default search action
SIGCAS Computers and Society, Volume 28
Volume 28, Number 1, March 1998
- Jeff A. Johnson:
Universal access to net: requirements and social impact. 4-10 - John M. Artz:
The role of stories in computer ethics. 11-13 - James H. Moor:
Reason, relativity, and responsibility in computer ethics. 14-21 - Rob Kling, Susan Leigh Star:
Human centered systems in the perspective of organizational and social informatics. 22-29 - Elaine Yale Weltz:
A staged progression for integrating ethics and social impact: across the computer science curriculum. 30-34 - David B. Resnik:
Medical misinformation on the Web: mitigation or control? 35-37 - Helen Nissenbaum:
The cutting edge. 38-39 - Herman T. Tavani:
Recent Coursebooks and Articles of Interest: Bibliography Update '98. 40-41 - Joseph S. Fulda:
AI watch: data mining and the Web. 42-43 - Thomas P. Cummings:
Book review: Computer: A History of the Information Machine By Martin Campbell-Kelly and William Aspray. 44-45 - Rónán Kennedy:
Open Location. 46-47 - Wendy Robinson:
Assignment: Web Project. 48-50 - Panorama - A Better Way To See All Around. 52-53
Volume 28, Number 2, June 1998
- Jean-François Blanchette, Deborah G. Johnson:
Cryptography, data retention, and the panopticon society (abstract). 1-2 - Gary T. Marx:
An ethics for the new surveillance (abstract). 1 - Jonathan P. Allen:
Who shapes the future?: problem framings and the development of handheld computers. 3-8 - Jeff Johnson:
CPSR's approach to advising policymakers. 9-13 - Leslie Regan Shade:
Developing guidelines within the Canadian "knowledge-based economy/society". 14-16 - Patricia Figliola Lewis:
The FCC's universal service rules (abstract): for schools and libraries. 17 - Richard S. Rosenberg:
Beyond the code of ethics: the responsibility of professional societies. 18-25 - Don Gotterbarn:
Raising the bar: a software engineering code of ethics and professional practice. 26-28 - Software engineering code of ethics and professional practice: version 4. 29-32
- Jessica Clark:
Who profits?: online copyright concerns for writers. 33-36 - Deborah G. Johnson, Keith W. Miller:
Anonymity, pseudonymity, or inescapable identity on the net (abstract). 37-38 - Daniel Lin, Michael C. Loui:
Taking the byte out of cookies: privacy, consent, and the Web. 39-51 - David Primeaux:
Using an alternative ethical paradigm for analysis: an example regarding e-mail privacy issues. 52-55 - Florence Appel:
Including the social and ethical implications of computing in the computer science curriculum. 56-57 - David Preston:
What makes professionals so difficult: an investigation into professional ethics teaching. 58-67 - Tracy Camp:
Survey results from the incredible shrinking pipeline (abstract). 68 - Barry Fagin:
Liberty and community online. 69-78 - John P. Sullins:
Navigating the knowledge infrastructure: strategies for increasing workplace democracy and knowledge management (abstract). 79 - Jenny Shearer:
The campaign for an ethical Internet. 80-85 - Richard G. Epstein:
In-depth! The Silicon Valley Sentinel-Observer's public affairs NetTV program presents: toxic knowledge. 86-91
Volume 28, Number 3, September 1998
- Special section: ACM policy '98 summaries. 3-12
- James H. Moor:
If Aristotle were a computing professional. 13-16 - Lorrie Faith Cranor:
Bias and responsibility in 'neutral' social protocols. 17-19 - Raquel Benbunan-Fich:
Guidelines for using case scenarios to teach computer ethics. 20-24 - Andreas Böhm:
Privacy protection in Germany: regulations and methods. 25-27 - Christine Salazar:
Technology as enabler: keeping work distinct from home while working at home. 31-32 - Joseph S. Fulda:
"The extended mind" - extended. 33-35 - Paul De Palma:
Book Review: Editor's Message. 35 - Samantha Alper:
Book review: Of Bicycles, Bakelites, and Bulbs by By Wiebe E. Bijker. 36-38 - John P. Sullins:
Book review: Technoscientific Imaginaries: Conversations, Profiles, and Memoirs By George E. Marcus, Editor. 38-39 - Barry Fagin:
Standardization, innovation and Microsoft. 40-41 - Daniel Lin:
Technology issues in Washington. 42-43 - Rónán Kennedy:
Open location. 43-44 - Sam Cleaver:
A computer explains its own personal code of ethics. 45-47
Volume 28, Number 4, December 1998
- John M. Artz:
Narrative vs. logical reasoning in computer ethics. 3-5 - Joseph S. Fulda:
A new standard for appropriation, with some remarks on aggregation. 6-11 - David Preston:
Business ethics and privacy in the workplace. 12-18 - Matti Kamppinen:
Technology as a cultural system: the impacts of ICT upon the primary and secondary theories of the world. 19-21 - Michael E. Whitman, Anthony M. Townsend, Anthony R. Hendrickson, Dail Fields:
An examination of cross-national differences. 22-28 - C. Dianne Martin, Chuck Huff, Tom Jewett:
IT Workplace 2000: : a SIGCAS collaborative student research project on working conditions in the computing workplace. 29 - Joseph S. Fulda:
Giving Computers Emotions-Why and How. 30-31 - Tom Elyse:
Book review: The Gordian Knot: Political Gridlock on the Information Highway. By W. Russell Neuman, Lee McKnight, and Richard Jay. 33-34 - Leslie Regan Shade:
Book Review Editor's Message. 33 - Rónán Kennedy:
Book review: Models of my Life by Herbert Simon. 35 - Rónán Kennedy:
Book review: Beyond Calculation: The Next Fifty Years of Computing. Ed. Peter J. Denning, Robert Metcalfe. 36 - Rónán Kennedy:
Open Location. 37 - Tom Jewett:
Assignment: Worklife. 38-40 - Cynthia Ozark:
A Disturbing Book About Virtual Parenting. 41-44
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.