Using information technology to integrate social and ethical issues into the computer science and information systems curriculum (report of the ITiCSE '97 working group on social and ethical issue in computing curricula)
暂无分享,去创建一个
Elizabeth S. Adams | Diana D. Juettner | C. Martin | D. Gotterbarn | J. Little | C. Martin | Christina Björkman | M. Granger | F. Young
[1] Donald Gotterbarn,et al. Ethics activities in computer science courses: goals and issues , 1997, CSOC.
[2] Tracy Hall,et al. Software Project Management Ethics , 1997 .
[3] Stacey L. Edgar. Morality and Machines: Perspectives on Computer Ethics , 1997 .
[4] Richard G. Epstein. The case of the killer robot , 1997 .
[5] Keith W. Miller,et al. Implementing a tenth strand in the CS curriculum , 1996, CACM.
[6] Donald Gotterbarn,et al. Ethics activities in computer science courses , 1996, CSOC.
[7] Duncan Langford,et al. Practical Computer Ethics , 1996 .
[8] J. R. G. Wood,et al. How we profess: the ethical systems analyst , 1996, CACM.
[9] Chuck Huff,et al. Practical guidance for teaching the social impact statement (SIS) , 1996, CQL '96.
[10] B. Shneiderman,et al. Social impact statements: engaging public participation in information technology design , 1996, CQL '96.
[11] Dorothy E. Denning. Clipper Chip Will Reinforce Privacy , 1996, Computerization and Controversy, 2nd Ed..
[12] Mary J. Granger,et al. Creating an Ethical Awareness using the Internet , 1996, J. Inf. Syst. Educ..
[13] Chuck Huff,et al. Computing consequences: a framework for teaching ethical computing , 1995, CACM.
[14] Kevin W. Bowyer. Ethics and Computing: Living Responsibly in a Computerized World , 1995 .
[15] Richard A. Spinello. Ethical Aspects of Information Technology , 1994 .
[16] Edward A. Cavazos,et al. Cyberspace and the Law: Your Rights and Duties in the On-Line World, Edward Cavazos and Gavino Morin. 1994. MIT Press, Cambridge, MA. 220 pages. ISBN: 0-262-53123-2. $19.95 , 1994 .
[17] R. Kraut. Predicting the use of technology: the case of telework , 1994 .
[18] Thomas A. Finholt,et al. Social Issues in Computing: Putting Computing in Its Place , 1994 .
[19] David Lorge Parnas,et al. Computers in weapons: the limits of confidence , 1994 .
[20] Batya Friedman,et al. Educating computer scientists: linking the social and the technical , 1994, CACM.
[21] Keith W. Miller,et al. How good is good enough?: an ethical analysis of software construction and use , 1994, CACM.
[22] Diana D Juettner,et al. Information Technology: The Conflict Between Freedom of Information laws and the Right to Privacy , 1994 .
[23] Ina Wagner,et al. A web of fuzzy problems: confronting the ethical issues , 1993, CACM.
[24] Rob Kling,et al. Organizational Analysis in Computer Science , 1993, Inf. Soc..
[25] G.F. McLean. Integrating ethics and design , 1993, IEEE Technology and Society Magazine.
[26] Diane Whitehouse,et al. Computers and society , 1993 .
[27] Alan M. Lesgold,et al. Competition in individualized CAI , 1994 .
[28] Jonathan P. Allen. Groupware and social reality , 1992, CSOC.
[29] Richard S. Rosenberg,et al. The Social Impact of Computers , 1992 .
[30] Keith W. Miller,et al. Paramedic ethics for computer professionals , 1992, J. Syst. Softw..
[31] Jeffrey Rothfeder. Privacy for Sale: How Computerization Has Made Everyone's Private Life an Open Secret , 1992 .
[32] Lee Sproull,et al. Computers, Networks and Work. , 1991 .
[33] R. Kling,et al. Book Review: Computerization and Controversy: Value Conflicts and Social Choices , 1991 .
[34] David B. Paradice,et al. Ethical Issues in Information Systems , 1991 .
[35] William R. Swinyard,et al. The morality of software piracy: A cross-cultural analysis , 1990 .
[36] B. Shneiderman. Human values and the future of technology: a declaration of empowerment , 1990, CQL '90.
[37] Batya Friedman,et al. Computing and social responsibility: a collection of course syllabi , 1990 .
[38] Peter J. Denning,et al. Computing as a discipline , 1989, Computer.
[39] Thomas A. Finholt,et al. The mystery of RSI. , 1988, The American psychologist.
[40] Cheris Kramarae. Technology and Women's Voices: Keeping in Touch , 1988 .
[41] Keith Miller,et al. Integrating Computer Ethics into the Computer Science Curriculum , 1988, Comput. Sci. Educ..
[42] Lucy A. Suchman,et al. Plans and Situated Actions: The Problem of Human-Machine Communication (Learning in Doing: Social, , 1987 .
[43] K. Kraemer,et al. Datawars: The Politics of Modeling in Federal Policymaking , 1987 .
[44] Judith A. Perrolle,et al. Computers and social change: information, property, and power , 1987 .
[45] Norman E. Gibbs,et al. A model curriculum for a liberal arts degree in computer science , 1986, CACM.
[46] Terry Winograd,et al. Understanding computers and cognition , 1986 .
[47] P Adler,et al. Employee privacy: legal and research developments and implications for personnel administration. , 1985, Sloan management review.
[48] Deborah G. Johnson. Computer Ethics , 1985 .
[49] Gregg C. Vanderheiden. Curbcuts and Computers: Providing Access to Computers and Information Systems for Disabled Individuals. , 1983 .
[50] Starr Roxanne Hiltz,et al. Network Nation: Human Communication Via Computer , 1979 .
[51] J. Weizenbaum. Computer Power And Human Reason: From Judgement To Calculation , 1978 .
[52] N. Wiener. The Human Use of Human Beings , 1950 .