Addendum: Selected Books and Articles

Editor:Herman Tavani
Maintained by: David Vance
CPSR Copyright © 1996


[Introduction] [Bibliography Main Page] [I.S.Ethics Main Page]
[SELECTED BOOKS] [SELECTED ARTICLES] [PROCEEDINGS of CONFERENCES and SYMPOSIA]
Update On this page we list over hundreds new books and selected articles published since the original bibliography of Ethics and Social Responsibility was printed. We hope the reader will find this a valuable addition


1.0 Selected books.

Agre, Philip E. and Marc Rotenberg, eds.  Technology and Privacy: The New Landscape. Cambridge, MA: MIT Press, 1997; 280 pages. ISBN 0-262-01162-X. Includes ten essays that examine technical, economical, and political aspects of privacy in the U.S., Canada, and Europe. Though not necessarily intended for use as a course text, the anthology can be used as a supplementary text in either an upper-level undergraduate or a graduate course in which a significant portion is devoted to issues in technology and privacy.

Anderson, James G., and Kenneth W. Goodman. Ethics and Information Technology. New York: Springer-Verlag, 2001; 280 pages. ISBN: 0387953086. Organized into seven chapters: "1. Introduction: Case Studies in Ethics and Health Informatics," "2. The Business of Cyber Health Care," "3. Contents Consumer Health Information: Let the Viewer Beware (Caveat Viewor)," "4. Privacy and Confidentiality," "5. The Challenge of Bioinformatics," "6 Evaluation: An Imperative to Do No Harm," and "7. Online Challenges for Human Subjects Research." Also included are seven appendixes: "Appendix 1: HON Code of Conduct (HONcode) for Medical and Health Web Sites," "Appendix 2. eHealth Code of Ethics," "Appendix 3. TRUSTe's Consumer Privacy Protection Guidelines," "Appendix 4. TRUSTe Model Privacy Statement," "Appendix 5. Health Internet Ethics: Ethical Principles For Offering Internet Health Services to Consumers," "Appendix 6. Criteria for Assessing the Quality of Health Information on the Internet," and "Appendix 7. Principles Governing AMA Publications Web Sites."

Baase, Sara. A Gift of Fire: Social, Legal, and Ethical Issues in Computing. 2nd ed. Upper Saddle River, NJ: Prentice Hall, 2003; 464 pages. ISBN: 0-13-008215-5. Organized into ten chapters: "1. Unwrapping the Gift," "2. Privacy and Personal Information," "3. Encryption and Interception of Communications," "4. Can We Trust the Computer? " "5. Freedom of Speech in Cyberspace," "6. Intellectual Property," "7. Computer Crime," "8. Computers and Work," "9. Broader Issues on the Impact and Control of Computers," and "10. Professional Ethics and Responsibilities. " Also includes an epilogue and an appendix entitled "The Software Engineering Code and the ACM Code."

Baase, Sara.  A Gift of Fire: Social, Legal and Ethical Issues in Computing. Upper Saddle River, NJ: Prentice Hall, 1997; 382 pages. ISBN 0-13-358779-0. Organized into ten chapters with the following titles: "Unwrapping the Gift," "Privacy and Information," Wiretapping and Encryption," "Can We Trust the Computer?," "Protecting Software and Other intellectual Property," "Constitutional and Related Issues," "Computer Crime," "Computers and Work," "Broader Issues on the Impact and Control of Computers," and "Issues of Professional Ethics and Responsibilities."

Baird, Robert M., Reagan Ramsower, and Stuart E. Rosenbaum, eds. Cyberethics: Social and Moral Issues in the Computer Age. Amherst, NY: Prometheus Books, 2000; 355 pages. ISBN: 1-57392-790-2. Includes twenty-six readings organized into five main parts: "Part One: The Moral Landscape in Cyberspace," "Part Two: Anonymity in Cyberspace," "Part Three: Privacy in Cyberspace," "Part IV: Property Ownership in Cyberspace," and "Part V: Communities, Citizenship, and Democracies."

Bell, David and Barbara Kennedy, eds. The Cybercultures Reader. New York: Routledge, 2000; 768 pages. ISBN: 0415-18379. Includes forty-eight readings organized into seven main parts: "Part One: Approaching Cyberculture," "Part Two: Popular Cybercultures," "Part Three: Cybersubcultures," "Part Four: Cyberfeminisms, " "Part Five: Cybersexual," "Part Six: Cyberbodies," and "Part Seven: "Post - (cyber) bodies."

Bell, Trudy E., Dave Dooling, and Janie Fouke. Envisioning Tomorrow: Technology Experts Envision the Next Century. New York: IEEE Press, 2000; 3000 pages. Organized into twelve chapters: "1: Threshold of the New Millenium," "2: Structures and Devices," "3: Systems and Management," "4: Computers and Software," "5: Communications," "6: Entertainment," "7: Medicine and Biology," "8: Transportation ," "9: Exploration," "10: The Environment," "11: War and Peace," and "12: Preparing the World for Tomorrow."

Bergeron, Bryan. Dark Ages II: When the Digital Data Die. Upper-Saddle River, NJ: Prentice Hall, 2002; 306 pages. ISBN: 0-13-066107-4. Includes nine chapters organized into five main parts: "Part One: History," "Part II: Technology," "Part III: Economy," "Part IV: Society," and "Part V: Solutions." Also includes a bibliography.

Biegel, Stuart. Beyond Our Control? Controlling the Limits of Our Legal System in the Age of Cyberspace. Cambridge, MA: MIT Press, 2002; 468 pages. ISBN: 0-262-02504-3. Organized into twelve chapters: "1 Controlling the Internet: Is Anyone in Charge?" "2. Just How Different Is Cyberspace?" "3. Is There Really a Problem Here? Sorting Out Categories of Allegedly Problematic Conduct," "4. The Inherent Limits of Our Legal System," "5. The Traditional Regulation Model: Applying Existing Rules and Developing New Legal Frameworks at the Individual Country Level," "6. International Models of Agreement and Cooperation," "7. Changing the Architecture of the Internet: Code-Based Regulation and Its Implications," "8. Charting a Roadmap for Prospective Regulation," "9. Combating Dangerous Conduct in Cyberspace: A Focus on Cyberterrorism," "10. Combating Fraudulent Conduct in Cyberspace: A Focus on Consumer Rights," "11. Coming to Terms with Unlawful Anarchic Conduct in Cyberspace: A Focus on Private Digital Copying by the Average Netizen," and "12 Confronting Inappropriate Conduct in Cyberspace: Online Hate and the Inherent Limits of the Law."

Bijker, Wiebe.  Of Bicycles, Bakelites, and Bulbs: Toward a Theory of Sociotechnical Change. Cambridge, MA: MIT Press, 1997; 380 pages. ISBN 0-262-52227-6. Organized into five main sections: "Introduction," "King of the Road: The Social Construction of Safety," "The Fourth Kingdom: The Social Construction of the Bakelites," "The Majestic Daylight: The Social Construction of Fluorescent Lighting," and "Conclusion: The Politics of Sociotechnical Change."

Bolt, David B. and Ray Crawford. Digital Divide: Computers and Our Children's Future. TV Brooks, L. L. C, 2000; 207 pages. ISBN: 1575000865. Organized into four main chapters: "1. Teaching Our Children Well," "2. The Future of Work," "3. The Gender Gap," and "4. The World White Web." Also includes an introduction, a conclusion, and appendices, as well as a section entitled "Experts Interviewed for Digital Divide."

Borgman, Christine L. From Gutenberg to the Global Information Infrastructure: Access to Information in the Networked World. Cambridge, MA: MIT Press, 2000; 340 pages. ISBN: 0-262-02473-X. Organized into nine chapters: "1: The Premise and the Promise of the Global Information Infrastructure," "2: Is it Digital or is it a Library? Digital Libraries and Information Infrastructure," "3: Access to Information," "4: Books, Bytes, and Behavior," "5: Why are Digital Libraries Hard to Use?" "6: Making Digital Libraries Easier to Use," "7: Whither, or Wither, Libraries?" "8: Acting Locally, Thinking Globally," and "9: Toward a Global Digital Library: Progress and Prospects."

Borsook, Paulina. Cyberselfish: A Critical Romp Through the Terribly Libertarian Culture of High-Tech. New York: Public Affairs, 2000; 267 pages. ISBN: 1-891629-78-9. Organized into six chapters: "1. Bionomics in Your Daily Life," "2. The Crypto Wars: Cypherpunks, Digital Cash, and Anarcho-Capitalism Oh My," "3. Wired: Guiding the Perplexed," "4. Cybergenerous," "5. But How Did This Happen?" and "6. The Thrilling Conclusion."

Bowyer, Kevin W., ed. Ethics and Computing: Living Responsibly in a Computerized World. 2nd edn. New York: IEEE Press, 2001; 431 pages. ISBN: 0-7803-6019-2. Organized into eleven chapters: "Chapter 1: Getting Started," "Chapter 2: Critical-Thinking Skills," "Chapter 3: Professional Codes of Ethics," "Chapter 4: "Cracking' and Computer Security," "Chapter 5: Encryption, Law, and Privacy," "Chapter 6: Computers in Safety-Critical Systems," "Chapter 7: Whistle Blowing," "Chapter 8: Intellectual Property Issues," "Chapter 9: Environmental and Health Concerns," "Chapter 10: Striving for Fairness," and "Chapter 11: Managing Your Career." Also included are three appendixes: "Appendix A: Notes for the Instructor," "Appendix B: Codes of Ethics," and "Appendix C: Pointers to Additional Resources."

Brown, John Seely, and Paul Dugurd. The Social Life of Information. Boston, MA: Harvard Business School Press, 2002; 330 pages. ISBN: 1-57851-708-7. Organized into eight chapters: "1. Limits to Information," "2. Agents and Angels," "3. Home Alone," "4. Practice Makes Process," "5. Learning?n Theory and in Practice," "6. Innovating Organization, Husbanding Knowledge" "7. Reading the Background," and "8. Re-education." A bibliography is also included.

Buchanan, Elizabeth A., ed. Readings in Virtual Research Ethics: Issues and Controversies. Hershey, PA: Idea Group Publishers, 2004; 350 pages. ISBN: 1592401526. Includes nineteen readings organized into five parts: "Part One: Foundations of Virtual Research Ethics," "Part Two: Media, Messages, and Ethics," "Part Three: Researcher/Researched? Research Ethics in Practice," "Part Four: Online Research with Minors: Special Considerations?" and "Part Five: A Call to Researchers."

Bynum, Terrell Ward and James H. Moor, eds.  The Digital Phoenix: How Computers are Changing Philosophy. Cambridge, MA: Blackwell Publishers, 1998; 256 pages. ISBN 0-631-20352-4. A collection of articles describing the impact of computing on philosophy -- including computing used as: a tool, a model, and a subject matter. Though not specifically intended as a coursebook, the collection of readings can be used as a supplementary text in a course in Computers and Philosophy.

Bynum, Terrell Ward, and Simon Rogerson. Computer Ethics and Professional Responsibility: Introductory Text and Readings. Oxford: Blackwell, 2004; 384 pages. ISBN: 185548453. A text with readings, organized into four main parts: "Part I: What Is Computer Ethics?" "Part II: Professional Responsibility," "Part III: Codes of Ethics" and " Part IV: Sample Topics in Computer Ethics." Part IV is further subdivided into five sub-parts: "Part IVa: Computer Security," "Part IVb: Privacy and Computing," "Part IVc: Computing and Intellectual Property," "Part IVd: Global Information Ethics" and "Part IVe: A Final Case to Analyze." Six codes of ethics are included in an appendix to Part III: "A. The Software Engineering Code of Ethics," "B. The ACM Code of Ethics and Professional Conduct," "C. The ACS Code of Ethics," "D. The BCS Code of Conduct," "E. The IEEE Code of Ethics," and "F. The IMIS Code of Ethics." Also included is a bibliography.

Bynum, Terrell Ward.  Information Ethics: An Introduction. Cambridge, MA: Blackwell Publishers, 1998. ISBN 185-554-8062. A textbook organized into ten chapters: "The Computer Revolution," "The Tools of Ethical Analysis," "Professional Responsibility," "Ethics in Project Management," "Computers and Security," "Computers and Privacy," "CyberBusiness," "Ownership of Intellectual Property," "Computers in the Workplace," and "Global Information Ethics."

Camp, L. Jean. Trust and Risk in Internet Commerce. Cambridge, MA: MIT Press, 2000; 279 pages. ISBN: 0-262-03271-6. Organized into twelve chapters: "1: The Internet," "2: Money," "3: Basic Cryptography," "4: Security Goals," "5: Key Management is Trust Management," "6: Privacy Perspectives," "7: Privacy in Law, Privacy in Practice," "8: Data Reporting: Trusting the Government," "9: Transactions," "10: Examination of Internet Commerce Systems," "11: Internet Currencies," and "12: The Coming Collapse in Internet Commerce."

Collste, Goran, ed. Ethics in the Age of Information Technology. Linkoping, Sweden: Linkopings Umiversitet Centre for Applied Ethics, 2000; 319 pages. ISBN: 91-7219-680-7. Includes twenty readings organized into five main parts: "1. The History and Future of Computer Ethics," "2 Information Technology and Human Values," "3. Internet-ethics," "4. Information Technology and Society," and "5. Information Technology and Professional Ethics."

Compaine, Benjamin M. The Digital Divide: Facing a Crisis or Creating a Myth. Cambridge, MA: MIT Press, 2002; 340 pages. ISBN: 0-262-53193-3. Includes twenty chapters organized into five main parts: "I. The Set-Up: Documenters of the Digital Divide," "II The Context: Background and Texture," " III: The Advocates: Raising the Stakes," "IV Reality Check: Tracking a Moving Target in High-Tech Time," and "V. What's It All Mean?" Also includes an epilogue.

Compaine, Benjamin M. and Shane Greenstein, eds. Communications Policy in Transition: The Internet and Beyond. Cambridge, MA: MIT Press, 2002; 440 pages. ISBN: 0-262-03292-9. Includes fifteen chapters organized into five main parts: "I. Differing Regulatory Treatment of Access Modes," "II. Internet Architecture Design in a Competitive Era," "III. Dilemmas in Development of Communications Infrastructure," "IV. The End of the Digital Divide?" and "V Information Policy and Commercial Internet Behavior."

Corrrea, Carlos Maria. Intellectual Property Rights, the WTO and Developing Countries: The TRIPS Agreement and Policy Options. New York: Zed Books, 2000; 96 pages. ISBN: 1856497372. Organized into seven chapters: "Ch. I: General Context," "Ch. II: Implications for Developing Countries," "Ch. III: Implementing the Trips Agreement in the Patent Field: Options for the Developing Countries," "Ch. IV: Changing National Laws: The Case of Latin America and the Caribbean," "Ch. V: Intellectual Property Rights and Information Technologies," "Ch. VI: Access to Plant Genetic Resources and Intellectual Property Rights," and "Ch. VII: Upcoming Review of the Trips Agreement." Also included are a foreword, a section on "Acronyms and Abbreviations," and an appendix on "Options for Implementing the Trips Agreement in Developing Countries."

Coyle, Karen.  Coyle's Information Highway Handbook: A Practical File on the New Information Order. Chicago, IL: American Library Association, 1997; 297 pages. The work is organized into the following topical areas: "The New Information Society," "The Promise of the Information Highway," "Stakeholders and the Information Marketplace," "Copyright in the Digital Age," "Privacy and Intellectual Freedom in the Digital Age," "Censors Take On the Net," and "Accessing the Digital Universe."

Cranor, Lorrie Faith, and Shane Greenstein, eds. Communication Policy and Information Technology: Promises, Problems, Prospect. Cambridge, MA: MIT Press, 2002; 480 pages. ISBN: 0-262-03300-3. A collection of readings whose topics include Internet regulation, electronic voting, monopoly and competition in communications markets, the future of wireless communications, and universal service.

Cutcliffe, Stephen H. Ideas, Machines, and Values: An Introduction to Science, Technology, and Society Studies. New York: Rowman and Littlefield, 2000: 224 pages. ISBN: 0-7425-0067-5. Organized into the following sections: "The Historical Emergence of STS as an Academic Field," "Societal Contextualization in the Philosophy, Sociology, and History of Science and Technology," Interdisciplinarity and the Current State of STS," "STS Programs, Institutions, and Journals" and "Why Do STS, or Where Do We Go from Here." Also includes bibliography.

Cutcliffe, Stephen H. and Carl Mitcham, eds. Visions of STS: Counterpoints in Science, Technology, and Society. Albany, New York: State University of New York Press, 2001; 169 pages. ISBN: 0-791-44846-0. Includes ten readings organized into three main parts: "Part I: General Perspectives," "Part II: Applications," and "Part III: Critique." Also includes an introduction and a bibliography.

De George, Richard T. Ethics of Information Technology and Business. Blackwell Publishers, 2003; 256 pages. ISBN: 0631214259. Organized into seven chapters: "1. Ethics and the Information Revolution," "2. Marketing, Privacy and the Protection of Personal Information, " "3. Employee and Communication Privacy," "4. New, Intellectual and Other Property," "5. Ethical Issues in Information Technology Business and in E-Business, " "6. Ethical Issues on the Internet," and "7. Information Technology and Society ?Business, the Digital Divide, and the Changing Nature of Work."

Denning, Dorothy and  Peter Denning, eds.  Internet Besieged: Countering Cyberspace Scofflaws. New York, NY: ACM Press, 1998; 500 pages. ISBN 0-201-30820-7. Organized into thirty chapters, this text examines social, legal, ethical, and political implications of internet security breaches. Different kinds of network security risks are addressed, and accounts of actual security mishaps are provided. Also considered are aspects of the cyberpunk culture and the ethics (or nonethics) of hacker break-ins.

Denning, Peter and  Bob Metcalfe, eds. Beyond Calculation: The Next 50 Years of Computing. New York, NY: ACM Press, 1997; 350 pages. Contains twenty essays that contemplate the future of computing and suggest ways in which information technology will evolve and affect society. Essays are contributed by Sherry Turkle, Gordon Bell, Donald Norman, and other notable figures in the field.

Dreyfus, Hubert. On the Internet: Thinking in Action. New York: Routledge Press, 2001; 136 pages. ISBN: 0415228077. Organized into four chapters: "1. The Hype About Hyperlinks," "2. How Far is Distance Learning from Education?" "3. Disembodied Telepresence and the Remoteness of the Real," and "4. Nihilism on the Information Highway: Anonymity vs. Commitment in the Present Age." Also included are an introduction and conclusion.

Dyson, Esther.  Release 2.0: A Design for Living in the Digital Age. New York, NY: Broadway Books, 1997; 307 pages. ISBN 0-7679-0011-1. Organized into eleven chapters: "Communities," "Work," "Education," "Governance," "Intellectual Property," "Content Control," "Privacy," "Anonymity," "Security," and "A Design for Living."

Easton, Thomas A., ed. Taking Sides: Clashing Issues in Science, Technology, and Society. 5th edn. New York: McGraw-Hill/Dushkin, 2002. ISBN: 0-07-24826-8. Includes thirty-six essays on eighteen controversial issues, which are organized into six main parts: "Part 1. The Place of Science and Technology in Society," "Part 2. The Environment," "Part 3. Health," "Part 4. Space," "Part 5. The Computer Revolution," and "Part 6. Ethics."

Edgar, Stacey L.  Morality and Machines. Perspectives on Computer Ethics. Sudbury, MA: Jones and Bartlett Publishers, 1997; 448 pages. ISBN 0-7637-0184-X. Organized into two main parts -- Part One: Ethical Foundations and Part Two: Ethics Applied to a Computerized World -- with twelve chapters: "Ethical Decision Making," "Is Ethics Possible?" "The Search for a Basis for Ethics," "Software Piracy, Property, and Protection," "Computer Crime," "Computer Intruders, Viruses, and All That," "Privacy," "Errors and Reliability," "The Computer World of Work," "Responsibility, Liability, and Professional Ethics," "Computers, the Government, and the Military," and ".

Epstein, Richard G.  The Case of the Killer Robot: Stories About the Professional, Ethical, and Societal Dimensions of Computing. NY: John Wiley & Sons, 1997; 242 pages. ISBN: 0-471-13823-1. An alternative style coursebook that is organized into an "Inner Book," which is fictional, and an "Outer Book," which is completely factual. The inner book includes twenty-nine stories which are in turn organized into two parts -- "Part One: Print Media" and "Part Two: Broadcast Media." The outer book also includes four appendices, one of which contains useful bibliographic resources.

Ermann, M. David; Williams, Mary B.; and  Michele S. Shauf, eds.  Computers, Ethics, and Society. 2nd ed. NY: Oxford University Press, 1997; 384 pages. ISBN: 019510756X. Includes thirty-five readings organized into four main parts: "Computers in an Ethical Framework," "Computers and the Personal Life," "Computers and the Just Society," and "Computing Professionals and Their Ethical Responsibilities." )

Ess, Charles, ed. Culture, Technology, Communication: Towards an Intercultural Global Village. Albany, New York: State University of New York Press, 2001; 355 pages. ISBN: 0-7914-5016-3. Includes eleven readings organized into three main parts: "Part I: Theoretical Approaches: Postmodernism, Habermas, Luhmann, Hofstede," "Part II: Theory/Praxis," and "Part III: Cultural Collisions and Creative Interferences on the (Silk) Road to the Global Village: India and Thailand." Also includes an editor's introduction and a foreword by Susan Herring.

Evan, William M., and Mark Manion. Making the Machines: Preventing Technological Disasters. Upper Saddle, River: Prentice Hall, 2002; 485 pages. ISBN: 0-13-0656-46-1. Includes fourteen chapters organized into five parts: "Part I: Introduction," "Part II: The Prevalence of Technological Disasters," "Part III: Technological Disasters Since the Industrial Revolution," "Part IV: Analysis of Case Studies of Technological Disasters," and "Part V: Strategic Responses to Technological Disasters."

Garfinkel, Simpson. Database Nation: The Death of Privacy in the 21st Century. New York, O'Reily & Associates, 2000; 312 pages. ISBN: 1565926536. Organized into eleven chapters: "1: Privacy Under Attack," "2: Database Nation," "3: Absolute Identification," "4: What Did You Do Today?" "5: The View From Above," "6: To Know Your Future," "7: Buy Now," "8: Who Owns Your Information?" "9: Kooks and Terrorists," "10: Excuse Me, But Are You Human?" "11: Privacy Now." An annotated bibliography is also included.

Georges, Thomas M. Digital Soul: Intelligent Machines and Human Values. Boulder, CO: Westview Press, 2003; 285 pages. ISBN 0-8133-4057-8. Organized into twenty-two chapters: "1. Artificial intelligence ?That? the Fake Kind, Right?" "2. What Makes Computers So Smart?" "3. What Do You Mean, Smarter Than Us?" "4. Machines Who Think," "5. Let the Androids Do It?" "6. "What Is Intelligence?" "7. What is Consciousness?" "8. Can Computers Have Emotions?" "9. Can Your PC Become Neurotic?" "10. The Moral Mind," "11. Moral Problems With Intelligent Artifacts?" "12. The Moral Machine," "13 Global Network to Global Mind," "14. Will Machines Take Over?" "15. Why Not Just Pull the Plug?" "16. Cultures in Collision," "17. Beyond Human Dignity," "18. Extinction or Immortality," "19. The Enemy Within," "20 Electronic Democracy," "21. Rethinking the Covenant Between Science and Society," and "22. What About God?"

Girasa, Roy J. Cyberlaw: National and International Perspectives. Upper Saddle River, NJ: Prentice Hall, 2001; 433 pages. ISBN: 0-13-065564-3. Includes thirteen chapters organized into four main parts: "Part I: Introduction and Jurisdiction," "Part II: Intellectual Property Rights," "Part III: Privacy and Security Issues," and "Part IV: Antitrust, Securities Regulation, and Taxation." Also includes three appendices: one on cases, another on selected bibliography resources, and a third on Web sites.

Green, Eileen and Adison Adam, eds. Virtual Gender: Technology, Consumption, and Identity. New York: Routledge; 2001; 330 pages. ISBN: 0-415-23315-1. Includes sixteen readings organized into four main parts: "Part I: Gendered Acess and Experience of ICTs and the Internet," "Part II: Leisure, Pleasure, and Consumption," "Part III: Citizens at Work and in the Community," and "Part IV: Identity and Self: Gendered Play, Virtual Reality, and Cyborgization."

Gunkel, Eileen. Hacking Cyberspace. Boulder, CO: Westview Press, 2001; 239 pages. ISBN: 0-8133-3699-4. Organized into six main chapters: "1. Terra Nova: The New Worlds of Cyberspace," "2. Ars Metaphorica: The Computer as a Device of Communication," "3. Veritatum Imitari: Virtual Reality and the Deconstruction of the Image," "4. Lingua Ex Machina: Computer-Mediated Communication and the Tower of Babel," "5. Corpus Amittere: Cyberspace and the Body," and "6. Ecce Cyborg: The Subject of Communication."

Gunn, Alastair S., and P. Aarne Vesiland. Hold Paramount: The Engineer? Responsibility to Society. Brooks/Cole-Thompson Learning, 2003; 159 pages. ISBN: 0-534-39258-X. Organized into fifteen Chapters: "I. Doing the Right Thing," "2. The Engineering Profession," "3. Enhance Human Welfare," "4. Hold Paramount," "5. The Safety of the Public," "6. Professional Development," "7. Solicit or Accept Gratuities," "8. Self-Laudatory Language," "9. Contributions in Order to Secure Work," "10. Professional Development of Others," "11. Overseas Work," "12. Uphold the Honor and Dignity," "13. Faithful Agents," "14. "Avoid Conflicts of Interest, and "15. Objective and Truthful Manner."

Gurak, Laura J. Cyberliteracy: Navigating the Internet with Awareness. New Haven, CT: Yale University Press, 2001; 194 pages. ISBN: 0-300-08979-1. Organized into eight chapters: "1. Cyberliteracy: Toward a New Internet Consciousness," "2. Speed, Reach, Anonymity, Interactivity," "3. Techno-Rage: Machines, Anger, and Censorship," "4. Genders and Virtualities," "5. Humor, Hoaxes, and Legends in Cyberspace," "6. Privacy and Copyright in Digital Space," "7. Shopping at the E-Mall," and "8. Think Globally, Eat Locally."

Halbert, Terry and Elaine Ingulli. Cyberethics. Southwestern Thompson Learning, 2002; 260 pages. ISBN: 0324116640. Organized into six chapters: "1. Intellectual Property and Cyberspace," "2. Privacy on the Internet," "3. CyberSpeech," "4. E-Commerce," "5. E-Learning and the Business of Education," and "6. Global Competition."

Hamelink, Cees J. The Ethics of Cyberspace. Thousand Oaks, CA: Sage, 2000; 207 pages. ISBN: 076196692. Organized into seven sections: "1. Prometheus in Cyberspace," "2. Morality in CyberSpace," "3. The Decent Society and CyberSpace," "4. Equal Entitlement in CyberSpace," "5. Digital Risks and Security in Cyberspace," "6. Free Speech and Knowledge in CyberSpace," and "7. The Democratization of Technology Choice."

Hauberman, Bernardo A. The Laws of the Web. Patterns in the Ecology of Information. Cambridge, MA: MIT Press, 2002; 128 pages. ISBN: 0-262-08305-5. Organized into eight main chapters: "1. E-cology," "2, The Phenomenon of the Web," "3. Evolution and Structure," "4. Small Worlds," "5. As We Surf," "6. Social Dilemmas and Internet Congestion," "7. Downloading Information," and "8. Markets and the Web."

Herkert, Joseph, ed. Social, Ethical, and policy Implications of Engineering: Selected Readings. New York: IEEE Press, 2000; 339 pages. ISBN: 0780347129. Includes more than thirty readings that are organized into three main parts: "Part I: Technology, Engineering, and Society," "Part II: Social and Ethical Responsibilities of Engineers," and "Part III: Engineering Ethics and Public Policy." An appendix is also included.

Hester, D. Micah and Paul J. Ford, eds. Computers and Ethics in the Cyberage. Upper Saddle River, NJ: Prentice Hall, 2001; 498 pages. ISBN 0-13-082978-1. Includes forty readings organized into twelve chapters, which are further divided into four main sections: "Section One: Technology, Computers, and Values," "Section Two: Computers and the Quality of Life," "Section Three: Uses, Abuses, and Social Consequences," and "Section Four: Evolving Computer Technologies." Also included are four appendixes: "Appendix A: ACM/IEEE Software Engineering Ethics and Professional Practice," "Appendix B: Codes of Ethics of Selected Foreign Professional Societies," "Appendix C: Selected 'Appropriate Use' Regulations," and "Appendix D: Further Resources in Computer Ethics." Bibliographies of selected works are also included at the end of each of the four major sections of this book.

Hickman, Larry A. Philosophical Tools for Technological Culture: Putting Pragmatism to Work. Bloomington, IN: Indiana University Press, 2001; 231 pages. ISBN: 0-253-2144-0. Organized into nine chapters: "1. Tuning Up Technology," "2. Technology and Community Life," "Productive Pragmatism, Critical Theory, and Agape," "4. Art, Technoscience, and Social Action," "5. Technoscience Education for a Life-Long Curriculum," "6. Literacy, Mediacy, and Technological Determinism," "7. Populism and the Cult of the Expert," "8. Hope, Salvation, and Responsibility," and "9. The Next Technological Revolution." Also includes a bibliography.

Himanen, Pekka. The Hacker Ethics and the Spirit of the Information Age. New York: Random House, 2001; 232 pages. ISBN: 0375505660. Includes seven chapters organized into three main parts: "Part One: The Work Ethic," "Part II: The Money Ethic," and "Part III: The Nethics." An epilogue titled "Information and the Network Society" (written by Manuel Castells) and an appendix titled "A Brief History of Computer Hackerism" are also included.

Holmes, David, ed.  Virtual Politics. Thousand Oaks, CA: Sage Publications, 1998; 272 pages. Contains twelve readings organized into two main parts: I. The Self, Identity, and Body in the Age of the Virtual; and II. Politics and Community in Virtual Worlds. Also includes an introduction by Holmes.

Jenkins, Henry, and David Thorburn, eds. Democracy and New Media. Cambridge, MA: MIT Press, 2004; 440 pages. ISBN: 0-262-10101-7. A collection of readings on democracy and cyberspace, which examine the impact of emerging technologies on politics, journalism, and civic experience.

Johnson, Deborah G, James H. Moor, and Herman T. Tavani, eds. Proceedings of the Conference on Computer Ethics - Philosophical Enquiry (CEPE 2000). Dartmouth College, Hanover, NH, July 14-16, 2000; 345 pages. Includes twenty-two papers presented at CEPE 2000 Conference at Dartmouth. Selected papers from the CEPE 2000 Proceedings are also included in special sections or special issues of two journals (both of which are guest edited by Johnson, Moor, and Tavani): four selected CEPE 2000 papers are included in a special section of the December 2000 issue of Computers and Society (Vol. 30, No. 4); and six selected CEPE 2000 papers are included in an issue of Ethics and Information Technology (Vol. 3, No. 1), whose theme is "Computer Ethics - Philosophical Enquiry."

Johnson, Deborah G. Computer Ethics. 3rd edn. Upper Saddle River, NJ: Prentice Hall, 2001; 240 pages. ISBN 0-13-083699-0. Organized into eight chapters: "1: Introduction: Why Computer Ethics?" "2: Philosophical Ethics," "3: Professional Ethics," "4: Ethics and the Internet I: Ethics Online," "5: Privacy," "6: Property Rights in Computer Software," "7: Accountability and Computer and Information Technology," and "8: Ethics and the Internet II: Social Implications and Social Values."

Jones, Capers.  The Year 2000 Software Problem: Quantifying the Costs and Assessing the Consequences. New York, NY: ACM Press, 1997; 368 pages. ISBN 0-201-30964-5. Provides a framework for examining the effect that the year 2000 problem will have on the business sector. In addition to assessing the scope of the problem, the author offers a solution strategy.

Jones, Steven G., ed. Virtual Culture. Thousand Oaks, CA: Sage Publications, 1997; 262 pages. Comprised of eleven readings, including an article by Jones on "The Internet and its Social Landscape." also includes an introduction by Jones.

Kahin, Brian and Hal R. Varian, editors. Internet Publishing and Beyond. The Economics of Information and Intellectual Property. Cambridge, MA: MIT Press, 2000; 243 pages. ISBN: 0-262-61159-7. Organized into nine sections that examine topics related to the economics of "copy protection in software and other media," the "advertising privacy models for the Web," and so forth. Also included is an introduction by Kahin and Varian.

Kahin, Brian and  Charles Nesson, eds.  Borders in Cyberspace: Information Policy and the Global Information Infrastructure. Cambridge, MA: MIT Press, 1997; 300 pages. ISBN 0-262-61126-0. A publication of the Harvard Information Infrastructure Project, the essays in this volume examine issues in privacy, security, intellectual property, and censorship.

Kahin, Brian and  James H. Keller, eds.  Coordinating the Internet. Cambridge, MA: MIT Press, 1997; 500 pages. ISBN 0-262-61136-8. Essays in this anthology examine possible mechanisms for governing the Internet as it grows in scope, bandwidth, and functionality. Also considered in these essays is whether technical and policy issues are inseparable in discussions involving the Internet.

Katz, James E., and Ronald E. Rice. Social Consequences of Internet Use: Access, Involvement, and Interaction. Cambridge, MA: MIT Press, 2003; 460 pages. ISBN: 0-262-11269-8. Explores the impact of the Internet on society from three perspectives: access to Internet technology (the digital divide), involvement with groups and communities through the Internet (social capital), and use of the Internet for social interaction and expression (identity).

Kizza, Joseph M.  Ethical and Social Issues in the Information Age. New York, NY: Springer Verlog, 1997; 172 pages. ISBN 0-387-98275-2. Includes a Preface on "Morality and Law" and eight chapters with the following titles: "Technology and Values," "Ethics and Professionalism," "Anonymity, Security, and Privacy," "Intellectual Property and Computer Technology," "Computer Augmented Environment: The Workplace," "Software Issues," "New Frontiers for Ethical Considerations: Artificial Intelligence, Cyberidentity, and Virtual Reality," "Ethical and Social Issues in Cyberspace." Intended as an undergraduate textbook, this work provides an introductory overview to ethical, social, and policy issues that have emerged in the information era.

Koepsell, David R. The Ontology of Cyberspace: Law, Philosophy, and the Future of Intellectual Property. New York: Open Court Publishing Company, 2000; 144 pages. ISBN: 0812694236. Organized into nine chapters: "1: Preliminary Questions," "2: Ontology: Its Correct Object and Method," "3: Some Methodologies of Legal Ontology," "4: The Legal Ontology of Intellectual Property," "5: The Legal Ontology of Software," "6: The Common Sense Categories of Cyberspace," "7: Artifice and Expression," "8: A New Ontology of Cyberspace," and "9: Implications of the New Ontology of Cyberspace."

Lane, Frederick. Obscene Profits: The Entrepreneurs of Pornography in the Cyberage. New York: Routledge, 2000; 305 pages. ISBN: 0-415-92906-5. Organized into nine main chapters: "1. A Brief History of Pornography and Technology," "2. Voyeur Viewing Pleasure," "3. The Thin Blue Line," "4. The Risky Business of Online Pornography," "5. Phone Sex: The First National Pornography Network," "6. The Search for Satisfaction," "7. Honey, Is That Really You?" "8. All the Web's Stage," and "9. The Future of Online Sexual Entrepreneurship."

Lessig, Larry. Code and Other Laws of Cyberspace. New York: Basic Books, 2000; 320 pages. ISBN: 0465039138. Includes seventeen chapters organized into four main parts: "Part 1: Regulability," "Part 2: Code and Other Regulators," "Part 3: Applications," and "Part 4: Responses." Among the topics discussed in the various chapters are: privacy, free speech, intellectual property, sovereignty, "architectures of control," and "code as law."

Lessig, Larry. The Future of Ideas: The Fate of the Commons in a Connected World. New York: Random House, 2002; 368 pages. ISBN: 0375505784. Includes fifteen chapters organized into three main parts: "Part I: Dot.Commons," "Part II: Dot.Contrast," and "Part III: Dot.Control."

Levy, Steven. Crypto: How the Code Rebels Beat the Government -- Saving Privacy in the Digital age. New York: Viking Penquin, 2002; 352 pages. ISBN: 0670859508. Organized into nine main chapters: "1: The Loner," "2. The Standard," "3. Public Key," "4. Prime Time," "5. Selling Crypto," "6. Patents and Keys," "7. Crypto Anarchy," "8. The Clipper Chip," and "9. Slouching Toward Crypto." Also contains an epilogue titled "The Open Secret."

Li, Lun. Virtue Behind the Mouse: Ethical Issues in Cyberspace. Nanchang, China: Jianxi People? Press, 2002; 318 pages. ISBN 7-210-02634-7. Organized into ten chapters: "1. Making the Net Better: The Rise of Cyberethics," "2. Rebuilding the Tower of Babel: Why is Net Morality Possible?" "3. Freedom and Sharing: The Ethos of the Net Society," " 4. Knowledge and Information: The Engine of the Net Society," "5. Trust and Self-regulation the Node of the Net Society," "6. Globalization and Diversity: The Tension of the Net Society," "7. Humanity and Human Relationships: The Sphinx Riddle of the Net Society, " "8. The Hacker ethics: What kind of Ethic is it?" "9. The Emperor? New Clothes: Privacy in Cyberspace," and "10. Treat the Net Well: Crisis in the Net-Eco and Net-Eco Ethics."

Ludlow, Peter, ed. Crypto Anarchy, Cyberstates, and Pirate Utopia. Cambridge, MA: MIT Press, 2001; 485 pages. ISBN: 0-262-62151-7. Includes twenty-five chapters organized into five main parts: "Part I: The Sovereignty of Cyberspace," "Part II: Crypto Anarchy," "Part III: Shifting Borders: How VR is Claiming Jurisdiction from RL," "Part IV: The Emergence of Law and Governance Structures," and "Part V: Utopia, Dystopia, and Pirate Utopia."

MacKenzie, Donald. Mechanizing Proof: Computing, Risk, and Trust. Cambridge, MA: MIT Press, 2001; 427 pages. ISBN: 0-262-13393-8. Organized into nine chapters: "1. Knowing Computers," "2. Boardwalks Across the Tar Pit," "3. Artificial Mathematicians?" "4. Eden Defiled," "5. Covert Channels," "6. Social Processes and Category Mistakes," "7. Clocks and Chips," "8. Logics, Machines, and Trust," and "9. Machines, Proofs, and Cultures."

Maskus, Keith E. Intellectual Property Rights in the Global Economy. Institute for International Economics, 2000; 270 pages. ISBN: 0415229049. Examines competing claims of both advocates and opponents of stronger intellectual property rights (IPRs) through an analysis of the economic impacts of extended international protection of IPRs. Also included is a preface by Fred Bergsten.

May, Christopher. A Global Political Economy of Intellectual Property Rights: The New Enclosures? New York: Routledge, 2000. ISBN 0415229049. Organized into six sections: "1: On Institutions and Property," "2: Developing Intellectual Property," "3: TRIPS as Watershed," "4: Sites of Resistance - Patenting Nature, Technology, and Skills," "5: Sites of Consideration - Legitimate Authorship?" and "6: Between Commons and Individuals." A bibliography is also included.

McKnight, Lee W. and  Joseph P. Bailey, eds.  Internet Economics. Cambridge, MA: MIT Press, 1997; 350 pages. ISBN 0-262-13336-9. The anthology is organized into six sections: "Introduction to Internet Economics," "The Economics of the Internet," "Interconnection and Multicast Economics," "Usage Sensitive Pricing," "Internet Commerce," "Internet Economics and Policy."

McKnight, Lee W., William Lehr, and David D. Clark, eds. Internet Telephony. Cambridge, MA: MIT Press, 2001; 390 pages. ISBN: 0-262-13385-7. Examines the transformation of the Internet from a network application using phone lines to a general communications infrastructure that has a wide impact on applications, architectures, networks, economics, public policy, industry structures, regulation, and service providers.

Menzel, Peter, and Faith D?luisio. Robo Sapiens: Evolution of a New Species. Cambridge, MA: MIT Press, 2001; 240 pages. ISBN: 0-262-63245-4. Organized into six sections: "Electronic dreams," Robo sapiens," "Bio logical," "Remote possibilities," "Work mates," and "Serious fun." Also includes an "Introduction," written by Menzel, and a section on "Methodology " written by D?luisio, as well as a glossary.

Mills, Stephanie, ed.  Turning Away from Technology: A New Vision of the 21st Century. San Francisco, CA: Sierra Club, 1997; 256 pages. ISBN 0-87156-953-1. Consists of twelve chapters organized into two main parts: "Megatechnology Development," and "Megatechnology and Economic Civilization." Also includes an introduction by Theodore Roszak.

Misa, Thomas J., Philip Brey, and Andrew Feenberg, eds. Modernity and Technology. Cambridge, MA: MIT Press, 2004; 376 pages. ISBN: 0-262-13421-7. Organized into three main parts. Part I provides a methodological groundwork for combining studies of technology and modernity, while integrating ideas drawn from feminism, critical theory, philosophy, sociology, and socioeconomics. Part II, which continues the methodological discussion, focuses on specific sociotechnical systems or technologies with prominent relations to modernity. Part III introduces practical and political issues by considering alternative modes of technology development and offers critiques of modern medicine, environmental technology, international development, and technology policy.

Moor, James H., and Terrell Ward Bynum, eds. Cyberphilosophy: The Intersection of Computing and Philosophy. Malden, MA: Blackwell Publishers, 2002; 308 pages. ISBN: 1-40510-073-7. Fourteen readings organized into five sections: "Minds and Computers," "Agency and Computers," "Reality and Computers," "Communication and Computers," and "Computer Ethics."

Moore, Adam D. Intellectual Property and Information Control: Philosophical Foundations and Contemporary Issues. New Brunswick, NJ: Transactions Publishing, 2001; 252 pages. ISBN: 0-7658-0070-5. Examines arguments for intellectual property and information control. Also proposes a Lockean model of property and recommends changes in Anglo-American intellectual property institutions. Patent law, fair use, workplace privacy, encryption, and public policy are also discussed.

Morgan, Christopher, ed.  Wizards and Their Wonders: Portraits in Computing. New York, NY: ACM Press, 1997. ISBN 0-89791-1-960-2. Growing out of a photo exhibit to honor pioneers in computing, the book includes 200 specially commissioned photographs of inventors, entrepreneurs, and communicators who helped shaped the computer era.

Morgan, M. Granger, Barcuh Fischhoff, Ann Bostrom, and Cynthia J. Atman. Risk Communication: A Mental Model Approach. Cambridge, UK: Cambridge University Press, 2002; 304 pages. ISBN: 0521802237. Organized into nine chapters: "1. Introduction," "2. The Carnegie Mellon Mental Models Approach," "3. Creating an Expert Model of the Risk," "4. Mental Model Interviews," "5. Confirmatory Questionnaires," "6. Development and Evaluation of Communications," "7. Case Studies: Applications to Environmental Risks," "8. A Mental Models Approach to HIV/AIDS," and "9. Some Concluding Remarks."

Mueller, Milton L. Ruling the Root: Internet Governance and the Taming of Cyberspace. Cambridge, MA: MIT Press, 2002; 332 pages. ISBN: 1-262-13412-8. Uses the theoretical framework of "institutional economics" to analyze the global policy and governance problems created by the assignment of Internet domain names and addresses.

Murreli, Elena, Rogers Okut-Uma, and Luca Delgrossi, eds. Breaking the Digital Divide. Commonwealth Secretariat, 2001; 200 pages. ISBN: 0-850-92672-6. Includes the results of an extensive study of the digital divide, examining notions such as: the growth of the Internet, the regulation of the Internet, the Internet and the economy, online education, and so forth.

Netanel, Neil W. and Niva Elkin-Koren, eds. The Commodification of Information. Dordrecht, The Netherlands. Kluwer Law International, 2002. Includes twenty readings organized into seven main parts: "I. Foundations," " II. Copyright and Commodification: Broad Trends," " III. Copyright and Commodification," "IV. Media and Telecommunications," "V. Information Aggregation," "VI. Collaborative Production and Scientific Research," and "VII. Market Practices." Also includes an editors' introduction entitled "The Commodification of Information."

Norris, Pippa. Digital Divide? Civic Engagement, Information Poverty, and the Internet Worldwide. Cambridge University Press, 2001; 312 pages. ISBN: 0-521-00223-0. Examines a range of controversies associated with universal access, universal service, the "information-poor" vs. the "information-rich," and so forth.

Ochi, Mitsugu, Syun Tityu, and Masahiko Mazatani, editors. Information Ethics. Japan: Natnashu Syuppann Publishers, 2000; 342 pages. ISBN: 4-88848-573-9. An anthology that includes ten papers that cover a range of issues involving information ethics.

Picard, Rosalind W.  Affective Computing. Cambridge, MA: MIT Press, 1997; 275 pages. ISBN 0-262-16170-2. Organized into two main parts. Part I examines intellectual framework issues as well as moral and social questions raised by affective computing technology. Part II considers more technical issues, such as current attempts to build "models of emotion" that can be used for synthesizing emotion in computers.

Pool, Robert.  Beyond Engineering: How Society Shapes Technology. New York, NY: Oxford University Press, 1997; 258 pages. ISBN 0-19-510772-1. Comprised of nine chapters that cover topics such as "Risk," "Control," "Choices," "Complexity," and "Technical Fixes, Technical Solutions."

Power, Richard. Tangled Web: Tales of Digital Crime From the Shadows of Cyberspace. Que Corporation (a division of Macmillan), 2000; 431 pages. ISBN: 07897-2443X. Includes eighteen chapters organized into five main parts: "I: Crime, War, and Terror in the Information Age," "II: Hackers, Crackers, and Virus Writers," "III: Spies and Saboteurs," "IV: Muggers and Molesters in Cyberspace," and "V: The Defense of Cyberspace." Also included are three appendixes.

Rawlins, Gregory J. E.  Slaves of the Machine: The Quickening of Computer Technology. Cambridge, MA: MIT Press, 1997; 240 pages. ISBN 0-262-18183-5. Organized into six chapters which ask the following questions: What are computers? How do we build them? How do we program them? What can't they do? Can they think?

Reynolds, George. Ethics in Information Technology. Course Technology, 2002; 255 pages. ISBN: 0619062770. Organized into eight chapters: "1: An Overview of Ethics," "2: Ethics for IT Professionals and IT Users," "3: Computer and Internet Crime," "4: Privacy," "5: Freedom of Expression," "6: Intellectual Property," "7: Software Development," and "8: Employer/Employee Issues," Also includes four appendixes: "Appendix A. Association for Computing Machinery (ACM) Code of Ethics and Professional Conduct," "Appendix B. Association of Information Technology Professionals (AITP) Code of Ethics," "Appendix C. Software Engineering Code of Ethics and Professional Practice," and "Appendix D. Institute of Electrical and Electronics Engineers (IEEE) Code of Ethics."

Rheingold, Howard. The Virtual Community: Homesteading on the Electronic Frontier. revised edition. Cambridge, MA: MIT Press, 2001; 447 pages. ISBN: 0262681218. Organized into eleven chapters: "1. The Heart of the WELL," "2. Daily Life in Cyberspace: How the Computerized Counterculture Built a New Kind of Place," "3. Visionaries and Convergences: The Accidental History of the Net," "4. Grassroots, Groupminds," "5. Multiuser Dungeons and Alternative Identities," "6. Realtime Tribes," "Japan and the Net," "8 Telematique and Messageries Rose: A Tale of Two Virtual Communities," "9. Electronic Frontiers and Online Activists," "10. Disinformocracy," and "11. Rethinking Virtual Communities. Also includes a preface to the MIT Press edition of the book.

Robert Ellis Smith. Ben Franklin's Web Site. Privacy Journal; 2001; 407 pages. ISBN: 0930072146. Organized into thirteen main sections: "1. Watchfulness 1620 - 1720," "2. Serenity 1760 - 1800," "3. Mistrust 1790 - 1880," "4. Space 1800 - 1870," "5. Curiosity 1820 - 1890," "6.Brandeis 1890 - 1930," "7. Wiretaps 1910 - 1990," "8. Sex 1920 - 1990," "9. Torts 1930 - 1995," "10. The Constitution 1965 - 1995," "11. Numbers 1935 - 2000," "12. Databanks 1965 - 2000," and "13. Cyberspace 1990 - 2000." Also includes an epilogue entitled "Ben Franklin's Web Site."

Rogers, Richard, ed. Preferred Placement: Knowledge Politics on the Web. Maastricht: Javan Eyck Editions, 2000; 189 pages. ISBN: 90-6617-243-6. Includes ten readings organized into three main sections: "Reliability Graphics Gallery," "Map Gallery," and "Rogue Gallery." Among the topics discussed in the readings are: the politics of search engines, the politics of profiling, and the "depluralising" of the Web. Also included is an introduction by Rogers entitled "Towards the Practice of Web Epistemology."

Rogerson, Simon and  Terrell Ward Bynum, eds.  Information Ethics: A Reader. Cambridge, MA: Blackwell Publishers, 1998. ISBN 185-554-8452. Includes thirty-two readings organized into five main parts which are titled: "What is Computer Ethics?," "Ethics and the Net," "Computers and Privacy," "Computers in the Workplace," and "Computers and Business." This anthology includes papers presented at the ETHICOMP95 and ETHICOMP96 conferences.

Rosen, Jeffrey. The Unwanted Gaze: The Destruction of Privacy in America. New York: Random House, 2000; 274 pages. ISBN 0679445463. Organized into seven sections: "Prologue: The Unwanted Gaze," "Privacy at Home," "Privacy at Work," "Jurisprudence," "Privacy in Court," "Privacy in Cyberspace," and "Epilogue: What is Privacy Good For?"

Rosenberg, Richard S.  The Social Impact of Computers. 2nd ed. San Diego, CA: Academic Press, 1997; 522 pages. ISBN 0-12-597131-1. Organized into thirteen chapters: "Computers are Everywhere," "Computers and the Human Imagination," "Criticism and History," "The Business World," "Medicine and Computers," "Computers and Education," "Government and Computers," "Computers and the Law," "Privacy and Freedom of Information," "Employment and Unemployment," "Business and Government," "The Information Society," and "Ethics and Professionalism." This work also includes an appendix which identifies magazines, journals, professional computer associations, and Web sites.

Rudinow, Joel, and Anthony Graybosch, eds. Ethics and Values in the Information Age. Wadsworth, 2002; 483 pages. ISBN: 0-15-507956-5. Includes thirty-three readings organized into eleven chapters: "1. Ethics ?nformationalized? From Walden to DotComGuy," "2. Media Values I: Freedom and Information," "3: Media Values II: Assessing Media Performance," "4. Ethics and Advertising," "5. Ethics and Entertainment I: Humor and Comedy," "6. Ethics and Entertainment II: Sex and Violence," "7. Information Access I: Privacy," "8. Information Access II: Secrecy and Confidentiality," "9. Information Access III: Intellectual Property," "10. Information Access IV: Security," and "11. Information Technology, Everyday Life, and the Future of Human Civilization." Each chapter includes one or more case studies as well as a set of exercises and suggested readings.

Samuelson, Pamela, Mark A. Lemley, Robert P. Merges, and Peter S. Menell. Software and Internet Law. Panel Publishers, 2000; 700 pages. ISBN: 0735513120. The chapters in this book discuss a wide range of topics including: trade secret protection, copyright law, patent protection, trademarks, software licensing, Internet jurisdiction, intellectual property, content regulation, privacy and encryption, electronic commerce, and Internet governance. These and other issues are considered with frequent references to case law.

Schellenberg, Kathryn, ed. Computers in Society (02/03). 9th ed. Includes forty-three readings organized into eight units: "1. Introduction," "2. The Economy," "3. Work and the Workplace," "4. Computers, People, and Social Participation," "5. Social Institutions - Property Law and Politics," "6. Societal Values and Risk: Ethics, Privacy, and Preserving the Past," "7. International Perspectives and Issues," and "8. Philosophical Frontiers."

Schellenberg, Kathryn, ed.  Computers in Society. 7th ed. Guilford, CT: Dushkin /McGraw Hill, 1997; 243 pages. ISBN 0-697-39304-6. Includes thirty-six readings, organized into eight units: "The Economy," "Work and the Workplace," "Computers and Social Participation," "Social Values: Ethics, Law, and Privacy," "Politics and the State," "Technological Risks," and "International Perspective and Issues." This work also contains an introduction and glossary, as well as forms for reviewing and rating articles.

Schneier, Bruce. Secrets and Lies: Digital Security in a Networked World. New York: John Wiley and Sons, 2000; 432 pages. ISBN: 0-471-25311-1. Includes twenty-four chapters organized into three main parts: "I: The Landscape," "II: Technologies," and "III: Strategies."

Schwartau, Winn. Cybershock: Surviving Hackers, Phreakers, Identity Thieves, Internet Terrorists, and Weapons of Mass Destruction. New York: Thunder Mouth's Press, 2000; 470 pages. ISBN: 156205246-4. Organized into seven main parts: "Part I: The Hackers," "Part II: Protecting Kids, Family, and Your Privacy," "Part III: How They Hack," "Part IV: We're Sorry But the Computers are Down," "Part V: Anti-Hacking Tips and Tricks," "Part VI: Law Enforcement, Vigilantism, and National Security," and "Part VII: The Future." Also included are two appendixes: one entitled "Top Hacker Sites," and the other entitled "Top 50 Security Sites."

Shneiderman, Ben.  Designing the User Interface: Strategies for Effective Human-Computer Interaction. 3rd ed. New York, NY: ACM Press, 1997; 650 pages. ISBN 0-201-85491-0. Provides a current introduction to the user-interface design and covers several topics in the human factors of interactive software. In addition to covering topics related to development methodologies, evaluation techniques, and user-interface-building tools design, this text discusses issues related to anthropomorphic design, virtual environments, and agents.

Smith, Gordon V. and Russell L. Parr. Valuation of Intellectual Property and Intangible Assets. 3rd edn. New York: John Wiley & Sons, Publishers, 2000; 638 pages. ISBN: 0471362816. Discusses a wide range of issues involving intellectual property, such as: the "dominance" of intellectual property, proprietary technology, trade secrets, patent design and patent utility, copyright protection, and so forth.

Spinello, Richard A. Case Studies in Information Technology Ethics. 2nd ed. Upper Saddle River, NJ: Prentice Hall, 2003; 252 pages. ISBN: 0-13-099150-3. Includes forty-five cases organized into eight chapters: "1. Frameworks for Ethics and Policy," "2. Free Expression in Cyberspace," "3. Intellectual Property Issues I: Software Ownership," "4. Intellectual Property II: Digital Music, Interconnectivity, and Trespass," "5. Privacy and Information Access," "6. Security and Cybercrime," "7. Liability, Reliability, and Safety Issues," and "8. Fair Competition and Internet Access."

Spinello, Richard A. CyberEthics: Morality and Law in Cyberspace. 2nd ed. Sudbury, MA: Jones and Bartlett Publishers, 2003; 238 pages. ISBN: 0-7637-0064-9. Organized into six chapters: "One: The Internet and Ethical Values," "Two: Regulating and Governing the Internet," " Three: Free Speech and Content Control in Cyberspace," "Four: Intellectual Property in Cyberspace," "Five: Regulating Internet Privacy," and "Six: Securing the Electronic Frontier." Discussion questions are included at the end of each chapter, and cases are included in some chapters. A glossary is also included.

Spinello, Richard A. Regulating Cyberspace: The Policies and Technologies of Control. Westport, CT: Quorum Books (Greenwood Publishing), 2002; 310 pages. Organized into ten chapters: "1. Global Connectivity and Internet Access," "2. Creating and Regulating the Internet, "3. Decentralizing Regulation," "4. Electronic Commerce and The Network Economy," "5. Competition and Anti-trust in Cyberspace," "6. Freedom of Expression and Content Controls," "7. Intellectual Property Wars and Knowledge Monopolies," "8. Privacy Rights and the Internet," "Cybercrimes, Encryption, and Government Surveillance," and "10. Epilogue."

Spinello, Richard A. and Herman T. Tavani, eds. Readings in CyberEthics. Sudbury, MA: Jones and Bartlett Publishers, 2001; 601 pages. ISBN: 076371500X. Includes forty-four readings organized into six chapters: "Chapter 1: The Internet, Ethical Values, and Conceptual Frameworks," "Chapter 2: Regulating the Net: Free Speech and Content Controls," "Chapter 3: Intellectual Property in Cyberspace," "Chapter 4: Privacy in Cyberspace," "Chapter 5: Security in Cyberspace," and "Chapter 6: Professional Ethics and Codes of Conduct." Also included are two appendixes: "Appendix A: ACM Code of Ethics and Professional Conduct," and "Appendix B: The IEEE Code of Ethics." [An excerpted section from Chapter 1 of this book is included in the current issue of Computers and Society.]

Spinello, Richard A.  Case Studies in Information and Computer Ethics. Upper Saddle River, NJ: Prentice Hall, 1997; 285 pages. ISBN 0-13-533845. Includes thirty-eight cases organized into nine chapters, which are in turn organized into three main parts: "Introduction," "Information Ethics," and "Computer Science Ethics." Also contains a useful appendix which identifies various professional codes of ethics. This work can be used either as a stand-alone coursebook or as a supplement to various computer ethics textbooks, including Spinello's  Ethical Aspects of Information Technology. Englewood Cliffs, NJ: Prentice Hall, 1995.

Stork, David G., ed. HAL's Legacy: 2001's Computer as Dream and Reality. Cambridge, MA: MIT Press, 1997; 352 pages. ISBN 0-262-19378-7. This anthology, which includes a Foreword by Arthur C. Clarke, includes a collection of essays that explore the relationship between science fantasy and technological fact.

Sussman, Gerald.  Communication, Technology, and Politics in the Information Age. Thousand Oaks, CA: Sage Publications, 1997; 319 pages. Includes eight chapters which are organized into five main parts: I. The Meaning and Politics of the "Communication Revolution"; II. The Social Historical Process; III. Political Issues in the "Information Society"; IV. The Global Dimensions of the "Information Society": and V. Conclusions.

Tavani, Herman T. Ethics and Technology: Ethical Issues in Information and Communication Technology. New York: John Wiley & Sons, 2004; 368 pages. ISBN: 0471249661. Organized into eleven chapters: "1. Introduction to Cyberethics: Concepts, Perspectives, and Methodological Frameworks," "2. Ethical Concepts and Ethical Theory: Establishing and Justifying a Moral System," "3. Critical Thinking Skills and Logical Arguments: Tools for Evaluating Cyberethics Issues," "Professional Ethics, Codes of Conduct, and Moral Responsibility," "5. Privacy and Cyberspace," "6. Security in Cyberspace," "7. Cybercrime and Cyber-related Crimes," "8. Intellectual Property in Cyberspace," "9. Regulating Commerce and Speech in Cyberspace," "10. Social Issues I: Equity and Access, Employment and Work," and "11. Social Issues II: Community and Identity in Cyberspace." Also includes five appendixes: "Appendix A: IEEE Code of Ethics," "Appendix B: ACM Code of Ethics and Professional Practice," "Appendix C: IEEE-CS/ACM Software Engineering Code of Ethics and Professional Practice," "Appendix D: Computing Curricula 2001," and "Appendix E: Additional Critical Thinking Techniques." Included at the end of each chapter is a set of "review questions," "discussion questions," and "suggested readings." A glossary is also included.

Teich, Albert H., ed.  Technology and the Future. 7th ed. NY: St. Martin's Press, 1997; 384 pages. ISBN: 0-312-11612-8. Includes twenty-six readings organized into four parts: "Thinking About Technology," "Forecasting, Assessing, and Controlling the Impacts of Technology," "Reshaping Technologies," and "Using Technologies and Confronting Their Dilemmas."

Tenner, Edward.  Why Things Bite Back: Technology and the Revenge of Unintended Consequences. New York, Vintage Books, 1997; 431 pages. ISBN 0-679-74756-7. Comprised of twelve chapters, the book examines social issues related to technology, including productivity issues in the computerized office.

Van Camp, Julie. Ethical Issues in the Courts: A Companion to Philosophical Ethics. Belmont, CA: Wadsworth, 2001; 170 pages. ISBN: 0-534-55009-6. Organized into eleven sections, this work includes excerpts from decisions in important US. court cases, including some US. Supreme Court decisions. Of particular use to readers interested in computer ethics are the following sections: "Section 2: "Private Lives," "Section 5: Freedom of Expression," and Section 11: Computer Ethics." Also included is a section entitled "How to Read a Court Decision."

Vedder, Anton ed. Ethics and the Internet. Antwerpen: Intersentia, 2001; 211 pages. ISBN: 90-5095-176-7. Includes twelve readings organized into three main parts: "1: Intellectual Freedom," "2: Privacy and the Employment of User Information," and "3: Reliability of Information and User's Reliance." Also includes an editor's introduction and a cumulative bibliography.

Walters, Gregory J. Human Rights in an Information Age: A Philosophical Analysis. Toronto, CA: University of Toronto Press, 2001; 335 pages. ISBN: 0-8020-3583-3. Organized into seven main chapters: "1. The Philosophical Framework," "2. Information Highway Policy and E-Commerce Strategy," "3. The Information Economy, Work, and Productive Agency," "4. Privacy and Security Police: The Historical Situation," "5. Privacy and Security: An Ethical Analysis," "6. Information Warfare," and "7. Information Warfare and Deterrence." Also includes an introduction and a concluding section entitled "Towards a Global Community of Rights in an Information Age."

Wardrip-Fruin, Noah, and Nick Montfort, eds. The New Media Reader. Cambridge, MA: MIT Press, 2003; 824 pages. ISBN: 0-262-23227-8. A collection of readings that were originally published between World War II and the emergence of the World Wide Web when they entered the mainstream of public life. The texts, which explore a range of issues from cybernetic feedback to early notions of hypertext, are authored by computer scientists, artists, architects, literary writers, interface designers, cultural critics, and individuals working across disciplines. Accompanying the book is a CD that contains examples of early games, digital art, independent literary efforts, software created at universities, and home-computer commercial software.

Warschauer, Mark. Technology and Social Inclusion: Rethinking the Digital Divide. Cambridge, MA: MIT Press, 2003; 272 pages. ISBN: 0-262-232243-3. Examines the ways in which different access levels to technology contribute to social and economic stratification or inclusion. Case studies from developed and developing countries, including Brazil, China, Egypt, India, and the United States are included.

Wilson III, Ernest J. The Information Revolution and Developing Countries. Cambridge, MA: MIT Press, 456 pages. ISBN: 0-262-23230-8. Analyzes the major transformations resulting from the global information revolution, arguing that the information revolution is rooted in societal dynamics, political interests, and social structure.

Weckert, John and  Douglas Adeney.  Computer and Information Ethics. Westport, CT: Greenwood Press, 1997; 175 pages. ISBN 0-313-29362-7. Organized into eleven chapters: "The Meaning of Ethics," "Professional Ethics," "Freedom, Information, and Images," "Censorship of the Internet," "Intellectual Property," "Privacy," "Responsibility," "What Computers Should Not Do," "Quality of Life and Work," "Virtual Reality," and "Minds, Machines, and Morality." This work also includes an introduction, glossary, and bibliography.

West, Cynthia K. Techno-Mesh, the Growing Power of Information Technologies. Greenwood Publishing Group, Inc; 240 Pages. ISBN: 152604090. Organized into five chapters: "Introduction: Major Issues," "The Digerati: Economic, Political and Social Frameworks," "The Merging of People and Digital Devices: History and Practices," "Increasing Surveillance in Law Enforcement, at Work, and in the Marketplace," and "Conclusion: Recommendations for Change." Also included are a preface, a glossary, a bibliography, and an appendix entitled "Theoretical Issues Concerning the Interface Between People and Machines."

Willard, Nancy E.  The Cyberethics Reader. New York, NY: McGraw Hill, 1997; 101 pages. ISBN 0-07-070318-3. Organized into thirty mini-sections, each consisting of two-to-four pages. Also contains a preface, introduction, and glossary, as well as a section on "Net Communications Conventions." Though not a text book per se, this work can be used as a supplementary text, especially in courses that include a component on netiquette.

Winters, Paul A., ed.  Computers and Society. San Diego, CA: Greenhaven Press, 1997; 172 pages. ISBN: 1-56510-563-X. Includes thirty-three readings which are distributed across five chapters: "How Will Computers Transform Society?," "How Will Computer Technology Affect the Right to Privacy?," "Should Computer Content Be Censored?," "Should Universal Access to Computer Technology Be Guaranteed?," and "Will Computers Transform Education?"

Wise, J. Macgregor.  Exploring Technology and Social Space. Thousand Oaks, CA: Sage Publications, 1997; 213 pages. Includes nine chapters organized into two main parts: I. Episteme, and II. Assemblage. Also includes introductory and concluding chapters.

Woodbury, Marsha Cook. Computer and Information Ethics. Champaign, IL: Stipes Publishing, 2002; 354 pages. ISBN: 1-58874-155-9. Organized into nine chapters: "1. Ethics," "2. The Roots of Ethics," "3. Decision Making and Professionalism," "4. Cyber History and Cyber Etiquette," "5. Computer Crime and Infowar," "6. Information, Privacy, and the Law," "7. Risk, Reliability, AI, and the Future," "8. E-commerce and Business Ethics," and "9. Social Issues." Also included are two appendixes ?"Software Engineering Code of Ethics and Professional Practice" and the "ACM Code of Ethics and Professional Conduct" ?and a glossary.

Woolgar, Steve, ed. Virtual Society? Technology, Cyberbole, Reality. Oxford: Oxford University Press, 2002; 349 pages. Includes seventeen readings that resulted from research carried out under the auspices of the ERCS funded research program ?Virtual Society? The social science of electronic technologies.

Wresch, William.  Disconnected: Haves and Have-nots in the Information Age. New Brunswick, NJ: Rutgers University Press, 1997; 268 pages. ISBN 0-8135-2370-2. Contains eleven chapters organized into four main parts: "Problems at the Source," "Transmission Problems," "Reception Problems," and "Solutions."

Zaleski, Jeff.  The Soul of Cyberspace: How Technology is Changing Our Spiritual Life. San Francisco, CA: Harpers Edge, 1997; 284 pages. ISBN 0-06-251451-2. Includes twelve chapters that discuss issues related to artificial intelligence, artificial life, virtual reality, and "sacred cyberspace."


2.0 Selected Articles. Articles cited in this section were selected from those published after September l996.

Adam, Alison and Jacqueline Oformi-Amanfo. "Does Gender Matter in Computer Ethics?" Ethics and Information Technology, Vol. 2, No. 1, 2000, pp. 37-47.

Agren, Per-Olaf. "Is Online Democracy in the EU for Professionals Only?" Communications of the ACM, Vol. 44, No. 1, January 2001, pp. 36-38.

Anderson, Thomas C. "The Body and Communities in Cyberspace," Ethics and Information Technology, Vol. 2, No. 3, 2000, pp. 153-158

Andrews, Clinton J. "Restoring Legitimacy to the Systems Approach," IEEE Technology and Society Magazine, Vol. 19, No. 4, Winter 2000/2001, pp. 38-44.

Andrews, Clinton J. and Kevin Passino. "Social Implications of Systems Concepts: (Guest Editors') Introduction," IEEE Technology and Society Magazine, Vol. 19, No. 4, Winter 2000/2001, p. 9.

Anttiroiko, Ari-Veikko. "Toward the European Information Society," Communications of the ACM, Vol. 44, No. 1, January 2001, pp. 31-35.

Artz, John. "The Role of Stories in Computer Ethics," Computers and Society, Vol. 28, No. 1, March 1998, forthcoming.

Astrom, Joachim. "Should Democracy Online be Quick, Strong, or Thin?" Communications of the ACM, Vol. 44, No. 1, January 2001, pp. 49-51.

Baase, Sara. "Impacts on Communities: Comments on Sclove and Scheuer," Computers and Society, Vol. 27, No. 4, December 1997, pp. 15-17.

Bailey, James; Gerelenter, David; Lanier, Jaron; and Charles Siebert. "Our Machines, Ourselves," Harper's, May 1997, pp. 45-54.

Balabanian, Norman. "Controlling Technology: Should We Rely on the Marketplace?" IEEE Technology and Society Magazine, Vol. 19, No. 2, Summer 2000, pp. 23-30.

Bar, Francois and Annemarie Munk Riis. "Tapping User-Driven Innovation: A New Rationale for Universal Service," The Information Society: An International Journal, Vol. 16, No. 2, 2000.

Barme', Geremie R. and Sang Ye. "The Great Firewall of China," Wired, Vol. 5, No. 6, June 1997, pp. 138-151, 174-178, 182.

Barroso, Porfirio. "Key Ethical Concepts for the Internet and For the Ethical Codes of Computer Professionals," Australian Computer Journal, Vol. 29, No. 1, February 1997, pp. 31-34.

Bashir, Imran, Enrico Serafini, and Kevin Wall. "Securing Network Software Applications: (Guest Editors') Introduction," Communications of the ACM, Vol. 44, No. 2, February 2001, pp. 28-30.

Behar, Richard. "Who's Reading Your E-mail?" Fortune, February 3, 1997, pp. 57-61, 64, 66, 70.

Bellman, Steven, Eric J. Johnson, and Gerald L. Loshe. "To Opt-In or Opt-Out? It Depends on the Question," Communications of the ACM, Vol. 44, No. 2, February 2001, pp. 25-27.

Benkler, Yochai. "The Battle Over the Institutional Ecosystem in the Digital Environment," Communications of the ACM, Vol. 44, No. 2, February 2001, pp. 84-90.

Bennett, Colin and Charles D. Raab. "The Adequacy of Privacy: The European Union Data Protection Directive and the North American Response," The Information Society: An International Journal. Vol. 13, No. 3, 1997, pp. 245-264.

Berghel, Hal. "A Post Mortem for the Communications Decency Act." Computers and Society, Vol. 27, No. 4, December 1997, pp. 8-11.

Berghel, Hal. "Digital Politics 2000," Communications of the ACM, Vol. 43, No. 11, November 2000, pp. 17-20.

Berghel, Hal. "Informal Logic on Both Sides of the CDA Debate," Communications of the ACM, Vol. 40, No. 7, July 1997, pp. 11-15.

Berleur, Jacques. "International Federation for Information Processing's Framework for Computer Ethics," Science and Engineering Ethics, Vol. 2, No. 2, April 1996. Forthcoming in S. Rogerson and T. W. Bynum. (eds.) Information Ethics: A Reader. Cambridge, MA: Blackwell Publishers, 1998.

Birrer, Frans. "Applying Ethical and Moral Concepts and Theories to IT Contexts: Some Key problems and Challenges," in Proceedings of the Conference on Computer Ethics: Philosophical Enquiry. (Edited by Jeroen van den Hoven). Rotterdam, The Netherlands: Erasmus University Press, 1997, pp. 1-7.

Bix, Amy Sue. "'Engineeresses' Invade Campus," IEEE Technology and Society Magazine, Vol. 19, No. 1, Spring 2000, pp. 20-26.

Blythe, Andrew. "What Happens When a Medical Office Information System Fails?" Computers and Society, Vol. 26, No. 4, December 1997, pp. 25-26.

Bohn, Jeff G. "Thinking Systematically About Policy," IEEE Technology and Society Magazine, Vol. 19, No. 4, Winter 2000/2001, 29-37.

Bookman, Terri. "Interview with Samuel Florman on 'Ethics, Professionalism, and the Pleasures of Engineering,'" IEEE Technology and Society Magazine, Vol. 19, No. 3, Fall 2000, pp. 8-18.

Brey, Philip. "Method in Computer Ethics: Toward a Multi-Level Interdisciplinary Approach," Ethics and Information Technology, Vol. 2, No. 2, 2000, pp. 125-129.

Brey, Philip. "The politics of Computer Systems and the Ethics of Design," in Proceedings of the Conference on Computer Ethics: Philosophical Enquiry. (Edited by Jeroen van den Hoven). Rotterdam, The Netherlands: Erasmus University Press, 1997, pp. 8-19.

Brody, Herb. "Clicking into Webzines," Technology Review, May/June, 1997, pp. 38-47.

Brothers, Robyn. "'Deindividuation' and the Ethical Imperative: Rethinking Selfhood in the Information Age," in Proceedings of the Conference on Computer Ethics: Philosophical Enquiry. (Edited by Jeroen van den Hoven). Rotterdam, The Netherlands: Erasmus University Press, 1997, pp. 20-28.

Brothers, Robyn. "The Computer-Mediated Public Sphere and the Cosmopolitan Ideal," Ethics and Information Technology, Vol. 2, No. 2, 2000, pp. 91-98.

Buchanan, Elizabeth A. "Emerging Ethical Issues in Distance Education," CPSR Newsletter, Vol. 18, No. 2, Spring 2000.

Buchanan, Elizabeth A. and Netiva Caftori. "Ethics in Technology: (Guest Editors') Introduction," CPSR Newsletter, Vol. 18, No. 2, Spring 2000.

Burk, Dan L. Copyright Functions and Patentable Speech," Communications of the ACM, Vol. 44, No. 2, February 2001, pp. 69-76.

Bynum, Terrell Ward and Petra Schubert. "How to do Computer Ethics," in Proceedings of the Conference on Computer Ethics: Philosophical Enquiry. (edited by Jeroen van den Hoven). Rotterdam, The Netherlands: Erasmus University Press, 1997, pp. 29-43.

Bynum, Terrell Ward and Simon Rogerson. "Introduction and Overview: Global Information Ethics," Science and Engineering Ethics, Vol. 2, No. 2, April 1996. Forthcoming in S. Rogerson and T. W. Bynum. (eds.) Information Ethics: A Reader. Cambridge, MA: Blackwell Publishers, 1998.

Bynum, Terrell Ward, ed. Cyberspace, Privacy and the Future of Computer Ethics. Special Issue of Ethics and Information Technology, Vol. 3, No. 2, 2001. (Dordrecht, The Netherlands). ISSN: 1388-1957. Includes guest editor's introduction and six papers from the 15th Annual Conference on Computing and Philosophy (CAP 2000), Carnegie Mellon University, Pittsburgh, PA (USA), September 9-11, 2000.

Bynum, Terrell Ward. "A Very Short History of Computer Ethics," APA (American Philosophical Association) Newsletter on Philosophy and Computers, Vol. 99, No. 2, Spring 2000, 164-165.

Caftori, Netiva and Alfred Bork. "Computers and Major Ethical Problems in Our Society," CPSR Newsletter, Vol. 18, No. 2, Spring 2000.

Camp, Jean. "Web Security and Privacy: An American Perspective, in Proceedings of the Conference on Computer Ethics: Philosophical Enquiry. (Edited by Jeroen van den Hoven). Rotterdam, The Netherlands: Erasmus University Press, 1997, pp. 44-61.

Camp, Tracy. "The Incredible Shrinking Pipeline," Communications of the ACM, Vol. 40, No. 10, October 1997, pp. 103-110.

Castelfranchi, Christiano. "Artificial Liars: Why Computers Will (Necessarily) Deceive Us and Each Other," Ethics and Information Technology, Vol. 2, No. 2, 2000, pp. 113-119.

Caswell, Justine and Timothy Bickmore. "External Manifestations of Trustworthiness in the Interface," Communications of the ACM, Vol. 43, No. 12, December 2000, pp. 50-56.

Cavanaugh, Thomas. "Genetics and Fair Use Codes for Electronic Information," Ethics and Information Technology, Vol. 2, No. 2, 2000, pp. 121-123.

Chambers, Jean E. "Privacy, Sex, and Norms: An Indirect Control Definition," Journal of Information Ethics, Vol. 9, No. 1, Spring 2000.

Cimagalli, Valerio and Marco Balsi, eds. University as a Bridge Between Technology and Society. Special Issue of IEEE Technology and Society. (New York: IEEE Press). ISSN: 0278-0097. Vol. 20, No. 2, 2001. Includes a guest editors' introduction and four papers from the International Symposium on Technology and Society (ISTAS 2000) Conference, Rome, Italy, September 6-8, 2000.

Cohen, Richard A. "Ethics and Cybernetics: Levinasian Reflections," Ethics and Information Technology, Vol. 2, No. 1, 2000, pp. 27-35.

Connolly, Frank W. "A Call for a Statement of Expectations for the Global Information Infrastructure," Science and Engineering Ethics, Vol. 2, No. 2, April 1996. Forthcoming in S. Rogerson and T. W. Bynum. (eds.) Information Ethics: A Reader. Cambridge, MA: Blackwell Publishers, 1998.

Coopersmith, Jonathan. "Pornography, Videotape, and the Internet," IEEE Technology and Society Magazine, Vol. 19, No. 1, Spring 2000, pp. 27-34.

Crabtree, Andy, John A. Hughes, Jon O'Brien, and Tom Rodden. "On the Social Organization of Space and the Design of Electronic Landscapes," Techne: Journal of the Society for Philosophy and Technology, Vol. 5, No. 2, Winter 2000.

Crowston, Kevin and Marie Williams. "Reproduced and Emergent Genres of Communication on the World Wide Web," The Information Society: An International Journal, Vol. 16, No. 3, 2000.

Cushman, Reid. "Information and Medical Ethics: Protecting Patient Privacy," IEEE Technology and Society Magazine. Vol. 15, No. 3, Fall 1996, pp. 32-39.

DaCosta, Ivan Marques. "Virtual Reality and Radical Exclusion," in Proceedings of the Conference on Computer Ethics: Philosophical Enquiry. (Edited by Jeroen van den Hoven). Rotterdam, The Netherlands: Erasmus University Press, 1997, pp. 62-73.

Dahlbom, Bo and Lars Mathiassen. "The Future of Our Profession," Communications of the ACM, Vol. 40, No. 6, June 1997, pp. 80-89.

Dalton, Chris and Tse Huong Choo. "An Operating System Approach to Securing E-Services," Communications of the ACM, Vol. 44, No. 2, February 2001, pp. 58-65.

Damodaran, Leela. "User Involvement in the Systems Design Process -- a Practical Guide for Users," Behaviour and Information Technology. Vol. 15, No. 6, November-December 1996, pp. 363-377.

Davis, Jennifer C. "Protecting Privacy in the Cyberera." IEEE Technology and Society Magazine, Vol. 19, No. 2, Summer 2000, pp. 10-22.

Davis, Randall. "The Digital Dilemma," Communications of the ACM, Vol. 44, No. 2, February 2001, pp. 77-83.

Day, Peter and Doug Schuler. "Shaping the Network Society: (Guest Editors') Introduction," CPSR Newsletter, Vol. 18, No. 3, Summer 2000.

Debrock, Guy. "Information and Responsibility," in Proceedings of the Conference on Computer Ethics: Philosophical Enquiry. (Edited by Jeroen van den Hoven). Rotterdam, The Netherlands: Erasmus University Press, 1997, pp. 74-83.

Denning, Peter. "The Profession of IT: Who Are We?" Communications of the ACM, Vol. 44, No. 2, February 2001, pp. 15-19.

Dertouzos, Michael L. "Creating the People's Computer," Technology Review, April 1997, pp. 20-28.

Dorbolo, Jon. "Distributing the Computational Turn," APA (American Philosophical Association) Newsletter on Philosophy and Computers, Vol. 00, No. 1, Fall 2000, pp. 17-18.

Duncan, George T. "Is My Research Ethical?" Communications of the ACM. Vol. 39, No 12, December 1996, pp. 67-68.

Duncker, Elke. "How 'LINCs' Were Made: Alignment and Exclusion in American Medical Informatics," The Information Society: An International Journal, Vol. 16, No. 3, 2000.

Epstein, Richard G. "The Great Brain Robbery," Computers and Society, Vol. 27, No. 4, December 1997, pp. 40, 35-39.

Epstein, Richard G. "The Wheel," Computers and Society, Vol. 27, No. 2, June 1997, pp. 8-13.

Fairwether, N. Ben. "Moral Dilemmas and Issues of telework for Disabled People," in Proceedings of the Conference on Computer Ethics: Philosophical Enquiry. (Edited by Jeroen van den Hoven). Rotterdam, The Netherlands: Erasmus University Press, 1997, pp. 84-93

Floridi, Luciano, ed. Computer Ethics. Special Issue of Etica & Politica. (Dipartimento di Filosofia - Universita di Trieste). Vol. 1, No. 2. Includes six articles and an introduction by the guest editor. Available at http;//www.units.it/~dipfilo/etica_e_politica/1999/homepage.html.

Florman, Samuel. "The Humane Engineer," Technology Review. Vol. 100, No. 3, April 1997, p. 63.

Foerst, Anne. "Ethical Questions Regarding Humanoid Robots," in Proceedings of the Conference on Computer Ethics: Philosophical Enquiry. (Edited by Jeroen van den Hoven). Rotterdam, The Netherlands: Erasmus University Press, 1997, pp. 94-102.

Forbes, Barry. "From the Town Meeting to the World Wide Web: Creating and Maintaining Democracy in the Telecommunications Age," CPSR Newsletter, Vol. 15, No. 3, Summer 1997, pp. 1, 3-5.

Friedman, Batya, Peter H. Kahn, Jr., and Daniel C. Howe. "Trust Online," Communications of the ACM, Vol. 43, No. 12, December 2000, pp. 34-40

Froomkin, A. Michael. "The Collision of Trademarks, Domain Names, and Due Process in Cyberspace," Communications of the ACM, Vol. 44, No. 2, February 2001, pp. 91-97.

Fulda, Joseph S. "Data Mining and Privacy," Albany Law Journal of Science & Technology, Vol. 11, Fall 2000.

Fulda, Joseph S. "From Data to Knowledge: Implications of Data Mining," Computers and Society, Vol. 27, No. 4, December 1997, p. 28.

Fulda, Joseph S. "The Appearance of Impropriety," Computers and Society, Vol. 26, No. 4, December 1997, pp. 22-24.

Ghosh, Anup K. and Tara M. Swaminatha. "Software Security and Privacy Risks in Mobile E-Commerce," Communications of the ACM, Vol. 44, No. 2, February 2001, pp. 51-57.

Goggin, Gerard and Christopher Newell. "An End to Disabling Policies?: Towards Enlightened Universal Service," The Information Society: An International Journal, Vol. 16, No. 2, 2000.

Goldhaber, Michael H. "The Attention Economy as the Natural Economy of Cyberspace," CPSR Newsletter, vol. 15, No. 4, Fall 1997, pp. 16-17.

Goodrum, Abby A. and Mark Manion. "The Ethics of Hacktivism," Journal of Information Ethics, Vol. 9, No. 2, Winter 2000.

Gopal, Ram D. and G. Lawrence Sanders. "Global Software Piracy: You Can't Get Blood Out of a Turnip," Communications of the ACM, Vol. 43, No. 9, September 2000, pp. 82-90.

Gorniak-Kocikowska, Krystyna. "The Computer Revolution and the Problem of Global Ethics," Science and Engineering Ethics, Vol. 2, No. 2, April 1996. Forthcoming in S. Rogerson and T. W. Bynum. (eds.) Information Ethics: A Reader. Cambridge, MA: Blackwell Publishers, 1998.

Gotterbarn, Don and Robert Reiser. "Ethics Activities in Computer Science Courses: Goals and Issues," Computers and Society, Vol. 27, No. 1, March 1997, pp. 10-15.

Gotterbarn, Don; Miller, Keith; and Simon Rogerson. "Software Engineering Code of Ethics," Communications of the ACM, Vol. 40, No. 11, November 1997, pp. 110-118.

Gotterbarn, Donald and Simon Rogerson. "The Evolution of the Uniqueness Revolution (What's So Special About Moral Problems in IT) ," in Proceedings of the Conference on Computer Ethics: Philosophical Enquiry. (Edited by Jeroen van den Hoven). Rotterdam, The Netherlands: Erasmus University Press, 1997, pp. 103-109.

Grodzinsky, Frances and John Berkman. "Ask Miss Netiquette," in Proceedings of the Conference on Computer Ethics: Philosophical Enquiry. (Edited by Jeroen van den Hoven). Rotterdam, The Netherlands: Erasmus University Press, 1997, pp. 112-123.

Gronlind, Ake. "Democracy in an IT-Framed Society: (Guest Editor's) Introduction," Communications of the ACM, Vol. 44, No. 1, January 2001, pp. 22-26.

Guenther, Charles. "Teaching Social Responsibility," IEEE Technology and Society Magazine, Vol. 16, No. 3, Fall 1997, pp. 15-21.

Gunkel, David. "The Empire Strikes Back Again: The Social Politics of the Internet," Computers and Society, Vol. 27, No. 4, December 1997, pp. 18-21.

Halbert, Deborah. "Discourses of Danger and the Computer Hacker," The Information Society: An International Journal. Vol. 13, No. 4, 1997, pp. 329-360.

Harrison, Tom. "A Chicken in Every Pot, a Net Link in Every Classroom," Computers and Society, Vol. 27, No. 2, June 1997, pp. 32-34.

Harvey, Charles W. and Carol Zibell. "Shrinking Selves in Synthetic Sites: On Personhood in a Walt Disney World," Ethics and Information Technology, Vol. 2, No. 1, 2000, pp. 19-25.

Hauptman, Robert. "Editorial: Ethical Inadequacies and Radical Solutions," Journal of Information Ethics, Vol. 9, No. 1, Spring 2000.

Herkert, Joseph R., ed. Engineering Ethics. Special Issue of IEEE Technology and Society. (New York: IEEE Press). ISSN: 0278-0097. This special issue is divided into two parts. Part I, entitled "Engineering Ethics: Continuing and Emerging Issues - Analytical Framework (Vol. 20, No. 3, 2001), includes a guest editor's introduction and five papers. Part II, entitled "Is Engineering Ethics Optional?: Continuing and Emerging Issues - Education" (Vol. 20, No. 4, 2001), includes a guest editor's introduction and four papers.

Hert, Phillipe. "The Dynamics of Online Interactions in a Scholarly Debate," The Information Society: An International Journal. Vol. 13, No. 4, 1997, pp. 329-360.

Hoffman, Lance J. and Lorrie Cranor. "Internet Voting for Public Officials: (Guest Editors') Introduction," Communications of the ACM, Vol. 44, No. 1, January 2001, pp. 69-71.

Huff, Chuck, et al. "Integrating the Ethical and Social Context of Computing into the Computer Science Curriculum," Science and Engineering Ethics, Vol. 2, No. 2, April 1996. Forthcoming in S. Rogerson and T. W. Bynum. (eds.) Information Ethics: A Reader. Cambridge, MA: Blackwell Publishers, 1998.

Huff, Chuck. "The Internet is a Fine Place for Women," Computers and Society, Vol. 27, No. 4, December 1997, p. 27.

Huff, Chuck. "Unintentional Power in the Development of Computer Systems," Computers and Society, Vol. 26, No. 4, December 1997, pp. 6-9.

Hughes, Donna M. "The Internet and Sex Industries: Patterns in Global Sexual Exploitation," IEEE Technology and Society Magazine, Vol. 19, No. 1, Spring 2000, pp. 35-42.

Imbo, Samuel. "The Cyberspace Metaphor of Community," in Proceedings of the Conference on Computer Ethics: Philosophical Enquiry. (Edited by Jeroen van den Hoven). Rotterdam, The Netherlands: Erasmus University Press, 1997, pp. 136-146.

Introna, Lucas D. and Helen Nissenbaum. "Shaping the Web: Why the Politics of Search Engines Matters," The Information Society: An International Journal, Vol. 16, No. 3, 2000.

Introna, Lucas D., ed. Ethics and the Politics of Electronic Surveillance. Special Issue of Ethics and Information Technology, Vol. 3, No. 3, 2001. (Dordrecht, The Netherlands). ISSN: 1388-1957. Includes editor's introduction and six invited papers by international experts on ethical, social, and political issues pertaining to privacy and surveillance issue in ICT.

Introna, Lucas. "Ethics in the Information Age: Hyperreality and the Future of Obligation," in Proceedings of the Conference on Computer Ethics: Philosophical Enquiry. (Edited by Jeroen van den Hoven). Rotterdam, The Netherlands: Erasmus University Press, 1997, pp. 136-146

Jewett, Tom. "Open Location," Computers and Society, Vol. 26, No. 4, December 1997, pp. 36-38.

Johnson, Deborah G. "Ethics Online," Communications of the ACM. Vol. 40, No. 1, January 1997, pp. 60-65.

Johnson, Deborah G. "Is the Global Information Infrastructure a Democratic Technology?" Computers and Society, Vol. 27, No. 3, September 1997, pp. 20-26.

Johnson, Deborah G., James H. Moor, and Herman T. Tavani, eds. Computer Ethics: Philosophical Enquiry. Special Issue of Ethics and Information Technology, Vol. 3, No. 1, 2001. (Dordrecht, The Netherlands). ISSN: 1388-1957. Includes guest editors' introduction and six papers from the 3rd Conference on Computer Ethics: Philosophical Enquiry (CEPE 2000), Dartmouth, College, Hanover, NH, July 14-16, 2000.

Jones, Sara, Mark Wilkens, Philip Morris, and Marcelo Masera. "Trust Requirements in E-Business," Communications of the ACM, Vol. 43, No. 12, December 2000, pp. 80-87.

Joshi, James B. D., Walid G. Aref, Arif Ghafoor, and Eugene H. Spafford. "Security Models for Web-based Applications," Communications of the ACM, Vol. 44, No. 2, February 2001, pp. 38-44.

Katz, James and Philip Aspden. "A Nation of Strangers?" Communications of the ACM, Vol. 40, No. 12, December 1997, pp. 81-86.

Kennedy, Ronan, "Open Location," Computers and Society, Vol. 27, No. 4, December 1997, p. 25.

Kline, Ronald R. "The Paradox of 'Enginerering Science,'" IEEE Technology and Society Magazine, Vol. 19, No. 4, Winter 2000/2001, pp. 19-25.

Kling, Rob. "Learning About Information Technologies and Social Change: The Contribution of Social Informatics," The Information Society: An International Journal, Vol. 16, No. 3, 2000.

Kocikowski, Andrzej. "Geography and Computer Ethics: An Eastern European Perspective," Science and Engineering Ethics, Vol. 2, No. 2, April 1996. Forthcoming in S. Rogerson and T. W. Bynum. (eds.) Information Ethics: A Reader. Cambridge, MA: Blackwell Publishers, 1998.

Koehler, Wallace C. and J. Michael Pemberton. "A Search for Core Values: Towards a Model of Ethics for Information Professionals," Journal of Information Ethics, Vol. 9, No. 1, Spring 2000.

Koepsell, David. R. "An Emerging Ontology of Jurisdiction in Cyberspace," Ethics and Information Technology, Vol. 2, No. 2, 2000, pp. 99-104.

Kolcaba, Raymond. "Angelic Machines: A Philosophical Dialoque (2)," Ethics and Information Technology, Vol. 2, No. 1, 2000, pp. 11-17.

Kolcaba, Raymond. "Loss of the World: A Philosophical Dialogue (1)," Ethics and Information Technology, Vol. 2, No. 1, 2000, pp. 3-9.

Kramer, Kenneth and Jason Dedrick, eds. Impacts of Economic Liberalization on IT Production and Use. Special Issue of The Information Society: An International Journal (Taylor and Francis Publishers). ISSN: 0197-2243). Vol. 17, No. 2, 2001. Includes case studies of four different developing countries' responses to the forces of liberalization. Also includes a guest editors' introduction.

Kreie, Jennifer and Timothy Paul Cronan. "Making Ethical Decisions." Communications of the ACM, Vol. 43, No. 12, December 2000, pp. pp. 66-72.

Krethmer, Susan and Nancy Kranich. "The Seattle Statement: Moving the Agenda Further," CPSR Newsletter, Vol. 18, No. 3, Summer 2000.

Ladd, John, "Ethics and the Computer World," Computers and Society, Vol. 27, No. 3, September 1997, pp. 8-13.

Lamb, Roberta. Who Uses Information Resources? Interorganizational Incentives for Gathering Data and Going Online," Computers and Society, Vol. 27, No. 4, December 1997, p. 29.

LaPorte, Todd M., Chris C. Demchack, and Christian Friis. "Webbing Governance: Global Trends Across National-Level Public Agencies," Communications of the ACM, Vol. 44, No. 1, January 2001, pp. 63-68.

Lievrouw, Leah A. "The Information Environment and Universal Service," The Information Society: An International Journal, Vol. 16, No. 2, 2000.

Lipinski, Thomas A. and Johannes J. Britz. "Rethinking the Ownership of Information in the 21st Century: Ethical Implications," Ethics and Information Technology, Vol. 2, No. 1, 2000, pp. 49-71.

Loader, Brian and Leigh Keeble. "Electronic Community Networks: Women's Place, Women's Space," CPSR Newsletter, Vol. 18, No. 3, Summer 2000.

Lucena, Juan C. "Women in Engineering: Politics in the Making of a Statistical Category," IEEE Technology and Society Magazine, Vol. 19, No. 1, Spring 2000, pp. 6-14.

Lynch, William. "Teaching Engineering Ethics in the United States," IEEE Technology and Society Magazine, Vol. 16, No. 4, Winter 1997/1998, pp. 27-36.

Madon, Shirin. "The Information Based Global Economy & Socio-Economic Development: The Case of Bangalore," The Information Society: An International Journal. Vol. 13, No. 3, 1997, pp. 227-244.

Maner, Walter. "Unique Ethical Problems in Information Technology," Science and Engineering Ethics, Vol. 2, No. 2, April 1996. Forthcoming in S. Rogerson and T. W. Bynum. (eds.) Information Ethics: A Reader. Cambridge, MA: Blackwell Publishers, 1998.

Markowitz, Judith A. "Voice Biometrics," Communications of the ACM, Vol. 43, No. 9, September 2000, pp. 66-73.

Martin, Brennon M. "Competition, Interconnection and Universal Service," CPSR Newsletter, Vol. 15, No. 2, Spring 1997, pp. 5, 6, 8.

Martin, C. Dianne; Huff, Chuck; Gotterbarn, Donald and Keith Miller. "Implementing the Tenth Strand in the CS Curriculum," Communications of the ACM. Vol. 39, No 12, December 1996, pp. 75-84.

Martin, C. Dianne; Reagle, Joseph; Evans, Michael; and Pat Shareck. "An Alternative to Government Regulation and Censorship," Computers and Society, Vol. 26, No. 4, December 1997, pp. 10-14.

McCarthy, John. "Phenomenal Data Mining," Communications of the ACM, Vol. 43, No. 8, August 2000, pp. 75-79.

McIver, Bill. "Access to Cyberspace as a Human Right," CPSR Newsletter, Vol. 18, No. 3, Summer 2000.

Metha, Michael D. and Dwaine Plaza. "Content Analysis of Pornographic Images Available on the Internet," The Information Society: An International Journal. Vol. 13, No. 2, 1997, pp. 153-161.

Michelfelder, Dianne P. "Our Moral Condition in Cyberspace" Ethics and Information Technology, Vol. 2, No. 3, 2000, pp. 147-152.

Minsky, Marvin. "Commonsense-Based Interfaces," Communications of the ACM, Vol. 43, No. 8, August 2000, pp. 66-74.

Mitcham, Carl. "Justifying Public Participation in Technical Decision Making," IEEE Technology and Society Magazine. Vol. 16, No. 1, Spring 1997, pp. 40-46.

Mohen, Joe and Julia Glidden. "The Case for Internet Voting," Communications of the ACM, Vol. 44, No. 1, January 2001, p. 72.

Moor, James H. "Reason, Relativity, and Responsibility in Computer Ethics," Forthcoming in S. Rogerson and T. W. Bynum. (eds.) Information Ethics: A Reader. Cambridge, MA: Blackwell Publishers, 1998.

Moor, James H. "The Computational Turn," APA Newsletter on Philosophy and Computers, Vol. 97, No. 1, Fall 1997, p. 28.

Moor, James H. "Towards a Theory of Privacy in the Information Age," Computers and Society, Vol. 27, No. 3, September 1997, pp. 27-32.

Moores, Trevor and Gupreet Dhillon. "Software Piracy: A View from Hong Kong," Communications of the ACM, Vol. 43, No. 12, December 2000, pp. 88-93.

Moriarty, Gene. "The Engineering Enterprise: Conditioned and Conditioning," IEEE Technology and Society Magazine, Vol. 19, No. 3, Fall 2000, pp. 35-37. [A review essay of Joseph Herkert's Social, Ethical, and Policy Implications of Engineering (see Section 1 of this bibliography for information about that book)].

Moriarty, Gene. "The Place of Engineering and the Engineering of Place," Techne: Journal of the Society for Philosophy and Technology, Vol. 5, No. 2, Winter 2000.

Morton, David. "Historical, Societal, and Professional Perspectives on Women and Technology: (Guest Editor's) Introduction," IEEE Technology and Society Magazine, Vol. 19, No. 1, Spring 2000, pp. 4-5.

Mosco, Vincent. Forum: "Myth-ing Links: Power and Community on the Information Highway," The Information Society: An International Journal. Vol. 14, No. 1, 1998, forthcoming.

Mowshowitz, Abbe. "Virtual Organization," Communications of the ACM, Vol. 40, No. 9, September 1997, pp. 30-37.

Mueller, Milton. "Universal Service and the Telecommunication Act: Myth Made Law," Communications of the ACM. Vol. 40, No. 3, March 1997, pp. 39-47.

Neumann, Peter G. "Risks of Anonymity," Communications of the ACM. Vol. 39, No. 12, December 1996, p. 162.

Nilsson, Erik, ed. Getting the Chad Out: Elections, Technology, and Reform. Special issue of the CPSR Newsletter. (Palo Alto, CA: CPSR Press). Vol. 19, No. 1, 2001. Includes five articles and an introduction by the guest editor. Available at http//www.cpsr.org/publications/issues/2001/Winter2001/index.html.

Nissenbaum, Helen and D. Walker. "Will Computers Dehumanize Education?" Forthcoming in Technology in Society.

Nissenbaum, Helen. "Can We Protect Privacy in Public?" in Proceedings of the Conference on Computer Ethics: Philosophical Enquiry. (Edited by Jeroen van den Hoven). Rotterdam, The Netherlands: Erasmus University Press, 1997, pp. 147-159.

Nissenbaum, Helen. "Values in the Design of a Computer System," Computers and Society, Forthcoming in Vol. 28, No. 1, March 1998.

O'Brien, Ray and Andrew Clement. "The Association for Progressive Communications and the Networking of Global Civil Society: APC at the 1992 Earth Summit," CPSR Newsletter, Vol. 18, No. 3, Summer 2000.

O'Neal, Ray H. "Simulation Culture," Computers and Society, Vol. 27, No. 2, June 1997, p. 35.

O'Riain, Sean. "The Birth of a Celtic Tiger," Communications of the ACM, Vol. 40, No. 3, March 1997, pp. 11-16.

O'Rourke, Maureen A. "Is Virtual Trespass an Apt Analogy?" Communications of the ACM, Vol. 44, No. 2, February 2001, pp. 98-103.

Olson, Judith S. and Gary M. Olson. "i2i Trust in E-Commerce," Communications of the ACM, Vol. 43, No. 12, December 2000, pp. 41-44.

Oppenheimer, Todd. "The Computer Delusion," The Atlantic Monthly, July 1997, pp. 45-48, 50-56, 61-62.

Page, Carl and Chris Gray, eds. Star Wars Still Threatens Us. Special issue of the CPSR Newsletter. (Palo Alto, CA: CPSR Press). Vol. 19, No. 2, 2001. Includes seven articles and an introduction by the guest editors. Available at http//www.cpsr.org/publications/issues/2001/Spring2001/index.html.

Page, Carl. "Star Wars -- Down but Not Out: Why Star Wars Still Matters," CPSR Newsletter. Vol. 14, No. 3, Fall 1996, pp. 1, 4-10.

Paton, Jason W. "Protecting Privacy in Public? Surveilance Technologies and the Value of Public Spaces," Ethics and Information Technology, Vol. 2, No. 3, 2000, pp. 181-187.

Petrazzini, Ben A. and Girijia Krishnaswamy. "Socioeconomic Implications of Telecommunication Liberalization: India and the International Context." The Information Society: An International Journal. Vol. 14, No. 1, 1998, forthcoming.

Phillips, Deborah M. and Hans A. von Spakovsky. "Guaging the Risks of Internet Elections," Communications of the ACM, Vol. 44, No. 1, January 2001, pp. 73-85.

Poster, Mark. Introduction to "A Magna Carta for the Knowledge Age: Cyberspace and the American Dream," The Information Society: An International Journal. Vol. 12, No. 3, July-September 1996, p. 293. (Three articles that contribute to this "Forum" topic are also included in that issue of TIS, pp. 295-314.)

Preston, David and Keith Taylor. Professionals and Experts: Adam (Smith) or Eve?" Computers and Society, Vol. 27, No. 2, June 1997, pp. 14-19.

Preston, David. "Can Business Ethics Really Exist?" Computers and Society, Vol. 27, No. 1, March 1997, pp. 6-9.

Preston, Paschal and Roderick Flynn. "Rethinking Universal Service: Citizenship, Consumption Norms and the Telephone," The Information Society: An International Journal, Vol. 16, No. 2, 2000.

Prosser, Brian P. and Andrew Ward. "Kierkegaard and the Internet: Existential Reflections on Education and Community," Ethics and Information Technology, Vol. 2, No. 3, 2000, pp. 167-180.

Rapaport, Richard. "Singapore Sting," Forbes ASAP, April 7, 1997, pp. 85-89.

Resnick, Paul and James Miller. "PICS: Internet Access Controls Without Censorship," Communications of the ACM. Vol. 39, No. 10, October 1996, pp. 87-93.

Resnick, Paul, Richard Zeckhauser, Eric Friedman, and Ko Kuwabara. "Reputation Systems," Communications of the ACM, Vol. 43, No. 12, December 2000, pp. 45-49.

Rindfleisch, Thomas C. "Privacy, Information Technology, and Health Care," Communications of the ACM, Vol. 40, No. 8, August 1997, pp. 92-100.

Robison, Wade. "Privacy and Appropriation," in Proceedings of the Conference on Computer Ethics: Philosophical Enquiry. (Edited by Jeroen van den Hoven). Rotterdam, The Netherlands: Erasmus University Press, 1997, pp. 160-168.

Romm, Celia T. and Nava Pliskin. "Battle of the Sexes on E-Mail - Or is it?" The Information Society: An International Journal. Vol. 13, No. 3, 1997, pp. 207-226.

Rosenbloom, Andrew. "Trusting Technology: (Guest Editor's) Introduction," Communications of the ACM, Vol. 43, No. 12, December 2000, pp. 30-33.

Rundensteiner, Elke A., Andreas Koeller, and Xin Zhang. "Maintaining Data Warehouses Over Changing Information Sources," Communications of the ACM, Vol. 43, No. 6, June 2000, pp. 57-63.

Samuelson, Pamela. "Intellectual Property for an Information Age: (Guest Editor's) Introduction," Communications of the ACM, Vol. 44, No. 2, February 2001, pp. 66-68.

Samuelson, Pamela. "Legal Protection for Database Contents," Communications of the ACM. Vol. 39, No. 12, December 1996, pp. 17-23.

Sanders, Diana and Sonya Shepard. "Ethical Dilemmas of Intellectual Property Policies at SREB Institutions," CPSR Newsletter, Vol. 18, No. 2, Spring 2000.

Sandvig, Christian. "Understanding a Domain Name Policy Gone Wrong," CPSR Newsletter, Vol. 18, No. 3, Summer 2000.

Sawhney, Harmeet ed. Universal Service. Special Issue of The Information Society: An International Journal (Taylor and Francis Publishers). ISSN: 0197-2243). Vol. 16, No. 2, 2000. Includes six research articles on issues related to rationale, subsidies and beneficiaries, and politics of universal service. Also includes four forum discussions on the topic of universal service, as well as a guest editor's introduction.

Sawhney, Harmeet. "Universal Service: Separating the Grain of Truth from the Proverbial Chaff," The Information Society: An International Journal, Vol. 16, No. 2, 2000.

Schechter, P. B. "Using Cost Proxy Models with Census Bureau Data to Evaluate Universal Funding Operations," The Information Society: An International Journal, Vol. 16, No. 2, 2000.

Schement, Jorge Reina and Scott C. Forbes. "Identifying Temporary and Permanent Gaps in Unversal Service," The Information Society: An International Journal, Vol. 16, No. 2, 2000.

Schneider, Volker. "Evolution in Cyberspace: The Adaptation of National Videotaped Systems to the Internet," The Information Society: An International Journal, Vol. 16, No. 4, 2000.

Schneiderman, Ben. "Designing Trust into Online Experiences," Communications of the ACM, Vol. 43, No. 12, December 2000, pp. 57-59.

Schneiderman, Ben. "The Limits of Speech Recognition," Communications of the ACM, Vol. 43, No. 9, September 2000, pp. 63-65.

Schneiderman, Ben. "Universal Usability," Communications of the ACM, Vol. 43, No. 5, May 2000, pp. 84-92.

Schneier, Bruce. "Cryptography, Security, and the Future," Communications of the ACM. Vol. 40, No. 1, January 1997, p. 138.

Schoder, Detlef and Pai-Ling Yin. "Building Firm Trust Online," Communications of the ACM, Vol. 43, No. 12, December 2000, pp. 73-79.

Schuler, Doug. "Computer Professionals and the Next Culture of Democracy," Communications of the ACM, Vol. 42, No. 1, January 2001, pp. 52-57.

Schuler, Doug. "What is the Public Sphere?" CPSR Newsletter, Vol. 18, No. 3, Summer 2000.

Shade, Leslie Regan. "A Gendered Perspective on Access to the Information Infrastructure," The Information Society: An International Journal. Vol. 14, No. 1, 1998, forthcoming.

Shade, Leslie Regan. "The Information Highway Should be Paved With Public Good..." Computers and Society, Vol. 26, No. 4, December 1997, pp. 31-34.

Shallit, Jeffrey and Harriet Lyons. "Social Issues in Canada's Information Society," The Information Society: An International Journal. Vol. 13, No. 2, 1997, pp. 147-151.

Shields, Mark A. "Lost in Cyberspace? Virtual Learning and Higher Education," Social Science Computer Review. Vol. 14, No. 4, Winter 1996, pp. 410-422.

Shneiderman, Ben. "Between Hope and Fear," Communications of the ACM. Vol. 40, No. 2, February 1997, pp. 59-62. (A special issue of CACM entitled "The Next 50 Years" that includes several interesting articles. A number of articles included in the "Societal Dimensions" section of that special issue -- e.g., articles by J. P. Barlow, Steve Talbott, Richard Stallman, Theodor Nelson, and others -- will also be of interest to many readers.)

Sipes-Metzler, Paige R. "Are Technology and Ethics Out of Step? Oregon's Experience," IEEE Technology and Society Magazine. Vol. 15, No. 3, Fall 1996, pp. 15-16.

Skogerbo, Eli and Tanja Storsul. "Prospects for Expanded Universal Service in Europe: The Cases of Denmark, the Netherlands, and Norway," The Information Society: An International Journal, Vol. 16, No. 2, 2000.

Smith, Richard M., Michael Brittain, Ivan Fetch, and Halin Wu. "The Privacy Practices of Web Browser Extensions," Communications of the ACM, Vol. 44, No. 2, February 2001, pp. 45-50.

Snellen, Grace. "ICTs, Bureaucracies, and the Future of Democracy," Communications of the ACM, Vol. 44, No. 1, January 2001, pp. 45-48.

Sojka, Jacek. "Business Ethics and Computer Ethics: The View From Poland," Science and Engineering Ethics, Vol. 2, No. 2, April 1996. Forthcoming in S. Rogerson and T. W. Bynum. (eds.) Information Ethics: A Reader. Cambridge, MA: Blackwell Publishers, 1998.

Soloway, Elliot and Raven Wallace. "Does the Internet Support Student Inquiry," Communications of the ACM, Vol. 40, No. 5, May 1997, pp. 11-16.

Sopinka, John. "Freedom of Speech and Privacy in the Information Age," The Information Society: An International Journal. Vol. 13, No. 2, 1997, pp. 171-184.

Special issue of the CPSR Newsletter. (Palo Alto, CA: CPSR Press). Vol. 18, No. 4, 2000. Includes five articles and an introduction by the guest editor. Available at http//www.cpsr.org/publications/issues/2000/Fall2000/index.html.

Spencer, Henry. "Age of Uncontrolled Information Flow," The Information Society: An International Journal. Vol. 13, No. 2, 1997, pp. 163-170.

Strover, Sharon. "The First Mile," The Information Society: An International Journal, Vol. 16, No. 2, 2000.

Tang, Puay. "How Electronic Publishers are Protecting Against Privacy: Doubts about Technical Systems of Protection," The Information Society: An International Journal. Vol. 14, No. 1, 1998, forthcoming.

Tavani, Herman T. "Computer Ethics: Current Perspectives and Resources," APA (American Philosophical Association) Newsletter on Philosophy and Computers, Vol. 99, No. 2, Spring 2000, 166-170.

Tavani, Herman T. "Internet Search Engines and Personal Privacy," in Proceedings of the Conference on Computer Ethics: Philosophical Enquiry. (Edited by Jeroen van den Hoven). Rotterdam, The Netherlands: Erasmus University Press, 1997, pp. 169-178.

Tavani, Herman T. "Journals and Periodicals on Computers, Ethics, and Society II:: Fifty Publications of Interest," Computers and Society, Vol. 27, No. 3, September 1997, pp. 39-43.

Tavani, Herman T. "Journals and Periodicals on Computers, Ethics, and Society: A Comparative Review of Six Publications," Computers and Society, Vol. 27, No. 2, June 1997, pp. 20-26.

Tavani, Herman T. "PETs, E-Commerce, and Ethics," CPSR Newsletter, Vol. 18, No. 2, Spring 2000.

Tavani, Herman T. "Privacy-Enhancing Technologies as a Panacea for Online Privacy Concerns: Some Ethical Considerations," Journal of Information Ethics, Vol. 9, No. 1, Winter 2000.

Tavani, Herman T. "Selecting a Computer Ethics Coursebook: A Comparative Study of Five Recent Works," Computers and Society, Vol. 26, No. 4, December 1996, pp. 15-21.

Thajchayapong, Pairash, et al. "Social Equity and Prosperity: Thailand IT Policy into the 21st Century," The Information Society: An International Journal. Vol. 13, No. 3, 1997, pp. 265-286.

Turkle, Sherry. "Seeing Through Computers: Education in a Culture of Simulation," The American Prospect, No. 41, March-April, 1997, pp. 76-82.

Ulsaner, Eric M. "Social Capital and the Net," Communications of the ACM, Vol. 43, No. 12, December 2000, pp. 60-65.

van den Hoven, Jeroen, "Privacy and the Varieties of Moral Wrong-Doing in the Information Age," Computers and Society, Vol. 27, No. 3, September 1997, pp. 33-37.

Viega, John, Tadayoshi Kohno, and Bruce Potter. "Trust (and Mistrust) in Secure Applications," Communications of the ACM, Vol. 44, No. 2, February 2001, pp. 31-77.

Volokh, Eugne. "Personalization and Privacy," Communications of the ACM, Vol. 43, No. 8, August 2000, pp. 84-87.

Walsh, John P. and Todd Bayma. "The Virtual College: Computer-Mediated Communication and Scientific Work," The Information Society: An International Journal. Vol. 12, No. 4, 1996, pp. 343-361.

Waskul, Dennis and Mark Douglass. "Cyberself: The Emergence of Self in Online Chat." The Information Society: An International Journal. Vol. 13, No. 4, 1997, pp. 375-398.

Watters, Carolyn; Conley, Marshall; and Cynthia Alexander. "The Digital Agora: Using Technology for Learning in the Social Sciences," Communications of the ACM, Vol. 41, No. 1, January 1998, pp. 51-57.

Weckert, John. "Intelligent Machines, Dehumanisation and Professional Responsibility," in Proceedings of the Conference on Computer Ethics: Philosophical Enquiry. (Edited by Jeroen van den Hoven). Rotterdam, The Netherlands: Erasmus University Press, 1997, pp. 179-192.

Weckert, John. "What is So Bad About Internet Content Regulation?" Ethics and Information Technology, Vol. 2, No. 2, 2000, pp. 105-111.

Wei, Sha Xin and Maja Kuzmanovic. "From Representation to Performance: Responsive Public Space," CPSR Newsletter, Vol. 18, No. 3, Summer 2000.

West, Cynthia. "Safety, Security, and Surveillance," CPSR Newsletter, Vol. 18, No. 2, Spring 2000.

Westfall, Joseph. "What is Cyberwoman?: The Second Sex in Cyberspace," Ethics and Information Technology, Vol. 2, No. 3, 2000, pp. 159-166.

Weston, Jay. "Old Freedoms and New Technologies: The Evolution of Community Networking," The Information Society: An International Journal. Vol. 13, No. 2, 1997, pp. 1195-201.

Whitcomb, Coralee, ed. Drawing the Blinds: Reconstructing Privacy in the Information Age.

Wigand, Rolf. "electronic Commerce: Public Policy Issues in a Communication Deregulated Environment," The Information Society: An International Journal. Vol. 13, No. 1, 1997, pp. 1-16.

Wilkinson, Margaret Ann. "Perceptual Differences in Approaches to Censorship: Information Intermediaries and the Implementation of Law," The Information Society: An International Journal. Vol. 13, No. 2, 1997, pp. 185-193.

Winner, Langdon. "Cyberlibertarian Myths and the Prospects for Community," Computers and Society, Vol. 27, No. 3, September 1997, pp. 14-19.

Winner, Langdon. "The Culture of Technology," Technology Review. Vol. 100, No. 2, February/March 1997, p. 69.

Wresch, William. "Haves and Have-Nots in the Information Age," EDUCOM Review, January/February 1997, pp. 52-59.

Wright, Marie and John Kakalik. "The Erosion of Privacy," Computers and Society, Vol. 27, No. 4, December 1997, pp. 22-26.

Wynn, Eleanor and James Katz. "Hyperbole Over Cyberspace: Self-Preservation and Social Boundaries in Internet Home Pages and Discourse," The Information Society: An International Journal. Vol. 13, No. 4, 1997, pp. 297-328.

Zelweitro, Joseph P. "The Politicization of Environmental Organizations Through the Internet," The Information Society: An International Journal. Vol. 14, No. 1, 1998, forthcoming.


3.0 Proceedings of Conferences and Symposia

Bynum, Terrell Ward, et al., eds. Proceedings of Ethicomp2001: The Fifth International Conference on the Social and Ethical Impacts of Information and Communication Technologies. 2 vols. Gdansk, Poland: Wydawnictwo Mikom Publishers, 2001; 678 pages. Includes seventy-four papers from the Ethicomp 2001 Conference, Technical University of Gdansk, Poland, June 18-20, 2001.

Chadwick, Ruth F., Lucas Introna, and Antonio Marturano, eds. Proceedings of the Conference on Computer Ethics: Philosophy Enquiry (CEPE 2001). Lancaster University, UK, 2001; 257 pages. Includes twenty-four papers presented at the CEPE 2001 Conference, Lancaster University, UK, December 14-16, 2001.

Cimagalli, Valerio and Marco Balsi, eds. Proceedings of the IEEE International Symposium on Technology and Society (ISTAS 2000); 302 pages. Los Alimitos, CA: IEEE Computer Society Press, 2000. Includes fifty-five papers, many of which are on the symposium's theme: "University as a Bridge from Technology to Society."

Demmers, Patricia A., ed. Science and Ethics: Proceedings of the 2000 Royal Society of Canada Symposium. Toronto, CA: University of Toronto Press, 2001; 152 pages. ISBN: 0-8020-8476-1. Includes six papers from the Royal Society of Canada's Symposium on Science and Ethics, November 18, Ottawa, Canada.

Kjell, Bradley, ed. Proceedings of the International Symposium on Technology and Society (ISTAS 2001). Los Alamitos, CA: IEEE Computer Society Press, 2001; 263 pages. ISBN: 0-7695-1209-7. Includes thirty papers from the ISTAS 2002 Conference, University of Connecticut, Stamford, July 6-7, 2001.

Mizutani, Masahiko and Helen Nissenbaum, eds. Proceedings of the First International Workshop on the Foundations of Information Ethics (FINE 1999). Kyoto University, Japan, 2000. Includes fifteen invited papers presented at the FINE 1999 Conference, Kyoto Japan, March 15-16, 1999. [Papers are printed in both English and Japanese versions.]

Ochi, Mitsugu, Masashi Tsuboi, and Yuta Goto, eds. Proceedings of the Second International Workshop on the Foundations of Information Ethics (FINE 2001). Hiroshima, Japan, 2002. Includes fourteen invited papers on the theme "How Can We Teach Computer Ethics Effectively at School?", which were presented at the FINE 2001 Conference, Hiroshima, Japan, February 27-28, 2001. [Papers are printed in both English and Japanese versions.]

Sudweeks, Fay and Charles Ess, eds. Cultural Attitudes Towards Technology and Communication: Proceedings of the Second International Conference on Cultural Attitudes Towards Technology and Communication. Australia: Murdoch University, School of Information Technology, 2000, 387 pages. ISBN: 0-86905-747-2. Includes twenty-four papers from the Conference on Cultural Attitudes Towards Technology and Communication, Perth, Australia, July 12-15, 2000.