Readings
CSC 105 - The Digital Age - Spring 2015
Articles from Communications of the ACM are posted here under
the ACM Copyright notice:
Copyright © 2004-2014 by Association for Computing Machinery,
Inc. (ACM). Permission to make digital or hard copies of part or all
of this work for personal or classroom use is granted without fee
provided that copies are not made or distributed for profit or commercial
advantage and that copies bear this notice and full citation on the
first page.
Computing ethics
PDF of select readings
- Stamatellos, G. (2007). Preface, What is computer ethics?, and Ethical
issues. In Computer ethics: A global perspective (pp.
ix-x, 1-10). Sudbury, MA: Jones and Bartlett. (e-Reserves)
- Barger, N. (2008). The ethical decision-making process. In Computer
ethics: A case-based approach (pp. 70-79). New York: Cambridge University
Press. (e-Reserves)
- Association for Computing Machinery (1992). ACM Code of Ethics
and Professional Conduct.
- McFarland, M. (2012). Occidental engineering: An ethics case study
and commentary.
- OPTIONAL: McBride, N. (2012, August). The ethics of software engineering
should be an ethics for the client. Communications of the ACM,
55(8), 39-41. http://dx.doi.org/10.1145/2240236.2240250
Artificial intelligence and robotics
PDF of all articles
- Vardi, M. Y. (2012, January). Artificial intelligence: past and future.
Communications of the ACM, 55(1), 5.
- Kirkpatrick, K. (2013, November). Legal issues with robots. Communications
of the ACM, 56(11), 17-19.
- Ford, M. (2013, July). Could artificial intelligence create an unemployment
crisis? Communications of the ACM, 56(7), 37-39.
- Kroeker, K. L. (2011, July). Weighing Watson's impact. Communications
of the ACM, 54(7), 13-15.
- Wright, A. (2011, July). Automotive autonomy. Communications
of the ACM, 54(7), 16-18.
Global development
PDF of all articles
- Best, M. L. (2013, April). Peacebuilding in a networked world. Communications
of the ACM, 56(4), 30-32.
- Heeks, R. (2012, April) Information technology and gross national
happiness. Communications of the ACM, 55(4), 24-26.
- Toyama, K. (2011, December). On turbocharged, heat-seeking, robotic
fishing poles. Communications of the ACM, 54(12), 29-31.
- Goodman, S. & Harris, A. (2010, December). The coming African tsunami
on information security. Communications of the ACM, 53(12),
24-27.
- Hoffmann, L. (2011, May) Data optimization in developing nations.
Communications of the ACM, 54(5), 18-20.
Electronic voting
PDF of all articles
- Dill, D. L., & Castro, D. (2008, October). The U.S. should ban paperless
electronic voting machines. Communications of the ACM, 51(10),
29-33.
- Schürmann, C. (2011, October). Modernizing the Danish democratic
process. Communications of the ACM, 54(10), 27-29.
- Olsen, K. A., & Nordhaug, K. A. (2012, August). Internet elections:
Unsafe in any home? Communications of the ACM, 55(08), 36-38.
- Simons, B., & Jones, D. W. (2012, October). Internet voting in the
U.S. Communications of the ACM, 55(10), 68-77.
Intellectual property
PDF of all articles
- Samuelson, P. (2011, March). Do you own the software you buy? Communications
of the ACM, 54(3), 26-28.
- Samuelson, P. (2012, March). Do software copyrights protect what programs
do? Communications of the ACM, 55(3), 27-29.
- Samuelson, P. (2014, November). Updates on the intellectual property
front. Communications of the ACM, 57(11), 28-30.
- OPTIONAL: Samuelson, P. (2013, November). Is software patentable?
Communications of the ACM, 56(11), 23-25. http://dx.doi.org/10.1145/2527186
More on Alice v. CLS Bank
- OPTIONAL: Samuelson, P. (2014, March). Mass digitization as fair use.
Communications of the ACM, 57(3), 20-22. http://dx.doi.org/10.1145/2566965
More on Authors Guild v. HathiTrust
- Stallman, R. (2009, June). Why open source
misses the point of free software. Communications of the ACM,
52(6), 31-33.
Privacy
PDF of all articles
- Lindley, D. (2010, December). A matter of privacy. Communications
of the ACM, 53(12), 23.
- Gurses, S. (2014, August). Can you engineer privacy? Communications
of the ACM, 57(8), 20-23.
- Greengard, S. (2008, September). Privacy matters. Communications
of the ACM, 51(9), 17-18.
- Moglen, E. (2013, February). The tangled web we have woven. Communications
of the ACM, 56(2), 20-22.
- Klarreich, E. (2014, August). Hello, my name is.... Communications
of the ACM, 57(8), 17-19.
Security
PDF of all articles
- Hong, J. (2012, January). The state of phishing attacks. Communications
of the ACM, 55(1), 74-81.
- Denning, T., Kohno, T., & Levy, H. M. (2013, January). Computer security
and the modern home. Communications of the ACM, 56(1), 94-103.
Software reliability
PDF of all articles
- Cerf, V. G. (2013, January). What's a robot? Communications
of the ACM, 56(1), 7.
- Kamp, P.-H. (2011, November). The software industry is the
problem. Communications of the ACM, 54(11), 44-47.
- Greengard, S. (2009, December). Making automation work. Communications
of the ACM, 52(12), 18-19.
- Cusumano, M. A., (2004, March). Who is liable for bugs and security
flaws in software? Communications of the ACM, 47(3),
25-27.
Net neutrality
PDF of select articles
- Joch, A. (2009, October). Debating net neutrality. Communications
of the ACM, 52(10), 14-15.
- van Schewick, B., & Farber, D. (2009, February). Network neutrality
nuances. Communications of the ACM, 52(2), 31-37.
- Ohm, P. (2010, April). When network neutrality met privacy.
Communications of the ACM, 53(4), 30-32.
- McMillan, R. (2014, June 23). What everyone gets wrong in the debate
over net neutrality. Wired. Retrieved from http://www.wired.com/2014/06/net_neutrality_missing
- OPTIONAL: Wu, T. (2015, February 5). Net Neutrality: How the Government
Finally Got It Right. The New Yorker. Retrieved from http://www.newyorker.com/news/news-desk/net-neutrality-shows-democracy-can-work
Cookies
PDF of all articles
- Berghel, H. (2001, May). Caustic cookies. Communications of
the ACM, 44(5), 19-22.
- Berghel, H. (2002, April). Hijacking the Web. Communications
of the ACM, 45(4), 23-27.
Cyber conflict
PDF of all articles
- Lin, H. (2012, June). Why computer scientists should care about cyber
conflict and U.S. national security policy. Communications of
the ACM, 55(6), 41-43.
- Lin, P., Allhoff, F., & Rowe, N. C. (2012, March). War 2.0: Cyberweapons
and ethics. Communications of the ACM, 55(3), 24-26.
- Conway, M. (2011, February). Against cyberterrorism. Communications
of the ACM, 54(2), 26-28.
- Arquilla, J. (2011, October). From blitzkrieg to bitskrieg: The military
encounter with computers. Communications of the ACM, 54(10),
58-65.
History of computing
PDF of all articles
- Campbell-Kelly, M. (2010, March). Victorian data processing. Communications
of the ACM, 53(10), 19-21.
- Campbell-Kelly, M. (2010, April). Be careful what you wish for. Communications
of the ACM, 53(4), 25-26.
- Haigh, T. (2014, January). Actually, Turing did not invent the computer.
Communications of the ACM, 57(1), 36-41.
- Campbell-Kelly, M. (2009, January). Computing in the depression era.
Communications of the ACM, 52(10), 21-22.
- Hyman, P. (2012, July). Lost and found. Communications of the
ACM, 55(7), 21.
- Ross, M. (2009). A pioneer woman. Communications of the ACM,
52(1), 17.
- Haigh, T. (2013, January). Five lessons from really good history.
Communications of the ACM, 56(1), 37-40.
- Smotherman, M., & Spicer, D. (2010, December). IBM's single-processor
supercomputer efforts. Communications of the ACM, 53(12), 28-29.
- Haigh, T. (2012, January). The IBM PC: From beige box to industry
standard. Communications of the ACM, 55(1), 35-37.
- Campbell-Kelly, M. (2009). The rise, fall, and resurrection of software
as a service. Communications of the ACM, 52(5), 28-30.