Readings
CSC 105 The Digital Age Spring 2009

Articles from Communications of the ACM are posted here under the ACM Copyright notice:

Copyright © 1999-2011 by Association for Computing Machinery, Inc. (ACM). Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and full citation on the first page.

Jump to week: 2 3 4 5 7 8 9 10 11 12 13 14

Week Day Date Topic
2 Mon 1/31 Intellectual Property
  • Samuelson, P. (2007). Does copyright law need to be reformed? CACM, 50(10), 19-23.
  • Grosso, A. (2000). The promise and problems of the No Eletronic Theft Act. CACM, 43(2), 23-26.
  • Grosso, A. (2002). Why the Digital Millenium Copyright Act is a failure of reason. CACM, 45(2), 19-23.
  • Hoffmann, L. (2009). Content control. CACM, 52(6), 16-17.
  • Samuelson, P. (2010). Should the Google book settlement be approved? CACM, 53(7), 32-34.
  • Boyle, J. (2009). What intellectual property law should learn from software. CACM, 52(9), 71-76.
  • Samuelson, P. (2008). Revisiting patentable subject matter. CACM, 51(7), 20-22.
  • Hoffmann, L. (2008). Damage control. CACM, 51(11), 11-13.
  • Samuelson, P. (2010). Only technological processes are patentable. CACM, 53(3), 25-27.
  • Samuelson, P. (2009). When is a "license" really a sale? CACM, 52(3), 27-29.
3 Mon 2/7 Privacy and Surveillance
  • Greengard, S. (2008). Privacy matters. CACM, 51(9), 17-18.
  • Berghel, H. (2000). Identity theft, social security numbers, and the web. CACM, 43(2), 17-21.
  • Diffie, W & Landau, S. (2009). Communications surveillance: Privacy and security at risk. CACM, 52(11), 42-47.
  • Irion, K. (2009). International communications surveillance. CACM, 52(2), 26-28.
  • Shilton, K. (2009). Four billion little brothers? Privacy, mobile phones, and ubiquitous data collection. CACM, 52(11), 48-53.
  • Sasse, M. A. (2010). Not seeing the crime for the cameras? CACM, 53(2), 22-25.
4 Mon 2/14 Free and Open Software
  • Free Software Foundation (2010). The Free Software Definition.
  • Stallman, R. (2009). Why "open source" misses the point of free software. CACM, 52(6), 31-33.
  • Campbell-Kelly, M. (2008). Will the future of sofware be open source? CACM, 51(10), 21-23.
  • McCafferty, D. (2010). Should code be released? CACM, 53(10), 16-17.
  • Vogle, P. & Barrett, M. (2010). Regulating the information gatekeepers. CACM, 53(11), 67-72.
  • Baraniuk, R. G. & Burrus, C. S. (2008). Global warming toward open educational resources.CACM, 51(9), 30-32.
5 Mon 2/21 Network Neutrality
  • van Schewick, B. & Farber, D. (2009). Network neutrality nuances. CACM, 52(2), 31-37.
  • Larouche, P. (2009). The network neutrality debate hits Europe. CACM, 52(5), 22-24.
  • Joch, A. (2009). Debating net neutrality. CACM, 52(10), 14-15.
  • Ohm, P. (2010). When network neutrality met privacy. CACM, 53(4), 30-32.
  • Greengard, S. (2010). Censored! CACM, 53(7), 16-18.
7 Mon 3/7 Security
  • Spafford, E. H. (2010). Remembrances of things pest. CACM, 53(8), 35-37.
  • Porras, P. (2009). Reflections on conficker. CACM, 52(10), 23-24.
  • Provos, N., Abu Rajab, M., & Mavromatis, P. (2009). Cybercrime 2.0: When the cloud turns dark. CACM, 52(4), 43-47.
  • Anthes, G. (2010). Security in the cloud. CACM, 53(11), 16-18.
  • Fu, K. (2009). Reducing risks of implantable medical devices. CACM, 52(6), 25-27.
  • Ramos, A., Scott, W., Scott, W., Lloyd, D., O'Leary, K., & Waldo, J. (2009). A threat analysis of RFID passports. CACM, 52(12), 38-42.
8 Mon 3/14 Global Development
  • Underwood, S. (2008) Challenging poverty. CACM, 51(8), 15-17.
  • Dias, M. B., & Brewer, E. (2009). How computer science serves the developing world. CACM 52(6), 74-80.
  • Greengard, S. (2008). Upwardly mobile. CACM, 51(12), 17-19.
  • Greengard, S. (2010). Cloud computing and developing nations. CACM, 53(5), 18-20.
9 Mon 4/4 Complexity
10 Mon 4/11 Electronic Voting
  • Dill, D. L. & Castro, D. (2008). The U.S. should ban paperless electronic voting machines. CACM, 51(10), 29-33.
  • Farivar, C. (2008). Clean elections. CACM, 51(10), 16-18.
  • Rubin, A. D. (2002). Security consideration for remote electronic voting. CACM, 45(12), 39-44.
11 Mon 4/18 Computer and Software Reliability
  • Hoffman, L. (2008). In search of dependable design. CACM, 51(7), 14-16.
  • Parnas, D. L. (2010). Risks of undisciplined development. CACM, 53(10), 25-27.
  • Greengard, S. (2009). Making automation work. CACM, 52(12), 18-19.
  • Zeichik, A. (2010, March 24). Toyota hardware defects/software bugs.
12 Mon 4/25 Software: Engineering, Professional, and Ethics
  • El-Kadi, A. (1999). Stop that divorce! CACM, 42(12), 27-28.
  • Frailey, D. J. (1999). Licensing software engineers. CACM, 42(12), 29-30.
  • Allen, F., Hawthorn, P., & Simons, B. (2000). Not now, not like this. CACM, 43(2), 29-30.
  • Johnson, D. G. (2008). Computer experts: Guns-for-hire or professionals? CACM, 51(10), 24-26.
  • Denning, P. J. & Riehle, R. D. (2009). Is software engineering engineering? CACM, 52(3), 24-26.
  • ACM/IEEE-CS Joint Task Force on Software Engineering Ethics and Professional Practices (1999). Software Engineering Code of Ethics and Professional Practice (Version 5.2).
13 Mon 5/2 Energy and the Environment
  • Kurp, P. (2008) Green computing. CACM, 51(10), 11-13.
  • Ranganathan, P. (2010). Recipe for efficiency: Principles of power-aware computing. CACM, 53(4), 60-67.
  • Garrett, M. (2008). Powering down. CACM, 51(9), 43-46.
14 Mon 5/9 Artificial Intelligence
  • Pack Kaelbling, L. (2010). New bar set for intelligent vehicles. CACM, 53(4), 98.
  • Anthes, G. (2010). Robots gear up for disaster response. CACM, 53(4), 15-16.
  • Goth, G. (2011). I, Domestic Robot. CACM, 54(5), 16-17.
  • Chopra, A. (2010). Rights for autonomous artificial agents? CACM, 53(8), 38-40.
  • Lanier, J. (2009). Confusions of the hive mind. CACM, 52(9), 111-112.
Wed 5/11 History of Computing
  • Campbell-Kelly, M. (2010). Victorian data processing. CACM, 53(10), 19-21.
  • Campbell-Kelly, M. (2010). Be careful what you wish for. CACM, 53(4), 25-26.
  • Campbell-Kelly, M. (2009). Computing in the depression era. CACM, 52(10), 21-22.
  • Ross, M. (2009). A pioneer woman. CACM, 52(1), 17.
  • Campbell-Kelly, M. (2009). The rise, fall, and resurrection of software as a service. CACM, 52(5), 28-30.
Jerod Weinman
Created 7 January 2011