Computer Ethics Bibliography
Update: 1997-1998
Copyright by Herman T. Tavani, 1998
Last Updated: February 9, 1998
1. Recent Books: A Select List
Works cited in this section were published in 1997 and 1998. For a list of books published before 1997, refer to the main bibliography.
Agre, Philip E. and Marc Rotenberg, eds. Technology and Privacy: The New Landscape. Cambridge, MA: MIT Press, 1997; 280 pages. ISBN 0-262-01162-X. Includes ten essays that examine technical, economical, and political aspects of privacy in the U.S., Canada, and Europe. Though not necessarily intended as a course text, the anthology can be used as a supplementary text, especially in either an upper-level undergraduate or a graduate course in which a significant portion is devoted to issues in technology and privacy.
Baase, Sara. A Gift of Fire: Social, Legal and Ethical Issues in Computing. Upper Saddle River, NJ: Prentice Hall, 1997; 382 pages. ISBN 0-13-358779-0. Organized into ten chapters with the following titles: "Unwrapping the Gift," "Privacy and Inform ation," Wiretapping and Encryption," "Can We Trust the Computer?," "Protecting Software and Other intellectual Property," "Constitutional and Related Issues," "Computer Crime," "Computers and Work,&qu ot; "Broader Issues on the Impact and Control of Computers," and "Issues of Professional Ethics and Responsibilities."
Bijker, Wiebe. Of Bicycles, Bakelites, and Bulbs: Toward a Theory of Sociotechnical Change. Cambridge, MA: MIT Press, 1997; 380 pages. ISBN 0-262-52227-6. Organized into five main sections: "Introduction," "King of the Road: The Social Construction of Safety," "The Fourth Kingdom: The Social Construction of the Bakelites," "The Majestic Daylight: The Social Construction of Fluorescent Lighting," and "Conclusion: The Politics of Sociotechnical Change."
Bynum, Terrell Ward. Information Ethics: An Introduction. Cambridge, MA: Blackwell Publishers, 1998. ISBN 185-554-8062. A textbook organized into ten chapters: "The Computer Revolution," "The Tools of Ethical Analysis," "Professional Responsibilit y," "Ethics in Project Management," "Computers and Security," "Computers and Privacy," "CyberBusiness," "Ownership of Intellectual Property," "Computers in the Workplace," and "Global I nformation Ethics."
Bynum, Terrell Ward and James H. Moor, eds. The Digital Phoenix: How Computers are Changing Philosophy. Cambridge, MA: Blackwell Publishers, 1998; 256 pages. ISBN 0-631-20352-4. A collection of articles describing the impact of computing on philosophy -- including computing used as: a tool, a m odel, and a subject matter. Though not specifically intended as a coursebook, the collection of readings can be used as a supplementary text in a course in Computers and Philosophy.
Coyle, Karen. Coyle's Information Highway Handbook: A Practical File on the New Information Order. Chicago, IL: American Library Association, 1997; 297 pages. The work is organized into the following topical areas: "The New Information Society," "The Promise of the Information Highway," "Stakeholders and the Information Marketplace," "Copyright in the Digital Age," "Privacy and Intellectual Freedom in the Digital Age," "Censors Take On the Net," and " Accessing the Digital Universe."
Denning, Dorothy and Peter Denning, eds. Internet Besieged: Countering Cyberspace Scofflaws. New York, NY: ACM Press, 1998; 500 pages. ISBN 0-201-30820-7. Organized into thirty chapters, this text examines social, legal, ethical, and political implications of internet security breaches. Diff erent kinds of network security risks are addressed, and accounts of actual security mishaps are provided. Also considered are aspects of the cyberpunk culture and the ethics (or nonethics) of hacker break-ins.
Denning, Peter and Bob Metcalfe, eds. Beyond Calculation: The Next 50 Years of Computing. New York, NY: Springer Verlog, 1997; 350 pages. ISBN 0-387-94932-1. Contains twenty essays that contemplate the future of computing and suggest ways in which information technology will evolve and affect society. Essays are contributed by Sherry Turkle, Abbe Moshowitz, Terry Winograd, William Mitchell, Gordon Bell, Donald Norman, and other notable figures in the field. Also includes a forward by James Burke.
Dyson, Esther. Release 2.0: A Design for Living in the Digital Age. New York, NY: Broadway Books, 1997; 307 pages. ISBN 0-7679-0011-1. Organized into eleven chapters: "Communities," "Work," "Education," "Governance," "Int ellectual Property," "Content Control," "Privacy," "Anonymity," "Security," and "A Design for Living."
Edgar, Stacey L. Morality and Machines. Perspectives on Computer Ethics. Sudbury, MA: Jones and Bartlett Publishers, 1997; 448 pages. ISBN 0-7637-0184-X. Organized into two main parts -- Part One: Ethical Foundations and Part Two: Ethics Applied to a Computerized World -- with twelve chapters: "Ethical Decision Making," "Is Ethics Possible?" "The Search for a Basis for Ethics," "Software Piracy, Property, and Protection," "Computer Crime," "Computer Intruders, Viruses, and All That," "Privacy," "Errors and Reliabili ty," "The Computer World of Work," "Responsibility, Liability, and Professional Ethics," "Computers, the Government, and the Military," and "The Artificial Intelligensia and Virtual Worlds."
Epstein, Richard G. The Case of the Killer Robot: Stories About the Professional, Ethical, and Societal Dimensions of Computing. NY: John Wiley & Sons, 1997; 242 pages. ISBN: 0-471-13823-1. An alternative style coursebook that is organized into an "Inner Book,&q uot; which is fictional, and an "Outer Book," which is completely factual. The inner book includes twenty-nine stories which are in turn organized into two parts -- "Part One: Print Media" and "Part Two: Broadcast Media." The outer book also includes four appendices, one of which contains useful bibliographic resources.
Ermann, M. David; Williams, Mary B.; and Michele S. Shauf, eds. Computers, Ethics, and Society. 2nd ed. NY: Oxford University Press, 1997; 384 pages. ISBN: 019510756X. Includes thirty-five readings organized into four main parts: "Computers in an Ethical Framework," "Computers and the Personal Life, " "Computers and the Just Society," and "Computing Professionals and Their Ethical Responsibilities."
Holmes, David, ed. Virtual Politics. Thousand Oaks, CA: Sage Publications, 1998; 272 pages. Contains twelve readings organized into two main parts: I. The Self, Identity, and Body in the Age of the Virtual; and II. Politics and Community in Virtual Worlds. Also includes an introduction by Holmes.
Jones, Capers. The Year 2000 Software Problem: Quantifying the Costs and Assessing the Consequences. New York, NY: ACM Press, 1997; 368 pages. ISBN 0-201-30964-5. Provides a framework for examining the effect that the year 2000 problem will have on the business sect or. In addition to assessing the scope of the problem, the author offers a solution strategy.
Jones, Steven G., ed. Virtual Culture. Thousand Oaks, CA: Sage Publications, 1997; 262 pages. Comprised of eleven readings, including an article by Jones on "The Internet and its Social Landscape." Also includes an introduction by Jones.
Kahin, Brian and James H. Keller, eds. Coordinating the Internet. Cambridge, MA: MIT Press, 1997; 500 pages. ISBN 0-262-61136-8. Essays in this anthology examine possible mechanisms for governing the Internet as it grows in scope, bandwidth, and functionality. Also considered in these essa ys is whether technical and policy issues are inseparable in discussions involving the Internet.
Kahin, Brian and Charles Nesson, eds. Borders in Cyberspace: Information Policy and the Global Information Infrastructure. Cambridge, MA: MIT Press, 1997; 300 pages. ISBN 0-262-61126-0. A publication of the Harvard Information Infrastructure Project, the essays in this volume examine issu es in privacy, security, intellectual property, and censorship.
Kizza, Joseph M. Ethical and Social Issues in the Information Age. New York, NY: Springer Verlog, 1997; 172 pages. ISBN 0-387-98275-2. Includes a Preface on "Morality and Law" and eight chapters with the following titles: "Technology and Values," & quot;Ethics and Professionalism," "Anonymity, Security, and Privacy," "Intellectual Property and Computer Technology," "Computer Augmented Environment: The Workplace," "Software Issues," "New Frontiers for Ethical Considerations: Artificial Intelligence, Cyberidentity, and Virtual Reality," "Ethical and Social Issues in Cyberspace." Intended as an undergraduate textbook, this work provides an introductory overview to ethical, social, and pol icy issues that have emerged in the information era.
McKnight, Lee W. and Joseph P. Bailey, eds. Internet Economics. Cambridge, MA: MIT Press, 1997; 350 pages. ISBN 0-262-13336-9. The anthology is organized into six sections: "Introduction to Internet Economics," "The Economics of the Internet," "Interconnection and Multi cast Economics," "Usage Sensitive Pricing," "Internet Commerce," "Internet Economics and Policy."
Mills, Stephanie, ed. Turning Away from Technology: A New Vision of the 21st Century. San Francisco, CA: Sierra Club, 1997; 256 pages. ISBN 0-87156-953-1. Consists of twelve chapters organized into two main parts: "Megatechnology Development," and "Megatechn ology and Economic Civilization." Also includes an introduction by Theodore Roszak.
Morgan, Christopher, ed. Wizards and Their Wonders: Portraits in Computing. New York, NY: ACM Press, 1997. ISBN 0-89791-1-960-2. Growing out of a photo exhibit to honor pioneers in computing, the book includes 200 specially commissioned photographs of inventors, entrepreneurs , and communicators who helped shaped the computer era.
Picard, Rosalind W. Affective Computing. Cambridge, MA: MIT Press, 1997; 275 pages. ISBN 0-262-16170-2. Organized into two main parts. Part I examines intellectual framework issues as well as moral and social questions raised by affective computing technology. Part II co nsiders more technical issues, such as current attempts to build "models of emotion" that can be used for synthesizing emotion in computers.
Pool, Robert. Beyond Engineering: How Society Shapes Technology. New York, NY: Oxford University Press, 1997; 258 pages. ISBN 0-19-510772-1. Comprised of nine chapters that cover topics such as "Risk," "Control," "Choices," "Compl exity," and "Technical Fixes, Technical Solutions."
Rawlins, Gregory J. E. Slaves of the Machine: The Quickening of Computer Technology. Cambridge, MA: MIT Press, 1997; 240 pages. ISBN 0-262-18183-5. Organized into six chapters which ask the following questions: What are computers? How do we build them? How do we program the machine? What can't they do? Can they think?
Rogerson, Simon and Terrell Ward Bynum, eds. Information Ethics: A Reader. Cambridge, MA: Blackwell Publishers, 1998. ISBN 185-554-8452. Includes thirty-two readings organized into five main parts which are titled: "What is Computer Ethics?," "Ethics and the Net," "Compu ters and Privacy," "Computers in the Workplace," and "Computers and Business." This anthology includes papers presented at the ETHICOMP95 and ETHICOMP96 conferences.
Rosenberg, Richard S. The Social Impact of Computers. 2nd ed. San Diego, CA: Academic Press, 1997; 522 pages. ISBN 0-12-597131-1. Organized into thirteen chapters: "Computers are Everywhere," "Computers and the Human Imagination," "Criticism and History," "The Business World," "Medicine and Computers,& quot; "Computers and Education," "Government and Computers," "Computers and the Law," "Privacy and Freedom of Information," "Employment and Unemployment," "Business and Government," "The Inf ormation Society," and "Ethics and Professionalism." This work also includes an appendix which identifies magazines, journals, professional computer associations, and Web sites.
Schellenberg, Kathryn, ed. Computers in Society. 7th ed. Guilford, CT: Dushkin /McGraw Hill, 1997; 243 pages. ISBN 0-697-39304-6. Includes thirty-six readings, organized into eight units: "The Economy," "Work and the Workplace," "Computers and Social Pa rticipation," "Social Values: Ethics, Law, and Privacy," "Politics and the State," "Technological Risks," and "International Perspective and Issues." This work also contains an introduction and glossary, as wel l as forms for reviewing and rating articles.
Shneiderman, Ben. Designing the User Interface: Strategies for Effective Human-Computer Interaction. 3rd ed. New York, NY: ACM Press, 1997; 650 pages. ISBN 0-201-85491-0. Provides a current introduction to the user-interface design and covers several topics in the huma n factors of interactive software. In addition to covering topics related to development methodologies, evaluation techniques, and user-interface-building tools design, this text discusses issues related to anthropomorphic design, virtual environments, an d agents.
Spinello, Richard A. Case Studies in Information and Computer Ethics. Upper Saddle River, NJ: Prentice Hall, 1997; 285 pages. ISBN 0-13-533845. Includes thirty-eight cases organized into nine chapters, which are in turn organized into three main parts: "Introduction, " "Information Ethics," and "Computer Science Ethics." Also contains a useful appendix which identifies various professional codes of ethics. This work can be used either as a stand-alone coursebook or as a supplement to various c omputer ethics textbooks, including Spinello's Ethical Aspects of Information Technology. Englewood Cliffs, NJ: Prentice Hall, 1995.
Stork, David G., ed. HAL's Legacy: 2001's Computer as Dream and Reality. Cambridge, MA: MIT Press, 1997; 352 pages. ISBN 0-262-19378-7. This anthology, which includes a Foreword by Arthur C. Clarke, includes a collection of essays that explore the relationship between science fantasy and technological fact.
Sussman, Gerald. Communication, Technology, and Politics in the Information Age. Thousand Oaks, CA: Sage Publications, 1997; 319 pages. Includes eight chapters which are organized into five main parts: I. The Meaning and Politics of the "Communication Revolution& quot;; II. The Social Historical Process; III. Political Issues in the "Information Society"; IV. The Global Dimensions of the "Information Society": and V. Conclusions.
Teich, Albert H., ed. Technology and the Future. 7th ed. NY: St. Martin's Press, 1997; 384 pages. ISBN: 0-312-11612-8. Includes twenty-six readings organized into four parts: "Thinking About Technology," "Forecasting, Assessing, and Controlling the Impacts o f Technology," "Reshaping Technologies," and "Using Technologies and Confronting Their Dilemmas."
Tenner, Edward. Why Things Bite Back: Technology and the Revenge of Unintended Consequences. New York, Vintage Books, 1997; 431 pages. ISBN 0-679-74756-7. Comprised of twelve chapters, the book examines social issues related to technology, including productivity issu es in the computerized office.
Weckert, John and Douglas Adeney. Computer and Information Ethics. Westport, CT: Greenwood Press, 1997; 175 pages. ISBN 0-313-29362-7. Organized into eleven chapters: "The Meaning of Ethics," "Professional Ethics," "Freedom, Information, and Images," &quo t;Censorship of the Internet," "Intellectual Property," "Privacy," "Responsibility," "What Computers Should Not Do," "Quality of Life and Work," "Virtual Reality," and "Minds, Machines, and Morality." This work also includes an introduction, glossary, and bibliography.
Willard, Nancy E. The Cyberethics Reader. New York, NY: McGraw Hill, 1997; 101 pages. ISBN 0-07-070318-3. Organized into thirty mini-sections, each consisting of two-to-four pages. Also contains a preface, introduction, and glossary, as well as a section on "Net C ommunications Conventions." Though not a text book per se, this work can be used as a supplementary text, especially in courses that include a component on netiquette.
Winters, Paul A., ed. Computers and Society. San Diego, CA: Greenhaven Press, 1997; 172 pages. ISBN: 1-56510-563-X. Includes thirty-three readings which are distributed across five chapters: "How Will Computers Transform Society?," "How Will Computer Technol ogy Affect the Right to Privacy?," "Should Computer Content Be Censored?," "Should Universal Access to Computer Technology Be Guaranteed?," and "Will Computers Transform Education?"
Wise, J. Macgregor. Exploring Technology and Social Space. Thousand Oaks, CA: Sage Publications, 1997; 213 pages. Includes nine chapters organized into two main parts: I. Episteme, and II. Assemblage. Also includes introductory and concluding chapters.
Wresch, William. Disconnected: Haves and Have-nots in the Information Age. New Brunswick, NJ: Rutgers University Press, 1997; 268 pages. ISBN 0-8135-2370-2. Contains eleven chapters organized into four main parts: "Problems at the Source," "Transmission Problems," "Reception Problems," and "Solutions."
Zaleski, Jeff. The Soul of Cyberspace: How Technology is Changing Our Spiritual Life. San Francisco, CA: Harpers Edge, 1997; 284 pages. ISBN 0-06-251451-2. Includes twelve chapters that discuss issues related to artificial intelligence, artificial life, virtual real ity, and "sacred cyberspace."
2. Recent Articles: A Select List
Articles cited in this section were selected from those published after September l996. For a list of articles published before that date, refer to the main bibliography .
Artz, John. "The Role of Stories in Computer Ethics," Computers and Society, Vol. 28, No. 1, March 1998, forthcoming.
Baase, Sara. "Impacts on Communities: Comments on Sclove and Scheuer," Computers and Society, Vol. 27, No. 4, December 1997, pp. 15-17.
Bailey, James; Gerelenter, David; Lanier, Jaron; and Charles Siebert. "Our Machines, Ourselves," Harper's, May 1997, pp. 45-54.
Barme', Geremie R. and Sang Ye. "The Great Firewall of China," Wired, Vol. 5, No. 6, June 1997, pp. 138-151, 174-178, 182.
Barroso, Porfirio. "Key Ethical Concepts for the Internet and For the Ethical Codes of Computer Professionals," Australian Computer Journal, Vol. 29, No. 1, February 1997, pp. 31-34.
Behar, Richard. "Who's Reading Your E-mail?" Fortune, February 3, 1997, pp. 57-61, 64, 66, 70.
Bennett, Colin and Charles D. Raab. "The Adequacy of Privacy: The European Union Data Protection Directive and the North American Response," The Information Society: An International Journal. Vol. 13, No. 3, 1997, pp. 245-264.
Berghel, Hal. "Informal Logic on Both Sides of the CDA Debate," Communications of the ACM, Vol. 40, No. 7, July 1997, pp. 11-15.
Berghel, Hal. "A Post Mortem for the Communications Decency Act." Computers and Society, Vol. 27, No. 4, December 1997, pp. 8-11.
Berleur, Jacques. "International Federation for Information Processing's Framework for Computer Ethics," Science and Engineering Ethics, Vol. 2, No. 2, April 1996. Forthcoming in S. Rogerson and T. W. Bynum. (eds.) Information Ethics: A Reader. Cambridge, MA: Blackwell Publishers, 1998.
Birrer, Frans. "Applying Ethical and Moral Concepts and Theories to IT Contexts: Some Key problems and Challenges," in Proceedings of the Conference on Computer Ethics: Philosophical Enquiry. (Edited by Jeroen van den Hoven). Rotterdam, The Netherlands: Erasmus University Press, 1997, pp. 1-7.
Blythe, Andrew. "What Happens When a Medical Office Information System Fails?" Computers and Society, Vol. 26, No. 4, December 1997, pp. 25-26.
Brey, Philip. "The Politics of Computer Systems and the Ethics of Design," in Proceedings of the Conference on Computer Ethics: Philosophical Enquiry. (Edited by Jeroen van den Hoven). Rotterdam, The Netherlands: Erasmus University Press, 1997, pp. 8-19.
Brody, Herb. "Clicking into Webzines," Technology Review, May/June, 1997, pp. 38-47.
Brothers, Robyn. "'Deindividuation' and the Ethical Imperative: Rethinking Selfhood in the Information Age," in Proceedings of the Conference on Computer Ethics: Philosophical Enquiry. (Edited by Jeroen van den Hoven). Rotterdam, The Netherlands: Erasmus University Press, 1997, pp. 20-28.
Bynum, Terrell Ward and Petra Schubert. "How to do Computer Ethics," in Proceedings of the Conference on Computer Ethics: Philosophical Enquiry. (edited by Jeroen van den Hoven). Rotterdam, The Netherlands: Erasmus University Press, 1997, pp. 29-43.
Bynum, Terrell Ward and Simon Rogerson. "Introduction and Overview: Global Information Ethics," Science and Engineering Ethics, Vol. 2, No. 2, April 1996. Forthcoming in S. Rogerson and T. W. Bynum. (eds.) Information Ethics: A Reader. Cambridge, MA: Blackwell Publishers, 1998.
Camp, Jean. "Web Security and Privacy: An American Perspective, in Proceedings of the Conference on Computer Ethics: Philosophical Enquiry. (Edited by Jeroen van den Hoven). Rotterdam, The Netherlands: Erasmus University Press, 1997, pp. 44-61.
Camp, Tracy. "The Incredible Shrinking Pipeline," Communications of the ACM, Vol. 40, No. 10, October 1997, pp. 103-110.
Connolly, Frank W. "A Call for a Statement of Expectations for the Global Information Infrastructure," Science and Engineering Ethics, Vol. 2, No. 2, April 1996. Forthcoming in S. Rogerson and T. W. Bynum. (eds.) Information Ethics: A Reader. Cambridge, MA: Blackwell Publishers, 1998.
Cushman, Reid. "Information and Medical Ethics: Protecting Patient Privacy," IEEE Technology and Society Magazine. Vol. 15, No. 3, Fall 1996, pp. 32-39.
DaCosta, Ivan Marques. "Virtual Reality and Radical Exclusion," in Proceedings of the Conference on Computer Ethics: Philosophical Enquiry. (Edited by Jeroen van den Hoven). Rotterdam, The Netherlands: Erasmus University Press, 1997, pp. 62-73.
Dahlbom, Bo and Lars Mathiassen. "The Future of Our Profession," Communications of the ACM, Vol. 40, No. 6, June 1997, pp. 80-89.
Damodaran, Leela. "User Involvement in the Systems Design Process -- a Practical Guide for Users," Behaviour and Information Technology. Vol. 15, No. 6, November-December 1996, pp. 363-377.
Debrock, Guy. "Information and Responsibility," in Proceedings of the Conference on Computer Ethics: Philosophical Enquiry. (Edited by Jeroen van den Hoven). Rotterdam, The Netherlands: Erasmus University Press, 1997, pp. 74-83.
Dertouzos, Michael L. "Creating the People's Computer," Technology Review, April 1997, pp. 20-28.
Duncan, George T. "Is My Research Ethical?" Communications of the ACM. Vol. 39, No 12, December 1996, pp. 67-68.
Epstein, Richard G. "The Wheel," Computers and Society, Vol. 27, No. 2, June 1997, pp. 8-13.
Epstein, Richard G. "The Great Brain Robbery," Computers and Society, Vol. 27, No. 4, December 1997, pp. 40, 35-39.
Fairwether, N. Ben. "Moral Dilemmas and Issues of telework for Disabled People," in Proceedings of the Conference on Computer Ethics: Philosophical Enquiry. (Edited by Jeroen van den Hoven). Rotterdam, The Netherlands: Erasmus University Press, 1997, pp. 84-93
Florman, Samuel. "The Humane Engineer," Technology Review. Vol. 100, No. 3, April 1997, p. 63.
Foerst, Anne. "Ethical Questions Regarding Humanoid Robots," in Proceedings of the Conference on Computer Ethics: Philosophical Enquiry. (Edited by Jeroen van den Hoven). Rotterdam, The Netherlands: Erasmus University Press, 1997, pp. 94-102.
Forbes, Barry. "From the Town Meeting to the World Wide Web: Creating and Maintaining Democracy in the Telecommunications Age," CPSR Newsletter, Vol. 15, No. 3, Summer 1997, pp. 1, 3-5.
Fulda, Joseph S. "The Appearance of Impropriety," Computers and Society, Vol. 26, No. 4, December 1997, pp. 22-24.
Fulda, Joseph S. "From Data to Knowledge: Implications of Data Mining," Computers and Society, Vol. 27, No. 4, December 1997, p. 28.
Goldhaber, Michael H. "The Attention Economy as the Natural Economy of Cyberspace," CPSR Newsletter, vol. 15, No. 4, Fall 1997, pp. 16-17.
Gorniak-Kocikowska, Krystyna. "The Computer Revolution and the Problem of Global Ethics," Science and Engineering Ethics, Vol. 2, No. 2, April 1996. Forthcoming in S. Rogerson and T. W. Bynum. (eds.) Information Ethics: A Reader. Cambridge, MA: Blackwell Publishers, 1998.
Gotterbarn, Donald and Simon Rogerson. "The Evolution of the Uniqueness Revolution (What's So Special About Moral Problems in IT) ," in Proceedings of the Conference on Computer Ethics: Philosophical Enquiry. (Edited by Jeroen van den Hoven). Rotterdam, The Netherlands: Erasmus University Press, 1997, pp. 103-109.
Gotterbarn, Don and Robert Reiser. "Ethics Activities in Computer Science Courses: Goals and Issues," Computers and Society, Vol. 27, No. 1, March 1997, pp. 10-15.
Gotterbarn, Don; Miller, Keith; and Simon Rogerson. "Software Engineering Code of Ethics," Communications of the ACM, Vol. 40, No. 11, November 1997, pp. 110-118.
Grodzinsky, Frances and John Berkman. "Ask Miss Netiquette," in Proceedings of the Conference on Computer Ethics: Philosophical Enquiry. (Edited by Jeroen van den Hoven). Rotterdam, The Netherlands: Erasmus University Press, 1997, pp. 112-123.
Gunkel, David. "The Empire Strikes Back Again: The Social Politics of the Internet," Computers and Society, Vol. 27, No. 4, December 1997, pp. 18-21.
Guenther, Charles. "Teaching Social Responsibility," IEEE Technology and Society Magazine, Vol. 16, No. 3, Fall 1997, pp. 15-21.
Halbert, Deborah. "Discourses of Danger and the Computer Hacker," The Information Society: An International Journal. Vol. 13, No. 4, 1997, pp. 329-360.
Harrison, Tom. "A Chicken in Every Pot, a Net Link in Every Classroom," Computers and Society, Vol. 27, No. 2, June 1997, pp. 32-34.
Hert, Phillipe. "The Dynamics of Online Interactions in a Scholarly Debate," The Information Society: An International Journal. Vol. 13, No. 4, 1997, pp. 329-360.
Huff, Chuck. "Unintentional Power in the Development of Computer Systems," Computers and Society, Vol. 26, No. 4, December 1996, pp. 6-9.
Huff, Chuck. "The Internet is a Fine Place for Women," Computers and Society, Vol. 27, No. 4, December 1997, p. 27.
Huff, Chuck, et al. "Integrating the Ethical and Social Context of Computing into the Computer Science Curriculum," Science and Engineering Ethics, Vol. 2, No. 2, April 1996. Forthcoming in S. Rogerson and T. W. Bynum. (eds.) Information Ethics: A Reader. Cambridge, MA: Blackwell Publishers, 1998.
Imbo, Samuel. "The Cyberspace Metaphor of Community," in Proceedings of the Conference on Computer Ethics: Philosophical Enquiry. (Edited by Jeroen van den Hoven). Rotterdam, The Netherlands: Erasmus University Press, 1997, pp. 136-146.
Introna, Lucas. "Ethics in the Information Age: Hyperreality and the Future of Obligation," in Proceedings of the Conference on Computer Ethics: Philosophical Enquiry. (Edited by Jeroen van den Hoven). Rotterdam, The Netherlands: Erasmus University Press, 1997, pp. 136-146
Jewett, Tom. "Open Location," Computers and Society, Vol. 26, No. 4, December 1997, pp. 36-38.
Johnson, Deborah G. "Ethics Online," Communications of the ACM. Vol. 40, No. 1, January 1997, pp. 60-65.
Johnson, Deborah G. "Is the Global Information Infrastructure a Democratic Technology?" Computers and Society, Vol. 27, No. 3, September 1997, pp. 20-26.
Katz, James and Philip Aspden. "A Nation of Strangers?" Communications of the ACM, Vol. 40, No. 12, December 1997, pp. 81-86.
Kennedy, Ronan, "Open Location," Computers and Society, Vol. 27, No. 4, December 1997, p. 25.
Kocikowski, Andrzej. "Geography and Computer Ethics: An Eastern European Perspective," Science and Engineering Ethics, Vol. 2, No. 2, April 1996. Forthcoming in S. Rogerson and T. W. Bynum. (eds.) Information Ethics: A Reader. Cambridge, MA: Blackwell Publishers, 1998.
Ladd, John, "Ethics and the Computer World," Computers and Society, Vol. 27, No. 3, September 1997, pp. 8-13.
Lamb, Roberta. Who Uses Information Resources? Interorganizational Incentives for Gathering Data and Going Online," Computers and Society, Vol. 27, No. 4, December 1997, p. 29.
Lynch, William. "Teaching Engineering Ethics in the United States," IEEE Technology and Society Magazine, Vol. 16, No. 4, Winter 1997/1998, pp. 27-36.
Madon, Shirin. "The Information Based Global Economy & Socio-Economic Development: The Case of Bangalore," The Information Society: An International Journal. Vol. 13, No. 3, 1997, pp. 227-244.
Maner, Walter. "Unique Ethical Problems in Information Technology," Science and Engineering Ethics, Vol. 2, No. 2, April 1996. Forthcoming in S. Rogerson and T. W. Bynum. (eds.) Information Ethics: A Reader. Cambridge, MA: Blackwell Publishers, 1998.
Martin, Brennon M. "Competition, Interconnection and Universal Service," CPSR Newsletter, Vol. 15, No. 2, Spring 1997, pp. 5, 6, 8.
Martin, C. Dianne; Huff, Chuck; Gotterbarn, Donald and Keith Miller. "Implementing the Tenth Strand in the CS Curriculum," Communications of the ACM. Vol. 39, No 12, December 1996, pp. 75-84.
Martin, C. Dianne; Reagle, Joseph; Evans, Michael; and Pat Shareck. "An Alternative to Government Regulation and Censorship," Computers and Society, Vol. 26, No. 4, December 1997, pp. 10-14.
Metha, Michael D. and Dwaine Plaza. "Content Analysis of Pornographic Images Available on the Internet," The Information Society: An International Journal. Vol. 13, No. 2, 1997, pp. 153-161.
Mitcham, Carl. "Justifying Public Participation in Technical Decision Making," IEEE Technology and Society Magazine. Vol. 16, No. 1, Spring 1997, pp. 40-46.
Moor, James H. "Towards a Theory of Privacy in the Information Age," Computers and Society, Vol. 27, No. 3, September 1997, pp. 27-32.
Moor, James H. "The Computational Turn," APA Newsletter on Philosophy and Computers, Vol. 97, No. 1, Fall 1997, p.28.
Moor, James H. "Reason, Relativity, and Responsibility in Computer Ethics," Forthcoming in S. Rogerson and T. W. Bynum. (eds.) Information Ethics: A Reader. Cambridge, MA: Blackwell Publishers, 1998.
Mosco, Vincent. Forum: "Myth-ing Links: Power and Community on the Information Highway," The Information Society: An International Journal. Vol. 14, No. 1, 1998, forthcoming.
Mowshowitz, Abbe. "Virtual Organization," Communications of the ACM, Vol. 40, No. 9, September 1997, pp. 30-37.
Mueller, Milton. "Universal Service and the Telecommunication Act: Myth Made Law," Communications of the ACM. Vol. 40, No. 3, March 1997, pp. 39-47.
Neumann, Peter G. "Risks of Anonymity," Communications of the ACM. Vol. 39, No. 12, December 1996, p. 162.
Nissenbaum, Helen. "Can We Protect Privacy in Public?" in Proceedings of the Conference on Computer Ethics: Philosophical Enquiry. (Edited by Jeroen van den Hoven). Rotterdam, The Netherlands: Erasmus University Press, 1997, pp. 147-159.
Nissenbaum, Helen. "Values in the Design of a Computer System," Computers and Society, Forthcoming in Vol. 28, No. 1, March 1998.
Nissenbaum, Helen and D. Walker. "Will Computers Dehumanize Education?" Forthcoming in Technology in Society.
O'Neal, Ray H. "Simulation Culture," Computers and Society, Vol. 27, No. 2, June 1997, p. 35.
Oppenheimer, Todd. "The Computer Delusion," The Atlantic Monthly, July 1997, pp. 45-48, 50-56, 61-62.
O'Riain, Sean. "The Birth of a Celtic Tiger," Communications of the ACM, Vol. 40, No. 3, March 1997, pp. 11-16.
Page, Carl. "Star Wars -- Down but Not Out: Why Star Wars Still Matters," CPSR Newsletter. Vol. 14, No. 3, Fall 1996, pp. 1, 4-10.
Petrazzini, Ben A. and Girijia Krishnaswamy. "Socioeconomic Implications of Telecommunication Liberalization: India and the International Context." The Information Society: An International Journal. Vol. 14, No. 1, 1998, forthcoming.
Poster, Mark. Introduction to "A Magna Carta for the Knowledge Age: Cyberspace and the American Dream," The Information Society: An International Journal. Vol. 12, No. 3, July-September 1996, p. 293. (Three articles that contribute to this "Forum" topic are also included in that issue of TIS, pp. 295-314.)
Preston, David. "Can Business Ethics Really Exist?" Computers and Society, Vol. 27, No. 1, March 1997, pp. 6-9.
Preston, David and Keith Taylor. Professionals and Experts: Adam (Smith) or Eve?" Computers and Society, Vol. 27, No. 2, June 1997, pp. 14-19.
Rapaport, Richard. "Singapore Sting," Forbes ASAP, April 7, 1997, pp. 85-89.
Resnick, Paul and James Miller. "PICS: Internet Access Controls Without Censorship," Communications of the ACM. Vol. 39, No. 10, October 1996, pp. 87-93.
Rindfleisch, Thomas C. "Privacy, Information Technology, and Health Care," Communications of the ACM, Vol. 40, No. 8, August 1997, pp. 92-100.
Robison, Wade. "Privacy and Appropriation," in Proceedings of the Conference on Computer Ethics: Philosophical Enquiry. (Edited by Jeroen van den Hoven). Rotterdam, The Netherlands: Erasmus University Press, 1997, pp. 160-168.
Romm, Celia T. and Nava Pliskin. "Battle of the Sexes on E-Mail - Or is it?" The Information Society: An International Journal. Vol. 13, No. 3, 1997, pp. 207-226.
Samuelson, Pamela. "Legal Protection for Database Contents," Communications of the ACM. Vol. 39, No. 12, December 1996, pp. 17-23.
Soloway, Elliot and Raven Wallace. "Does the Internet Support Student Inquiry," Communications of the ACM, Vol. 40, No. 5, May 1997, pp. 11-16.
Shade, Leslie Regan. "The Information Highway Should be Paved With Public Good..." Computers and Society, Vol. 26, No. 4, December 1997, pp. 31-34.
Shade, Leslie Regan. "A Gendered Perspective on Access to the Information Infrastructure," The Information Society: An International Journal. Vol. 14, No. 1, 1998, forthcoming.
Shallit, Jeffrey and Harriet Lyons. "Social Issues in Canada's Information Society," The Information Society: An International Journal. Vol. 13, No. 2, 1997, pp. 147-151.
Shields, Mark A. "Lost in Cyberspace? Virtual Learning and Higher Education," Social Science Computer Review. Vol. 14, No. 4, Winter 1996, pp. 410-422.
Sipes-Metzler, Paige R. "Are Technology and Ethics Out of Step? Oregon's Experience," IEEE Technology and Society Magazine. Vol. 15, No. 3, Fall 1996, pp. 15-16.
Shneiderman, Ben. "Between Hope and Fear," Communications of the ACM. Vol. 40, No. 2, February 1997, pp. 59-62.
Schneier, Bruce. "Cryptography, Security, and the Future," Communications of the ACM. Vol. 40, No. 1, January 1997, p. 138.
Sojka, Jacek. "Business Ethics and Computer Ethics: The View From Poland," Science and Engineering Ethics, Vol. 2, No. 2, April 1996. Forthcoming in S. Rogerson and T. W. Bynum. (eds.) Information Ethics: A Reader. Cambridge, MA: Blackwell Publishers, 1998.
Sopinka, John. "Freedom of Speech and Privacy in the Information Age," The Information Society: An International Journal. Vol. 13, No. 2, 1997, pp. 171-184.
Spencer, Henry. "Age of Uncontrolled Information Flow," The Information Society: An International Journal. Vol. 13, No. 2, 1997, pp. 163-170.
Tang, Puay. "How Electronic Publishers are Protecting Against Privacy: Doubts about Technical Systems of Protection," The Information Society: An International Journal. Vol. 14, No. 1, 1998, forthcoming.
Tavani, Herman T. "Selecting a Computer Ethics Coursebook: A Comparative Study of Five Recent Works," Computers and Society, Vol. 26, No. 4, December 1996, pp. 15-21.
Tavani, Herman T. "Internet Search Engines and Personal Privacy," in Proceedings of the Conference on Computer Ethics: Philosophical Enquiry. (Edited by Jeroen van den Hoven). Rotterdam, The Netherlands: Erasmus University Press, 1997, pp. 169-178.
Tavani, Herman T. "Journals and Periodicals on Computers, Ethics, and Society: A Comparative Review of Six Publications," Computers and Society, Vol. 27, No. 2, June 1997, pp. 20-26.
Tavani, Herman T. "Journals and Periodicals on Computers, Ethics, and Society II:: Fifty Publications of Interest," Computers and Society, Vol. 27, No. 3, September 1997, pp. 39-43.
Thajchayapong, Pairash, et al. "Social Equity and Prosperity: Thailand IT Policy into the 21st Century," The Information Society: An International Journal. Vol. 13, No. 3, 1997, pp. 265-286.
Turkle, Sherry. "Seeing Through Computers: Education in a Culture of Simulation," The American Prospect, No. 41, March-April, 1997, pp. 76-82.
Watters, Carolyn; Conley, Marshall; and Cynthia Alexander. "The Digital Agora: Using Technology for Learning in the Social Sciences," Communications of the ACM, Vol. 41, No. 1, January 1998, pp. 51-57.
van den Hoven, Jeroen, "Privacy and the Varieties of Moral Wrong-Doing in the Information Age," Computers and Society, Vol. 27, No. 3, September 1997, pp. 33-37.
Walsh, John P. and Todd Bayma. "The Virtual College: Computer-Mediated Communication and Scientific Work," The Information Society: An International Journal. Vol. 12, No. 4, 1996, pp. 343-361.
Waskul, Dennis and Mark Douglass. "Cyberself: The Emergence of Self in Online Chat." The Information Society: An International Journal. Vol. 13, No. 4, 1997, pp. 375-398.
Weckert, John. "Intelligent Machines, Dehumanisation and Professional Responsibility," in Proceedings of the Conference on Computer Ethics: Philosophical Enquiry. (Edited by Jeroen van den Hoven). Rotterdam, The Netherlands: Erasmus University Press, 1997, pp. 179-192.
Weston, Jay. "Old Freedoms and New Technologies: The Evolution of Community Networking," The Information Society: An International Journal. Vol. 13, No. 2, 1997, pp. 1195-201.
Wigand, Rolf. "electronic Commerce: Public Policy Issues in a Communication Deregulated Environment," The Information Society: An International Journal. Vol. 13, No. 1, 1997, pp. 1-16.
Wilkinson, Margaret Ann. "Perceptual Differences in Approaches to Censorship: Information Intermediaries and the Implementation of Law," The Information Society: An International Journal. Vol. 13, No. 2, 1997, pp. 185-193.
Winner, Langdon. "The Culture of Technology," Technology Review. Vol. 100, No. 2, February/March 1997, p. 69.
Winner, Langdon. "Cyberlibertarian Myths and the Prospects for Community," Computers and Society, Vol. 27, No. 3, September 1997, pp. 14-19.
Wresch, William. "Haves and Have-Nots in the Information Age," EDUCOM Review, January/February 1997, pp. 52-59.
Wright, Marie and John Kakalik. "The Erosion of Privacy," Computers and Society, Vol. 27, No. 4, December 1997, pp. 22-26.
Wynn, Eleanor and James Katz. "Hyperbole Over Cyberspace: Self-Preservation and Social Boundaries in Internet Home Pages and Discourse," The Information Society: An International Journal. Vol. 13, No. 4, 1997, pp. 297-328.
Zelweitro, Joseph P. "The Politicization of Environmental Organizations Through the Internet," The Information Society: An International Journal. Vol. 14, No. 1, 1998, forthcoming.