Responsible Use of Computing Policy
CS 105 Computer Ethics and Society Syllabus
Award winning student ethics page
Software Engineering Code of Ethics
A Yahoo Directory of Ethics references and courses
WWW Ethics Center for Engineering and Science. This is a good place to start.
Homepage for Texas A&M--many useful links
Ethics on the Web, by Paul Martin Lester.
Information System Ethics, edited by David Vance and Arun Rai
Home page for Computer Professionals for Social Responsibility.
Computer Crime Directory.
(Includes text of Computer Fraud and Abuse Act.)
Homepage for Centre for Computing and Social Responsibility,
DeMontfort University
Homepage for the Centre for Applied Ethics,
University of British Columbia.
Ethics Course at William and Mary
CERT (Computer Emergency Response Team)
Homepage for the Electronic Frontier Foundation
Homepage for Center for Computer Crime Research,
Florida State University.
Computers, Freedom, and Privacy Video Library (catalogue and order forms.)
CIAC Advisory on
Internet Hoaxes
Ten Commandments of Computer Ethics. Computer Ethics Institute.
Papers on the Internet Worm
Incident. (Click on the index to find specific papers.)
US Office of Government Ethics
Software Engineering on the Web
ISACC99 Conference on
Certification
Bibliography
Certification
Gilius, L. Certification for Computing Professionals. McGraw-Hill, 1995.
ANSI ASC Z-1 Committee on Quality Assurance
Baase, S. A Gift of Fire. Prentice Hall, 1997.
Bowyer, K. Ethics and Computing. IEEE Computer Society Press, 1996.
"Ten Commandments of Computer Ethics", Computer Ethics Institute Page.
Communications of the ACM. Ethics and Computer Use. 38.12, December, 1995.
Dejoie, R., et al. Ethical Issues in Information Systems. Boyd & Fraser, 1991.
Ermann, M.D. et al. Computers, Ethics, and Society. Oxford University Press, 1990.
Dunlop, C. & Kling, R. Computerization and Controversy. Value Conflicts and Social Choices. Academic Press, 1991. (Covers changes in society, work, privacy, security and reliability, professional responsibility. Over 700 pp.)
Forester, T. & Morrison, P. Computer Ethics. Cautionary Tales and Ethical Dilemmas in Computing. MIT Press, 2nd ed.,1994.
Hauben, M. & Hauben, R. Netizens: On the History and Impact of Usenet and the Internet. IEEE Computer Society Books.
Hodapp, P. Ethics in the Business World. Krieger Publishing, 1994.
Johnson, D.G. Computer Ethics. Prentice Hall, 2nd ed.: 1994. (A nice, "skinny" book. A good survey for under $20.00.)
Johnson, D.G. & Nissenbaum, H. Computer Ethics & Social Values. Prentice Hall, 1995. (A solid textbook, over 700 pp.)
Kizza, J. Ethical and Social Issues in the Information Age. Springer, 1997.
Miethe, T. Whistleblowing at Work. Westview Press, 1999.
ACM/IEEE Codes of Ethics (can be found in appendices of Deborah G. Johnson, Computer Ethics. Prentice Hall, 2nd ed.: 1994).
Anonymous, Maximum Security: A Hacker's Guide to Protecting Your Internet Site and Network. Sams.net, 1997.
Bacard, A. The Computer Privacy Handbook. Peachpit Press, 1995. (Privacy, encryption, Clipper Chip and PGP.)
Chapman, D. & Zwicky, E. Building Internet Firewalls. O'Reilly and Associates, 1995.
Cheswick, R. & Bellowin, S. "Firewalls," Scientific American. 10/98: 106-107.
Cheswick, R. & Bellowin, S. Firewalls and Internet Security. Addison Wesley, 1994.
Garfinkel, S. & Spafford, G. Practical Unix & Internet Security. O'Reilly & Associates, 1996.
Russell, D. & Gangemi, G. Computer Security Basics. O'Reilly & Associates, 1991.
Barret, D. Bandits on the Information Superhighway. O'Reilly & Associates, 1996.
Chantico Publishing, Co. Combating Computer Crime: Prevention, Detection, Investigation. McGraw-Hill, 1992.
Clark, F., Diliberto, K. Investigating Computer Crime. CRC Press, 1996.
Icove, D.J. Computer Crime: A Crime-fighter's Handbook. O'Reilly & Associates, 1995.
Mendell, R.L. Investigating Computer Crime. Charles C. Thomas, Publisher, 1998.
Parker, D. Fighting Computer Computer Crime. John Wiley & Sons, 1998
Schlegel, K. and Weisburd, D., eds. White Collar Crime Reconsidered. Northwestern University Press, 1992.
ACM Crytography study-includes Clipper
Denning, D. Cryptography and Data Security. Addison Wesley, 1983.
Garfinkel, S. Pretty Good Privacy. O'Reilly & Associates, 1994.
Johnson, N. "Steganography and Digital Watermarking," http://isse.gmu.edu/~njohnson/Steganography/
Rivest, R. "The Case against Regulating Encryption Technology," Scientific American. 10/98:116-117.
Schneier, B. Applied Cryptography. J. Wiley and Sons, 1994.
Stinson, D.R. Cryptography Theory and Practice.
Zimmerman, P. "Cryptography for the Internet," Scientific American. 10/98: 110-115.
Zimmerman, P. PGP Source Code and Internals.
Encryption. Homepage for RSA: Rivest, Shamir, and Adleman.
Gibson, W. Neuromancer. Ace Books, 1984.
Gibson, W. Virtual Light. Bantam Books, 1993.
Godwin, M. Cyber rights. Random House, 1998.
Peterson, John L. The Road to 2015. Waite Group Press, 1996.
Stephenson, N. Snow Crash. Bantam Books, 1992.
Cohen, F. A Short Course on Computer Viruses. J. Wiley & Sons, 1994.
Ferbrache, D. A Pathology of Computer Viruses. Springer-Verlag, 1992.
Hoffman, L. Rogue Programs, Viruses, Worms, and Trojan Horses. Van Nostrand Reinhold, 1990.
Littman, J. The Fugitive Game. Little Brown, 1995.
Ludwig, M. The Little Black Book of Computer Viruses. American Eagle Publications, 1991.
Smith, G. The Virus Creation Labs. American Eagle Publications, 1994.
Sterling, B. The Hacker Crackdown. Bantam Books, 1992
Stoll, C. The Cuckoo's Egg. Pocket Books, 1990.
Denning, D. Information Warfare and Security. Addison Wesley, 1999.
Schwartau, W. Information Warfare. 2nd. Ed. Thunder's Mouth Press, 1996.
Best, R.A. Computer Law and Software Protection: a bibliography of crime, liability, abuse, and security, 1984-1992.
Cavazos, E. & Morin, G. Cyberspace and the Law. MIT Press, 1995.
Draft of ACM Policy on Privacy
Brin, David. The Transparent Society: Will Technology Force Us to Choose Between Privacy and Freedom? 1998.
Diffie, Whitfield and Susan Landau, Privacy on the Line. MIT Press, 1998. (ISBN: 0-262-04167-7)
Gandy, O. The Panoptic Sort. A Political Economy of Personal Information. Westview Press, 1993. (A thoughtful discussion of information, power, and privacy issues.)
Philip E. Agre and Marc Rotenberg, editors, Technology and Privacy: The New Landscape. MIT Press, 1997.
Electronic Privacy Information Center
Personal Privacy and Access to Medical Databases
Casey, S. Set Phasers on Stun: and other True Tales of Design, Technology, and Human Error. 2nd ed. Aegean Press, 1998.
Lewis, H.R. Technological Risk. W.W. Norton, 1990.
Magnuson, R.J. The White-Collar Crime Explosion. How to Protect Yourself and Your Company from Prosecution. McGraw-Hill, 1992.
Neumann, P. Computer-Related Risks. Addison-Wesley, 1995.
Yourdan, E. Death March: The Complete Software Developer's Guide to Surviving "Mission Impossible" Projects. Prentice Hall, 1997.
Software Engineering Institute, Capability Maturity Model
The KGB, the Computer and Me. Coronet Film & Video, 1990. (An entertaining dramatization of the "Cuckoo's Egg" story.)