Readings in Ethics and Social Implications of Computing
- Risks of Technology
-
- Bill Joy's
Why the future doesn't need us, Wired Magazine, April 2000.
-
Programming Can Ruin Your Life (?!)
-
Will AI's Keep Humans as Pets?
-
Wireless computer network risks to be investigated
http://www.guardian.co.uk/technology/2007/oct/13/internet.internetphonesbroadband
-
Risks of Technology
Information Technology Security Risk Management
http://www.itc.virginia.edu/security/riskmanagement/
-
Top 10 Technology Risks
http://www.nor-tech.com/solutions/dox/Top_10_Technology_Risks.pdf
- Invasion of Privacy
-
- Intellectual Property and Digital Rights
-
- Computers, Weapons, War, and Terrorism
-
- LA Times'
Bush Eases Limits on Supercomputer Exports
- CNN.com's
Digital assault against Pentagon rises
- GovExec.com's
Mounting a Defense
-
New weapons against IT security threats
-
Computers as weapons of war
-
Singapore takes war on terror to the Web
-
Apple destroys unlocked iphones
-
Idaho Lab Demonstrates Vulnerability in the Power Grid
- WIN SECurity WAR - security unleashed: Sybex - Official CEH Review Guide ebook
- - Terrorism Information Awareness
- Computer Crime
-
Topics to include fraud, embezzlement, sabotage, digital forgery,
intrusion, hacking, cracking, and computer crime laws
- Impact of Computers on the Workplace
-
Topics to include job destruction and creation, job hopping, telework, and
employee monitoring
- Impact of Computers on the Home and the Digital Divide
-
Topics to include bitwealth, the IT meal ticket, and computing in the 3rd world
- http://www.computer-aid.org is a society in the UK that takes discarded
computers and ships them to africa instead of dumping them in landfills.
Here are some more links on computing in the third world:
- Impact of Computers on Education
-
- Ethics
-
Topics to include ethical theories, guidelines for computer professionals
- The Digital Society
-
Topics to include chat rooms, online communities
- BioWare, Biometrics, Digital Implants, Cyberenhancement
-
- Graphics and Computer Games
-
- IT, Information Systems, Computing in Business
-
Student-Submitted
The following as-yet-uncategorized links are spoken-for, and will not count
towards your required 10 (unless you were the first one who submitted them).
- Would an implanted chip help to keep my child safe?
- Linux reaches the Italian Parliament
- ipodminusitunes: Apple cuts us off
- Tech Digest: Apple faces legal onslaught from disgruntled iPhone owners
- Apple's Fairplay + 360 coolness = more piracy. at mendax.org
- iTWire - France gives Apple le finger
- Apple is at war with its users
- Strategies Apple Uses to Create Loyal Customers
- Complete solutions, familiar formats and "the cool factor" keep customers coming back.
-
National CyberEducation Project
-
Ethics of Game Design
-
The Trouble With Patents
-
John Carmack's Response to Video Game Patents
-
Boycott Starforce
-
A Cost Analysis of Windows Vista Content Protection
-
Pushing the Impossible
-
Why Is Hollywood Making A Sequel To The Napster Wars?
-
http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9035481
-
http://wearcam.org/sousveillance.htm
-
http://www.freedomforum.org/templates/document.asp?documentID=16131
-
http://www.anonequity.org/weblog/archives/2006/01/exploring_equiv_1.php
-
http://www.wired.com/politics/onlinerights/news/2007/08/coupons
-
http://chron.com/disp/story.mpl/metropolitan/5149745.html
-
http://security.itworld.com/4357/070927chicagoscan/page_1.html
-
http://www.escapistmagazine.com/news/view/77093-Mod-Chip-Seller-Sentenced-to-Jail-Time
-
http://gamepolitics.com/2007/09/21/jack-thompson-seeks-to-have-halo-3-declared-a-public-nuisance-block-its-release-in-florida/
-
http://www.p2pnet.net/story/12855
-
http://arstechnica.com/articles/culture/Meet-Copowi-the-worlds-first-ISP-to-guarantee-network-neutrality.ars
-
Social Interaction With Computers: An Interpretation of Weizenbaum's ELIZA and Her Heritage
-
A Disappearing Digital Divide Among College Students?: Peeling Away the Layers of the Digital Divide
-
Online Behaviors Affected by Spam
-
Canada deems P2P downloading legal
-
Ethics of File Sharing Music
-
Vista's legal fine print raises red flags
-
Virtualization and confusing array of Vista legal restrictions to haunt Microsoft and users alike
-
MICROSOFT SOFTWARE LICENSE TERMS (WINDOWS VISTA)
-
A sneaky change in Windows licensing terms
- Let a Thousand Filters Bloom
- YouTube sued over copyright infringement
- Sixth
Circuit Clears Lexis Nexis of Copyright Infringement
- Gonzales proposes new crime: 'Attempted' copyright infringement
- From Wired: Proposed Crime of the Century: Attempted Copyright Infringement
-
IBM Software to Scan Chicago Streets
-
First US GPL Lawsuit
-
Big Brother is Watching Us All
-
Finding myself through online identities
-
Impact of computer on society
-
Is Microsoft a monopoly? If so, why does it matter?
-
Facebook's Facelift
-
Alzheimer Care: Ethical Guidelines, Tracking Devices
-
Tracking Devices Let Parents Keep Watch on Teen Drivers
-
GPS Tracking Devices
-
Helpful Tracking Device or Big ?
-
When Invisible Electronic Ink Leaves Red Faces: Tactical, Legal and Ethical Consequences of the Failure to Remove Metadata
-
*Body identification, biometrics and medicine: ethical and social considerations
-
*US Army using Xbox 360 controller in Future Combat Systems tests
-
GATTACA (Philosophical Films)
-
TIA
-
wireless networks are a security leak
-
LAX security patrols determined by random number generator.
-
Mandatory keyloggers in Indian Cybercafes
-
Bad software causes slot machine to pay out more often than it should -
-
UK can now demand data decryption on penalty of jail time
-
Should Computers Decide Who Gets a Transplant?
-
IBM pledges access to its IP for standards
- Hacking for Dollars
- Infrared Scans May Regulate HOT Lanes
-
2. Sarah Palin's E-Mail Hacked
http://www.time.com/time/politics/article/0,8599,1842097,00.html
Sep. 17, 2008
-
3. Google sued for Street View privacy invasion
http://www.vnunet.com/vnunet/news/2213683/google-sued-privacy-invasion
Apr. 07, 2008
-
4. The digital copyright crisis
http://www.boston.com/news/globe/editorial_opinion/oped/articles/2004/09/07/the_digital_copyright_crisis/
September 7, 2004
-
5. Cell Phone Sensors Detect Radiation To Thwart Nuclear Terrorism
http://www.sciencedaily.com/releases/2008/01/080122154415.htm
Jan. 24, 2008
-
6. The Web Ushers In New Weapons of War and Terrorism
http://www.sciam.com/article.cfm?id=web-brings-new-weapons-of-war
August 18, 2008
-
7. NATO Builds Cyber War Weapons
http://www.strategypage.com/htmw/htiw/articles/20080520.aspx
May 20, 2008
-
8. Attack of the Zombie Computers Is Growing Threat
http://www.nytimes.com/2007/01/07/technology/07net.html
January 7, 2007
-
9. Global Trail of an Online Crime Ring
http://www.nytimes.com/2008/08/12/technology/12theft.html
August 11, 2008
-
10. Hackers Infect Alicia Keys's MySpace Page
http://bits.blogs.nytimes.com/2007/11/08/hackers-infect-alicia-keyess-myspace-page/
November 8, 2007
-
11. The threat from chat
http://www.backbonemag.com/Magazine/E_Trends_05010702.asp
May 1, 2007
-
12. Ethics is more than just skin-deep
http://www.bcs.org/server.php?show=ConWebDoc.20215
July 2008
-
Sony delays videogame over offensive music
http://www.reuters.com/article/newsOne/idUSTRE49J75I20081020
-
Sony recalls "LittleBigplanet" over Koran passages
http://news.zdnet.com/2424-9595_22-242636.html
-
Homeless veterans recieve donations for computer lab
http://www.bizjournals.com/sanantonio/stories/2008/10/20/daily2.html
-
McAfee looks to security in virtual environments
http://www.itworld.com/security/56379/mcafee-looks-security-virtual-environments
-
Leading IT Security Experts Believe Clodu COmputing Increases Risk of Data Leakage
http://www.send2press.com/newswire/2008-10-1020-002.shtml
-
Groups want IT security burden to also fall on CFOs
http://www.scmagazineus.com/Groups-want-IT-security-burden-to-also-fall-on-CFOs/article/119722/
-
Cyber Security and the ¡Èfinancial meltdown¡É
http://talkradionews.com/2008/10/cyber-security-and-the-%E2%80%9Cfinancial-meltdown%E2%80%9D/
-
Microsoft black screening XP users all over China
http://www.tgdaily.com/content/view/39874/118/
-
Ohio secretary of state website hit by hackers
http://www.scmagazineuk.com/Ohio-secretary-of-state-website-hit-by-hackers/article/119825/
-
Hackers' mind-set: They've done nothing wrong
http://www.usatoday.com/tech/news/computersecurity/hacking/2008-10-22-hackers-mindset-data-theft_N.htm
-
Credit crunch forces hackers to switch tactics
http://www.scmagazineuk.com/Credit-crunch-forces-hackers-to-switch-tactics/article/119834/
-
Clumsy staff more dangerous than hackers: survey
http://www.computerworld.com.au/index.php/id;1538782684
-
N.J. Supreme Court Seals The Door To Internet Service Providers' Voluntary Disclosure Of Information About "Cybersmearing" Employees
http://privacyblog.littler.com/2008/04/articles/internet-communications/nj-supreme-court-seals-the-door-to-internet-service-providers-voluntary-disclosure-of-information-about-cybersmearing-employees/
-
http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9110520
-
http://news.cnet.com/8301-13505_3-10070008-16.html
-
http://online.wsj.com/article/SB122299012125700337.html?mod=googlenews_wsj
-
http://news.cnet.com/8301-1009_3-10075487-83.html
-
http://www.freep.com/apps/pbcs.dll/article?AID=/20081001/BLOG01/81001033/1002/BUSINESS
-
http://www.macworld.com/article/136376/iphoneappcrashes.html
-
http://www.crn.com/security/210604893
-
http://venturebeat.com/2008/10/25/hacker-finds-a-security-hole-in-the-google-phone/
-
http://www.informationweek.com/news/windows/operatingsystems/showArticle.jhtml?articleID=211600312
-
http://www.theglobeandmail.com/servlet/story/LAC.20081025.BKMAFI25/TPStory/Entertainment
-
FBI wants widespread monitoring of 'illegal' Internet activity - http://news.cnet.com/8301-10784_3-9926899-7.html
-
Senator: Let's monitor P2P for illegal files - http://news.cnet.com/8301-10784_3-9920665-7.html
-
Employee Monitoring: Is Big Brother a bad idea? - http://searchsecurity.techtarget.com/news/interview/0,289202,sid14_gci940369,00.html
-
Employee Monitoring and surveillance - The Growing Trend - http://www.isaca.org/Template.cfm?Section=Home&CONTENTID=16695&TEMPLATE=/ContentManagement/ContentDisplay.cfm
-
"Paranoid Linux is an operating system that assumes that its operator is under assault from the government"
http://paranoidlinux.org/
-
Google using a censored search engine for Chinese government.
http://news.bbc.co.uk/2/hi/technology/4647398.stm
-
CyberWarfare in the Georgia-Russia Conflict
http://www.switched.com/2008/08/12/georgia-accuses-russia-of-conducting-cyber-warfare/
-
Disgruntled Emloyee who was an Administrator
http://www.infoworld.com/article/08/07/17/IT_administrator_pleads_not_guilty_to_network_tampering_1.html
-
DRM concerning a recently released game, Spore.
http://www.gamingsteve.com/archives/2008/05/maxis-responds-to-the-spore-drm-controversy.php
-
"Should You Break TOS Because Work Asks You? "
http://ask.slashdot.org/askslashdot/08/10/27/1245219.shtml
-
User Created Content discussing intellectual property rights
http://www.joystiq.com/2008/11/03/lgj-user-content-creation-crisis/
-
Paris Hiltons Cell Phone being Hacked
http://defamer.com/hollywood/gossip/paris-hilton/paris-hilton-hacked-033638.php
-
Comcast capping data transfers at 250 GB
http://tech.slashdot.org/article.pl?sid=08/08/28/2339207&tid=95
-
PvP Ethics
http://home.nestor.minsk.by/game/news/2006/11/1411.html
-
Cyberslacking, employees wasting time at work online
http://slashdot.org/article.pl?sid=07/08/29/1417253
-
Government spying on PCs
http://arstechnica.com/articles/culture/eff-suit-against-bush.ars
-
FBI's Magic Lantern Trojan/Keylogger
http://www.worldnetdaily.com/news/article.asp?ARTICLE_ID=25471
-
"Thai Government Planning Large-Scale Internet Censorship Campaign"
http://profy.com/2008/10/28/thai-government-planning-large-scale-internet-censorship-campaign/
-
Google Password Stealer
http://www.codinghorror.com/blog/archives/001072.html
-
http://www.acm.org/crossroads/xrds10-3/gotterbarn.html
-
http://www.acm.org/crossroads/xrds10-3/multilevel.html
-
http://delivery.acm.org/10.1145/1170000/1166369/p196-wright.pdf?key1=1166369&key2=0768215221&coll=GUIDE&dl=GUIDE&CFID=8007536&CFTOKEN=31974080
-
http://www.philosophyofinformation.net/ie.htm
-
http://www.southernct.edu/organizations/rccs/resources/research/introduction/bynum_shrt_hist.html#maner
-
http://www.philosophyofinformation.net/pdf/ieotfce.pdf
-
http://www.philosophyofinformation.net/pdf/cemfd.pdf
-
http://www.southernct.edu/organizations/rccs/resources/teaching/teaching_mono/moor/moor_definition.html
-
http://www.computerethicsinstitute.org/images/TheTenCommandmentsOfComputerEthics.pdf
-
http://www.cmpe.boun.edu.tr/~say/c150/intro/lit10.html
-
http://www.cs.berkeley.edu/~bh/hackers.html
-
http://home.messiah.edu/~deroos/personal/copy.htm
-
http://sneakers.cs.columbia.edu/ids/publications/s07-weijen.pdf
-
http://sneakers.cs.columbia.edu/ids/publications/cluster-thesis00.pdf
-
Sony, Rootkits and Digital Rights Management Gone Too Far - http://blogs.technet.com/markrussinovich/archive/2005/10/31/sony-rootkits-and-digital-rights-management-gone-too-far.aspx
-
The Darknet and the Future of Content Distribution -
http://msl1.mit.edu/ESD10/docs/darknet5.pdf
-
Diginomics: why DRM promotes piracy, & why monetizing Web 2.0 is tough, etc -
http://www.consumingexperience.com/2008/08/diginomics-why-drm-promotes-piracy-why.html
-
Resolution on Digital Rights Management, The Sequel -
http://www.tacd.org/db_files/files/files-420-filetag.pdf
-
Digital Rights Management and Content Licensing -
http://www.sla.org/content/Shop/Information/infoonline/2002/may02/davis.cfm
-
How Apple is changing DRM -
http://www.guardian.co.uk/technology/2008/may/15/drm.apple#history-byline
-
Spore: Most Pirated Game Ever Thanks to DRM -
http://torrentfreak.com/spore-most-pirated-game-ever-thanks-to-drm-080913/
-
Amazon flash mob mauls Spore DRM -
http://www.theregister.co.uk/2008/09/10/spore_drm_amazon_effect/
-
Spore DRM could kill PC gaming - http://blogs.zdnet.com/hardware/?p=2617
-
Steam DRM Vs Spore DRM - http://kotaku.com/5051514/steam-drm-vs-spore-drm
-
1) Government insiders use their power to access Joe the Plumber's records. http://www.dispatch.com/live/content/local_news/stories/2008/10/24/joe.html?sid=101
-
2) Turkey bans blogging website. http://www.basbasbas.com/blog/2008/10/24/turkey-bans-blogger/
-
3) Belgian ISP reverses P2P decision. http://securityandthe.net/2008/10/25/belgian-isp-scores-first-victory-in-p2p-case/
-
4) Researchers at UW able to clone RFID tags in passports. http://goodgearguide.com.au/index.php/id;438521249
-
5) Dutch court rules that virtual property theft is same as tangible theft. http://www.pcworld.com/article/152673/.html?tk=rss_news
-
6) Kentucky buys gambling domain names to keep them unavailable. http://www.theregister.co.uk/2008/10/20/kentucky_domain_name_seizure_upheld/
-
7) 10 people publish their DNA sequence online. http://www.telegraph.co.uk/core/Content/displayPrintable.jhtml;jsessionid=ZDXDPOH2BGYNHQFIQMGCFFOAVCBQUIV0?xml=/earth/2008/10/20/scidna120.xml&site=30&page=0
-
8) DARPA proposes real time spying via satellites. http://www.washingtonpost.com/wp-dyn/content/article/2008/10/19/AR2008101901572.html
-
9) Hacker DDoS on scientology website. http://blog.wired.com/27bstroke6/2008/10/anonymous-membe.html
-
10) Australia implements a nation-wide internet filter. http://www.infoworld.com/news/feeds/08/10/13/No-opt-out-of-filtered-Internet.html?source=gs