Consequences of Computing:
A Framework for Teaching

References - Page 34 of 36

REFERENCES

  • 1) ACM Curriculum Committee on Computer Science. Curriculum 78: Recommendations for the undergraduate program in computer science. Communications of the ACM, 22(3):147-166. March 1979.
  • 2) ACM SIGCHI Curriculum Development Group. ACM SIGCHI Curricula for Human-Computer Interaction. Association for Computing Machinery, New York, NY. 1992.
  • 3) Adler, P. A., Parsons, C. K., & Zolke, S. B. Employee Privacy: Legal and research developments and implications for personell administration. Sloan Management Review, 13-21. Winter, 1985.
  • 4) Allen, J. Groupware and social reality. Computers and Society, 22:24-28. 1993
  • 5) Anderson, R. E., Lundmark, V., Harris, L., & Magnan, S. Equity in computing. In C. W. Huff and T. Finholt, (Eds.) Social issues in Computing: Putting Computing in its place. (pp. 352 - 385). New York, NY: McGraw-Hill. 1994.
  • 6) Borenstein, N. S. Programming as if People Mattered. Princeton, NJ: Princeton University Press. 1991.
  • 7) Bynum, T. W. & Maner, W. (Eds.). Proceedings of the National Conference on Computing and Values, 1991, New Haven, CT. 1991.
  • 8) Bynum, T.W. (Ed.).Computers and Ethics. special issue of Metaphilosophy, 16(4). October, 1985.
  • 9) Clement, A. Considering Privacy in the Development of Multi-media Communications. Computer Supported Cooperative Work, 2:67-88. 1994
  • 10) Collins, R., & Miller, K. Paramedic ethics for computer professionals. Journal of Systems and Software, 1 - 20. January, 1992.
  • 11) Computer Sciences Accreditation Board. Criteria for accrediting programs in computer science in the United States. Technical report. January, 1987.
  • 12) Denning, P.J., Comer, D.E., Greis, D., Mulder, M.C., Tucker, A.B., Turner, A.J., and Young, P.R. Computing as a discipline. Commun.ication of the ACM. 32(1):9-23. January, 1989.
  • 13) Denning, D. Clipper Chip will Reinforce Privacy. Insight. 18-20. Oct, 24, 1994.
  • 14) Ermann, M.D., Williams, M.B., and Gutierrez, C. Computers, Ethics, and Society. New York, NY: Oxford University Press. 1990.
  • 15) Friedman, B. & Winograd, T. (Eds.) . Computing and Social Responsibility: A Collection of Course Syllabi. Palo Alto, CA: Computer Professionals for Social Responsibility. 1990.
  • 16) Gibbs, N.E. and Tucker, A.B. Model curriculum for a liberal arts degree in computer science. Commun.ications of theACM. 29(3):202-210. March, 1986.
  • 17) Gotterbarn, D. A Tool Kit of Computer Ethics Activities for computer science classes. Proceedings of National Educational Computing Conference, Baltimore, MD. 1995.
  • 18) Gotterbarn, D. Responsibility Regained. In Johnson, D. G. & Nissenbaum, H. (Eds.) Computer Ethics and Social Values. (pp. 18-24) Englewood Cliffs, NJ: Prentice Hall. 1995
  • 19) Gotterbarn, D. (1990). The capstone course in computer ethics. Proceedings of the National Conference on Computing and Values, New Haven, CT. 1991
  • 20) Hativa, N., Lesgold, A. & Swissa, S. (1993). Competition in individualized CAI. Instructional Science, 21, 393-428.
  • 21) Hiltz, S. R., & Turoff, M. The Network Nation: Human Communication via Computer. Reading, MA: Addison-Wesley. 1978.
  • 22) Huff, C.W. and Finholt, T. Social issues in Computing: Putting Computing in its place. New York, NY: McGraw-Hill. 1994.
  • 23) Huff, C.W., and Jawer, B. Toward a Design Ethic for Computing Professionals. In C.W. Huff and T. Finholt (Eds.) Social Issues in Computing, (691-713) New York, NY: McGraw-Hill. 1994.
  • 24) Huff. C. W., Fleming, J. F., & Cooper, J. The social basis of gender differences in human-computer interaction. In C.D. Martin (Ed.). In search of Gender-free paradigms for computer science education. (19-32). Eugene OR: ISTE Research Monographs. 1991
  • 25) Jacky, J. (). Safety-Critical Computing: Hazards, Practices, Standards, Regulations. In Kling, R., and Dunlop, C. (1991). Computerization and Controversy: Value Conflicts and Social Choices. (pp. 612-631). New York, NY: Academic Press. September-October, 1989.
  • 26) Johnson, D. G. Computer Ethics. Englewood Cliffs, NJ: Prentice Hall. 1994.
  • 27) Johnson, D. G., & Nissenbaum, H. (Eds.) Computer Ethics and Social Values. Englewood Cliffs, NJ: Prentice Hall. 1995.
  • 28) Kiesler, S., & Finholt, T. The mystery of RSI. American Psychologist, 43:1004-15. 1988.
  • 29) Kling, R. Value conflicts in EFT systems. In Kling, R., and Dunlop, C. (Eds.) Computerization and Controversy: Value Conflicts and Social Choices (421-435). New York, NY: Academic Press. 1991.
  • 30) Kling, R. Organizational analysis in computer science. The Information Society, 9(2):71-87. March-June, 1993.
  • 31) Kling, R., and Dunlop, C. Computerization and Controversy: Value Conflicts and Social Choices. New York, NY: Academic Press, 1991.
  • 32) Kraemer, K., Dickhoven, S., Fallows-Tierney, S. & King, J. L. Datawars: The politics of modeling in federal policymaking. New York: Columbia University Press. 1985.
  • 33) Kramarae, C. (Ed.). Technology and WomenÕs Voices: Keeping in Touch. New York: Routledge & Kegan Paul. 1988.
  • 34) Kraut, R. E. Predicting the use of technology: the case of telework. In R. Kraut (Ed.). Technology and the transformation of white collar work. (113-133) Hillsdale, NJ: Lawrence Erlbaum. (1987).
  • 35) Ladd, J. Computers and Moral Responsibility: A Framework for Ethical Analysis. In C.Gould (Ed.) The Information Web: Ethical and Social Implications of Computer Networking, (207-227), Boulder, CO: Westview Press. 1989.
  • 36) Martin, C. D. and Holz, H. J. Non-Apologetic Computer Ethics Education: A Strategy for Integrating Social Impact and Ethics into the CS Curriculum. Proceedings of the National Conference on Computing and Values, 1991, New Haven, CT. 1991.
  • 37) McLean, G. F. Integrating ethics and design. IEEE Technology and Society Magazine, 19-30. Fall, 1993.
  • 38) Miller, K. Computer ethics in the curriculum. Computer Science Education, 1, 37-52. 1988.
  • 39) Nissenbaum, H. Computing and accountability. In Johnson, D. G. & Nissenbaum, H. (Eds.) Computer Ethics and Social Values. (526-538). Englewood Cliffs, NJ: Prentice Hall. 1995.
  • 40) Parker, D. B., Swope, S. Baker, B. N., Weiss, E. A. Self-assessment procedure XXII.:Ethical values in computer professions Communications of the ACM. (33)11 :110-133. 1990.
  • 41) Parnas, D. L. Computers in Weapons: The Limits of Confidence. In David Bellin & Gary Chapman (eds.). Computers in BattleÑWill They Work? (209-231). New York: Harcourt Brace Jovanovich. 1987.
  • 42) Perrolle, J.A. Computers and Social Change: Information, Property, and Power. Belmont, CA: Wadsworth, 1987.
  • 43) Project EASI (Equal Access to Software for Instruction). Computers and Students with Disabilities: New Challenges for Higher Education. In C.W. Huff and T. Finholt (Eds.) Social Issues in Computing, (399-412) New York, NY: McGraw-Hill, 1994.
  • 44) Reason, J. Human Error. New York: Cambridge University Press. 1990.
  • 45) Rosenberg, R.S. The Social Impact of Computers. New York, NY: Academic Press. 1992.
  • 46) Rotenberg, Marc. Wiretapping Bill: Costly and Intrusive. Insight. (Oct, 24, 1994):20-22.
  • 47) Shneiderman, B. Designing the user interface. Reading, MA: Addison-Wesley. 1992.
  • 48) Shneiderman, B. Human Values and the Future of Technology: A Declaration of Empowerment. Computers & Society, 20(3):1-6. October, 1990.
  • 49) Sproull, L.S., & Kiesler, S.B. Computers, networks, and work. Scientific American, 265(3):116-23. 1991.
  • 50) Steele, F. R. Planning a global human cyberspace: The second NCLS conference on legal, ethical, and technological aspects of computer use and abuse. Washington, DC :AAAS conference report. 1995.
  • 51) Suchman, L. A. Plans and situated actions: the problem of human-machine communication. Cambridge: Cambridge University Press. 1987.
  • 52) Swinyard, W.R., Rinne, H. & Keng Kau, A. The morality of software piracy: a cross-cultural analysis. Journal of Business Ethics, 9(8):655-664. August, 1990.
  • 53) Turner, J. Computing Curricula 1991: A summary of the ACM/IEEE Joint Curriculum Task Force Report. Communnications of the ACM. 34(6)69-84. June, 1991.
  • 54) Vanderheiden, G. C. Curbcuts and computers: providing access to computers and information systems for disabled individuals. Discovery83: Computers for the Disabled Conference Papers. University of Wisconsin-Stout. 1984.
  • 55) Wagner, I. A Web of Fuzzy Problems: Confronting the Ethical Issues. Communications of the ACM. 36(4):94-101. 1993.
  • 56) Weiner, N. The human use of human beings. New York: Avon. 1967.
  • 57) Weizenbaum, J.Computer power and human reason: From judgment to calculation. San Franscisco: W. H. Freeman. 1976.
  • 58) Winograd, T., & Flores, F. Understanding computers and cognition. Norwood, NJ: Ablex Publishing. 1986.