Week |
Day |
Date |
Topic |
2 |
Mon |
1/31 |
Intellectual Property
-
Samuelson, P. (2007). Does copyright law need to be reformed?
CACM, 50(10), 19-23.
-
Grosso, A. (2000). The promise and problems of the No
Eletronic Theft Act. CACM, 43(2), 23-26.
-
Grosso, A. (2002). Why the Digital Millenium Copyright Act is
a failure of reason. CACM, 45(2), 19-23.
-
Hoffmann, L. (2009). Content control. CACM, 52(6), 16-17.
-
Samuelson, P. (2010). Should the Google book settlement be
approved? CACM, 53(7), 32-34.
-
Boyle, J. (2009). What intellectual property law should learn
from software. CACM, 52(9), 71-76.
-
Samuelson, P. (2008). Revisiting patentable subject
matter. CACM, 51(7), 20-22.
-
Hoffmann, L. (2008). Damage control. CACM, 51(11), 11-13.
-
Samuelson, P. (2010). Only technological processes are
patentable. CACM, 53(3), 25-27.
-
Samuelson, P. (2009). When is a "license" really a
sale? CACM, 52(3), 27-29.
|
3 |
Mon |
2/7 |
Privacy and Surveillance
-
Greengard, S. (2008). Privacy matters. CACM, 51(9), 17-18.
-
Berghel, H. (2000). Identity theft, social security numbers,
and the web. CACM, 43(2), 17-21.
-
Diffie, W & Landau, S. (2009). Communications
surveillance: Privacy and security at risk. CACM, 52(11), 42-47.
-
Irion, K. (2009). International communications
surveillance. CACM, 52(2), 26-28.
-
Shilton, K. (2009). Four billion little brothers? Privacy,
mobile phones, and ubiquitous data collection. CACM, 52(11),
48-53.
-
Sasse, M. A. (2010). Not seeing the crime for the cameras?
CACM, 53(2), 22-25.
|
4 |
Mon |
2/14 |
Free and Open Software
-
Free
Software Foundation (2010). The Free Software Definition.
-
Stallman, R. (2009). Why "open source" misses the point of
free software. CACM, 52(6), 31-33.
-
Campbell-Kelly, M. (2008). Will the future of sofware be open
source? CACM, 51(10), 21-23.
-
McCafferty, D. (2010). Should code be released? CACM, 53(10),
16-17.
-
Vogle, P. & Barrett, M. (2010). Regulating the information
gatekeepers. CACM, 53(11), 67-72.
-
Baraniuk, R. G. & Burrus, C. S. (2008). Global warming
toward open educational resources.CACM, 51(9), 30-32.
|
5 |
Mon |
2/21 |
Network Neutrality
-
van Schewick, B. & Farber, D. (2009). Network neutrality
nuances. CACM, 52(2), 31-37.
-
Larouche, P. (2009). The network neutrality debate hits
Europe. CACM, 52(5), 22-24.
-
Joch, A. (2009). Debating net neutrality. CACM, 52(10), 14-15.
-
Ohm, P. (2010). When network neutrality met privacy. CACM,
53(4), 30-32.
-
Greengard, S. (2010). Censored! CACM, 53(7), 16-18.
|
7 |
Mon |
3/7 |
Security
-
Spafford, E. H. (2010). Remembrances of things pest. CACM,
53(8), 35-37.
-
Porras, P. (2009). Reflections on conficker. CACM, 52(10), 23-24.
-
Provos, N., Abu Rajab, M., & Mavromatis,
P. (2009). Cybercrime 2.0: When the cloud turns dark. CACM,
52(4), 43-47.
-
Anthes, G. (2010). Security in the cloud. CACM, 53(11), 16-18.
-
Fu, K. (2009). Reducing risks of implantable medical
devices. CACM, 52(6), 25-27.
-
Ramos, A., Scott, W., Scott, W., Lloyd, D., O'Leary, K., &
Waldo, J. (2009). A threat analysis of RFID passports. CACM,
52(12), 38-42.
|
8 |
Mon |
3/14 |
Global Development
-
Underwood, S. (2008) Challenging poverty. CACM, 51(8), 15-17.
-
Dias, M. B., & Brewer, E. (2009). How computer science
serves the developing world. CACM 52(6), 74-80.
-
Greengard, S. (2008). Upwardly mobile. CACM, 51(12), 17-19.
-
Greengard, S. (2010). Cloud computing and developing
nations. CACM, 53(5), 18-20.
|
9 |
Mon |
4/4 |
Complexity
|
10 |
Mon |
4/11 |
Electronic Voting
-
Dill, D. L. & Castro, D. (2008). The U.S. should ban
paperless electronic voting machines. CACM, 51(10), 29-33.
-
Farivar, C. (2008). Clean elections. CACM, 51(10), 16-18.
-
Rubin, A. D. (2002). Security consideration for remote
electronic voting. CACM, 45(12), 39-44.
|
11 |
Mon |
4/18 |
Computer and Software Reliability
-
Hoffman, L. (2008). In search of dependable design. CACM,
51(7), 14-16.
-
Parnas, D. L. (2010). Risks of undisciplined
development. CACM, 53(10), 25-27.
-
Greengard, S. (2009). Making automation work. CACM, 52(12), 18-19.
-
Zeichik, A. (2010, March 24).
Toyota
hardware defects/software bugs.
|
12 |
Mon |
4/25 |
Software: Engineering, Professional, and Ethics
-
El-Kadi, A. (1999). Stop that divorce! CACM, 42(12), 27-28.
-
Frailey, D. J. (1999). Licensing software engineers. CACM,
42(12), 29-30.
-
Allen, F., Hawthorn, P., & Simons, B. (2000). Not now, not
like this. CACM, 43(2), 29-30.
-
Johnson, D. G. (2008). Computer experts: Guns-for-hire or
professionals? CACM, 51(10), 24-26.
-
Denning, P. J. & Riehle, R. D. (2009). Is software
engineering engineering? CACM, 52(3), 24-26.
-
ACM/IEEE-CS Joint Task Force on Software Engineering Ethics
and Professional Practices (1999). Software Engineering Code
of Ethics and Professional Practice (Version 5.2).
|
13 |
Mon |
5/2 |
Energy and the Environment
-
Kurp, P. (2008) Green computing. CACM, 51(10), 11-13.
-
Ranganathan, P. (2010). Recipe for efficiency: Principles of
power-aware computing. CACM, 53(4), 60-67.
-
Garrett, M. (2008). Powering down. CACM, 51(9), 43-46.
|
14 |
Mon |
5/9 |
Artificial Intelligence
-
Pack Kaelbling, L. (2010). New bar set for intelligent
vehicles. CACM, 53(4), 98.
-
Anthes, G. (2010). Robots gear up for disaster response. CACM,
53(4), 15-16.
-
Goth, G. (2011). I, Domestic Robot. CACM, 54(5), 16-17.
-
Chopra, A. (2010). Rights for autonomous artificial agents?
CACM, 53(8), 38-40.
-
Lanier, J. (2009). Confusions of the hive mind. CACM, 52(9), 111-112.
|
|
Wed |
5/11 |
History of Computing
-
Campbell-Kelly, M. (2010). Victorian data processing. CACM, 53(10), 19-21.
-
Campbell-Kelly, M. (2010). Be careful what you wish for. CACM,
53(4), 25-26.
-
Campbell-Kelly, M. (2009). Computing in the depression
era. CACM, 52(10), 21-22.
-
Ross, M. (2009). A pioneer woman. CACM, 52(1), 17.
-
Campbell-Kelly, M. (2009). The rise, fall, and resurrection of
software as a service. CACM, 52(5), 28-30.
|