Readings in Computer Technology and Human Values

For Sociology 4071-3, Technology and Modernization: Computer Technology and Human Values
Fall 1996, University of Colorado, Continuing Education

Assembled by Bill Moninger
303-494-1709, Home
303-497-6435, Work
moninger@fsl.noaa.gov


Artz, John (199?): Freedom of Information. From the Internet. 2 pp

Baird, Ron (1994): "Boulderite, South African find Kinship in Cyberspace." Colorado Daily 29 June, 1994. [1994 Reprint charge: free] 2 pp.

Barbour, Ian (1993). Ethics in an Age of Technology , HarperCollins, New York, NY. Chapter 2 (pp 26-56) [1994 Reprint Charge: $2.00] 31 pp.

Barbour, Ian (1993). Ethics in an Age of Technology , HarperCollins, New York, NY. Chapter 6 (pp 146-174) [1994 Reprint Charge; Not permitted.] 28pp

Barlow, John Perry (1993): Selling Wine without Bottles. From the Internet, 18 pp.

Bereano, Peter (1984) "Technology and Human Freedom" pp 278-284 in CES. Original source: Science for the People November/December 1984. [1994 Reprint charge: free] 7 pp.

Bok, Sissela (1984) "The Morality of Whistle-blowing" pp 70-80 in CES. Original source: Sisella Bok (1984) On the Ethics of concealment and Revelation pp 211-225. Vintage Books. [1994 Reprint charge: No reply on permission reequest.] 11 pp

Bruckman, Amy S. (1993): Gender Swapping on the Internet. Proceedings, INET '93 Conference, pp EFC 1-5. 5 pp

Cisler, Steve (1993): Protection and the Internet. From the Internet. 6 pp.

Collins, Robert W., Miller, K. W., Speilman, B. J., and Wherry, P. (1994, January). "How good is good enough? An ethical Analysis of software construction and use. Communications of the ACM 37 (1). pp. 81-91. [1994 Reprint charge: $0.63] 11 pp.

CPSR Newsletter , June 1990 issue, pp 1 - 18. [1994 Reprint charge: free] 18 pp.

Computer Professionals for Social Responsibility (CPSR) (1993). Serving the community: A public interest vision of the National Information Infrastructure . CPSR, P.O. Box 717, Palo Alto, CA 94301 (415-322-3778) [1994 Reprint charge: free.] 20? pp.

Daily Camera articles, 7 June 1995, by Linda Cornett: "Parents elbowing in on kids' Internet access"; and Julie Stafford: "Cyberspace students surf into knowledge." 3 pp.

Denning, Dorothy, Mike Godwin, William A. Bayse, Marc Rotenberg, Lewis M and Anne M. Branscomb, Ronald Rivest, Andrew Grosso, Gary T. Marx (1993, March). "To tap or not to tap?" Communications of the ACM 36 (3) pp. 25-44. [1994 Reprint charge: $1.15] 20 pp.

Dibbell, Julian (1993): A Rape in Cyberspace. The Village Voice, December 21, 1993. 12 pp.

Dyson, Esther (1993?): Intellectual Property on the Net. From: Release 1.0. Reprinted with permission. 25 pp.

Hospers, John (1972). "Utilitarian Theory" , pp 26-35, in : Ermann, M. D., Williams, M. B., and Gutierrez, C. (Eds.). (1990). Computers, ethics, and society. Oxford University Press, Oxford, UK., which is a book of reprints. (henceforth refered to as CES.) Original source: John Hospers, Human Conduct, Problems of Ethics , pp 199-208. Harcourt Brace Javanovich, Inc. [1994 Reprint charge: $0.63] 10 pp.

Hospers, John (1972). "Justice as a Part of an Ethical Theory" SELECTED PORTIONS OF ORIGINAL ONLY. pp 35-45 in CES. Original source, John Hospers op cit pp 344-375. [1994 Reprint charge: $1.84] 11 pp.

Hyman, M. et al (1994): Romance and the Internet. From the Internet: "Electronic Journal on Virtual Culture. 8pp

Jacky, Jonathan (1989): "Safety-Critical Computing: Hazards, Practices, Standards, and Regulation". The Sciences m September/October 1989 issue. (Reprinted in Computerization and Controversey , Charles Dunlop and Rob Kling, Eds., pp 612-631. Academic Press.) 20 pp

Kaplan, Nancy, and Eva Farrell (1994): Weavers of Webs: A portrait of Young Women on the Net. From the Internet: "Electronic Journal on Virtual Culture. 21 pp.

Koppel, Ross (1994): The Computer System and the Hospital: Organizational Power and Control of Information. From Software by Design: Shaping Technology and The Workplace , Salzman, H, and S. R. Rosenthal, Eds. Oxford U. Press. pp 143-170. 29pp

Ladd, John (1989): "Computers and Moral Responsibility: A Framework for an Ethical Analysis. From: The Information Web: Ethical and Social Implications of Computer Networking, Edited by Carol Gould, Westview Press, Boulder, Co, pp 207-227. (Reprinted in Computerization and Controversey , Charles Dunlop and Rob Kling, Eds., pp 664-675. Academic Press.) 12 pp

Laudon, Kenneth C. (1980): "Comment on 'Preserving Individual Autonomy in an Information-Oriented Society'". Reprinted in Computerization and Controversey , Charles Dunlop and Rob Kling, Eds., pp 489-495. Academic Press. 7 pp

Lepper, M. R., and Gurtner, J. L. (1989). "Computers and children: Approaching the twenty-first century. American Psychologist , 44 , pp. 170-178. [1994 Reprint charge: $0.38] 9 pp.

MacWorld Special report on Electronic Privacy, July 1993. 12? pp.

Mann, Charles (1995): "Regulating Cyberspace", Science 268 pp 628-629. 2 pp.

Marx, G.T. (1990): The Case of the Omniscient Organization. Harvard Business Review, No. 90209. 9 pp.

Marx, Gary T. (1990, September). "Privacy and Technology", pp 523-541, in The World & I (magazine?) 19 pp.

Marx, Gary T. (1994): New Telecommunications technologies require new manners", pp 538-551 in Telecommunications Policy 1994, 18 . (Publisher: Butterworth Heinemann, 617-438-8464) 24 pp.

Marx, G. T. (1995): Items for the Colorado N. I. I. Roundtable. 4 pp.

Nissenbaum, Helen (1994, January). "Computing and accountability," Communications of the ACM 37 (1). pp 73-80. [1994 Reprint charge: $0.46] 8 pp.

Oz, Effy (1994): "Laws Governing Data Privacy and Transborder Data Transfer," from Ethics for the Information Age . Wm. C. Brown Communications, Inc., Dubuque, Iowa. 6? pp.

Perrolle (1986): "Intellectual Assembly Lines: The Rationalization of Managerial, Professional, and Technical Work," In: Dunlop, Charles, and Rob Kling (eds.) (1991): Computerization and Controversy , Academic Press.pp. 221-235. 15pp

Rachels, James (1986): "Kantian Theory: The Idea of Human Dignity" SELECTED PORTIONS OF THE ORIGINAL ONLY, as they appear on pp 45-49 in CES. Original Source, Racheles: The Elements of Moral Philosophy, pp 114-17, 122-23. 5 pp

Rheingold, Howard (1994 edition): The Virtual Community . HarperPerennial 335 pp.

Rule, James B., D. McAdam, L. Stearns, D. Uglow. (19??): Preserving Individual Autonomy in an Information-Oriented Society. Copyright by James B. Rule. Reprinted in Computerization and Controversey , Charles Dunlop and Rob Kling, Eds., pp 469-488. Academic Press. 20 pp

Samuelson, Pamela (1995): Copyright and Digital Libraries, pp 15-21 & p 110, Comm. ACM, 38. Published by ACM: 212-869-7440 7 pp.

Schwartz, John (1993) "Caution: Children at play on the information highway" Boulder Sunday Camera, Dec 12, p 1E, 6E. [1994 Reprint charge: free] 2 pp.

Smith, Brian Cantwell (1985): "Limits of Correctness in Computers". Center for the Study of Language and Information. Stanford University, Report Number CSLI-85-35. (Reprinted in Computerization and Controversey , Charles Dunlop and Rob Kling, Eds., pp 632-646. Academic Press.) 15 pp

Smith, Jeff (1993, December). "Privacy Policies and Practices: Inside the Organizational Maze." Communications of the ACM 36 (12). pp 105-122. [1994 Reprint charge: $1.04] 17 pp.

Stallman, Richard M. (1987). "The Gnu Manifesto." GNU Emacs Manual . pp 175-184 or so. [1994 Reprint charge: free] 10 pp.

Spurtis, Ellen (1995): Thoughts on Web Pages Listing Women. From the Internet. 2 pp.

Taubes, Gary (1994): Peer Review in Cyberspace. Science 266 p 967. 1 p.

Taxpayer Assets Project report, email from the Internet. [1994 Reprint charge: free] 3? pp.

Tribe, Lawrence H. (1991): The Constitution in Cyberspace. From the Internet. 12pp.

Van Gelder, Lindsy (1985): "The Strange Case of the Electronic Lover. Ms. Magazine. Copyright by Lindsy Van Gelder. 12 pp