skip to main content
article
Free Access

Cyberethics and the future of computing

Published:01 May 1996Publication History
First page image

References

  1. Archer, Marlene. "The Greater Boston Community-Wide Education and Information Services Organizing Project (CWEIS)," in Developing an Equitable and Open Information Infrastructure: Proceedings of the Directions and Implications of Advanced Computing (DIAC '94) Symposium, (ed. Hans Klein) Computer Professionals for Social Responsibility (CPSR), 1994, B5.Google ScholarGoogle Scholar
  2. Aronson, Jonathan. "Telecommunications Infrastructure and U.S. International Competitiveness," in Institute for Information Studies, A National Information Network: Changing Our Lives in the 21st Century. Nashville Tennessee and Queensland Maryland: The Institute for Information Studies, 1992, pp. 58- 59.Google ScholarGoogle Scholar
  3. Barrow, Michael. "Introduction to the Internet," in Developing an Equitable and Open Information Infrastructure: Proceedings of the Directions and Implications of Advanced Computing (DIAC '94) Symposium, (ed. Hans Klein) Computer Professionals for Social Responsibility (CPSR), 1994, B1.Google ScholarGoogle Scholar
  4. Benedikt, M. "Cyberspace: Some Proposals," in M. Benedikt, ed. Cyberspace: First Steps. Cambridge, MA: MIT Press, 1991, pp. 119-224. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Branscomb, Lewis. "Planning the New National Network," EDUCOM Review, Vol. 24, No. 1, 1989, pp. 7-10.Google ScholarGoogle Scholar
  6. Chapman, Gary. "Defense Conversion and Technology Policy," The CPSR Newsletter, Vol. 10, Fall, 1992.Google ScholarGoogle Scholar
  7. Chapman, Gary and Marc Rotenberg. "The National Information Infrastructure: A Public Interest Opportunity," CPSR Newsletter, Vol. 11, No. 2, Summer 1993, pp. 1-23. Portions reprinted in D. Johnson and H. Nissenbaum, eds. Computers, Ethics & Social Values. Englewood Cliffs, NJ: Prentice Hall, 1995, pp. 628-644.Google ScholarGoogle Scholar
  8. Civille, Richard. "Designing Local Civic Networks," in Directions and Implications of Advanced Computing 1992 (DIAC '92): Symposium Proceedings. (ed. Doug Schuler) Computer Professionals for Social Responsibility (CPSR), 1992, pp. 213-214.Google ScholarGoogle Scholar
  9. Civille, Richard and Ann Bishop. "Measuring the NII," in Developing an Equitable and Open Information Infrastructure: Proceedings of the Directions and Implications of Advanced Computing (DIAC '94) Symposium, (ed. Hans Klein) Computer Professionals for Social Responsibility (CPSR), 1994, C2.Google ScholarGoogle Scholar
  10. Coate, John. "Inkeeping in Cyberspace," in Directions and Implications of Advanced Computing 1992 (DIAC '92): Symposium Proceedings. (ed. Doug Schuler) Computer Professionals for Social Responsibility (CPSR), 1992, pp. 1-8.Google ScholarGoogle Scholar
  11. Coates, Vary; LaPorte, Todd and Mark G. Young. "Global Telecommunications and Export of Services: That Promise and Risk," Business Horizons, November/December 1993. Reprinted in K. Schellenberg, ed. Computers in Society. 6th ed. Guilford, CT: Dushkin Publishing Group, 1996, pp. 32-38.Google ScholarGoogle Scholar
  12. Danowitz, A. K., Nasef, Y., and S. E. Goodman. "International Perspectives: Cyberspace Across the Sahara: Computing in North Africa," Communications of the ACM, Vol. 38, No. 12, pp. 23-28. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. de Kerckhove, Derrick. "From Global Village to Global Mind," The UNESCO Courier, February 1995. Reprinted in K. Schellenberg, ed. Computers in Society. 6th ed. Guilford, CT: Dushkin Publishing Group, 1996, pp. 20-31.Google ScholarGoogle Scholar
  14. Dowling, Sherwood. "NII: Public or Private? Defining Research Parameters," in Developing an Equitable and Open Information Infrastructure: Proceedings of the Directions and Implications of Advanced Computing (DIAC '94) Symposium, (ed. Hans Klein) Computer Professionals for Social Responsibility (CPSR), 1994, C5.Google ScholarGoogle Scholar
  15. Drake, William and Herbert Schiller. "Policy for the GII (1)," in Developing an Equitable and Open Information Infrastructure: Proceedings of the Directions and Implications of Advanced Computing (DIAC '94) Symposium, (ed. Hans Klein) Computer Professionals for Social Responsibility (CPSR), 1994, C3.Google ScholarGoogle Scholar
  16. Electronic Frontier Foundation. "The EFF Open Platform Proposal," in Directions and Implications of Advanced Computing 1992 (DIAC '92): Symposium Proceedings. (ed. Doug Schuler) Computer Professionals for Social Responsibility (CPSR), 1992, pp. 143-153.Google ScholarGoogle Scholar
  17. Elmer-DeWitt, Philip. "Welcome to Cyberspace: What Is It? Where Is It? And How Do We Get There?," Time, Special Issue, Spring 1995, pp. 4-11. Reprinted in K. Schellenberg, ed. Computers in Society. 6th ed. Guilford, CT: Dushkin Publishing Group, 1996, pp. 6-10.Google ScholarGoogle Scholar
  18. Eng, Paul and Mark Lewyn. "On-Off Ramps to the Info Superhighway," Business Week, February 7, 1994, p. 108.Google ScholarGoogle Scholar
  19. Farrington, Carl. "Community Access to Telecommunications Systems," in Directions and Implications of Advanced Computing 1992 (DIAC '92): Symposium Proceedings. (ed. Doug Schuler) Computer Professionals for Social Responsibility (CPSR), 1992, pp. 134-135.Google ScholarGoogle Scholar
  20. Frederick, Howard. "Networks and the Emergence of Global Civil Society," in L. Harasim, ed. Global Networks. Cambridge, MA: MIT Press, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Fuller, Steve. "The Rhetorical History of the NII," in Developing an Equitable and Open Information Infrastructure: Proceedings of the Directions and Implications of Advanced Computing (DIAC '94) Symposium, (ed. Hans Klein) Computer Professionals for Social Responsibility (CPSR), 1994, E3.Google ScholarGoogle Scholar
  22. Gamse, Philipa and Terry Grunwald. "Navigating the Net: A Non-Profit Nightmare??," in Developing an Equitable and Open Information Infrastructure: Proceedings of the Directions and Implications of Advanced Computing (DIAC '94) Symposium, (ed. Hans Klein) Computer Professionals for Social Responsibility (CPSR), 1994, A3.Google ScholarGoogle Scholar
  23. Gandy, Oscar H. "Introduction," in Institute for Information Studies, A National Information Network: Changing Our Lives in the 21st Century. Nashville Tennessee and Queensland Maryland: The Institute for Information Studies, 1992, p. xx.Google ScholarGoogle Scholar
  24. Gore, Al. "Global Information Infrastructure," Remarks As Delivered to the International Telecommunications Union, March 21, 1994. Reprinted in D. Johnson and H. Nissenbaum, eds. Computers, Ethics & Social Values. Englewood Cliffs, NJ: Prentice Hall, 1995, pp. 620-638.Google ScholarGoogle Scholar
  25. Harasim, Linda. ed. Global Networks: Computers and International Communication. Cambridge, MA: MIT Press, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. "International Cooperation," A Computer and Information Technologies Platform. Computer Professionals for Social Responsibility (CPSR), Berkeley Chapter, Peace and Justice Working Group, 1992, pp. 22-24.Google ScholarGoogle Scholar
  27. Kahin, Brian. "Overview: Understanding the NREN," in B. Kahin, ed. Building Information Infrastructure. Cambridge, MA. Harvard Business School Press, 1992, p. 5.Google ScholarGoogle Scholar
  28. Kahin, Brian and Janet Abbate, eds. Standards Policy for Information Infrastructure. Cambridge, MA: MIT Press, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Kalil, Thomas; Mallery, John and Joshua Cohen. "Informed Participation and the National Information Infrastructure," in Developing an Equitable and Open Information Infrastructure: Proceedings of the Directions and Implications of Advanced Computing (DIAC '94) Symposium, (ed. Hans Klein) Computer Professionals for Social Responsibility (CPSR), 1994, B3.Google ScholarGoogle Scholar
  30. Kahn, Robert. "The Role of the Government in the Evolution of the Internet," Communications of the ACM, Vol. 37, No. 8, August 1994, pp. 15-19. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Kapor, Mitch; Berman, Jerry and Daniel Weitzner. "We Need a National Public Network," Whole Earth Review, Spring, 1992.Google ScholarGoogle Scholar
  32. Kleinrock, Leonard. "Technology Issues in the Design of NREN," in B. Kahin, ed. Building Information Infrastructure. Cambridge, MA. Harvard Business School Press, 1992, p. 185.Google ScholarGoogle Scholar
  33. Markoff, John. "Building the Electronic Superhighway," The New York Times, January 24, 1993, p. 3.Google ScholarGoogle Scholar
  34. Masinter, Larry. "Collaborative Information Retrieval: Combining Talking and Searching," in Developing an Equitable and Open Information Infrastructure: Proceedings of the Directions and Implications of Advanced Computing (DIAC '94) Symposium, (ed. Hans Klein) Computer Professionals for Social Responsibility (CPSR), 1994, D2.Google ScholarGoogle Scholar
  35. McKnight, Lee. "Public Services for the GII (2)," in Developing an Equitable and Open Information Infrastructure." Proceedings of the Directions and Implications of Advannced Computing (DIAC '94) Symposium, (ed. Hans Klein) Computer Professionals for Social Responsibility (CPSR), 1994, C4.Google ScholarGoogle Scholar
  36. Miller, Steve. "What is the National Information Infrastructure and Why Are We Building It?" and "Framing the Policy Debate," Chaps. 3 and 4 in Civilizing Cyberspace: Policy, Power and the Information Superhighway. NY: ACM Press, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Novak, Marcos. "Liquid Architectures in Cyberspace," in M. Benedikt, ed. Cyberspace: First Steps. Cambridge, MA: MIT Press, 1991, pp. 225-254. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Press, Larry. "Toward a Truly Global Network," in Directions and Implications of Advanced Computing 1992 (DIAC '92): Symposium Proceedings. (ed. Doug Schuler) Computer Professionals for Social Responsibility (CPSR), 1992, pp. 106-108.Google ScholarGoogle Scholar
  39. Press, Larry. "Relcom, An Appropriate Technology Network," in Directions and Implications of Advanced Computing 1992 (DIAC '92): Symposium Proceedings. (ed. Doug Schuler) Computer Professionals for Social Responsibility (CPSR), 1992, pp. 109-116.Google ScholarGoogle Scholar
  40. Price, Melissa Lee. "Information Superhighway: A Road Map for Higher Education Professionals," in Developing an Equitable and Open Information Infrastructure: Proceedings of the Directions and Implications of Advanced Computing (DIAC '94) Symposium, (ed. Hans Klein) Computer Professionals for Social Responsibility (CPSR), 1994, A5.Google ScholarGoogle Scholar
  41. Resnick, Paul and Mel King. "The Rainbow Pages--Building Community With Voice Technology," in Directions and Implications of Advanced Computing 1990 (DIAC '90) Symposium Proceedings, ed. Doug Schuler. Computer Professionals for Social Responsibility (CPSR) 2nd ed., 1992, pp. 2-13.Google ScholarGoogle Scholar
  42. Schuler, Doug. "Community Networks: Building a New Participatory Medium," Communications of the ACM, Vol. 37, No. 1, January 1994, pp. 39-51. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Sirbu, Marvin. "Telecommunications Technology and Infrastructure," in Institute for Information Studies, A National Information Network: Changing Our Lives in the 21st Century. Nashville Tennessee and Queensland Maryland: The Institute for Information Studies, 1992, pp. 174-175.Google ScholarGoogle Scholar
  44. Stone, Antonio and Peter Miller. "Playing to Win and the Community Computing Center Movement," in Developing an Equitable and Open Information Infrastructure: Proceedings of the Directions and Implications of Advanced Computing (DIAC '94) Symposium, (ed. Hans Klein) Computer Professionals for Social Responsibility (CPSR), 1994, B4.Google ScholarGoogle Scholar
  45. Van Dran, Gisela; Guynes, Carl and Victor Prybutok. "The Information Infrastructure: Policy and Security Considerations," Computers and Society, Vol. 26, No. 1, March 1996, pp. 13-15. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Wexelblat, Alan. "Giving Meaning to Place: Semantic Spaces," in M. Benedikt, ed. Cyberspace: First Steps. Cambridge, MA: MIT Press, 1991, pp. 275-272. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Wright, Karen. "Trends in Communications: The Road to the Global Village," Scientific American, March 1990, pp. 83-94.Google ScholarGoogle ScholarCross RefCross Ref
  48. "Access to Information and Information Technologies," A Computer and Information Technologies Platform. Computer Professionals for Social Responsibility (CPSR), Berkeley Chapter, Peace and Justice Working Group, 1992, pp. 8-12.Google ScholarGoogle Scholar
  49. Ackerman, Mark. "Metaphors Along the Information Highway," in Developing an Equitable and Open Information Infrastructure: Proceedings of the Directions and Implications of Advanced Computing (DIAC '94) Symposium, (ed. Hans Klein) Computer Professionals for Social Responsibility (CPSR), 1994, E2.Google ScholarGoogle Scholar
  50. Armstrong, Ben. "The Social Impact of a National Information Superhighway," Computers and Society. Vol. 25, No. 3, September 1995, pp. 10-14. Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Barbour, Bob. "A Postmodern View of National Information Infrastructure," in Developing an Equitable and Open Information Infrastructure: Proceedings of the Directions and Implications of Advanced Computing (DIAC '94) Symposium, (ed. Hans Klein) Computer Professionals for Social Responsibility (CPSR), 1994, E1.Google ScholarGoogle Scholar
  52. Belsie, Laurent. "'Universal Services' Is No Longer So Simple," The Christian Science Monitor, April 7, 1994.Google ScholarGoogle Scholar
  53. Bruckman, Amy. "'Serious' Uses of Muds," in Developing an Equitable and Open Information Infrastructure: Proceedings of the Directions and Implications of Advanced Computing (DIAC '94) Symposium, (ed. Hans Klein) Computer Professionals for Social Responsibility (CPSR), 1994, D5.Google ScholarGoogle Scholar
  54. Biddle, Bradford. "Digital Signature Legislation: Flawed Efforts Will Hurt Consumers and Impede Development of 'Public Key Infrastructure'," The CPSR Newsletter, Vol. 13, No. 3, 1995, pp. 8-12.Google ScholarGoogle Scholar
  55. Charles, Dan. "Socializing in Cyberspace," New Scientist, No. 1821, May 16, 1992, pp. 12-13.Google ScholarGoogle Scholar
  56. Davis, Jim. "The NII and the Rest of Us," in Developing an Equitable and Open Information Infrastructure: Proceedings of the Directions and Implications of Advanced Computing (DIAC '94) Symposium, (ed. Hans Klein) Computer Professionals for Social Responsibility (CPSR), 1994, B2.Google ScholarGoogle Scholar
  57. Diamond, Edwin and Robert Silverman. White House to Your House: Media and Politics in Virtual America. Cambridge, MA: MIT Press, 1995.Google ScholarGoogle Scholar
  58. Douglas, Sarah. and Cheris Kramarae. "Gender Gridlock on the Information Superhighway," in Developing an Equitable and Open Information Infrastructure: Proceedings of the Directions and Implications of Advanced Computing (DIAC '94) Symposium, (ed. Hans Klein) Computer Professionals for Social Responsibility (CPSR), 1994, H3.Google ScholarGoogle Scholar
  59. Featherstone, Mike and Roger Burrows, eds. Cyberspace/Cyberbodies/Cyberpunk: Cultures of Technological Embodiment. Thousands Oaks, CA: Sage Publications Inc., 1996.Google ScholarGoogle Scholar
  60. Fulford, Robert. "Reach Out and Snub Someone," Saturday Night, May 1995. Reprinted in K. Schellenberg, ed. Computers in Society. 6th ed. Guilford, CT: Dushkin Publishing Group, 1996, pp. 106-108.Google ScholarGoogle Scholar
  61. Franco, V., Piirto, R., Hu, H.-Y., Lewenstein, B., Underwood, R. and N. Vidal. "Anatomy of a Flame: Conflict and Community Building on the Internet," IEEE Technology and Society Magazine, Summer 1995.Google ScholarGoogle ScholarCross RefCross Ref
  62. Gaiser, Ted. "Network Personality," in Developing an Equitable and Open Information Infrastructure: Proceedings of the Directions and Implications of Advanced Computing (DIAC '94) Symposium, (ed. Hans Klein) Computer Professionals for Social Responsibility (CPSR), 1994, F4.Google ScholarGoogle Scholar
  63. Griest, Stephanie. "Volunteers Help Widen Access to Information Superhighway," Seattle Post-Intellengencer, July 21, 1994, pp. C1, C3.Google ScholarGoogle Scholar
  64. Harasim, Linda; Starr, Roxanne Hiltz; Teles, Lucio and Murray Turoff. Learning Networks. Cambridge, MA: MIT Press, 1995.Google ScholarGoogle Scholar
  65. Jackson, James. "It's a Wired, Wired World," Time, Special Issue, Spring 1995, pp. 80-82. Reprinted in K. Schellenberg, ed. Computers in Society. 6th ed. Guilford, CT: Dushkin Publishing Group, 1996, pp. 204-206.Google ScholarGoogle Scholar
  66. Johnson, Deborah G. and Helen Nissenbaum. "The Networked World," Introduction to Chap. 7 in D. Johnson and H. Nissenbaum, eds. Computers, Ethics & Social Values. Englewood Cliffs, NJ: Prentice Hall, 1995, pp. 606-608.Google ScholarGoogle Scholar
  67. Johnson, Jeff. "Info 'Highway': A Worst Case Scenario," EE Times, August 28, 1995, p. 27.Google ScholarGoogle Scholar
  68. Jones, Steven G. ed. CyberSociety: Computer-Mediated Communication and the Community. Thousands Oaks, CA: Sage Publications, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  69. Kahin, Brian and James Keller, eds. Public Access to the Internet. Cambridge, MA: MIT Press, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  70. Kallman, Ernest. "Risks and Treats From Internet Access," Ethics in the Computer Age: Conference Proceedings. NY: ACM Press, 1995, pp. 33-39. Google ScholarGoogle ScholarDigital LibraryDigital Library
  71. Keyworth, George and Bruce Abell. "Competitiveness and Telecommunications: America's Economic Future: House-to-House Digital Fiber Optic Network," Indianapolis, IN: The Hudson Institute, 1990.Google ScholarGoogle Scholar
  72. Kling, Rob. "Synergies and Competition Between Life in Cyberspace and Face-to-Face Communities," Social Science Computer Review.Google ScholarGoogle Scholar
  73. Krol, Ed. The Whole Internet: Catalog and User's Guide. Sebastopol, CA: O'Reilly and Associates, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  74. Lemonick, Michael D. "The Net's Strange Day," Time, February 19, 1996, p. 55.Google ScholarGoogle Scholar
  75. Levinger, David, Monberg, John and Steve Price. "Duped Again? Learning from Broken Promises," in Developing an Equitable and Open Information Infrastructure: Proceedings of the Directions and Implications of Advanced Computing (DIAC '94) Symposium, (ed. Hans Klein) Computer Professionals for Social Responsibility (CPSR), 1994, E5.Google ScholarGoogle Scholar
  76. Machanick, Philip, Apteker, Ronnie, Green, Philip and Thomas McWalter. "Misanet: The Southern African Press on the Net," in Developing an Equitable and Open Information Infrastructure: Proceedings of the Directions and Implications of Advanced Computing (DIAC '94) Symposium, (ed. Hans Klein) Computer Professionals for Social Responsibility (CPSR), 1994, A4.Google ScholarGoogle Scholar
  77. McFadden, Tim. "Notes on the Structure of Cyberspace and the Ballistic Actors Model," in M. Benedikt, ed. Cyberspace: First Steps. Cambridge, MA: MIT Press, 1991, pp. 335-362. Google ScholarGoogle ScholarDigital LibraryDigital Library
  78. Miller, Steve. "Universal Access: Making Sure Everyone Has a Chance," in Developing an Equitable and Open Information Infrastructure. Proceedings of the Directions and Implications of Advanced Computing (DIAC '94) Symposium, (ed. Hans Klein) Computer Professionals for Social Responsibility (CPSR), 1994, Appendix.Google ScholarGoogle Scholar
  79. Miller, Steve. "Protecting the Public Interest," Chap. 5 in Civilizing Cyberspace: Policy, Power and the Information Superhighway. NY: ACM Press, 1995.Google ScholarGoogle Scholar
  80. Mitchell, William J. City of Bits: Space, Place, and the Infobaun. Cambridge, MA: MIT Press, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  81. Moore, Dinty W. The Emperor's Virtual Clothes: The Naked Truth About Internet Culture. Chapel Hill, NC Alqonquin Press, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  82. Morningstar, Chip and F. Randall Farmer. "The Lessons of Lucasfilm's Habitat," in M. Benedikt, ed. Cyberspace: First Steps. Cambridge, MA: MIT Press, 1991, pp. 273-302. Google ScholarGoogle ScholarDigital LibraryDigital Library
  83. Negroponte, Nicholas. "The DNA of Information," Chap. 1 in Being Digital. NY: Alfred Knopf, 1995.Google ScholarGoogle Scholar
  84. "No Place for Kids," Newsweek, July 3, 1995.Google ScholarGoogle Scholar
  85. Parry, Linda and Robert Wharton. "Computer Networks in the Workplace: Factors Affecting the Use of Electronic Communications" in Directions and Implications of Advanced Computing 1992 (DIAC '92): Symposium Proceedings. (ed. Doug Schuler) Computer Professionals for Social Responsibility (CPSR), 1992, pp. 9-31.Google ScholarGoogle Scholar
  86. Peek, Robin. The Spiders in the Web: A Satirical Look at the Development of the World Wide Web," The Information Society, Vol. 11, No. 4, October-December 1995, pp. 333-338.Google ScholarGoogle Scholar
  87. Rheingold, Howard. "Introduction," The Virtual Community: Homesteading on the Electronic Frontier. NY: HarperPerennial, 1994, pp. 1-17.Google ScholarGoogle Scholar
  88. Salvaggio. Jerry L. "Projecting a Positive Image of the Information Society," in J. Slack and F. Fejes, eds. The Ideology of the Information Age. Norwood, NJ: Ablex Publishers, 1987.Google ScholarGoogle Scholar
  89. Sayers, Dennis. "Empowerment and Intergenerational Bilingual Literacy: Parent-Child Relationships in Long-Distance Networks," in Developing an Equitable and Open Information Infrastructure: Proceedings of the Directions and Implications of Advanced Computing (DIAC '94) Symposium, (ed. Hans Klein) Computer Professionals for Social Responsibility (CPSR), 1994, F2.Google ScholarGoogle Scholar
  90. Schuler, Douglas. New Community Networks: Wired for Change. NY: ACM Press, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  91. "Serving the Community: A Public Interest Vision of the National Information Infrastructure," The CPSR Newsletter, Vols. 11- 12, Nos. 4-1, Winter 1993/1994, pp. 1-10, 20-30.Google ScholarGoogle Scholar
  92. Shields, Bob. eds. Cultures of Internet: Towards a Social Theory of Cyberspaces and Virtual Realities. Thousand Oaks, CA: Sage Publications Inc., 1996.Google ScholarGoogle Scholar
  93. Smarr, Larry and Charles E. Cutlet. "Life After Internet: Making Room for New Applications, "in B. Kahin, ed. Building Information Infrastructure. Cambridge, MA. Harvard Business School Press, 1992, p. 145.Google ScholarGoogle Scholar
  94. Smilovitz, Craig. "Decision Making on the Information Infrastructure," in Developing an Equitable and Open Information Infrastructure: Proceedings of the Directions and Implications of Advanced Computing (DIAC '94) Symposium, (ed. Hans Klein) Computer Professionals for Social Responsibility (CPSR), 1994, D3.Google ScholarGoogle Scholar
  95. Stoll, Clifford. Silicon Snake Oil: Second Thoughts on the Information Highway. Cambridge, MA: MIT Press, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  96. Stone, Allucquere Rosanne. "Will the Real Body Please Stand Up?: Boundary Stories about Virtual Cultures," in M. Benedikt, ed. Cyberspace: First Steps. Cambridge, MA: MIT Press, 1991, pp. 81-118. Google ScholarGoogle ScholarDigital LibraryDigital Library
  97. Strauss, Stephen. "Cybersickness: The Side Effects of Virtual Reality," Technology Review, July 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  98. Sullivan-Trainor, Michael. Detour: The Truth About the Information Superhighway. NY: IDG, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  99. The White House. "The National Information Infrastructure: Agenda for Action," Public Domain Document, September 15, 1993.Google ScholarGoogle Scholar
  100. Thomas, David. "Old Rituals for New Space: Rites de Passage and William Gibson's Cultural Model of Cyberspace," in M. Benedikt, ed. Cyberspace: First Steps. Cambridge, MA: MIT Press, 1991, pp. 31-48. Google ScholarGoogle ScholarDigital LibraryDigital Library
  101. Van Tassel, Joan. "Yakety-Yak do Talk Back!: PEN, The Nation's First Publicly Funded electronic Network, Makes a Difference in Santa Monica," Wired, January 1994, pp. 78-80. Reprinted in R. Kling, ed. Computerization and Controversy: Value Conflicts and Social Choices. 2nd ed. San Diego, CA: Academic Press, 1996, pp. 547-551. Google ScholarGoogle ScholarDigital LibraryDigital Library
  102. Webster, Frank. "What Information Society?," Information Society, Vol. 10, No. 1, January-March, pp. 1-23.Google ScholarGoogle Scholar
  103. Welsh, Rika; Walsh, Susie and Abigail Norman. "Public Access Television/Media Arts Centers: Models for Community Access to the Information Infrastructure," in Developing an Equitable and Open Information Infrastructure: Proceedings of the Directions and Implications of Advanced Computing (DIAC '94) Symposium, (ed. Hans Klein) Computer Professionals for Social Responsibility (CPSR), 1994, A2.Google ScholarGoogle Scholar
  104. Young, Edward; Weiss, Jeffrey, and Dan Lynch. "The Internet Marketplace: Cybercash, Cyberfraud, and Cybersovereignity," a panel discussion at the ACM/SIGCAS Symposium on Computers and the Quality of Life (CQL '96), Philadelphia, February, 15, 1996.Google ScholarGoogle Scholar
  105. Young, John E. "Spreading the Net," World Watch, January/February 1994. Reprinted in K. Schellenberg, ed. Computers in Society. 6th ed. Guilford, CT: Dushkin Pubishing Group, 1996, pp. 114-119.Google ScholarGoogle Scholar
  106. Artz, John. "Putting Virtues into Practice: Dialectic Values Clarification," a paper presented at the 4th National Computer Ethics Institute Conference, Washington, DC, April 27-28, 1995.Google ScholarGoogle Scholar
  107. Barlow, John Perry "Private Life in Cyberspace," Communications of the ACM, Vol. 38, No. 8, 1991, pp. 23-25. Reprinted in D. Johnson and H. Nissenbaum, eds. Computers, Ethics, And Social Values. NY: Prentice Hall, 1995, pp. 310-313. Google ScholarGoogle ScholarDigital LibraryDigital Library
  108. Caragata, Warren. "Crime in Cybercity," Maclean's, May 22, 1995. Reprinted in K. Schellenberg, ed. Computers in Society. 6th ed. Guilford, CT: Dushkin Publishing Group, 1996, pp. 122-125.Google ScholarGoogle Scholar
  109. Cavanaugh, Michael; Gerbracht, Ted, Kallman, Ernie and Bill Marmon "Whose Email Is It Anyway: Ownership, Privacy and Corporate Policy," a panel discussion at the 4th National Computer Ethics Institute Conference, Washington, DC, April 28, 1995.Google ScholarGoogle Scholar
  110. Cavazos, Edward and Gavino Morin. Cyberspace and the Law: Your Rights and Duties in the On-Line World. Cambridge, MA: MIT Press, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  111. Conger, Sue and Karen Loch, eds. Ethics and Computer Use. Communications of the ACM, (entire issue devoted to Computer Ethics) Vol. 38, No. 12, December 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  112. Eckenwiler, Mark, "In the Eyes of the Law," Internet World, August 1995. Reprinted in K. Schellenberg, ed. Computers in Society. 6th ed. Guilford, CT: Dushkin Publishing Group, 1996, pp. 170-171.Google ScholarGoogle Scholar
  113. Fodor, John. "CyberEthics," Ethics in the Computer Age: Conference Proceedings. NY: ACM Press, 1995, pp. 180-187. Google ScholarGoogle ScholarDigital LibraryDigital Library
  114. Fodor, John. "Action and Accountability in Cyberspace," Computer Ethics Institute: Conference Proceedings, 1995, forthcoming.Google ScholarGoogle Scholar
  115. Garfinkel, Simson. "Risks of Social Security Numbers," Communications of the ACM, October 1995, Vol. 38, No. 10, p. 146. Google ScholarGoogle ScholarDigital LibraryDigital Library
  116. Goodman, Seymour. "Computing in South Africa: An End to 'Apartness'?," Communications of the ACM, February 1994. Reprinted in K. Schellenberg, ed. Computers in Society. 6th ed. Guilford, CT: Dushkin Publishing Group, 1996, pp. 207- 210. Google ScholarGoogle ScholarDigital LibraryDigital Library
  117. Gotterbarn, Donald, Harvey, Kathleen, Johnson, Deborah and Robert Melford. "Cyberethics and the Professionalism of Software Engineering and Computer Security," a panel discussion at the 4th National Computer Ethics Institute Conference, Washington, DC, April 27-28, 1995.Google ScholarGoogle Scholar
  118. Guynes, Carl. "Privacy and Security Issues on the Internet," Computers and Society, Vol. 26, No. 1, March 1995, pp. 11- 13. Google ScholarGoogle ScholarDigital LibraryDigital Library
  119. Hafner, Katie and John Markoff. Cyberpunk: Outlaws and Hackers on the Computer Frontier. NY: Simon and Schuster, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  120. Hendee, Greg. "What I shouldn't Know: The Ethics of Information," a paper presented at the 4th National Computer Ethics Institute Conference, Washington, DC, April 27-28, 1995.Google ScholarGoogle Scholar
  121. Hollander, Rachelle D. "Ethics, Education and Entertainment on the NII: What Should Research Priorities Be?," in Developing an Equitable and Open Information Infrastructure: Proceedings of the Directions and Implications of Advanced Computing (DIAC '94) Symposium, (ed. Hans Klein) Computer Professionals for Social Responsibility (CPSR), 1994, H5.Google ScholarGoogle Scholar
  122. Hundley, Richard O. and Robert H. Anderson. "Emerging Challenge: Safety and Security in Cyberspace," IEEE Technology and Society Magazine. Vol. 14, No. 4, Winter 1995/1996, pp. 19-28.Google ScholarGoogle ScholarCross RefCross Ref
  123. Kellog, Wendy A., Carroll, John M. and John T. Richards, "Making Reality a Cyberspace," in M. Benedikt, ed. Cyberspace: First Steps. Cambridge, MA: MIT Press, 1991, pp. 411-432. Google ScholarGoogle ScholarDigital LibraryDigital Library
  124. Loughney, John. "Managing High-Technology Ethics: Rights vs. Values," a paper presented at the 4th National Computer Ethics Institute Conference, Washington, DC, April 27-28, 1995.Google ScholarGoogle Scholar
  125. Luengenbiehl, Heinz C. "Developing Computer Ethics Case Studies," in Developing an Equitable and Open Information Infrastructure: Proceedings of the Directions and Implications of Advanced Computing (DIAC '94) Symposium, (ed. Hans Klein) Computer Professionals for Social Responsibility (CPSR), 1994, H4.Google ScholarGoogle Scholar
  126. Maginn, Richard; Farley, Chris; Caddell, Karen; Gould, Todd and Sandy Pitzak. "Cyberethics Education: You Have to be More Than Aware," a panel discussion at the 4th National Computer Ethics Institute Conference, Washington, DC, April 27-28, 1995.Google ScholarGoogle Scholar
  127. Miller, Steve. "Privacy, Civil Liberties, and Encryption: Controlling our Data Integrity," and "Community, diversity and Citizenship: Online Ethics and the Need for Meaningful Correctness," Chaps. 10 and 11 in Civilizing Cyberspace: Policy, Power and the Information Superhighway. NY: ACM Press, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  128. Moor, James H. "Is Ethics Computable?," Metaphilosophy, VOL. 26, Nos. 1/2, January/April, 1995, pp. 1-21.Google ScholarGoogle Scholar
  129. Nance, Kara and Mahla Strohmaier. "Ethical Accountability in Cyberspace," Ethics in the Computer Age: Conference Proceedings. NY: ACM Press, 1995, pp. 115-119. Google ScholarGoogle ScholarDigital LibraryDigital Library
  130. "Responsible Use of Computers and Information Technologies," A Computer and Information Technologies Platform. Computer Professionals for Social Responsibility (CPSR), Berkeley Chapter, Peace and Justice Working Group, 1992, pp. 25-26.Google ScholarGoogle Scholar
  131. Rheingold, Howard. "Electronic Frontiers and Online America," Chap. 9 in The Virtual Community: Homesteading on the Electronic Frontier. NY: HarperPerennial, 1994.Google ScholarGoogle Scholar
  132. Ross, Susan Mallon. "Electronic Mail: Legal and Ethical Concerns in the United States and Canada," IEEE Transactions on Professional Communications, December 1995.Google ScholarGoogle Scholar
  133. Scott, Thomas; Lelewer, Debra and Ernest Kallman. "Ethical Issues Involving the Internet," Ethics in the Computer Age: Conference Proceedings. NY: ACM Press, 1995, pp. 31-32. Google ScholarGoogle ScholarDigital LibraryDigital Library
  134. Shea, Virginia. "Core Rules of Netiquette," EDUCOM Review, September/October 1994. Reprinted in K. Schellenberg, ed. Computers in Society. 6th ed. Guilford, CT: Dushkin Publishing Group, 1996, pp. 109-113.Google ScholarGoogle Scholar
  135. Sherizen, Sanford. "Securing Information Infrastructure: New Crimes, Criminals, Losses, and Liabilities in the Post-Hacker Era," in Developing an Equitable and Open Information Infrastructure: Proceedings of the Directions and Implications of Advanced Computing (DIAC '94) Symposium, (ed. Hans Klein) Computer Professionals for Social Responsibility (CPSR), 1994, G3.Google ScholarGoogle Scholar
  136. Stallman, Richard. Keynote Address on Intellectual Property Issues in Cyberspace, presented at the 4th National Computer Ethics Institute Conference--entitled Virtuous Reality: Cyberethics and the Balance of Individual, Communitarian and Corporate Interests, Washington, DC, April 27, 1995.Google ScholarGoogle Scholar
  137. Stallman, Richard, Johnson, David and Helena Kobrin. "Intellectual Property and Anonymity on the Internet," a panel discussion at the 4th National Computer Ethics Institute Conference, Washington, DC, April 27-28, 1995.Google ScholarGoogle Scholar
  138. Tavani, Herman T. "Computer Matching and Personal Privacy: Can They be Compatible?," ACM/SIGCAS Symposium on Computers and the Quality of Life (CQL '96): Conference Proceedings. NY: ACM Press, 1996, pp. 97-102. Google ScholarGoogle ScholarDigital LibraryDigital Library
  139. Toufexis, Anatasia. "Romancing the Computer: The First Cyberadultery Suit Shows the Risk of Looking for Love Online," Time, February 19, 1996, p. 53.Google ScholarGoogle Scholar
  140. van Swaay, "Maarten. Magic or Mischief: the Illusion of Cyberspace as a 'Technological Fix'," a paper presented at the 4th National Computer Ethics Institute Conference, Washington, DC, April 27-28, 1995.Google ScholarGoogle Scholar
  141. Wagner, Ina. "A Web of Fuzzy Problems: Confronting the Ethical Issues," Communications of the ACM, Vol. 36, No. 4, June 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  142. Wahl, Nancy. "Protection of Intellectual Property on the National Information Infrastructure," ACM/SIGCAS Symposium on Computers and the Quality of Life (CQL '96): Conference Proceedings. NY: ACM Press, 1996, pp. 102-106. Google ScholarGoogle ScholarDigital LibraryDigital Library
  143. Waller, Douglas. "Spies in Cyberspace," Time, March 20, 1995. Reprinted in K. Schellenberg, ed. Computers in Society. 6th ed. Guilford, CT: Dushkin Publishing Group, 1996, pp. 168- 169.Google ScholarGoogle Scholar
  144. Weckert, John. "Local Codes in a Global Context: Ethical Consistency in the Electronic Community," a paper presented at the 4th National Computer Ethics Institute Conference, Washington, DC, April 27-28, 1995.Google ScholarGoogle Scholar
  145. Arterton, F. Christopher. Teledemocracy: Can Technology Protect Democracy? Naebury Park, CA: Sage, 1987. Portions of this work are excerpted as "Teledemocracy Reconsidered," in T. Forester, ed. Computers in the Human Context. Cambridge, MA: MIT Press, 1989, pp. 438-450. Google ScholarGoogle ScholarDigital LibraryDigital Library
  146. Bacque, James. "Karla's Threat to the Internet," Saturday Night, Vol. 109, No. 8, October, 1994, pp. 30-33.Google ScholarGoogle Scholar
  147. Barendt, E. Freedom of Speech. Oxford: Clarendon Press, 1985.Google ScholarGoogle Scholar
  148. Barquin, Ramon; LaPorte, Todd and Danny Weitzner. "Democracy in Cyberspace," a panel discussion at the 4th National Computer Ethics Institute Conference, Washington, DC, April 27-28, 1995.Google ScholarGoogle Scholar
  149. Barlow, John Perry. "Property and Speech: Who Owns What You Say in Cyberspace," Communications of the ACM, Vol. 38. No. 12, December 1995, pp. 19-22. Google ScholarGoogle ScholarDigital LibraryDigital Library
  150. Berleur, Jacques. "Self-Regulation and Democracy in the Cybercommunity," a paper presented at the 4th National Computer Ethics Institute Conference, Washington, DC, April 27-28, 1995.Google ScholarGoogle Scholar
  151. Bjerknes, Gro; Ehn, Pelle and Morten Kyng, eds. Computers and Democracy: A Scandinavian Challenge. Brookfield, VT: Aldershot, 1987.Google ScholarGoogle Scholar
  152. Blasi, V. "The Checking Value in First Amendment Theory," American Bar Researeh Journal, 1977.Google ScholarGoogle ScholarCross RefCross Ref
  153. Blasi, V. "The First Amendment and the Ideal of Civic Courage: The Brandeis Opinion in Whitney v. California," William and Mary Law Review, 1988.Google ScholarGoogle Scholar
  154. Blau, Andrew. "Where the Wire Things Are," in Directions and Implications of Advanced Computing 1992 (DIAC '92): Symposium Proceedings. (ed. Doug Schuler) Computer Professionals for Social Responsibility (CPSR), 1992, pp. 141-142.Google ScholarGoogle Scholar
  155. Bruckman, Amy. "Democracy in Cyberspace," in Developing an Equitable and Open Information Infrastructure: Proceedings of the Directions and Implications of Advanced Computing (DIAC '94) Symposium. (ed. Hans Klein) Computer Professionals for Social Responsibility (CPSR), 1994, D4.Google ScholarGoogle Scholar
  156. Butler, Adam. "Anti-Obscenity Measure in Washington State Seen as a Threat to Internet Services," Chronicle of Higher Education. Vol. 41, No. 35, May 1995, P. A27.Google ScholarGoogle Scholar
  157. "Civil Liberties and Privacy," A Computer and Information Technologies Platform. Computer Professionals for Social Responsibility (CPSR), Berkeley Chapter, Peace and Justice Working Group, 1992, pp. 13-15.Google ScholarGoogle Scholar
  158. Civil Liberties and the Electronic Frontier: Mapping the Terrain. 1991 Conference Report. Computer Professional Responsibility (CPSR), 1992.Google ScholarGoogle Scholar
  159. Danziger, James; Dutton, William; Kling, Rob and Kenneth Kraemer. Computers and Politics: High Technology in American Local Governments. NY: Columbia University Press, 1982.Google ScholarGoogle Scholar
  160. DeLoughry, Thomas. "Existing Laws Called Adequate to Bar Children's Access to On-Line Pornography," Chronicle of Higher Education, Vol. 41, No. 47, August 4, 1995, P. A17.Google ScholarGoogle Scholar
  161. Denning, Dorothy. The United States Vs. Craig Neidorf: A Debate on Electronic Publishing, Constitutional Rights, and Hacking," in D. Johnson and H. Nissenbaum, eds. Computers, Ethics & Social Values. Englewood Cliffs, NJ: Prentice Hall, 1995, pp. 609-620.Google ScholarGoogle Scholar
  162. Dibbel, Julian. "Muzzling the Internet: Can this Congress Find a Way to Preserve Civil Liberties While Curbing Cyberporn?," Time, December 18, 1995, p. 75.Google ScholarGoogle Scholar
  163. Dibbel, Julian. "Taboo, Consensus, and the Challenge of Democracy in an Electronic Forum," Village Voice, December 21, 1993, pp. 36-42. Reprinted in R. Kling, ed. Computerization and Controversy: Value Conflicts and Social Choices. 2nd ed. San Diego, CA: Academic Press, 1996, pp. 52-568. Google ScholarGoogle ScholarDigital LibraryDigital Library
  164. Emerson, T. "Towards a General Theory of the First Amendment," Yale Law Review, 1963.Google ScholarGoogle ScholarCross RefCross Ref
  165. Exon, Jim and The American Civil Liberties Union. "At Issue: Should the Government Crack Down on Pornography on the Internet?," CQ Researcher. Vol. 5, No. 24, June 30, 1995, P. 577.Google ScholarGoogle Scholar
  166. Feinberg, J. Harm to Others. NY: Oxford University Press, 1982.Google ScholarGoogle Scholar
  167. Feinberg, J. and H. Gross, eds. Philosophy of Law. 3rd ed. Belmont, CA: Wadsworth Publishing Co., 1986.Google ScholarGoogle Scholar
  168. Flynn, Laurie. "Lurking On-Line: The Electronic Eavesdroppers. The New York Times, June 3, 1995, p. C8.Google ScholarGoogle Scholar
  169. Fuller, Steve. "The Political Rhetoric of NII," in Developing an Equitable and Open Information Infrastructure: Proceedings of the Directions and Implications of Advanced Computing (DIAC '94) Symposium, (ed. Hans Klein) Computer Professionals for Social Responsibility (CPSR), 1994, E3.Google ScholarGoogle Scholar
  170. Gibson, William. "Academy Leader," in M. Benedikt, ed. Cyberspace: First Steps. Cambridge, MA: MIT Press, 1991, pp. 27-31.Google ScholarGoogle Scholar
  171. Greenawalt, Kent. "Rationales for Freedom of Speech," D. Johnson and H. Nissenbaum, eds. Computers, Ethics & Social Values. Englewood Cliffs, NJ: Prentice Hall, 1995, pp. 664-678.Google ScholarGoogle Scholar
  172. Halal, William. "The New Capitalism," in T. Forester, ed. Computers in the Human Context. Cambridge, MA: MIT Press, 1989, pp. 427-437. Google ScholarGoogle ScholarDigital LibraryDigital Library
  173. Herring, Susan C. "Gender and Democracy in Computer-Mediated Communication," Electronic Journal of Communication/REC, Vol. 3, No. 2. Reprinted in R. Kling, ed. Computerization and Controversy: Value Conflicts and Social Choices. 2nd ed. San Diego, CA: Academic Press, 1996, pp. 476-489. Google ScholarGoogle ScholarDigital LibraryDigital Library
  174. Jensen, Eric. "An Electronic Soapbox: Computer Bulletin Boards and the First Amendment," Federal Communications Law Journal, Vol. 39, No. 3, pp. 217-258. Reprinted in D. Johnson and H. Nissenbaum, eds. Computers, Ethics & Social Values. Englewood Cliffs, NJ: Prentice Hall, 1995, pp. 678-693.Google ScholarGoogle Scholar
  175. Jones, Steven G. "Understanding Community in the Information Age," in S. Jones, ed. CyberSociety: Computer-Mediated Communication and the Community. Thousands Oaks, CA: Sage Publications, 1995.Google ScholarGoogle Scholar
  176. Kapor, Mitchell. "Civil Liberties in Cyberspace," Scientific American, 1991. Reprinted in D. Johnson and H. Nissenbaum, eds. Computers, Ethics & Social Values. Englewood Cliffs, NJ: Prentice Hall, 1995, pp. 545-650.Google ScholarGoogle Scholar
  177. Levy, Steven. "Battle of the Clipper Chip," The New York Times Magazine, June 12, 1994. Reprinted in D. Johnson and H. Nissenbaum, eds. Computers, Ethics & Social Values. Englewood Cliffs, NJ: Prentice Hall, 1995, pp. 651-664.Google ScholarGoogle Scholar
  178. Locke, John. "A Letter Concerning Toleration," (1689) in John Locke. (edited by C. L. Sherman). NY: Appleton Century, 1937.Google ScholarGoogle Scholar
  179. Locke, John. Book II: Two Treatises of Civil Government (1690). NY: Dutton, 1924.Google ScholarGoogle Scholar
  180. Markof, John. "U.S. Code Agency is Jostling for Civilian Turf," The New York Times, Jan. 24, pp. D1, D5.Google ScholarGoogle Scholar
  181. Mason, Janet. "Warning: Here Come the Software Police, Across the Board, October 1990. Reprinted in K. Schellenberg, ed. Computers in Society. 6th ed. Guilford, CT: Dushkin Publishing Group, 1996, pp. 109-113.Google ScholarGoogle Scholar
  182. Mill, John Stuart. On Liberty. London: Oxford University Press, 1859.Google ScholarGoogle Scholar
  183. Miller, Steve. "Democracy and Free Speech: Online Organizing for Participation and Power," Chap. 9 in Civilizing Cyberspace: Policy, Power and the Information Superhighway. NY: ACM Press, 1995.Google ScholarGoogle Scholar
  184. Milton, John. Aeropagetica. London: Hunter and Stevens, 1819.Google ScholarGoogle Scholar
  185. Negroponte, Nicholas. "The Bit Police," Chap. 4 in Being Digital. Alfred Knopf, 1995.Google ScholarGoogle Scholar
  186. "On a Screen Near You: Cyberporn," Time, July 3, 1995, pp. 38- 45.Google ScholarGoogle Scholar
  187. Penway, Anne Levinson. "Intellectual Freedom: Parks, Streets, Sidewalks and Cyberspace? Free Speech in the New Public Square," in Developing an Equitable and Open Information Infrastructure: Proceedings of the Directions and Implications of Advanced Computing (DIAC '94) Symposium, (ed. Hans Klein) Computer Professionals for Social Responsibility (CPSR), 1994, G1.Google ScholarGoogle Scholar
  188. "Pulling the Plug on Porn: Can German Laws Limit What We Say Online?," Time, January 8, 1996, p. 62.Google ScholarGoogle Scholar
  189. Quiltner, James. "Vice Raid on the Net," Time, April 1995, p. 63.Google ScholarGoogle Scholar
  190. Randels, George. "Virtual Communities and Virtuous Reality," a paper presented at the 4th National Computer Ethics Institute Conference, Washington, DC, April 27-28, 1995.Google ScholarGoogle Scholar
  191. Rezmierski, Virginia. "Computers, Pornography, and Conflicting Rights," EDUCOM Review, March/April 1995. Reprinted in K. Schellenberg, ed. Computers in Society. 6th ed. Guilford, CT: Dushkin Publishing Group, 1996, pp. 126-128.Google ScholarGoogle Scholar
  192. Rheingold, Howard. "Disinformocracy," Chap. 10 in The Virtual Community: Homesteading on the Electronic Frontier. NY: HarperPerennial, 1994.Google ScholarGoogle Scholar
  193. Rosenberg, Richard S. "Free Speech, Pornography, Sexual Harassment, and Electronic Networks," Information Society, Vol. 9, No. 4, October-December, pp. 285-331.Google ScholarGoogle Scholar
  194. Scanlon, T. "A Theory of Freedom of Expression," Philosophy and Public Affairs, 1972, pp. 215-216.Google ScholarGoogle Scholar
  195. Scanlon, T. "Freedom of Expression and Categories of Expression," University of Pittsburgh Law Review, 1979.Google ScholarGoogle Scholar
  196. Schauer, F. Free Speech: A Philosophical Enquiry. Cambridge, UK: Cambridge University Press, 1982.Google ScholarGoogle Scholar
  197. Sclove, Richard. "Democratizing Technology," in Developing an Equitable and Open Information Infrastructure: Proceedings of the Directions and Implications of Advanced Computing (DIAC '94) Symposium, (ed. Hans Klein) Computer Professionals for Social Responsibility (CPSR), 1994, Appendix.Google ScholarGoogle Scholar
  198. Sclove, Richard. Democracy and Technology. NY: Guilford Press, 1995.Google ScholarGoogle Scholar
  199. Spinello, Richard. "Free Speech in Cyberspace," a paper presented at the 4th National Computer Ethics Institute Conference, April 27-28, 1995.Google ScholarGoogle Scholar
  200. Sterling, Theodor. "Democracy in an Information Society," The Information Society, Vol. 4, No. 1/2, 1986, pp. 9-48. Google ScholarGoogle ScholarDigital LibraryDigital Library
  201. Weis, Elizabeth. "When Free Speech Isn't So Free Anymore," San Francisco Examiner, Aug. 22, 1994, p. D1.Google ScholarGoogle Scholar
  202. Winner, Langdon. Autonomous Technology. Cambridge, MA: MIT Press, 1980.Google ScholarGoogle Scholar
  203. Winner, Langdon. "Techne and Politea: The Technical Constitution of Society," in P. Durbin and F. Rapp, eds. Philosophy and Technology. Dordrecht: D. Ridel, 1983, pp. 97-111.Google ScholarGoogle ScholarCross RefCross Ref
  204. Wyman-Jones, Vaughn. "Is There Freedom in Decency?," Texas Computing, July 1995, pp. 16-17.Google ScholarGoogle Scholar

Index Terms

  1. Cyberethics and the future of computing

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM SIGCAS Computers and Society
        ACM SIGCAS Computers and Society  Volume 26, Issue 2
        June 1996
        27 pages
        ISSN:0095-2737
        DOI:10.1145/236394
        • Editor:
        • Tom Jewett
        Issue’s Table of Contents

        Copyright © 1996 Author

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 May 1996

        Check for updates

        Qualifiers

        • article
      • Article Metrics

        • Downloads (Last 12 months)38
        • Downloads (Last 6 weeks)2

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader