics (1996): 25-42

Resnick, Paul, and Jim Miller. “The CDA’s Silver Lining.” Wired Aug. 1996: 109-110.

Rose, Lance, and Jonathan Wallace. Syslaw. 2nd ed. Winona: PC Information Group, 1992.

Turner, William Bennett. "What Part of “No Law” Don’t You Understand?" Wired Archive Mar. 1996 .

Privacy and Information Use

Agre, Phil, and Marc Rotenberg, eds. Technology and Privacy: The New Landscape. Cambridge: MIT Press, 1997.

Beeson, Ann. “Privacy in Cyberspace: Is Your E-mail Safe From the Boss, the SysOp, the Hackers, the Cops?” .

Bennahum, David S. “Daemon Seed.” Wired Archive May 1999 .

Bennett, Colin J.. Regulating Privacy: Data Protection and Public Policy in Europe and the United States. Ithaca: Cornell UP, 1992.

Branscomb, Anne. Who Owns Information? New York: Basic, 1994.

Cady, Glee Harrah and Pat McGregor. Protect Your Digital Privacy: Survival Skills for the Information Age. Que Books, 2002.

Cavoukian, Ann. “Data Mining: Staking a Claim on Your Privacy.” Jan. 1998 .

Cavoukian, Ann. “Privacy: The Key to Electronic Commerce.” Apr. 1998 .

Chandrasekaran, Rajiv. “Doors Fling Open to Public Records.” Washington Post 9 Mar. 1998 .

Electronic Privacy Information Center. “Surfer Beware.” (1997) .

Electronic Privacy Information Center. “Surfer Beware II.” Jun. 1998 .

Electronic Privacy Information Center. "Surfer Beware III: Privacy Policies Without Privacy Protection." Dec. 1999

Electronic Privacy Information Center and Junkbusters. "Pretty Poor Privacy: An Assessment of P3P and Internet Privacy." June 2000 .

Etzioni, Amitai. The Limits of Privacy. New York: Basic, 1999.

Gandy, Oscar. The Panoptic Sort: A Political Economy of Personal Information. Boulder: Westview Press, 1993.

Garfinkel, Simson. Database Nation. Cambridge: O’Reilly, 2000. Chapter 6 on medical records privacy is online at

Givens, Beth, and the Privacy Rights Clearinghouse. The Privacy Rights Handbook. New York: Avon, 1997.

Goldman, Janlori, Zoe Hudson, and Richard M. Smith. "Privacy: Report on the Privacy Policies and Practices of Health Web Sites." Jan. 2000 .

Hyatt, Michael S. Invasion of Privacy: How to Protect Yourself in the Digital Age. Washington: Regnery, 2001.

Kent, Stephen and Lynette Millett, eds. “Ids—Not That Easy: Questions About Nationwide Identity Systems,” National Research Council, 2002. Entire document is online and free at:

"New York Times Index on Privacy in the Digital Age." New York Times library/tech/reference/index-privacy.html

O’Harrow, Robert, Jr. “Are Data Firms Getting Too Personal?” Washington Post 8 Mar. 1998 .

Overby, Stephanie. “Iceland’s Dilemma: Privacy vs. Progress.” CIO 15 Jul. 2001

Privacy Rights Clearinghouse. "Protecting Financial Privacy in the New Millennium: the Burden is on You." Fact Sheet 24: Protecting Financial Privacy. Mar. 2001 .

Privacy Rights Clearinghouse. "Financial Privacy: How to Read Your 'Opt-Out' Notices." Fact Sheet 24(a). Apr. 2001 .

Rosen, Jeffrey. “A Cautionary Tale for a New Age of Surveillance. ” New York Times Magazine 7 Oct. 2002 .

Rosen, Jeffrey. “The Eroded Self.” New York Times Magazine 30 Apr. 2000 .

Rosen, Jeffrey. “Silicon Valley’s Spy Game.” New York Times Magazine 14 Apr. 2002 .

Rothfeder, Jeff. Privacy for Sale. New York: Simon & Schuster, 1992.

Schwartz, John, and Robert O’Harrow, Jr. “Databases Start to Fuel Consumer Ire.” Washington Post 10 Mar. 98 .

Smith, H. Jeff. Managing Privacy: Information Technology and Corporate America. Chapel Hill: University of North Carolina, 1994.

Smith, Robert Ellis. A National ID CArd: A License to Live. Providence: Privacy Journal, 2002.

Smith, Robert Ellis. Ben Franklin's Web Site: Privacy and Curiosity from Plymouth Rock to the Internet. Providence: Privacy Journal, 2000.

Smith, Robert Ellis. Compilation of State and Federal Privacy Laws. Providence: Privacy Journal, 1992.

Smith, Robert Ellis. Our Vanishing Privacy. Port Townsend: Loompanica Unlimited, 1993.

Swire, Peter P., and Robert E. Litan. None of Your Business. Washington: Brookings Institution Press, 1998.

Swire, Peter and Lauren Steinfeld. “Security and Privacy after September 11: The Health Care Example”, CFP 2002,

The Center for Public Integrity. “Nothing Sacred: The Politics of Privacy.” (1998) .

“The End of Privacy.” Forbes Magazine .

“The End of Privacy: The surveillance society.” The Economist 15-21 May 1999 .

Washington Post index on privacy articles by Robert O’Harrow, a finalist for a 2000 Pulitzer prize for his reporting on privacy in the Post

"Washington Post Index on Privacy in the Digital Age." Washington Post

"Who Knows Your Medical Secrets?" Consumer Reports August 2000 22-26.

Launched by EPIC and Privacy International, this site has brief summaries and links to news items appearing both in the domestic and the international press. Its database of news storeis is searchable by text and extends back two years.

Ethics

Barbour, Ian. Ethics in an Age of Technology. San Francisco: Harper Collins, 1993.

Collins, W. Robert, Keith W. Miller, Bethany J. Spielman, and Philip Wherry. "How good is good enough?" Communications of the ACM 37.1 (1994): 81-91.

Dejoie, Roy, George Fowler, and David Paradice. Ethical Issues in Information Systems. Boston: Boyd and Fraser, 1991.

Edgar, Stacey L. Morality and Machines. Sudbury: Jones and Bartlett, 1997.

Forester, Tom, and Perry Morrison. Computer Ethics. 2nd ed. Cambridge: MIT Press, 1994.

Friedman, Batya, and Peter H. Kahn, Jr. "Educating Computer Scientists: Linking the Social and the Technical." Communications of the ACM 37.1 (1994): 65-70

Friedman, Batya, and Helen Nissenbaum. “Bias in Computer Systems.” ACM Transactions on Information Systems 14.3 (1996): 330-347. .

Johnson, Deborah. Computer Ethics. 3rd ed. Englewood Cliffs: Prentice-Hall, 2001.

Johnson, Deborah, and Helen Nissenbaum, eds. Computers, Ethics, and Social Values. Englewood Cliffs: Prentice Hall, 1995.

McFarland, Michael C. “Ethics and the safety of computer systems.” IEEE Computer (1991): 72-75.

McFarland, Michael C. “Urgency of Ethical Standards Intensifies in Computer Community.” IEEE Computer (1990): 77-81.

Moor, James H. "Reason, Relativity, and Responsibility in Computer Ethics." Computers and Society (1998): 14-21.

Nissenbaum, Helen. “Accountability in a Computerized Society.” Science and Engineering Ethics 2 (1996): 25-42. .

Nissenbaum, Helen. "Computing and Accountability." Communications of the ACM, 37.1 (1994): 73-77.

Oz, Effie. Ethics for the Information Age. Dubuque: W.C. Brown, 1994.

Oz, Effie. "When Professional Standards are Lax: The CONFIRM Failure and Its Lessons." Communications of the ACM 37.10 (1994): 29-36.

Spinello, Richard. CyberEthics: Morality and Law in Cyberspace. Sudbury: Jones and Bartlett, 2000.

Taylor, Charles. The Ethics of Authenticity. Cambridge: Harvard University, 1991.

Cryptography

"Cryptography and Liberty 1999." (1999) .

Dam, Kenneth W., and Herbert S. Lin, eds. Cryptography’s Role in Securing the Information Society. Washington: National Academy Press, 1996.

Diffie, Whitfield, and Susan Landau. Privacy on the Line: The Politics of Wiretapping and Encryption. Cambridge: MIT Press, 1998.

Hoffman, Lance, ed. Building in Big Brother: The Cryptographic Policy Debate. New York: Springer-Verlag, 1995.

Kahn, David. The Codebreakers. New York: Scribner, 1996.

Levy, Steven. Crypto How the Code Rebels Beat the Government--Saving Privacy in the Digital Age. New York: Viking, 2001. Chapter 1 is online at

Landau, Susan, et al. Codes, Keys, and Conflicts: Issues in U.S. Crypto Policy. June 1994 .

Schneier, Bruce. Applied Cryptography. New York: John Wiley and Sons, 1994.

Schneier, Bruce. Secrets and Lies: Digital Security in a Networked World. New York: John Wiley and Sons, 2000.

The Effects of Computers

Compaine, Benjamin M., ed. The Digital Divide. Cambridge: MIT Press, 2001.

Dertouzos, Michael. What Will Be. New York: Harper Collins, 1997.

Healy, Jane. Endangered Minds. New York: Simon and Schuster, 1990.

Kling, Rob, ed. Computerization and Controversy. 2nd ed. San Diego: Academic Press, 1996

Mander, Jerry. In the Absence of the Sacred: The Failure of Technology and the Survival of the Indian Nations. San Francisco: Sierra Club Books, 1992.

Noble, David. The Religion of Technology. New York: Alfred A. Knopf, 1998.

Weizenbaum, Joseph. Computer Power and Human Reason. New York: W.H. Freeman, 1976.

Wresch, William. “Haves and Have-Nots in the Information Age.” ECUCOM Review Jan.-Feb. 1997: 52-59.

Attacks on Computer Systems: Worms, Viruses, Hackers

Adams, J. The Next World War: Computers Are the Weapons and the Front Line Is Everywhere. New York: Simon & Schuster, 1998.

Denning, Dorothy. Information Warfare and Security. Reading: Addison Wesley, 1999.

Denning, Dorothy, and Peter Denning. Internet Besieged: Countering Cyberspace Scofflaws. Reading: Addison Wesley, 1998.

Denning, Peter, ed. Computers Under Attack: Intruders, Worms, and Viruses. Reading: Addison Wesley, 1990.

"Fighting Computer Viruses." Scientific American Nov. 1997 .

Hafner, Katie, and John Markoff. Cyberpunk: Outlaws and Hackers on the Computer Frontier. New York: Simon and Schuster, 1991.

"How Safe Are You?" New York Times. .

Lewis, Peter. “Viruses and Their Cures: Year 2000 and Beyond.” New York Times 16 Dec. 1999 .

Levy, Steven. Hackers. New York: Delta, 1994.

Lukasik, S.J., L.T. Greenberg, and S.E. Goodman. “Protecting an Invaluable and Ever-Widening Infrastructure.” Communications of the ACM 41.6 (1998): 11-16.

Meinel, Carolyn P. “How Hackers Break In …and How They Are Caught.” Scientific American (1998): .

Murray, Bill and Gene Spafford. Hacking for Dummies. San Mateo: IDG Books, 2002.

Schwartau, Winn. Cybershock: Surviving Hackers, Phreakers, Identity Thieves, Internet Terrorists and Weapons of Mass Destruction. New York: Thunder’s Mouth Press, 2000.

Internet/Web

Bennahum, David S. “The Internet Revolution.” Wired Archive Apr 1997. .

Burstein, Daniel, and David Kline. Road Warriors: Dreams and Nightmares along the Information Highway. New York: Plume, 1996.

Chapman, Gary. "The National Forum on Science and Technology Goals: Building a Democratic, Post-Cold War Science and Technology Policy." Communications of the ACM 37.1 (1994): 31-37.

Garfinkel, Simson, with Gene Spafford. Web Security and Commerce. Cambridge: O’Reilly and Associates, 1997.

Hafner, Katie, and Matthew Lyon. Where Wizards Stay Up Late: The Origins of the Internet. New York: Simon & Schuster, 1996.

Hargittai, Eszter. “Radio’s Lessons for the Internet.” Communications of the ACM 43.1 (2000): 51-57.

Marshall, Joshua Micah. “Will Free Speech Get Tangled in the Net?” The American Prospect Online Jan.-Feb. 1998. .

Miller, Steven E. Civilizing Cyberspace. Reading: Addison-Wesley, 1996.

National Telecommunications and Information Administration. “Falling Through the Net: Defining the Digital Divide.” July 1999. .

Nie, Norman H., and Lutz Erbring. "Internet and Society A Preliminary Report." Stanford Institute for the Quantitative Study of Society. Feb. 2000. .

Nissenbaum, Helen. “The Individual and the Internet: Free Speech, Control of Information, and Privacy.” The Center for the Advancement of Ethics. .

Slatalla, Michelle. “Who Can I Turn To?” Wired May 1996. .

Thornburgh, Dick and Herbert S. Lin, eds. Youth, Pornography, and the Internet. Washington: National Academy Press, 2002.

Turow, Joseph. "The Internet and the Family: The View from Parents, the View from the Press." Annenberg Public Policy Center of the University of Pennsylvania. May 1999. .

Turow, Joseph and Lilach Nir. "The Internet and the Family 2000: The View from Parents, the View from Kids." Annenberg Public Policy Center of the University of Pennsylvania. May 2000. .

Safety and Reliability

Leveson, Nancy. Safeware: System Safety and Computers. Reading: Addison Wesley 1995.

Mercuri, Rebecca. "Corrupted Polling." Communications of the ACM 36.11 (1993): 122.

Neumann, Peter. Computer Related Risks. Reading: Addison-Wesley 1995.

About 100 pages of additions to Computer Related Risks is available online only at

Wiener, Lauren. Digital Woes: Why We Should Not Depend on Software. Reading: Addison Wesley, 1993.

Electronic Games and Violence

Anderson, Craig A., and Karen E. Dill. “Video Games and Aggressive Thoughts, Feelings, and Behavior in the Laboratory and in Life.” Journal of Personality and Social Psychology 78.4 (2000): 772-790

Emes, Craig E. “Is Mr. Pac Man Eating Our Children? A Review of the Effect of Video Games on Children.” Canadian Journal of Psychiatry 42.4 (1997): 409-413.

Quittner, Joshua. “Are Video Games Really So Bad? ” Time 10 May 1999. .

Woodard, Emory W., with Natalia Gridina. "Media in the Home 2000." The Annenberg Public Policy Center. 2000. .

Computerized and/or Internet Voting

homepage of Rebecca Mercuri, who recently completed her Ph.D. dissertation at the University of Pennsylvania on Electronic Vote Tabulation Checks & Balances. She is an expert in the area.

California Internet Voting Task Force. "A Report on the Feasibility of Internet Voting." January, 2000.

Caltech/MIT Voting Project. "A Preliminary Assessment of the Reliability of Existing Voting Equipment." Version 1, February 1, 2001.

Computer Professionals for Social Responsibility. "Getting the Chad Out: Elections, Technology, and Reform," Winter, 2001.

Hoffman, Lance J. and Lorrie Cranor. "Internet Voting for Public Officials." Communications of the ACM 44.1 (2001): 69-71.

Mercuri, Rebecca. Electronic Voting.

Mercuri, Rebecca and Peter Neumann. "System Integrity Revisited." Communications of the ACM. 44.1 (2001): 160.

Mohen, Joe and Julia Glidden. "The Case for Internet Voting." Communications of the ACM. 44.1 (2001): 72-85.

Phillips, Deborah M. and Hans A. Von Spakovsky. "Gauging the Risks of Internet Elections." Communications of the ACM. 44.1 (2001): 73-85.

Aftermath of September 11

Cole, David and James X. Dempsey. Terrorism and the Constitution: Sacrificing Civil Liberties in the Name of National Security. New York: The New Press 2002.

Mann, Charles C. “Homeland Insecurity,” The Atlantic Monthly, Sept 2002.

Stanley, Jay and Barry Steinhardt (American Civil Liberties Union). “Bigger Monster, Weaker Chains.” Jan, 2003.

Schulhofer, Stephen J. The Enemy Within: Intelligence Gathering, Law Enforcement, and Civil Liberties in the Wake of September 11. New York: Century Foundation Press 2002.

Biometrics

International Biometric Group,

Kent, Stephen and Lynette Millett, eds. “Who Goes There? Authentication Through the Lens of Privacy,” National Research Council, 2003. Entire document is online and free at:

Woodward, John D. Biometrics: Identity Assurance in the Information Age. Boston: McGraw-Hill/Osborne 2003.

General

AAUW Educational Foundation Commission on Technology, Gender, and Teacher Education. Tech-Savvy Educating Girls in the New Computer Age. Washington: AAUW Educational Foundation, 2000.

Margolis, Jane and Allan Fisher. Unlocking the Clubhouse: Women in Computing. Cambridge: MIT Press, 2001.

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download