Readings
CSC 105 - The Digital Age - Spring 2014
Articles from Communications of the ACM are posted here under
the ACM Copyright notice:
Copyright © 2004-2014 by Association for Computing Machinery, Inc.
(ACM). Permission to make digital or hard copies of part or all of
this work for personal or classroom use is granted without fee provided
that copies are not made or distributed for profit or commercial advantage
and that copies bear this notice and full citation on the first page.
Computing ethics
PDF of select readings
- Stamatellos, G. (2007). Preface, What is computer ethics?, and Ethical
issues. In Computer ethics: A global perspective (pp.
ix-x, 1-10). Sudbury, MA: Jones and Bartlett. (e-Reserves)
- Barger, N. (2008). The ethical decision-making process. In Computer
ethics: A case-based approach (pp. 70-79). New York: Cambridge University
Press. (e-Reserves)
- Association for Computing Machinery (1992). ACM Code of Ethics
and Professional Conduct.
- McFarland, M. (2012). Occidental engineering: An ethics case study
and commentary.
- OPTIONAL: McBride, N. (2012, August). The ethics of software engineering
should be an ethics for the client. Communications of the ACM,
55(8), 39-41. http://dx.doi.org/10.1145/2240236.2240250
Data mining and prediction
PDF of all articles
- Zarsky, T. Z. (2012, September). Automated prediction: Perception,
law and policy. Communications of the ACM, 55(9), 33-35.
- Savage, N. (2012, October). Digging for drug facts. Communications
of the ACM, 55(10), 11-13.
- OPTIONAL VIDEO: Altman, R. (2012). Data mining electronic medical
records to understand drug response and interactions. At Personalized
Medicine World Conference. http://vimeo.com/36973003.
- Hoffmann, L. (2012, June). Data mining meets city hall. Communications
of the ACM, 55(6), 19-21.
- Greengard, S. (2012, March). Policing the future. Communications
of the ACM, 55(3), 19-21.
- Savage, N. (2012, January). Better medicine through machine learning.
Communications of the ACM, 55(1), 17-19.
Artificial intelligence and robotics
PDF of all articles
- Vardi, M. Y. (2012, January). Artificial intelligence: past and future.
Communications of the ACM, 55(1), 5.
- Kirkpatrick, K. (2013, November). Legal issues with robots. Communications
of the ACM, 56(11), 17-19.
- Ford, M. (2013, July). Could artificial intelligence create an unemployment
crisis? Communications of the ACM, 56(7), 37-39.
- Wright, A. (2012, May). Robots like us. Communications of the
ACM, 55(5), 12-13.
- Geller, T. (2012, April). Talking to machines. Communications
of the ACM, 55(4), 14-16.
- Geller, T. (2011, October). Seeing is not enough. Communications
of the ACM, 54(10), 15-17.
- Kroeker, K. L. (2011, July). Weighing Watson's impact. Communications
of the ACM, 54(7), 13-15.
- Wright, A. (2011, July). Automotive autonomy. Communications
of the ACM, 54(7), 16-18.
Global development
PDF of all articles
- Best, M. L. (2013, April). Peacebuilding in a networked world. Communications
of the ACM, 56(4), 30-32.
- Heeks, R. (2012, April) Information technology and gross national
happiness. Communications of the ACM, 55(4), 24-26.
- Toyama, K. (2011, December). On turbocharged, heat-seeking, robotic
fishing poles. Communications of the ACM, 54(12), 29-31.
- Goodman, S. & Harris, A. (2010, December). The coming African tsunami
on information security. Communications of the ACM, 53(12),
24-27.
- Heeks, R. (2012, December). IT innovation for the bottom of the pyramid.
Communications of the ACM, 55(12), 24-27.
- Hoffmann, L. (2011, May) Data optimization in developing nations.
Communications of the ACM, 54(5), 18-20.
Intellectual property
PDF of all articles
- Samuelson, P. (2011, March). Do you own the software you buy? Communications
of the ACM, 54(3), 26-28.
- Samuelson, P. (2012, March). Do software copyrights protect what programs
do? Communications of the ACM, 55(3), 27-29.
- Samuelson, P. (2012, November). Oracle v. Google: Are APIs copyrightable?
Communications of the ACM, 55(11), 25-27.
- Samuelson, P. (2013, November). Is software patentable? Communications
of the ACM, 56(11), 23-25.
- Stallman, R. (2009, June). Why open source
misses the point of free software. Communications of the ACM,
52(6), 31-33.
Software reliability
PDF of all articles
- Cerf, V. G. (2013, January). What's a robot? Communications
of the ACM, 56(1), 7.
- Kamp, P.-H. (2011, November). The software industry is the
problem. Communications of the ACM, 54(11), 44-47.
- Greengard, S. (2009, December). Making automation work. Communications
of the ACM, 52(12), 18-19.
- Cusumano, M. A., (2004, March). Who is liable for bugs and security
flaws in software? Communications of the ACM, 47(3),
25-27.
Privacy
PDF of all articles
- Lindley, D. (2010, December). A matter of privacy. Communications
of the ACM, 53(12), 23.
- Moglen, E. (2013, February). The tangled web we have woven. Communications
of the ACM, 56(2), 20-22.
- Greengard, S. (2012, August). Advertising gets personal. Communications
of the ACM, 55(8), 18-19.
- Spiekermann, S. (2012, July). The challenges of privacy by design.
Communications of the ACM, 55(7), 39-41.
- boyd, d. (2012, August). The politics of "real names." Communications
of the ACM, 55(8), 29-31.
- Soper, D. (2012, April). Is human mobility tracking a good idea? Communications
of the ACM, 55(4), 35-37.
- Michael, K., & Michael, MG. (2013, November). No limits to watching?
Communications of the ACM, 56(11), 26-28.
- OPTIONAL: Wicker, S. B., (2011, July). Cellular telephony and the
question of privacy. Communications of the ACM, 54(7), 88-98.
http://dx.doi.org/10.1145/1965724.1965745
Security
PDF of all articles
- Hong, J. (2012, January). The state of phishing attacks. Communications
of the ACM, 55(1), 74-81.
- Denning, T., Kohno, T., & Levy, H. M. (2013, January). Computer security
and the modern home. Communications of the ACM, 56(1), 94-103.
Energy and sustainability
PDF of all articles
- Kurp, P. (2008, October). Green computing. Communications of
the ACM, 51(10), 11-13.
- Mone, G. (2012, October). Redesigning the data center. Communications
of the ACM, 55(10), 14-16.
- Watson, R. T., Corbett, J., Boudrea, M. C., & Webster, J. (2012,
July) An information strategy for environmental sustainability. Communications
of the ACM, 55(7), 28-30.
- Goth, G. (2011, February). Chipping away at greenhouse gases. Communications
of the ACM, 54(2), 13-15.
Cookies
PDF of all articles
- Berghel, H. (2001). Caustic cookies. Communications of the ACM,
44(5), 19-22.
- Berghel, H. (2002). Hijacking the Web. Communications of the
ACM, 45(4), 23-27.
Electronic voting
PDF of all articles
- Dill, D. L., & Castro, D. (2008, October). The U.S. should ban paperless
electronic voting machines. Communications of the ACM, 51(10),
29-33.
- Schürmann, C. (2011, October). Modernizing the Danish democratic process.
Communications of the ACM, 54(10), 27-29.
- Olsen, K. A., & Nordhaug, K. A. (2012, August). Internet elections:
Unsafe in any home? Communications of the ACM, 55(08), 36-38.
- Simons, B., & Jones, D. W. (2012, October). Internet voting in the
U.S. Communications of the ACM, 55(10), 68-77.
Cyber conflict
PDF of all articles
- Lin, H. (2012, June). Why computer scientists should care about cyber
conflict and U.S. national security policy. Communications of
the ACM, 55(6), 41-43.
- Lin, P., Allhoff, F., Rowe, N. C. (2012, March). War 2.0: Cyberweapons
and ethics. Communications of the ACM, 55(3), 24-26.
- Conway, M. (2011, February). Against cyberterrorism. Communications
of the ACM, 54(2), 26-28.
- Arquilla, J. (2011, October). From blitzkrieg to bitskrieg: The military
encounter with computers. Communications of the ACM, 54(10),
58-65.
History of computing
PDF of all articles
- Campbell-Kelly, M. (2010, March). Victorian data processing. Communications
of the ACM, 53(10), 19-21.
- Campbell-Kelly, M. (2010, April). Be careful what you wish for. Communications
of the ACM, 53(4), 25-26.
- Haigh, T. (2014, January). Actually, Turing did not invent the computer.
Communications of the ACM, 57(1), 36-41.
- Campbell-Kelly, M. (2009, January). Computing in the depression era.
Communications of the ACM, 52(10), 21-22.
- Hyman, P. (2012, July). Lost and found. Communications of the
ACM, 55(7), 21.
- Ross, M. (2009). A pioneer woman. Communications of the ACM,
52(1), 17.
- Haigh, T. (2013, January). Five lessons from really good history.
Communications of the ACM, 56(1), 37-40.
- Smotherman, M., & Spicer, D. (2010, December). IBM's single-processor
supercomputer efforts. Communications of the ACM, 53(12), 28-29.
- Haigh, T. (2012, January). The IBM PC: From beige box to industry
standard. Communications of the ACM, 55(1), 35-37.
- Campbell-Kelly, M. (2009). The rise, fall, and resurrection of software
as a service. Communications of the ACM, 52(5), 28-30.